Which of the following statements best describes the productivity paradox for technology investment? A) The productivity of any technology is directly proportional to the investment in that technology. |
B) While it is easy to quantify the costs associated with developing an information system, it is often difficult to quantify tangible productivity gains from its use. |
2) System efficiency is the extent to which a system ________. |
D) enables people to do things faster or at lower cost |
3) Which of the following is true of system effectiveness? |
A) It is the extent to which a system enables the firm to accomplish goals well. |
4) Which of the following scenarios demonstrates system efficiency? |
E) The new information system at Barker’s helped employees work faster, with less effort. |
5) BelAir Tech replaced its outdated information system with a newer version. As a result, its employees reported a significant increase in work speed. Which of the following is most similar to BelAir’s situation? |
E) At Sterling Inc. the average number of application forms processed in an hour rose from 4 to 6 as a result of the new system. |
6) B&Z Inc. implemented a new information system two months ago but there have been no concrete increases in productivity as a result of the system. A similar system has been in place at the company headquarters for the past two years, and this system has resulted in significant, quantifiable benefits. Which of the following reasons is the most likely explanation for the lack of results? |
C) It can take years from the first implementation of this new system before the magnitude of benefits is felt by the organization. |
7) Business case arguments based on ________ focus on beliefs about organizational strategy, competitive advantage, industry forces, customer perceptions, market share, and so on. |
A) faith |
8) Business case arguments based on fear are dependent on ________. |
D) the notion that if the system is not implemented, the firm will lose out to the competition or go out of business |
9) Business case arguments based on data, quantitative analysis, and/or indisputable factors are known as arguments based on ________. |
C) Facts |
10) Which of the following is an example of a business case argument based on fear? |
A) If we do not implement this system, our competitors could gain a significant advantage over us. |
11) The total cost of ownership of a system refers to ________. |
D) the total cost of acquisition and all costs associated with use and maintenance of a system |
12) Which of the following is an example of a recurring cost associated with an information system? |
C) employee salaries |
13) Which of the following is an example of an intangible cost for a system? |
A) cost of losing customers |
14) BelAir Tech is conducting a cost-benefit analysis for its IS department. In this, the salary of an employee is an example of a(n) ________. |
B) tangible and recurring cost |
15) Which of the following is true for tangible costs? |
C) They are relatively easy to quantify. |
16) BelAir Tech implements a new information system and sees a 5 percent increase in monthly sales after implementation. This is a(n) ________ of the system. |
C) tangible benefit |
17) "Increased customer reach of the new Web-based system will result in at least a modest increase in sales." This statement represents a(n) ________ for the company. |
C) tangible benefit |
18) Which of the following is an example of an intangible benefit for a firm? |
E) improved customer perceptions of the firm |
19) A break-even analysis ________. |
A) identifies at what point tangible benefits equal tangible costs |
20) A method for deciding among different IS investments or when considering alternative designs for a given system is ________. |
B) weighted multicriteria analysis |
21) ________ are alternative measures of outcomes that can help clarify what the impact of a change will be on a firm. |
A) Proxy variables |
22) Which of the following is the main advantage of customizable software over off-the-shelf software? |
C) problem specificity |
23) The first phase of the systems development life cycle is ________. |
D) systems planning and selection |
24) After systems analysis, the next phase in the systems development life cycle is ________. |
E) systems design |
25) During the first phase of the systems development life cycle, organizations ________. |
B) identify, plan, and select a development project from all possible projects that could be performed |
26) Requirements collection takes place during the ________ phase of the systems development life cycle. |
C) systems analysis |
27) ________ is the process of gathering and organizing information from users, managers, customers, business processes, and documents to understand how a proposed information system should function. |
B) Requirements collection |
28) Which of the following steps takes place in an organization during both in-house systems development as well as external acquisition? |
C) systems analysis |
29) ________ is a group meeting-based process for requirements collection. |
A) Joint application design |
30) ________ represent(s) the movement of data through an organization or within an information system. |
D) Data flows |
31) ________ represents the way in which data are transformed. |
B) Processing logic |
32) Processing logic is often expressed in ________, which is independent of the actual programming language being used. |
E) pseudocode |
33) In an information system, a ________ is the point of contact between a system and users. |
D) human-computer interface |
34) A ________ is a business document containing some predefined data, often including some areas where additional data can be filled in. |
A) form |
35) A ________ is a business document containing only predefined data for online viewing or printing. |
D) report |
36) The processing and logic operations of an information system refer(s) to ________. |
C) the procedures that transform raw data inputs into new or modified information |
37) Software programming and testing takes place during the ________ stage of the systems development process. |
D) systems implementation |
38) Which of the following best describes developmental testing? |
A) testing the correctness of individual modules and the integration of multiple modules |
39) ________ testing is testing of the overall system to see whether it meets design requirements. |
D) Alpha |
40) Jason has just made some changes to the information system at BelAir Tech and wants to check if the system is working correctly. He wants to conduct a beta test of the system. Which of the following should he do to achieve this? |
C) He should ask users of the system to test it using actual data. |
41) ________ testing involves testing of the capabilities of the system in the user environment with actual data. |
B) Beta |
42) Developmental testing of an information system is performed by ________. |
C) programmers |
43) ________ testing is performed by actual users of the system. |
B) Beta |
44) Which of the following can be considered beta testing? |
D) System users at URP feed data into a new information system to test its capability. |
45) Programming is the process of ________. |
A) transforming the system design into a working computer system |
46) ________ is the process of decommissioning the current way of doing things and installing the new system in the organization. |
E) System conversion |
47) Which of the following is true for patch management? |
C) It helps in performing corrective or preventive maintenance for a system. |
48) The final phase of the systems development life cycle is ________. |
D) systems maintenance |
49) ________ use the Internet to check the software vendor’s Web site for available fixes for problems. The application downloads and installs these in order to fix software flaws. |
D) Patch management systems |
50) The process of making changes to an information system to repair flaws in design, coding, or implementation is known as ________. |
D) corrective maintenance |
51) The process of making changes to an information system to evolve its functionality, to accommodate changing business needs, or to migrate it to a different operating environment is known as ________. |
A) adaptive maintenance |
52) Which of the following types of system maintenance involves making enhancements to improve processing performance or interface usability? |
B) perfective maintenance |
53) Preventive maintenance of a system involves ________. |
C) making changes to a system to reduce the chance of future system failure |
54) BelAir Tech has a five-member team in charge of the development and maintenance of its information systems. An information system is in place, and the team performs routine maintenance to keep it running smoothly. Which of the following scenarios is an example of perfective maintenance? |
B) Justin works on the system to make the user interface more user-friendly. |
55) BelAir Tech has a five-member team in charge of development and maintenance of its information systems. An information system is in place, and the team performs routine maintenance to keep it running smoothly. Which of the following scenarios is an example of adaptive maintenance? |
C) Sara knows that the company is migrating to a new operating environment next month, and makes the appropriate changes to the system. |
56) Which of the following is true for prototyping? |
D) It uses a trial-and-error approach for discovering how a system should operate. |
changing demands. The company’s five-member IS team is competent and capable of developing a new system, but BelAir decides against developing a system in-house. Which of the following, if true, would most weaken BelAir’s decision? |
E) The company’s requirements for the new system are very specialized. |
58) BelAir has decided to buy an information system from an external vendor. The company has made a list of its requirements and asked prospective vendors to submit proposals for the system. Which of the following is the next step in the company’s external acquisition process? |
D) proposal evaluation |
59) Which of the following statements is true of a request for proposal? |
E) It is a list of user requirements sent to prospective vendors. |
60) ________ is the use of standardized performance tests to facilitate comparison between systems. |
B) Systems benchmarking |
61) BelAir has submitted a request for proposal to a number of vendors. It must now evaluate the proposals it has received. Which of the following methods can it use to compare the different systems? |
A) systems benchmarking |
62) ________ licenses are activated as soon as the packaging of the software has been removed. |
C) Shrink-wrap |
63) A(n) ________ license refers to a license primarily used for downloaded software that requires computer users to choose "I accept" before installing the software. |
A) click- wrap |
64) An enterprise license is also known as a(n) ________ license. |
B) volume |
65) Which of the following is true of Software as a Service? |
D) It allows clients to access services on an as-needed basis. |
66) BelAir Tech has developed and run its own information system for the past ten years. However, the company has now decided to outsource its IS function to a service provider. Which of the following, if true, will strengthen BelAir’s decision? |
D) BelAir has seen a fall in company revenue over the last year. |
67) Which of the following is an example of a basic relationship between an outsourcing vendor and client? |
C) BelAir buys a system from the vendor who offers the cheapest prices. |
68) The biggest increases in productivity result from increased system efficiency rather than system effectiveness. |
FALSE |
69) Business case arguments based on faith do not require hard data based on system costs. |
TRUE |
70) The total cost of ownership is focused on understanding not only the total cost of acquisition but also all costs associated with ongoing use and maintenance of a system. |
TRUE |
71) Salaries and benefits for personnel managing a system are non-recurring costs. |
FALSE |
72) A break-even analysis is a type of cost-benefit analysis to identify at what point tangible benefits equal tangible costs. |
TRUE |
73) A net-present-value analysis is an analysis of the relevant cash flow streams associated with the system at the organization’s discount rate. |
TRUE |
74) When making the case for an IS investment, it is undesirable to translate all potential benefits into monetary terms. |
FALSE |
75) Steering committees are ill-equipped to handle larger, riskier projects. |
FALSE |
76) Proxy variables can be used to measure changes in terms of their perceived value to the organization. |
TRUE |
77) Traditionally, the most common option for packaged software was commercial off-the-shelf software. |
TRUE |
78) The first phase of the systems development lifecycle is systems design. |
FALSE |
79) Requirements collection is the process of gathering and organizing information to understand how a proposed information system should function. |
TRUE |
80) Strategic alignment considers the number of individuals and the length of time needed to complete a project. |
FALSE |
81) In an entity-relationship diagram, each data entity can have only one attribute that describes it. |
FALSE |
82) Data flows represent the movement of data through an organization or within an information system. |
TRUE |
83) Processing logic represents the way in which data are transformed. |
TRUE |
84) System conversion is the process of decommissioning the current way of doing things and installing the new system in the organization. |
TRUE |
85) Corrective maintenance involves making changes to an information system to evolve its functionality, to accommodate changing business needs, or to migrate it to a different operating environment. |
FALSE |
86) Purchasing an existing system from an outside vendor is referred to as outsourcing. |
FALSE |
87) An RFP is sent to buyers who might potentially be interested in buying hardware and/or software for the system. |
FALSE |
88) Systems benchmarking is the use of standardized performance tests to facilitate comparison between systems. |
TRUE |
89) Public domain software severely restricts access to the source code and gives users no rights to copy or modify the software. |
FALSE |
90) In a basic relationship, the buyer and the supplier set preferences and prices to the benefit of each other. |
FALSE |
91) What is the productivity paradox for technology investments? Explain the possible reasons for the productivity paradox. |
Answer: While it is easy to quantify the costs associated with developing an information system, it is often difficult to quantify tangible productivity gains from its use. In many cases, IS expenditures, salaries, and the number of people on the IS staff have all been rising, but results from these investments have often been disappointing. It has been difficult to show that these vast expenditures on technologies have led to productivity gains. Information systems may have increased productivity, but other forces may have simultaneously worked to reduce it, the end results being difficult to identify. Factors such as government regulations, more complex tax codes, stricter financial reporting requirements, and more complex products can all have major impacts on a firm’s productivity. Measurement Problems: In many cases, the benefits of information systems are difficult to pinpoint because firms may be measuring the wrong things. Often, the biggest increases in productivity result from increased system effectiveness (i.e., the extent to which a system enables people and/or the firm to accomplish goals or tasks well). Unfortunately, many business metrics focus on system efficiency (i.e., the extent to which a system enables people and/or the firm to do things faster, at lower cost, or with relatively little time and effort). Time Lags: A second explanation for why productivity is sometimes difficult to demonstrate for some technology investments is that a significant time lag may occur from when a company makes the investment until that investment is translated into improvement in the bottom line. Redistribution: A third possible explanation for why IS productivity figures are not always easy to define is that a new type of system may be beneficial for individual firms but not for a particular industry or the economy as a whole. Particularly in competitive situations, new innovations may be used to redistribute the pieces of the pie rather than making the whole pie bigger. The result for the industry or economy as a whole is a wash—that is, the same number of products is being sold, and the same number of dollars is being spread across all the firms. Mismanagement: A fourth explanation is that the new system has not been implemented and managed well. Some believe that people often simply build bad systems, implement them poorly, and rely on technology fixes when the organization has problems that require a joint technology/process solution. Rather than increasing outputs or profits, IS investments might merely be a temporary bandage and may serve to mask or even increase organizational slack and inefficiency. |
92) Explain the three types of arguments commonly made in the business case for an information system. Give an example for each. |
Answer: People make a variety of arguments in their business cases for information systems. When managers make the business case for an information system, they typically base their arguments on faith, fear, and/or facts. Business case arguments based on faith: In some situations, arguments based on faith can be the most compelling and can drive the decision to invest in an information system despite the lack of any hard data on system costs, or even in the face of some data that say that the dollar cost for the system will be high. Arguments based on faith often hold that an information system must be implemented in order to achieve the organization’s strategy effectively and to gain or sustain a competitive advantage over rivals. Successful business case arguments based on faith should clearly describe the firm’s mission and objectives, the strategy for achieving them, and the types of information systems that are needed in order to enact the strategy. For example, a person making a business case based on faith might say: "I’m convinced that having this customer relationship management system will enable us to serve our customers significantly better than our competitors do." Business case arguments based on fear: These arguments are based on fear that if the system is not implemented, the firm will lose out to the competition or, worse, go out of business. The argument for the business case here would be something like, "If we do not implement this system, we run the risk of being sued or, worse, being thrown in jail." Business case arguments based on fact: Many people, including most chief financial officers, want to see the business case for an information system based on some convincing, quantitative analysis that proves beyond the shadow of a doubt that the benefits of the system will outweigh the costs. The most common way to prove this is to provide a detailed cost-benefit analysis of the information system. Arguments are based on data, quantitative analysis, and/or indisputable factors. An example of a business case based on facts is, "This analysis shows that implementing the inventory control system will help us reduce errors by 50 percent, reduce operating costs by 15 percent a year, increase production by 5 percent a year, and will pay for itself within eighteen months." |
93) Explain how a cost-benefit analysis could be used to build a fact-based business case. |
Answer: Many people, including most chief financial officers, want to see the business case for an information system based on some convincing, quantitative analysis that proves beyond the shadow of a doubt that the benefits of the system will outweigh the costs. The most common way to prove this is to provide a detailed cost-benefit analysis of the information system. One goal of a cost-benefit analysis is to accurately determine the total cost of ownership (TCO) for an investment. TCO is focused on understanding not only the total cost of acquisition but also all costs associated with ongoing use and maintenance of a system. Consequently, costs can usually be divided into two categories: nonrecurring costs and recurring costs. Next, you determine both tangible benefits and intangible benefits. A simplified cost-benefit analysis contrasts the total expected tangible costs versus the tangible benefits. Alternatively, you could perform a break-even analysis—a type of cost benefit analysis to identify at what point (if ever) tangible benefits equal tangible costs—or a more formal net-present-value analysis of the relevant cash flow streams associated with the system at the organization’s discount rate (i.e., the rate of return used by an organization to compute the present value of future cash flows). |
94) List and explain the main steps in the systems development life cycle. |
Answer: The term systems development life cycle (SDLC) describes the life of an information system from conception to retirement. The SDLC has four primary phases: 1. Systems planning and selection: The first phase of the SDLC is systems planning and selection. An organization must take care that only those projects that are critical to enabling the organization’s mission, goals, and objectives are undertaken. Consequently, the goal of systems planning and selection is simply to identify, plan, and select a development project from all possible projects that could be performed. 2. Systems analysis: The second phase of the SDLC is called systems analysis. One purpose of the systems analysis phase is for designers to gain a thorough understanding of an organization’s current way of doing things in the area for which the new information system will be constructed. The process of conducting an analysis requires that many tasks, or subphases, be performed. The first subphase focuses on determining system requirements. To determine the requirements, an analyst works closely with users to determine what is needed from the proposed system. After collecting the requirements, analysts organize this information using data, process, and logic modeling tools. 3. Systems design: The third phase of the SDLC is systems design. It is during this phase that the proposed system is designed; that is, the details of the chosen approach are elaborated. As with analysis, many different activities must occur during systems design. The elements that must be designed when building an information system include the following: (1) human-computer interface, (2) databases and files, and (3) processing and logic. 4. Systems implementation and operation: Many separate activities occur during systems implementation, the fourth phase of the SDLC. One group of activities focuses on transforming the system design into a working information system. These activities include software programming and testing. A second group of activities focuses on preparing the organization for using the new information system. These activities include system conversion, documentation, user training, and support. |
95) Describe some methods of requirements collection during systems analysis. |
Answer: The collection and structuring of requirements is arguably the most important activity in the systems development process because how well the IS requirements are defined influences all subsequent activities. Requirements collection is the process of gathering and organizing information from users, managers, customers, business processes, and documents to understand how a proposed information system should function. Systems analysts use a variety of techniques for collecting system requirements, including the following: • Interviews: Analysts interview people informed about the operation and issues of the current or proposed system. • Questionnaires.: Analysts design and administer surveys to gather opinions from people informed about the operation and issues of the current or proposed system. • Observations: Analysts observe workers at selected times to see how data are handled and what information people need to do their jobs. • Document analysis: Analysts study business documents to discover issues, policies, and rules as well as concrete examples of the use of data and information in the organization. • Joint application design: Joint application design (JAD) is a group meeting-based process for requirements collection. During this meeting, the users jointly define and agree on system requirements or designs. This process can result in dramatic reductions in the length of time needed to collect requirements or specify designs. |
96) Describe the elements that must be considered during the systems design phase of the SDLC. |
Answer: The elements that must be designed when building an information system include the following: (1) human-computer interface, (2) databases and files, and (3) processing and logic. Designing the human-computer interface: Just as people have different ways of interacting with other people, information systems can have different ways of interacting with people. A human-computer interface (HCI) is the point of contact between a system and users. Designing databases and files: To design databases and files, a systems analyst must have a thorough understanding of an organization’s data and informational needs. Designing processing and logic: The processing and logic operations of an information system are the steps and procedures that transform raw data inputs into new or modified information. |
97) What are the different types of software maintenance? |
Answer: After an information system is installed, it is essentially in the maintenance phase of the SDLC, in which an information system is systematically repaired and/or improved. The types of maintenance are the following: Corrective maintenance: Making changes to an information system to repair flaws in the design, coding, or implementation Adaptive maintenance: Making changes to an information system to evolve its functionality, to accommodate changing business needs, or to migrate it to a different operating environment. Perfective maintenance: Making enhancements to improve processing performance or interface usability, or adding desired but not necessarily required system features. Preventive maintenance: Making changes to a system to reduce the chance of future system failure. |
98) Describe the steps in the external acquisition process for information systems. |
Answer: Most external acquisition processes have at least five general steps: Systems planning and selection: The first phase of the SDLC is systems planning and selection. An organization must take care that only those projects that are critical to enabling the organization’s mission, goals, and objectives are undertaken. Consequently, the goal of systems planning and selection is simply to identify, plan, and select a development project from all possible projects that could be performed. Systems analysis: The second phase of the SDLC is called systems analysis. One purpose of the systems analysis phase is for designers to gain a thorough understanding of an organization’s current way of doing things in the area for which the new information system will be constructed. The process of conducting an analysis requires that many tasks, or subphases, be performed. The first subphase focuses on determining system requirements. To determine the requirements, an analyst works closely with users to determine what is needed from the proposed system. After collecting the requirements, analysts organize this information using data, process, and logic modeling tools. Development of a request for proposal: A request for proposal (RFP) is simply a document that is used to tell vendors what your requirements are and to invite them to provide information about how they might be able to meet those requirements. An RFP is sent to vendors who might potentially be interested in providing hardware and/or software for the system. Proposal evaluation: The fourth step in external acquisition is to evaluate proposals received from vendors. This evaluation may include viewing system demonstrations, evaluating the performance of those systems, and examining criteria important to the organization and judging how the proposed systems "stack up" to those criteria. Demonstrations are a good way to get a feel for the different systems’ capabilities. Vendor selection: One way of doing this is by devising a scoring system for each of the criteria and benchmarking results. Companies may use other, less formalized approaches to evaluate vendors. Sometimes they use simple checklists; other times they use a more subjective process. Regardless of the mechanism, eventually a company completes the evaluation stage and selects a vendor, ending the external acquisition process. |
99) What is an RFP? What areas does an RFP cover? |
Answer: A request for proposal (RFP) is a document that is used to tell vendors what your requirements are and to invite them to provide information about how they might be able to meet those requirements. An RFP is sent to vendors who might potentially be interested in providing hardware and/or software for the system. Among the areas that may be covered in an RFP are the following: • A summary of existing systems and applications • Requirements for system performance and features • Reliability, backup, and service requirements • The criteria that will be used to evaluate proposals • Timetable and budget constraints The RFP is then sent to prospective vendors along with an invitation to present their bids for the project. |
100) Explain the reasons why a firm might choose to outsource its information systems services |
Answer: A firm might outsource some (or all) of its information systems services for many reasons. Some of these are old reasons, but some are new to today’s environment: • Cost and quality concerns: In many cases it is possible to achieve higher-quality systems at a lower price through economies of scale, better management of hardware, lower labor costs, and better software licenses on the part of a service provider. • Problems in IS performance: IS departments may have problems meeting acceptable service standards because of cost overruns, delayed systems, underutilized systems, or poorly performing systems. In such cases, organizational management may attempt to increase reliability through outsourcing. • Supplier pressures: Some of the largest service providers are also the largest suppliers of computer equipment (e.g., IBM or Hewlett-Packard). In some cases, the aggressive sales forces of these suppliers are able to convince senior managers at other organizations to outsource their IS functions. • Simplifying, downsizing, and reengineering: Organizations under competitive pressure often attempt to focus on only their "core competencies." In many cases, organizations simply decide that running information systems is not one of their core competencies and decide to outsource this function to companies whose primary competency is developing and maintaining information systems. • Financial factors: When firms turn over their information systems to a service provider, they can sometimes strengthen their balance sheets by liquidating their IT assets. • Organizational culture: Political or organizational problems are often difficult for an IS group to overcome. However, an external service provider often brings enough clout, devoid of any organizational or functional ties, to streamline IS operations as needed. • Internal irritants: Tension between end users and the IS staff is sometimes difficult to eliminate. At times this tension can intrude on the daily operations of the organization, and the idea of a remote, external, relatively neutral IS group can be appealing. |
IST 202 Chapter 9 Practice Questions
Share This
Unfinished tasks keep piling up?
Let us complete them for you. Quickly and professionally.
Check Price