

![]()


Information Systems for Managers examines the strategic role of information technology in modern organizations and equips students with the knowledge needed to effectively manage information systems in a dynamic business environment. The course covers key concepts in information systems, including hardware, software, data management, networking, security, and e-business. Through real-world case studies and practical examples, students will explore how information systems support organizational decision-making, streamline business processes, and foster innovation. The course also addresses challenges related to system implementation, ethical considerations, and the alignment of IT with business strategy, preparing future managers to leverage technology for competitive advantage.
Recommended Textbook
Management Information Systems 7th Edition by Ken J. Sousa Effy
Available Study Resources on Quizplus 14 Chapters
970 Verified Questions
970 Flashcards
Source URL: https://quizplus.com/study-set/2002 Page 2

Available Study Resources on Quizplus for this Chatper
69 Verified Questions
69 Flashcards
Source URL: https://quizplus.com/quiz/39757
Sample Questions
Q1) A__________ is responsible for the databases and data warehouses of an organization-a very sensitive and powerful position.
A)database administrator
B)database programmer
C)system administrator
D)project manager
Answer: A
Q2) Geographic Information Systems can be used to manage daily operations as well as for planning and decision making.
A)True
B)False
Answer: True
Q3) Define information systems.
Answer: With an understanding of the words "information" and "system," the definition of an information system is almost intuitive: an information system (IS) consists of all the components that work together to process data and produce information.Almost all business information systems consist of many subsystems with subgoals,all contributing to an organization's main goal.
To view all questions and flashcards with answers, click on the resource link above.
3

Available Study Resources on Quizplus for this Chatper
56 Verified Questions
56 Flashcards
Source URL: https://quizplus.com/quiz/39758
Sample Questions
Q1) When failure occurs because an organization tries to be on the technological leading edge,observers call it the _____.
Answer: bleeding edge
Q2) A barrier to potential new market entrants is the high expense of entering the particular market.
A)True
B)False
Answer: True
Q3) Strategic information systems are defined by their technical features per se,and not by how they are used.
A)True
B)False
Answer: False
Q4) A firm gains bargaining power with a supplier when the firm has many competitors.
A)True
B)False
Answer: False
To view all questions and flashcards with answers, click on the resource link above. Page 4

Available Study Resources on Quizplus for this Chatper
61 Verified Questions
61 Flashcards
Source URL: https://quizplus.com/quiz/39759
Sample Questions
Q1) The most important development in hardware to support supply chain management has been a technology called radio frequency identification (RFID).
A)True
B)False
Answer: True
Q2) Enterprise resource planning systems can also serve as ___________systems.
Answer: supply chain management
SCM
supply chain management (SCM)
Q3) ___________participate in physical activities such as cutting and welding in the manufacturing process.
A)Computer-aided design systems
B)Expert systems
C)Computer-aided manufacturing systems
D)Just-in-time manufacturing systems
Answer: C
Q4) ___________emulates situations in which an employee must act and includes tests and modules to evaluate a trainee's performance.
Answer: Training software
To view all questions and flashcards with answers, click on the resource link above. Page 5

Available Study Resources on Quizplus for this Chatper
62 Verified Questions
62 Flashcards
Source URL: https://quizplus.com/quiz/39760
Sample Questions
Q1) _________is used to try to interpret handwritten and printed texts not originally designed for source data entry.
A)Ergonomics
B)Optical character recognition technology
C)Radio-frequency identification
D)Technology convergence
Q2) Since_________ reduces the amount of paper in organizations,some of its most enthusiastic adopters are companies in paper-intensive fields such as law,retail,insurance,and banking.
A)processing
B)multithreading
C)imaging
D)printing
Q3) Businesses that handle business transactions and store large amounts of data in a central computer often use mainframes,which some IT professionals fondly call "big iron."
A)True
B)False
Q4) _________is the number of bits per second that the bus can accommodate.
Q5) Describe the basic types of access modes.
To view all questions and flashcards with answers, click on the resource link above. Page 6

Available Study Resources on Quizplus for this Chatper
69 Verified Questions
69 Flashcards
Source URL: https://quizplus.com/quiz/39761
Sample Questions
Q1) Operating systems perform _________such as hardware diagnostics,file comparison,file sorting,and the like.
Q2) A(n)_________ is the software that enables the OS to control a device.
A)compiler
B)interpreter
C)server
D)driver
Q3) Locating and fixing programming errors is called _________.
A)compiling
B)coding
C)assembling
D)debugging
Q4) _________means the code is owned by someone who has the right to sell or license the software to others.
A)Source code
B)Open source
C)Proprietary
D)Groupware
Q5) A(n)_________ program can be developed by a random group of programmers,rather than by a single company.
To view all questions and flashcards with answers, click on the resource link above. Page 7

Available Study Resources on Quizplus for this Chatper
87 Verified Questions
87 Flashcards
Source URL: https://quizplus.com/quiz/39762
Sample Questions
Q1) With _________,data transmitted to computers from a telephone company's switching center remains digital throughout the entire transmission.
A)digital subscriber line
B)dial-up connections
C)normal landline telephone service
D)cable modems
Q2) Each computer or device connected to a network must have a(n)_________ or proper networking circuitry,which connects through a cable or a wireless antenna to a hub,switch,bridge,or router,which in turn connects to a LAN or WAN.
Q3) The ability to scramble and code messages through keys that are shared only between the sender and receiver is referred to as _____.
A)encryption
B)decryption
C)transcription
D)transmission
Q4) There are three basic types of networks: LANs,MANs,and WANs.
A)True
B)False
To view all questions and flashcards with answers, click on the resource link above.
8

Available Study Resources on Quizplus for this Chatper
70 Verified Questions
70 Flashcards
Source URL: https://quizplus.com/quiz/39763
Sample Questions
Q1) Organizations often organize their data warehouse as a collection of_________ ,smaller collections of data that focus on a particular subject or department.
Q2) Explain the impact of databases on businesses.
Q3) The inclusion of foreign keys to create join tables might cause considerable _________,a complexity that has not diminished the popularity of relational databases.
Q4) The _________model uses the object-oriented approach to maintaining records.
Q5) _________helps the users know what they can find and analyze in the data warehouse.
A)A foreign key
B)Encapsulation
C)A composite key
D)Metadata
Q6) A challenge with traditional file storage is _________.
A)low data redundancy
B)high data accuracy
C)high data integrity
D)low data misrepresentation
Q7) Discuss the security issues concerning databases.
To view all questions and flashcards with answers, click on the resource link above. Page 9

Available Study Resources on Quizplus for this Chatper
75 Verified Questions
75 Flashcards
Source URL: https://quizplus.com/quiz/39764
Sample Questions
Q1) Consumers of the final goods and services are involved in B2B trading.
A)True
B)False
Q2) An extranet might be viewed as connecting __________of business partners.
A)usenets
B)internets
C)intranets
D)supernets
Q3) To__________ is to make a digital audio recording,usually of voice,and post the file on the Web so that people can download it and listen to it.
Q4) __________is a secured protocol used for confidential transactions.
A)HTTPS
B)HTTP
C)FTP
D)VOIP
Q5) Cookies are always temporary;they are installed only for one session,and are removed when the user leaves the site.
A)True
B)False
To view all questions and flashcards with answers, click on the resource link above. Page 10

Available Study Resources on Quizplus for this Chatper
69 Verified Questions
69 Flashcards
Source URL: https://quizplus.com/quiz/39765
Sample Questions
Q1) Thinking globally and acting locally are ideas that contradict each other.
A)True
B)False
Q2) Identify a principle of the Directive on Data Privacy that conflicts with U.S.practices.
A)Businesses can refrain from informing people of the ways their data will be used.
B) Organizations can purchase personal data from third parties and never notify the subject.
C) Personal data can be processed only if the subject has given consent.
D) Personal data can be used for processes other than the original one.
Q3) In Japan,many people who order merchandise online prefer to pick it up at ____________called "konbini," and pay there for what they purchased.
A)dealers' warehouses
B)convenience stores
C)centralized markets
D)logistic hubs
Q4) The UCC has developed the 14-digit____________ to identify products and manufacturers.
To view all questions and flashcards with answers, click on the resource link above.

Available Study Resources on Quizplus for this Chatper
75 Verified Questions
75 Flashcards
Source URL: https://quizplus.com/quiz/39766
Sample Questions
Q1) ____________is a methodology of solving a new problem established on the solutions of similar problems.
A)Case-based reasoning
B)Yield management
C)What-if analysis
D)Sensitivity analysis
Q2) ____________are applications that combine features of two or more online applications.
A)Databases
B)Mashups
C)Spreadsheets
D)Neural networks
Q3) An outcome is almost always affected by more than one parameter.
A)True
B)False
Q4) People are often denied credit based on the decisions made by machines.
A)True
B)False
Q5) Sensitivity analysis is often referred to as____________ .
Q6) How do DSSs help in tax planning?
To view all questions and flashcards with answers, click on the resource link above. Page 12

Available Study Resources on Quizplus for this Chatper
63 Verified Questions
63 Flashcards
Source URL: https://quizplus.com/quiz/39767
Sample Questions
Q1) Knowledge management software makes storage and organization of unstructured data more of a challenge.
A)True
B)False
Q2) One objective of data mining is _____,the finding of groups of related facts not previously known.
Q3) _____ Applications can easily answer questions such as,"Where are my weakest performing sales offices?" and "What products are selling well?"
Q4) A dynamic _____ application responds to commands by composing tables "on the fly."
Q5) Online analytical processing (OLAP) applications are powerful tools created specifically for shift employees.
A)True
B)False
Q6) One objective of data mining is classification: Finding whether certain facts fall into predefined groups.
A)True
B)False
Q7) Discuss employee knowledge networks.
To view all questions and flashcards with answers, click on the resource link above. Page 13

Available Study Resources on Quizplus for this Chatper
73 Verified Questions
73 Flashcards
Source URL: https://quizplus.com/quiz/39768
Sample Questions
Q1) While data flow diagrams are easy to learn and use,they cannot describe a system completely.
A)True
B)False
Q2) ___________describes the role of IT in an organization.
A)IT vision
B)IT tactical plans
C)IT strategy outlines
D)IT mission statement
Q3) A carefully drawn___________ can provide a useful representation of a system,whether existing or planned.
A)directed acyclic graph
B)business process model
C)structure chart
D)data flow diagram
Q4) ___________consists of post-implementation debugging and updating (making changes and additions),including adding features that were originally desired but later postponed so budget and time limits could be met.
Q5) What are the benefits of standardization in planning?
To view all questions and flashcards with answers, click on the resource link above. Page 14

Available Study Resources on Quizplus for this Chatper
66 Verified Questions
66 Flashcards
Source URL: https://quizplus.com/quiz/39769
Sample Questions
Q1) Authorities usually deal with unauthorized use of computers as theft.
A)True
B)False
Q2) In________,nonprogrammer users write their own business applications.
Q3) Companies should not rely on end users to develop applications that __________.
A)will be used briefly and discarded
B)are needed immediately
C)are vital for the organization's survival
D)can be maintained by the users themselves
Q4) Outsourcing allows a client to know exactly what the cost of its IS functions will be over the period of the contract,which is usually several years.This allows for better
Q5) Vendor selection criteria include functionality,architectural fit,price,services,and support.
A)True
B)False
Q6) In user development of applications,the lack of__________ makes system maintenance difficult at best and impossible at worst.
Q7) What is a request for proposal (RFP)?
Page 15
To view all questions and flashcards with answers, click on the resource link above.

Available Study Resources on Quizplus for this Chatper
75 Verified Questions
75 Flashcards
Source URL: https://quizplus.com/quiz/39770
Sample Questions
Q1) _____ encryption is defined as encryption that comprises two keys: a public key,and a private key.
A)Parallel
B)Asymmetric
C)Cascade
D)Super
Q2) What are honeytokens?
Q3) In computer terms,a(n)___________ is any virus disguised as legitimate software or useful software that contains a virus.
Q4) The ___________,as it is popularly known,gives law enforcement agencies surveillance and wiretapping rights they did not have before 2001.
A)PATRIOT Act
B)Civil Contingencies Act
C)National Security Act
D)Domestic Security Enhancement Act
Q5) Once criminals have a person's identifying details,such as a Social Security number,driver's license number,or credit-card number,they can pretend to be this person,which is a crime called___________ .
Q6) What are the main goals of information security?
Page 16
To view all questions and flashcards with answers, click on the resource link above.