Deck 21: Ais Development Strategies

ملء الشاشة (f)
exit full mode
سؤال
When canned software is used for systems acquisition,the conceptual design phase of the systems development life cycle (SDLC)

A)becomes a make-or-buy decision.
B)is combined with the physical design phase.
C)remains unchanged.
D)becomes a "turn-on turn-off" decision.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Identify the statement below that is false with regards to the development of an AIS.

A)A newly designed AIS always meets user needs for a time period.
B)Changes to the AIS are often difficult to make after requirements have been frozen into specifications.
C)The development process can take so long that the system no longer meets company needs.
D)Users are sometimes unable to specify their needs adequately.
سؤال
What is the first step a company should take when evaluating requests for proposals?

A)Carefully compare proposals against the proposed AIS requirements.
B)Determine how much of a given proposal meets the desired AIS requirements.
C)Eliminate proposals that are missing important information or fail to meet minimum requirements.
D)Invite vendors to demonstrate their systems.
سؤال
The more information a company provides vendors in its request for proposal,the better the chances of receiving a system that meets the organization's requirements.Which of the below statements identifies why errors may decrease?

A)All responses are in the same format and based on the same information.
B)Both parties possess the same expectations and pertinent information is captured in writing.
C)The chances of overlooking important factors are reduced.
D)The same information is provided to all vendors.
سؤال
The reasons for ________ are to simplify the decision-making process,reduce errors,provide time savings,and avoid potential disagreements.

A)leasing
B)outsourcing
C)prototyping
D)sending out a request for a proposal
سؤال
________ and ________ are approaches to evaluating vendor proposals that do not incorporate dollar estimates of costs or benefits.

A)Benchmark problem; point scoring
B)Point scoring; requirements costing
C)Requirements costing; benchmark problem
D)Point scoring; prototyping
سؤال
When a systems vendor provides software via the Internet and gives the user accesses to the software remotely via the Internet,this is known as

A)a turnkey system.
B)cloud computing.
C)an application service package.
D)canned software.
سؤال
When canned software is used for systems acquisition,the physical design phase of the systems development life cycle (SDLC)

A)does not involve designing and coding, although modifications may still need to be made.
B)is combined with the conceptual design phase.
C)involves designing and coding, although modifications may still need to be made.
D)remains unchanged.
سؤال
________ is a method of comparing systems by executing an input,processing,and output task on different computer systems and evaluating the results.

A)Benchmarking
B)Point scoring
C)Prototyping
D)Requirement costing
سؤال
Identify one major drawback that is frequently associated with canned software.

A)A commercial software development company develops it.
B)Canned software is sold on the open market to a broad range of users with similar requirements.
C)Canned software may not meet all of a company's information or data processing needs.
D)Canned software may offer easy availability and lower costs.
سؤال
________ is a performance evaluation approach that evaluates systems based on the weighted score of criteria and points.

A)Benchmarking
B)Point scoring
C)Prototyping
D)Requirements costing
سؤال
Information provided to potential vendors on a Request For Proposal (RFP)should include

A)a budget for software and hardware.
B)detailed specifications for the AIS.
C)a timeframe required for completion of the project.
D)a high level needs for the AIS.
سؤال
The ________ method calculates and compares the processing times of different AIS to compare system performance.

A)benchmark problem
B)mandatory requirements
C)point scoring
D)requirements costing
سؤال
Which statement is true regarding canned software and the systems development life cycle (SDLC)?

A)Canned software cannot be modified to meet unique user needs.
B)Companies that buy, rather than develop, AIS software can still follow the systems development life cycle (SDLC)process.
C)Most canned software meets all of a company's information or data processing needs.
D)The systems development life cycle (SDLC)process does not apply to purchasing canned software.
سؤال
When canned software is used for systems acquisition,the maintenance aspect of the operations and maintenance phase of the systems development life cycle (SDLC)

A)is more costly.
B)is often difficult to predict.
C)is usually the responsibility of the vendor.
D)requires trained personnel.
سؤال
When a request for proposal (RFP)is solicited based on ________,total costs are usually lower and less time is required for vendor preparation and company evaluation.

A)specific equipment needs
B)general software needs
C)exact hardware and software specifications
D)system efficiency
سؤال
What is a drawback to using the requirement costing method of software and hardware evaluation?

A)Dollar estimates of costs and benefits are not included.
B)Intangible factors such as reliability and vendor support are overlooked.
C)The weights and points used are assigned subjectively.
D)There is no drawback to using the requirements costing method.
سؤال
________ is a method of comparing systems based on the cost of all required features; when software does not meet all requirements,the cost of developing unavailable features is estimated and added to its cost.

A)Benchmarking
B)Point scoring
C)Requirement costing
D)Prototyping
سؤال
When a systems vendor provides both the software and hardware needed to run a system as a package,this is known as

A)a turnkey system.
B)cloud computing.
C)an application service package.
D)canned software.
سؤال
When canned software is used for systems acquisition,the implementation and conversion phase of the systems development life cycle (SDLC)

A)involves the documentation step.
B)requires the company to have trained IS personnel.
C)requires the develop and test software step.
D)involves both A and C.
سؤال
What are the three methods to obtain a new information system? What is a turnkey system?
سؤال
When an organization seeks to modify canned software,it is best when ________ because unauthorized modifications may make the program unreliable.

A)the vendor modifies the software
B)the intended end-user modifies the software
C)programmers with software experience modify the software
D)the organization's IT modifies the software
سؤال
Moneka Jones is the CIO for Noela Incorporated.Moneka wants to replace the firm's existing system.However,she wants to spend as little time as possible preparing and evaluating RFPs.When preparing an RFP,Moneka should probably

A)disclose exact hardware and software specifications.
B)disclose specific performance objectives and requirements.
C)disclose general software requirements.
D)disclose general performance objectives and requirements.
سؤال
Which of the following is a method for comparing alternative vendor proposals for development of an accounting information system when the vendors differ with regard to their ability to meet the project criteria?

A)Point scoring.
B)Resource clearing.
C)Requirements costing.
D)Multi-objective optimization.
سؤال
What is a benchmark problem?

A)A difficulty encountered when attempting to bring an accounting information system up to industry best practices.
B)A method used to compare the efficiency of alternative accounting information systems.
C)The cost-benefit tradeoff defined by the relationship between increased costs and increased benefits from a system.
D)A method used to test the compatibility of a new accounting information system with existing hardware and software.
سؤال
Which approach systems acquisition is generally costly and labor-intensive?

A)Canned software.
B)Custom software.
C)Modified canned software.
D)Turnkey software.
سؤال
Describe the difficulties that could be encountered when developing an AIS.
سؤال
There are frequently many canned software packages available.However,many companies choose to develop their own software.Why?

A)An organization may have unique requirements that are not addressed by canned software packages.
B)Canned software packages are often less expensive than software developed in house.
C)The organization's size and complexity necessitates the in-house development of software.
D)A and C above are correct.
سؤال
Identify the ways an organization can gain full advantage of using a Request For Proposal (RFP).
سؤال
Who is typically responsible for installing turnkey systems?

A)An organization's IT department.
B)The vendor who provides the system.
C)A third-party hired by the system vendor.
D)Both the organization's IT department and the vendor who provides the system.
سؤال
Explain the concept of an application service provider.
سؤال
RFPs for exact hardware and software specifications have higher total costs and require more time to prepare and evaluate.
سؤال
What are the advantages and disadvantages of custom software and of canned software for meeting application software needs?
سؤال
Moneka Jones is the CIO for Noela Incorporated.Moneka wants to replace the firm's existing system,but wants to leave the technical issues to the vendor because she is not well-informed on the latest technologies.When preparing an RFP,Moneka most likely should

A)disclose exact hardware and software specifications.
B)disclose specific performance objectives and requirements.
C)disclose general software requirements.
D)disclose general performance objectives and requirements.
سؤال
Identify one of the benefits associated with procuring software from application service providers.

A)Lower cost.
B)Scalability.
C)Greater effectiveness.
D)Faster processing speed.
سؤال
Carmie Iria,the director of a systems project committee,has received management approval for the implementation of a new accounting information system.After sending out an RFP to multiple vendors,the committee settled on purchasing a system from Optibase,a vendor who will provide the company with all of the required hardware and software.Carmie's committee has opted to purchase

A)canned software.
B)a turnkey system.
C)an outsourced system.
D)cloud computing.
سؤال
Explain the importance of using a request for proposal.
سؤال
Carmie Iria,the director of a systems project committee,has received management approval for the implementation of a new accounting information system.After sending out an RFP to multiple vendors,the committee settled on purchasing a system from Sysys,a vendor who will provide a standard software package and post-sale technical support.Carmie's committee has decided to go with

A)canned software.
B)a turnkey system.
C)an outsourced system.
D)an end-user developed system.
سؤال
A Deloitte & Touche survey found that most chief information officers do not expect to replace their current systems with commercially available packages.
سؤال
________ are one example of a cloud computing solution.

A)Application service providers
B)Turnkey vendors
C)SDLC implementations
D)Canned software providers
سؤال
Where is the responsibility for the development of end-user computing applications typically placed?

A)End users.
B)Help desk.
C)Front-line analysts.
D)Second-line technicians.
سؤال
Which of the following is not a guideline that should be used to select an outside,custom-system developer?

A)The outside developer should have an in-depth understanding of how the company conducts its business.
B)The outside developer should have experience in the company's industry.
C)The outside developer should possess a good understanding of business in general.
D)The outside developer should be able to complete the system independently, without requiring frequent contact to ask questions.
سؤال
Why does Pepsi create most of the software it uses in business operations?

A)Pepsi does not trust canned software.
B)Using canned software actually cost Pepsi more than using custom software.
C)Pepsi could not find canned software sophisticated enough to meet its needs.
D)There is no canned software available in Pepsi's industry.
سؤال
Identify the system below that is likely to be most appropriate for end-user development.

A)An accounts receivable system.
B)A general ledger system.
C)An inventory system.
D)A system that helps with sensitivity analysis.
سؤال
Describe end-user computing and the advantages and risks involved.
سؤال
Firms should consider developing custom software only if

A)it will be used for critical functions like accounts receivable.
B)it will contribute to development of a significant competitive advantage.
C)the firm has the necessary expertise available in-house.
D)the available canned software is very expensive.
سؤال
End-user development is inappropriate for which types of systems?

A)Systems that process a large number of transactions.
B)Systems that need to be developed rapidly.
C)Systems that must be easy to use.
D)Organizations that have large IT departments.
سؤال
What guidelines should be followed when contracting with an outside developer to create custom software?
سؤال
Discuss how an organization can develop custom software.
سؤال
End-user computing is likely to result in a(n)

A)well tested system.
B)well documented system.
C)rapidly developed system.
D)efficient system.
سؤال
Identify the system below that is likely to be most appropriate for end-user development.

A)An accounts receivable system.
B)A general ledger system.
C)An inventory system.
D)A loan amortization spreadsheet program.
سؤال
Identify the system below that end users should not be allowed to develop.

A)A payroll processing program.
B)A program that performs "what-if" statistical modeling.
C)Developing an application using prewritten software such as a spreadsheet or database system.
D)Preparing a schedule or list such as a depreciation schedule.
سؤال
Identify one of the primary risks associated with end-user computing below.

A)IS personnel will not have enough work to do if users develop their own systems.
B)Systems that have not been adequately tested may be implemented.
C)System costs may skyrocket.
D)System development time may increase substantially.
سؤال
A second-line help desk operator would most likely

A)handle complicated queries requiring research.
B)provide callers with scripted answers.
C)use expert systems to resolve issues.
D)handle less complicated queries requiring research.
سؤال
Although Gillette uses canned software in its business operations,it does so with the intention of creating a competitive advantage.Identify how Gillette aims to gain a greater competitive advantage from using canned software.

A)From deciding how the software should be used.
B)From deciding what software should be used.
C)From the cost savings it gains by using canned software.
D)From deciding when software should be used.
سؤال
________ refers to involving users in the development,control,and deployment of information systems.

A)Amateur user computing (AUC)
B)Competitive intra-organization systems development approach (CIOSDA)
C)End-user computing (EUC)
D)Novice information systems development (NISD)
سؤال
Describe the purposes of a help desk.
سؤال
What is the basic function of a help desk?

A)Control access to corporate data.
B)Provide technical maintenance and support.
C)Train end users and assist with application development.
D)All of the above are basic functions of a help desk.
سؤال
Which of the following about end-user computing is true?

A)System users know best what they need, so should be able to create their own applications.
B)End-users, while knowledgeable about their job, are not trained to create systems applications, and should not be allowed to do so.
C)It is inefficient and costly to ask the IS department to create basic applications that only a few users need to use.
D)In most companies, the IS department doesn't want end-users to create their own applications, for fear IS won't have enough work to do.
سؤال
Which of the following is not an appropriate for task end users to perform?

A)Performing statistical analyses.
B)Preparing schedules and lists.
C)Retrieving information from databases.
D)Updating database records.
سؤال
The risk of the potential high cost to reverse outsourcing is referred to as

A)focus reduction.
B)locked-in system.
C)reduced competitive advantage.
D)unfulfilled goals.
سؤال
According to a survey discussed in your textbook,what percentage of outsourcing experiences have been labeled as "disasters" by company executives?

A)5%.
B)17%.
C)33%.
D)50%.
سؤال
According to your textbook,what percentage of outsourcing agreements have been described as failure or as major disappointments?

A)5% - 10%.
B)10% - 25%.
C)25% to 50%.
D)Great than 50%.
سؤال
How does outsourcing improve an organization's utilization of assets?

A)By allowing a company to eliminate its IS department, which will reduce its payroll costs.
B)By allowing the company to sell assets to outsourcers and improve their cash position.
C)By eliminating the expense of keeping up with the latest technology and, thus, eliminate the drain on cash reserves.
D)Both B and C above are correct.
سؤال
The IT department should be given control of end-user computing (EUC).
سؤال
All of the following are reasons a company might choose to outsource its systems operations and maintenance except

A)increased flexibility.
B)increased innovation.
C)reduce costs.
D)foster competition.
سؤال
Benathir Donathat,director of the project committee,has received approval from management for implementation of a new accounting information system.After putting out an RFP,the committee settled on a Web-based application service provider that will manage all hardware and software required by the system,with fees based on usage.The committee decided to go with

A)canned software.
B)a turnkey system.
C)an outsourced system.
D)an end-user developed system.
سؤال
In which of the following cases is outsourcing likely to be the best solution to the firm's data processing needs?

A)Peterson International is a trenchcoat wholesaler to retailers around the world. Sixty percent of sales orders are taken during the months of August and September. Peterson needs a system to manage online ordering and fulfillment.
B)Battlegoat Investment Strategies manages investors' portfolios and provides services to wealthy customers. The firm needs a system that will pull together selected investment data from a variety of sources and that allows account managers to prepare customized reports.
C)Yachtman Limited is in the business of buying businesses, managing them for a few years, then selling them for a profit. The firm requires a flexible system that will allow it to manage the types of businesses it controls.
D)Desalinas LLC, manages the construction of desalinization plants. It needs a system that will allow it to manage the construction process from bid to billing.
سؤال
If recent trends in end-user computing (EUC)persist,EUC will represent ________ of all information processing by the end of 2020.

A)15% - 24%
B)20% - 49%
C)50% - 74%
D)75% or more
سؤال
WorldWide Supermarket,a grocery store with 5,000 locations around the world surprised financial markets by announcing that it was selling all of its computers to CompuService and hiring the firm to operate and manage the supermarket's system.WorldWide Supermarket just engaged in which type of outsourcing agreement?

A)A locked-in agreement.
B)A mainframe agreement.
C)A client/server agreement.
D)A cloud computing agreement.
سؤال
Discuss how information system outsourcing can provide the organization with both a business solution and asset management.
سؤال
The unauthorized disclosure of sensitive information is an example of what risk associated with outsourcing?

A)A locked-in system.
B)A loss of control.
C)A reduced competitive advantage.
D)Inflexibility.
سؤال
Who should maintain control of access to date in a user-created system with proper controls?

A)The end-users.
B)Management.
C)The IT department.
D)A help desk.
سؤال
Which of the following is not a benefit of outsourcing?

A)Access to greater expertise and more advanced technology.
B)Ability to gain greater control.
C)Improved development time.
D)Lower costs.
سؤال
Why might outsourcing cause employee resistance?

A)Outsourcing often allows a company to better use its assets and scarce resources.
B)Outsourcing can lower a company's overall IS costs.
C)Outsourcing often facilitates downsizing.
D)Outsourcing helps eliminate the peaks and valleys of system usage.
سؤال
Describe outsourcing and identify the two types of outsourcing agreements.
سؤال
Sabella Cycles declared bankruptcy in 2013 and has since closed 5 outlets,or approximately 25% of its locations.Sabella needs to reduce the costs of operating the firm's information systems.To accomplish this,Sabella might decide to

A)replace the existing system with one of a smaller scale.
B)customize the existing system.
C)outsource system operations.
D)purchase a canned software system.
سؤال
End-user computing can eliminate many of the analyst-programmer communication problems associated with the traditional program development.
سؤال
The risk of losing a fundamental understanding of a company's AIS needs and the strategic users of an AIS as a result of outsourcing is referred to as

A)focus reduction.
B)loss of control.
C)reduced competitive advantage.
D)unfulfilled goals.
سؤال
Why are end-user created systems often poorly documented?

A)Users often do not know how to document systems properly.
B)Users often consider systems documentation to be unimportant.
C)Users often believe it is too expensive to properly document systems.
D)Users are often unaware they need to properly document systems.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/117
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 21: Ais Development Strategies
1
When canned software is used for systems acquisition,the conceptual design phase of the systems development life cycle (SDLC)

A)becomes a make-or-buy decision.
B)is combined with the physical design phase.
C)remains unchanged.
D)becomes a "turn-on turn-off" decision.
A
2
Identify the statement below that is false with regards to the development of an AIS.

A)A newly designed AIS always meets user needs for a time period.
B)Changes to the AIS are often difficult to make after requirements have been frozen into specifications.
C)The development process can take so long that the system no longer meets company needs.
D)Users are sometimes unable to specify their needs adequately.
A
3
What is the first step a company should take when evaluating requests for proposals?

A)Carefully compare proposals against the proposed AIS requirements.
B)Determine how much of a given proposal meets the desired AIS requirements.
C)Eliminate proposals that are missing important information or fail to meet minimum requirements.
D)Invite vendors to demonstrate their systems.
C
4
The more information a company provides vendors in its request for proposal,the better the chances of receiving a system that meets the organization's requirements.Which of the below statements identifies why errors may decrease?

A)All responses are in the same format and based on the same information.
B)Both parties possess the same expectations and pertinent information is captured in writing.
C)The chances of overlooking important factors are reduced.
D)The same information is provided to all vendors.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
5
The reasons for ________ are to simplify the decision-making process,reduce errors,provide time savings,and avoid potential disagreements.

A)leasing
B)outsourcing
C)prototyping
D)sending out a request for a proposal
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
6
________ and ________ are approaches to evaluating vendor proposals that do not incorporate dollar estimates of costs or benefits.

A)Benchmark problem; point scoring
B)Point scoring; requirements costing
C)Requirements costing; benchmark problem
D)Point scoring; prototyping
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
7
When a systems vendor provides software via the Internet and gives the user accesses to the software remotely via the Internet,this is known as

A)a turnkey system.
B)cloud computing.
C)an application service package.
D)canned software.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
8
When canned software is used for systems acquisition,the physical design phase of the systems development life cycle (SDLC)

A)does not involve designing and coding, although modifications may still need to be made.
B)is combined with the conceptual design phase.
C)involves designing and coding, although modifications may still need to be made.
D)remains unchanged.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
9
________ is a method of comparing systems by executing an input,processing,and output task on different computer systems and evaluating the results.

A)Benchmarking
B)Point scoring
C)Prototyping
D)Requirement costing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
10
Identify one major drawback that is frequently associated with canned software.

A)A commercial software development company develops it.
B)Canned software is sold on the open market to a broad range of users with similar requirements.
C)Canned software may not meet all of a company's information or data processing needs.
D)Canned software may offer easy availability and lower costs.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
11
________ is a performance evaluation approach that evaluates systems based on the weighted score of criteria and points.

A)Benchmarking
B)Point scoring
C)Prototyping
D)Requirements costing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
12
Information provided to potential vendors on a Request For Proposal (RFP)should include

A)a budget for software and hardware.
B)detailed specifications for the AIS.
C)a timeframe required for completion of the project.
D)a high level needs for the AIS.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
13
The ________ method calculates and compares the processing times of different AIS to compare system performance.

A)benchmark problem
B)mandatory requirements
C)point scoring
D)requirements costing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
14
Which statement is true regarding canned software and the systems development life cycle (SDLC)?

A)Canned software cannot be modified to meet unique user needs.
B)Companies that buy, rather than develop, AIS software can still follow the systems development life cycle (SDLC)process.
C)Most canned software meets all of a company's information or data processing needs.
D)The systems development life cycle (SDLC)process does not apply to purchasing canned software.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
15
When canned software is used for systems acquisition,the maintenance aspect of the operations and maintenance phase of the systems development life cycle (SDLC)

A)is more costly.
B)is often difficult to predict.
C)is usually the responsibility of the vendor.
D)requires trained personnel.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
16
When a request for proposal (RFP)is solicited based on ________,total costs are usually lower and less time is required for vendor preparation and company evaluation.

A)specific equipment needs
B)general software needs
C)exact hardware and software specifications
D)system efficiency
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
17
What is a drawback to using the requirement costing method of software and hardware evaluation?

A)Dollar estimates of costs and benefits are not included.
B)Intangible factors such as reliability and vendor support are overlooked.
C)The weights and points used are assigned subjectively.
D)There is no drawback to using the requirements costing method.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
18
________ is a method of comparing systems based on the cost of all required features; when software does not meet all requirements,the cost of developing unavailable features is estimated and added to its cost.

A)Benchmarking
B)Point scoring
C)Requirement costing
D)Prototyping
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
19
When a systems vendor provides both the software and hardware needed to run a system as a package,this is known as

A)a turnkey system.
B)cloud computing.
C)an application service package.
D)canned software.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
20
When canned software is used for systems acquisition,the implementation and conversion phase of the systems development life cycle (SDLC)

A)involves the documentation step.
B)requires the company to have trained IS personnel.
C)requires the develop and test software step.
D)involves both A and C.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
21
What are the three methods to obtain a new information system? What is a turnkey system?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
22
When an organization seeks to modify canned software,it is best when ________ because unauthorized modifications may make the program unreliable.

A)the vendor modifies the software
B)the intended end-user modifies the software
C)programmers with software experience modify the software
D)the organization's IT modifies the software
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
23
Moneka Jones is the CIO for Noela Incorporated.Moneka wants to replace the firm's existing system.However,she wants to spend as little time as possible preparing and evaluating RFPs.When preparing an RFP,Moneka should probably

A)disclose exact hardware and software specifications.
B)disclose specific performance objectives and requirements.
C)disclose general software requirements.
D)disclose general performance objectives and requirements.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
24
Which of the following is a method for comparing alternative vendor proposals for development of an accounting information system when the vendors differ with regard to their ability to meet the project criteria?

A)Point scoring.
B)Resource clearing.
C)Requirements costing.
D)Multi-objective optimization.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
25
What is a benchmark problem?

A)A difficulty encountered when attempting to bring an accounting information system up to industry best practices.
B)A method used to compare the efficiency of alternative accounting information systems.
C)The cost-benefit tradeoff defined by the relationship between increased costs and increased benefits from a system.
D)A method used to test the compatibility of a new accounting information system with existing hardware and software.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
26
Which approach systems acquisition is generally costly and labor-intensive?

A)Canned software.
B)Custom software.
C)Modified canned software.
D)Turnkey software.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
27
Describe the difficulties that could be encountered when developing an AIS.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
28
There are frequently many canned software packages available.However,many companies choose to develop their own software.Why?

A)An organization may have unique requirements that are not addressed by canned software packages.
B)Canned software packages are often less expensive than software developed in house.
C)The organization's size and complexity necessitates the in-house development of software.
D)A and C above are correct.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
29
Identify the ways an organization can gain full advantage of using a Request For Proposal (RFP).
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
30
Who is typically responsible for installing turnkey systems?

A)An organization's IT department.
B)The vendor who provides the system.
C)A third-party hired by the system vendor.
D)Both the organization's IT department and the vendor who provides the system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
31
Explain the concept of an application service provider.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
32
RFPs for exact hardware and software specifications have higher total costs and require more time to prepare and evaluate.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
33
What are the advantages and disadvantages of custom software and of canned software for meeting application software needs?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
34
Moneka Jones is the CIO for Noela Incorporated.Moneka wants to replace the firm's existing system,but wants to leave the technical issues to the vendor because she is not well-informed on the latest technologies.When preparing an RFP,Moneka most likely should

A)disclose exact hardware and software specifications.
B)disclose specific performance objectives and requirements.
C)disclose general software requirements.
D)disclose general performance objectives and requirements.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
35
Identify one of the benefits associated with procuring software from application service providers.

A)Lower cost.
B)Scalability.
C)Greater effectiveness.
D)Faster processing speed.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
36
Carmie Iria,the director of a systems project committee,has received management approval for the implementation of a new accounting information system.After sending out an RFP to multiple vendors,the committee settled on purchasing a system from Optibase,a vendor who will provide the company with all of the required hardware and software.Carmie's committee has opted to purchase

A)canned software.
B)a turnkey system.
C)an outsourced system.
D)cloud computing.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
37
Explain the importance of using a request for proposal.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
38
Carmie Iria,the director of a systems project committee,has received management approval for the implementation of a new accounting information system.After sending out an RFP to multiple vendors,the committee settled on purchasing a system from Sysys,a vendor who will provide a standard software package and post-sale technical support.Carmie's committee has decided to go with

A)canned software.
B)a turnkey system.
C)an outsourced system.
D)an end-user developed system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
39
A Deloitte & Touche survey found that most chief information officers do not expect to replace their current systems with commercially available packages.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
40
________ are one example of a cloud computing solution.

A)Application service providers
B)Turnkey vendors
C)SDLC implementations
D)Canned software providers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
41
Where is the responsibility for the development of end-user computing applications typically placed?

A)End users.
B)Help desk.
C)Front-line analysts.
D)Second-line technicians.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
42
Which of the following is not a guideline that should be used to select an outside,custom-system developer?

A)The outside developer should have an in-depth understanding of how the company conducts its business.
B)The outside developer should have experience in the company's industry.
C)The outside developer should possess a good understanding of business in general.
D)The outside developer should be able to complete the system independently, without requiring frequent contact to ask questions.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
43
Why does Pepsi create most of the software it uses in business operations?

A)Pepsi does not trust canned software.
B)Using canned software actually cost Pepsi more than using custom software.
C)Pepsi could not find canned software sophisticated enough to meet its needs.
D)There is no canned software available in Pepsi's industry.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
44
Identify the system below that is likely to be most appropriate for end-user development.

A)An accounts receivable system.
B)A general ledger system.
C)An inventory system.
D)A system that helps with sensitivity analysis.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
45
Describe end-user computing and the advantages and risks involved.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
46
Firms should consider developing custom software only if

A)it will be used for critical functions like accounts receivable.
B)it will contribute to development of a significant competitive advantage.
C)the firm has the necessary expertise available in-house.
D)the available canned software is very expensive.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
47
End-user development is inappropriate for which types of systems?

A)Systems that process a large number of transactions.
B)Systems that need to be developed rapidly.
C)Systems that must be easy to use.
D)Organizations that have large IT departments.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
48
What guidelines should be followed when contracting with an outside developer to create custom software?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
49
Discuss how an organization can develop custom software.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
50
End-user computing is likely to result in a(n)

A)well tested system.
B)well documented system.
C)rapidly developed system.
D)efficient system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
51
Identify the system below that is likely to be most appropriate for end-user development.

A)An accounts receivable system.
B)A general ledger system.
C)An inventory system.
D)A loan amortization spreadsheet program.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
52
Identify the system below that end users should not be allowed to develop.

A)A payroll processing program.
B)A program that performs "what-if" statistical modeling.
C)Developing an application using prewritten software such as a spreadsheet or database system.
D)Preparing a schedule or list such as a depreciation schedule.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
53
Identify one of the primary risks associated with end-user computing below.

A)IS personnel will not have enough work to do if users develop their own systems.
B)Systems that have not been adequately tested may be implemented.
C)System costs may skyrocket.
D)System development time may increase substantially.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
54
A second-line help desk operator would most likely

A)handle complicated queries requiring research.
B)provide callers with scripted answers.
C)use expert systems to resolve issues.
D)handle less complicated queries requiring research.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
55
Although Gillette uses canned software in its business operations,it does so with the intention of creating a competitive advantage.Identify how Gillette aims to gain a greater competitive advantage from using canned software.

A)From deciding how the software should be used.
B)From deciding what software should be used.
C)From the cost savings it gains by using canned software.
D)From deciding when software should be used.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
56
________ refers to involving users in the development,control,and deployment of information systems.

A)Amateur user computing (AUC)
B)Competitive intra-organization systems development approach (CIOSDA)
C)End-user computing (EUC)
D)Novice information systems development (NISD)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
57
Describe the purposes of a help desk.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
58
What is the basic function of a help desk?

A)Control access to corporate data.
B)Provide technical maintenance and support.
C)Train end users and assist with application development.
D)All of the above are basic functions of a help desk.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
59
Which of the following about end-user computing is true?

A)System users know best what they need, so should be able to create their own applications.
B)End-users, while knowledgeable about their job, are not trained to create systems applications, and should not be allowed to do so.
C)It is inefficient and costly to ask the IS department to create basic applications that only a few users need to use.
D)In most companies, the IS department doesn't want end-users to create their own applications, for fear IS won't have enough work to do.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
60
Which of the following is not an appropriate for task end users to perform?

A)Performing statistical analyses.
B)Preparing schedules and lists.
C)Retrieving information from databases.
D)Updating database records.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
61
The risk of the potential high cost to reverse outsourcing is referred to as

A)focus reduction.
B)locked-in system.
C)reduced competitive advantage.
D)unfulfilled goals.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
62
According to a survey discussed in your textbook,what percentage of outsourcing experiences have been labeled as "disasters" by company executives?

A)5%.
B)17%.
C)33%.
D)50%.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
63
According to your textbook,what percentage of outsourcing agreements have been described as failure or as major disappointments?

A)5% - 10%.
B)10% - 25%.
C)25% to 50%.
D)Great than 50%.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
64
How does outsourcing improve an organization's utilization of assets?

A)By allowing a company to eliminate its IS department, which will reduce its payroll costs.
B)By allowing the company to sell assets to outsourcers and improve their cash position.
C)By eliminating the expense of keeping up with the latest technology and, thus, eliminate the drain on cash reserves.
D)Both B and C above are correct.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
65
The IT department should be given control of end-user computing (EUC).
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
66
All of the following are reasons a company might choose to outsource its systems operations and maintenance except

A)increased flexibility.
B)increased innovation.
C)reduce costs.
D)foster competition.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
67
Benathir Donathat,director of the project committee,has received approval from management for implementation of a new accounting information system.After putting out an RFP,the committee settled on a Web-based application service provider that will manage all hardware and software required by the system,with fees based on usage.The committee decided to go with

A)canned software.
B)a turnkey system.
C)an outsourced system.
D)an end-user developed system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
68
In which of the following cases is outsourcing likely to be the best solution to the firm's data processing needs?

A)Peterson International is a trenchcoat wholesaler to retailers around the world. Sixty percent of sales orders are taken during the months of August and September. Peterson needs a system to manage online ordering and fulfillment.
B)Battlegoat Investment Strategies manages investors' portfolios and provides services to wealthy customers. The firm needs a system that will pull together selected investment data from a variety of sources and that allows account managers to prepare customized reports.
C)Yachtman Limited is in the business of buying businesses, managing them for a few years, then selling them for a profit. The firm requires a flexible system that will allow it to manage the types of businesses it controls.
D)Desalinas LLC, manages the construction of desalinization plants. It needs a system that will allow it to manage the construction process from bid to billing.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
69
If recent trends in end-user computing (EUC)persist,EUC will represent ________ of all information processing by the end of 2020.

A)15% - 24%
B)20% - 49%
C)50% - 74%
D)75% or more
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
70
WorldWide Supermarket,a grocery store with 5,000 locations around the world surprised financial markets by announcing that it was selling all of its computers to CompuService and hiring the firm to operate and manage the supermarket's system.WorldWide Supermarket just engaged in which type of outsourcing agreement?

A)A locked-in agreement.
B)A mainframe agreement.
C)A client/server agreement.
D)A cloud computing agreement.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
71
Discuss how information system outsourcing can provide the organization with both a business solution and asset management.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
72
The unauthorized disclosure of sensitive information is an example of what risk associated with outsourcing?

A)A locked-in system.
B)A loss of control.
C)A reduced competitive advantage.
D)Inflexibility.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
73
Who should maintain control of access to date in a user-created system with proper controls?

A)The end-users.
B)Management.
C)The IT department.
D)A help desk.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
74
Which of the following is not a benefit of outsourcing?

A)Access to greater expertise and more advanced technology.
B)Ability to gain greater control.
C)Improved development time.
D)Lower costs.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
75
Why might outsourcing cause employee resistance?

A)Outsourcing often allows a company to better use its assets and scarce resources.
B)Outsourcing can lower a company's overall IS costs.
C)Outsourcing often facilitates downsizing.
D)Outsourcing helps eliminate the peaks and valleys of system usage.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
76
Describe outsourcing and identify the two types of outsourcing agreements.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
77
Sabella Cycles declared bankruptcy in 2013 and has since closed 5 outlets,or approximately 25% of its locations.Sabella needs to reduce the costs of operating the firm's information systems.To accomplish this,Sabella might decide to

A)replace the existing system with one of a smaller scale.
B)customize the existing system.
C)outsource system operations.
D)purchase a canned software system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
78
End-user computing can eliminate many of the analyst-programmer communication problems associated with the traditional program development.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
79
The risk of losing a fundamental understanding of a company's AIS needs and the strategic users of an AIS as a result of outsourcing is referred to as

A)focus reduction.
B)loss of control.
C)reduced competitive advantage.
D)unfulfilled goals.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
80
Why are end-user created systems often poorly documented?

A)Users often do not know how to document systems properly.
B)Users often consider systems documentation to be unimportant.
C)Users often believe it is too expensive to properly document systems.
D)Users are often unaware they need to properly document systems.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 117 في هذه المجموعة.