BCIS Study Guide

¡Supera tus tareas y exámenes ahora con Quizwiz!

201. Which of the following transactions definitely require online transaction processing and cannot work on batch processing approach? Stock Investments 202. Which of the following types of processing is essential for businesses that require access to current data such as airlines, ticket agencies, and stock investment firms? Online transaction processing 203. In the context of purchasing systems involved in the traditional transaction processing systems, when a(n) _____ arrives from a supplier, it is matched to the original order and the receiving report, and a check is generated if all data is complete and consistent. Invoice 204. As an organization's purchasing systems generate purchase orders and the items ordered are received, information is sent to the _____ system to manage the amounts owed by the organization. Accounts Payable 205. A small and medium-sized enterprise (SME) is a legally independent enterprise with _____ employees. Up to 500 206. A small business is currently using a paper-based system for billing, which is slow and error-prone. Which system upgrade will make the process faster and have fewer errors? Source data automation 207. _____ involves reentering data that was not typed or scanned correctly. Data Correction 208. In the context of enterprise resource planning (ERP) systems, the most efficient and effective ways to complete a business process are called _____.Best Practices 209. Payroll transactions and billing are typically done via _____.Batch Processing 210. According to the classification of enterprise resource planning (ERP) vendors, _____ vendors target medium-sized firms with annual revenues in the $50 million to $1 billion range operating out of one or more locations. Tier II 211. A key feature of an enterprise system is that it employs a database of key operational and planning data that can be shared by all . 212. _____includes the planning, executing, and controlling of all activities involved in raw material sourcing and procurement, converting raw materials to finished products, and the warehousing and delivering finished product to customers. Supply Chain Management (SCM) 213. Manufacturing enterprise resource planning (ERP) systems follow a systemic process for developing a production plan that starts with to develop an estimate of future customer demand. Sales Forecasting 214. In a manufacturing enterprise resource planning (ERP) system, demand management . Refines a production plan by determining the amount of weekly or daily production needed to meet the demand for individual products. 215. Purchasing uses information from the _____ to place purchase orders for raw materials with qualified suppliers. Materials Requirement Plan 216. A customer relationship management (CRM) system helps a company in managing . Distribution and accounting 217. Which of the following statements is true of product lifecycle management (PLM) software? It provides documents required for FDA and environmental compliance. 218. _____ is the use of software to assist in the creation, analysis, and modification of the design of a component or product. Computer-aided design 219. Which of these is an advantage of the hosted software model? Faster system start-up 220. Suppose a business with annual sales revenue of $30 million wishes to use an ERP solution. Which ERP vendor will have the most appropriate solution for them? Tier III vendors such as Abas or Bluebee software 221. Suppose a small business is using the hosted model for its enterprise software. Which of the following will not be an issue they will he worried about? Employing full-time IT professionals to manage its resources. 222. Which of the following is NOT considered business intelligence practice? Transaction Processing 223. One of the goals of business intelligence is to Present the results in an easy to understand manner. 224. Which of the following is NOT a characteristic of a data scientist? Business Leadership skills 225. What is the projected shortage of data scientists in the USA, according to a McKinsey & Co. report? 100,000 to 200,000 226. Mastery over which subject is NOT required for being a data scientist? English 227. Suppose your employer has four manufacturing units, each with its own data operations. They are considering using BI tools. Which of the following is a valid recommendation regarding the BI initiative? Create a data warehouse so that data from the factories are combined for BI analysis. 228. Which of the following is NOT a core process associated with data management? Process for Gathering BI requirements 229. You are to advise XYZ so that their BI efforts are fruitful. Which among the following is the most crucial advice of all? There must be strong commitment from the management 230. Which of the following is NOT a component of a KPI (key performance indicator)? format 231. Which of the following will be a 'fact' measure in a data cube used at a chain retail business? Sales Revenue 232. Which of the following is NOT true about linear regression? The technique implies causality between the independent and the dependent variables 233. The coefficient of determination, r squared, is ____. A number that indicates how well data fits the statistical model 234. Which of these analysis methods describes neural computing? Historical data is examined for patterns that are then used to make predictions 235. Suppose management wishes to start a BI project at your new job. Which of following will you recommend as the first step? Clarify business goals and design a project plan 236. Data within the data cube has been by specific dimensional values. Summarized 237. _____ is used to explore large amounts of data for hidden patterns to predict future trends. Data Mining 238. During modeling of the CRISP-DM method, we would . Apply selected modeling techniques 239. ____ is the last phase of the six-phase CRISP-DM method. Deployment 240. Which of the following is NOT considered a BI and analytics tool? Online transaction processing 241. Suppose you have access to quantitative data on populations by ZIP code and crime rates. You wish to determine if there is a relationship between the two variables and display the results in a graph. Which BI tool will be most useful? Data Visualization tool 242. To analyze various alternative scenarios, a manager would use the spreadsheet's what-if capability. 243. Which of the following is NOT a key capability of BI tools? Ability to provide advice to the user on which model best suits the data 244. The graphical representation that summarizes the steps a consumer takes in making the decision to buy your product and become a customer is called a conversion funnel. 245. What determines the size of words in a word cloud? Frequency of occurrence of the word in source documents 246. Which of the following is IBM's BI product? Cognos 247. From which vendor is the BI product Business Objects available? SAP 248. encourages nontechnical end users to make decisions based on facts and analyses rather than intuition. Self-service analytics 249. Which of the following is a potential disadvantage with self-service BI? Can lead to over spending on unapproved data sources and business analytics tools 250. The goal of business intelligence is to support and improve decision making 251. Which of the following is NOT a commonly used BI tool? Automated customer Service 252. _____ knowledge is hard to measure and document and typically is not objective or formalized. Tacit 253. Knowing the best way to negotiate with a foreign government about a volatile hostage situation is an example of _____ knowledge. Tacit 254. A _____ is a group of people with common interests who come together to create, store, and share knowledge of a specific topic. Community of Practice (COP) 255. _____ include the people, procedures, hardware, software, data, and knowledge needed to develop computer systems and machines that can simulate human intelligence processes including learning, reasoning, and self-correction. Artificial Intelligence systems 256. Sophisticated computer systems require an extension of understanding visual images. This is called a _____ system. Perceptive 257. _____ can process many pieces of data at the same time and learn to recognize patterns. Neural Networks 258. A genetic algorithm is an approach to solving problems based on the _____. Theory of evolution 259. A _____ is a conditional statement that links conditions to actions or outcomes. rule 260. The _____ stores all relevant information, data, rules, cases, and relationships that an expert system uses. Knowledge Base 261. In an expert system, the _____ is the component that delivers the expert advice. Inference engine 262. The _____ allows an expert system user to understand how the system arrived at its results. Explanation facility 263. An expert system's knowledge acquisition facility serves as an interface between _____. The experts and the knowledge base 264. _____ do not need any previous training in computers or expert systems. Knowledge users 265. _____ is a popular and sophisticated software package that can be used to edit photographs and other visual images. Adobe Photoshop 266. When video files are played while being downloaded from the Internet, it is called _____. Streaming Video 267. The haptic interface relays the sense of _____ in the virtual world. touch 268. _____ has the potential to superimpose digital data over real photos so that GPS maps can be combined with real pictures of stores and streets to help people locate their position. Augmented reality 269. _____ is a wide range of adaptive and rehabilitative devices to help people with disabilities perform tasks that they were formerly unable to accomplish or had great difficulty accomplishing. Assistive technology 270. _____ is a mathematical theory for developing strategies that maximize gains and minimize losses while adhering to a given set of rules and constraints. Game Theory 271. _____ is the combination of information technology with traditional disciplines such as medicine or science while considering the impact on individuals, organizations, and society. Informatics 272. Which of the following is NOT one of the factors that have caused many organizations to establish knowledge management programs? Economic Fluctuations 273. Kelly has just been hired as a server at a seafood restaurant. Since this is her first job as a server, her manager has instructed her to follow Mark, an experienced server, for an entire shift to learn how to do the job. Kelly is: Shadowing 274. Executives at Southwestern Construction have noticed that the company's construction team in the Phoenix office is more efficient with its resources than the other teams in the Las Vegas, Salt Lake, and Santa Fe offices. They decide to construct a knowledge management system that will allow the Phoenix team's methods to be shared with the other three offices. Which general benefit are they hoping to gain from this new system? Leveraging the expertise of people across the organization 275. Executives at Southwestern Construction have noticed that the company's construction team in the Phoenix office is more efficient with its resources than the other teams in the Las Vegas, Salt Lake, and Santa Fe offices. They decide to construct a knowledge management system that will allow the Phoenix team's methods to be shared with the other three offices. As a means of convincing the other teams to adopt the new methods, they develop an incentive program that allows team members to earn a percentage of the money they save on each project. This is related to which phase of knowledge management project implementation? Getting Employees to buy in 276. Best Value Hardware Stores, a national chain, has established strict policies about the conditions under which a customer can return merchandise. These policies are an example of: a business rule 277. An international package shipping company like FedEx needs to be able to track the location of every package at every stage in the process, from pick-up to delivery. Which specific type of software would be useful in this situation? Enterprise Search 278. You joined an agriculture business as an Assistant Marketing Manager and you are full of ideas on how to improve sales. When you voiced your thoughts to your boss, she mentions "do not reinvent the wheel". It means Before starting any new project, try to build on expertise and knowledge of others in the organization. 279. You work for a manufacturing business. Your employer uses a model for selecting the supplier for the raw materials. They wish to become more responsive so that changes in the internal decision model can be quickly implemented in the systems. What is an appropriate recommendation? Install a business rules management system and interface it to the Supply Chain management system. 280. Which of the five forces in Michael Porter's model refers to entry barriers and the relative threat of new competitors? Potential Entrants 281. This type of strategic planning defines the organization's vision and values and then identifies projects and initiatives to achieve the vision while adhering to the values .Issues-based strategic planning. 282. Which of the following steps is the first step in goals-based strategic planning? Analyze situation 283. What topics are considered so important that they are placed on top of the strategic planning pyramid? Mission and vision 284. The organization's _____ is stated in a challenging manner to inspire employees, customers, and shareholders. Mission Statement 285. The use of so-called SMART goals has long been advocated by management consultants. What does the M in SMART stand for? Measurable 286. A core _____ is the widely accepted principle that guides how employees behave and make decisions in the organization. Value 287. Which Internet business has "Do the right thing; don't be evil." as one of its values? GOOGLE 288. Suppose a goal your employer sets reads as "95% of our customers will be happy with our product." For which of the following characteristic is this goal inadequate? Measurable 289. Your new employer wishes to use strategic planning to grow the business. Which of the following would you advise is the most essential task? Create vision/mission statement 290. Which of the following does not influence IT organizational strategies? Government regulations. 291. Which type of IS project has the highest risk of failure? Breakthrough 292. If an organization considers its IS organization as a cost center or service provider, then its IS goals would be to . Reduce IS costs 293. The probability that your employer's IS strategy is inward focused to deliver the services cheaper, faster, and better is 0.11 to 0.40 . 294. The members of the review and consider the corporate objectives, goals, and strategies, and they can generate many ideas for IS projects that support corporate objectives and goals. IS organization 295. Which of the following is considered a core competency of an organization? Its ability to do something that its competition cannot imitate 296. Which of the following is considered an "expense" among typical IS project-related costs? Consultant Charges 297. The business unit most affected by the project and the one whose budget will cover the project costs is known as the sponsoring business unit 298. A building, office equipment, computer hardware, and network equipment are examples of capital assets 299. is a set of activities that includes defining an achievable completion date that is acceptable to the project stakeholders, developing a workable project schedule, and ensuring the timely completion of the project. Time Management 300. A useful model to describe how teams develop is the forming-storming-norming- performing- model. Adjourning

.

301. You are part of an Information Systems project team. Your job is to ensure that the technology and vendor suggested for use in the project are consistent with the IS strategy. Your role in the project steering team is _____. IS Manager 302. involves the generation, collection, dissemination, and storage of project information in a timely and effective manner. Communication Management 303. Which tool is useful in identifying the interests and information needs of the stakeholders? Stakeholder analysis matrix 304. Suppose Task C has Task A and Task B as its predecessor tasks. Task A ends on May 10th and Task B ends on May 12th. When can Task C begin? MAY 13th 305. For the "determine data needs" activity of a project, the optimistic estimated duration is 10 days, the pessimistic estimated duration is 20 days, the most likely time is 15 days. What is the expected duration of completing this activity? 15 Days 306. Activities related to the acquisition of goods and/or services for a project from sources outside the organization make up procurement management. 307. Suppose your business has agreed to pay a vendor for his services using a cost-plus-fixed-fee contract. This means _____. The agreement is to reimburse the costs plus a fixed amount as fee. 308. Experienced project managers would manage risk by preparing alternative course of action . 309. You have observed that it is possible that some of your organization's projects may end up having little or no value after they are completed. You are tasked with selecting potential future projects. Which type of projects would you recommend the organization consider? Only those projects that are tied to specific organizational goals 310. _____ requires unbiased and careful questioning of whether system elements are related in the most effective ways, considering new or different relationships among system elements, and possibly introducing new elements into the system. Creative Analysis 311. A scrum team usually consists of less than a dozen people . 312. The Pareto principle is also known as the 80-20 Rule 313. In the context of data-flow diagrams (DFDs), a(n) _____ shows either the source or destination of the data. Entity symbol 314. Tara and Zach are leading a systems development project and they want the investigation phase to go smoothly and quickly. They decide to use _____ because it will also help with the analysis and design phases. Joint Application development 315. Laura is carefully estimating the time required for each phase of a proposed system development project to see if her company can meet the client's desired time for completion. Laura is checking on schedule feasibility . 316. _____ determines whether the expected benefits associated with a project outweigh the expected costs sufficiently to make the project financially attractive. Economic feasibility 317. A _____ is a description of the logical and physical structure of data and the relationships among the data for each user. schema 318. _____ creates a complete set of technical specifications that can be used to construct an information system. Systems design 319. In the context of data-flow diagrams (DFDs), the _____ includes arrows that show the direction of data movement. Data-flow line 320. Once new software has been selected, implementation will include all of these tasks EXCEPT Consulting with stakeholders to establish future needs . 321. _____ involves testing the complete, integrated system (hardware, software, databases, people, and procedures) to validate that an information system meets all specified requirements. Systems testing 322. The goals of _____ are to determine the work load at which systems performance begins to degrade and to identify and eliminate any issues that prevent the system from reaching its required system-level performance. Volume Testing 323. _____ explains the purpose of every major piece of computer code and also identifies and describes key variables. Technical documentation 324. Your new software project manager is OK with requirements that are not fully specified up front. He recommends a team-based approach to development. He is very likely to be a proponent of the approach to software development. AGILE 325. The process of switching from an old information system to a replacement system is called _____. Cutover 326. You are part of the team to implement new software at XYZ Inc. The employees at XYZ Inc. trust the results of the old software programs, but are cautious about accepting the outcomes of the proposed new software programs. What software implementation strategy would you recommend in this situation? Parallel start up 327. You are part of a testing team at a software business. Your job is to see how many concurrent users the system can host and how many database transactions the system can handle without a noticeable drop in performance. You are doing _____ testing. Volume Testing 328. Which of the following statements is true of user acceptance testing (UAT)? UAT must be completed successfully before newly developed software can be rolled out to the market 329. _____ involves running a complete new system for one group of users rather than all users. Pilot start-up 330. _____ involves using a new or modified system under all kinds of operating conditions. Systems Operation 331. _____ is an iterative system development process that develops a system in "sprint" increments lasting from two weeks to two months. Agile Development 332. After the software is implemented, some modification is done on the software during maintenance. Suppose the customer data analysis software used by ABC Bank was significantly changed, but no new features were added. This type of maintenance is called a RELEASE. 333. A new _____ is a major program change, typically encompassing many new features. Version 334. _____ is the process of analyzing systems to make sure they are operating as intended. System Review 335. Phil has been working on a new version of his company's best-selling sales management software and now he'd like to ask several co-workers and a handful of the existing version's top users to perform an acceptance test. Phil is preparing for ALPHA TESTING 336. Someone who violates computer or Internet security maliciously or for illegal personal gain is known as a(n) . Black hat hacker 337. A hacktivist is someone who hacks computers or Web sites in an attempt to promote political ideology. 338. These days, the biggest threats to IT security are from organized groups that have ample resources, including money and sophisticated tools, to support their efforts. 339. This harmful malware is triggered by a specific event, such as Friday the 13th. Logic Bomb 340. Your business has a web server that has suddenly become unresponsive. When you study the server's logs there are a huge number of requests from what appear to be legitimate computers. The problem is likely because of a denial-of-service attack 341. A botnet is a ____. Network of computers that send out access requests to servers repeatedly 342. Once a _____ is installed, the attacker can gain full access to the computer. botnet 343. The purpose of Advanced Persistent Threat (APT) usually is to ____. Steal Data 344. On the back of a credit card the three-digit number above the signature panel is used to _____. Verify the card is legitimate and not a stolen card number 345. The US-CERT incident reporting system is used to ____. Alert the Department of Homeland Security about information security incidents 346. The second phase of an Advanced Persistent Threat attack is _____. Incursion 347. In a denial-of-service (DDoS) attack, the perpetrator ____. Instructs the zombie computers to send simple access requests to target computers 348. You had used an online service to apply for a credit card. As part of the process, you submitted your personal information such as SSN, date of birth, employer information, etc. Soon after you started receiving bills for items you did not purchase. You have become a victim of identity theft 349. A company's risk assessment process can include numerous threats to the computers and networks. Which of the following can be considered an adverse event? ALL OF THE ABOVE Distributed denial of service attack Email attachment with harmful worm Harmful virus 350. Which of the following laws covers false claims regarding unauthorized use of credit cards? Fraud and Related Activity in Connection with Access Devices statute 351. Which of the following subject areas does the USA Patriot Act cover? Cyberterrorism 352. Which of these organizations offers guidelines on developing security policies? SANS 353. You have been hired as the new Information Security consultant at XYZ Inc. Which of these employee behaviors would be a top security concern? Leaving Laptop computers unattended in public places 354. Which of the following is the correct description of a firewall? It is a software and hardware combination that limits the incoming and outgoing internet traffic. 355. Which of the following is NOT a popular vendor of firewall software? Red Hat 356. You work for a company that is growing. Originally, all the users in all departments had access to all the data in the database. It is considered a security risk. What is an appropriate action to reduce the risk? Assign roles and privileges to users so that only job-relevant data is accessible to the user 357. Which of the following shortcoming may be revealed during an IT security audit? Whether only a limited number of people have access to critical data or not. 358. Assume your organization is experiencing an intruder attack. You have an intrusion detection system (IDS) set up. Which of the following events occurs first? The network router sends traffic to the firewall as well as to the IDS 359. Which of the following security incidents is least costly to fix? Defacing of web pages 360. There has been a data breach at your business and the business has lost some customer data. It has led to angry customers who have filed charges. What is a recommended course of action to prepare for future events? Activate the forensics analysis team and prepare documentation. 361. You wish to use your personal laptop computer at work. However, the IT department folks are unwilling to allow you. The likely reason is your no-work related use of the laptop could increase vulnerability 362. Which of the following is a vendor of popular anti-virus software? Symantec 363. Which of the following is a useful policy to minimize waste and mistakes? Users should implement proper procedures to ensure correct input data. 364. _____ involves publishing an intentionally false written statement that is damaging to a person's or an organization's reputation. Libel 365. Which of the following is a computer-related mistake? Mishandling computer outputs. 366. The _____ requires all financial institutions to protect and secure customers' nonpublic data from unauthorized access or use. Gramm-Leach-Bliley Act of 1999 367. The _____ requires telephone companies to turn over customer information, including numbers called, without a court order if the Federal Bureau of Investigation (FBI) claims that the records are relevant to a terrorism investigation. USA Patriot Act of 2001 368. Which of the following statements is true of the E-Government Act of 2002? It requires federal agencies to post machine-readable privacy policies on their Web Sites and to perform privacy impact assessments on all new collections of data of ten or more people. 369. A job that requires sitting at a desk and using a computer for many hours a day can lead to formation of blood clots . 370. _____ is is an inflammation of the nerve that connects the forearm to the palm of the wrist. Carpal tunnel syndrome (CTS) 371. Heavy computer users who experience red, dry, itchy eyes should _____. Consider the use of artificial tears 372. _____ states the principles and core values that are essential to a set of people and that, therefore, govern these people's behavior. Code of Ethics 373. In a recent survey of 2100 human resource professionals, which two activities were listed as the biggest "productivity killers" in the workplace? Personal cell phone use and internet surfing. 374. A recent study conducted by the University of Nevada revealed that cyberloafing (wasting time online) costs U.S. businesses more than _____ annually. $85 Billion 375. To minimize waste and mistakes, organizations often develop and implement policies and procedures which focus on: . ALL OF THESE ANSWERS The use of data editing to ensure data accuracy and completeness the assignment of clear responsibility for data accuracy within each information system the implementation of source data automation 376. Which legislation is designed to combat the growing crime of identity theft? Fair and Accurate Credit Transactions Act of 2003 377. In today's workplace, most employers issue a policy stating that they will monitor employees' use of any company-owned computer, server, or email system, thus eliminating any expectation of privacy. How many organizations actually monitor, retain, and review employees' emails? About Half 378. In one court case, a hospital employee, who had been fired for showing coworkers sexually explicit photos on a hospital computer, sued his former employer for wrongful termination. What did the court rule and why? The hospital won the case because the court stated that the employee did not have a reasonable expectation of privacy when using the hospital's computer at work. 379. Federal law permits employers to monitor their employees' use of company-owned computer equipment, specifically ALL OF THESE ANSWER Emails instant Messages website views 380. RFID chips embedded in objects generate radio transmissions that allow people to track the location and other associated data of those objects. It's been suggested that RFID chips be implanted all of these answers In children to enable parents to find them if lost in criminals to allow law enforcement agents to find them if needed in all humans to give medical professionals instant access to medical records and conditions. 381. Harold is thinking about setting up profiles on Facebook and Twitter. Which of the following categories of data should he avoid sharing on these social media platforms? ALL OF THESE ANSWERS His Location His Health Conditions his religious and political affiliations 382. Which of the following is NOT one of the four most common issues related to the storage and use of personal data? NOTICE 383. Anne and Jordan have two pre-teen sons and they're concerned about what their kids might see and share on the Internet. They should probably invest in Filtering Software . 384. Although Roberta had signed a form preventing her doctor from sharing her personal medical records with the company she worked for, she later discovered that the doctor's office had, in fact, shared her data with her health insurance provider and her employer, which caused her to be terminated. Because the doctor's practice violated its own privacy policy, she was able to file a lawsuit under the Health Insurance Portability and Accountability Act . 385. In order to be accredited by the Better Business Bureau, a business is required to publish a privacy notice on its website that includes all of the following elements EXCEPT sharing and selling 386. Miranda works at a small-batch soda pop manufacturing plant. For eight hours a day, she uses her right hand to lift individual bottles of soda pop off the production line and place them in packing crates. Lately her right elbow has been hurting, so she visited her doctor, who diagnosed her with a repetitive strain injury . 387. Flexibility is a major component of ergonomic design, mainly because: ALL OF THESE ANSWERS people come in a wide range of shapes and sizes people have their own preferences people need to be able to position equipment in different ways for best results 388. Graydon noticed Jack, his friend and classmate, cheating on a physics exam and now he is trying to decide what to do about it. He knows he could keep quiet about it, but that would violate his moral values, plus the school's code of ethics requires students to report incidents of cheating. On the other hand, if he reports the incident, both his friend and probably all of their other friends will be mad at him. In which phase of the ethical decision-making process is Graydon? Weighing Options 389. While giving her students a physics exam, Professor Thompson noticed that Jack, one of her students who has been struggling with the course material, appeared to be copying answers from Graydon, one of the best students in the class. She decides that she should compare their answers when the class period is over before deciding what to do about the situation. In which phase of the ethical decision-making process is Professor Thompson? Gathering Information 390. During a recent brainstorming session, one of Franklin's co-workers suggested that their company could sell some of the data contained in its customer databases to earn extra revenue for the business. As a long-time member of the ACM (Association for Computing Machinery), Franklin is opposed to the idea because it violates which of the following imperatives in the ACM code of ethics? Respect the privacy of others 391. Suppose you have been receiving unsolicited phone calls from telemarketers. Which agency should you contact to prevent these 'junk' calls? The Federal Trade Commission 392. Your cousin works at her desktop computer for prolonged period of time every day. She would like to minimize the harmful effects of such repetitive work. Her workspace should be designed with in mind. Ergonomics

.

Possibility 1: In the modern workplace where many employees are using their employer's computer technology for business, there are often two differing viewpoints regarding privacy: the organization's and the employees'. Describe each party's viewpoint and state your own opinion on this issue. In this case, your opinion is your own. I'm not concerned what that opinion is, but that you support it.

Technology has become such a big part of today's world. Especially in the workplace. Employers are allowing their employees to use their company technological devices for business purposes and sometimes at home. There are two viewpoints that involve the privacy of this matter: the employers point and the employees point. From the employers point of view they are giving a free phone/computer to an employee to use for work and possibly non-work use. By doing this, the employer is basically saying that the employee should be willing and able to use that phone whenever they are needed, at work or not at work. The privacy part that goes with using the company phone is tricky. The employer is wanting to make sure the employee is using it for work purposes and not playing candy crush all day. They are also most likely monitoring inappropriate use. Since the employer is giving them a phone/computer, the employee should be doing what the employer has asked them to do. From the employees point of view it might seem like a violation of privacy for the employer to be able to monitor what they do. If the employee is not doing anything bad or that would upset the employer then they have nothing to worry about. Some people might think that just because the organization has given me a phone I should still be able to do what I want on it and not be monitored. In my opinion, I think if the company has given you a work phone and you accept it, then you are subject to follow their guidelines and rules with the phone. You are not required to take the phone or use that phone as your only phone. For example, my mom has her normal cell phone and then her company gave her a phone. She uses the work phone strictly for work purposes and her cell phone for everything else. So she does not have to worry about privacy issues.

1. The process of defining relationships among data to create useful information requires . KNOWLEDGE 2. A clothing store chain tracks the sale of each product at each location. Managers use this information to calculate the organization's profits, to track inventory needs, and to determine which styles and fabrics are the most popular among its customers. This is an example of quality information that is FLEXIBLE . 3. The value of information is directly linked to how it helps decision makers achieve their organization's _____. GOALS 4. In terms of information systems, Wikipedia would be an example of . A group IS 5. Which of the following is NOT an organizational complement? Familiar processes 6. All of the following are functions of a knowledge management system EXCEPT: Designing information systems 7. Which of the following does not is NOT an application software? Android 8. When the IS organization and its resources are focused on efforts that support the key objectives defined in the managers' strategic plan for the business, the organization is in alignment 9. Federal Express (FedEx) was one of the first large companies to empower customers to serve themselves at their convenience through the use of _____. A corporate extranet 10. _____ is/are considered to be the most important element in computer-based information systems. People 11. Information systems applications help sales and marketing professionals with all of the following EXCEPT . Computer-assisted manufacturing 12. _____ are people who work directly with information systems to get results. End users 13. Which of the following, (1) money deposited in a bank account, (2) student recording her answer to a question in an online test, (3) customer adding an item to the online shopping cart, are considered transactions in an information system? NONE OF THEM 14. A system that provides monthly production figures for a manager at manufacturing facility is considered a(n) . management information systems (MIS) 15. A(n) _____ can replace many applications with one unified set of programs, making the system easier to use and more effective. Enterprise resource planning system 16. Suppose a small manufacturing business wishes to have a system to manage all its vital business operations, they should go for a(n) enterprise resource planning (ERP) system . 17. Ongoing research conducted by the Standish Group shows that ____% of very large, multimillion dollar software projects fail or are challenged. 94 18. To keep information beyond reach of unauthorized users, is to keep the information _____. SECURE 19. Suppose an oil exploration company wishes to collect, codify, and store knowledge that is used in the organization, they should use a knowledge management system . 20. Over the next few years, it is expected that many organizations will focus on projects that . ALL OF THESE answers take advantage of cloud computing apply analytics to large amounts of business data. 21. Finn designs and sells screen-printed t-shirts. He is reviewing sales data from previous years to decide which colors are the most popular, and would therefore be the best investments for his next batch of t-shirts. This is an example of business analytics . 22. Sara Beth and Taylor have developed a new software that they plan to distribute for free, allowing other software professionals to study, change, and improved it. Their software is an example of . Open Source Software 23. The Internet of Things connects wireless identifiable objects . ALL OF THESE with each other to their owners with a central server 24. When an organization wants to develop a new information system to meet its needs, it can ALL of these answers buy software off the shelf build a custom application choose a software service provider. 25. Harrison works at a nationally known grocery store chain. He is analyzing sales data from the past five years to determine which low-selling products should be discontinued. Harrison is most likely a(n) . Data Scientist 26. Calligraph Publishing Company has created a system for storing every piece of data about every one of its books, both those that have already published and those that are still in production. The production team can input and access information about each book's format, editors can specify which procedures are in use, salespeople can input and access information about each book's sales history and availability, and even some external partners are allowed to access some data. This is an example of a(n) knowledge management group 27. Authoritarian regimes sometimes limit citizens' access to certain Websites, reject the use of certain keywords in search engine searches, and track and monitor the Internet activities of individuals, which are all forms of Censorship 28. Last week Jake and Gina used their computer programming skills to illegally gain access to a local veterinary clinic's customer database. They stole the customers' names, addresses, and credit card numbers, and they're now using this information to purchase things from the Internet. Jake and Gina are Cybercriminals . 29. All of the following are examples of ethical issues related to data and information systems EXCEPT . The cost of system development 30. Providing value to a _____ is the primary goal of any organization. Stakeholder 31. In a manufacturing organization, the supply chain is a key value chain whose primary activities include all of the following EXCEPT: finance and accounting 32. The idea of _____ is a form of innovation that constantly seeks ways to improve business processes and add value to products and services. Continuous improvement 33. The performance levels of radically new 'high-tech' products usually improve with newer versions. Such types of products are known as disruptive innovations 34. _____ involves reducing the number of employees to cut costs. Downsizing 35. Which of the following theories explains how a new idea or product gains acceptance and spreads through a specific population or subset of an organization? Diffusion of innovation theory 36. In a supply chain, _____ involve the transformation, movement, and storage of supplies and raw materials. Physical flows 37. _____ is a visa program that allows skilled employees from foreign lands into the United States. H-1B 38. _____ are responsible for running and maintaining information system equipment and also for scheduling, hardware maintenance, and preparing input and output. System Operators 39. _____ encompasses all the activities required to get the right product into the right consumer's hands in the right quantity at the right time and at the right cost, from acquisition of raw materials through customer delivery. Supply Chain Management 40. In the contemporary view of information systems, they are considered an integral part of the supply chain management process mainly because they: ALL of these aid in product transformation value chain management customer management 41. Suppose you are assigned to manage a virtual team. Which of the following will you NOT do? Hold team meetings regularly - whether the team members like it or not 42. All of the following are potential drawbacks to outsourcing EXCEPT: Greater focus on core business 43. Suppose, you need to advise someone about getting a certification. Which of the following will be appropriate advice? Certifications are vendor-specific 44. All of the following are positive driving forces that influence chance according to Lewin's Theory of Force Field Analysis, EXCEPT: Past performance 45. According to the diffusion innovation theory, _____ are the risk takers, always the first to try new products and ideas. Innovators 46. Which of the following is NOT one of the four main components in Leavitt's Diamond? systems 47. The members of an organization who are most likely to contribute to organizational learning are. All of these hourly employees mid-level managers executives 48. Positive outcomes of continuous improvement include. ALL of theses increased customer loyalty increased customer satisfaction protection against competitors 49. According to Lewin and Schein's 3-stage model of organizational change, which of the following tasks would be found in the 'unfreezing' stage? Assign Leaders and implementation team 50. Suppose you work at a business unit that has group of people who would rather wait to try a new technique. They listen to and follow the opinion leaders. They would be classified as the early majority. 51. Which of the following is NOT a potential drawback to downsizing? Reduced payroll costs 52. You might be an information systems worker if you Enjoy learning new techniques and enjoy working with people. 53. In most large organizations, the IS department is divided into the following functions Operations, development, and support 54. Important functions of the chief information officer include All of these employing an is departments equipment and staff to help the organization reach its goals monitoring the financial considerations of the IS department, such as return on investment ensuring the organization complies with laws and regulations 55. In a large IS organization, the professional who is responsible for maintaining the security and integrity of the organization's systems and data is . The information systems security analyst. 56. Which of the following is NOT a task typically associated with the systems analyst role? Collaborating with others to build a software product from scratch. 57. One method an IS professional might use to find a new job would be .ALL OF THESE seeking referrals from colleagues, friends, and family members searching and applying for open positions on Internet job sites networking through an IS professionals' organization 58. _____ is used to temporarily hold small units of program instructions and data immediately before, during, and after execution by the central processing unit (CPU). A register 59. A _____ is a climate-and-access-controlled building or a set of buildings that houses the computer hardware that delivers an organization's data and information services. Data Center 60. Completing an instruction involves two phases—instruction and execution—which are each broken down into two steps for a total of four steps. Which of the following is NOT one of the four steps? Process Data 61. A type of memory whose contents are not lost if the power is turned off or interrupted is said to be _____. Nonvolatile 62. _____ is the use of a collection of computers, often owned by many people or different organizations, to work in a coordinated manner to solve a common problem Grid computing 63. _____ is a program concerned with the efficient and environmentally responsible design, manufacture, operation, and disposal of IS-related products. Green Computing 64. Parker has an Android smartphone. Which type of processor is used in his mobile device? ARM 65. The component of a computer that provides the CPU with a working storage area for program instructions and data is called the MAIN MEMORY . 66. Carson's supervisor has asked him to review a variety of portable computers for possible purchase for their company's employees. Which of the following should Carson NOT consider buying? Nettops 67. _____ is a storage technology that is primarily used only for backups. Magnetic tape 68. 3D printing is .used to make solid products 69. A(n) _____ device provides data and instructions to the computer and receives results from it. Input/Output 70. _____ are used in standardized tests, including the SAT and GMAT tests, and to record votes in elections. Optical mark recognition (OMR) systems. 71. Helen is 72 years old and is a retired school teacher on a fixed income. She would like to buy a new computer so that she can communicate via email, follow friends and family on social media, and occasionally access recipes and gardening tips from the Web. An important thing to consider is that Helen has arthritis in her hands, making it difficult for her to work with small buttons and gadgets. So, of the following options, her best choice is probably a(n) . NETTOP 72. Pinterest, a visual bookmarking Website, logs more than 14 terabytes of new data each day, which means its storage needs are constantly changing. As a result, Pinterest has turned to Amazon for storage as a service. 73. A _____ is a computer employed by many users to perform a specific task, such as running network or Internet applications. SERVER 74. When choosing from various types of flat panel display, choose for low power consumption. ORGANIC LED 75. The process of converting human-readable data into machine-readable form is called _____. DATA ENTRY 76. _____ are used to support engineering and technical users who perform heavy mathematical computing, computer-assisted design (CAD), video editing, and other applications requiring a high-end processor. WORKSTATIONS 77. A _____ is a low-cost, centrally managed computer with no internal or external attached drives for data storage with limited capabilities. Thin Client 78. _____ are the most powerful computers with the fastest processing speed and highest performance. Supercomputers 79. CPU clock speed is the at a predetermined rate. Number of electronic pulses created 80. _____ is a hard disk drive storage device that is set up with its own network address and provides file-based storage services to other devices on the network. Network-attached storage (NAS) 81. The toughest challenge in designing a processor for a smartphone or tablet is balancing . Performance and power consumption 82. Which of the following types of credit cards is currently diminishing in popularity and being replaced by the other three types? Magnetic Stripe 83. Which of the following is NOT an example of a common use of a point-of-sale (POS) device? A teller in a bank uses a POS to withdraw money for a customer 84. A friend's computer came with Windows 8 operating system. Which of the following years was the computer most likely bought in? 2012 85. An information system that operates in the _____ sphere of influence supports two or more people who work together to achieve a common goal. WORKGROUP 86. You cannot boot a computer from a wireless network. 87. An operating system with _____ capabilities allows a user to run more than one program concurrently. Multitasking 88. The _____ is the heart of the operating system and controls its most critical processes. Kernel 89. _____ is an open-source operating system whose source code is freely available to everyone. Linux 90. Which of the following statements is NOT true about a mainframe computer? A single computer with a single user is typical of a mainframe computer. 91. New cars come with an onboard computer that controls anti-lock brakes, air bag deployment, fuel injection, etc. The software is known as ____. An embedded system 92. Suppose you wish to run two different operating systems on one computer, you can accomplish it by using Virtualization software 93. Today's mobile phones and some PCs use a touch user interface called a _____ to allow people to control the personal computer. Natural user interface 94. One of the disadvantages of proprietary software is that it can take a long time and significant resources to develop the required software features. 95. One of the advantages of off-the-shelf software is that the initial cost is lower because the software firm can spread the development costs over many customers. 96. _____ is IBM's first 64-bit enterprise operating system that is capable of handling very heavy workloads. z/OS 97. The use of middleware to connect disparate systems has evolved into an approach for developing software and systems called Service-oriented architecture. 98. One advantage of proprietary software versus off-the-shelf software is that the software provides a company a competitive advantage by solving problems in a unique manner. 99. Suppose a business wishes to move away from hosting its own applications, the recommended solution is to use cloud computing . 100. _____ is a personal application software that includes a wide range of built-in functions for statistical, financial, logical, database, graphics, and date and time calculations. Spreadsheet

.

101. _____ is an example of a popular general purpose software suite for personal computer users. Microsoft Office 102. A global positioning system (GPS) device uses a(n) _____ to help people find their way around town or more remote areas. Embedded system 103. With _____, a software engineer drags and drops graphical objects such as buttons and menus onto an application form. Visual programming 104. To develop software you need all these except .Personal application software 105. All of the following are examples of someone using personal productivity software EXCEPT. Callie entering a customer's order into a restaurant's ordering system. 106. All of the following are examples of activities performed by an operating system EXCEPT Allowing a user to do word processing. 107. Which of the following is NOT one of the common types of utility programs? Spreadsheet application 108. Kendra is taking a class in Finance and she has been asked to give a speech about a case study in which she's been working. She wants to create a set of slides containing a summary of her study notes that she will project on a screen while she's speaking. Which type of personal application software should she use to create her slides? Presentation Graphics 109. Which of the following statements is true of a database? It helps companies analyze information to open new market opportunities. 110. The smallest piece of data used by a computer is a(n) _____. BIT 111. A database is a collection of integrated and related _____. FILES 112. A collection of fields all related to a single object, activity, or individual is a(n) RECORD 113. A(n) _____ is a field or set of fields in a record that uniquely identifies the record. PRIMARY KEY 114. _____ is an approach that starts by investigating the general data and information needs of an organization at the strategic level and then examines more specific data and information needs for the functional areas and departments within the organization.Enterprise data modeling. 115. Each attribute in a relational database model can be constrained to a range of allowable values called a _____. DOMAIN 116. The action of including only some columns for output while retrieving data is known as ____. PROJECTING 117. For the ____ operation, it is required that the the two tables have a common attribute. JOIN 118. A _____ is a simple database program whose records have no relationship to one another. FLAT FILE 119. _____ is a special-purpose programming language for accessing and manipulating data stored in a relational database. Structured Query Language (SQL) 120. Suppose you wish to find what tables are in a database, what fields they have, and how they are related you would review the _____. SCHEMA 121. A is a collection of instructions and commands used to define and describe data and relationships in a specific database. Data definition language 122. The position of a _____ is a non-technical position responsible for defining and implementing consistent principles for setting data standards and data definitions that apply across all the databases in an organization. Data Administrator 123. You would use Query by Example, if _____. You wish to use a visual approach to query building. 124. With _____, the database is stored on a service provider's server and accessed by the client over a network, typically the Internet. Database as a Service 125. _____ is the term used to describe enormous and complex data collections that traditional data management software, hardware, and analysis processes are incapable of handling. BIG DATA 126. Starting from monthly sales data, if you wish to get weekly sales data, use the ___ feature. Drill Down 127. A _____ is a subset of a data warehouse that is used by small- and medium-sized businesses and departments within large companies to support decision making. Data Mart 128. Suppose a new tech startup wants to define the data model. They would then ____.Create the entity-relationship model 129. After entering data into a relational database, users can make all of the following basic data manipulations except: Organizing 130. To ensure reliability and integrity, SQL databases conform to four specific properties. Which of the following is NOT one of those four properties? Currency 131. Haley's employer has asked her to review tens of thousands of social media posts about their company's products and compile this data into a database. In terms of the characteristics of big data, Haley is dealing with Variety . 132. Kyle works for National Sporting Goods, where he manages critical data elements, such as identifying and acquiring new data sources, creating consistent reference data, and analyzing data for quality. Kyle is a data steward . 133. At Coast-to-Coast Moving and Van Lines, Ryan is responsible for managing the flow of the company's data, from initial acquisition of new data to deletion of old, outdated data. Ryan is involved in Data Lifecycle Management . 134. The ancestor of the Internet was _____. The ARPANET 135. _____ is a communication standard that enables computers to route communications traffic from one network to another as needed. The Internet Protocol (IP) 136. The fiber-optic cables that span the globe over land and under sea make up the Internet _____. BACKBONE 137. The Internet is migrating to Internet Protocol version 6 (IPv6), which uses _____ addresses to provide for many more devices. 128-BIT 138. _____ consists of server and client software, the Hypertext Transfer Protocol (HTTP), standards, and markup languages that combine to deliver information and services over the Internet. THE WEB 139. Which of the following is a markup language for defining the visual design of a Web page or group of pages? Extensible Markup Language (XML) 140. The Internet Corporation for Assigned Names and Numbers (ICANN) uses companies called _____ to handle the business of registering domain names. Accredited domain name registrars 141. Domain names must always have at least _____ parts, with each part separated by a dot (period). TWO 142. _____ refers to a computing environment where software and storage are provided as an Internet service and accessed with a Web browser. Cloud Computing 143. _____ is the standard page description language for Web pages. Hypertext Markup Language (HTML) 144. _____ is a markup language designed to transport and store data on the Web. Extensible Markup Language (XML) 145. _____ consist of standards and tools that streamline and simplify communication among Websites and that promise to revolutionize the way the Web is developed and used for business and personal purposes. Web Services 146. Java allows small programs, called _____, to be embedded with an Hypertext Markup Language (HTML) document. Applets 147. A _____ is a valuable tool that enables a user to find information on the Web by specifying words or phrases known as keywords, which are related to a topic of interest. 148. Web client software, such as Chrome, Firefox, Internet Explorer, Safari, and Opera, that are used to view Web pages are known as _____. Search Engines 149. _____ is a process for driving traffic to a Web site by using techniques that improve the site's ranking in search results. Search Engine optimization 150. _____ is a very short-range wireless connectivity technology designed for consumer electronics, cell phones, and credit cards. Near field communication (NFC) 151. In a _____, all network devices are connected to a common backbone that serves as a shared communications medium. Bus Network 152. The area covered by one or more interconnected wireless access points is commonly called a(n) _____. HOT SPOT 153. A _____ satellite system employs many satellites that are spaced so that, from any point on the Earth at any time, at least one satellite is on a line of sight, each in an orbit at an altitude of less than 1,000 miles. Low Earth orbit (LEO) 154. A _____ network is one in which all network devices are connected to one another through a single central device called the hub node. STAR 155. A _____ is a telecommunications network that connects users and their computers in a geographical area that spans a campus or a city. Metropolitan area network (MAN) 156. Which of the following statements is true of network-management software? With network-management software, a manager on a networked personal computer can scan for viruses. 157. When you connect your computer to a printer using _____, the distance between them cannot be longer than 30 feet. Bluetooth 158. When you are looking for a 'hotspot', you are searching for _____. A wireless access point 159. Which of the following systems can help identify your geolocation? GPS 160. If your home air conditioner has an IP address, it is part of the ____. Internet of Things 161. Suppose a business wishes to have access to servers, and storage devices, but does not want to buy them. What is their best choice? Cloud computing - infrastructure as a service 162. You wish to learn a programming language that can be used on any computer. What language would it be? Java 163. Liesel is an entrepreneur, and she'd like to publish a website for her small business. Liesel can use hosting services . 164. Social journalism or citizen journalism may not be as reliable as mainstream media sources. 165. _____ is a good site to develop your professional network. LINKEDIN 166. The world-wide-web uses _____ protocol for transmitting content. .hyper-text transfer 167. Which of the following forms of e-commerce is more likely to offer a more customized product offering? Business-to-Consumer (B2C) e-commerce 168. The elimination of organizations that operate between the producer and the consumer is called _____. Disintermediation 169. _____ is a subset of e-commerce that involves electronic transactions between consumers using a third party to facilitate the process. Consumer-to-consumer (C2C) e-commerce 170. Based on a Supreme Court ruling, an Internet-based merchant needs to charge sales tax only when _____. Buyers live in a state where the merchant has a physical presence. 171. A reason for the growth in business-to-consumer (B2C) e-commerce is that online B2C shoppers have the ability to design a _____ product. Personalized 172. _____ divides the pool of potential customers into subgroups usually defined in terms of demographic characteristics. Market Segmentation 173. Which of the following forms of e-commerce has created an opportunity for many people to make a living out of selling items on auction Websites? Consumer-to-Consumer (C2C) e-commerce 174. Which of the following statements is true of retargeting? It employs personalized ads to direct shoppers back to a retailer's Website they previously abandoned. 175. The number of mobile Websites worldwide is expected to grow rapidly because of .the development of new and useful applications 176. Which of the following is NOT one of the three basic components of a successful e-commerce model? Capital 177. A(n) _____ is an HTML code, not visible on a displayed Web page, that contains keywords representing the Website's content, which search engines use to build indexes pointing to the Website. Meta tag 178. _____ is an approach used to capture user-provided information, such as information from warranties, surveys, user registrations, and contest-entry forms completed online. Explicit personalization technique 179. The is a security technique associated with the use of credit cards at the time of purchase that checks additional digits printed on the back of the credit cards. Card Verification Number 180. _____ is a standard that spells out measures and security procedures to safeguard a card issuer, a cardholder, and a merchant. Payment Card Industry (PCI) 181. A _____ is a credit card issued to selected employees to streamline the traditional purchase order and invoice payment processes. Procurement Card 182. Which of the following is NOT one of the key website performance measures commonly used by online retailers? Total Sales 183. Authentication technologies are used by many organizations to _____. Confirm the identity of a user requesting access to information or assets 184. Conversion to an e-commerce or m-commerce system enables organizations to Improve the level of customer service 185. If you shop on Amazon.com, _____. Depending on which state you are in, you may or may not pay tax. 186. Through e-government, _____. Any government unit, business or individual can interact with the government. 187. Consumers prefer mobile commerce sites that are convenient and efficient to use. 188. When compared to traditional commerce e-commerce transactions can save money. 189. Unlike B2C sites, some B2B sites allow price negotiations. 190. If consumer data is stolen from a business's computers, the customers can file a class-action law suit against the business. 191. Suppose a retailer who has no technology expertise wishes to set up an online presence for his business. He can use a hosting service to set up the site. 192. To improve traffic to your e-commerce site, acquire links to your site on other sites. 193. The information necessary for personalizing web pages for individual customers is primarily gathered by analyzing users' past transactions on the website. 194. Because of ____ commerce sites, anyone can become a merchant online. C2C 195. E-commerce sites are able to keep the amount of data entry errors to a minimum . By having the buyers enter products information themselves. 196. Tom's Art Supplies used to sell art supplies through mail order catalogs, but the company's order takers often had difficulty deciphering their customers' handwriting on the order forms. Since switching to an online e-commerce site, Tom's has been able to enjoy the advantage of Increasing Accuracy. 197. A(n) _____ is central to individuals and organizations of all sizes and ensures that information can be shared across all business functions and all levels of management to support the running and managing of a business. Enterprise System 198. The information about invoices to customers is tracked by ____ system. Transaction processing system 199. With _____, business transactions are accumulated over a period of time for processing in a single unit. Batch Processing systems 200. In batch processing systems, data processing is done some time later than data capture.

.

Possibility 2: Briefly distinguish among data, information, and knowledge. What is the role of information systems in this?

Data, information, and knowledge are all connected but different in various ways. They are best when used all together. They are connected because data can be turned into information and then knowledge is used to apply the information to different events/thoughts. Data is raw facts about people, places, events, and other things that are important to an organization. A company is made up of a lot of data/raw facts that when all the facts are put together make up the organization. Information is data that has been processed or organized into a more meaningful form to the company and people. Knowledge is data and information that have been analyzed and made into a thought that helps people determine certain factors of a company. An information system is a set of interrelated components that support decision-making and control in an organization. The reason that data (raw facts), information, and knowledge are so important to information systems is because the decisions/outcomes come from those three factors. Data, information, and knowledge all build upon each other to help create an information system.

Possibility 3: Explain the difference between sustaining and disruptive innovation. Give an example of a disruptive innovation and describe how it meets the criteria.

Sustaining innovation can result in the enhancement/improvement to an existing product or service. These innovations are important because that is how an organization can grow a product. For example, a company sells televisions and has a regular TV and using sustaining innovation they create the smart TV, which is exactly the same just with more features. Disruptive innovation is a new way of doing things that may not have been what the customer's wanted/needed originally. This type of innovation helps technologies grow even further in new directions. An example would be the tablet. A company took a laptop and decided that their customers needed something that could do what the laptop could but in a more compact way. Or the company took a smart phone and wanted to turn it into a more advanced/multipurpose device (i.e. writing papers, checking email, searching the web). One could say it meets the criteria because instead of improving a single product it basically creates a whole new product that customers can enjoy.


Conjuntos de estudio relacionados

OSHA Quiz ( 8 ) Machine Guarding

View Set

Political Beliefs and Behaviors Test

View Set

Chapter 8: Sampling Distributions

View Set

MGMT 473 Exam 1 Assignment Questions

View Set

Judicial Process and Politics Final

View Set

ITIL 4 Service Value Chain Activities

View Set