OMIS 351 Final Exam

¡Supera tus tareas y exámenes ahora con Quizwiz!

"Html" is used to: load content from default page. create and format Web pages. generate custom content for users. exchange mail with other e-mail servers. transfer files from flash drives.

create and format Web pages.

How many BYTES can a 1 GHz 32 bit chip process per second? (1 Million) * 32 * 8 (1 Billion) * 32 (1 Billion) * 32 / 8 (1 Billion) * 32 * 8

(1 Billion) * 32 / 8

if there are about 2 billion internet users, about how many internet users conisder the internet safe for E-business 1,200,000,000 120,000,000 12,000,000 800,000,000 80,000,000

800,000,000

How might you tell if a website you are visiting is using encrypted transmission? The website's address will begin with "https" instead of the usual "http" Your browser will display a certificate when it receives an encrypted transmission The padlock icon in the corner of your browser will be closed ("locked") A and C only All of A, B and C.

A and C only

3 reasons for the explosion of the internet and world wide web

-a common set of rules- TCP/IP - Routers that makes it work and are very complex. Traffic cops of the internet -everywhere and the ease of use of the browser

3rd chapter 3 final exam question missing...

...

Which of the following is true of SAP (best answer)? SAP, being a Desktop Application, stores all system data on the user's local machine. SAP is optimized for the healthcare industry but can also be used in the manufacturing industry. SAP saves data as soon as it is entered into the user interface, eliminating input problems. A database sits at the center of a company's SAP system. B & D are both true

A database sits at the center of a company's SAP system.

Which of the following statements is true about Airbnb's revenue model? Airbnb currently does not make money via transactions, only from advertising listings on its website. Airbnb only charges property owners who rent on the website. Airbnb only charges guests who rent on the website. Airbnb charges both property owners and guests as part of transactions on their website. Airbnb doesn't charge transactions for the three years after it enters a market, so as to generate two-sided network effects of property rents and guests searching for properties to stay in.

Airbnb charges both property owners and guests as part of transactions on their website.

Which of the following are considered sources of information that can potentially be used by social engineers? LinkedIn Corporate directories Social media posts Contests or surveys All of the above

All of the above

What does a fourth generation (4GL... highest level) software language do? Make the computer's internal operations more streamlined and efficient. Solves all business problems. Allows the user to specify the desired outcome, and the computer handles the rest (writes/produces the program). Nothing... they have yet to be developed.

Allows the user to specify the desired outcome, and the computer handles the rest (writes/produces the program).

One contributor to the easy way with which young entrepreneurs can have success is low-cost distribution to massive markets worldwide. This is enabled by: legacy systems big data and business analytics Esoko and M-Pesa App stores Sproxil

App stores

If Dr. Downing went onto RateMyProfessor.com and rated himself as "Hot", he would be guilty of: SnapChating. first-degree felony punishable by over 30 years in prison. Astroturfing Falacious blogging. Orkuting

Astroturfing

If a business person gets a great idea for a possible information technology solution to a business process problem, the first thing he/she should do is: Begin programming (or having programmed) the system Secure financing for the system. Purchase the necessary hardware and/or software to support the system Begin progressing through the stages of the SDLC, starting with "Planning"

Begin progressing through the stages of the SDLC, starting with "Planning"

As discussed in lecture, telecom "talks" in ____________ and hardware storage "talks" in __________. Bits, bytes bytes, bits megahertz, gigahertz gigahertz, megahertz none of the above

Bits, bytes

Which of the following is NOT one of the three factors responsible for the explosion of the Internet? Ubiquity of the browser Routers Circuit switching TCP/IP

Circuit switching

_____ refers to applications installed on a personal computer, typically to support tasks performed by a single user. Enterprise software Server program Desktop software Software as a service Database management program

Desktop software

_____ technology is a broadband technology that can use the wires of a local telephone network. Fiber to the Home (FTTH) Digital Subscriber Line (DSL) Coaxial cable Telecom-broadband hybrid Broadband over power line (BPL)

Digital Subscriber Line (DSL)

_____ is a set of standards for exchanging messages containing formatted data between computer applications. EDI DBMS CPM SCM ERP

EDI

_____ is the biggest photo-sharing site on the Web, taking in around three billion photos each month. Facebook Picasa Shutterfly Flickr Photobucket

Facebook

Which of the following statements is true about Facebook? Global growth of Facebook is saturated, with most of the planet's population already having Facebook accounts. Approximately 20 percent of Facebook users reside in China. Entrepreneurs beware: Mark Zuckerberg lost most of the value in the firm he founded to the Winklevoss twins, providing evidence that entrepreneurs should have a founder with a strong legal background. Facebook has largely avoided privacy concerns by allowing posts to expire over time. Facebook is highly profitable, with a growing ad business on mobile platforms.

Facebook is highly profitable, with a growing ad business on mobile platforms.

When Dr. Downing holds up his left hand and his right hand, and then joins them together, what point is he trying to make? Amazon and Apple are good companies. If you understand your business, and also understand possible technology solutions, you can make a "match". If people will work together, we will have a more productive technology environment in the future The ROI of process improvements in the business processes area is likely to overcome the ROI of simply using "old school" methods of doing business.

If you understand your business, and also understand possible technology solutions, you can make a "match".

Which of the following is NOT a benefit of using Excel and web pages, as done in VC1? If you want to drop the lowest value (like a Quiz) in a range, and get the average of the remaining values, use =AVERAGE(<range>,-1) If you have one formula that needs to be used for numerous cells, a great way to accomplish that is to use auto-fill (drag the black cross in the lower-right of the cell to the new cells). If you want to show your formulas to your clients/customers/etc., choose "Show formulas", screen shot the sheet, and insert that screen shot into a web page. VLOOKUP is a useful formula to look up and return values from a pre-defined table. All of these are benefits.

If you want to drop the lowest value (like a Quiz) in a range, and get the average of the remaining values, use =AVERAGE(<range>,-1)

Which of the following is not a benefit of using Excel and web pages, as done in VC1 If you want to drop the lowest value (like a quiz) in a range, and get the average of the remaining values, use =AVERAGE(<range>, -1) If you have one formula that needs to be used for numerous cells, a great way to accomplish that is to use auto-fill (drag the black cross in the lower-right of the cell to the new cells). If you want to show your formulas to show clients/customers/etc. choose "show formulas", screen shot the sheet, and insert that screenshot into a webpage =VLOOKUP is a useful formula to look up and return values from a pre-defined table all of these are benefits

If you want to drop the lowest value (like a quiz) in a range, and get the average of the remaining values, use =AVERAGE(<range>, -1)

Which of the following is FALSE when thinking about matching business process problems and technology solutions, as described in Unit 1? If your technology solution involves programming or building a system, you need to enroll in a training course to obtain that skill. If you have an idea for a match, you should explore that idea by using established, recognized frameworks (such as the SDLC). You do not have to be an expert in the technology solution, but you must understand how the technology solution works and why it will help with your business problem. The more you understand about the business and the technology, the better chance you will make a good match. All of these are true

If your technology solution involves programming or building a system, you need to enroll in a training course to obtain that skill

Which of the following is NOT an advantage that Virtual Private Networks (VPNs) have over dedicated-line Wide Area Networks (WANs) (so four of these answers are advantages of VPNs, one is not)? There is no need to lay cable or lease dedicated lines between the remote sites needing to connect The cost of implementation is lower Individuals outside of the company without access to the internet can access company information An employee can connect to the data at home Remote offices can connect to the same intranet as the main office

Individuals outside of the company without access to the internet can access company information

The most dominant standard for 4G technology worldwide is Wi-Fi WiMax GPRS Circuit switching LTE

LTE

If Jewel uses its Point of Sale terminals, along with a Preferred Card, at the cash register to store information about individual's purchasing habits and then make strategic decisions with this information, this is an example of: SCM Ineffective business practices. Poor business practices. Computer Age business practices. Information Age business practices.

Information Age business practices.

Which of the following is THE major theme of OMIS 351 this semester? Information Technology should be used to serve the goals of the business Primary value activities. Solver, Pivot Tables, and Databases are great decision making tools. Web sites are useful for communication. CRM will soon be used by all businesses.

Information Technology should be used to serve the goals of the business

Which of the following functions is likely to be performed by enterprise software? Word processing Spreadsheet accounting Making PowerPoint presentations Inventory tracking Internet browsing

Inventory tracking

What is the implementation phase in the SDLC? Involves establishing a high-level plan of the intended project and determining project goals Involves analyzing end-user business requirements and refining project goals into defined functions and operations of the intended system Involves describing the desired features and operations of the system Involves placing the system into production so users can begin to perform actual business operations

Involves placing the system into production so users can begin to perform actual business operations

How are News Feeds a source of value for users on Facebook? It fosters the virality of information sharing vital to delivering value from the social graph. They are innovative and Facebook is the only social network to offer the feature. They are effective in protecting a user's personal information from others. They ensure that a single post will reach all friends and fans. They offer cross connectivity for users across several social networking sites.

It fosters the virality of information sharing vital to delivering value from the social graph.

What is crowdsourcing? It is the act of taking a job traditionally performed by a designated agent and outsourcing it to an undefined generally large group of people in the form of an open call. It is the act of moving a job from a group of ineffective employees to an efficient employee. It is the process of selling products to people in the guise of conducting marketing research. It is the act where a group of people moves from one country to another while looking out for better work opportunities. It is the movement of employees from one department to another with the aim of improving their skill sets.

It is the act of taking a job traditionally performed by a designated agent and outsourcing it to an undefined generally large group of people in the form of an open call.

Which of the following statements holds true of network effects? It refers to a collection of resources available for access over the Internet. It refers to adapting products and services for different languages and regional differences. It refers to a situation when the value of a product or service increases as the number of its users expands. It refers to a situation when others take advantage of a user or a service without providing any kind of reciprocal benefit. It refers to a closed network or a single set of services controlled by one dominant firm.

It refers to a situation when the value of a product or service increases as the number of its users expands.

Which of the following statements holds true for the term encryption? It refers to a con executed using technology, typically targeted at acquiring sensitive information or tricking someone into installing malicious software. It refers to e-mail transmissions and packets that have been altered to seem as if they came from another source. It refers to scrambling data using a code or formula, known as a cipher, such that it is hidden from those who do not have the unlocking key. It refers to a seemingly tempting, but bogus target meant to draw hacking attempts. It refers to highly restrictive programs that permit communication only with approved entities and/or in an approved manner.

It refers to scrambling data using a code or formula, known as a cipher, such that it is hidden from those who do not have the unlocking key.

Tech impact is reaching even beyond the confines of Earth itself. According to an example in your chapter, how was a tool on the International Space Station recently acquired?: It was purchased via China's Alibaba - showing global sourcing extends to the extraterrestrial. It was delivered to the launch site when summoned from Space using the FedEx app. It was an out-of-print product that an Etsy producer was able to craft and deliver for the next resupply flight. It was printed on-demand using 3D printing technology.

It was printed on-demand using 3D printing technology.

Which of the following statements is consistent with realities regarding information security? Cyber-crime is not yet considered a serious enough threat to warrant the attention of law-enforcement agencies. Law-enforcement agencies are well-resourced to fight cyber-crimes effectively. Governments usually outmatch private industry in terms of retaining top talent with incentives and generous pay. Law-enforcement agencies struggle to hire, train, and retain staff capable of keeping pace with today's cyber-criminals. Cyber-crime is not rewarding in terms of financial gain.

Law-enforcement agencies struggle to hire, train, and retain staff capable of keeping pace with today's cyber-criminals.

Which of the following is an example of application software? MS Word Mac OS Linux MS Windows Apache

MS Word

Which of the following factors has helped Facebook build up trust among its users? Superior technology compared to rivals Mutual and reciprocal approval of friend requests Free nature of applications available to users Low switching costs Availability of venture capital funds

Mutual and reciprocal approval of friend requests

If Verizon promised me an all-digital network, I would know that... My communications would be done in analog waves and I would have higher download rates My communications would be done in 1s and 0s and I would be at least at 4G My communications would be done in 1s and 0s and I would be at least at 2G None of these

My communications would be done in 1s and 0s and I would be at least at 2G

For years, which of the following is the only major media category that has seen an increase in spending? Online advertising Radio jingles Television ads Print media Telemarketing

Online advertising

_____ refers to software that is free and where anyone to look at and potentially modify the code. Social software Proprietary software Licensed software Open source software Software as a service

Open source software

In the VC1 assignment, in what format were the Excel Grades page and Excel Formulas page recommended to be posted to your web page? Video Excel Workbook (.xls) Picture Word Document VC1 was confusing

Picture

Crowdsourcing tools and question-and-answer sites like _____ allow firms to reach out for expertise beyond their organizations. Quora MyYearbook.com MySpace Twitter Zappos

Quora

What protocol is used for exchange of mail between e-mail servers across the world? HTTP SMTP FTP SNMP TCP

SMTP

Which of the following is one of the characteristics of using software as a service model? Longer deployment times Scale-able systems Fixed operating expenses Heightened financial risk Higher maintenance costs

Scale-able systems

Business Process Automation (BPA) and Business Process Reengineering (BPR) are: Different levels of Six Sigma expertise Ways to improve Web 2.0 standards compliance Significantly different means of bringing change to business processes Synonyms - they refer to the same concept. Competing organizations in ERP systems.

Significantly different means of bringing change to business processes

Which of the following types of infiltration techniques does one open up to by posting sensitive personal information and details about one's workplace on social networking sites? Phishing Social engineering Password theft Virus infections Physical threats

Social engineering

_____ refers to a precise set of instructions that tell the computer hardware what to do. A mnemonic An input device An output device Software Desktop

Software

Why would a digital cellular network be better than an analog cellular network? The fact that it is circuit-switched would allow for dedicated connections, increasing the overall quality. The fact that it could use firewalls would make it more secure. The fact that it is a WAN creates greater reach as well as more privacy for the partners using the network. The fact that it supports DSL allows for higher bandwidth and more productivity. The 1's and 0's allow for multiple calls on one frequency (multiplexing) making it cheaper, as well as better quality checks making it clearer.

The 1's and 0's allow for multiple calls on one frequency (multiplexing) making it cheaper, as well as better quality checks making it clearer.

Which of the following statements holds true for Wikis? Their key use is to anonymously share new ideas in an unattributed manner. Their key use is creating an effective form for online advertising, customer tracking, and service personalization. Their key use is to discover and reinforce affiliations, identify experts, message individuals or groups, and virally share media. Their key use is to poll a diverse crowd and aggregate opinions to form a forecast of an eventual outcome. Their key use is to collaborate on common tasks or to create a common knowledge base.

Their key use is to collaborate on common tasks or to create a common knowledge base.

What are the implications for firms that do not have common database systems with consistent formats across their enterprise? They can save infrastructural and operational costs. They can expect to leverage economies of scale by serving more customers. They can hedge against the risk of data redundancy. They struggle to manage their value chain efficiently. They profit from the aggregation of diverse data sets and enhance their repositories.

They struggle to manage their value chain efficiently.

What was the main point of VC3, whether you chose Option 1 or Option 2? To get you, the business leaders of tomorrow, looking at and thinking about SAP, the world's leading business software, so you are better prepared for your careers. Putting two or more lower power processor cores on a single chip. To have you understand the complexity and power of Moore's Law. To have you understand why application software is always more important than operating system software, even on a dual core processor. Connecting a combination of parallel and series-connected processors to a single larger processor to supplement its functioning.

To get you, the business leaders of tomorrow, looking at and thinking about SAP, the world's leading business software, so you are better prepared for your careers.

Which of the following is FALSE with regard to peer collaboration, production, and the Sharing Economy? Since Wordpress powers roughly 1 in 5 Internet sites, users can enjoy the advantage of the "long tail" and find content on nearly anything they want. About half of the Top 10 Internet sites are social. Twitter is one of the largest photo-sharing apps in the world. Even though Wikipedia's budget is less than $2 Million, it is one of the Top 10 visited Internet sites. Airbnb has more rooms for rent that the entire Hilton hotel chain.

Twitter is one of the largest photo-sharing apps in the world.

Once you created the formula in Excel to calculate an OMIS 351 grade (say, in cell G2), what is the fastest/easiest and correct way to apply that same formula to all of the students on the sheet? Use mouse to get black cross in lower right of G2, lets you auto-fill by dragging Use mouse to get black arrow in middle of G2, lets you select a range of cells Use mouse to get cross hair in G2 lets you move a cell or cells Use mouse to select G2, lets you auto-fill by dragging

Use mouse to get black cross in lower right of G2, lets you auto-fill by dragging

Which of the following is NOT a good example of a way technology could improve a business process? "Disintermediate" or remove a middle person in the process by electronically connecting buyers and sellers. Allow for the process to be redesigned to become more efficient and effective. Allow for the process to be completed more quickly (with other attributes remaining constant). Use the most up-to-date smart phone technology. Allow for the process to be completed more accurately (with other attributes remaining constant).

Use the most up-to-date smart phone technology.

Which of the following is the best example of matching a technology solution to a business problem? Using teams of size 6 to get the benefit of multiple players without becoming too large. Making long-term projections based on historical sales data. Scoring the highest in the class on VC1 Using GPS to track Huskie bus locations and giving that information to students None of these are good examples of matching a technology solution to a business problem.

Using GPS to track Huskie bus locations and giving that information to students

The _____ strategic lens will almost always involve improving technology options and connections with suppliers and customers 5 forces value chain analysis resource based view of competitive advantage (RBVoCA) Patents Brand

Value chain analysis

After completing the Sales Order (Step #2 in the SAP Document Flow Instructions Word document), what is a good way to verify you've done it (you should be able to answer this whether you chose Option 1 or Option 2 for VC3)? View the Document Flow by going to "Logistics-> Sales and Distribution -> Sales -> Order - > Display" Making sure it controls/runs the machine/computer. Send an email to the professor and ask him to check it. Making sure it controls/runs the machine/computer AND controls the flow. View the Document Flow in the Citrix (anywhereapps.niu.edu) main menu.

View the Document Flow by going to "Logistics-> Sales and Distribution -> Sales -> Order - > Display"

_____ allow(s) a server to run what amounts to a copy of a PC—OS, applications, and all—and simply deliver an image of what's executing to the remote device. Virtual desktops Cloudbursting Hardware clouds Vertical niches Black swans

Virtual desktops

The hypertext transfer protocol (http) defines the communication between: Web browsers and Web servers. operating systems and Web browsers. hardware and operating systems. mail servers and hardware. hardware and Web browsers.

Web browsers and Web servers.

A firm that provides hardware and services to run Web sites of others is known as a(n) _____. Web site incubator Internet service facilitator Web domain name registrar Web hosting service Internet Web fab

Web hosting service

_____ are software systems designed to support interoperable machine-to-machine interaction over a network. Scripting languages Client-servers Web services Caches Business intelligence systems

Web services

The term wiki refers to a(n): record of online journal entries, usually made in a reverse chronological order. link in a blog post that refers readers back to cited sources. online community that allows users to establish personal profiles and communicate with others. Web site that can be modified by permitted users, from directly within a Web browser. type of short-message blogging, often made via mobile device and designed to provide rapid notification to their readership.

Web site that can be modified by permitted users, from directly within a Web browser.

According to Dr. Downing in class, what is the information age? When the internet defined what information we see When computers were invented and began storing information. When information became cheap to store on disk space When companies/people finally realized that information is an asset

When companies/people finally realized that information is an asset

The term "content adjacency" refers to: placing advertisements to reach consumers based on various traits such as demographics and purchase history. a technique used by online publishers to increase the effectiveness of their campaigns. advertisements that are targeted based on a user's query. a concern that an advertisement will run near offensive material, embarrassing an advertiser and/or degrading their products or brands. problems associated with advertisements that run before a user arrives at the home page of a website.

a concern that an advertisement will run near offensive material, embarrassing an advertiser and/or degrading their products or brands.

User-generated content online means firms may: get early user feedback of their products and services need to manage their online image have positive or negative effects from viral content have proprietary information released by employees all of the above

all of the above

Marketers can leverage social media channels for: competitive intelligence. generating customer input. disseminating information. reinforcing a customer's relationship with the firm. all of the above.

all of the above.

If there are 80 million power drills in the US, used for an average of 13 minutes each per year, a good Sharing economy/ Collaborative consumption business idea would be internet exchange colocation centers an app or site that allowed users to post used drills for a sale, and other users to purchase the used drill an app or site that worked like Uber, where those with drills would be dispatched to personal homes or businesses to perform work requiring a power drill an app or site that allowed multiple users in close proximity to "check out" and return a single drill

an app or site that allowed multiple users in close proximity to "check out" and return a single drill

If a business person gets a great idea for a possible information technology solution to a business process problem the first thing he/she should do is begin programming or having programmed the system secure financing for the system purchase the necessary hardware and/or software to support the system begin processing through the stages of the SDLC, starting with planning

begin processing through the stages of the SDLC, starting with planning

Technologies that measure and analyze human body characteristics for identification or authentication are known as _____. overlamination processes biometrics smart tags bio-embedded systems holographs

biometrics

Systems that use data created by other systems to provide reporting and analysis for organizational decision making are called _____________systems. application server supply chain management enterprise resource management business intelligence customer relationship management

business intelligence

When Dr. Downing demonstrated how incredibly expensive it would be for you to buy an "A" in OMIS 351, his point was that... special software is installed on several computers and enables them to work together on a common problem. computers are designed with many microprocessors that work together, simultaneously, to solve problems. computing speed and storage capacity has progressed at a similarly incredible speed, following Moore's Law. microprocessors with two or more (typically lower power) calculating processor cores are fabricated on the same piece of silicon to solve multiple problems. COB student ethics are easy to be compromised.

computing speed and storage capacity has progressed at a similarly incredible speed, following Moore's Law.

Systems distributed throughout the Internet that help improve the delivery speeds of Web pages and other media, typically by spreading access across multiple sites located closer to users are known as: Internet exchange points. private clouds. colocation centers. content delivery networks.

content delivery networks.

One skill potential business managers should practice, in order to better understand business process improvement, is.... drawing, diagramming or visualizing business processes Java or C++ The 5th and 7th steps of the SDLC Programming a system to meet human needs None of the above.

drawing, diagramming or visualizing business processes

1 _____ = 1 billion bytes terabyte gigabyte megabyte petabyte zettabyte

gigabyte

One of Facebook's key resources for competitive advantage is: technology network internalities. open source software. high switching costs. low venture capital investment.

high switching costs.

One of Facebook's key resources for competitive advantage is: technology network internalities. open source software. high switching costs. low venture capital investment.

high switching costs.

`Which of the following is FALSE when thinking about matching business process problems and technology solutions, as described in unit 1 if your technology solution involves programming or building a system, you need to enroll in a training course to obtain that skill if you have an idea for a match, you should explore that idea by using established, recognized frameworks (such as the SDLC) You do not have to be an expert in the technology solution, but you must understand how the technology solution works and why it will help with your business problem the more you understand about the business and the technology, the better chance you will make a good match. All of these are true

if your technology solution involves programming or building a system, you need to enroll in a training course to obtain that skill

It is ____________, yet ______________ for an organization to implement internet security cheap, ineffective strategic, ineffective inefficient, effective inefficient, ineffective

inefficient, effective

Popular sites like Google and Yahoo! have several computers assigned to their host names because: they have operations in different countries. they are registered under several generic top-level domain names. of the different devices used to access these web sites. hoarding all information in one server is expensive. it ensures that the load of requests to their sites do not overwhelm a single computer.

it ensures that the load of requests to their sites do not overwhelm a single computer.

The domain name service (DNS) is a distributed database that allows users to communicate with other computers by: assigning DNS addresses to different server names. mapping host names to domain names. creating IP addresses that are unique to servers. assigning server names to different host addresses. mapping host and domain names to IP addresses of computers.

mapping host and domain names to IP addresses of computers.

Less popular open source products are not likely to attract the community of users and contributors necessary to help improve these products over time. This situation reiterates the belief that _____ are a key to success. proprietary products brand strategies network effects technology expenses advertising campaigns

network effects

You learn that a party at Frat House A will have 150 people and a part at Frat House B will have 5 people. You dont know any of the people and each party costs $5 to get in. You choose Frat House A because of brand supplier power network effects price value chain analysis

network effects

Android is a software product developed by Google that allows cell phone manufacturers to control hardware and establishes standards for developing and executing applications on its platform. Android is thus an example of a(n) _____. operating system programming language user interface distributed system database management system

operating system

A company uses radio frequency identification (RFID) tags to keep track of its inventory. This is an example of the impact of technology in the area of _____. accounting operations advertising human resources finance

operations

Chuck and Kyle's coffee shop is now offering a "buy 5 cups of coffee and get 1 free" promotion. This loyalty program has the purpose of increasing supplier decreasing the quality of the coffee reducing the buying power eliminating the surplus of coffee final sales before going out of business

reducing the buying power

Cloud computing refers to: replacing computing resources with services provided over the Internet. a technology that can make a single computer behave like many separate computers. designing computers with many microprocessors that work together, simultaneously, to solve problems. designing microprocessors with two or more calculating processor cores on the same piece of silicon. manufacturing semiconductors as a stack of multiple, interconnected layers instead of in one flat plane.

replacing computing resources with services provided over the Internet.

Mark Zuckerberg, the founder of Facebook, ensured that he remained in control of the firm even after it went public by: running the organization single-handedly. valuing the firm at $15 billion, which exceeded investor expectations. employing antitrust laws and limiting the investors' degree of control. appointing 3 additional directors instead of 5. retaining a majority of voting rights in the public company.

retaining a majority of voting rights in the public company.

All of the following are true of the intent of an ERP system, like SAP, EXCEPT implemented in modules to automate the entire supply chain should be ideally configured to use different database systems, instead of one central database system, to avoid the possibility of data redundancy integrates the many functions of a business such as accounting, finance, inventory management, and human resources data input is captured or keyed once, rather than multiple times

should be ideally configured to use different database systems, instead of one central database system, to avoid the possibility of data redundancy

Technology experts in the area of _____ specialize in technology for competitive advantage. user-interface design process design strategy database design hardware

strategy

The guy who "invented" sliced bread helps show us... that being in the food industry would be best that we can match technology to business problems there's no need to understand individual components of a problem solution that technology is not useful

that we can match technology to business problems

Zara's use of RFID tags can be considered an example of Kryder's law the IoT volatile memory Carver Meade's Corollary

the IoT

The ability to track customers, analyze campaign results, and modify tactics are the distinct advantages offered by _____ to the field of marketing. the Web print media television radio outdoor advertising

the Web

Some of the radical changes brought about by new technologies include: the stagnation of advertising the proliferation of telecommunications into the hands of a few an increase in computing costs owing to the growth of licensed software a decrease in the standards of corporate ethics the creation of an unprecedented set of security and espionage threats

the creation of an unprecedented set of security and espionage threats

The address one types into a Web browser is also known as a: universal direction link or UDL uniform resource locator or URL unique resource finder or URF universal direction locator or UDL uniform resource connection or URC

uniform resource locator or URL

Investor groups that provide funding in exchange for an ownership stake in the firm are called _____. credit unions venture capital firms hedge fund managers mutual fund executives greenfield investors

venture capital firms

A server running _____ can create smaller compartments in memory that each behave as a separate computer with its own operating system and resources. private clouds virtualization software genetic algorithms neural network open source software

virtualization software

Cloud computing is not suited for situations involving offloading of expensive computing tasks where complex legacy systems have to be ported with no existing regulatory compliance issues where pricing economics favor renting over buying characterized by limited time tasks

where complex legacy systems have to be ported

Cloud computing is not suited for situations: involving offloading of expensive computing tasks. where complex legacy systems have to be ported. with no existing regulatory compliance issues. where pricing economics favor renting over buying. characterized by limited-time tasks.

where complex legacy systems have to be ported.

Technology experts in the area of user-interface design: work to make sure systems are intuitive and easy to use leverage technology to make legacy systems more efficient specialize in technology for competitive advantage focus on effective back-up systems for critical business data provide direction on technology-related security issues

work to make sure systems are intuitive and easy to use


Conjuntos de estudio relacionados

Org Behavior Ch 13: Organizational Structure and Culture

View Set

Chapter 11. Pricing Products and Services

View Set

AOM: TG Ch. 5: Head, Neck, and Face Muscles and Bones Review

View Set

Mathematics 800 Fundamentals - Unit 5: More With Functions DISTRIBUTIVE PROPERTY

View Set

Psychology Midterm Study Guide Chapter 4

View Set