OMIS 351 Final Exam Study Guide NIU

¡Supera tus tareas y exámenes ahora con Quizwiz!

What is crowdsourcing? A. It is the act of taking a job traditionally performed by a designated agent and outsourcing it to an undefined generally large group of people in the form of an open call. B. It is the act of moving a job from a group of ineffective employees to an efficient employee. C. It is the process of selling products to people in the guise of conducting marketing research. D. It is the act where a group of people moves from one country to another while looking out for better work opportunities. E. It is the movement of employees from one department to another with the aim of improving their skill sets.

A. It is the act of taking a job traditionally performed by a designated agent and outsourcing it to an undefined generally large group of people in the form of an open call.

Uber and PayPal used similar strategies when trying to jumpstart network effects that were vital in creating their dominance. What did each do? A. Leveraged viral customer promotions by giving incentives to consumers who helped recruit friends to the service. B. Operated in "Blue Ocean" that, to this day, remains free of competitors C. Preannoucned their products, discouraging rivals from entering with competing offerings D. Created services that were backward-compatible with rivals, reducing switching costs for anyone interested in leaving incumbents for their services.

A. Leveraged viral customer promotions by giving incentives to consumers who helped recruit friends to the service.

_____ are designed to provide rapid notification to their readership rather than detailed or indepth comments. A. Microblogs B. Wikis C. Folksonomies D. Blogs E. Torrents

A. Microblogs

_____ are critical for capturing sales data and are usually linked to inventory systems to subtract out any sold items. A. Point-of-sale systems B. Legacy systems C. CRM systems D. Server farms E. Data aggregators

A. Point-of-sale systems

Which of the following is NOT one of the Seven Lenses to Evaluate Strategic Business Options? A. SDLC B. Brand C. Value Chain D. Network Effects E. Porter's Five Forces

A. SDLC

How might you tell if a website you are visiting is using encrypted transmission? A. The website's address will begin with "https" instead of the usual "http" B. Your browser will display an audible message when it receives an encrypted transmission C. The site will not be accessible D. A and B only E. All of A, B and C

A. The website's address will begin with "https" instead of the usual "http"

The hypertext transfer protocol (http) defines the communication between: A. Web browsers and Web servers. B. operating systems and Web browsers. C. hardware and operating systems. D. mail servers and hardware. E. hardware and Web browsers.

A. Web browsers and Web servers.

A firm can spend no money and time, yet expect to enhance its offerings, by: A. allowing other firms to contribute to its platform. B. going public through an initial public stock offering. C. outsourcing critical processes to third parties. D. adopting an envelopment strategy. E. preannouncing a forthcoming product to lower sales of current offerings.

A. allowing other firms to contribute to its platform.

Dynamic pricing: A. refers to pricing that shifts over time based on conditions associated with product supply and demand. B. refers to pricing that is always a notch higher than competition. C. refers to pricing strategies that focuses on consistency even if environmental conditions fluctuate wildly. D. is also known as the bargaining power of customers. E. refers to pricing that is always a notch below competition.

A. refers to pricing that shifts over time based on conditions associated with product supply and demand.

Big firms fail to see disruptive innovations as a threat because: A. they primarily focus on the bottom line. B. they fail to listen to customer needs. C. they overestimate the impact of these innovations. D. they don't indulge in playing catch-up. E. they concentrate only on future financial performance.

A. they primarily focus on the bottom line.

Dell, previously the world's number one PC manufacturer, has seen its market share shrink because of rivals copying its value chain and reducing the price advantage it enjoyed over rivals. Dell's present struggles: A. underscore the importance of continually assessing a firm's strategic position among changing market conditions. B. are a result of rivals adopting supply chain management software products that have yielded competitive advantages. C. imply that if a firm's value chain helps to create and strengthen other strategic assets over time, it can be a key source for competitive advantage. D. highlight the fact that scale advantages of an established firm are a huge factor in discouraging newer entrants to a market. E. demonstrate that resource-based thinking can help firms avoid the trap of carelessly entering markets simply because growth is spotted.

A. underscore the importance of continually assessing a firm's strategic position among changing market conditions.

The address one types into a Web browser is also known as a: A. universal direction link or UDL B. uniform resource locator or URL C. unique resource finder or URF D. universal direction locator or UDL E. uniform resource connection or URC

B. uniform resource locator or URL

A _________ enables communication by defining the format of data and rules for exchange. A. nomenclature B. regulation C. protocol D. dialect E. convention

C. protocol

Which of these examples best illustrates the "Brand" lens? A. Using a Loyalty Card to encourage customers to return frequently ("Lock in"... reduce customer power). B. Amazon slightly raising prices on books knowing that you're likely to go to them first and possibly not even compare prices elsewhere. C. Using a web site to share inventory status with both customers and suppliers. D. The increasing value of Dr. Downing's research conclusions, using classroom student surveys, as his class sizes grow. E. Google using its massive user base to easily introduce and achieve success with new offerings, often giving those offerings away for free.

B. Amazon slightly raising prices on books knowing that you're likely to go to them first and possibly not even compare prices elsewhere.

____ technology is a broadband technology that can use the wires of a local telephone network. A. Fiber to the Home (FTTH) B. Digital Subscriber Line (DSL) C. Coaxial cable D. Telecom-broadband hybrid E. Broadband over power line (BPL)

B. Digital Subscriber Line (DSL)

According to Dr. Downing during class, when using the Value Chain Analysis "lens" to consider competitive/strategic advantage, the main aspects companies should be examining are... A. How recognizable their company name is. Do they have a proxy for trust and quality? B. How they manage to get stuff from their suppliers (inbound logistics), run their operations, and get stuff to their customers (outbound logistics) C. Whether the value of their products or services go UP when more and more people purchase or use them D. Whether the size of their company is sufficient to protect their market space. E. Whether it is difficult enough for their customers to be able to choose a different product or service (leave them)

B. How they manage to get stuff from their suppliers (inbound logistics), run their operations, and get stuff to their customers (outbound logistics)

Which of the following is true of disruptive technologies? A. The tech industry is the least fertile ground for disruptive technologies. B. Initially underperforming incumbents, over time their performance attributes improve to the point where they invade established markets. C. They come to market with a set of performance attributes that existing customers have demanded. D. Disruptive technologies and disruptive innovations are independent concepts. E. The term disruptive technologies is a simple one because few technologies are able to create market shocks and catalyze growth.

B. Initially underperforming incumbents, over time their performance attributes improve to the point where they invade established markets.

Which of these would be an example of a DDoS attack? A. An extortion attempt where hackers threaten to reveal names and social security information stolen from medical records databases B. Overloading a popular social networking site with inbound messages in order to shut down access to the site C. Launching a targeted phishing campaign on a department of defense or other surveilance network. D. Stealing proprietary data directly from mobile phones using a distributed network of difficult-to-trace online services. E. Launching tough-to-track click-fraud efforts

B. Overloading a popular social networking site with inbound messages in order to shut down access to the site

What protocol is used for exchange of mail between e-mail servers across the world? A. HTTP B. SMTP C. FTP D. SNMP E. TCP

B. SMTP

Matt enjoys using Amazon Instant Video. However, he is hesitant to drop his Netflix subscription because he already rated hundreds of movies on Netflix so that the website can better predict whether or not he will like a particular movie. This is an example of: A. Increased buyer power B. Switching costs C. The threat of new entrants D. Complimentary goods

B. Switching costs

Technologies that measure and analyze human body characteristics for identification or authentication are known as _____. A. overlamination processes B. biometrics C. smart tags D. bio-embedded systems E. holographs

B. biometrics

Which of the following is NOT an example of creating an imitation-resistant value chain? A. FreshDirect exchanging data with its suppliers to improve supply chain operations B. Zara's use of PDAs to gather customer data that guides planning and design teams C. Apple purchasing third-party ERP software to streamline information handling D. Netflix linking its massive Cinematch database to its warehouses in order to suggest movies that are likely to be in stock

C. Apple purchasing third-party ERP software to streamline information handling

If Dr. Downing went onto RateMyProfessor.com and rated himself as "Hot", he would be guilty of: A. SnapChating. B. first-degree felony punishable by over 30 years in prison. C. Astroturfing. D. Falacious blogging. E. Orkuting.

C. Astroturfing.

Which of the following is NOT one of the three factors responsible for the explosion of the Internet? A. Ubiquity of the browser B. Routers C. Circuit switching D. TCP/IP

C. Circuit switching

Which of the following is NOT an advantage that Virtual Private Networks (VPNs) have over dedicated-line Wide Area Networks (WANs) (so four of these answers are advantages of VPNs, one is not)? A. There is no need to lay cable or lease dedicated lines between the remote sites needing to connect B. The cost of implementation is lower C. Individuals outside of the company without access to the internet can access company information D. An employee can connect to the data at home E. Remote offices can connect to the same intranet as the main office

C. Individuals outside of the company without access to the internet can access company information

Which of the following statements holds true for the term encryption? A. It refers to a con executed using technology, typically targeted at acquiring sensitive information or tricking someone into installing malicious software. B. It refers to e-mail transmissions and packets that have been altered to seem as if they came from another source. C. It refers to scrambling data using a code or formula, known as a cipher, such that it is hidden from those who do not have the unlocking key. D. It refers to a seemingly tempting, but bogus target meant to draw hacking attempts. E. It refers to highly restrictive programs that permit communication only with approved entities and/or in an approved manner.

C. It refers to scrambling data using a code or formula, known as a cipher, such that it is hidden from those who do not have the unlocking key.

Microsoft generates more revenue from the sale of games for its Xbox 360 than it does from the sale of the Xbox 360 itself. Consequently, when Matt bought a new notebook PC last semester, he was given a free Xbox 360 with his purchase. Microsoft's primary strategy in this example is: A. Viral marketing: Microsoft knows how many Facebook friends Matt has, so it hopes that he will promote the Xbox 360 B. Eliminating buyer power: Since Matt now has an Xbox 360, he has no incentive to buy the competing Sony Playstation 3 C. Seeding the market: Microsoft is trying to create demand in a two-sided market D. Sales cannibalization: Sales of PC games have severely cut into Xbox 360 game sales and now Microsoft has to get rid of its excess inventory of Xbox 360s

C. Seeding the market: Microsoft is trying to create demand in a two-sided market

_____ refers to performing different tasks than rivals or the same tasks in a different way. A. Straddling B. Operational effectiveness C. Strategic positioning D. Vertical integration E. Scale advantage

C. Strategic positioning

Facebook has offered a system where Web site operators can choose to accept a user's Facebook credentials for logging in. Web site operators appreciate this feature because: A. they can charge users for accessing their content and hence, generate revenue. B. they can afford to not worry at all about Web site maintenance. C. users can access websites without creating an account, reducing a potential barrier to customer acquisition. D. Facebook's advertising programs offer better revenue for viewed content. E. they can associate their offerings away from the Facebook brand

C. users can access websites without creating an account, reducing a potential barrier to customer acquisition.

Why would worker shifts be more efficient at FreshDirect than traditional grocery stores? A. Because traditional grocery stores suffer from the Fast Follower Problem. B. Because traditional grocery stores suffer from Operational Effectiveness. C. Because FreshDirect employees do not have to commute into Manhattan. D. Because FreshDirect can aggregate customers' orders and smooth out the demand for labor.

D. Because FreshDirect can aggregate customers' orders and smooth out the demand for labor.

Which of these examples best illustrates the "Network Effects" lens? A. Amazon slightly raising prices on books knowing that you're likely to go to them first and possibly not even compare prices elsewhere. B. Using a web site to share inventory status with both customers and suppliers. C. Personal Audio suing Apple ("Play Lists"), Adam Carolla (Podcasts), and others, saying it had exclusive rights to their technical innovations. D. The increasing value of Dr. Downing's research conclusions, using classroom student surveys, as his class sizes grow. E. MySpace getting overcome and crushed by Facebook to the point of near irrelevance.

D. The increasing value of Dr. Downing's research conclusions, using classroom student surveys, as his class sizes grow.

A firm that provides hardware and services to run Web sites of others is known as a(n) _____. A. Web site incubator B. Internet service facilitator C. Web domain name registrar D. Web hosting service E. Internet Web fab

D. Web hosting service

The term wiki refers to a(n): A. record of online journal entries, usually made in a reverse chronological order. B. link in a blog post that refers readers back to cited sources. C. online community that allows users to establish personal profiles and communicate with others. D. Web site that can be modified by permitted users, from directly within a Web browser. E. type of short-message blogging, often made via mobile device and designed to provide rapid notification to their readership.

D. Web site that can be modified by permitted users, from directly within a Web browser.

Apple's dominance of smartphone and tablet markets has allowed the firm to lock up 60 percent of the world's supply of advanced touch-screen displays, and to do so with better pricing than would be available to smaller rivals. This is an example of: A. network externalities that make Apple valuable. B. high switching costs for customers. C. a complex tech product establishing itself as a killer brand. D. a growing firm gaining bargaining power with its suppliers or buyers. E. low search costs associated with a famous brand.

D. a growing firm gaining bargaining power with its suppliers or buyers.

Even if Netflix gave Cinematch away to its rivals, the rivals would still not be able to make the same kind of accurate recommendations as Netflix. This is because of Netflix's _____. A. technological superiority B. customer loyalty C. movie expertise D. data advantage E. large inventory

D. data advantage

Popular sites like Google and Yahoo! have several computers assigned to their host names because: A. they have operations in different countries. B. they are registered under several generic top-level domain names. C. of the different devices used to access these web sites. D. hoarding all information in one server is expensive. E. it ensures that the load of requests to their sites do not overwhelm a single computer.

E. it ensures that the load of requests to their sites do not overwhelm a single computer.

Why has Facebook gotten in trouble recently (March 2018)? A. for running the organization single-handedly. B. for valuing the firm at $15 billion, which exceeded investor expectations. C. for employing antitrust laws and limiting the investors' degree of control. D. for allowing Cambridge Analytica and others too much access to users' data, which in many cases was used to influence the 2016 U.S. elections. E. for retaining a majority of voting rights in the public company.

D. for allowing Cambridge Analytica and others too much access to users' data, which in many cases was used to influence the 2016 U.S. elections.

Which of the following are considered sources of information that can potentially be used by social engineers? A. LinkedIn B. Corporate directories C. Social media posts D. Contests or surveys E. All of the above

E. All of the above

What advantage does Amazon get by creating its own branded products? A. Allows the firm to cut out some of the costs that would otherwise go to a branded supplier. B. Gives Amazon even more negotiating leverage with suppliers. C. Allows Amazon products revealed on site and in the firm's product search results to eliminate costly advertising and other awareness-building spending that many rival products invest in. D. Reduces reliance on well-known suppliers that otherwise sell commodity products. E. All of the above.

E. All of the above.

The most dominant standard for 4G technology worldwide is A. Wi-Fi B. WiMax C. GPRS D. Circuit switching E. LTE

E. LTE

Zara's IT expenditure is low by fashion industry standards and is also highly effective. Which of the following makes this possible? A. Utilizing the money spent on IT infrastructure to improve the IT skills of its employees through training programs. B. Using the best and most expensive software and hardware in the market, as it lowers any maintenance costs later. C. Outsourcing IT management to third-party firms which provide IT services at lower costs. D. Investing IT funding in improving the infrastructure and cutting down employee overhead costs E. Targeting technology investment at points in the value chain where it has the most significant impact

E. Targeting technology investment at points in the value chain where it has the most significant impact

Why would a digital cellular network be better than an analog cellular network? A. The fact that it is circuit-switched would allow for dedicated connections, increasing the overall quality. B. The fact that it could use firewalls would make it more secure. C. The fact that it is a WAN creates greater reach as well as more privacy for the partners using the network. D. The fact that it supports DSL allows for higher bandwidth and more productivity. E. The 1's and 0's allow for multiple calls on one frequency (multiplexing) making it cheaper, as well as better quality checks making it clearer.

E. The 1's and 0's allow for multiple calls on one frequency (multiplexing) making it cheaper, as well as better quality checks making it clearer.

Which of the following statements holds true for Wikis? A. Their key use is to anonymously share new ideas in an unattributed manner. B. Their key use is creating an effective form for online advertising, customer tracking, and service personalization. C. Their key use is to discover and reinforce affiliations, identify experts, message individuals or groups, and virally share media. D. Their key use is to poll a diverse crowd and aggregate opinions to form a forecast of an eventual outcome. E. Their key use is to collaborate on common tasks or to create a common knowledge base.

E. Their key use is to collaborate on common tasks or to create a common knowledge base.

Staying power refers to the: A. relative abilities of parties in a situation to exert influence over each other. B. position of a firm in a competitive landscape that allows the company to maintain a positive cash flow. C. ability of a firm to produce a good or service at a lower opportunity cost than a rival. D. ability to take advantage of complementary products developed for a prior generation of technology. E. long term viability of a product or service.

E. long term viability of a product or service.

The domain name service (DNS) is a distributed database that allows users to communicate with other computers by: A. assigning DNS addresses to different server names. B. mapping host names to domain names. C. creating IP addresses that are unique to servers. D. assigning server names to different host addresses. E. mapping host and domain names to IP addresses of computers.

E. mapping host and domain names to IP addresses of computers.

Netflix offered its subscribers a selection of over one hundred thousand DVD-by-mail titles, while other video rental firms can only offer as much as three thousand. This presents a significant _____ for Netflix over its rivals. A. marginal cost B. price advantage C. variable cost D. studio preference E. scale advantage

E. scale advantage

Network effects occur when: A. the utility of large networks, particularly social networks, can scale exponentially with the size of the network. B. people do and believe things merely because many other people do and believe the same things. C. a concept or idea is repeatedly asserted in a community, regardless of whether sufficient empirical evidence has been presented to support it. D. money can be made by offering a near-limitless selection of products or services E. the value of a product or service increases as its number of users expands

E. the value of a product or service increases as its number of users expands

Peer production refers to: A. the process of tracking and responding to online mentions of a product, organization, or individual. B. graphical editing tools, such as those found in a wiki, page layout program, or other design tool. C. programming hooks, or guidelines published by firms that tell other programs how to get a service to perform a task such as send or receive data. D. content that is more complex than simple text or photos and includes animation, audio, and video. E. users collaboratively working to create content, products, and services.

E. users collaboratively working to create content, products, and services.

Internet networks are _____. A. bit-switched networks B. circuit-switched networks C. data-switched networks D. packet-switched networks E. byte-switched networks

Internet networks are _____. A. bit-switched networks B. circuit-switched networks C. data-switched networks D. packet-switched networks E. byte-switched networks

Why should you care about bits and bytes? a. Because managing businesses, which all contain technology, is generally easier and more effective the more I understand about technology and the better context I have. b. I do not need to care. c. Because I need to be a technical programmer to have any chance to succeed. d. Vertical niches e. Because progressing as an analyst, regardless of my major, will require programming in a lowlevel language at some point and I need to be ready.

a. Because managing businesses, which all contain technology, is generally easier and more effective the more I understand about technology and the better context I have.

When Dr. Downing holds up his left hand and his right hand, and then joins them together, what point is he trying to make? a. Amazon and Apple are good companies. b. If you understand your business, and also understand possible technology solutions, you can make a "match". c. If people will work together, we will have a more productive technology environment in the future. d. The ROI of process improvements in the business processes area is likely to overcome the ROI of simply using "old school" methods of doing business.

b. If you understand your business, and also understand possible technology solutions, you can make a "match".

Which of the following is NOT a benefit of using Excel and web pages, as done in VC1? a. If you want to drop the lowest value (like a Quiz) in a range, and get the average of the remaining values, use =AVERAGE(<range>,-1) b. If you have one formula that needs to be used for numerous cells, a great way to accomplish that is to use auto-fill (drag the black cross in the lower-right of the cell to the new cells). c. If you want to show your formulas to your clients/customers/etc., choose "Show formulas", screen shot the sheet, and insert that screen shot into a web page. d. =VLOOKUP is a useful formula to look up and return values from a pre-defined table. e. All of these are benefits.

a. If you want to drop the lowest value (like a Quiz) in a range, and get the average of the remaining values, use =AVERAGE(<range>,-1)

Which of the following is FALSE when thinking about matching business process problems and technology solutions, as described in Unit 1? a. If your technology solution involves programming or building a system, you need to enroll in a training course to obtain that skill. b. If you have an idea for a match, you should explore that idea by using established, recognized frameworks (such as the SDLC). c. You do not have to be an expert in the technology solution, but you must understand how the technology solution works and why it will help with your business problem. d. The more you understand about the business and the technology, the better chance you will make a good match. e. All of these are true.

a. If your technology solution involves programming or building a system, you need to enroll in a training course to obtain that skill.

Which of the following is THE major theme of OMIS 351 this semester? a. Information Technology should be used to serve the goals of the business b. Primary value activities. c. Solver, Pivot Tables, and Databases are great decision-making tools. d. Web sites are useful for communication. e. CRM will soon be used by all businesses.

a. Information Technology should be used to serve the goals of the business

Which of the following is an example of application software? a. MS Word b. Mac OS c. Linux d. MS Windows e. Apache

a. MS Word

Crowdsourcing tools and question-and-answer sites like _____ allow firms to reach out for expertise beyond their organizations. a. Quora b. MyYearbook.com c. MySpace d. Twitter e. Zappos

a. Quora

What was the main point of VC3, whether you chose Option 1 or Option 2? a. To get you, the business leaders of tomorrow, looking at and thinking about SAP, the world's leading business software, so you are better prepared for your careers. b. Putting two or more lower power processor cores on a single chip. c. To have you understand the complexity and power of Moore's Law. d. To have you understand why application software is always more important than operating system software, even on a dual core processor. e. Connecting a combination of parallel and series-connected processors to a single larger processor to supplement its functioning.

a. To get you, the business leaders of tomorrow, looking at and thinking about SAP, the world's leading business software, so you are better prepared for your careers.

Once you created the formula in Excel to calculate an OMIS 351 grade (say, in cell G2), what is the fastest/easiest and correct way to apply that same formula to all of the students on the sheet? a. Use mouse to get black cross in lower right of G2, lets you auto-fill by dragging. b. Use mouse to get black arrow in middle of G2, lets you select a range of cells. c. Use mouse to get cross hair in G2 lets you move a cell or cells. d. Use mouse to select G2, lets you auto-fill by dragging.

a. Use mouse to get black cross in lower right of G2, lets you auto-fill by dragging.

After completing the Sales Order (Step #2 in the SAP Document Flow Instructions Word document), what is a good way to verify you've done it (you should be able to answer this whether you chose Option 1 or Option 2 for VC3)? a. View the Document Flow by going to "Logistics-> Sales and Distribution -> Sales -> Order - > Display" b. Making sure it controls/runs the machine/computer. c. Send an email to the professor and ask him to check it. d. Making sure it controls/runs the machine/computer AND controls the flow. e. View the Document Flow in the Citrix (anywhereapps.niu.edu) main menu.

a. View the Document Flow by going to "Logistics-> Sales and Distribution -> Sales -> Order - > Display"

Android is a software product developed by Google that allows cell phone manufacturers to control hardware and establishes standards for developing and executing applications on its platform. Android is thus an example of a(n) _____. a. operating system b. programming language c. user interface d. distributed system e. database management system

a. operating system

Cloud computing refers to: a. replacing computing resources with services provided over the Internet. b. a technology that can make a single computer behave like many separate computers. c. designing computers with many microprocessors that work together, simultaneously, to solve problems. d. designing microprocessors with two or more calculating processor cores on the same piece of silicon. e. manufacturing semiconductors as a stack of multiple, interconnected layers instead of in one flat plane.

a. replacing computing resources with services provided over the Internet.

The ability to track customers, analyze campaign results, and modify tactics are the distinct advantages offered by _____ to the field of marketing. a. the Web b. print media c. television d. radio e. outdoor advertising

a. the Web

What is the most likely reason Jewel-Osco would care to have the information that Dr. Downing purchased Froot Loops cereal each Wednesday? a) So they could move the lines faster by having extra cashiers ready each Wednesday. b) So they could target Dr. Downing, for example by sending him a coupon for generic Jewel Frosted O's on Tuesday. c) So they could increase their Froot Loops inventory to be ready for Dr. Downing on Wednesday. d) Jewel-Osco would likely NOT care to have the information that Dr. Downing purchased Froot Loops cereal each Wednesday.

b) So they could target Dr. Downing, for example by sending him a coupon for generic Jewel Frosted O's on Tuesday.

As discussed multiple times in class, computers, without human assistance, are only better than humans at ________. a. Learning language and recognizing patterns. b. Processing 1's and 0's incredibly quickly, and remembering 1's and 0's almost perfectly. c. Playing chess. d. Turning 1's and 0's into recognizable software code. e. Playing Jeopardy.

b. Processing 1's and 0's incredibly quickly, and remembering 1's and 0's almost perfectly.

Which of the following is one of the characteristics of using software as a service model? a. Longer deployment times b. Scalable systems c. Fixed operating expenses d. Heightened financial risk e. Higher maintenance costs

b. Scalable systems

Technology experts in the area of process design: a. work to make sure systems are easy to use. b. leverage technology to make firms more efficient. c. specialize in technology for competitive advantage. d. focus on systems dealing with critical business data. a. provide direction on technology-related security issues.

b. leverage technology to make firms more efficient.

A company uses radio frequency identification (RFID) tags to keep track of its inventory. This is an example of the impact of technology in the area of _____. a. accounting b. operations c. advertising d. human resources e. finance

b. operations

Zara's use of RFID tags can be considered an example of a. Kryder's law b. the IoT c. volatile memory d. Carver Meade's Corollary

b. the IoT

Computer hardware refers to: a. a precise set of instructions that orchestrate the functioning of the computer. b. the physical components of information technology. c. the mechanism through which users interact with a computer. d. a program that fulfills the requests of a client. e. handheld computing devices meant largely for mobile use outside an office setting.

b. the physical components of information technology.

The set of activities through which a product or service is created and delivered to customers is known as a(n) _____. a. marketing plan b. value chain c. inventory turnover d. strategic position e. pure play

b. value chain

A server running _____ can create smaller compartments in memory that each behave as a separate computer with its own operating system and resources. a. private clouds b. virtualization software c. genetic algorithms d. neural network e. open source software

b. virtualization software

Cloud computing is not suited for situations: a. involving offloading of expensive computing tasks. b. where complex legacy systems have to be ported. c. with no existing regulatory compliance issues. d. where pricing economics favor renting over buying. e. characterized by limited-time tasks.

b. where complex legacy systems have to be ported.

How many BYTES can a 1 GHz 32 bit chip process per second? a. (1 Million) * 32 * 8 b. (1 Billion) * 32 c. (1 Billion) * 32 / 8 d. (1 Billion) * 32 * 8

c. (1 Billion) * 32 / 8

_____ refers to applications installed on a personal computer, typically to support tasks performed by a single user. a. Enterprise software b. Server program c. Desktop software d. Software as a service e. Database management program

c. Desktop software

As discussed in class, the guy who "invented" sliced bread actually invented: a. Bread b. Slicing c. None of the above d. Both A and B

c. None of the above

In the VC1 assignment, in what format were the Excel Grades page and Excel Formulas page recommended to be posted to your web page? a. Video b. Excel Workbook (.xls) c. Picture d. Word Document e. VC1 was confusing

c. Picture

When Dr. Downing demonstrated how incredibly expensive it would be for you to buy an "A" in OMIS 351, his point was that... a.special software is installed on several computers and enables them to work together on a common problem. b.computers are designed with many microprocessors that work together, simultaneously, to solve problems. c. computing speed and storage capacity has progressed at a similarly incredible speed, following Moore's Law. d.microprocessors with two or more (typically lower power) calculating processor cores are fabricated on the same piece of silicon to solve multiple problems. e.COB student ethics are easy to be compromised.

c. computing speed and storage capacity has progressed at a similarly incredible speed, following Moore's Law.

Less popular open source products are not likely to attract the community of users and contributors necessary to help improve these products over time. This situation reiterates the belief that _____ are a key to success. a. proprietary products b. brand strategies c. network effects d. technology expenses e. advertising campaigns

c. network effects

Technology experts in the area of _____ specialize in technology for competitive advantage. a. user-interface design b. process design c. strategy d. database design e. hardware

c. strategy

What does a fourth generation (4GL... highest level) software language do? a.Make the computer's internal operations more streamlined and efficient. b.Solves all business problems. c.Allows the user to specify the desired outcome, and the computer handles the rest (writes/produces the program). d.Nothing... they have yet to be developed.

c.Allows the user to specify the desired outcome, and the computer handles the rest (writes/produces the program).

How many BITS in the ASCII expression "RFID"? a) 4 b) 8 c) 16 d) 32

d) 32

If Verizon promised me an all-digital network, I would know that... a) My communications would be done in analog waves and I would have higher download rates b) My communications would be done in analog waves and I would have lower download rates c) My communications would be done in 1s and 0s and I would be at least at 4G d) My communications would be done in 1s and 0s and I would be at least at 2G

d) My communications would be done in 1s and 0s and I would be at least at 2G

Which of the following is true of SAP (best answer)? a. SAP, being a Desktop Application, stores all system data on the user's local machine. b. SAP is optimized for the healthcare industry but can also be used in the manufacturing industry. c. SAP saves data as soon as it is entered into the user interface, eliminating input problems. d. A database sits at the center of a company's SAP system. e. B & D are both true

d. A database sits at the center of a company's SAP system.

What is a business process? a. A type of CPU used in Finance b. It involves describing the desired features and operations of the system including screen layouts, business rules, process diagrams, pseudo code, and other documentation c. A heritable foundation of economic growth strategy d. A standardized set of activities that accomplish a specific task, such as processing a customer's order e. When a company like Apple releases the latest generation smartphone

d. A standardized set of activities that accomplish a specific task, such as processing a customer's order

One contributor to the easy way with which young entrepreneurs can have success is low-cost distribution to massive markets worldwide. This is enabled by: a. legacy systems b. big data and business analytics c. Esoko and M-Pesa d. App stores e. Sproxil

d. App stores

If a business person gets a great idea for a possible information technology solution to a business process problem, the first thing he/she should do is: a. Begin programming (or having programmed) the system. b. Secure financing for the system. c. Purchase the necessary hardware and/or software to support the system. d. Begin progressing through the stages of the SDLC, starting with "Planning"

d. Begin progressing through the stages of the SDLC, starting with "Planning"

What is the implementation phase in the SDLC? a. Involves establishing a high-level plan of the intended project and determining project goals b. Involves analyzing end-user business requirements and refining project goals into defined functions and operations of the intended system c. Involves describing the desired features and operations of the system d. Involves placing the system into production, so users can begin to perform actual business operations

d. Involves placing the system into production, so users can begin to perform actual business operations

Tech impact is reaching even beyond the confines of Earth itself. According to an example in your chapter, how was a tool on the International Space Station recently acquired?: a. It was purchased via China's Alibaba - showing global sourcing extends to the extraterrestrial. b. It was delivered to the launch site when summoned from Space using the FedEx app. c. It was an out-of-print product that an Etsy producer was able to craft and deliver for the next resupply flight. d. It was printed on-demand using 3D printing technology

d. It was printed on-demand using 3D printing technology

_____ refers to software that is free and where anyone to look at and potentially modify the code. a. Social software b. Proprietary software c. Licensed software d. Open source software e. Software as a service

d. Open source software

What are the implications for firms that do not have common database systems with consistent formats across their enterprise? a. They can save infrastructural and operational costs. b. They can expect to leverage economies of scale by serving more customers. c. They can hedge against the risk of data redundancy. d. They struggle to manage their value chain efficiently. e. They profit from the aggregation of diverse data sets and enhance their repositories.

d. They struggle to manage their value chain efficiently.

Which of the following is NOT a good example of a way technology could improve a business process? a. "Disintermediate" or remove a middle person in the process by electronically connecting buyers and sellers. b. Allow for the process to be redesigned to become more efficient and effective. c. Allow for the process to be completed more quickly (with other attributes remaining constant). d. Use the most up-to-date smart phone technology. e. Allow for the process to be completed more accurately (with other attributes remaining constant).

d. Use the most up-to-date smart phone technology.

Which of the following is the best example of matching a technology solution to a business problem? a. Using teams of size 6 to get the benefit of multiple players without becoming too large. b. Making long-term projections based on historical sales data. c. Scoring the highest in the class on VC1 d. Using GPS to track Huskie bus locations and giving that information to students e. None of these are good examples of matching a technology solution to a business problem.

d. Using GPS to track Huskie bus locations and giving that information to students

According to Dr. Downing in class, what is the information age? a. When the internet defined what information we see. b. When computers were invented and began storing information. c. When information became cheap to store on disk space. d. When companies/people finally realized that information is an asset.

d. When companies/people finally realized that information is an asset.

The scalability of a software product is defined as the: a. capability to continue operations even if a component fails. b. long-term market viability of a software product. c. ability to take advantage of complementary products developed for a prior generation of technology. d. ability to be easily expanded to manage workload increases. e. ability to replace a technically superior product upon market inception.

d. ability to be easily expanded to manage workload increases.

Systems that use data created by other systems to provide reporting and analysis for organizational decision making are called _____________systems. a. application server b. supply chain management c. enterprise resource management d. business intelligence e. customer relationship management

d. business intelligence

One of Facebook's key resources for competitive advantage is: a. technology. b. network internalities. c. open source software. d. high switching costs. e. low venture capital investment.

d. high switching costs.

ROI is a term used to represent the: a. return on information b. rate of information-generated c. regular order intake d. return on investment e. relay-ordered inventory

d. return on investment

_____ refers to a software package that integrates the many functions of a business, such as accounting, finance, inventory management, and human resources. a. Supply chain management b. Desktop software c. Customer relationship management d. Database management system e. Enterprise resource planning

e. Enterprise resource planning

If Jewel uses its Point of Sale terminals, along with a Preferred Card, at the cash register to store information about individual's purchasing habits and then make strategic decisions with this information, this is an example of: a. SCM. b. Ineffective business practices. c. Poor business practices. d. Computer Age business practices. e. Information Age business practices.

e. Information Age business practices

Some of the radical changes brought about by new technologies include: a. the stagnation of advertising. b. the proliferation of telecommunications into the hands of a few. c. an increase in computing costs owing to the growth of licensed software. d. a decrease in the standards of corporate ethics. e. the creation of an unprecedented set of security and espionage threats

e. the creation of an unprecedented set of security and espionage threats


Conjuntos de estudio relacionados

Chapter 2: First Amendment, Core Values of Free Speech

View Set

AP Psychology Cognition- Memory, Thinking, Language

View Set

ATI Nurse Logic: Knowledge and clinical judgement - Exam 1

View Set

Chapter 1 Introduction to Accounting and Business

View Set

Cardio Pulm: Random stuff for patient cases 4 + 5 (plus acute care considerations)

View Set

A6: M-3 (Compilation Engagements)

View Set