omis test 2
What percent of global Internet users use Google Search and other Google services? Select one: A.About 80 percent B.About 50 percent C.Over 90 percent D.Less than 10 percent E.Around 25 percent
A.About 80 percent
All of the following laws apply to actions by the federal government except the: Select one: A.Children's Online Privacy Protection Act. B.Computer Security Act. C.Privacy Act. D.Driver's Privacy Protection Act. E.Freedom of Information Act.
A.Children's Online Privacy Protection Act.
Which of the following protects the authors of a book from having their work copied by others? Select one: A.Copyright law B.Due process C.Trade Secret law D.Fair Use Doctrine E.Patent protection
A.Copyright law
Which of the following statements about disruptive technologies is not true? Select one: A.Firms that invent disruptive technologies as first movers always become market leaders. B.Disruptive technologies radically change the business landscape and environment. C.Disruptive technologies may put entire industries out of business. D.Disruptive technologies may be substitute products that perform better than other products currently being produced. E.Disruptive technologies may sometimes simply extend the marketplace.
A.Firms that invent disruptive technologies as first movers always become market leaders.
Which of the following is an example of a divisionalized bureaucracy? Select one: A.Fortune 500 firm B.University C.Startup firm D.Consulting firm E.Midsize manufacturer
A.Fortune 500 firm
A man steals from a grocery store in order to feed his starving family. Which of the following best expresses the utilitarian principle in evaluating this situation? Select one: A.His action is acceptable, because the higher social value is the survival of the family. B.His action is acceptable, because the grocer suffers the least harm. C.His action is wrong, because the man would not want the grocer to steal from him. D.His action is wrong, because if everyone were to do this, the concept of personal property is defeated. E.His action is wrong, because the grocery store owner is harmed.
A.His action is acceptable, because the higher social value is the survival of the family.
Which of the following is a primary drawback to the "do anything anywhere" computing environment? Select one: A.It blurs the traditional boundaries between work and family time. B.It leads to employees being paid less for the total amount of work performed. C.It centralizes power at corporate headquarters. D.It makes work environments less pleasant. E.It creates a digital divide.
A.It blurs the traditional boundaries between work and family time.
Which of the following statements about the technical view of organizations is not true? Select one: A.It sees the firm as being infinitely malleable. B.It focuses on how inputs are combined to create outputs when technology changes are introduced into a company. C.It sees the organization as a social structure. D.It emphasizes group relationships, values, and structures. E.It sees capital and labor as being easily substituted for one another.
A.It sees the firm as being infinitely malleable.
Amazon's use of the Internet as a platform to enhance customer convenience illustrates which of the following strategies? Select one: A.Low-cost leadership B.Strengthening supplier intimacy C.Focusing on market niche D.Developing synergies E.Enhancing core competencies
A.Low-cost leadership
All of the following are IT-enabled products and services providing competitive advantage except: Select one: A.Nike's use of celebrities to market their products. B.Amazon's one-click shopping. C.Apple's iTunes. D.Ping's golf club customization. E.PayPal's online person-to-person payment system.
A.Nike's use of celebrities to market their products.
The obligations that individuals and organizations have regarding the preservation of existing values and institutions fall within which of the following moral dimensions of the information age? Select one: A.Quality of life B.System quality C.Property rights and obligations D.Family and home E.Accountability and control
A.Quality of life
Which of the five moral dimensions of the information age does the weakening of boundaries between work and family life involve? Select one: A.Quality of life B.Accountability and control C.Property rights and obligations D.System quality E.Information rights and obligations
A.Quality of life
Which of the following industries has the lowest barrier to entry? Select one: A.Small retailer B.Computer chip C.Automotive D.Solar energy E.Airline
A.Small retailer
________ allows an organization to collect personal information without the user's explicit consent. Select one: A.The opt-in model B.A safe harbor C.FIP principles D.P3P E.The opt-out model
A.The opt-in model
All of the following are steps in the process for analyzing an ethical issue except: Select one: A.assigning responsibility. B.identifying the options you can reasonably take. C.identifying the potential consequences of your options. D.identifying the stakeholders. E.identifying and describing the facts clearly.
A.assigning responsibility.
The value chain model: Select one: A.highlights specific activities in the business where competitive strategies can best be applied. B.categorizes four basic strategies a firm can use to enhance its value chain. C.enables more effective product differentiation. D.categorizes five related advantages for adding value to a firm's products or services. E.sees the supply chain as the primary activity for adding value.
A.highlights specific activities in the business where competitive strategies can best be applied.
In environmental scanning, a firm may use information systems to: Select one: A.identify external events that may affect it. B.keep track of the temperature within its data centers. C.transform inputs into products and services. D.develop a unified organizational culture. E.analyze the performance of its intranet.
A.identify external events that may affect it.
The ethical no-free-lunch rule states that: Select one: A.if something someone else has created is useful to you, it has value, and you should assume the creator wants compensation for this work. B.if an action cannot be taken repeatedly, then it is not right to be taken at any time. C.one can put values in rank order and understand the consequences of various courses of action. D.if an action is not right for everyone to take, it is not right for anyone to take. E.one should take the action that produces the least harm or incurs the least cost.
A.if something someone else has created is useful to you, it has value, and you should assume the creator wants compensation for this work.
An information system can enable a company to focus on a market niche through: Select one: A.intensive customer data analysis. B.enabling new products and services. C.developing intimacy with customers. D.tightening linkages with suppliers. E.producing products and services at a lower price than competitors.
A.intensive customer data analysis.
Along with capital, ________ is the primary production input that the organization uses to create products and services. Select one: A.labor B.politics C.culture D.structure E.feedback
A.labor
Firms use a ________ strategy to provide a specialized product or service for a narrow target market better than competitors. Select one: A.market niche B.process efficiency C.product differentiation D.low-cost leadership E.mass customization
A.market niche
When a cookie is created during a website visit, it is stored: Select one: A.on the hard drive of the visitor's computer. B.on the ISP's servers. C.nowhere, because they are only used during a visit and are discarded once a visitor leaves the website. D.on the website's server. E.in the browser's application settings
A.on the hard drive of the visitor's computer.
According to research on organizational resistance, the four components that must be changed in an organization in order to successfully implement a new information system are: Select one: A.tasks, technology, people, and structure. B.tasks, culture, management, and environment. C.environment, people, structure, and tasks. D.technology, people, culture, and structure. E.costs, tasks, structure, and management.
A.tasks, technology, people, and structure.
All of the following are factors in U.S. federal sentencing guidelines with respect to business executives except: Select one: A.the use of technology to commit the crime. B.the failure to cooperate with prosecutors. C.the monetary value of the crime. D.the presence of a conspiracy to prevent discovery of the crime. E.the use of structured financial transactions to hide the crime.
A.the use of technology to commit the crime.
Which of the following statements about business processes is not true? Select one: A.A business firm is a collection of business processes. B.Business processes are typically unaffected by changes in information systems. C.Business processes influence the relationship between an organization and information technology. D.Business processes are a collection of standard operating procedures. E.Business processes are usually ensconced in an organization's culture.
B.Business processes are typically unaffected by changes in information systems.
Which of the following is not a U.S. federal law affecting private institutions? Select one: A.HIPAA B.Computer Matching and Privacy Protection Act C.Video Privacy Protection Act D.Gramm-Leach-Bliley Act E.COPPA
B.Computer Matching and Privacy Protection Act
A colleague at work takes small amounts of office supplies for her own personal use, saying that this is a tiny loss to the company. You tell her that if everyone were to take office supplies, then the loss would no longer be minimal. Your rationale expresses which of the following ethical principles? Select one: A.The slippery-slope rule B.Kant's Categorical Imperative C.The Risk Aversion Principle D.The no-free-lunch rule E.The Golden Rule
B.Kant's Categorical Imperative
Which of the following is a data analysis technology that finds obscure connections between data in disparate sources? Select one: A.FIP B.NORA C.HIPAA D.Spyware E.COPPA
B.NORA
Struggles for resources, competition, and conflict within an organization that result from divergent viewpoints about how resources, rewards, and punishments should be distributed are an example of which of the following? Select one: A.Business processes B.Organizational politics C.Organizational environment. D.Organizational culture E.Organizational structure
B.Organizational politics
Which of the following statements about features of organizations is not true? Select one: A.Organizations are devoted to maximizing output using limited inputs. B.Organizations generally change much faster than environments. C.Organizational culture is a powerful restraint on technological change. D.All modern organizations are bureaucracies with clear-cut divisions of labor and specialization. E.Organizations and environments have a reciprocal relationship.
B.Organizations generally change much faster than environments.
The obligations that individuals and organizations have concerning rights to intellectual property involve which of the following moral dimensions of the information age? Select one: A.Quality of life B.Property rights and obligations C.Accountability and control D.System quality E.Information rights and obligations
B.Property rights and obligations
Which of the following runs an antipiracy hotline for individuals to report piracy activities? Select one: A.FCC B.SIIA C.NAI D.DMCA E.WIPO
B.SIIA
Which of the following regulates the U.S. federal government collection, use, and disclosure of information? Select one: A.HIPPA B.The Privacy Act C.The Freedom of Information Act D.The Gramm-Leach-Bliley Act E.COPPA
B.The Privacy Act
Which of the following technologies disrupted the traditional publishing industry? Select one: A.PCs B.World Wide Web C.email D.Software as a web service E.Instant messaging
B.World Wide Web
Walmart's continuous replenishment system is an example of a firm using information systems to: Select one: A.focus on market niche. B.achieve low-cost leadership. C.develop synergies. D.strengthen ties to its customers. E.simplify the industry value chain.
B.achieve low-cost leadership.
All of the following could be considered substitute products for industrial electricity generation except: Select one: A.wind B.ethanol C.coal D.solar E.hydropower
B.ethanol
In network economics, the value of a commercial software vendor's software products: Select one: A.decreases according to the law of diminishing returns. B.increases as more people use them. C.is unrelated to the number of people that use them. D.decreases as more people use them. E.increases due to higher marginal gain in output.
B.increases as more people use them.
The Internet increases the bargaining power of customers by: Select one: A.creating new opportunities for building loyal customer bases. B.making information available to everyone. C.making more products available. D.enabling the development of new services. E.lowering transaction costs.
B.making information available to everyone.
A firm can exercise greater control over its suppliers in terms of price, quality, and delivery schedules by having: Select one: A.global suppliers. B.more suppliers. C.only a single supplier. D.fewer suppliers. E.local suppliers.
B.more suppliers.
Walmart's continuous replenishment system allows it to do all of the following except: Select one: A.fine-tune merchandise availability. B.provide mass customization. C.better meet customer demands. D.keep costs low. E.transmit orders to restock directly to its suppliers.
B.provide mass customization.
The idea that the more any given resource is applied to production, the lower the marginal gain in output, until a point is reached where the additional inputs produce no additional value, is referred to as: Select one: A.virtual economics. B.the law of diminishing returns. C.supply and demand. D.network inelasticity. E.the point of no return.
B.the law of diminishing returns.
According to agency theory, the firm is viewed as a(n): Select one: A.entrepreneurial structure. B.unified, profit-maximizing entity. C.task force organization that must respond to rapidly changing environments. D.entrepreneurial endeavor. E."nexus of contracts" among self-interested individuals.
B.unified, profit-maximizing entity.
Which of the following is an example of synergy in business? Select one: A.Nike's use of technology to improve its product offerings B.Walmart's order entry and inventory management system to coordinate with suppliers C.Bank of America acquiring Countrywide Financial Corporation to reach a large pool of new customers D.Netflix combining traditional video rental with online video subscriptions E.Amazon's use of the Internet to sell books
C.Bank of America acquiring Countrywide Financial Corporation to reach a large pool of new customers
Which of the following statements about cookies is not true? Select one: A.It is possible to prevent a client computer from accepting cookies. B.Cookies are used to support the user experience on websites. C.Cookies are installed only at the user's request. D.Cookies can be combined with other website data to develop detailed profiles of customers. E.Cookies are stored on the user's computer.
C.Cookies are installed only at the user's request.
Which of the following is by far the most common source of business system failure? Select one: A.Software errors B.Software bugs C.Data quality D.Hardware failures E.Facilities failures
C.Data quality
Which of the following best describes Immanuel Kant's categorical imperative? Select one: A.One can put values in rank order and understand the consequences of various courses of action. B.One should take the action that produces the least harm or incurs the least cost. C.If an action is not right for everyone to take, it is not right for anyone to take. D.If an action cannot be taken repeatedly, then it is not right to be taken at any time. E.You should act towards others as you would like them to act towards you.
C.If an action is not right for everyone to take, it is not right for anyone to take.
Which of the five moral dimensions of the information age do the central business activities of Google Marketing Platform involve? Select one: A.System quality B.Property rights and obligations C.Information rights and obligations D.Accountability and control E.Quality of life
C.Information rights and obligations
Which of the following statements information technology's impact on business firms is not true? Select one: A.Information technology helps firms reduce environmental scanning. B.Information technology helps reduce transaction costs. C.Information technology helps firms lower the cost of market participation. D.Information technology helps reduce internal management costs. E.Information technology helps reduce agency costs.
C.Information technology helps firms lower the cost of market participation.
Which of the following best describes the effect that new information technology has on society? Select one: A.It is beneficial for society as a whole, while raising dilemmas for consumers. B.It has a dampening effect on the discourse of business ethics. C.It has a ripple effect, raising new ethical, social, and political issues. D.It has a magnifying effect, creating increasing numbers of ethical issues. E.It has a waterfall effect in raising ever more complex ethical issues.
C.It has a ripple effect, raising new ethical, social, and political issues.
FIP principles are based on a belief in which of the following? Select one: A.Privacy of the individual B.Accountability of the record holder C.Mutuality of interest between the record holder and the individual D.Responsibility of the record holder E.Difference between the interests of the individual and commercial organizations
C.Mutuality of interest between the record holder and the individual
The NAI is an industry association formed to help with which of the following? Select one: A.Copyright protection B.Patent protection C.Online privacy issues D.Trade secret protection E.Trademark protection
C.Online privacy issues
________ grants the owner exclusive ownership of the ideas behind an invention for 20 years. Select one: A.Copyright law B.Trade secret protection C.Patent law D.Privacy law E.Trademark law
C.Patent law
The use of computers to assemble data from different sources to create digital dossiers of detailed information about individuals is known as which of the following? Select one: A.Spamming B.Targeting C.Profiling D.Phishing E.Spyware
C.Profiling
Which ethical rule states that if an action cannot be taken repeatedly, it is not right to take at all? Select one: A.Golden Rule B.High-failure cost rule C.Slippery-slope rule D.Utilitarian principle E.Lemming rule
C.Slippery-slope rule
Which of the following is a competitive force that has challenged the music industry? Select one: A.Suppliers' bargaining power B.Positioning and rivalry among competitors C.Substitute products or services D.Customers' bargaining power E.Low cost of entry
C.Substitute products or services
Which of the following is a support activity in a firm's value chain? Select one: A.Inbound logistics B.Operations C.Technology D.Sales and marketing E.Service
C.Technology
Which of the following statements about Porter's competitive forces model is not true? Select one: A.Porter's model focuses on a firm's general business environment. B.In a free economy, there are very low barriers to entry in all industries. C.The more substitute products and services in an industry, the less a firm can control pricing and the lower the firm's profit margins. D.Porter's competitive forces model is the most widely used model for understanding competitive advantage. E.The power of customers grows if they can easily switch to a competitor's products and services.
C.The more substitute products and services in an industry, the less a firm can control pricing and the lower the firm's profit margins.
The right to ________ is a feature of the GDPR that allows individuals to request that organizations delete their personal data. Select one: A.a safe harbor B.opt-in to data collection C.be forgotten D.opt-out of data collection E.do not track
C.be forgotten
All of the following are FTC privacy guidelines except: Select one: A.firms should increase the transparency of their data collection. B.consumers should be able to review and contest the accuracy and completeness of data collected about them in a timely, inexpensive process. C.firms should limit the length of time that any personal data is stored to six months or less. D.firms should require consumer consent and provide clear options to opt out of data collection. E.firms should build products and services that protect privacy.
C.firms should limit the length of time that any personal data is stored to six months or less.
The ability to offer individually tailored products or services using the same production resources as bulk production is known as: Select one: A.micromarketing. B.mass marketing. C.mass customization. D.niche customization. E.micro customization.
C.mass customization.
In the ________ model of informed consent, personal information cannot be collected until the consumer specifically agrees that his or her data can be collected. Select one: A.opt-out B.PGP C.opt-in D.P3P E.safe harbor
C.opt-in
When two organizations pool markets and expertise that result in lower costs and generate profits, they are creating: Select one: A.core competencies. B.a value web. C.synergies. D.a value chain. E.net marketplaces.
C.synergies.
Which of the following ethical guidelines suggests that you put yourself in the place of others, and think of yourself as the object of the decision? Select one: A.Kant's categorical imperative B.the no-free-lunch rule C.the Golden Rule D.the risk aversion principle E.the utilitarian principle
C.the Golden Rule
A virtual company: Select one: A.uses Internet technology to maintain a networked community of users. B.uses Internet technology to maintain a virtual storefront. C.uses networks to link people, assets, and ideas, enabling it to ally with other companies to create and distribute products and services without being limited by traditional organizational boundaries or physical locations. D.is limited by traditional organizational boundaries. E.provides entirely Internet-driven services or virtual products.
C.uses networks to link people, assets, and ideas, enabling it to ally with other companies to create and distribute products and services without being limited by traditional organizational boundaries or physical locations.
The FIP principle of Notice/Awareness states that: Select one: A.there must be a mechanism in place to enforce FIP principles. B.customers must be allowed to choose how their information will be used for secondary purposes other than the supporting transaction. C.websites must disclose their information practices before collecting data. D.consumers should be able to review the data collected about them. E.data collectors must take responsible steps to assure that consumer information is accurate and secure from unauthorized use.
C.websites must disclose their information practices before collecting data.
Which of the following is not a mediating factor that impacts an organization's relationship with information technology? Select one: A.Structure of the organization B.Politics C.Business processes D.Agency costs E.Environment
D.Agency costs
Which of the following would a company employ to measure and compare its business processes to similar processes of other companies within their industry? Select one: A.Value chain analysis B.Strategic systems analysis C.Secondary activities D.Benchmarking E.Best practices
D.Benchmarking
Which of the following is not a principal cause of poor system performance? Select one: A.Software bugs B.Facility failures C.Hardware failures D.Computer abuse E.Poor input data quality
D.Computer abuse
Which of the following adjusts copyright laws to the Internet age by making it illegal to circumvent technology-based protections of copyrighted materials? Select one: A.Electronic Communications Privacy Act B.Freedom of Information Act C.Privacy Act D.Digital Millennium Copyright Act E.Computer Software Copyright Act
D.Digital Millennium Copyright Act
________ is a feature of law-governed society and involves having laws that are known and understood, along with the ability to appeal to higher authorities to ensure that the laws are applied correctly. Select one: A.Liability B.Accountability C.Responsibility D.Due process E.The judicial system
D.Due process
Which of the following U.S. laws gives patients access to personal medical records and the right to authorize how this information can be used or disclosed? Select one: A.COPPA B.Privacy Protection Act C.Freedom of Information Act D.HIPAA E.Gramm-Leach-Bliley Act
D.HIPAA
Which of the following statements about network economics is not true? Select one: A.From a network economics perspective, the value of a community of people grows as the number of participants in the community increases. B.Information technology can be strategically useful from a network economics perspective. C.The law of diminishing returns does not always apply to every situation. D.In network economics, the marginal cost of adding new members to the network is higher than the marginal gain. E.Uber is an example of a business model that is based on the principle of network economics.
D.In network economics, the marginal cost of adding new members to the network is higher than the marginal gain.
Which of the following is not one of the current key technology trends that raises ethical issues? Select one: A.Data analysis advancements B.Decline in data storage costs C.Increase in use of mobile devices D.Increase in data quality E.Advances in networking technology
D.Increase in data quality
Which of the following is not a feature of the General Data Protection Regulation (GDPR)? Select one: A.It imposes fines on companies for violating the regulation up to 4 percent of a firm's global revenue. B.Its protections of the privacy rights of EU citizens apply worldwide, regardless of where processing of the data takes places. C.It applies to all firms doing business in the EU. D.It prevents firms from using cookies. E.It creates a single EU privacy policy.
D.It prevents firms from using cookies.
________ means that you accept the potential costs and obligations for the decisions you make. Select one: A.Liability B.Duty C.Due process D.Responsibility E.Accountability
D.Responsibility
Hilton Hotels uses its OnQ system for which of the following purposes? Select one: A.To create synergies with its suppliers B.To benchmark its progress against competitors C.To lower its operating costs D.To estimate each guest's profitability and give additional privileges to profitable customers E.To take advantage of network economics
D.To estimate each guest's profitability and give additional privileges to profitable customers
Which of the following is not a true statement about value webs? Select one: A.Value webs involve a collection of independent firms that use information technology to coordinate their value chains. B.Value webs operate in a less linear fashion than traditional value chains. C.Value webs involve highly synchronized industry value chains. D.Value webs are inflexible and cannot adapt quickly to changes in supply and demand. E.Value webs are more customer-driven than traditional value chains.
D.Value webs are inflexible and cannot adapt quickly to changes in supply and demand.
The most successful solutions or methods for achieving a business objective are called: Select one: A.best processes. B.core competencies. C.benchmarks. D.best practices. E.value activities.
D.best practices.
The interaction between information technology and organizations is influenced: Select one: A.by two main macroeconomic forces: capital and labor. B.by the development of new information technologies. C.by the rate of growth of the organization. D.by many factors, including structure, politics, culture, and environment. E.solely by the decision making of middle and senior managers.
D.by many factors, including structure, politics, culture, and environment.
All of the following are technical solutions to protecting user privacy except: Select one: A.email encryption. B.preventing client computers from accepting cookies. C.anonymous surfing. D.data use policies. E.anonymous email.
D.data use policies
All of the following are competitive forces in Porter's model except: Select one: A.substitute products. B.suppliers. C.new market entrants. D.disruptive technologies. E.customers.
D.disruptive technologies.
Information systems enhance core competencies by: Select one: A.fostering synergies among departments. B.providing better reporting facilities. C.allowing operational employees to interact with management. D.encouraging the sharing of knowledge across business units. E.creating educational opportunities for management
D.encouraging the sharing of knowledge across business units.
Redesigning and automating business processes can be seen as a double-edged sword because: Select one: A.it can concentrate power in the hands of senior executives. B.support for middle-management decision making may be offset by poor data quality. C.reliance on technology results in the loss of hands-on knowledge. D.increases in efficiency may be accompanied by job losses. E.increases in efficiency may be accompanied by poor data quality.
D.increases in efficiency may be accompanied by job losses.
Which of the following allows the EU to enforce GDPR requirements with non-EU countries? Select one: A.FIP agreements B.privacy by design agreements C.P3P agreements D.privacy shield agreements E.PGP agreements
D.privacy shield agreements
________ is a feature of social institutions that means mechanisms are in place to determine responsibility for an action. Select one: A.Liability B.Due process C.The judicial system D.The courts of appeal E.Accountability
E.Accountability
Which of the following models uses a general view of the firm, its competitors, and the firm's environment to understand competitive advantage? Select one: A.Network economics model B.Demand control model C.Agency costs model D.Competitive advantage model E.Competitive forces model
E.Competitive forces model
Which of the following represent the primary activities of a firm? Select one: A.Inbound logistics, operations, outbound logistics, technology, and service B.Organization infrastructure, human resources, technology, and procurement C.Procurement, inbound logistics, operations, technology, and outbound logistics D.Procurement, operations, technology, sales and marketing, and services E.Inbound logistics, operations, outbound logistics, sales and marketing, and service
E.Inbound logistics, operations, outbound logistics, sales and marketing, and service
Which of the following statements about organizations is not true? Select one: A.An organization is a collection of people and other social elements. B.An organization is a formal, legal entity with internal rules and procedures that must abide by laws. C.An organization is a collection of rights, privileges, obligations, and responsibilities delicately balanced over a period of time through conflict and conflict resolution. D.An organization is a stable, formal social structure that takes resources from the environment and processes them to produce outputs. E.Informal groups tend to be more stable in terms of longevity and routineness than organizations.
E.Informal groups tend to be more stable in terms of longevity and routineness than organizations.
Which of the following forms of protection of intellectual property requires that the property be the subject of a nondisclosure agreement? Select one: A.Trademark B.Patent C.Copyright D.All forms of intellectual property protection E.Trade secret
E.Trade secret
Advertisers use ________ in order to display more relevant ads based on a user's search and browsing history. Select one: A.Web bugs B.NORA C.intelligent agents D.FIP principles E.behavioral targeting
E.behavioral targeting
Information systems can be used at the industry level to achieve strategic advantage by: Select one: A.raising the bargaining power of suppliers. B.encouraging the entry of new competitors. C.enforcing standards that reduce the differences between competitors. D.decreasing switching costs. E.building industrywide, IT-supported consortia, symposia, and communications networks.
E.building industrywide, IT-supported consortia, symposia, and communications networks.
The Network Advertising Initiative is an industry association that: Select one: A.protects user privacy during interactions with websites. B.regulates the use of customer information by firms. C.is a safe harbor program established by the U.S. government. D.has established technical guidelines for ensuring privacy. E.has developed privacy policies to help consumers opt out of advertising network programs and provide consumers redress from abuses.
E.has developed privacy policies to help consumers opt out of advertising network programs and provide consumers redress from abuses.
The four major competitive strategies are: Select one: A.low-cost leadership, new market entrants, product differentiation, and focus on market niche. B.low-cost leadership, substitute products and services, customers; and suppliers. C.new market entrants, substitute products and services, customers, and suppliers. D.customers, suppliers, new market entrants, and substitute products. E.low-cost leadership, product differentiation, focus on market niche, and strengthening customer and supplier intimacy.
E.low-cost leadership, product differentiation, focus on market niche, and strengthening customer and supplier intimacy.
Mintzberg classifies a large bureaucracy existing in a slowly changing environment that produces standard products and is dominated by centralized management as a(n): Select one: A.professional bureaucracy B.divisionalized bureaucracy C.multidivisional bureaucracy D.adhocracy E.machine bureaucracy
E.machine bureaucracy
Under Mintzberg's classification of organizational structure, knowledge-based organizations fall under the category of: Select one: A.divisionalized bureaucracies. B.adhocracies. C.machine bureaucracies. D.entrepreneurial structures. E.professional bureaucracies.
E.professional bureaucracies.
According to the ________ definition of organizations, an organization is seen as a means by which capital and labor are transformed by the organization into outputs to the environment. Select one: A.behavioral B.macroeconomic C.microeconomic D.psychological E.sociotechnical
E.sociotechnical
Look and feel" copyright infringement lawsuits are concerned with: Select one: A.using the graphical elements of another product. B.using the creative elements of another product. C.violation of a monopoly on the ideas behind a product. D.the distinction between tangible and intangible ideas. E.the distinction between an idea and its expression.
E.the distinction between an idea and its expression.
According to ________, you should take the action that produces the least harm. Select one: A.the "no free lunch" rule B.the Golden Rule C.Kant's categorical imperative D.the utilitarian principle E.the risk aversion principle
E.the risk aversion principle
When a firm buys on the marketplace what it cannot make itself, the costs incurred are referred to as ________ costs. Select one: A.switching B.procurement C.agency D.network E.transaction
E.transaction
Which of the following best describes how new information systems can result in legal gray areas? A.They are little understood by politicians or lawyers. B.They work with networked, digital data, which are more difficult to control than information stored manually. C.They are created from sets of logical and technological rules rather than social or organizational mores. D.They result in new situations that are not covered by old laws. E.They are implemented by technicians rather than managers.
d. They result in new situations that are not covered by old laws.