Cis final

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

According to the lecture videos, research has shown that the link between (1) social media use and (2) negative responses and outcomes is the following:

Findings from existing studies are mixed; some show negative correlations and others show positive correlations.

Which of these is not a major type of cloud services?

Hardware as a Service (HaaS)

Which of the following is a FALSE statement about information system security?

Information system security is fundamentally a technology problem.

What is the relationship between Moore's Law and e-waste?

Moore's Law predicts the accelerated obsolescence of technology devices, which leads to increases in discarded hardware devices.

Microblogging

Short, asynchronous messaging system. Users send messages to "followers" who aren't required to follow back. Twitter

Which of the following statements is FALSE?

The Facebook-backed Libra cryptocurrency seeks to serve the 100 million adults worldwide who do not have a bank account.

When creating an organizational cybersecurity strategy, which statement is FALSE? Check all that apply.

Working from home does not change the cybersecurity plan for an organization. Always hire Black Hat hackers to test vulnerabilities in your organization cybersecurity landscape. The attack surface does not matter when creating a cybersecurity strategy.

What is a cross-functional process?

a business process that spans multiple functional areas or units in an organization

Processing

central processing unit microprocessor

Open source software is

software that provides the source code for anyone to copy and use.

Messaging services are a form of social media known for the following characteristic(s). Check all that apply.

some focus on specific media types (e.g., Instagram: photos, TikTok: videos) often used on mobile devices

In 2020, Facebook had nearly ______________ monthly active users.

3 billion

Which statement is TRUE about cybersecurity within organizations? Check all that apply.

A Red Team looks for weaknesses in security mechanisms, with a view to help plug the holes that might be exploited by cyber-criminals. Proactively avoiding a cybersecurity incident costs less than dealing with a security breach afterward. When defining a cybersecurity strategy, it is always a balancing act between risk and cost. The virtual shutdown of websites by way of overloading them with seemingly legitimate requests sent simultaneously from thousands of machines is termed a DDoS (distributed denial of service) attack.

phishing

A bank customer receives a message, ostensibly from the bank's website, asking her to provide her login information but contains many misspellings and links that go to suspicious websites.

vishing

A cyber rascal calls a company trying to get access to private personal and sometimes financial information to use for financial gain. It is a form of social engineering.

sock puppet

A fake online persona created to promote a particular point of view, often in praise of a firm, product, or individual.

smishing

A person receives a text message from a familiar number with a link. If they click on the link, it will install a malicious software app on the phone.

Platform bundling

A strategy whereby a firm offers products and services that allow for the integration of other software products and complementary goods, which creates an eco-system of value-added offerings.

Envelopment

A strategy whereby a firm with a significant customer base adds a feature to an existing product or service and eliminates the need for any rival, stand-alone platforms. Think Apple adding video to cameras, crushing the market for the Flip cam.

Wikis

A website that anyone can edit directly from within the browser. All changes are attributed, and there is a revision history allowing for the roll back of changes to revert to earlier versions. Wikipedia

Which statement is TRUE about key performance indicators (KPIs)?

All of these: KPIs involve setting targets (the desired level of performance). KPIs are measured using data. KPIs measure progress toward a desired goal.

Which of the following is a risk associated with social media?

All of these: Online trolls can vandalize content published on social media or otherwise cause grief or mischief on social media. The online social media activities of employees, whether in their personal or professional domains, can taint the image of the organizations they work for when the online content or behavior is perceived to be negative or controversial by the general public or key organizational stakeholders Viral online outrage can harm the reputation of an organization, regardless of whether the organization uses social media.

What is a key way that organizations use social media?

All of these: knowledge sharing human resources management contests and promotions viral marketing data analytics customer engagement

Which of the following best captures individuals' motivations for information security attacks?

All of these: pranking people stealing personal or financial data cyberwarefare protest hacking (hacktivism) intellectual property theft revenge (disgruntled employee)

Griefer

An internet vandal and mischief maker; also sometimes referred to as a troll

Which of the following statements is TRUE?

Because Facebook is private, most of its content is on the deep Web, which is Internet content that can't be indexed by Google and other search engines.

Contractual Commitments

Breaking contracts can lead to compensatory damages and harm an organization's reputation as a reliable partner

Financial Commitment

Can include investments in new equipment, the cost to acquire any new software, consulting, or expertise, and the devaluation of any investment in prior technologies no longer used

Strategies that Weaken Personal Cybersecurity Hygiene

Click the "Remember me" or "Save password" settings on a public computer. Write your passwords down on a sticky note. Use public computers (libraries, coffee shops) when accessing sites that contain your financial data or other confidential information. Always trust an email with a link that states it's from your manager. Use the same password on many websites. Turn on browser settings that will auto-fill fields with your prior entries (e.g., usernames, passwords, phone numbers), especially on devices that you share with others.

Messaging Services

Communicate with individuals or groups of users using short-format text, graphics, and video. Most messaging is done using mobile devices. Snapchat

According to a video in 11.5 of the textbook, the most dangerous type of false and misleading information that social media companies are trying to address is:

Content low in truth with a high intent to mislead (e.g., hoaxes, conspiracy theories)

Which of the following statements is TRUE about cybersecurity?

Cybersecurity breaches can most often be traced back to personnel or procedural (process) factors.

The best way to thwart a would-be phishing attack is: Check all that apply.

Don't click on login links shown in emails; login to the website directly. Stay alert when interacting with email. Don't open unexpected attachments or files.

Strategies that Strengthen Personal Cybersecurity Hygiene

Don't turn on risky settings, like unrestricted folder sharing. Pay attention when clicking links. Turn on software update features for your operating system and applications you use. Install security software (e.g., antivirus software, personal firewalls, malware scanners, etc.). Regularly backup your most important files practicing the 3-2-1 backup scheme. Correct answer:Don't give your password to anyone.

Organizations must be prepared to address and respond to the following situation(s) involving social media. Check all that apply.

Employees making anonymous posts on social media promoting the organization and disparaging competitors Employees posting content that could damage the organization's reputation Dissatisfied customers publishing negative feedback about the organization on social media Individuals with no relationship with the organization posting harmful content about an organizational employee or the organization itself

spear phishing

Employees of a medical center received e-mails from the head office manager, indicating that the recipient was being laid off and offering a link to job counseling resources. The link really offered a software payload that recorded and forwarded the keystrokes on the victim's PC.

astroturfing

Engineering the posting of positive comments and reviews of a firm's product and services (or negative ones of a firm's competitors).

Electronic Social Network

Facebook Online community that allows users to establish a personal profile, link to other profiles (i.e., friends), share content, and communicate with members via messaging, posts. Most personal relationships are reciprocal (i.e., both parties agree to be "friends").

Which of the following statements about Facebook and mobile is FALSE?

Facebook's was an early innovator and leader with mobile applications, out-competing Instagram in mobile photo sharing.

Search Costs

Finding and evaluating a new alternative costs time and money

Which of the following are TRUE statements?

Firms that want significant control over the operating system and applications they put 'in the cloud' should choose an IaaS service over an SaaS offering. Firms using SaaS products can dramatically lower several costs associated with the care and feeding of their information systems. Most organizations do not opt for IT configurations that are purely in-house, packaged, or SaaS models. A manager should take a vendor's reputation and financial position into consideration while making an IT outsourcing decision.

According to the textbook, what are ways that FreshDirect achieved competitive advantage over rivals? Check all that apply.

FreshDirect created an imitation-resistant value chain. Traditional grocers found it difficult to copy the firm's delivery business because this would have left them straddling two markets (low-margin storefront and high-margin delivery), unable to gain optimal benefits from either. FreshDirect was a first mover in the online grocery market, allowing the firm to develop brand, scale, data, and other advantages that newcomers lack.

Arguments AGAINST Net Neutrality

If all Internet traffic is treated equally, it's easier for illicit (offensive, dangerous, illegal) content to be widely available and more difficult to remove. No new infrastructure. If ISPs can't charge more for their services, they will have less incentive and fewer resources to invest in their infrastructure. From the perspective of ISPs, net neutrality does not allow them to prioritize some Internet services to provide better service to customers. Tiresome regulations. Under net neutrality, the FCC must monitor the ISPs' compliance with these rules. This includes submitting reports twice a year, which can become costly for ISPs of any size. From the perspective of ISPs, net neutrality allows Internet service firms (e.g., Google, Netflix, etc.) to "free ride" and earn huge profits by using ISP networks and infrastructure without funneling any of these profits to the ISPs that provide this infrastructure.

Software as a Service (SaaS)

In this scenario, the cloud firm manages the creation and deployment of software applications that are delivered online, while also managing the platform and infrastructure.

Infrastructure as a Service (IaaS)

In this scenario, the cloud firm usually manages the infrastructure (keeping the hardware and networking running), while the client has control over most other things (operating systems, storage, deployed applications, and perhaps even security and networking features like firewalls and security systems).

Platform as a Service (PaaS)

In this scenario, the cloud firm usually manages the platform (hosting, hardware, and supporting software), while the client has control over the creation and deployment of their applications.

Which is a best practice for physical security awareness?

Lock your computer screen and mobile devices every time you step away.

ransomware

Malware that encrypts a user's files (or perhaps threatens to delete them) and demands that a user pay to regain control of their data and/or device.

Arguments SUPPORTING Net Neutrality

No exclusion of content. Everything on the internet is available to everyone. No additional costs for content type whether you are streaming a video or gaming online. Small creators, such as YouTube channel creators, have a level playing field of having their content viewed. Freedom of Expression. ISPs won't censor the Internet. Startups have a greater chance of being successful with a web presence and having their content viewed.

Which of the following is a TRUE statement about websites, URLs, and phishing? Select all that apply.

One of the reasons one should be careful about clicking on any URL in an e-mail is that hackers can easily embed a redirection in e-mail links, rerouting a user to an alternate online destination. Phishing is one of the most common intrusion techniques used to spread malware. Hackers might infiltrate computer systems to enlist hardware for subsequent illegal acts. Spear phishing attacks specifically target a given organization or group of users.

legacy systems

Outdated information systems that were not designed to share data, aren't compatible with newer technologies, and aren't aligned with the firm's current business needs

Which of these would be an example of a DDoS attack?

Overloading a popular social networking site with inbound messages in order to shut down access to the site

prediction market

Polling a diverse crowd and aggregating opinions in order to form a forecast of an eventual outcome.

According to the lecture videos, which statements are TRUE regarding spreadsheets? Check all that apply.

Spreadsheets are useful for analyzing data. Spreadsheets are not an effective tool to use to store large amounts of organizational data long term for decision making.

What is an example of crowdsourcing, as described in your textbook? Select all that apply.

St. Louis Cardinals baseball team: The club's One for the Birds contest calls for the fans to submit scouting reports on promising players, as the team hopes to broaden its recruiting radar beyond its classic recruiting pool of Division I colleges. Mechanical Turk: An online marketplace where anyone with a task to be completed or problem to be solved can put it up for Amazon, setting their price for completion or solution. Walmart: The company set up a contest, providing a sample of historical sales data with potential influencing factors, including promotions, clearance sales, and price roll backs. Candidates were asked to build models that use these factors to forecast sales across various departments.

Loyalty Programs

Switching can cause customers to lose out on program benefits. Think frequent purchaser programs that offer "miles" or "points" (all enabled and driven by software).

Learning costs

Switching technologies may require an investment in learning a new interface and commands

According to section 16.4 of your textbook, which statements are TRUE about net neutrality? Select all that apply.

The Obama administration had largely supported Net neutrality, but the Trump administration removed most of these regulations. As a result, several states have attempted to enact their own rules favoring Net neutrality. Internet service firms (e.g., Google, Netflix) say they create demand for broadband business from ISPs (e.g., Comcast, AT&T), while broadband firms (e.g., Comcast, AT&T) say Internet service firms (e.g., Google, Netflix) are ungrateful parasites that aren't sharing the wealth.

crowdsourcing

The act of taking a job traditionally performed by a designated agent (usually an employee) and outsourcing it to an undefined, generally large group of people in the form of an open call.

Switching costs

The cost a consumer incurs when moving from one product to another. It can involve money spent, investments in time, any data loss, etc.

Regarding internet access speeds, countries such as bulgaria and lithuania rank higher than the us in mobile download performance

True

Hardware as a Service (HaaS)

Uncategorized answers

Info and data

Users may have to reenter data, convert files or databases, or even lose earlier contributions on incompatible systems

collaborative consumption

When participants share access to products and services rather than having ownership. Shared resources can be owned by a central service provider (e.g., Zipcar) or provided by a community that pools available resources (e.g., Airbnb, Uber).

Network effects

When the value of a product or service increases as its number of users expand. Also known as Metcalfe's Law, or network externalities.

What is a business process?

a series of steps taken to achieve a desired outcome or goal

The scalability of a software product is defined as the:

ability to be easily expanded to manage workload increases.

According to this video, a strategy you can use to resolve paradoxes (contradictory ideas and values) is the following:

account for time clarify levels of analysis (individual, society, organization) account for context introduce new ideas that can resolve the paradox

According to this module, people cope with the psychological stress associated with paradoxical ideas through defensive strategies, such as:

all of these: ignoring or denying the tensions resorting to understandings or actions that have provided comfort and security in the past forming or joining subgroups that align with one of the viewpoints blaming or scapegoating others for the tensions

Which of the following is an example of a security threat resulting from malicious human activity?

an employee who intentionally destroys data or other system components

https

application transfer protocol used in the Web address and stands for "hypertext transfer protocol secure."

Enterprise Software

applications that address the needs of multiple users throughout an organization or work group enterprise resource planning supply chain management customer relationship management

Enterprise software

applications that address the needs of multiple users throughout an organization or work group enterprise resource planning supply chain management customer relationship management

Technologies that measure and analyze human body characteristics for identification or authentication are known as ____________.

boimetrics

Hordes of surreptitiously infiltrated computers, linked and controlled remotely, are known as zombie networks or:

botnets

Neural networks are statistical techniques commonly used in machine learning that are modeled off the following human biological system:

brain

_________________ currently has the most internet users compared to any other country

china

When an organization creates its social media awareness and response team, it should:

create an interdisciplinary team from different functional areas, such as public relations, legal, marketing, customer support, human resources, and IT, among others

An attack on the U.S. power grid by terrorists or a foreign power is indicative of:

cyberwarfare

raw figures and facts. mortality rate

data

wikipedia.org

domain name with ".org" being the top level domain.

Social media can be a key driver of "________" media, where consumers who are enthusiastic about products and services can help spread the word through social media and word of mouth.

earned

Who would be included as an employee cybersecurity threat?

employees who sometimes do not follow security practices

physical parts of the technology that you can touch. memory card

hardware

en

host name indicating the computer hosting the website.

What is the root cause of almost every data breach?

human error

Which of the following is a benefit of in-house hosting (as compared to cloud hosting)?

in depth visibility of security and disaster preparedness for business continuity

data presented in context so that it can answer a question or support decision making and inferred from data and organized to have useful meaning

information

In any organization,

information security is everybody's responsibility.

According to the lecture videos, ERP systems focus primarily on integrating business processes

internal

The domain name service (DNS) is a distributed database that allows users to communicate with other computers by:

mapping host and domain names to IP addresses of computers.

A significant portion of Facebook's underlying technical infrastructure consists of ______________, which is software that is typically free and whose code can be accessed and potentially modified by anyone.

open source software

The BLANK controls the computer hardware and how computer resources are allocated and provides a means by which end users can interact with the computer.

operating system

In cloud computing, resources are said to be "pooled" because ________.

organizations share the same physical hardware through virtualization

According to the textbook, which of the following is NOT a strategy used by a firm to achieve and maintain competitive advantage?

packaged software

individuals who interact with information systems and are impacted by these systems. employees and customers

people

In the lecture videos, the Prada example shows that copying technology alone is not a guarantee of success. The firm would have benefited from a holistic understanding that Information Systems is comprised of the following components:

people, processes and technology (hardware, software, and data)

Two of the biggest considerations in the management of the facilities of a large data center include:

power and cooling

Desktop/Personal Software

presentation software computer games social media apps applications installed on a personal computing device, typically supporting tasks performed by a single user

In the United States, Section 230 of the Communications Decency Act defines social media companies like Facebook as a(n):

provider of content but not a publisher of content, releasing social media companies from liability for the user-generated content posted on their platforms.

According to lessons in Module 2, the following solution(s) can help us overcome our unconscious biases. Select all answers that apply.

set objective criteria to evaluate information seek out and be open to contradictory and differing views embed ourselves in diverse networks and embrace inclusive relationships

According to this module, one of the conditions that has not been widely supported in existing research to establish a causal link between social media use and addictions or other mental health conditions is the following:

social media use precedes the development of addictions or other mental health conditions

Technologies having the biggest impacts on Operations

supply chain management and automation

According to section 15.5 of your textbook, what is a characteristic of "data quality"? Check all that apply.

the data can be trusted the data is accurate, clean, complete, and reasonably free of errors

wiki

the path that maps to the folder location where the file is stored under the filename "Web_address"

The reason unscrupulous individuals use the unsophisticated method of Phishing or Spear Phishing emails are: Select all that apply.

to obtain private information to sell on the Dark Web to gain the login information of the targets (email recipients) to access the targets' (email recipients') financial credentials for financial gain

According to this module, some social media researchers express concerns that social media use is re-wiring our brains to shorten our attention spans, while other social media researchers caution that there is insufficient research to support these claims.

true

A(n) _____ is someone who uncovers computer weaknesses and reveals them to manufacturers or system owners, without exploiting these vulnerabilities.

white hat hacker

Put the SDLC phases in order from start to finish.

1.requirements 2.design 3.implementation 4.verification 5.maintenance

What is a TRUE statement about database management systems (DBMS)? Check all that apply.

A DBMS is sometimes referred to as database software, which is software for creating, maintaining, and manipulating data. Although the DBMS is considered application software, using the layer cake analogy, it's useful to think of an organization's database systems as layered on top of the operating system layer but under the (enterprise) application layer.

Data warehouse

A collection of databases structured for fast online queries and exploration, typically aggregating enormous amounts of data from many different operational systems

data mart

A database or databases focused on addressing the concerns of a specific problem or business unit

According to this module, what is a true statement about generational theory? Select all answers that apply.

A generational cohort shares important historical, cultural, and social events that shape its members' attitudes and dispositions throughout their lives A generational cohort shares major experiences and events that leave distinctive imprints on the cohort, manifested in espoused beliefs, values, and behaviors. This is especially true when these events are experienced at salient, early stages of life.

data cube

A special database used to store data in OLAP reporting

According to the textbook and lecture videos, what is an example of positive outcomes associated with the use of AI?

All of these: Use of AI can improve employee retention by uncovering patterns of those most likely to leave. Use of AI can predict cancer survival better than humans. Use of AI can automate many tasks, providing convenience to consumers and cost savings for organizations.

The assigned chapter discusses various sources of internal and external data that an organization collects, stores, and analyzes for strategic decision making. Which is an example of a data source discussed in the chapter?

All of these: focus groups transaction processing system sensor data social media surveys enterprise systems data aggregators call center conversations

According to lessons in this module, the following statement best describes careers in information systems.

Careers in information systems can fall on either business or technical tracks and often combine both business/soft and technical skills

What is the difference between on-premises enterprise software and cloud-based enterprise software?

Cloud-based enterprise software is hosted on the vendor's servers and accessed through a web browser, whereas on-premises enterprise software is installed locally, on a company's own computers and servers.

Technologies having the biggest impacts on Finance

Computer-automated trading and robo-advisors

According to your textbook, how are artificial intelligence, machine learning and deep learning related?

Deep learning is a subcategory of machine learning, which is a subset of artificial intelligence.

Google is the world's largest provider of cloud computing services?

False

According to the module videos and textbook, which of the following is an example of how organizations can develop and deploy more ethical and less risk-prone information systems? Select all that apply.

Increase diversity in information systems development and management teams Hire ethicists Create a systems review board Develop a code of technology ethics

According to the textbook and lecture videos, what is a risk or challenge associated with use of AI? Select all that apply.

Insufficient and inconsistent data will inhibit AI use. Potential for negative unintended consequences of data misuse Consumers and employees may feel their information privacy is compromised. Employees may resist AI systems in the workplace because AI could significantly alter their jobs. Potential for AI algorithms to yield biased predictions and results

According to this module, what is a true statement about "people" in information systems? Select all answers that apply.

Learning how to work effectively with people from diverse backgrounds is a critical soft skill that information systems professionals should learn and maintain. Technology implementation failures in organizations are more likely to stem from problems with "people" (e.g., end users, project managers) rather than poorly designed technology. People create and manage the technology and process components of information systems; this is one reason it's important to understand the "people" component of information systems.

Nonvolatile memory

Solid state drive Does not require power to retain stored data and info long term storage

Primary Components/Activities

Support—service, maintenance, and customer support Inbound logistics—getting needed materials and other inputs into the firm from suppliers Outbound logistics—delivering products or services to consumers, distribution centers, retailers, or other partners Operations—turning inputs into products or services Marketing and sales—customer engagement, pricing, promotion, and transaction

data lake

Systems that allow for the storage of data in both structured and unstructured ("raw," "unfiltered") formats

Transaction processing systems

Systems that record a transaction (i.e., a form of business-related exchange), such as a cash register sale, ATM withdrawal, or product return

Secondary Components/Activities

Technology / research and development—new product and process design Human resource management—recruiting, hiring, training, and development Procurement—sourcing and purchasing functions Firm infrastructure—functions that support the whole firm, including general management, planning, IS, and finance

Which statements are TRUE about the Disney MagicBand? Select all that apply.

The MagicBand allows Disney to collect various real-time data that it can use to personalize and improve services for guests. Thanks to Moore's Law, while Disney initially incurred manufacturing costs of $35 per MagicBand, these costs are now below $5. MagicBand and supporting systems have increased revenues from guest spending and boosted efficiencies that resulted in serving thousands of additional guests per day.

big data

The massive amounts of data available to today's managers, often unstructured and are too big and costly to easily work through use of conventional databases

data mining

The process of using computers to identify hidden patterns and to build models from large data sets

Which statements are FALSE regarding the reasons managers should pay attention to Moore's Law? Check all that apply.

The rising power of minicomputers mitigates the need of outsourcing in many firms. Cost decreases often encourage governmental regulation of suppliers.

According to the textbook, which of the following is true of United States environmental legislation regarding e-waste and recycling standards?

There is no U.S. federal legislation signed into law covering e-waste.

A customer relationship management system is ________. Choose the best answer.

a system for managing all the interactions with the customer, from lead generation to customer service

massive parallel processing

a technique in which computers are designed with many microprocessors that work together, simultaneously, to solve problems

According to the textbook, after the initial problematic roll-out of the Healthcare.gov app, a team of seasoned technologists and committed developers worked on fixing the system using a(n) ____________ methodology and led the web app to exceed enrollment projections.

agile

According to the lessons in this module, our unconscious mind can determine:

all of these: where we sit who we choose to help who we turn to for advice who we eat lunch with

Disadvantages of Open Source Software

availability of support control over development and quality cost of support services and add ons

For some industries where the products are commodities, the Internet has afforded customers increased price transparency of these products, thereby increasing the

bargaining power of buyers

According to the textbook, due to widespread access to simple, affordable handheld devices in East Africa's Somaliland, the country's economy is fast becoming:

cashless

cluster computing

connecting server computers via software and networking so that their resources can be used to collectively solve computing tasks

Advantages of Open Source Software

cost of software time of market security reliability scalability

Chapter 1 covers the following novel application(s) of drone technology.

crop surveying in farming that can inform ways to improve crop yields and delivering medical supplies to rural, underserved communities

raw facts and figures and comes before information and knowledge

data

Information silos arise as a result of ________________.

data being isolated in separated systems

Structured data

data mart data warehouse relational database SQL data is stored in conventional formats

to the organization, whereas SRM, SCM, and CRM tend to focus on integrating business processes

external

According to the lecture video, "Overview of Artificial Intelligence," one of the differences between data and information is the following:

facts versus risk reduction

According to the video "Artificial Intelligence Overview from Fortune Brainstorm Films" in Chapter 1, artificial intelligence could contribute up to $15.7 billion to the global economy in 2030.

false

Storage

flash memory hard drive RAM-random access memory

Disadvantages of ERP Systems

implementations can be costly and time consuming (sometimes spanning years) standardized processes in the commercial software means the processes are not unique and may not provide competitive advantage customizations can be costly and difficult to maintain when upgrading the software users tend to resist new implementations because these systems tend to substantially change their jobs implementations are often large-scale change projects because processes typically have to be modified to fit the software rather than customizing the software to fit existing processes failed implementations can cost a company millions of dollars and sometimes bankrupts companies

Advantages of ERP Systems

increased visibility into an organization's business processes ERP software vendors tend to embed industry best practices into their software "single source of truth" with data stored in a single, centralized database--allowing for powerful analytics and decision making operational efficiency and effectiveness standardization and integration of business processes easier to connect systems with external organizations, facilitating mergers and acquisitions

combined with information to make stronger decisions and insight derived from experience and expertise

knowledge

Timing and technology alone will not yield sustainable competitive advantage. Moving first pays off when the time lead is used to create critical resources that are _______. Check all that apply.

lacking in substitutes tough to imitate valuable rare

According to the lecture videos and textbook, machine learning involves the following: Select all that apply.

learning through data and experience use of algorithms

Technologies having the biggest impacts on human resources

linkedin and resume database software

According to the lecture videos, there is _______________ in the telecommunications industry (e.g., Verizon, AT&T) in the United States.

low threat of new entrants

According to chapter 1, the following technologies are creating radical shifts in different industries and business disciplines

machine learning, cloud computing, 3d printing, artificial intelligence

Input

microphone sensors on smart devices touchpad

Output

monitor or screen speaker printer

According to the lecture video, which AI tools do Apple's Siri and Android's Google Assistant rely on? Select all that apply.

natural language processing machine learning

According to Michael Porter, the reason many firms perform poorly compared to their competitors is because they've defined themselves according to

operational effectiveness (performing the same tasks better than rivals) rather than strategic positioning-(performing different tasks than rivals or the same tasks in a different way).

According to the lecture videos, what contributes the most to the risk and challenges of implementing ERP systems?

people and processes

Technologies having the biggest impacts on Marketing

personalization systems and customer relationship management

Desktop software

presentation software computer games social media apps applications installed on a personal computing device, typically supporting tasks performed by a single user

purchasing a product. steps taken to achieve desired goals

process

In one of the videos, the guest speaker Greg Watkins referred to a stereotype that people who are "techies" or who are drawn to anime and video games are perceived to be most suitable for information systems careers. This stereotype is an example of: (choose the best answer choice)

prototype bias

Social media has been used for

recruiting, social protests, reputation management, word of mouth marketing, and spreading fake news

Cloud computing

refers to replacing traditional computing resources with services provided over the Internet

According to lessons in this module, the following solution(s) can help us overcome our unconscious biases. Select all answers that apply.

seek out and be open to contradictory and differing views set objective criteria to evaluate information embed ourselves in diverse networks and embrace inclusive relationships

Data is oftentimes considered a defensible source of competitive advantage; however, advantages based on capabilities and data that others can acquire will be

short lived

Volatile memory

short term storage RAM Requires power to retain stored data or info

What are some of the novel technologies presented in Chapter 5? Select all that apply.

smart license plate that contacts emergency services when a car crashes smart umbrella that receives weather reports wirelessly and flashes when rain is expected smart diaper that sends a tweet when the sensor detects moisture smart billboards that detect people's demographics as they walk by in order to change its advertising to target these demographics

Unstructured data

social media approx 80% of corporate data sensor data email more often associated with "big data"

instructions that tell the hardware what to do. web browser

software

According to this module, a digital native is:

someone who has been exposed to widespread adoption and diffusion of digital technologies, such as the internet, from a young age

Grid computing

special software is installed on several computers enabling them to work together on a common problem.

According to your textbook, a scrum team repeats or reiterates its efforts in ____________, which are short time-boxed increments, each increment usually lasting 1-6 weeks.

sprints

According to lessons from this module, one reason that people possess unconscious biases is the following: (choose the best answer)

the human brain receives millions of pieces of information each second and can only process a small fraction of this information, so it relies on mental shortcuts to make decisions

The founders of tech firms Microsoft, Dell, Facebook, Apple, Google, Instagram, Yahoo!, Snapchat, YouTube, Dropbox, Box, and Spotify all have the following in common:

they were all in their 20's when they found these tech firms

A firm should be wary of adopting software packages or outsourcing portions of its value chain that are proprietary and a source of competitive advantage. Correct answer:

true

According to the lecture videos and your textbook, deep learning involves multiple layers of interconnections among data to identity patterns and predict results and uses _______________. Select all that apply.

unlabeled data unstructured data

According to the lecture videos and textbook, what are examples of artificial intelligence applications? Select all that apply.

virtual backgrounds in conferencing apps like Zoom McDonald's use of digital drive-thru menus iRobot Roomba voice analysis software to detect employees' "compassion fatigue" CAPTCHA robo-journalists IBM Watson


Kaugnay na mga set ng pag-aaral

Intro to Nutrition & Wellness Midterm

View Set

Pharm Chapter 42: Drugs Used to Treat Glaucoma and Other Eye Disorders

View Set

Ethical and Legal Domains for Professional Nursing EAQ

View Set

Biology SL - Chapter 2 - Molecular Biology

View Set

Adaptive Learning: Online Learning

View Set

Gold Coast RE 1001 Cram, Practice Math and Final Exam

View Set