GBU 321 Final

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

_____ is a term describing the extensive use of data, statistical and quantitative analysis, explanatory and predictive models, and fact-based management to drive decisions and actions.

Analytics

griefer

Internet vandal and mischief maker; also sometimes referred to as a troll.

_____ refers to the ratio of a company's annual sales to its inventory.

Inventory turnover ratio

What is the likely implication of a large and active wiki community?

It becomes more likely that content is up-to-date and errors are quickly corrected.

Which of the following sets of software represents the constituents of the LAMP stack?

Linux, Apache, MySQL, Perl

In the context of the Netflix case, _____ refers to an extremely large selection of content or products.

Long tail

_____ refers to a phenomenon whereby firms can make money by offering a near-limitless selection.

Long tail

low latency

Low delay

Facebook was founded by _____.

Mark Zuckerberg

What problem is faced by multicore processors running older software written for single-brain chips?

Multicore processors usually run older software by using only one core at a time.

shawn fanning's _______ was widely criticized as a piracy playground

Napster

Search engine marketing

SEM. The practice of designing, running and optimizing search engine ad campaigns

_____ is a form of cloud computing where a firm subscribes to a third-party software and receives a service that is delivered online.

Software as a service

vertical niches

Sometimes referred to as vertical markets. Products and services designed to target a specific industry (e.g., pharmaceutical, legal, apparel retail).

A professional or student looking for guidance with a programing problem is likely to be best be served by posting questions to:

StackOverflow

_____ was just twenty-one when he founded Apple.

Steve Jobs

A firm's financial performance that consistently outperforms its industry's peers is known as _____.

Sustainable competitive advantage

Which of the following factors is responsible for the possibility of Moore's Law?

The distance between pathways inside silicon chips gets smaller with each successive generation.

random-access memory (RAM)

The fast, chip-based volatile storage in a computing device.

Which of the following statements relating to open source software is true?

The flagship OSS product is the Linux operating system, now available on all scales of computing devices.

black swans

Unpredicted, but highly impactful events. Scalable computing resources can help a firm deal with spiking impact from Black Swan events. The phrase entered the managerial lexicon from the 2007 book of the same name by Nassim Taleb.

(T/F) Most firms spend 70 to 80 percent of their information systems (IS) budgets just to keep their systems running.

True

(T/F) Moving first plays a significant role in markets influenced by network effects.

True

(T/F) Netflix was forced to increase advertising due to price wars with Wal-Mart and Blockbuster.

True

(T/F) Once Netflix became a public company, financial rules forced the firm to reveal it was on a money- minting growth tear.

True

(T/F) Organized crime networks now have their own R&D labs and are engaged in sophisticated development efforts to piece together methods to thwart current security measures.

True

(T/F) Physical retailers are limited by shelf space and geography.

True

(T/F) Regional anti-trust authorities may consider product bundling by dominant firms to be anticompetitive.

True

(T/F) Regularly updated software lowers a system's vulnerable attack surface.

True

(T/F) The data a firm can leverage is a true strategic asset when it is rare, valuable, perfectly imitable, and lacking in substitutes.

True

(T/F) The higher the value of a user's overall investment, the more they are likely to consider the staying power of any offering before choosing to adopt it.

True

(T/F) The information systems of several firms have been compromised by contract employees, cleaning staff, and temporary staffers.

True

(T/F) The typical Web user has 6.5 passwords, each of which is used at four sites, on average.

True

(T/F) Web sites of reputed companies can also be sources of malware.

True

Data analytics and business intelligence are driving discovery and innovation.

True

Firms may want to use ARM chips because they draw less power than Intel chips.

True

Today's job seekers are writing résumés with keywords in mind, aware that the first cut is likely made by a database search program, not a human being.

True

_____ is a term that refers to a precise set of instructions that tells the computer hardware what to do. a. Mnemonics b. Malware c. Botnets d. Software e. Desktop

D

Which of the following technologies is being used to replace the older EDI for specifying data standards?

Extensible markup language

(T/F) In the absence of network effects, the value of a product or service increases as the number of users grows.

False

(T/F) In the context of network effects, the term "network" refers to wireless systems that connect pieces of electronics.

False

(T/F) Lobbying for legislation that imposes severe penalties on crooks can help lower adversary costs.

False

(T/F) Logistics is a term describing the extensive use of data, statistical and quantitative analysis, explanatory and predictive models, and fact-based management to drive decisions and actions.

False

(T/F) Most APIs and Web services send messages where the data exchanged is wrapped in identifying EDI tags.

False

(T/F) Multiple administrators jointly controlling key systems are an unnecessary burden that adds to the complexity of managing security in an organization.

False

(T/F) Netflix gets to retain the entire subscription revenue for every disk sent out to a customer.

False

(T/F) Netflix's attempt to rebrand its DVD-by- mail service as Qwikster was moderately successful.

False

(T/F) Netflix's clout has earned it strong-arm bullying power comparable to Wal-Mart's.

False

(T/F) Netflix's decision to unbundle the single fee for its $10 base service into two separate $8 plans for DVD-by- mail and streaming over the Internet proved to be beneficial to the firm.

False

(T/F) Offering financial or valuable incentives to gain information, access, or favors is a proven method used by social engineering experts.

False

The language "http" is used to create and format Web pages.

False

One of the factors that accelerated the development of the Internet during the 1990s was:

the invention of graphical Web browsing.

A _____ refers to a list of a blogger's favorite sites, often displayed on the right or left column of a blog's main page.

blog roll

A(n) _____ is the symbolic embodiment of all the information connected with a product or service.

brand

Systems that use data created by other systems to provide reporting and analysis for organizational decision making are called _____ systems.

business intelligence

Firmware refers to:

control software stored on nonvolatile memory chips.

Microsoft's Xbox operating system provides Xbox programmers with a set of common standards to use to access controllers, the Kinect motion sensor, play sounds, draw graphics, save files, and more. Without this, games would:

cost more

One of the implications of price elasticity of technology products is that:

customers buy more products as they become cheaper.

One area where open source software contributions have been virtually non-existent is in tools to support the massive file systems used in so-called Big Data projects.

false

One of the drawbacks of open source software is that it cannot be easily migrated to more powerful computers as circumstances dictate.

false

Peer production and social media fall under the Web 1.0 umbrella.

false

while process redesign, supply chain management, and factory automation are all tech-centric operations, service operations are not

false

A unit of data forwarded by a network is called a _____.

packet

Internet networks are _____.

packet-switched networks

_____ provide the standards, syntax, statements, and instructions for writing computer software.

programming languages

Multicore processors are formed by:

putting two or more lower power processor cores on a single chip.

Price elasticity refers to the:

rate at which demand for a product or service fluctuates with price change.

firmware

software stored on nonvolatile memory chips (as opposed to being stored on devices such as hard drives or removable discs). Despite the seemingly permanent nature of firmware, many products allow for firmware to be upgraded online or by connecting to another device

Spiders, web crawlers, software robots

software that traverses Available web links in an attempt to perform a given task. search engines use spiders to discover documents for indexing and retrieval

Migrating from commercial database products to MySQL's open source alternative is relatively easy because:

they are based on the same standard.

Vendors who use open source as part of their product offerings can expect to bring new products to the market faster because:

they can skip whole segments of the software development process.

Linus Torvalds created the Linux operating system.

true

Technology plays the most significant role in shaping and reshaping Porter's five forces.

true

Scroll bars and menus displayed on the hardware of the computer display are examples of a graphical _____.

user interface

Peer production refers to:

users collaboratively working to create content, products, and services.

Oracle, a firm that sells commercial ERP and database products, provides Linux for free, selling high-margin Linux support contracts for as much as five hundred thousand dollars. Oracle's motivation for this lies in:

using open source software to wean customers away from competitors.

Which of the following statements about blogging is true?

Blog comments can be a hothouse for spam and the disgruntled.

Keylogging is the practice of doing what?

Covertly tracking the keys typed on a keyboard

What does DDoS stand for?

Distributed Denial-of-Service Attacks

_____ are model building techniques where computers examine many potential solutions to a problem, iteratively modifying various mathematical models, and comparing the mutated models to search for a best alternative. a. Expert systems b. Ad hoc reporting tools c. Iterative mutations d. Sampled alliterations e. Genetic algorithms

E

Impression

Each time an added service to a user for viewing

Which of the following is true of the term Internet backbone?

It refers to high-speed data lines provided by many firms all across the world that interconnect and collectively form the core of the Internet.

Which of the following is an example of application software?

MS Word

_____ refers to software that is free and that anyone can look at and potentially modify the code.

Open source software

Which of the following is an example of volatile memory?

Random-access memory

______ refers to a third-party software-replacing service that is delivered online. It typically requires the least amount of support and maintanence.

Saas

Which oil nation's domestic oul company was hit by a devasting cyber attack that wrecked 30,000 workstations in the business side of its operations?

Saudi Arabia

fabs

Semiconductor fabrication facilities; the multibillion dollar plants used to manufacture semiconductors.

Third party cookies

Tracking cookies

What company in October 2006, paid hackers $100,000 to delete the data stolen and keep mum about it?

Uber

NFC

Using your phone as a credit card

_____ are highly restrictive programs that permit communication only with approved entities and/or in an approved manner.

Whitelists

What is a WISP?

Written information security policy

server

a program that fulfills the requests of a client

scalability

Ability to either handle increasing workloads or to be easily expanded to manage workload increases. In a software context, systems that aren't scalable often require significant rewrites or the purchase or development of entirely new systems.

What is AUP?

Acceptable use policy

Programs that deny the entry or exit of specific IP addresses, products, Internet domains, and other communication restrictions are known as: a. intrusion detection software. b. access restriction software. c. whitelists. d. anti-virus software. e. blacklists.

E

(T/F) A study by Gartner Research claims that the amount of data on corporate hard drives doubles every eighteen months.

False

(T/F) The costs associated with streaming digital content largely remain fixed.

False

10. _____ is a term used by the trade press and consultants to refer to customers who are tightly anchored to a firm. a. Butterflies b. Parasites c. Sticklers d. Barnacles e. Anemones

D

16. A market is said to be _____ if it derives most of its value from a single class of users. a. a pure play b. a long tail c. core competent d. one-sided e. convergent

D

in two decades, the nation of _____ tech sector has grown from "almost nothing" to a $73 billion industry, expanding even during the recent global recession

India's

Policies, procedures, and technical measures used to prevent unauthrized access, alteration, theft, or physical damage to information systems

Information Security

What are the implications for firms that do not have common database systems with consistent formats across their enterprise?

They struggle to manage their value chain efficiently.

Which of the following statements holds true with respect to blogs?

Top blogs operating on shoestring budgets can snare several hundred thousand dollars a month in ad revenue.

A(n) _____ is a term used to describe some form of business exchange.

Transaction

Systems that record a transaction (some form of business-related exchange), such as a cash register sale, ATM withdrawal, or product return are referred to as _____.

Transaction Processing Systems

(T/F) Java is not preferred for programming desktop applications.

True

(T/F) Network effects that attract too many users result in a service being so overwhelmed it becomes unusable.

True

(T/F) Random occurrences in data mining results can be detected by dividing the data and building a model with one portion and using another portion to verify the results.

True

(T/F) The ISO 27000 series of evolving standards represent the set of best practices for developing and improving organizational security.

True

(T/F) The collaborative filtering software developed by Netflix is not a source of competitive advantage to the firm.

True

According to the resource-based view of competitive advantage, if a firm is to maintain a sustainable competitive advantage, it must control a set of resources that have four critical characteristics. Which of the following is one of those characteristics?

Valuable

_____ are individuals often employed by organizations to review community website content in order to prune excessive contributions, move commentary to the best location, and edit as necessary.

Wikimasters

In _____, the light inside fiber is split into different signal-carrying wavelengths in a way similar to how a prism splits light into different colors.

dense wave division multiplexing

A trademark is the symbolic embodiment of all the information connected with a product or service of a firm.

false

According to Michael Porter, the reason many firms suffer margin-eroding competition is because they have defined themselves according to strategic positioning rather than operational effectiveness.

false

Hardware clouds are pools of computing resources that reside inside an organization and that can be served up for specific tasks as need arises.

false

ISPs and IXPs that carry out peering are required by the FCC to charge each other fees based on their traffic contribution.

false

Technology experts in the area of user-interface design specialize in technology for competitive advantage

false

The United States holds the number one ranking in home broadband access.

false

When the Internet really took off, much of the Internet's operating infrastructure transitioned to be supported by government grants rather than private firms.

false

Less popular open source products are not likely to attract the community of users and contributors necessary to help improve these products over time. This situation reiterates the belief that _____ are a key to success.

network effects

_____ exist when a product or service becomes more valuable as more people use it.

network effects

Installing a complex set of an organization's legacy systems on third-party hardware can be a brutal challenge. For that reason we can expect most cloud computing efforts to focus on:

new software development projects.

web services

Small pieces of code that are accessed via the application server which permit interoperable machine-to-machine interaction over a network.

Con games that trick employees into revealing information or performing other tasks that compromise a firm are known as _____ in security circles.

Social Engineering

_______ has emerged as a catalyst for global change, with Facebook and Twitter playing key organizing roles in uprisings worldwide

Social media

Zombie networks

Sometimes called click bots or botnets, these are hordes infiltrated computers linked and controlled remotely.

compile

Step in which program code written in a language that humans can more easily understand, is then converted into a form (expressed in patterns of ones and zeros) that can be understood and executed by a microprocessor. Programmers using conventional programming languages must compile their software before making it available for execution.

volatile memory

Storage (such as RAM chips) that is wiped clean when power is cut off from a device

nonvolatile memory

Storage that retains data even when powered down (such as flash memory, hard disk, or DVD storage).

_________ may be an existing technology that has matured and/or become suitable for a wider range of uses. It may also be an emerging technology that offers an opportunity for strategic business advantage for early adopters or with potential for significant market disruption in the next five years.

Strategic Technology

_____ is a language used to create and manipulate databases.

Structured Query Language (SQL)

_____ systems help a firm manage aspects of its value chain, from the flow of raw materials into the firm, through delivery of finished products and services at the point-of- consumption.

Supply Chain Management

Changing the letter case when typing in host and domain names does not affect the user's ability to reach the destination.

TRUE

Cloud computing refers to:

replacing computing resources with services provided over the Internet.

Many telecom firms began digging up the ground and laying webs of fiberglass to meet the growing demand for Internet connectivity. However, rivals and startups began to imitate these firms and soon these new assets were not so rare and each day they seemed to be less valuable. It can be inferred from this example that:

resource-based thinking can help avoid the trap of carelessly entering markets simply because growth is spotted.

Which of the following refers to a feature of wikis that allows the restoring of earlier work in the event of a posting error, inaccuracy, or vandalism?

roll back

One of the functions of the IP is to:

route message packets to the final destination.

A(n) _____ is a computing device that connects networks and exchanges data between them.

router

Which of the following is one of the characteristics of using software as a service model?

scalable systems

Benefits related to a firm's size are referred to as _____.

scale advantage

Which of the following represents one of the sources of switching costs?

search costs

A strong brand can be an exceptionally powerful resource for competitive advantage by lowering ________, proxying _____ and inspiring _____.

search costs; quality; trust

_____ are substances that are capable of enabling as well as inhibiting the flow of electricity.

semiconductors

Vendors frequently sign _____ with their customers to ensure a guaranteed uptime and define their ability to meet demand spikes.

service level agreements

Devices without moving parts are often described as ___________.

solid state

Semiconductor-based devices are also known as _____.

solid state electronics

database management system (DBMS)

sometimes referred to as database software; software for creating, maintaining, and manipulating data

Grid computing is a type of computing in which:

special software is installed on several computers enabling them to work together on a common problem.

Businesses benefit from economies of scale when the cost of an investment can be:

spread across increasing units of production.

A firm is said to be _____ when it attempts to match the benefits of a successful position while maintaining its existing position.

straddling

_____ refers to performing different tasks than rivals or the same tasks in a different way.

strategic positioning

technology experts in the area of _____ specialize in technology for competitive advantage

strategy

The Internet has no center and no one owns it.

true

_____ is the insulated copper cable commonly used by cable television providers with shielding to reduce electrical interference.

Coaxial cable

Web browsers and Web servers

It refers to the language used to create and format Web pages.

Professionals looking to create a collaborative space where all members of a team can share learning, post agenda items, and maintain project documents would most likely choose:

A wiki tool or service

Pay per click

A concept for advertisers don't pay less someone clicks on their ad

Affiliate program

A cost per action program, were program sponsors pay referring websites a percentage of revenue earned from the referral

information asymmentry

A decision situation where one party has more or better information than its counterparty

capability maturity model integration (CMMI)

A process-improvement approach (useful for but not limited to software engineering projects) that can assist in assessing the maturity, quality, and development of certain organizational business processes, and suggest steps for their improvement.

software package

A software product offered commercially by a third party.

intersitials

Ads that run before user arrives at a websites content

bitcoin

An open-source, decentralized payment system (sometimes controversially referred to as a digital, virtual, or cryptocurrency) that operates in a peer-to-peer environment, without bank or central authority.

One contributor to the ease with which young entrepreneurs can have success is low-cost distribution to massive markets worldwide. This is enabled by:

App Stores

Another reason fueling the boom in fast-growing technology services is ___________________, which, when done right, can virally spread awareness of a firm with nary a dime of conventional ad spending.

App stores

ASP stands for _____

Application Service Providers (aka SaaS)

desktop software

Applications installed on a personal computer, typically supporting tasks performed by a single user.

owned media

Communication channels that an organization controls. These can include firm-run blogs, Web sites, apps, and organization accounts on social media such as Twitter, Facebook, Pinterest, YouTube, and Instagram.

Attacks that exhaust all possible password combinations in order to break into an account are called _____ attacks. a. strong arm b. permuted c. brute-force d. zero-day e. infinity

C

Hordes of surreptitiously infiltrated computers, linked and controlled remotely, are known as zombie networks or: a. honeypots. b. zombots. c. botnets. d. blacklists. e. megabots.

C

Which of the following is an example of a user interface? a. Hard disk b. Printer c. Touch screen d. Operating system e. Desktop software

C

The ability to take advantage of complementary products developed for a prior generation of technology is known as _____.

Backward compatability

the nation of ______ has more Internet users than any other country

China

A(n) _____ is a software program that makes requests of a server program.

Client

_________ refers to replacing computing resources -- of either an organization or individual's hardware or software -- with services provided over the Internet

Cloud Computing

Fault-tolerant

Capable of continuing operation even if a component fails

image ads

Graphical advertising

The acronym HFT refers to:

High Frequency Trading

Dark web

Internet content that can't be indexed by Google and other search engines

strategic positioning

Performing different tasks than rivals, or the same tasks in a different way

This cloud infrastructure is operated solely for an organization. It may be managed by the organization or a third party and may exist on premise or off premise.

Private Cloud

The protocol used for exchange of mail between e-mail servers across the world is called _____.

Simple Mail Transfer Protocol

roll back

The ability to revert a wiki page to a prior version. This is useful for restoring earlier work in the event of a posting error, inaccuracy, or vandalism.

crowdsourcing

The act of taking a job traditionally performed by a designated agent (usually an employee) and outsourcing it to an undefined generally large group of people in the form of an open call.

price elasticity

The rate at which the demand for a product or service fluctuates with price change. Goods and services that are highly price elastic (e.g., most consumer electronics) see demand spike as prices drop, whereas goods and services that are less price elastic are less responsive to price change (think heart surgery).

Content adjacency problems

The situation where ads appear alongside text that advertise or would like to avoid

Market capitalization

The value of a firm calculated by multiplying in share price by the number of shares. Market cap

Which of the following is one of Porter's five forces?

Threat of new entrants

economies of scale

When costs can be spread across increasing units of production or in serving multiple customers. Businesses that have favorable economies o f scale (like many Internet firms) are sometimes referred to as, being highly scalable.

Independent computer programs that copy themselves from one computer to other computers over a network

Worm

n00b

Written with two zeros, pronounced "newb." Geek-slang (leet speak) derogatory term for an uninformed or unskilled person.

The scalability of a software product is defined as the:

ability to be easily expanded to manage workload increases.

scale advantages

advantages related to size

neutral point of view (NPOV)

an editorial style that is free of bias and opinion; wikipedia norms dictate that all articles must be written this way

steve chen and chad hurley are credited as the founders of

youtube

15. A firm can spend no money and time yet expect to enhance its offerings, by: a. allowing other firms to contribute to its platform. b. going public through an initial public stock offering. c. outsourcing critical processes to third parties. d. adopting an envelopment strategy. e. preannouncing a forthcoming product to lower sales of current offerings.

A

22. A market dominated by a small number of powerful sellers is known as a(n) _____. a. oligopoly b. pure play c. short tail d. blue ocean e. greenfield

A

25. Visualix, a firm that leads the developed world in its sales of video game consoles and related software, has decided to enter the yet untapped market of some developing countries. These countries do not have a well established network to sell such products. Which of the following strategies should Visualix adopt in order to succeed in its new markets? a. Launch its own retail stores that sell the consoles and the games b. Sell its consoles at a subsidized price via the existing retail network c. Use the existing distribution network in order to reduce its entry costs d. Ensure that its products are sold at a premium price to a niche market in these countries e. Preannounce its plans to enter these markets

A

32. Nokia is a cell phone brand that offers digital cameras as part of its cell phone products. It is now in direct competition with camera brands such as Canon and Sony, and has become the world's largest seller of cameras. This is an example of: a. envelopment. b. product customization. c. market diversity. d. product development. e. market innovation

A

36. A(n) _____ is a product that allows a firm to tap into the complementary products, data, or user base of another product or service. a. adaptor b. plug-in c. emulator d. add-on e. transcriber

A

Sarbanes-Oxley Act

Also known as Sarbox or SOX; U.S. legislation enacted in the wake of the accounting scandals of the early 2000s. The act raises executive and board responsibility and ties criminal penalties to certain accounting and financial violations. Although often criticized, SOX is also seen as raising stakes for mismanagement and misdeeds related to a firm's accounting practices.

LAMP

An acronym standing for (L)inux, the (A)pache Web server software, the (M)ySQL database, and any of several programming languages that start with (P) (e.g., Perl, Python, or PHP).

integrated development environment (IDE)

An application that includes an editor (a sort of programmer's word processor), debugger, and compiler, among other tools.

linux

An open source software operating system.

_____ are programming hooks or guidelines, published by organizations, that tell how other programs can get a service to perform a task, such as send or receive data.

Application programming interfaces

enterprise software

Applications that address the needs of multiple users throughout an organization or work group.

private

As in "to go private" or "take a firm private." Buying up a publicly traded firm's shares. Usually done when a firm has suffered financially and when a turn-around strategy will first yield losses that would further erode share price. Firms (often called private equity, buyout, LBO, or leveraged buyout firm) that take another company private hope to improve results so that the company can be sold to another firm or they can reissue shares on public markets.

straddaling

Attempts to occupy more than one position, while failing to match the benefits of a more efficient, singularly focused rival.

13. eBay auctions more books over its portal than any of its rivals. Similarly, Second Life has more virtual storefronts than its rivals. This is because: a. their offerings are associated with high total costs of ownership. b. they offer greater market reach and benefits to customers. c. their respective markets are marked by intense competition between rivals. d. they have subsidized the initial adoption of their offerings to lure more customers. e. they enjoy a greater price advantage over their rivals and can leverage this to increase profitability.

B

20. Network effects are characterized by a positive-feedback loop, where the biggest networks continue to grow bigger. What implication does this positive-feedback loop have for network markets? a. Formation of alliances to counter the growing influence of dominant firms b. Early, fierce competition between rivals c. Loss of revenue for market leaders due to arrival of new entrants d. Emergence of several firms that constantly swap market dominance e. Shrinking of market size due to the ambivalent nature of competition

B

38. Large firms often find new markets attractive, but might not have products ready for delivery. What strategy do such firms use to get potential adopters to delay their purchasing decisions? a. Preannounce forthcoming efforts b. Make their new products compatible with the leading standard c. Spread costs across increasing units of production or in serving multiple customers d. Give away products for half of a two-sided market to seed the market e. Leverage customers of their other products to promote a new product

A

An application server is software that: a. houses and serves business logic for use by multiple applications. b. makes requests of a server program for data or addresses. c. creates, maintains, and manipulates data for analysis by users. d. allows for the development and integration of software products. e. controls the computer hardware and establishes standards for developing and executing applications.

A

Android is a software product developed by Google that allows cell phone manufacturers to control hardware and establish standards for developing and executing applications on its platform. Android is thus an example of a(n) _____. a. operating system b. programming language c. user interface d. embedded system e. database management system

A

At traditional brick and mortar retailers, _____ is the biggest constraint limiting a firm's ability to offer customers what they want when they want it. a. shelf space b. video piracy c. shipping costs d. distribution rights e. disintermediation

A

By going public, Netflix encountered stiff competition from firms such as Wal-Mart and Blockbuster. What aspect of Netflix going public lured these firms into the market? a. Financial disclosure laws revealed the profitability of Netflix's business model. b. By going public, Netflix was forced to reveal the Cinematch algorithm used to classify user ratings. c. Netflix's model of flat-rate monthly subscriptions was found to be more profitable than a per-disc rental fee model. d. Netflix's plan to enter the online movie streaming market alerted rivals to the possibility of losing their market share. e. The migration of Netflix services to cover the Blu-ray disc market opened up opportunities for rivals.

A

By paying attention to process improvements and designing technology to smooth operations, Netflix has slashed its _____ even as subscriptions ballooned. a. number of customer representatives b. switching costs c. per-disc rental fees d. inventory size e. churn rate

A

Information security policies would be ineffective without _____ and _____. a. audit; enforcement b. accountability; flexibility c. compliance; objectivity d. regulation; transparency e. consistency; adaptability

A

Netflix attempted to rebrand its DVD-by- mail service under the name _____. a. Qwikster b. Cinematch c. Starz d. PurePlay e. Epix

A

One of the benefits of disintermediation in the video industry is that: a. studios get to retain all the money generated through new windows. b. movie rental firms such as Netflix can exercise greater bargaining power while negotiating streaming rights. c. customers have a wider choice of services to choose from and at reduced subscription costs. d. video rental firms have opportunities to replace studios in their interface with customers. e. it creates equal opportunities for small firms to conduct business within studio distribution channels.

A

One of the factors that complicates the elimination of legacy systems is the: a. costs associated with breaking extended vendor or outsourcer agreements. b. low market value for outdated hardware and software. c. absence of regulatory mechanisms to handle the efficient disposal of legacy systems. d. non-availability of suitable data porting methods to offset data redundancy. e. frequency at which technology improves as per Moore's law.

A

Salesforce.com offers systems that organize, automate, and synchronize activities related to sales, marketing, and client support. These systems serve the purpose of: a. customer relationship management. b. supply chain management. c. business intelligence. d. database management. e. enterprise resource planning.

A

Some of the most common guidelines issued by Web sites when designing a secure password include: a. The password should be at least eight characters long and include at least one number and other nonalphabet character. b. The password should be short and straightforward. c. The password should include names of family members or pets, so as to be easily remembered. d. The password should be random and more than 12 characters long to avoid risk of being guessed by a hacker. e. The password should be the same as your name so as to trick the hacker.

A

Studios have granted Blockbuster distribution terms that enable it to distribute DVDs the day they release. The objective behind this move is to: a. cut down the increasing power Netflix has over product distribution. b. ease fears over piracy that could potentially eat into the studios' profits. c. improve the penetration of movies in areas without adequate screening facilities. d. ensure that independent movies gain equal opportunity to compete with studio releases. e. replace the loss-making screening model with a sustainable and profitable model.

A

The Office of Federal Housing Enterprise Oversight (OFHEO) was subpoenaed for documents in litigation involving mortgage firms Fannie Mae and Freddie Mac. The document search effort cost OFHEO six million dollars, a full 9 percent of its total yearly budget. This example illustrates that firms should account for _____ in their archiving and data storage plans. a. e-discovery b. zero-day exploits c. information asymmetry d. legacy systems e. free rider problem

A

The _____ in a database refers to a list of data. a. file b. column c. field d. row e. record

A

The practice of windowing involves: a. making content available to a distribution channel for a specified time period under a different revenue model. b. scheduling movies to be streamed online at primetime periods to pull in more revenue from advertising. c. relaying advertisements for limited time periods during online movie steaming, as opposed to frequent ad breaks. d. delaying the sending of DVDs to customers until 28 days after titles go on sale. e. streaming movies to customers' computers beforehand and then relaying them on television.

A

The term _____ refers to matching content with customers. a. audience finding b. windowing c. customer filtering d. disintermediation e. viral marketing

A

Updates that plug existing holes in a software are called: a. patches. b. adware. c. maculations. d. keys. e. cracks.

A

What operational area does Wal-Mart intend to improve by insisting that its partners adopt RFID technology? a. Inventory tracking and coordinating b. Employee performance monitoring c. Measuring customer satisfaction d. Differentiating between perishable and non-perishable products e. Employee shift scheduling

A

Which of the following best represents a method a social engineer might use to infiltrate a system? a. Baiting someone to add, deny, or clarify information that can help an attacker b. Posting rumors about an individual on a popular social networking site c. Making prank calls to individuals d. Stealing an individual's credit card information e. Flooding an individual's mailbox with junkmail

A

Which of the following is an example of application software? a. MS Word b. Mac OS c. Linux d. MS Windows e. Adobe Flash

A

Which of the following is often considered a defensible source of competitive advantage? a. Data b. Technology c. Infrastructure d. Market capital e. Profits

A

Which of the following is one of the reasons for the failure of technology projects? a. Inadequate testing of systems before deployment b. Insufficient expenditure on information systems c. Use of matured technology d. Prolonged project periods e. Disallowing "feature creep" during development

A

Which of the following languages are interpreted languages? a. Scripting languages b. HTML c. XML d. Python e. C#

A

Which of the following terms is used as an alternative to switching costs? a. Lock-in b. Complementary benefits c. Exchange benefits d. Straddling costs e. Network impedance

A

Which of the following types of firms is more likely to rely heavily on data collected by third-party partners that sell the firms' products? a. Drug companies b. Grocers c. Casinos d. Online movie rental firms

A

Which of the following will be rendered worthless for Netflix when the inevitable shift from atoms to bits takes place? a. Its high-tech shipping and handling infrastructure b. Its huge database of user ratings through Cinematch c. The formidable user base it has built over the years d. Its investment in developing a peerless user recommendation system

A

Which weakness of Web sites to launch attacks does an SQL injection technique exploit? a. Sloppy programming practices where software developers do not validate user input b. Lack of in-built anti-virus features c. Irregular auditing of Web site content d. Ease of infiltrating the Web site e. Non-employment of encryption techniques

A

_____ is a set of standards for exchanging messages containing formatted data between computer applications. a. EDI b. DBMS c. SOA d. SCM e. ERP

A

_____ refer to databases focused on addressing the concerns of a specific problem or business unit. a. Data marts b. Dashboards c. Legacy systems d. Relational databases

A

In 2011, British intelligence reportedly hacked into Inspire, an online Al Qaeda magazone that promotes "open source jihad," and replaced instructions for making a pipe bomb with what?

A collection of cupcake recipies

sock puppet

A fake online persona created to promote a particular point of view, often in praise of a firm, product, or individual. Be aware that the use of undisclosed relationships in endorsements is a violation of U.S. Federal Trade Commission rules.

software as a service (SaaS)

A form of cloud computing ; where a firm subscribes to a third-party software and receives a service that is delivered online.

utility computing

A form of cloud computing where a firm develops its own software, and then runs it over the Internet on a service provider's computers.

distributed computing

A form of computing where systems in different locations communicate and collaborate to complete a task.

optical fiber line

A high-speed glass or plastic-lined networking cable used in telecommunications

Cookie

A line of identifying text, assigned and retrieved by a given Web server and stored by your browser

Server farm

A massive network of computer servers running software to coordinate their collective use. Server farms provide the infrastructure backbone to SAAS and hardware cloud efforts, as well as many large-scale Internet services

server farm

A massive network of computer servers running software to coordinate their collective use. Server farms provide the infrastructure backbone to SaaS and hardware cloud efforts, as well as many large-scale Internet services.

cost per action

A method of charging for advertising whenever user performs a specified action such as signing up for service, requesting material, are making a purchase

service level agreement (SLA)

A negotiated agreement between the customer and the vendor. The SLA may specify the levels of availability, serviceability, performance, operation, or other commitment requirements.

Internet advertising Bureau

A nonprofit industry trade group of the interactive advertising industry the IAB evaluates and recommends interactive advertising standards and practices and also conducts research, education and legislative lobbying.

Java

A programming language, initially developed by Sun Microsystems, designed to provide true platform independence ("write once; run anywhere") for application developers. In most cases, Java apps are developed to be executed by a Java Virtual Machine—an interpreting layer that translates code as it executes, into the format required by the operating system and microprocessor. Without Java, application developers have to write and compile software to execute natively by a specific operating system / microprocessor combination (e.g., Windows/Intel, Linux PowerPC, Mac/Intel, Linux/Intel).

service-oriented architecture (SOA)

A robust set of Web services built around an organizations processes and procedures.

Peering refers to:

A situation when separate ISPs connect their networking equipment together to share traffic.

Plug-in

A small computer program that extends the feature set of capabilities of another application

semiconductor

A substance such as silicon dioxide used inside most computer chips that is capable of enabling as welt as Inhibiting the flow of electricity. From a managerial perspective, when someone refers to semiconductors, they are talking about computer chips, and the semiconductor industry is the chip business.

dense wave division multiplexing (DWDM)

A technology that increases the transmission capacity (and hence speed) of fiber-optic cable. Transmissions using fiber are accomplished by transmitting light inside "glass" cables. In DWDM, the light inside fiber is split into different wavelengths in a way similar to how a prism splits light into different colors.

cache

A temporary storage space uses speed computing tasks

web 2.0

A term broadly referring to Internet services that foster collaboration and information sharing; characteristics that distinctly set "Web 2.0" efforts apart from the static, transaction-oriented Web sites of "Web 1.0." The term is often applied to Web sites and Internet services that foster social media or other sorts of peer production.

latency

A term often used in computing that refers to delay, especially when discussing networking and data transfer speeds. Low-latency systems are faster systems.

Wi-Fi

A term used to brand wireless local area networking devices devices typically connect to networking devices.

silicon wafers

A thin, circular slice of material used to create semiconductor devices. Hundreds of chips may be etched on a single wafer, where they are eventually cut out for individual packaging

Proxy servers

A third-party computer that passes traffic to and from a specific address without revealing the address of the connected user

grid computing

A type of computing that uses special software to enable several computers to work together on a common problem as if they were a massively parallel supercomputer.

virtualization

A type of software that allows a single computer (or cluster of connected computers) to function as if it were several different computers, each running its own operating system and software. Virtualization software underpins most cloud computing efforts, and can make computing more efficient, cost-effective, and scalable

IP address

A value used to identify devices connect to the Internet. IP addresses are usually expressed as four numbers separated by periods.

Which of the following is an example of computer hardware?

A video game console

Internet of Things

A vision where low-cost sensors, processors, and communication are embedded into a wide array of products and our environment, allowing a vast network to collect data, analyze input, and automatically coordinate collective action.

imitation-resistant value chain

A way of doing business that competitors struggle to replicate and that frequently involves technology in a key enabling role.

wiki

A web site that can be modified by anyone, from directly within a web browser (provided that user is granted edit access)

What is an example of cybersquatting?

Acquiring a domain name to extort a firm, individual, product, or trademark holder

Keyword advertising

Advertisements that are targeted based on a user's quarry

Contextual advertising

Advertising based on a websites content

Page rank

Algorithm developed by Google cofounder Larry page to rank websites

total cost of ownership (TCO)

All of the costs associated with the design, development, testing, implementation, documentation, training and maintenance of a software system.

Link fraud

Also called spandexing or link farming. the process of creating a series of bogus websites, all linking back to the pages one is trying to promote

security-focused

Also known as "hardened." Term used to describe technology products that contain particularly strong security features.

Porter's five forces

Also known as Industry and Competitive Analysis. A framework considering the interplay between (1) the intensity of rivalry among existing competitors, (2) the threat of new entrants, (3) the threat of substitute goods or services, (4) the bargaining power of buyers, and (5) the bargaining power of suppliers.

network effects

Also known as Metcalfe's Law, or network externalities. When the value of a product or service increases as its number of users expands.

23. The video game console market is a network market in which Sony's PlayStation 2 (PS2) dominated over Microsoft's Xbox offering. This has been possible due to: a. the low pricing of Xbox which eroded users' confidence in the product. b. game developers favoring PS2 for its larger user base. c. the presence of several cheap, rival imitations which ate into Xbox's market share. d. PS2's technical superiority over the Xbox. e. the straddling strategy adopted by Microsoft to expand in both video game and DVD player markets.

B

30. Apple is known around the world as a major PC manufacturer and maker of digital music players (iPods). With the introduction of the iTunes effort, Apple now boasts a 75 percent share in digital music sales, in direct competition with the four major record labels in the music industry. This has been possible due to the _____ of Apple's hardware business and the digital music market. a. straddling b. convergence c. diversification d. customization e. monopoly

B

Ensuring that an organization's systems operate within required legal constraints, and industry and organizational obligations results in: a. security. b. compliance. c. integration. d. parallelism. e. immunity.

B

How does Cinematch offer Netflix additional operational advantages? a. Cinematch offers alternate recommendations of movies based on critical acclaim and box office performance parameters. b. Cinematch is linked to warehouses and recommends movies that are likely to be in stock. c. Cinematch is often used by movie studios to plan movie scripts based on user preferences. d. Cinematch is a source of additional revenue to Netflix as a marketing tool for recommending newly-released movies. e. Netflix leases the Cinematch collaborative filtering software to smaller firms at a fee, withholding the valuable user ratings.

B

Marginal costs: a. are minor, insignificant costs. b. are associated with each additional unit produced. c. are the costs incurred as a result of choosing one option over another. d. are constant and do not vary according to production volume. e. are also known as overheads.

B

Microsoft acquired the video streaming outfit called _____. a. Hulu b. Vudu c. Voddler d. Spotify e. Grooveshark

B

Most transactional databases are not set up to be simultaneously accessed for reporting and analysis. As a consequence: a. navigational databases are being preferred over transactional databases. b. data is not efficiently transformed into information. c. firms prefer to outsource data mining operations to third-party firms. d. analysts no longer port data to data warehouses or data marts. e. most firms incur additional expenditure to phase out legacy systems.

B

Netflix enjoys the triple scale advantage of the largest customer base, the largest selection, and the largest network of distribution centers. This can be attributed to: a. Netflix's specialized focus on advertising and marketing. b. Netflix's first-mover advantage. c. Netflix going public to generate funds for expansion. d. Netflix's effective and aggressive pricing strategy. e. the bargaining clout it exercises over movie studios and the government.

B

What is Wal-Mart's motivation for sharing data with its supply partners? a. Creating switching costs for suppliers b. Lowering prices of products c. Achieving maturity in the American market d. Countering the accusations of union activists e. Deflecting criticism for ruining local mom-and- pop stores

B

Which of the following factors is responsible for the prevention of certain titles from being available for streaming? a. Expensive broadband connectivity b. Complications in securing digital distribution rights c. Lack of Netflix-specific hardware to stream to user PCs d. The switch to Blu-ray video formats e. The discontinuation of the windowing practice

B

Which of the following is one of the functions of firmware? a. Providing a mechanism through which users interact with a computing device b. Loading a computing device's operating system from disk c. Helping in the diagnosis of computing problems d. Indicating maintenance schedules for computer hardware e. Allowing development and integration of software products and other complementary goods

B

Metcalfe's Law is also known as: a. systemic events. b. cluster effects. c. group impressions. d. herd instinct. e. network externalities.

E

Netflix offers its subscribers a selection of over one hundred thousand titles, while other video rental firms can only offer as much as three thousand. This presents a significant _____ for Netflix over its rivals. a. marginal cost b. price advantage c. variable cost d. studio preference e. scale advantage

E

The biggest inefficiency in the movie industry is: a. maintaining the production costs of big movies. b. the high personnel costs. c. the low screens-to- movies ratio. d. justifying expenses on technology. e. matching content with customers.

E

The mechanism through which people interact with a computing device is known as the _____. a. operating system b. programming language c. application programming interface d. embedded system e. user interface

E

Viruses are programs that infect other software or files and require: a. a large file size to spread. b. the computer to be shutdown to spread. c. Windows as an operating system to spread. d. a disk based operating system to spread. e. an executable program to spread.

E

_____ refers to a software package that integrates the many functions of a business, such as accounting, finance, inventory management, and human resources. a. Supply chain management b. Desktop software c. Customer relationship management d. Database management system e. Enterprise resource planning

E

_____ is a set of standards for exchanging messages containing formatted data between computer applications.

EDI

The category of enterprise software known as ________________ is implemented in modules, offering the potential of automating an organization's entire value chain.

ERP, enterprise resource planning

Software (often on firmware) designed to make physical products and devices "smarter" by doing things like sharing usage information, helping diagnose problems, indicating maintenance schedules, providing alerts, or enabling devices to take orders from other systems is referred to as ___________.

Embedded systems

Among US "critical infrastructure" industries, which one was targeted the most - 41 percent of reported malicious software attack in 20120 - according to the Department of Homeland Security?

Energy

astroturfing

Engineering the posting of positive comments and reviews of a firm's product and services (or negative ones of a firm's competitors). Many ratings sites will penalize firms that offer incentives for positive feedback posts.

compliance

Ensuring that anmorganization's systems operate within required legal constraints, and industry and organizational obligations

_____ refers to applications that address the needs of multiple users throughout an organization or work group.

Enterprise Software

_____ refers to a software package that integrates the many functions of a business, such as accounting, finance, inventory management, and human resources.

Enterprise resource planning

Which country that came under massive cyberattacks in 2007, amid a dispute with Russia over a Soviet-era statue, recently announced plans to creat a new 'cybermilitia'?

Estonia

fast follower problem

Exists when savvy rivals watch a pioneer's efforts, learn from their successes and missteps, then enter the market quickly with a comparable or superior product at a lower cost before the first mover can dominate

_____ are AI systems that leverage rules or examples to perform a task in a way that mimics applied human expertise.

Expert Systems

_____ is a tagging language that can be used to identify data fields made available for use by other applications.

Extensible Markup Language (XML)

(T/F) A black hat hacker looks for weaknesses in security mechanisms, with a view to help plug the holes that might be exploited by cyber-criminals.

False

(T/F) A vast majority of security breaches are not preventable and happen despite the best security practices.

False

(T/F) According to research firm Gartner, the majority of loss-causing security incidents involve the handiwork of international cyber-criminal gangs.

False

(T/F) Advantages based on capabilities and data that others can acquire are long-lived.

False

(T/F) Almost all networks derive most of their value from a single class of users.

False

(T/F) Almost all security breaches can be traced back to technology lapses; personnel or procedural factors rarely factor in.

False

(T/F) As Netflix is concerned with digital distribution, its marginal cost is zero.

False

(T/F) Blue ocean strategy often works best when combined with operational effectiveness.

False

(T/F) Challenge questions offered by Web sites to automate password distribution and resets are formidable in protecting the privacy of email accounts.

False

(T/F) Cloud technology is the maturity stage of its life cycle

False

(T/F) Communication between people results in fewer errors, time savings, and cost reductions, as compared to communication between computers.

False

(T/F) Conforming to industry-standard guidelines and frameworks for organizational security ensures continued immunity from attacks on an organization's information.

False

(T/F) Conventional reports look more like a spreadsheet, with the various dimensions of analysis in rows and columns, with summary values at the intersection.

False

(T/F) Cross-side benefits arise due to interaction among members of a single class of participant.

False

(T/F) Cyber criminals who infiltrate systems and collect data for illegal resale are called cash-out fraudsters.

False

(T/F) Data miners should realize that first findings of analytics always reveal an optimal course of action.

False

(T/F) EDI is easier to code, and more robust than XML, because it can be extended.

False

(T/F) ERP systems and enterprise software programs should be ideally configured to use different database systems to avoid the possibility of data redundancy.

False

(T/F) Enterprise software tends to be less integrated and standardized than the prior era of proprietary systems that many firms developed themselves.

False

(T/F) Envelopment is a management strategy where a dominant firm acquires all the layers in its value chain to increase profitability.

False

(T/F) Even the best implemented encryption programs have not been immune to brute-force attacks by hackers.

False

(T/F) Even though Netflix is now mainly focused on digital distribution, it continues to offer the DVD-by- mail service in its base-price product.

False

(T/F) Firms in fast-moving industries or with particularly complex businesses are in the best position to get database projects completed in enough time to reap benefits before business conditions change.

False

(T/F) Firms target high churn rates to boost their profitability.

False

(T/F) Firms that constantly innovate do so to develop open standards for competitors to become compatible.

False

(T/F) For Netflix, the cost to stock and ship an obscure foreign film is greater than that for sending out the latest blockbuster movie.

False

(T/F) For data mining to work, the events in the data should mainly reflect past trends.

False

(T/F) Hardware failure is the least likely of threats to one's data.

False

(T/F) High switching costs serve to weaken the value of network effects as a value asset.

False

(T/F) In a market influenced by network effects, the winning product or service is determined by its technical superiority.

False

(T/F) In order to fully exploit the audience-finding and revenue-sharing advantages of Netflix, studios are offering DVD titles that are immediately available to customers after coming on sale.

False

(T/F) In public-key encryption systems, the functions of the public and private keys are interchangeable.

False

(T/F) Java programmers write code with specific commands for different operating systems, such as Windows, Mac OS X, and Linux.

False

(T/F) Organizations that have created a robust set of Web services around their processes and procedures are said to have a service-independent architecture.

False

(T/F) Scripting languages are interpreted within their applications, thereby making them faster than the development efforts found in most commercial software.

False

(T/F) Some firms write their own enterprise software from scratch as it can save time and reduce development costs.

False

(T/F) Standardizing business processes in software that others can buy means that those functions are difficult for competitors to match.

False

(T/F) Startup firms that find new markets attractive but do not yet have products ready for delivery preannounce efforts causing potential adaptors to delay a purchasing decision until the new effort rolls out.

False

(T/F) Studios have granted Netflix more favorable digital distribution terms than Blockbuster and Wal-Mart to counter the negotiating leverage held by these two firms.

False

(T/F) The care and feeding of information systems is usually simple, and inexpensive.

False

(T/F) The data mining operations at Caesars have revealed that most of the revenue it generates comes from the affluent classes that include European princes and shipping heirs.

False

(T/F) The market for stolen data is stagnant and most hackers use stolen data like credit card numbers for personal use.

False

(T/F) The more application software that is available for a platform, the less valuable it potentially becomes.

False

(T/F) The natural state of a market where network effects are present is for there to be intense competition between several rivals.

False

(T/F) The shift from atoms to bits does not stand to impact content creators, middlemen, and retailers.

False

(T/F) The varied and heterogeneous look, feel, and functionality that operating systems enforce across various programs help make it easier for users to learn new software.

False

(T/F) Total Rewards is an opt-out loyalty program at Caesars.

False

(T/F) Turning data into useable information is hindered by transactional databases that are set up to be simultaneously accessed for reporting and analysis.

False

(T/F) UK grocery giant Tesco is the planet's largest retailer.

False

(T/F) URL-shortening services such as bit.ly help expose the intention of phishing posts.

False

(T/F) Wal-Mart supplements its huge data assets with additional data provided by information brokers like Information Resources and ACNielsen.

False

(T/F) When using a public wireless network, using a VPN software is not advisable as it can reveal your communications to any network eavesdroppers.

False

(T/F) With an increasing subscriber base, Netflix has been forced to up the number of customer representatives.

False

(T/F) Worms require an executable (a running program) to spread, attaching to other executables.

False

ARM is one of the only firms, aside from Intel, that has scale allowing it to own and operate its own fabs.

False

Blogs are used to collaborate on common tasks or to create a common knowledge base.

False

Which of the following was considered a contributor to vulnerabilities in the OpenSSL security product, known as the Heartbleed bug:

Few developers were working on the project, so the ideal that "given enough eyeballs, all bugs are shallow" wasn't met with OpenSSL.

_____ refers to the application transfer protocol that is used to copy files from one computer to another.

File Transfer Protocol (FTP)

sustainable competitive advantage

Financial performance that consistently outperforms industry averages.

_____ are systems that act as controls for network traffic, blocking unauthorized traffic while permitting acceptable use.

Firewalls

_____ are seemingly tempting, but bogus targets meant to draw hacking attempts.

Honeypots

In the context of distributed computing, which of the following is a client?

Internet explorer

Which of the following functions is likely to be performed by enterprise software?

Inventory tracking

Which of the following is true of software as a service (SaaS)?

It refers to software that is made available by a third-party online.

Java is not optimized to take advantage of interface elements specific to the Mac or Windows operating systems. As a result:

Java is unsuitable for desktop applications.

Amazon was started by:

Jeff Bezos

Yahoo! was started by ______ and ______

Jerry Yang; David Filo

Which of the following is one of the benefits enjoyed by SaaS vendors?

Lower distribution costs

_____ is a technique in which computers are designed with many microprocessors that work together, simultaneously, to solve problems.

Massively parallel processing

Network effects are also known as _____ Law

Metcalfe's

_____ Law is said to be at play when the value of a product or service increases as its number of users expands.

Metcalfe's

_____ was just a sophomore when he began building computers in his dorm room at the University of Texas. His firm would one day claim the top spot among PC manufacturers worldwide.

Michael Dell

multicore microprocessors

Microprocessors with two or more (typically lower power) calculating processor cores on the same piece of silicon.

Who told Congress: "If the nation went to war today, in a cyberwar, we would lose."

Mike McConnell

A market where there are many buyers but only one dominant seller is known as a(n) _____.

Monopoly

A technique known as _____ uses a gateway that allows multiple devices to share a single IP address. This can be useful in organizations that have a limited number of conventional IP addresses

Network Address Translation (NAT)

Users who edit Wikipedia content in a manner that is biased and opinionated are said to be violating Wikipedia's stated policy of:

Neutral point of view

flash memory

Nonvolatile, chip-based storage, often used in mobile phones, cameras, and MP3 players. Sometimes called flash RAM, flash memory is slower than conventional RAM, but holds its charge even when the power goes out

Rich media ads

Online ads that include animation, audio, or video

Which of the following was an outdated notion regarding open source software and has been shown to be inaccurate?

Open source is fueled on the contributions of loners tooling away for the glory of contributing to better code.

Which of the following is true of the difference between operating systems and application software?

Operating systems control the hardware, while application software performs the work that users and firms are directly interested in accomplishing.

A company uses radio frequency identification (RFID) tags to keep track of its inventory. This is an example of the impact of technology in the area of _____.

Operations

A firm is said to have suffered from the _____ when it preannounces a forthcoming product or service and experiences a sharp and detrimental drop in sales of current offerings as users wait for the new item.

Osborne Effect

Building a model with so many variables that the solution arrived at might only work on the subset of data used to create it is known as _____.

Over-engineering

______ delivers tools so an organization can develop, test, and deploy software in the cloud. These could include programming languages, database software, and product testing and deployment software.

PaaS

_____ involves allowing voice packets to gain delivery importance over packets for applications like e-mail.

Packet prioritization

Which of the following statements about Web 2.0 is true?

Peer production is leveraged to create much of the open source software that supports many of the Web 2.0 efforts.

operational effectiveness

Performing the same tasks better than rivals perform:, them.

What term refers to an attemot to steal sensitive data by masquerading as a trustworthy institution, typically by e-mail, social media, or instant messaging, and requesting that the user provide a password, a credit card number, or other personal information?

Phishing

_____ refers to confidence scams executed through technology.

Phishing

Cloud vendors that host hardware, operating system, database, and other software, which clients can then use to build their own applications, are said to be providing:

Platform as a service

Which of the following refers to a variant of utility computing where vendors provide the operating system and supporting software like database management systems but where client firms write their own code?

Platform as a service

Which of the following characteristics is said to be Java's biggest selling point?

Platform independence

_____ are products and services that allow for the development and integration of complementary goods.

Platforms

_____ are products and services that allow for the development and integration of software products and other complementary goods.

Platforms

private clouds

Pools of computing resources that reside inside an organization and that can be served up for specific tasks as need arrives.

Which of the following statements is a valid reason for chip manufacturers to carry minimal inventory?

Products with a significant chip-based component rapidly fall in value and can cause huge losses when overproduced.

Opt out

Program that enroll all customers by default but that allows customers to discontinue participation if they want to.

Opt in

Program that requires customer consents

application programming interfaces (APIs)

Programming hooks, or guidelines, published by firms that tell other programs how to get a service to perform a task such as send or receive data. For example, Amazon provides APIs to let developers write their own applications and Web sites that can send the firm orders.

scripting languages

Programming tool that executes within an application. Scripting languages are interpreted within their applications, rather than compiled to run directly by a microprocessor.

earned media

Promotions that are not paid for or owned but rather grow organically from customer efforts or other favorable publicity. Social media, word of mouth, and unsolicited positive press mentions are all examples of earned media.

programming language

Provides the standards, syntax, statements, and instructions for writing computer software.

This cloud infrastructure is operated by a provider and is available to many users

Public Cloud

A(n) _____ is a firm that focuses on a specific product, service, or business model.

Pure Play

1 petabyte = 1 _____ bytes

Quadrillion

crowdsourcing tools and question-and-answer sites like _____ allow firms to reach out for expertise beyond their organizations

Quora

Click farms

Recruiting a network of users to engage in click fraud with the goal of spreading IP addresses across several systems and make a fraud effort more difficult to detect

paid media

Refers to efforts where an organization pays to leverage a channel or promote a message. Paid media efforts include things such as advertisement and sponsorships

_____ are the most common standard for expressing databases, whereby tables (files) are related based on common keys.

Relational Database

cloud computing

Replacing computing resources—either an organization's or individual's hardware or software—with services provided over the Internet.

What feature of blogs makes it easier for users to see the most recent content first?

Reverse chronology

What term describes software that allows a hacker to remotely take control of a computer while avoiding detection?

Rootkit

Programming tools that execute within an application are called _____.

Scripting Languages

query

Search

Organic or natural search

Search engines results returned and ranked according to relevance

Which of the following is one of the sources of revenue for open source vendors?

Selling support and consulting services

solid state electronics

Semiconductor-based devices. Solid state components often suffer fewer failures and require less energy than mechanical counterparts because they have no moving parts. RAM, flash memory, and microprocessors are solid state devices. Hard drives are not.

What is the most common function performed by electronic data interchanges?

Sending electronic equivalents of structured documents between different organizations

Semantic Web

Sites that read that an invisible tags that can be recognized by search engines, analysis tools, and other services to make it easier for computer programs to accurately categorize, compare and present this information

Which of the following sets of interrelated forces threatens to slow down the progression of Moore's Law?

Size, heat, and power

_____ refers to content that is created, shared, and commented on by a broader community of users.

Social media/user-generated content, User-generated content

_____ refers to a form of cloud computing where a firm subscribes to third-party software and receives a service that is delivered online.

Software as a service

application server

Software that houses and serves business logic for use (and reuse) by multiple applications.

open source software (OSS)

Software that is free and where anyone can look at and potentially modify the code.

Which of the following issues should a firm address in order to design, develop, deploy, and maintain its data warehouses and data marts? a. Market capitalization b. Data governance c. Human resources d. Prevailing economic environment e. Market breadth

B

Which of the following products or services is not subject to network effects? a. Banking services b. Laundry services c. Video game consoles d. Social networks e. Cell phone services

B

Which of the following statements holds true for the term spoof? a. It refers to a con executed using technology, typically targeted at acquiring sensitive information or tricking someone into installing malicious software. b. It refers to e-mail transmissions and packets that have been altered to seem as if they came from another source. c. It refers to scrambling data using a code or formula, known as a cipher, such that it is hidden from those who do not have the unlocking key. d. It refers to a seemingly tempting, but bogus target meant to draw hacking attempts. e. It refers to highly restrictive programs that permit communication only with approved entities and/or in an approved manner.

B

Which of the following types of infiltration techniques does one open up to by posting sensitive personal information and details about one's workplace on social networking sites? a. Phishing b. Social engineering c. Password theft d. Virus infections e. Physical threats

B

Which of these is most representative of a DDoS attack? a. Threatening to reveal names and social security information stolen from medical records databases b. Crashing a popular social networking site to restrict access to information c. Hijacking a power generation unit capable of serving an entire city d. Stealing proprietary data on products worth several millions of dollars e. Launching tough-to- track click-fraud efforts

B

11. Alpha Systems, a market leader in high-end video games, has designed its products such that it is difficult for the consumers to migrate to a rival. Which of the following is true about this scenario? a. Alpha Systems will have low switching costs. b. Alpha Systems has focused on creating customers who are "butterflies." c. Alpha Systems has created customers who are "barnacles." d. Alpha Systems is likely to reduce its staying power in this market. e. Alpha Systems has focused on reducing "friction" for its end users.

C

12. _____ are products or services that add additional value to the primary product or service that makes up a network. a. Quantum efforts b. Substitute components c. Complementary benefits d. Orthogonal gains e. Standby additions

C

How do Netflix's scale economies affect competition from established firms? a. The yearly cost to run a Netflix-comparable nationwide operation is too high for established firms to derive profits from. b. Netflix's subscriber acquisition costs are the highest in the industry and unmatchable for established firms. c. Established firms that challenge Netflix straddle markets, unable to gain full efficiencies from their efforts. d. Established firms are unable to generate the kind of funding required to match Netflix by way of IPOs. e. Established firms are weighed down by the costs of servicing more customers than Netflix.

C

In database terminology, a record represents: a. a list of data, arranged in columns and rows. b. each category of data contained in a row. c. a single instance of whatever the table keeps track of. d. a field or combination of fields used to uniquely identify a file. e. one or more keys that relate separate tables in a database.

C

In exchange for a percentage of the subscription revenue for every disk sent out by Netflix, movie studios offer Netflix: a. online streaming rights free of cost. b. higher fees for marketing less-popular movies. c. DVDs at a very low cost. d. distribution rights to certain movies free of cost. e. strong bargaining power in negotiations for digital distribution rights.

C

It should be evident from the TJX example that: a. security breaches are not as damaging to companies as other crimes are. b. industry guidelines for information security are not suitable for everyone and should be made optional. c. information security must be a top organizational priority. d. skimping on liability insurance to cover for financial losses from security breaches is not advisable. e. with a little effort and resources, it is possible to make any security system hundred percent foolproof.

C

Java is not optimized to take advantage of interface elements specific to the Mac or Windows operating systems. As a result: a. Java is not platform independent. b. Java lacks a structured programming style. c. Java is unsuitable for desktop applications. d. Java code that is compiled for the native OS and processor is slower than code running through a JVM interpreter. e. Java code has to be compiled, and then interpreted, before being executed by the processor.

C

Knowledge is defined as: a. raw facts and figures. b. data presented in a context so that it can answer a question or support decision making. c. insight derived from experience and expertise. d. acquiring new behaviors, skills, values, preferences, or understanding. e. the process of breaking a complex topic into smaller parts to gain a better understanding of it.

C

Nintendo's Wii OS provides Wii programmers with a set of common standards to use to access the Wiimote, play sounds, draw graphics, save files, and more. Without this, games would: a. be more reliable. b. be a lot more easier to write. c. cost more. d. look same. e. have more titles available.

C

One of the reasons organizations delay patches to plug holes in their security applications is: a. the rising cost of labor. b. lack of information on effectiveness of patches. c. the fear that the new technology contains a change that will cause problems down the road. d. redundancy of patches within a short span of time. e. bureaucratic inefficiency.

C

Sifting through trash in an effort to uncover valuable data or insights that can be stolen or used to launch a security attack is known as: a. trash recovery. b. junk exploring. c. dumpster diving. d. scrap sifting. e. data sieving.

C

The term _____ originally referred to a particularly skilled programmer. a. data harvester b. cracke c. hacker d. black hat e. hacktivist

C

User ratings act as _____ for Netflix's customers. a. marginal costs b. fixed costs c. switching costs d. variable costs e. barriers to entry

C

What type of tool enforces access privileges and helps verify that systems are not being accessed by the unauthorized, or in suspicious ways? a. Audit trails b. Intrusion detection tools c. Access control tools d. User-tracking tools e. Network watching tools

C

Which of the following actions should users take to protect themselves from security attacks? a. Frequently upgrade their systems with the latest hardware available in the market b. Use a universal password for all secure sites to avoid chances of forgetting different passwords c. Use VPN software to encrypt transmission and hide from eavesdroppers d. Use unrestricted folder sharing settings to maintain transparency e. Use passwords that are random and more than 12 characters long to avoid easy guessing

C

Which of the following characteristics is said to be Java's biggest selling point? a. Open source nature b. Interpretability c. Platform independence d. Service-oriented architecture e. Data portability

C

Which of the following conditions is essential for data mining to work? a. The data must be collected from proprietary sources and not from data aggregators. b. The organization must leverage standard relational databases as opposed to inferior hierarchical and analytical databases. c. The events in the data should reflect current and future trends. d. The data mining software must necessarily incorporate ad hoc reporting tools and dashboards. e. The data should have passed the Diehard suite of stringent tests for randomness.

C

Which of the following factors ensures that a user considers the staying power of a product before adopting it? a. Monetary savings in the short-term b. Reputation of the parent firm c. Value of the user's investment d. Liquidity of the parent firm e. Ease of migration to similar products

C

Which of the following features enforced by an operating system across various programs helps make it easier for users to learn new software and reduces training costs and operator error? a. The open source modifications b. The diverse set of controls c. Consistent look and functionality d. Dynamic memory allocation and retrieval e. Accompanying documentation

C

Which of the following is a valid statement on information security? a. Security breaches cannot be prevented despite the adoption of the best security policies. b. Technology lapses are solely responsible for almost all security breaches. c. Information security is everybody's responsibility. d. Greater expenditure on security products is the only way to contain security breaches. e. A reactive, rather than proactive, approach is better suited for dealing with security breaches.

C

Employees, at their own initiative, can go to SocialText or Google Sites and set up a wiki, WordPress to start blogging, or subscribe to a SaaS offering like SalesForce.com, all without corporate oversight and approval. This _____ of technology is one of the challenges associated with the adoption of SaaS models.

Consumerization

_____ is a situation where two or more firms are both competitors and collaborators, or "frenemies."

Coopetition

Moving first pays off when the time lead is used to create:

Critical resources for competitive advantage

The act of taking a job traditionally performed by a designated agent (usually an employee) and outsourcing it to an undefined generally large group of people in the form of an open call is known as _____.

Crowdsourcing

What now-common term did sci-fi writer William Gibson coin in his 1982 short story "Burning Chrome"

Cyberspace

Key Inc., an American guitar maker, recently lost an action to recover the domain name piano-key.com, claiming that the defendant infringed on its registered trademark. What did Key Inc. specifically accuse the defendant of?

Cybersquatting

14. Windows OS, iPhones, the Wii, and Facebook's application programming interfaces allow for the development and integration of complementary goods by third-parties. Based on this evidence, all these products or services can be said to be _____. a. pure plays b. coopetitors c. vertically integrated d. platforms e. venture capitalists

D

19. American Express, a credit card firm, provides services to consumers that include plastic cards, individual accounts, and phone-based customer service. It also provides merchants with services, such as terminals for authorizing transactions and procedures for submitting charges. Based on the above facts, American Express is said to be in a _____ market. a. monopolistic b. niche c. captive d. two-sided e. contestable

D

Priceline.com is a company and a commercial website that helps users obtain discount rates for travel-related purchases such as airline tickets and hotel stays. The company facilitates the provision of travel services by its suppliers to its customers. People can directly access a complete array of schedules and fares. This process has, to a great extent, eliminated the travel agency as a middle man. This is an example of: a. disbarment. b. repudiation. c. annulment. d. disintermediation. e. revocation.

D

Staying power refers to the: a. relative abilities of parties in a situation to exert influence over each other. b. position of a firm in a competitive landscape that allows the company to maintain a positive cash flow. c. ability of a firm to produce a good or service at a lower opportunity cost than a rival. d. long term viability of a product or service. e. ability to take advantage of complementary products developed for a prior generation of technology.

D

Systems that use data created by other systems to provide reporting and analysis for organizational decision making are called _____ systems. a. application server b. supply chain management c. enterprise resource management d. business intelligence e. customer relationship management

D

The idea that many media products are digital files of ones and zeros sold in physical containers, is known as: a. information integration. b. metaphysical assimilation. c. data congruence. d. atoms to bits. e. technology restructuring.

D

The long tail is a phenomenon whereby firms can make money by: a. selling the same product at different prices with only minor tweaks in their design. b. leveraging customers to promote their products or services. c. reselling multiple versions of a single product under different brand names. d. offering a near-limitless selection of products or services. e. performing different tasks than rivals or the same tasks in a different way.

D

The term _____ is used to refer to raw facts and figures. a. information b. knowledge c. analytics d. data e. intelligence

D

Wal-Mart sells the equivalent of its entire inventory roughly every six weeks. Based on this data, Wal-Mart's inventory turnover ratio can be calculated to be _____. a. 12 b. 6.5 c. 15 d. 8.5 e. 4.8

D

What are the implications for firms without common database systems with consistent formats across their enterprise? a. They can save infrastructural and operational costs. b. They can expect to leverage economies of scale by serving more customers. c. They can hedge against the risk of data redundancy. d. They struggle to manage their value chain efficiently. e. They profit from the aggregation of diverse data sets and enhance their repositories.

D

When firms enjoy economies of scale they: a. have a greater share of liquid assets than rivals. b. have bigger production facilities than their competitors. c. have a wider employee base than their competitors. d. leverage the cost of an investment across increasing units of production. e. leverage investment costs to decrease their subscriber acquisition costs.

D

Which of the following events prompted firms such as Wal-Mart and Blockbuster to enter into direct competition with Netflix? a. Netflix's increased bargaining power with movie studios b. Netflix's diversification into the Blu-ray disc movie market c. The introduction of movie streaming to customer PCs d. Netflix's initial public stock offering e. Netflix's merger with Vudu

D

Which of the following factors represents one of the sources of value derived from network effects? a. Congestion b. Price transparency c. Information symmetry d. Staying power e. Complementary costs

D

Which of the following functions is likely to be performed by enterprise software? a. Word processing b. Spreadsheet accounting c. Making PowerPoint presentations d. Inventory tracking e. Internet browsing

D

Which of the following is true about Netflix? a. Its marginal cost is zero as it is currently focusing on distributing digital content. b. It has the support of major studios such as Fox and Warner that have allowed it to send DVDs to customers simultaneously as titles go on sale. c. Its cost of acquiring streaming content has fallen in the recent past due to its long tail advantages. d. It has attempted to counter rivals with exclusive content by securing exclusive streaming rights for several popular shows. e. It is likely to stick with its revenue model of a single monthly subscription fee in the future.

D

Which of the following measures can a firm undertake to counter the threat of an SQL injection? a. Deploy a commercial software patch or other piece of security software that can protect the firm b. Outsource the development of its Web site to an outside agency c. Invalidate user input and train developers to rewrite the entire code d. Meticulously check for integrity of Web sites and dig out weaknesses e. Install SQL screening software and update it regularly

D

Which of the following represents an advantage enjoyed by Netflix over traditional video stores? a. Lower technology overhead b. Lower shipping expenses c. Smaller warehousing facilities d. Lower energy costs e. Higher churn rates

D

_____ refers to a job title focused on directing, performing, or overseeing activities associated with a database or set of databases.

Database Administrator

cloudbursting

Describes the use of cloud computing to provide excess capacity during periods of spiking demand. Cloudbursting is a scalability solution that is usually provided as an overflow service, kicking in as needed.

17. Which of the following is an example of a one-sided market? a. Nintendo games b. Credit card services c. Operating systems d. Yellow pages e. Cell phone networks

E

26. Profitability of online auctions is derived mainly from selling: a. newly released goods. b. commodities. c. popular products. d. trade goods. e. differentiated goods.

E

29. Markets are said to undergo convergence when they: a. are dominated by a small group of powerful sellers. b. derive most of their value from two distinct categories of participants. c. offer products and services designed to target a specific industry. d. are characterized by many buyers, but a single, dominant seller. e. begin to offer similar features and capabilities.

E

_____ is a term used to describe unpredictable, but highly impactful events.

black swans

A(n) _____ is a temporary storage space used to speed computing tasks.

cache

CPO is an acronym for

chief privacy officer

Moore's Law states that:

chip performance per dollar doubles every eighteen months.

Replacing computing resources—either an organization's or individual's hardware or software—with services provided over the Internet is known as _____.

cloud computing

This process of converting a code into machine-readable form is known as:

compiling

massively parallel

computers designed with many microprocessors that work together, simultaneously, to solve problems.

cluster computing

connecting server comps via software and network so resources can be used to solve computing tasks

The phrase "_____________________________ media" refers to promotions that grow organically from customer efforts or other favorable publicity (e.g. think positive tweets, shared Facebook posts, and pins on Pinterest).

earned

Firms that listen to existing customers and tailor offerings based on this input are far more likely to identify potentially disruptive technologies than those that experiment with products that existing customers do not demand.

false

For large enterprises, the cost to license, install, and configure products like ERP and CRM systems are usually a one-time fee running into approximately one million dollars.

false

For organizations with high-volume, low-maintenance systems, it makes sense to rent hardware clouds rather than buying their own systems.

false

Grid computing, though faster and more efficient, is an expensive alternative to supercomputers.

false

Hard drive storage is considered to be solid state.

false

If a firm's goods are highly differentiated, the Internet can lessen the firm's supplier bargaining power.

false

In the URL, the host name is the name of the network a user tries to connect to.

false

In the United States, business models cannot be patented because the field of business is extremely dynamic.

false

Java programmers write code with specific commands for different operating systems, such as Windows, Mac OS X, and Linux.

false

Linux is one of the most used operating systems in desktop computers, but can be found only in a tiny fraction of mobile phones, and consumer electronics.

false

Market entry is the same as building a sustainable business.

false

Metcalfe's Law is used to explain the concept of switching costs.

false

Migrating from a commercial product to MySQL's open source alternative is relatively complex, as most commercial database products are based on diverse standards and the switching costs are rather high.

false

Moore's Law applies to all types of technology components.

false

Most mobile cell phone services are exempted from having to license the wireless spectrum for transmission.

false

Network externalities exist when a product or service becomes less expensive as more people use it.

false

Organizations that have created a robust set of Web services around their processes and procedures are said to have a service-independent architecture.

false

Peer-produced services like Skype and BitTorrent leverage a central IT resource instead of users' computers to forward phone calls and video.

false

Random-access memory is an example of nonvolatile memory.

false

Routing protocol that is in charge of forwarding packets on the Internet is known as voice over Internet protocol.

false

SaaS and the utility computing style efforts differ widely in terms of the benefits and risks they offer.

false

SaaS offerings usually work well when the bulk of computing happens at the client end of a distributed system.

false

Scripting languages are interpreted within their applications, thereby making them faster than the development efforts found in most commercial software.

false

Social media and mobile phone use are lowering the corporate ethics and customer service bar for modern managers.

false

Some firms write their own enterprise software from scratch as it can save time and reduce development costs.

false

Standardizing business processes in software that others can buy means that those functions are difficult for competitors to match.

false

TCP and IP operate above http and the other application transfer protocols.

false

The care and feeding of information systems is usually simple and inexpensive.

false

The change in hard drive prices is a direct result of Moore's Law.

false

The immense popularity of blogs has meant that most bloggers can make a living off their musings.

false

The larger and more active a wiki community, the more likely it is that information will be distorted and that errors will creep in.

false

The managerial definition of Moore's Law suggests that computing costs related to chips (microprocessors and silicon-based storage) double every eighteen months.

false

The more application software that is available for a platform, the less valuable it potentially becomes.

false

The multiple-brain approach is best suited for problems of a linear nature.

false

The number of U.S. patent applications waiting approval has significantly declined in the past decade

false

The shrinking of the pathways inside silicon chips that enables Moore's Law is an indefinite process.

false

The varied and heterogeneous look, feel, and functionality that operating systems enforce across various programs help make it easier for users to learn new software.

false

Wall Street traders often choose a colocation facility with the goal to provide high-latency connectivity to their partners.

false

Web 2.0 services are targeted at creating resources and sharing information based on transaction-focused storefront models.

false

When considering overall network speed, a system's speed is determined by its fastest component.

false

While firms like Deloitte Consulting and Goldman Sachs had hoped to create lasting social networks of former employees, firms saw little value in these efforts and even exposed themselves to significant legal and privacy threats.

false

With the advent of cloud computing and SaaS, smaller firms no longer have access to the kinds of sophisticated computing power they had access to in the past.

false

firms are increasingly shifting spending from the Web to other media such as print, radio, and television as these are often easier to track and analyze

false

in his twenties, Tony Hsieh sold LinkExchange to Amazon for over a half a million dollars

false

oracle acquired the highest number of companies in the span of half a decade

false

the founding technology entrepreneurs behind many leading firms, such as Apple, Microsoft, and Facebook, got their start in their early 30s, leveraging university study and knowledge from their first post-college jobs to create disruptive new firms.

false

The _____ problem exists when rivals watch a pioneer's efforts, learn from their successes and missteps, and then enter the market quickly with a comparable or superior product at a lower cost.

fast follower

Netscape, which once controlled more than 80 percent of the market share in Web browsers, lost its dominant position when customers migrated to Internet Explorer, Microsoft's Web browser. Internet Explorer was easy to install and had no significant differences in terms of usability. This example serves to illustrate that:

firms with low switching costs can be easily and rapidly overtaken by strong rivals.

_____ is a nonvolatile, chip-based storage, often used in mobile phones, cameras, and MP3 players.

flash memory

A storage device is a part of the computer's _____.

hardware

_____ is a cloud computing model in which a service provider makes computing resources such as hardware and storage, along with infrastructure management, available to a customer on an as-needed basis.

hardware cloud

"Html" is used to:

create and format Web pages.

Solid state components are less likely to fail because they:

having no moving parts

inventory turns

Sometimes referred to as inventory turnover, stock turns, or stock turnover. It is the number of times inventory is sold or used during a given period. A higher figure means that a firm is selling products quickly.

embedded systems

Special-purpose software designed and included inside physical products (often on firmware). Embedded systems help make devices "smarter," sharing usage information, helping diagnose problems, indicating maintenance schedules, providing alerts, or enabling devices to take orders from other systems.

The patent system is often considered to be unfairly stacked against start-ups because:

high litigation costs coupled with a few months of litigation can sink an early stage firm.

An application server:

houses and serves business logic for use by multiple programs.

a company uses WebEx, a popular commercial application, to conduct training sessions for its employees who are spread across different countries. This is an example of the impact of technology in the area of ________

human resources

A(n) _____ is a high-speed glass or plastic-lined networking cable used in telecommunications.

optical fiber line

_____, probably the most notorious known act of cyberwarfare effort to date (one expert called it "the most sophisticated worm ever created"), is suspected to have been launched by either U.S. or Israeli intelligence (or both), and it infiltrated Iranian nuclear facilities and reprogrammed the industrial control software operating hundreds of uranium-enriching centrifuges.

Stuxnet

_____ systems help a firm manage aspects of its value chain, from the flow of raw materials into the firm, through delivery of finished products and services at the point-of-consumption.

Supply chain management

A publicly held company is said to be _____ if its outstanding shares are purchased by an individual or by a small group of individuals who wish to obtain complete ownership and control.

Taken Private

____ involves competing by offering a new technology that is so superior to existing offerings that the value overcomes the total resistance that older technologies might enjoy via exchange, switching cost, and complementary benefits.

Technological Leapfrogging

Which of the following statements about technology is true?

Technological improvements can be copied by rivals, leading to a profit-eroding arms race.

resource-based view of competitive advantage

The strategic thinking approach suggesting that if a firm is to maintain sustainable competitive advantage, it must control an exploitable resource, or set of resources, that have four critical characteristics. These resources must be (1) valuable, (2) rare, (3) imperfectly imitable, and (4) non-substitutable.

Landing page

The webpage displayed when a user clicks on an advertisement

Which of the following statements holds true for Wikis?

Their key use is to collaborate on common tasks or to create a common knowledge base.

Which of the following statements holds true for electronic social networks?

Their key use is to discover and reinforce affiliations, identify experts, message individuals or groups, and virally share media.

Which of the following statements is true about microblogging?

Their key use is to distribute time-sensitive information, share opinions, virally spread ideas, run contests and promotions, solicit feedback, provide customer support, track commentary on firms/products/issues, and organize protests.

Which of the following is true of scripting languages?

They are often designed to be interpreted within their applications.

affiliates

Third parties that promote a product or service in exchange for a cut of any sales.

All of the costs associated with the design, development, testing, implementation, documentation, training and maintenance of a software system are collectively termed as:

Total cost ownership

____ repeatedly sends a cluster of three packets starting at the first router connected to a computer, then the next, and so on, building out the path that packets take to their destination.

Traceroute

_____ are the supertiny on-off switches in a chip that work collectively to calculate or store things in memory.

Transistors

The Internet Protocol Suite consists of the Internet Protocol and _____.

Transmission Control Protocol

(T/F) A PC, laptop, or any other small computer can be set up to run server software.

True

(T/F) A company does not have to install all of the modules of an ERP suite, but it might add functions over time.

True

(T/F) A firm can mix and match components, linking software the firm has written with modules purchased from different enterprise software vendors.

True

(T/F) A team working on organizational security should include representatives from general counsel, audit, public relations, and human resources, in addition to those from specialized security and broader technology and infrastructure functions.

True

(T/F) Achieving success in a project rarely lies in the strength of technology alone.

True

(T/F) Although sometimes referred to as "rental," Netflix's model is really a substitute good for conventional use-based media rental.

True

(T/F) An instant messaging network is an example of a one-sided market.

True

(T/F) Any data-centric effort should involve input not only from business and technical staff, but from the firm's legal team, as well.

True

(T/F) Application software refers to programs that perform the work that users and firms are directly interested in accomplishing.

True

(T/F) At Netflix, the majority of the DVD titles shipped are from back-catalog titles, not new releases.

True

(T/F) By determining the customer lifetime value, a firm can get a sense of how much it should spend to keep a customer coming back.

True

(T/F) By shifting to a streaming model, Netflix stands to eliminate shipping and handling costs.

True

(T/F) Cinematch develops a map of user ratings and steers users toward titles preferred by people with tastes that are most like theirs.

True

(T/F) Data are raw facts that must be turned into information in order to be useful and valuable.

True

(T/F) Data obtained from outside sources, when combined with a firm's internal data assets, can give the firm a competitive edge.

True

(T/F) Data used in OLAP reporting is usually sourced from standard relational databases.

True

(T/F) Desktop applications are typically designed for a single user.

True

(T/F) Dumpster diving refers to physically trawling through trash to mine any valuable data or insights that can be stolen or used in a security attack.

True

(T/F) Every product or service subject to network effects fosters some kind of exchange.

True

(T/F) Firms that base decisions on hunches are said to be gambling, not managing.

True

(T/F) Firms that leverage proprietary standards for market dominance do not necessarily inhibit innovation.

True

(T/F) Hackers might infiltrate computer systems to enlist hardware for subsequent illegal acts.

True

(T/F) Having too much inventory, or insufficient inventory, is known as a retailer's "twin nightmares."

True

(T/F) In many organizations, available data is not exploited to advantage.

True

(T/F) Information systems development projects fail at a startlingly high rate.

True

(T/F) Managers who understand software are better equipped to harness the possibilities and impact of technology.

True

(T/F) Many firms attempt to enhance their network effects by creating a platform for the development of third-party products and services that enhance the primary offering.

True

(T/F) Netflix's expenditure on postage accounts for nearly a third of the firm's costs.

True

(T/F) Netflix's initial revenue model was based on a flat-rate monthly subscription fee rather than a per-disc rental fee.

True

(T/F) Network effects do not influence all consumer products or services.

True

(T/F) Relational databases are the most popular databases available.

True

(T/F) Social networking sites such as Facebook and LinkedIn form valuable sources of vital information that can be used to craft a scam by con artists.

True

(T/F) Spear phishing attacks specifically target a given organization or group of users.

True

(T/F) Structured query language is by far the most common language for creating and manipulating databases.

True

(T/F) The problem of legacy systems can be potentially worsened by mergers and acquisitions.

True

(T/F) The rise of the Internet and distributed computing has led to an explosion in security losses by organizations worldwide.

True

(T/F) With the death of the DVD, the high-tech shipping and handling infrastructure that Netflix has relentlessly built will be rendered worthless.

True

(T/F) Within the DVD-by- mail segment, Netflix is now bigger than both Wal-Mart and Blockbuster.

True

Scroll bars and menus displayed on the hardware of the computer display are examples of graphical _____.

User Interface

This cloud infrastructure is shared by several organizations and supports a specific community that has shared concerns

Vertical Cloud

Products and services designed to target a specific industry are known as _____.

Vertical niches

The rise of social media has made _____ promotion a tool that many firms can exploit.

Viral

Harmful software program that attaches itself to other software programs or data files in order to be executed

Virus

How are sites and services from the Internet's first phase (Web 1.0) different from those that are classified as social media or peer-production efforts?

Web 2.0 services foster collaboration and information sharing, as opposed to static, transaction-oriented Web 1.0 efforts.

Small pieces of code that are accessed via the application server which permit interoperable machine- to-machine interaction over a network are often known as _____.

Web Services

The hypertext transfer protocol (http) defines the communication between:

Web browsers and Web servers.

A firm that provides hardware and services to run Web sites of others is known as a(n) _____.

Web hosting service

The term wiki refers to a(n):

Web site that can be modified by permitted users, from directly within a Web browser.

Which of the following applications is most likely to use UDP instead of TCP?

Web-based phone calls

_____ is a phrase used to describe graphical editing tools, such as those found in a wiki, page layout, or other design tool.

What you see is what you get

One example of the rapid rise and broad, disruptive impact of social media is the mobile messaging service _____. The service has grown to the point where its massive user base sends more instant messages than the entire worldwide SMS messaging standard. Facebook acquired the firm at a valuation of $19 billion.

WhatsApp

virtual desktop

When a firm runs an instance of a PC's software on another machine and simply delivers the image of what's executing to the remote device. Using virtualization, a single server can run dozens of PCs, simplifying backup, upgrade, security, and administration.

peer production

When users collaboratively work to create content, products, and services. Includes social media sites, open source software, and peer-produced services, such as Skype and BitTorrent, where the participation of users provides the infrastructure and computational resources that enable the service.

infrastructure as a service (IaaS)

Where cloud providers offer services that include running the remote hardware and networking (i.e., the infrastructure), but client firms can choose software used (which may include operating systems, programming languages, databases, and other software packages).

platform as a service (PaaS)

Where cloud providers offer services that include the hardware, operating system, tools, and hosting (i.e., the platform) that its customers use to build their own applications on the provider's infrastructure. In this scenario the cloud firm usually manages the platform (hosting, hardware, and supporting software), while the client has control over the creation and deployment of their application.

social network

an online community that allows users to establish a personal profile and communicate with others. Large public social networks include Myspace, Facebook, LinkedIn, and Google's Orkut

_____ perform the work that users and firms are directly interested in accomplishing and can be thought of as places where a user's real work is done.

applications

One of the risks associated with SaaS is the:

dependence on a single vendor.

_____ refers to applications installed on a personal computer, typically to support tasks performed by a single user.

desktop software

According to Porter, strategy is fundamentally about being _____.

different

e-waste

discarded, often obsolete technology; also known as electronic waste

The virtual shutdown of websites by way of overloading them with seemingly legitimate requests sent simultaneously from thousands of machines is termed as _____ attacks.

distributed denial of service (DDoS)

The paths through which products or services get to customers are known as _____.

distribution paths

Firms that compete on _____ rather than operational differences have no problem adopting third-party ERP software.

product uniqueness

platform

products and services that allow for the development and integration of software products and other complementary goods. Windows, iOS, Android, and the standards that allow users to create Facebook apps are all platforms

A _____ enables communication by defining the format of data and rules for exchange.

protocol

UDP (user datagram protocol)

protocol that operates instead of TCP in applications where delivery speed is important and quality can be sacrificied

user interface (UI)

the mechanism through which users interact with a computing device. The UI includes elements of graphical user interface (or GUI, pronounced "gooey"), such as windows, scroll bars, buttons, menus, and dialogue boxes; and can also include other forms of interaction, such as touch screens, motion sensing controllers, or tactile devices used by the visually impaired

The long tail nature of the blogging phenomenon is demonstrated by:

the niche content that is discoverable through search engines and that is often shared via other types of social media.

distribution channels

the path through which products or services get to customers

computer hardware

the physical components of information technology, which can include the computer itself plus peripherals such as storage devices, input devices like the mouse and keyboard, output devices like monitors and printers, networking equipment, and so on

Computer hardware refers to:

the physical components of information technology.

The fault-tolerant nature of the DNS ensures that:

the service continues functioning even if one nameserver goes down.

value chain

the set of activities through which a product or service is created and delivered to customers

operating system

the software that controls the computer hardware and establishes standards for developing and executing applications

brand

the symbolic embodiment of all the information connected with a product or service

One of the advantages of solid state electronics is that:

they require less energy

The LAMP stack of open source products is used:

to power many of the Internet's most popular Web sites.

Which of the following is an example of a user interface?

touchscreen

Links in a blog post that refer readers back to cited sources are called _____.

trackbacks

_____ are links in a blog post that refer readers back to cited sources.

trackbacks

A(n) _____ refers to an Internet vandal and mischief-maker.

troll

A PC, laptop, or any other small computer can be set up to run server software.

true

A Web address without a file name will load content from a default page.

true

A company does not have to install all of the modules of an ERP suite, but it might add functions over time.

true

A device gets its IP address from whichever organization is currently connecting it to the Internet.

true

A firm can mix and match components, linking software the firm has written with modules purchased from different enterprise software vendors.

true

A vigorous community of commenters would help keep a blogger honest as they will quickly expose a blogger's errors of fact or logic.

true

ARM provides logic in the majority of smartphones, including products by Apple and Samsung.

true

Achieving success in a project rarely lies in the strength of technology alone.

true

Changes that impact one industry do not necessarily impact other industries in the same way.

true

Cisco's acquisition of Pur Digital, makers of the Flip video camera line, was largely considered a flop because comparable technology soon became a feature in other popular consumer electronics products.

true

Computer programs making decisions without any human intervention conduct most U.S. stock trading.

true

Conventional software firms treat their intellectual property as closely guarded secrets and almost never provide the source code for their commercial software products.

true

Crowdsourcing can be considered a type of peer-production.

true

DSL technology is less efficient for service providers in the United States because many of their customers live in less-densely populated suburbs and rural areas.

true

Desktop applications are typically designed for a single user.

true

Dominant firms with low switching costs risk having their customers taken away by rivals offering similar, but lower-cost products.

true

Firms might not want to use ARM chips because they are incompatible with Intel chips.

true

Firms pay for the otherwise free MySQL software for the right to incorporate MySQL's code into their own products.

true

Firms that build an imitation-resistant value chain develop a way of doing business that others struggle to replicate.

true

Firms using SaaS products can dramatically lower several costs associated with the care and feeding of their information systems.

true

Flash memory is slower than conventional random-access memory.

true

IP addresses can oftentimes be used to identify a user's geographic location.

true

Information systems development projects fail at a startlingly high rate.

true

Intuit has avoided disruption in the shift away from packaged software by developing products that leverage cloud computing, some of which are initially provided for free.

true

Java is not preferred for programming desktop applications.

true

Just about every type of commercial product has an open source equivalent.

true

Managers who understand software are better equipped to harness the possibilities and impact of technology.

true

Many SaaS vendors have improved system customization options and integration with standard software packages.

true

Many fear that innovation might suffer as a result of the transition of Internet services from flat rate pricing to metered usage.

true

Many of the careers in accounting firms are highly tech-centric.

true

Many residential providers of cable technology use a system that requires customers to share bandwidth with neighbors.

true

Many social media websites have emerged as top destinations on the Internet, however the category has remained volatile, with many one-time leaders losing popularity over time.

true

Modern supercomputing is typically done via a technique called massively parallel processing.

true

Moore's Law has impacted the camera industry such that the firms that sell the most cameras aren't camera companies, but phone manufacturers.

true

Moore's Law is possible because the distance between the pathways inside silicon chips gets smaller with each successive generation.

true

Most elite blogging sites engage advertisers directly for high-value deals and extended sponsorships.

true

Most firms spend 70 to 80 percent of their information systems (IS) budgets just to keep their systems running.

true

Most mainstream news outlets have begun supplementing their content with blogs that can offer greater depth, more detail, and deadline-free timeliness.

true

Most messages sent between Web services are coded in XML.

true

Multicore processors can run older software written for single-brain chips.

true

Political shock and social changes can help alter the competitive landscape.

true

Profit margins for disruptive innovations are usually worse than those for incumbent technologies.

true

Routers don't have perfect, end-to-end information on all points in the Internet.

true

Scalability allows a firm to scale from start-up to blue chip without having to significantly rewrite its code.

true

Servers or organizations do not need to be housed within a country in order to use a country code as part of their domain name.

true

Social media refers to content that is peer produced and shared online.

true

Social networking feeds are at times controversial with instances of feed mismanagement causing user discontent, public relations problems, and the possibility of legal action.

true

Some of the SaaS firms are backed by leading enterprise software executives such as founders of Oracle and Peoplesoft.

true

Some of the largest technology companies now support open source software initiatives.

true

Technology has proliferated in Kenya and Somaliland, with text messages used to replace cash, creating mobile money use that, on a population percentage basis, exceeds any nation in the West.

true

The TCP works at both ends of Internet communication.

true

The User Datagram Protocol (UDP) acts as a substitute to TCP when there is a need for speed of communication, but where perfect and complete transmission quality can be sacrificed.

true

The marginal cost to produce an additional copy of a software product is effectively zero.

true

The rise of the Internet and distributed computing has led to an explosion in security losses by organizations worldwide.

true

The scale of technology investment required to run a business can act as a barrier to entry by discouraging new, smaller competitors.

true

The unstructured nature of wikis is both a source of strength and weakness.

true

The use of public social networks within private organizations is growing, and many organizations are implementing their own private social networks.

true

The value of any particular blog derives from a combination of technical and social features.

true

Timing and technology alone will not yield sustainable competitive advantage.

true

Web 2.0 is often used to refer to Web sites and Internet services that foster social media or other sorts of peer production.

true

When technology can be matched quickly, it is rarely a source of competitive advantage.

true

While large groups of individuals work on key OSS projects, such as the Linux operating system, some widely used efforts have had fewer developers, creating concerns over quality and security.

true

the rise open source software has lowered computing costs for start-up and blue chip companies worldwide

true

As one of the primary components of the value chain, operations involves:

turning inputs into products or services.

Dell, previously the world's number one PC manufacturer, has seen its market share shrink because of rivals copying its value chain and reducing the price advantage it enjoyed over rivals. Dell's present struggles:

underscore the importance of continually assessing a firm's strategic position among changing market conditions.

The address one types into a Web browser is also known as a:

uniform resource locator.

the set of activities through which a product or service is created and delivered to customers is known as a(n) _____.

value chain

The inherently _____ nature of feeds allows individuals to rapidly blast their activities to their contacts or "friends" and forward along posts they think may be of interest to others.

viral

Leveraging consumers to promote a product or service is known as _____.

viral marketing

Storage that is wiped clean when power is cut off from a device is known as _____.

volatile memory

Which of the following represents one of the primary components of the value chain?

outbound logistics

The phrase "_____________________________" refers to communication channels that an organization controls. Includes firm-run blogs and Web sites, apps, and organization accounts on social media such as Twitter, Facebook, Pinterest, YouTube, and Instagram.

owned media

Advertisement and sponsorships are components of:

paid media

The phrase "_____________________________" refers to efforts where an organization pays to leverage a channel or promote a message, such as advertisement and sponsorships.

paid media

_____ hold intellectual property not with the goal of bringing novel innovations to market, but instead in hope that they can sue or extort large settlements from others.

patent trolls

Operational effectiveness refers to:

performing the same tasks better than rivals perform them.

The third wave of computing was characterized by the introduction of _____.

personal computers

prediction market

polling a diverse crowd and aggregating opinions in order to form a forecast of an eventual outcome

Consumers buying commodities are highly _____ since they have so many similar choices.

price-focused

_____ refer to pools of computing resources that reside inside an organization and that can be served up for specific tasks as need arrives.

private clouds

_____ refers to a trusted third party that provides authentication services in public key encryption schemes.

Certificate Authority

The domain name service (DNS) is a distributed database that allows users to communicate with other computers by:

mapping host and domain names to IP addresses of computers.

The cost of producing an additional unit of a product is known as its:

marginal cost

The software business is extremely profitable compared to the hardware business because:

the marginal cost to produce an additional copy of a software product is effectively zero.

Complete the analogy: Enterprise software- Enterprise resource planning; Desktop software- _____ a. MS Excel b. Customer relationship management c. Database management system d. Supply chain management e. Digital asset management software

A

Cyber criminals who infiltrate systems and collect data for illegal resale are called _____. a. cash-out fraudsters b. data harvesters c. corporate spies d. ethical hackers e. information hoarders

A

Data mining is leveraged by firms to determine which products customers buy together, and how an organization can use this information to cross-sell more products or services. This area of application of data mining is referred to as: a. market basket analysis. b. collaborative filtering. c. customer churn. d. customer segmentation. e. promotion targeting.

A

During Netflix's high-growth period, the DVD-by mail business enjoyed lower marketing costs due to the: a. word-of- mouth publicity generated by its users. b. high switching costs for its users. c. improved advertising campaigns for its services. d. switch from a per-disc rental fee to a flat rate scheme. e. introduction of its online streaming model.

A

How does the Cinematch recommendation system work? a. Cinematch develops a map of user ratings and steers users toward titles preferred by people with similar tastes. b. Cinematch gathers user ratings to calculate a gross average user rating which is continually updated with each subsequent user rating. c. Cinematch requests users to create profiles detailing their interests and preferences and serves recommendations accordingly. d. Cinematch uses a team of professional movie critics to create a comprehensive ranking system for each movie in its inventory. e. Cinematch ranks movies in two separate lists based on their critical and box office ratings, and subsequently alters user preferences.

A

If 'V' represents the value of a network and 'n,' the number of users of a network, then Metcalfe's Law is defined by the equation: a. V= n 2 b. V= 1/n c. n= V 1/3 d. n= 2/3V e. V= 3/2n

A

If a computer system can be equated to a layer cake, which of the following combinations represents the computer system in the bottom-to- top order? a. Hardware, operating system, application, user b. User, application, hardware, operating system c. User, operating system, hardware, application d. Application, operating system, hardware, user e. Operating system, hardware, user, application

A

33. Adobe gives away the Acrobat reader to build a market for the sale of software that creates Acrobat files. This is an example of: a. one market attempting to conquer a new market by making it a subset, component, or feature of its primary offering. b. firms giving away products for half of a two-sided market to seed the market. c. markets, once considered distinctly separate, beginning to offer similar features and capabilities. d. firms taking advantage of complementary products developed for a prior generation of technology. e. firms spreading costs across increasing units of production or in serving multiple customers.

B

35. Customers who owned Nintendo's 8-bit video game console were unable to play the same games on the firm's new 16-bit S.N.E.S. system. There was little incentive for existing Nintendo fans to stick with the firm. In this case, Nintendo's new offering suffered from a lack of: a. switching costs. b. backward compatibility. c. staying power. d. effective pricing. e. network effects

B

A research scientist with a major pharmaceutical firm in New Jersey is caught passing on sensitive information, worth millions of dollars, regarding the composition and test results of his firm's latest drug to a rival company. What crime is he being held responsible for? a. Cyber-fraud b. Corporate espionage c. Carrying out technology disruptions d. Extortion e. Illegal funds transfer

B

A security group's R&D function would be involved in: a. the day-to- day monitoring of existing systems. b. understanding emerging threats and reviewing, selecting, and implementing updated security techniques. c. working on broader governance issues. d. educating the organization on the need to improve information security. e. hunting for and exposing organizational security weakness before hackers find them.

B

Amazon, the online retailer, has built a robust set of Web services around its processes and procedures, such as forming a transaction layer to handle online business applications and shielding the retailer's databases. On this evidence, Amazon is said to have _____ in place. a. a cloud computing model b. a service-oriented architecture c. an integrated development environment d. platform independence e. a vertically integrated hierarchy

B

An initial public stock offering (IPO) refers to the: a. price at which a firm's stock is bought. b. first time a firm sells stock to the public. c. minimum value at which a firm's stock is sold. d. payments made by a firm to its shareholders.

B

An organization's partner firms that should be regularly audited to ensure that they are compliant with security frameworks include: a. clients. b. technology providers and contract firms. c. law-enforcement agencies. d. government regulatory bodies. e. international standards organizations.

B

Complete the analogy: Server- Apache HTTP Server; Client- _____ a. MS Word b. Internet Explorer c. Adobe Flash d. MS Paint e. Windows Media Player

B

Computer hardware refers to: a. a precise set of instructions that orchestrates the functioning of the computer. b. the physical components of information technology. c. the mechanism through which users interact with a computer. d. a program that fulfills the requests of a client. e. handheld computing devices meant largely for mobile use outside an office setting.

B

Computer systems are often infected with malware by means of exploits that sneak in masquerading as something they are not. These exploits are called: a. rootkits. b. trojans. c. viruses. d. worms. e. honeypots.

B

Computer-driven investment models can be very effective when the market behaves as it has in the past. However, in terms of historical consistency, they are vulnerable to failure in the face of: a. brute force attacks. b. black swans. c. zero-day exploits. d. over-engineering. e. distributed denial of service.

B

Data becomes _____ when it is presented in a context so that it can answer a question or support decision making. a. knowledge b. information c. analysis d. wisdom e. language

B

Netflix has used the long tail to its advantage, crafting a business model that creates close ties with film studios. What do film studios stand to gain from these ties with Netflix? a. Discounted fees for marketing some of the less-popular titles from the studios b. A cut of the subscription revenue from every disk sent out by Netflix c. Greater bargaining power with movie rental firms such as Netflix, Blockbuster, and Wal-Mart d. Lower costs related to screening movies in cinemas by releasing them straight on DVD e. An equal share of revenue from the digital distribution model through online streaming

B

Network effects occur when: a. the utility of large networks, particularly social networks, can scale exponentially with the size of the network. b. the value of a product or service increases as its number of users expands. c. people do and believe things merely because many other people do and believe the same things. d. a concept or idea is repeatedly asserted in a community, regardless of whether sufficient empirical evidence has been presented to support it. e. money can be made by offering a near-limitless selection of products or services.

B

Offering a nearly limitless selection results in an interesting phenomenon where: a. customers are willing to pay more for inferior goods. b. more money is made selling obscure goods than popular ones. c. firms with physical storefronts are more profitable than pure-plays. d. it is less profitable to sell physical products than otherwise. e. maintenance overheads are slashed contrary to conventional wisdom.

B

Spyware is defined as a type of software that: a. clogs up network traffic and disables networks. b. monitors user actions or scans for files surreptitiously. c. infects other software and decreases the network speeds. d. serves up unwanted advertisements after being installed without user knowledge. e. scans for loopholes in other software and releases malware payloads.

B

Technologies that measure and analyze human body characteristics for identification or authentication are known as _____. a. overlamination processes b. biometrics c. smart tags d. bio-embedded systems e. holographs

B

The customization options that managers and businesses demand in computers are provided by the: a. affordability of software and hardware. b. flexibility of the hardware/software layer cake. c. innovations being carried out mostly on hardware. d. compatibility between end users and the hardware. e. availability of alternative options for hardware and software.

B

The e-mail password of a senior employee in an organization was compromised by someone looking over as the employee accessed his account. This is most likely a case of: a. keylogging. b. shoulder surfing. c. dumpster diving. d. screen capture. e. spyware.

B

Why doesn't Cinematch offer a gross average user rating? a. Customer preferences are peculiar to certain geographical regions. b. User tastes are too varied and the gross average rating data is too coarse to offer any value. c. Most users do not use the Cinematch feature and a gross average user rating is often incorrect. d. Certain movies polarize user opinion and are difficult to rate. e. Cinematch algorithms are configured to use random user ratings, which are statistically unsuitable to provide a gross average user rating.

B

_____ are programs that perform the work that users and firms are directly interested in accomplishing and can be thought of as places where a user's real work is done. a. Emulators b. Applications c. Platforms d. Embedded systems e. Operating systems

B

_____ is a class of computer software that seeks to reproduce or mimic, perhaps with improvements, human thought, decision making, or brain functions. a. Biometrics b. Artificial intelligence c. Android d. Legacy software e. Humanoid

B

_____ is a job title focused on directing, performing, or overseeing activities associated with a database or set of databases. a. Web master b. Database administrator c. Network analyst d. Enterprise architect e. Database author

B

_____ is a term that can be used to refer to the extent to which recommended titles form a part of the content users place in their queues. a. Market share b. Penetration rate c. Marginal factor d. Churn rate e. Queue turns

B

_____ is an application that includes an editor that serves as a programmer's word processor, a debugger, and a compiler, among other tools. a. Programming language b. Integrated development environment c. Operating system d. Extensible markup language e. Enterprise resource planning

B

_____ put users in control so that they can create custom reports on an as-needed basis by selecting fields, ranges, summary conditions, and other parameters. a. Canned reports b. Ad hoc reporting tools c. Dashboards d. Data cubes e. Online analytical processing

B

_____ refers to a limit, imposed by the Internet Service Provider (e.g. cable or telephone company) on the total amount of traffic that a given subscriber can consume (usually per each billing period).

Bandwidth Cap

Fingerprint readers, retina scanners, voice and face recognition technologies are all part of _____.

Biometrics

What term describes the collection of computeres that have been cmpromised and can be controlled in concert by a third party?

Botnet

18. The video game business is said to be a two-sided market. Customers buy a video game console largely based on the number of really great games available for the system. Software developers write games based on: a. the technical capabilities that a video game console can provide. b. the willingness of video game console manufacturers to support their offerings. c. their ability to reach the greatest number of paying customers. d. the availability of similar efforts from their competitors. e. the revenue sharing agreement they are able to reach with the console manufacturers.

C

21. Apple, which controls over 75 percent of digital music sales, was able to dictate song pricing for years, despite the tremendous protests of the record labels. This implies that: a. despite the presence of network effects, the music industry is not dominated by any single leader. b. the presence of multiple new entrants forces leading firms to drop prices of their offerings. c. firms with strong network effects enjoy substantial bargaining power over partners. d. a dominant market share does not necessarily translate to greater profitability for a firm. e. firms with significant market share can leverage network effects to overtake prior market leaders.

C

28. While Sony and Microsoft focused on the graphics and raw processing power favored by hard-core male gamers, Nintendo chose to develop a machine to appeal to families, women, and age groups that normally shunned violent games. The strategy adopted by Nintendo in the above example is the _____ strategy. a. straddling b. customer engagement c. blue ocean d. mass customization e. convergence

C

31. _____ is said to occur when one market attempts to conquer a new market by making it a subset, component, or feature of its primary offering. a. Acquisition b. Greenfield investment c. Envelopment d. Market leapfrogging e. Monopolization

C

39. _____ occur(s) when increasing number of users lower the value of a product or service. a. Network internalities b. Market inflexibility c. Congestion effects d. Backward incompatibility e. Convergence

C

A data cube refers to a: a. database or databases focused on addressing the concerns of a specific business unit. b. set of databases designed to support decision making in an organization. c. special database used to store data in OLAP reporting. d. firm that collects data with the intention of reselling it to others.

C

A low _____ is usually key to a firm's profitability because acquiring a customer is more expensive than keeping one. a. subscription fee b. inventory size c. churn rate d. switching cost e. opportunity cost

C

A protester seeking to make a political point by leveraging technology tools, often through system infiltration, defacement, or damage is called a(n) _____. a. activist b. cyber agitator c. hacktivist d. ethical hacker e. cybersquatter

C

A screen capture can be defined as a type of software that: a. records keystrokes. b. screens the computer for malware. c. records pixels appearing on a user's screen. d. captures images appearing on a screen. e. serves up unwanted advertisements on users' screens.

C

A system that monitors network use for potential hacking attempts and takes preventative action to block, isolate, or identify attempted infiltration, and raise further alarms to warn security personnel is known as a(n): a. firewall system. b. whitelist. c. intrusion detection system. d. honeypot system.

C

An attack on the US power grid by terrorists or a foreign power is indicative of: a. DDoS attacks. b. espionage. c. cyberwarfare. d. extortion. e. phishing.

C

As defined by the World Wide Web consortium, _____ are software systems designed to support interoperable machine-to- machine interaction over a network. a. scripting languages b. client-servers c. Web services d. integrated development environments e. business intelligence systems

C

Which of the following statements holds true for the term encryption? a. It refers to a con executed using technology, typically targeted at acquiring sensitive information or tricking someone into installing malicious software. b. It refers to e-mail transmissions and packets that have been altered to seem as if they came from another source. c. It refers to scrambling data using a code or formula, known as a cipher, such that it is hidden from those who do not have the unlocking key. d. It refers to a seemingly tempting, but bogus target meant to draw hacking attempts.

C

Which of the following technologies is being used to replace the older EDI for specifying data standards? a. Integrated development environment b. Hypertext transfer protocol c. Extensible markup language d. File transfer protocol e. Sequential query language

C

Which of the following term refers to the process of combining aspects of reporting, data exploration and ad hoc queries, and sophisticated data modeling and analysis? a. Logistics b. Analytics c. Business intelligence d. Data assimilation e. Data mining

C

Which of the following types of firms may struggle to get sweeping projects completed in enough time to reap benefits before business conditions change? a. Consumer durables manufacturers b. Essential commodities manufacturers c. Hardware manufacturers d. Energy companies e. Furniture makers

C

While the size of the tail in the long tail phenomenon is disputable, one fact that is critical to remain above this debate is that: a. traditional brick and mortar retailers offer selections that cannot be rivaled by Internet pure-plays. b. energy costs and worker wages drive up the costs of running stores like Netflix. c. customers are primarily attracted to the stores which offer a larger selection of titles. d. the turnover rate of obscure titles in traditional video rental stores is only slightly higher than those for Internet pure-plays. e. the cost of store maintenance and real estate makes stores such as Netflix unattractive.

C

You have received an e-mail that looks suspiciously close to a phishing mail. What is the best course of action to be followed? a. Click on the link in the mail b. Click on the link in the mail and provide any information you are asked for c. Do not click on any links, or download any enclosures d. Click on the link and download the anti-virus software e. Forward the mail to your colleagues

C

_____ refer to older information systems that are often incompatible with other systems, technologies, and ways of conducting business. a. Mainframes b. Interstitials c. Legacy systems d. Semantic computers e. Mnemonic machines

C

_____ refer(s) to special-purpose software designed and included inside physical products. a. Desktop software b. Enterprise software c. Embedded systems d. Platforms e. Application servers

C

_____ refers to applications installed on a personal computer, typically to support tasks performed by a single user. a. Enterprise software b. Server program c. Desktop software d. Software as a service e. Database management program

C

a. ERP b. CRM c. DBMS d. BI e. API

C

_____ are scrambled character images used to thwart things like automated account setup or ticket buying.

CAPTCHAs

Which of the following statements is true about corporations and blogging?

CEOs use blogs for purposes that include a combination of marketing, sharing ideas, press response, image shaping, and reaching consumers directly.

The exploit referred to as __________ allowed hackers to leverage vulnerability in DNS software to redirect users to sites they did not request.

Cache poisoning

_____ is a process-improvement approach that assists in assessing the maturity, quality, and development of certain organizational business processes, and suggests steps for their improvement.

Capability maturity model integration (CMMI)

Which of the following represents the correct sequence of actions taken by the TCP at the destination computer to ensure a perfect copy of the sent message is received?

Check if all sent packets are received; check if packets are damaged; request for new copies of damaged packets; put packets in correct order

Moore's Law

Chip performance per dollar doubles every eighteen months.

in 2009, wired magazine reported that a San Fransisco-based networking equipment company sold routerss used in China's "Golden Shield" project, giving the government more advanced capability to censor the Internet wth China. Whats the name of the company?

Cisco Systems

The technology known as ______ is helping to fuel the current age of fast-growth technology entrepreneurship. This technology means that a start-up can rent the computing resources one previously had to buy a great expense

Cloud computing, "the cloud"

Which of the following is true about cloud computing?

Cloud firms are often located in warehouse-style buildings designed for computers, not people.

_____ is a classification of software that monitors trends among customers and uses this data to personalize an individual customer's experience.

Collaborative Filtering

_____ refers to efforts that allow participants to share access to products and services rather than having ownership

Collaborative consumption, The sharing economy

_____ are products or services that are nearly identically offered from multiple vendors.

Commodities

Marketers can leverage social media channels for:

Competitive intelligence generating customer input. disseminating information. reinforcing a customer's relationship with the firm. **All the above**

supercomputers

Computers that are among the fastest of any in the world at the time of their introduction.

24. Worldwide auction leader eBay started operations in Japan just five months after Yahoo! launched its Japanese auction service. But eBay was never able to mount a credible threat and ended up pulling out of the market. This example shows that: a. online auction markets are characterized by constant shifts in market dominance. b. market dominance in the global marketplace translates to an equivalent position in national markets. c. national markets tend to be influenced by factors that are not necessarily localized. d. it's imperative to move first in markets influenced by network effects. e. firms should always subsidize initial adoption of their products and make them cheaper than their competitor's products.

D

27. Viral promotion involves: a. offering rebates and incentives to customers for adopting a product or service. b. paying celebrities to use a product visibly to lure customers into unwittingly buying the product. c. emphasizing customer retention and satisfaction, rather than a dominant focus on sales transactions. d. leveraging a firm's customers to promote a product or service. e. sending a pre-written set of messages to customers or prospects over time.

D

34. Which of the following is an example of a measure taken by a firm to encourage the development of complementary goods? a. Adobe giving away the Acrobat reader for free b. Microsoft bundling new products into Windows, Internet Explorer browser, and other offerings c. Google's support of the Open Social standard for social networking d. Apple's iTunes that allows developers to sell their products online e. Nintendo's Wii games targeted at families, women, and older age groups

D

A bank customer receives a message, ostensibly from the bank's Web site, asking her to provide her login information. Assuming the message is intended to defraud the customer, what type of infiltration technique is being used here? a. Spyware b. Malware c. Social engineering d. Phishing e. Virus infections

D

A(n) _____ is an AI system that examines data and hunts down and exposes patterns, in order to build models to exploit findings. a. data mine b. canned report c. data aggregator d. neural network e. e-discovery

D

A(n) _____ is someone who uncovers computer weaknesses without exploiting them. a. hacktivist b. data harvester c. corporate spy d. white hat hacker e. ethical cyber criminal

D

An internal team at Netflix developed a prototype set top box to enable the direct streaming of content to customers' television sets. However, the idea of offering it to Netflix customers was dropped because: a. the market for online streaming was nascent and unprofitable. b. firms such as Apple and Amazon offered third-party set top boxes to stream Netflix movies. c. of the commoditization of Blu-ray players, which rendered set top boxes obsolete. d. of the brutally competitive nature of the consumer electronics business. e. the firm was apprehensive about investing in the hardware business when it was losing revenue during the economic recession.

D

Attacks that are so new that they have not been clearly identified, and so have not made it into security screening systems are called _____. a. novel attacks b. first mover attacks c. non-precedent breaches d. zero-day exploits e. brute force attacks

D

Churn rate is a term that refers to the: a. average number of recommended titles in a user's queue. b. rate at which the demand for a product or service fluctuates with price change. c. number of movie titles that are difficult to assign reliable user ratings. d. rate at which customers leave a product or service. e. number of user ratings accrued per movie.

D

Collaborative filtering is a classification of software that: a. is used to gather user ratings and calculate a gross average user rating for each movie. b. provides Netflix users with parental controls and other options while streaming movies online. c. selectively sorts movies based on their censor ratings and delivers age-appropriate search results. d. monitors trends among customers to personalize an individual customer's experience. e. collates user ratings for a movie and creates a ranked list of movies most liked by users.

D

Control programs stored on nonvolatile chips are sometimes referred to as _____. a. user interface b. desktop software c. server d. firmware e. programming language

D

Customer lifetime value represents: a. the portion of income spent on leisure by a customer over the course of his lifetime. b. the increase in the purchase of current goods and services that results from an increase in income. c. a customer's assessment of the value of the brand, above its objective value. d. the present value of the likely future income stream generated by an individual purchaser. e. the tendency of a customer to stick with a brand even when it is priced higher than an otherwise equal product.

D

Databases organized in such a way that multiple tables are interconnected based on common keys, are referred to as _____ databases. a. hierarchical b. operational c. object-oriented d. relational e. analytical

D

Even if Netflix gave Cinematch away to its rivals, they would still not be able to make the same kind of accurate recommendations as Netflix. This is because of Netflix's _____. a. technological superiority b. customer loyalty c. movie expertise d. data advantage e. large inventory

D

Implementation of information security in an organization should essentially start with: a. upgrading to the latest hardware and software available in the market. b. researching and complying with the latest industry guidelines. c. investing in the best infrastructure. d. inventory-style auditing and risk assessment of threats. e. employing a security consultant.

D

Netflix can send out any DVD it buys because of a Supreme Court ruling known as the _____. a. clickwrap agreement b. Betamax ruling c. fair use law d. First Sale Doctrine e. Copyright Directive

D

Netflix gets the lowest possible postal rates for first-class mail delivery because: a. it has a network of distribution centers that are all within driving distance of at least one USPS processing and distribution facility. b. its value chain is vertically integrated, with a division handling delivery and pickup from customers' homes. c. the postal service is based on a model in which customers pay a part of the postal fee. d. it picks up and drops off the DVDs at the USPS hubs and presorts all outgoing mail for faster delivery. e. its scale advantage affords it the bargaining power to arm-twist the USPS into providing postal services at discounted rates.

D

Which of the following statements is consistent with ground realities regarding information security? a. Cyber-crime is not yet considered a serious enough threat to warrant the attention of law- enforcement agencies. b. Law-enforcement agencies are well-resourced to fight cyber-crimes effectively. c. Governments usually outmatch private industry in terms of retaining top talent with incentives and generous pay. d. Law-enforcement agencies employ technically inept employees who are incapable of keeping pace with today's cyber-criminals. e. Cyber-crime is not rewarding in terms of financial gain.

D

Which of the following statements is true about information systems? a. Most firms spend a huge portion of their information technology budgets on training and system security. b. New programs should be thoroughly tested across the range of a firm's hardware after deployment. c. Purchase, configuration, and licensing costs for packaged software account for most information technology expenses of a firm. d. Firms need to vigilantly manage the moving target of computer security issues. e. Total cost of ownership of information systems is often a redundant concept while making technology investment decisions.

D

Which of the followings aspects of international law would enable a cyber-criminal operating across borders to evade prosecution? a. Lack of technology to identify the origin of a security attack b. Non-recognition of commission of a security-related crime c. Unwillingness of developed countries to share technical know-how with lesser-developed countries d. Non-existent extradition agreements between two countries

D

Why do firms need to create separate data repositories for their reporting and analytics work? a. Most firms store their data assets offsite to insure themselves against the possibility of data damage through natural disasters. b. Maintaining huge databases in-house can be a cost-sink for most firms. c. Most organizations need to differentiate data derived in-house and from data aggregators. d. Running analytics against transactional data can bog down a system. e. Most firms derive their data in a combined and reformatted form.

D

_____ can be either software-based or hardware, such as a recording "dongle" that is plugged in between a keyboard and a PC. a. Shadow-keyboards b. Bootloggers c. Rootkits d. Keyloggers e. Adwares

D

_____ helps maintain a consistent look and feel to the various Web sites in a given Web site. a. DBMS b. DSSSL c. FOSI d. CSS e. SMIL

D

_____ is a method of querying and reporting that takes data from standard relational databases, calculates and summarizes the data, and then stores the data in a special database called a data cube. a. Ad hoc reporting b. E-discovery c. Data aggregation d. Online analytical processing e. Data adjacency

D

_____ provide regular summaries of information in a predetermined format. a. Ad hoc reporting tools b. Dashboards c. Data cubes d. Canned reports e. Expert systems

D

_____ refers to removing an organization from a firm's distribution channel. a. Disbarment b. Repudiation c. Annulment d. Disintermediation e. Revocation

D

_____ refers to software for creating, maintaining, and manipulating data. a. Collaborative filtering b. Virtualization c. Peer production d. DBMS e. Programming language

D

37. Microsoft's Live Maps and Virtual Earth 3D was a late entrant to the Internet mapping game. Users had already put in countless hours building resources that meshed with Google Maps and Google Earth. However, by adopting the same keyhole markup language (KML) standard used by Google, any work done by users for Google in KML could be used by Microsoft. What strategy of Microsoft's allowed it to catch up with Google? a. Making a new market a subset of its main offering b. Taking advantage of complementary products developed for a prior generation of technology c. Entering an uncontested, low profit market instead of competing in saturated, high profit markets d. Exchanging technical expertise in one area with another firm to effectively suit resource capabilities e. Making a new product compatible with the leading standard

E

A _____ is a marketing effort by a firm that is targeted at extracting information about an individual customer that might help the firm keep the customer faithful and satisfied. a. data aggregator b. canned report c. dashboard d. legacy system e. loyalty card

E

A domain name service is a collection of software that: a. allots domain names to different Web sites. b. assigns IP addresses to different systems. c. directs the flow of traffic across the Internet. d. maintains a registry of different IP addresses. e. maps an Internet address to an IP address.

E

A programmer typically writes code in a language that humans can more easily understand, and then converts it into a form expressed in patterns of ones and zeros that can be understood and executed by a microprocessor. This process of converting the code into machine-readable form is known as: a. integrating. b. assimilating. c. debugging. d. sequencing. e. compiling.

E

A(n) _____ refers to a heads-up display of critical indicators that allow managers to get a graphical glance at key performance metrics. a. interstitial b. embassy c. canned report d. prediction interface e. dashboard

E

An example of an exploit of unpatched vulnerability is: a. DDoS attacks. b. screen capture. c. brute-force attacks. d. spear phishing. e. DNS cache poisoning.

E

Costs that do not vary according to production volume are called _____. a. total costs b. marginal costs c. switching costs d. variable costs e. fixed costs

E

Distributed computing refers to: a. a firm subscribing to third-party software and receiving a service that is delivered online. b. a technology that can make a single computer behave like many separate computers. c. replacing computing resources, hardware or software, with services provided over the Internet. d. a firm developing its own software, and then running it over the Internet on a service provider's computers. e. systems in different locations communicating and collaborating to complete a task.

E

Firms that collect and resell data are known as: a. data harvesters. b. clearing houses. c. knowledge consultancies. d. information process outsourcers. e. data aggregators.

E

How is the collaborative filtering software used by Netflix advantageous to the firm? a. The superior coding technique used in the software provides Netflix with a competitive advantage over its rivals. b. The collaborative filtering software used by Netflix is truly platform-independent and can be reliably used by all users. c. The open source nature of the collaborative filtering software ensures that users can constantly incorporate changes in the code to make it more accurate. d. The software automates the process of sorting and queuing movie titles requested by users as they move in and out of the warehouses. e. The software has created an enormous data advantage, that is valuable, results yielding, and impossible for newcomers to match.

E

If a customer pays a retailer in cash, he is likely to remain a mystery to the retailer because his name is not attached to the money. Grocers and retailers can tie the customer to cash transactions and track the customer's activity, if they can convince the customer to use a: a. transaction processing system. b. point-of- sale terminal. c. data cube. d. dashboard. e. loyalty card.

E

In a database, _____ represent each category of data contained in a record. a. rows b. tables c. keys d. files e. fields

E

Internet retailers serve a larger geographic area with comparably smaller infrastructure and staff. This fact suggests that Internet businesses are more _____. a. centralized b. decentralized c. capitalized d. vertically integrated e. scalable

E

_____ provide the standards, syntax, statements, and instructions for writing computer software. a. Operating systems b. Application servers c. Database management systems d. Platforms e. Programming languages

E

What is the most common function performed by electronic data interchanges? a. Housing and serving business logic for use (and reuse) by multiple applications b. Synchronizing communication and collaboration between geographically separated computers to complete a common task c. Providing reporting and analysis for organizational decision making d. Integrating various functions of a business, such as accounting, finance, inventory management, and human resources e. Sending electronic equivalents of structured documents between different organizations

E

What security risk could be posed by a botnet large enough to hold a few million zombie computers? a. Restricting communication between approved entities b. Crippling a substantially sized network by withholding critical information like passwords c. Organizing an underworld market dealing in trade of stolen information d. Stealing critical information like social security numbers, or revenue records e. Sending spam mail from thousands of difficult-to- shut-down accounts

E

What solution has Netflix come up with to address the need to deliver content to customers' televisions? a. Netflix has entered into a revenue sharing agreement with Apple to produce customized set top boxes. b. Netflix access is being baked into new-age Blu-ray players that are fast on the track to commoditization. c. Netflix has invested in a hardware division to build and market its own set top boxes. d. Netflix has acquired Vudu, a firm that specializes in the online streaming business. e. Netflix provides a software platform to firms seeking to build Netflix access into their devices.

E

Which of the following could be one of the ways firms lockdown personnel hardware? a. Mandate the use of industry-standard software alone on company hardware b. Implement frequent overhaul of hardware c. Dispose of used hardware after annual audits d. Regularly initiate software auditing e. Regularly reimage the hard-drives of end user PCs

E

Which of the following factors can potentially halt the availability of a firm's product or service? a. Lack of competitors b. Having a critical mass of user support c. Low prices d. Strong bargaining power of the firm e. Bankruptcy

E

Which of the following functions of embedded systems help make a device smarter? a. They allow for the development and integration of software products and other complementary goods. b. They facilitate user interaction with computing devices through interface elements such as windows, scroll bars, and dialog boxes. c. They provide programmers a common set of commands to consistently interact with the hardware. d. They house and serve business logic for use (and reuse) by multiple applications. e. They diagnose problems with computer hardware, and provide alerts for maintenance.

E

Which of the following is an example of computer hardware? a. Firmware b. Operating system c. Application d. Platform e. Network cable

E

With the entry of Wal-Mart and Blockbuster into the DVD-by- mail market, Netflix was forced to: a. cut spending on advertising and marketing campaigns. b. issue an initial public stock offering to generate funds for expansion. c. raise the prices of its services to generate more revenue. d. switch from flat-rate subscription to a per-disc rental fee model. e. cut prices and increase spending on advertising.

E

_____ is by far the most popular language for creating and manipulating databases. a. XML b. HTML c. PHP d. Java e. SQL

E

_____ is the process of using computers to identify hidden patterns and to build models from large data sets. a. Data harvesting b. E-discovery c. Optimization d. Report canning e. Data mining

E

Click fraud

Generating bogus clicks, either for financial gain, or to attack rivals by draining their online ad budget

1 _____ = 1 billion bytes

Gigabyte

Sergey Brin and Larry Page were both twenty-something doctoral students at Stanford University when they founded:

Google

_____ is the language used to compose Web pages.

HTML

_____ refers to a term that either means breaking into a computer system or a particularly clever solution.

Hack

Technology products with particularly strong security features are said to be:

Hardened

Most operating systems include control panels, desktop file management, and other support programs to work directly with _____ elements like storage devices, displays, printers, and networking equipment.

Hardware

If a computer system can be equated to a layered cake, which of the following combinations represents the computer system in the bottom-to-top order?

Hardware, operating system, application, user

_____ is the nonprofit organization responsible for managing the Internet's domain and numbering systems.

ICANN (Internet Corporation for Assigned Names and Numbers)

Peering usually takes place at neutral sites called _____.

IXPs

_____ offers an organization an alternative to buying its own physical hardware.

IaaS

Geo-targeting

Identifying a user's physical location. Sometimes called geolocation, for the purpose of delivering tailored ads or other content.

If a firm's claim in the blue ocean is based on easily _____ resources (like technology features), then holding off rivals will be tougher.

Imitated

embassy

In the context of social media, an established online presence where customers can reach and interact with the firm. An effective embassy approach uses a consistent firm name in all its social media properties.

wikimasters

Individuals often employed by organizations to review community content in order to delete excessive posts, move commentary to the best location, and edit as necessary.

The _____ of open source products is used to power many of the Internet's most popular Web sites.

LAMP stack

interpreted

Languages where each line of written code is converted (by a software program, called an "interpreter") for execution at run-time. Most scripting languages are interpreted languages. Many programmers also write Java applications to be interpreted by the Java Virtual Machine,

inbound marketing

Leveraging online channels to draw consumers to the firm with compelling content rather than conventional forms of promotion such as advertising, e-mail marketing, traditional mailings, and sales calls.

Which of the following problems is least likely to be solved through grid computing?

Linear problems

trackbacks

Links in a blog post that refer readers back to cited sources. Trackbacks allow a blogger to see which and how many other bloggers are referring to their content. A "trackback" field is supported by most blog software and while it's not required to enter a trackback when citing another post, it's considered good "netiquette" to do so.

switching costs

The cost a consumer incurs when moving from one product to another. It can involve actual money spent (e.g., buying a new product) as well as investments in time, any data loss, and so forth.

price transparency

The degree to which complete information is available

wisdom of crowds

The idea that a group of individuals (the crowd), often consisting of untrained amateurs, will collectively have more insight than a single or small group of trained professionals.

Cost per click

The maximum amount of money and advertisers willing to pay for each click on their ads

Click through rate

The number of users who clicked an ad divided by the number of times that I was delivered, impressions. The click through rate measures the percentage of people who click on an ad to arrive at a destination site

microprocessor

The part of the computer that executes the instructions of a computer program.

Search engine optimization

The process of improving a page is organic search results

online reputation management

The process of tracking and responding to online mentions of a product, organization, or individual. Services supporting online reputation management range from free Google Alerts to more sophisticated services that blend computer-based and human monitoring of multiple media channels.

SMART

The social media awareness and response team. A group tasked creating policies and providing support, training, guidance and development expertise for and monitoring of a firm's social media efforts

Tony Hsieh served as CEO of _____, and eventually sold the firm to Amazon for $900 million.

Zappos

software

a computer program or a collection of programs. it is a precise set of instructions that tells hardware what to do

Apple's dominance of smartphone and tablet markets has allowed the firm to lock up 60 percent of the world's supply of advanced touch-screen displays, and to do so with better pricing than would be available to smaller rivals. This is an example of:

a growing firm gaining bargaining power with its suppliers.

blog rolls

a list of a blogger's favorite blogs; while not all blogs include these, those that do are often displayed on the right or left column of a blog's main page

hash tag

a method for organizing tweets where keywords are preceded by the # character

what you see is what you get (WYSIWYG)

a phrase used to describe graphical editing tools, such as those found in wiki, page layout program, or other design tool

EDI (electronic data interchange)

a set of standards for exchanging messages containing formatted data between computer applications

enterprise resource planning (ERP)

a software package that integrates the many functions (accounting, finance, inventory management, human resources, etc.) of a business

client

a software program that makes requests of a server program

extensible markup language (XML)

a tagging language that can be used to identify data fields made available for use by other applications. Most APIs and Web services send messages where the data exchanged is wrapped in identifying XML tags

tweets

a twitter post, limited to 140 characters

microblogging

a type of short message blogging, often made via mobile device. they are designed to provide rapid notification to their readership (a news flash, an update), rather than detailed or in-depth comments. twitter is the most popular service

_____ refers to applications that address the needs of multiple users throughout an organization or work group.

enterprise software

_____ refer to the multibillion dollar plants used to manufacture semiconductors.

fabs

A firm's financial performance that consistently outperforms its industry's peers is known as operational effectiveness.

false

A salesperson's ability to effectively bargain with his/her consumers is called viral marketing.

false

According to the resource-based view of competitive advantage, if a firm is to maintain sustainable competitive advantage, it must control a set of exploitable resources that are valuable and can be substituted easily.

false

An option is a right and an obligation to make an investment.

false

As with other types of social media, content flows in social networks are easy to control.

false

Blog posts are listed in forward order of creation, making it easy to see the most recent content.

false

Blogs do not hold any attraction for corporations because they hinder immediate and unfiltered distribution of ideas.

false

Building brands online can be expensive. This has proven especially true for successful social media sites, which have built brand awareness through expensive advertising campaigns.

false

Businesses benefit from economies of scale when the cost of an investment can be used in serving a niche customer base.

false

Circuit-switched networks are advantageous because they offer an inexhaustible supply of bandwidth for telecommunications.

false

Commodities are products or services that vary across multiple vendors.

false

Communication between people results in time savings, cost reductions, and fewer errors than communication between computers.

false

Consumerization of corporate technology stifles employee creativity.

false

Despite its good intentions, privacy regulations exposed the website PatientsLikeMe to significant fines and it was eventually forced to shut down.

false

Dot-com domain name registration is carried out on an auction basis to ensure the highest bidder gains rights to the desired domain name.

false

EDI is easier to code and more robust than XML because it can be extended.

false

ERP systems and enterprise software programs should be ideally configured to use different database systems to avoid the possibility of data redundancy.

false

Enterprise Resource Planning software has proven popular in part because the standardization these products impose makes them exceptionally easy to deploy

false

Facebook was founded by Kevin Rose.

false

Fast-growing Groupon was able to dissuade rivals from entering its market because the firm's technology was so difficult to replicate.

false

Firms that adopt software as a service actually buy a system's software and hardware, so these systems become a fixed operating expense.

false

viral

in this context, information or applications that spread rapidly between users

long tail

in this context, refers to an extremely large selection of content or products. The Long Tail is a phenomenon whereby firms can make money by offering a near-limitless selection.

The phrase ___________________________ refers to leveraging online channels to draw consumers to the firm with compelling content rather than conventional forms of promotion such as advertising, e-mail marketing, traditional mailings, and sales calls.

inbound marketing

applications

includes desktop applications, enterprise software, utilities, and other programs that perform specific tasks for users and organizations

The _____ department in an organization not only ensures that systems get built and keep running but also take on strategic roles targeted at proposing solutions for how technology can give the firm a competitive edge.

information systems

A(n) _____ is an application that includes an editor, a debugger, and a compiler, among other tools.

integrated development environment

Circuit-switched networks provide connection between two parties that:

is dedicated for use by the parties for the duration of a connection.

Citing Wikipedia as a reference is not considered a good practice because Wikipedia:

is not original source materials, but rather a clearinghouse of information.

Popular sites like Google and Yahoo! have several computers assigned to their host names because:

it ensures that the load of requests to their sites do not overwhelm a single computer.

Sony, a firm once synonymous with portable music, has ceded its market dominance to Apple because:

it failed to adapt to the changes in the electronics industry as predicted by Moore's Law.

Open source software products often have fewer bugs than their commercial counterparts because of the:

large number of people who have looked at the code.

The phrase ________ is used by technologists to refer to delay

latency

technology experts in the area of process design

leverage technology to make firms more efficient

viral marketing

leveraging consumers to promote a product or service

Which of the following is an operating system?

linux

_____ is the flagship open source product.

linux

_____ involves distributing a computing or networking workload across multiple systems in order to avoid congestion and slow performance.

load balancing

A(n) _____ is referred to as the brain of the computer.

microprocessor

The _____ is the part of a computer that executes the instructions of a computer program.

microprocessor

Storage that retains data even when powered down is known as _____ memory.

nonvolatile

Blogs refer to:

online journal entries, usually made in a reverse chronological order.

blogs

online journal entries, usually made in a reverse chronological order. Blogs typically provide comment mechanisms where users can post feedback for authors and other readers

Android is a software product developed by Google that allows cell phone manufacturers to control hardware and establishes standards for developing and executing applications on its platform. Android is thus an example of a(n) _____.

operating system

A(n) _____ refers to a massive network of computer servers running software to coordinate their collective use and to provide a common set of services.

server farm

A thin, circular slice of material used to create semiconductor devices is known as a(n) _____.

silicon wafer

_____ refers to a precise set of instructions that tell the computer hardware what to do.

software

The term _____ refers to computers that are among the fastest of any in the world at the time of their introduction.

supercomputers

If a new entrant hopes to attract customers from an established incumbent, the new entrant must ensure that the value they offer exceeds the incumbents? value in addition to any perceived _____.

switching costs

_____ exist when consumers incur an expense to move from one product or service to another.

switching costs

supply chain management (SCM)

systems that can help a firm manage aspects of its value chain, from the flow of raw materials into the firm, through delivery of finished products and services at the point-of-consumption

business intelligence (BI) systems

systems that use data created by other systems to provide reporting and analysis for organizational decision making

One of the disadvantages of cable technology is that:

systems used by many providers require customers to share bandwidth with neighbors.

customer relationship management (CRM)

systems used to support customer-related sales and marketing activities

Operational effectiveness is usually not enough to yield sustainable competitive advantage because

technology can be easily acquired.

marginal cost

the cost of producing one more unit of a good

Some of the radical changes brought about by new technologies include:

the creation of an unprecedented set of security and espionage threats.

____ are software systems designed to support interoperable machine-to-machine interaction over a network.

web services

free rider problem

when others take advantage of a user or service without providing any sort of reciprocal benefit

collaborative consumption

when participants share access to products and services rather than having ownership. Shared resources can be owned by a central service provider (e.g. ZipCar) or provided by a community that pools available resources (e.g. Airbnb, Uber)

Cloud computing is not suited for situations:

where complex legacy systems have to be ported.

According to the text, the most popular platform for users choosing to host their own blog server is:

wordpress

technology experts in the area of user-interface design

work to make sure systems are intuitive and easy to use


Kaugnay na mga set ng pag-aaral

NRSG 102- Water and Electrolytes

View Set

Business Analytics Midterm (Concepts)

View Set

Exam II (5, 7, 8 ,14, 15, 13, 16)

View Set

Chapter 15: Intraoperative Nursing Management

View Set

Chapter 3: Interests in Real Estate

View Set