MIS Chapters 1-6
What factors should organizations take into account when considering the use of social media applications within an organization?
organizational issues, culture, security
Twitter is a(n) _______ a. microblog b. retail Web site c. advertising Web site d. e-commerce site e. online store
microblog
Viral marketing
a type of marketing that resembles offline word-of-mouth communication in which advertising messages are spread similar to how real viruses are transmitted through offline social networks - using the network effect to increase brand awareness, good marketing technique
Narrow Market, Low-Cost Strategy
when a company focuses on a narrow/ smaller customer segment and offers its goods and/ or services at a low cost
Narrow Market, Differentiation Strategy
when a company increases the value of a product or service and sell it to a specific and targeted segment of the market
Globalization and Societal Issues in the Digital World
- The rapid rise of a new middle class (knowledge workers) in developing countries has enabled established companies to reach millions of new customers - Tremendous decrease in communications costs has increased the use of outsourcing• -- Rapid urbanization has led to 50% of the world's population now living in cities - The global shift in economic power and climate change are other influencing factors
Internet/ Search Marketing
- "if you build it, they won't come unless you market it" - the strategies used to market products and services online and through other digital means
E-Commerce
- (electric commerce) the exchange of goods, services, and money among firms, between firms and their customers, and between customers, supported by communication technologies and in particular, the Internet - occurs when any aspect of the transaction is facilitated by electronic communication technologies
To enable collaboration and communication within an organization's workforce, many companies now use ______ a. the Internet b. Skype c. Gmail d. a social intranet e. videoconferencing
a social intranet
GPS-Enabled Location Based Services
a software service for mobile device applications that requires knowledge about where the mobile device is geographically located -
What's an example of government-to-government electronic commerce
a state agency reporting birth and death information to the U.S. Social Security Administration using the Internet
Geographic Information Systems (GIS)
a system for creating, storing, analyzing, and managing geographically referenced information - GIS benefits greatly from advances in machine learning, especially for recognizing and classifying geographical features - geographical data are often best represented on a map, which simplifies comprehension and allows users to focus on what the data mean, rather than putting data into specific context
What is representational delight
a web page's characteristics that stimulates a consumer's/user's senses
Electronic Meeting System (EMS)
an electronic meeting system that utilizes networked computers and sophisticated software to support various group tasks
Mobile Marketing
any advertising activity that promotes products and services via mobile devices, such as tablets and smartphones
Who can public clouds be used by
any interested party on a pay-per-use basis
Who is the ".com" suffix in a Uniform Resource Locator (url) reserved for
commercial organizations
Virtual Teams
composed of members from different geographic areas and assembled as needed to collaborate on a certain project
The auction site eBay.com is an example of _________ electronic commerce a. business-to-business b. consumer-to-consumer c. business-to-consumer d. consumer-to-business e. government-to-business
consumer-to-consumer
Types of E-Commerce
- Business-to-consumer (B2C): transactions between businesses and their customers - Business-to-business (B2B): transactions among businesses - Consumer-to-business (C2B): transactions between customers and businesses: a person offers his photography at shutterstock.com - Consumer-to-consumer (C2C): transactions between people not necessarily working together
Enabling interactive Web sites using databases:
- E-commerce makes extensive use of databases - Product catalog data are stored in databases and available to users - Customer billing and shipping - E-commerce applications process millions of transactions per day
The Evolving Web
- Evolving Web Capabilities - Evolving Social Interaction - The Evolving Workspace - Future Web Capabilities
What type of tool is e-filing an example of
government-to-citizen
Big Data and Rapidly Increasing Storage Needs
- Firms collect unprecedented levels of data -business intelligence -Legal compliance (e.g., Sarbanes-Oxley) - Unprecedented levels of data require unprecedented infrastructure capabilities -More storage space, powerful hardware, and database management -Ever-increasing Internet bandwidth -Vicious cycle: enhanced capacity drives new applications, requiring even more capacity
Types of E-Government
- Government-to-Citizens (G2C) - Government-to-Business (G2B) - Government-to-Government (G2G)
servers
- Host (serve up) data, databases, files, applications, Web sites, video, and other content for access over the network - host applications and content for use by client computers
Issues Associated with Managing the IS Infrastructure
- IS infrastructure gets obsolete rapidly and Shorter IT Cycles (as IT cycles shorten, hardware that may still perform its intended function becomes obsolete and needs to be replaced and upgraded) - Big Data process are in the increase and also Rapidly Increasing Storage Needs - Demand Fluctuations - Increasing Energy Needs
cloud computing service models
- Infrastructure as a Service (IaaS) - Platform as a Service (PaaS) -Software as a Service (SaaS)
EC Business Strategies
-Brick and mortar is when a physical, store-only company has a limited products reach as well as limited sales and support hours -Click only is when a virtual company that only sells through online store fronts -Click and mortar is when a company allows both online transactions and physical store sales
Service Oriented Architecture (SOA)
- where business processes are broken down into individual components/ services so that organizations can more swiftly react to changing business needs -building blocks -when using SOA, multiple applications can invoke services - hosted and deployed in the cloud, eliminating the need for an organization to "reinvent the wheel" - principles of SOA: reusability, interoperability, componentization
Intranets and Employee Portals
- Intranet: an internal, private network using web technologies to facilitate the secured transmission of proprietary information within an organization, thereby restricting access to authorized users within the organization -companies create Intranets to share documents and information within the organization - real- time access to information (updated information instantly available throughout the organization) - enterprise search (company focused, including corporate databases) -collaboration (document sharing and co-editing) - employee portals (employee benefits self-service)
Wiki
- wiki is a website allowing people to create, edit, or delete content as well as discuss about content or suggested changes with other members of the community
internet of things
-A broad range of physical objects (such as computer, sensors, or motors) that can automatically share data over the Internet - the Industrial Internet of Things (IIoT) enables the convergence of it and operations technology to enable mass-produced customized products
Enabling Organization Strategy through Information Systems
- Organizational Decision-Making Levels - Organizational Functional Areas - Information Systems for Automating: Doing things Faster - Information Systems for Organizing Learning: Doing Things Better - Information Systems for Supporting Strategy - Identifying Where to Compete: analyzing Competitive Forces - Identifying How to Compete: analyzing Competitive Forces - Identifying How to Compete: Choosing a Generic Strategy - Identifying How to Compete: Resources and Capabilities - Identifying How to Compete: Analyzing the Value Chain - The Role of Information Systems in the Value Chain Analysis - The Technology/ Strategy Fit
Social Media and the Enterprise
-Enhancing Communication Using Social Media -Enhancing Cooperation with Social Media -Enhancing Collaboration with Social Media -Enhancing Connection with Social Media
The term ______ refers to a class of software that enables people to work together more effectively. a. groupware b. firmware c. spyware d. malware e. mashup
groupware
mobile device
handheld moving computer
What are the components of information systems
hardware, software, and telecommunications networks
Hardware Computer Types
- Supercomputers are used to solve the most computationally demanding problems, such as weather forecasting or scientific research. (one to many simultaneous users) - Mainframe computers are used by businesses to host enterprise applications and perform transaction processing. (1,000+ simultaneous users) - Servers host content and information for online access and retrieval. (10,000+ simultaneous users) - Workstations are powerful computers typically used by one individual for demanding applications such as graphical design or engineering simulation. (typically 1 simultaneous user) - Personal computers are used by normal computer users to facilitate their personal productivity. (1 simultaneous user) - Mobile devices are used by users on the go with the ability to connect anywhere and at anytime. (1 simultaneous user)
Crowdsourcing
- uses people all over the world as a cheap labor force - human-based computing - Amazon uses crowdsourcing
The need for Communication and Collaboration
- virtual teams - groupware - videoconferencing - intranets and employee portals
Future Web Capabilities: the Semantic Web and Web 3.0
The Semantic Web: a set of design principles that will allow computers to better index web pages, topics, and subjects -Enhanced search results Web 3.0 -To be centered around mobility -The contextual web where tremendous amounts of content available to users will be filtered by contextual factors (e.g., time, location, etc.)
Which of the following statements is true about collaboration a. Two or more people cooperating b. Two or more people working together on a project team c. Two or more people meeting together at lunch d. Two or more people working together to achieve a common goal e. Two or more people working together
Two or more people working together to achieve a common goal
The Emergence of the Digital World
•The proliferation of mobile devices such as smart phones, tablets, and iPads are all around us •Changes in technology enables new ways of working and socializing •Boundaries between work and leisure time are blurring
What is hardware
physical computer equipment, such as the computer monitor, central processing unit, or keyboard
Business Intelligence (BI)
refers to tools and techniques for analyzing and visualizing past data - BI tools are used by business users to analyze both structured and unstructured data to obtain an understanding of current and past performance - BI tools provide decision support by enabling business users to perform analyses to obtain an understanding what has happened
Advanced analytics
refers to tools and techniques used to understand why something happened, predict future outcomes, or discover hidden patterns in large data sets - designed to help users gain a deeper understanding of why things happen and then build predictive models to support decision making - advanced analysis tools provide decision support enabling business users as well as business analysts and data scientist to gain a deeper understanding of why things happened and to build predicitive models
What is Freemium
revenue model where limited versions of digital products or services are offered for free, but a premium is charged for special features
Describe a supercomputer
the most expensive and most powerful kind of computer, which is used primarily to assist in solving massive scientific problems (with respect to the general classes of computers)
The network effect refers to the notion that the value of a network is dependent on _______ a. the speed of the network b. the number of other users c. the knowledge of the users d. the commitment of the users e. the technical expertise of the moderators
the number of other users
According to Moore's Law,.....?
the number of transistors that could be squeezed onto a silicon chip would double every 18 months (year and six months)
What's e-tailing
the online sales of goods and services
What is disintermediation
the phenomenon of cutting out the "middleman" and reaching customers more directly and efficiently
Business-to-business (B2B)
transactions among businesses - ex: a manufacturer conducts business over the web with its suppliers
Business-to-consumer (B2C)
transactions between businesses and their customers - ex: a person buys a book from Amazon.com
Consumer-to-business (C2B)
transactions between customers and businesses - ex: a person offers his or her photography at shuttershock.com
Consumer-to-consumer (C2C)
transactions between people not necessarily working together - ex: a person purchases some memorabilia from another person via eBay
Operational Level
who: Operational Employees, Foremen, Supervisors what: automate routine and repetitive activities and events why: improve organizational efficiency -operational informal systems primarily focus on process automation which can include automating routine activities as well as automating and optimizing structured decisions (such as employee scheduling)
Managerial/ Tactical Level
who: middle management what: automate the monitoring and controlling of operational activities why: improve organizational effectiveness - information systems are this level are focused on helping middle management exercise control more efficiently and on helping them make semi-structured decisions with better input and resources
Executive/Strategic Level
who: upper management what: aggregate summaries of past organizational data and projections of the future why: improve organizational strategy and planning
Databases
- collections of data - organized to facilitate data searches
1 Giga Byte =
1024 MB
Components of a Business Model
- a business model is a summary of a business's strategic direction that outlines how the objectives will be achieved - a business model specifies the value proposition, as well as how a company will create, deliver, and capture value
Videoconferencing
- a simple solution to the problem of people needing to talk who are in different locations
cloud computing
- a way to allocate IS resources much like a utility sells power - allows businesses to sell cloud resources through Web interfaces like other products, and it allows companies needing resources to buy them as needed (scaling up or down as the business needs to fluctuate) - resources are used "on-demand", as needed - customers only pay for what they consume - resources can be rapidly allocated and reallocated -consumption becomes an operating expense -% of utilization and efficiency increase dramatically -characteristics: on-demand self service, rapid elasticity, broad network access, resource pooling, measured service
Typical Revenue Models in the Digital World
- affiliate marketing - advertising - subscription - licensing - transaction fees/ brokerage - traditional sales -freemium
Private Cloud
- allows for rapid allocation of resources across internal needs without the complications or concerns of outsourcing critical functions - companies may create a private cloud for internal use
Mobile Commerce (M-commerce)
- any electronic transaction or information interaction conducted using a wireless, mobile device and mobile networks that leads to a transfer of real or perceived value in exchange for information, services, or goods - location-based m-commerce: services can be offered to a person's needs based on their current location - information on the go: customers can get further information about a product wherever they are, including in the store, but this can lead to "showrooming" - product and content sales: consumers use mobile apps to make purchases while on the go - tremendous growth in the past few years
IS Infrastructure Components
- application software - databases - hardware - computer software - storage - I/O (input and output) Devices -hardware, system software, storage, networking, data centers
Search Engine Optimization (SEO)
- attempts to improve a page's ranking in search engines - techniques include having other pages link to the page, keeping content updated, and including key words
Increasing Energy Needs
- computing can require a lot of power -hardware draws power, which generates heat -heat requires cooling, which requires more power - data centers can use large amounts of power - 15-17 kilowatts per rack - large data centers have hundreds of server racks -more power is required for cooling and lost through other inefficiencies
System Software
- controls computer hardware operations - operating systems: manages hard drives and storage, manages keyboard mouse monitor and printers, coordinates application access to computing resources -ex: Windows, OS X, Ubuntu, Linux
Types of Information Systems
- databases - hardware - computer software - storage - I/O (input and output) devices
E-tailing
- electronic retailing and refers to the specific activities related to selling retail products and services via the internet - firms from across the world can effectively compete for customers and gain access to new markets - when companies are selling online, they can take advantage of the elimination of the retail market space, selling a much wider variety of products, targeting unique market segments on a global basis and undercutting competitor's pricing - disintermediation, mass production, group buying, social commerce - the Long Tail refers to the ability to cater to niche markets instead of selling mainstream products
Mass Customization
- firms can tailor their products and service to meet a customer's particular needs on a large scale - generates additional value for customers and profits for producers - linking online product configuration systems with just-in-time production allows companies to assemble each individual product based on the customers' specifications
Convert (51)↓10 to B↓2
110011 (check Quiz 1 for help)
Moore's Law
- in 1964, Dr. Gordon Moore (co-founder of intel) correctly theorized that the number of transistors on a chip would double every two years and he didn't put any time frame on this prediction. - transistors predicted computer power -computing power would double every 2 years -not exact, but has been relatively accurate to this date - 1st CPU (central processing unit) had 2,200 transistors - current CPUs have over 5 billion
Valuing Innovations
- innovation is key for organization attempting to gain or sustain a competitive advantage - innovation involves creating new products or services that return value to the organization radical innovation/ disruptive innovations: use a new or different technology to create new product, access new customer segments, replaces the existing product/ service, and make significantly greater benefits
Security
- it is a major concern of organizations to secure their information systems infrastructure - companies have to balance their desire for enhancing collaboration with the need to protect intellectual property because any application that allows closer collaboration by increasing data sharing will necessarily incur greater risks of security breaches
Organizational issues
- management must ensure that employees are aware of the tools of social media applications, their purpose, and rules/ policies surrounding the use of these tools - corporate culture is key to successful implementations of social media applications in the organization
Demand Fluctuations
- many companies face demand fluctuations -seasonal fluctuations (ex: Christmas) -monthly fluctuations (month-end spikes) - demand fluctuations create inefficiencies -some estimate up to 70% of IS capacity only used 20% of the time -IS infrastructure is typically not readily scalable -changing internal capacity takes time - cloud computing may be the answer
Downsides and Dangers of using Social Media Applications
- online product reviews: many consumers read reviews before buying products online and some companies hire people to write fake reviews - microblogging: microblogging can be very valuable for corporate communications, it has to be used carefully and is not without controversy - social networks: companies should take great care to monitor what is happening on their social media page and take appropriate action - bad vibes going viral: negatives experiences with a company can go viral but the company can be saved with a correct apology - lessons learned: news travels fast in social media so companies must monitor their social media and act quickly if negative publicity spreads - societal impact of social media: social media and the accompanying societal changes will continue to have large impacts on individuals, organizations, and society as a whole
Open Source Software
- open source software is created, maintained, and updated by thousands of volunteers located all over the world - using open source software offers benefits such as security, flexibility, and auditability (of the program's source code) - ex: Firefox web browser, the Linux operating system, or the Apache OpenOffice productivity suite
Culture
- organizational culture is a critical success factor for implementing social media applications in organizations, and many proposed projects faced cultural resistance - organizations have to understand the multiple personalities and perspectives of future users and ensure that any enterprise-oriented social media initiative will appeal to the organization's members so that people will interact with the social media page
IT Cycles and Obsolescence
- powerful computers enable new applications - new applications drive efficiencies - new applications often make old hardware obsolete - obsolete hardware requires replacement
Gathering Social Intelligence
- social media has changed the context of privacy and all types of organizations find value in monitoring and digesting the nonstop flow of posts in the social media world - companies can BI to see what products aren't selling but use social media to see WHY their products aren't selling - companies can stay ahead of competition by monitoring trends and using them to their advantage - many organizations actively monitor social media to gain social intelligence regarding the sentiments of current and future customers - the U.S. government is developing tools to forecast everything from revolutions to upheavals to economic changes
Application Software
- software tools: process automation, decision support, other business and user needs
Describe a bit
- the smallest element of data - has values of 0 or 1
Drawbacks of E-tailing
- trust becomes an issue due to the customer's inability to adequately experience the capabilities and characteristics of a product prior to purchase, as well as due to uncertainties surrounding product delivery and returns - Direct Product Experience- E-tailing doesn't provide sensory information - Product Delivery and Returns - except for direct downloads, e-tailing requires additional delivery time for products - Returns may also be a hassle, compared to just going to the store
Data, Information and Knowledge
- unprocessed facts - alone, raw data are not very useful - when processed, data transforms into information - when information is understood and used for decisions, it becomes knowledge
networking
-both human and computer communication involve senders, a message to share, and receivers - network requires: sender and receiver, transmission pathway - rules/ protocols for communication
E-tailing benefits
-product benefits: with no store size and shelf space restrictions, companies can sell a far wider variety of goods -place benefits: Internet storefronts are available on almost every computer connected to the Internet - price benefits: online retailers are efficient, with high volumes and low overhead that allow for very competitive pricing
5 General Types of Organizational Strategy
1. Broad Market, Low-Cost Strategy 2. Broad Market, Differentiation Strategy 3. Best-Cost Provider Strategy 4. Narrow Market, Low-Cost Strategy 5. Narrow Market, Differentiation Strategy
Types of Electronic Commerce (EC)
1. Business-to-consumer (B2C) 2. Business-to-business (B2B) 3. Consumer-to-business (C2B) 4. Consumer-to-consumer (C2C)
3 different electronic commerce (EC) business strategies
1. Click-and-mortar is when a company allows consumers to purchase products in a physical store AND online 2. Brick-and-mortar is when a company allows consumers to purchase products in store ONLY 3. Click-only is when a company allows consumers to purchase products online ONLY
Porter's 5 Forces Model
1. Competitive Rivalry 2. Threat of new entrants 3. Customer Bargaining Power 4. Supplier Bargaining Power 5. Threat of Substitute products or services - Companies need to understand the forces acting within the industry and on their organization - Michael Porter created this framework in 1979 (Porter's 5 Forces) that is still widely used to this day
5 general types of organizational strategy
1. Competitive strategy 2. Corporate strategy 3. Business strategy 4. Functional strategy 5. Operating strategy
What are the types of knowledge assets
1. Explicit knowledge: easily codified and documented 2. Tacit knowledge: embedded in people's minds, hard to get at, important for best practices
Explain the three types of Computer Networks
1. Personal Area Network: wireless communication between devices (Bluetooth) 2. Local Area Network: sharing data, software applications, etc. between multiple users 3. Wide Area Network: connects multiple Local Area Networks and is usually distributed with ownership and management
Porter's Five Forces Model
1. Rivalry Among Existing Firms: The rivalry among competing sellers in your industry 2. Threat of New Entrants: The threat of potential new entrants into your industry 3. Customers' Bargaining Power: The bargaining power that customers have within your industry 4. Supplier's Bargaining Power: The bargaining power that suppliers have within your industry 5. Threat of Substitute Products or Services: The potential for substitute products or services from other industries
3 Services of Cloud Computing
1. SaaS: software as a service 2. PaaS: platform as a service 3. IaaS: infostructure as a service
What are the first two most powerful and most expensive types of computers
1. Supercomputer 2. Mainframe computer
Five IT Megatrends that Shape the Digital Future
1. mobile device 2. social media 3. internet of things 4. cloud computing 5. big data
3 Categories of Data Storage
1. operational: the storage computers access while performing normal processing operations 2. backup storage: involves copies of operational storage 3. archival storage: long-term storage of data that doesn't need to be readily accessible by computer systems
How many bytes of memory storage does the word technology take
10 (1 byte for each letter/ character)
Convert (1011101)↓2 to B↓10
93 (check Quiz 1 for help)
The Evolving Workspace
A generation of social media users - Millenniums, "Generation Y" - Different workplace expectations - Portfolio careers, not cradle-to-grave jobs - Don't just serve customers, but collaborate with customers - Companies now create a corporate culture that embraces trends of the digital world - Embracing social media attracts and retains top talent
__________ is an example of an electronic conferencing tool a. MS Outlook b. Apple FaceTime c. Wikipedia d. Google Docs e. MS SharePoint
Apple FaceTime
The IS Infrastructure
Businesses rely on an information systems infrastructure: - hardware - system software - storage - networking - data centers
Blogs and Microblogs
Blogs - blogging: the process of keeping an online text diary made up of chronological entries that comment on things - Topical(current) blogs of interest to customers - Critical call blogs "amateurization of journalism" - blogs are also being used by small, medium-sized, and large organizations for connecting with their employees or customers Microblogging - microblogging: enables people to voice their thoughts with short "status updates" which are distributed in (near) real time - Post news to customers - An example is Twitter which is limited to 140 characters - Ex: Coca-Cola's official Twitter account Instant Messaging - Enables multiple participants to have conversations - Ex: WhatsApp allows group chat, free texts
What's an umbrella term for business intelligence and advanced analytics
Business analytics
The various services offered by Google, such as Gmail (e-mail), Google Drive (word processing), or Google Calendar, are good examples of _________?
Cloud computing
Cloud-Based Collaboration Tools, Learning Management Systems, Collective Intelligence
Cloud-Based Collaboration Tools - have greatly facilitated collaboration - ex: Cloud-based collaboration tools allow for easy access and easy transfer of documents of other files from one person to another, using services like Dropbox Content Management Systems (CMS) - allows users to publish, edit, version track, and retrieve digital content, such as documents, images, audio files, videos, or anything else that can be digitized - Learning Management Systems: -enable uploading and viewing content, administering exams, and self-service functions such as registering for courses or viewing grades -offer additional tools for enabling team collaboration, class discussions - learning management systems such as Blackboard, Sakai, and Moodle have facilitated business processes in educational settings Collective Intelligence - the concept of collective intelligence is based on the notion that distributed groups of people with a divergent range of information and expertise can outperform the capabilities of individual experts -Based on the concept of collective intelligence, peer production is the creation of goods or services by self-organizing communities. In peer production, the creation of the goods or services is dependent on the incremental contributions of the participants such that anyone can help in producing or improving the final outcome. Prime examples of peer production are open source projects and wikis.
What's the difference between computer hardware and computer software
Computer hardware is the physical computer equipment (ex: computer monitor, central processing unit, keyboard), while computer software is a program/ set of programs that tell a computer to perform certain tasks.
What's the difference between data and information
Data alone isn't very useful and has no meaning in of itself, while information is processed data
What are an organizations most valuable resources and why
Data and knowledge because they're essential for executing business processes, gaining business intelligence, and performing advanced analytics
What is DBMS
Database Management System: a collection of programs that manages database structure and controls access to data - makes it possible to share data among multiple applications or users - makes data management more efficient and effective - it minimizes data inconsistency and improves data security
What's the difference between electronic commerce (EC) and electronic commerce (EC) business strategies
Electronic commerce is B2C, B2B, C2B, and C2C. Electronic commerce business strategies are click-and-mortar, brick-and-mortar, and click-only
__________ is an example of an online office suite comprised of a spreadsheet application, a word processor, and a presentation application a. Google Mail b. Google Talk c. Google Maps d. Google Calendar e. Google Docs
Google Docs
Group Buying
If enough people agree to purchase the product or service, they get significant discounts
Media Sharing, Tagging, Geotagging, Social Bookmarking, Social Cataloging
Media Sharing - Via Flickr, Instagram, Vimeo, YouTube, SlideShare, podcasts Tagging - Manually adding metadata to content - ex: metadata about a digital photo include date and time, focal length, shutter speed | metadata about a phone call includes call time, duration, location of participants, phone numbers Geotagging - knowing exactly where a photo was taken and in what direction the camera was pointing, or knowing the location of a person sending out a tweet on Twitter - Such geospatial metadata (such as latitude, longitude, or altitude) added to digital media is referred to as geotags Social Bookmarking - helps to address this by allowing users to share interesting content and to create categorization systems (referred to as folksonomies) - Allows users to refine data Social Cataloging - Creation of a categorization system by users - Contributors build up catalogs regarding specific topics such as academic citations, wireless networks, books and music, and so on
________ is data about data a. Multi data b. Data house c. Metadata d. Data system e. Pointer data
Metadata
______ is an example of an electronic communication tool a. Microsoft Outlook b. Google Docs c. Apple FaceTime d. MS SharePoint e. Google Talk
Microsoft Outlook
types of networks
Personal Area Network (PAN): wireless communication between devices (Bluetooth) Local Area Network (LAN): sharing of data, software applications, or other resources between several users Wide Area Network (WAN): connect multiple LANs, often with distributed ownership and management
Web 1.0 → Web 2.0
Up until a few years ago, the web was regarded as a one-way medium (sometimes referred to as "web 1.0"), with a relatively strict distinction between content creators and content consumers. Some entities would create content (ex: a website), and others would consume this content. However, changes in technology have enabled new uses of the web; dynamic web applications, often referred to as web 2.0 applications, allow people to collaborate and share content online, shifting the user's role from passive consumers of content to content creators.
Social Commerce
Utilizing social networks to build lasting relationships and advertise products
what's an example of a low-cost leadership strategy
Walmart offers the best prices in its industry on its goods and/ or services
Dynamic Web applications are often referred to as ________ applications a. user b. Web 2.0 c. service d. static interaction e. Web blog
Web 2.0
Web 2.0 and Mashup definitions
Web 2.0 applications shift a Web user's role from a passive consumer of content to its creator - mashup: a new application (or website) that uses data from one or more service providers
Web 2.0 continued
Web 2.0 technologies change how people interact and enable social media -Online information at our fingertips -Personal expression available 24/7 -Users can share information as well as consume it Individuals often post very private information -About themselves -About others -Without thinking about the consequences
Groupware
a class of software that enables people to work together more effectively
Database
a collection of electronic data files (tables) of an organization - the files can be end user data (raw facts) or metadata (data about data) - essential for all elements of business: maintaining customer records, supporting business processes, sales transactions, inventory management, and marketing
Knowledge Management Systems
a collection of technology-based tools that includes communications technologies and information storage and retrieval systems to enable the generation, storage, sharing, and management of tacit(understood) and explicit knowledge assets - refers to the processes an organization uses to gain the greatest value from its knowledge assets - goal: to gain the greatest value from knowledge assets
Primary key (PK)
a field included in a database table that contains a unique value for each instance of an entity to ensure that it is stored or retrieved accurately -uniquely identifies and retrieves all other attributes in a given row (record)
Big Data
a massive volume of data that organizations use to contribute to business success and the challenges of their operations
Internet troll
a person who creates discord on the Internet by starting arguments or upsetting people by posting inflammatory content on social media sites with the deliberate intent of provoking readers into an emotional response, often for the troll's own amusement - much of the behavior of trolls can be classified as cyber-harrassment
what is software
a program or set of programs that tell the computer to perform certain tasks
Foreign key (FK)
an attribute that appears as a non-primary key attribute in one entity and as a primary key attribute (or part of a primary key) in another entity -the value must match the primary key in another table
Identify a true statement about reintermediation regarding e-tailing a. It refers to the design of business models that reintroduce middlemen b. It refers to the design of business models that eliminate middlemen c. It provides ways for clients and firms to conduct business online without human assistance d. It provides ways for clients and firms to conduct business activities in a traditional manner by operating physical locations e. It enables access to Web sites linked to corporate databases in order to provide real-time access to personalized information
a. It refers to the design of reintroducing middlemen
The protocol used by Internet is called the ______________ a. Transmission Control Protocol (TCP) b. Dynamic Host Configuration Protocol (DHCP) c. Address Resolution Protocol (ARP) d. Trivial File Transfer Protocol (TFTP) e. TOC protocol
a. Transmission Control Protocol (TCP)
Which of the following is a shifting perspective from Web 1.0 to Web 2.0 a. Web 1.0 - Read, Web 2.0 -Read, write b. Web 1.0 - Read, Web 2.0 - Write c. Web 1.0 - Me, Web 2.0 - You d. Web 1.0 - Write, Web 2.0 - Read e. Web 1.0 - You, Web 2.0 - Me
a. Web 1.0 - Read, Web 2.0 - Read, write
Hatso, a famous hat retailer chain, opens a new store in Kentucky and chooses to operate solely in the traditional physical markets. It approaches business activities in a traditional manner by operating physical locations such as retail stores and not offering their products or services online. Which of the following business strategies does Hatso follow? a. brick-and-mortar b. click-only c. organizational d. low-cost leadership e. differentiation
a. brick-and-mortar
_________ are a set of activities an organization performs in order to reach their business goals a) business processes b) business standards c) business technocracies d) business data flow models e) business cases
a. business processes
What do virtual private networks allow employees to do?
allow the employees to connect to the company's intranet while on the road or working from home
When we consider entities as tables, each column is a(n) a. attribute b. record c. form d. applet e. query
attribute
One Mega Bytes (1 MB) is the same as: a. 1024 Bytes b. 1024 KB c. 1024 MB d. 1024 Bits e. 1024 TB
b. 1024 KB
Which of the following statements is true about firms pursuing a click-and-mortar business strategy? a. These firms are only involved in export business activities b. These firms operate in both physical and virtual arenas c. These firms are involved in rafter bidding activities d. These firms conduct business only electronically in cyberspace e. These firms avoid indulgence in physical store locations
b. These firms operate in both physical and virtual arenas
The _________ is a system of interlinked documents on the Internet, or a graphical user interface to the Internet that provides users with a simple, consistent interface to access a wide variety of information a. private branch exchange b. World Wide Web c. point to point protocol d. Media Access Control Address e. parameter random access memory
b. Wide Wide Web
With the respect to the general classes of computers, a ________ is used for small business computing a. workstation b. personal computer c. mainframe computer d. server e. supercomputer
b. personal computer
Customers can run their own applications, which are typically designed using tools provided by the service provider in a(n) ________ model. a. infrastructure as a service b. platform as a service c. software as a service d. application as a service e. hardware as a service
b. platform as a service
Which of the following statements is true about a Uniform Resource Locator? a. It is used to locate specific information in a Web page b. It is used to identify and locate a particular Web page c. It is protocol that helps Web servers store Web pages d. It is a standard method for specifying the format of Web pages e. It is a software application used to display the features of a Web page
b. used to identify and locate a specific Webpage
Why do all types of organizations (instead of just traditional businesses) utilize business intelligence and advanced analytics
because it improves their data-driven decision making and enables them (organizations) to gain and sustain competitive advantage through enhanced decision making
_________ is the process of creating an online text diary made up of chronological entries that comment on everything from one's everyday life to wine and food, or even computer problems a. crowdsourcing b. keylogging c. pharming d. phishing e. blogging
blogging
Which of the following Web 2.0 applications has been classified by noted technology journalist Nicholas Carr as the "amateurization" of journalism a. blogs b. discussion forums c. message boards d. instant messaging e. chat rooms
blogs
The ability to independently learn new technologies as they emerge and assess their impact on your work and life is called __________ a. computer networking b. computer adaptation c. computer fluency d. computer compatibility e. computer assembling
c. computer fluency
Walmart pursues a _________ strategy by which it offers the best prices in its industry on its goods and/ or services a. best-cost provider b. decreased market share c. low-cost leadership d. broad differentiation e. focused differentiation
c. low cost leadership
__________ define the procedures that different computers follow when they transmit and receive data a. consoles b. keyloggers c. protocols d. hosts e. hypertexts
c. protocols
____________ software is the collection of programs that control the basic operations of computer hardware a. application b. transitory c. system d. open source e. peripheral
c. system software (operating system)
________ is a phenomenon in which companies use everyday people as a cheap labor force a. nearshoring b. phishing c. crowdsourcing d. narrowcasting e. pharming
crowdsourcing
Disintermediation
cutting out the "middleman" and reaching customers more directly and efficiently
Which of the following is an example of business-to-consumer electronic commerce? a. Brenda files her income tax online b. Canchi, a show manufacturer, conducts business over the Web with its retailers c. Juan buys guitars for resale on Mongsung.com d. Reuben buys a pair of shoes on Mysticshoes.com e. Neal places a bid for a mobile phone on the online auction site Feliciate.com
d. Reuben buys a pair of shoes on Mysticshoes.com
____________ is the securing of business financing from individuals in the marketplace a. capitalizing b. eLoans c. Internet funding d. crowdfunding e. self sourcing
d. crowdfunding
A state agency reporting birth and death information to the U.S. Social Security Administration using the Internet is an example of _________ electronic commerce a. business-to-consumer b. government-to-citizen c. government-to-business d. government-to-government e. business-to-business
d. government-to-government
Metadata
data that describes other data/ data about data
Information Systems Defined- Data
data: the root and purpose of information systems
Revenue Model
describes how the firm will earn revenue, generate profits, and produce a superior return on invested capital
Which of the following is an example of asynchronous communication a. e-mail b. videoconferencing c. online chat d. shared whiteboards e. electronic meeting support systems
The word ANALYSIS will take _____ bytes of memory storage. a. 1024 b. 8 giga c. 8 kilo d. 8 Mega e. 8 bytes
e. 8 bytes
The standard method of specifying the format of Web pages is called _______ a. Structured Query Language (SQL) b. Practical Extraction and Report Language (PERL) c. Extensible Markup Language (XML) d. Assembly Language (AL) e. Hypertext Markup Language (HTML)
e. Hypertext Markup Language (HTML)
With respect to e-tailing, _________ can intiate certain actions, such as making a phone call to a sales representative or sending a text message to a pre-specified number a. MaxiCodes b. CPC Binary Barcodes c. viral codes d. MSI barcodes e. QR codes
e. QR codes
The performance of a pay-per-click advertising model can be assessed by ________, which reflects the percentage of visitors who actually perform the marketer's desired action such as making a purchase a. click fraud rate b. contextual search rate c. pop-up rate d. click- through rate e. conversion rate
e. conversion rate
_________ is the largest e-auction site a. eBay b. Asos c. Zappos d. ePier e. Fitiquette
eBay
Government-to-business (G2B)
electronic commerce that involves a country's government and businesses - online applications for export licenses, verification of employee's Social Security numbers, and online tax filing are G2B services - G2B also allows businesses to buy seized goods and surplus government equipment
Government-to-government (G2G)
electronic interactions that take place between countries or between different levels of government within a country - e-government tools allow foreign entities to find government-wide information related to foreign trade or business topics
The WhatsApp application was created in 2009, and has quickly risen to broad popularity. WhatsApp is a(n) ________ application a. blogging b. social networking c. instant messaging d. microblogging e. e-commerce
instant messaging
What are Uniform Resource Locators used for
it's used to identify and locate a particular Web page
What is grid computing
it's used to solve large-scale computing problems
In the context of GPA-enabled location-based services, the ability to give route directions from one point to another is an example of _______ service a. mapping b. disintegration c. navigation d. reintegration e. tracking
navigation
Public Cloud
offers additional advantages such as scalability and reliability but may raise concerns about security and compliance
What are keys
one or more attributes (fields) that determine or retrieves other attributes
What are databases made up of
one or more tables, where each table contains multiple records - the records are all of the same type - typically each record on one row of the table is shown and each column in the table represents a different attribute - generally, a unique identifier is assigned to each record so it can be referenced readily
Government-to-citizen (G2C)
online interactions between federal, state, and local governments and their constituents - Internet tax filing or e-filing, e-voting, and online applications for ID cards are G2C services
Key Reasons for Outsourcing
outsourcing: obtain (goods or a service) from an outside or foreign supplier, especially in place of an internal source -To reduce or control costs -To free up internal resources - To gain access to world-class capabilities - To increase the revenue potential of the organization - To reduce time to market - To increase process efficiencies - To be able to focus on core activities - To compensate for a lack of specific capabilities or skills
Information Systems Defined- People
people: the builders, managers, and users of information systems
When we consider entities as tables, each row is a ________ a. field b. record c. bot d. form e. query
record
What are the results of customers' bargaining power for a firm
reduced prices need for increased quality demand for more services
Electronic Commerce (EC)
refers to the exchange of goods, services, and money among firms, between firms and their customers, and between customers, supported by communication technologies and, in particular, the Internet
_______ sites create social online communities where individuals with a broad and diverse set of interests meet and collaborate a. crowdsourcing b. social catalog c. social networking d. social bookmarking e. media sharing
social networking
What is scalability
the ability to adapt to increases or decreases in demand for processing or data storage
What is computer fluency
the ability to independently learn new technologies as they emerge and assess their impact on your work and life
What is business-to-business electronic commerce
the form of electronic commerce that's used by organizations to conduct business with business partners without involving the end consumer
What is outsourcing
the process of moving business processes or tasks to another company
What are knowledge assets
the set of skills, routines, practices, principles, formulas, methods, heuristics, and intuitions (both explicit and tacit) used by organizations to improve efficiency, effectiveness, and profitability
What is Hypertext Markup Language (HTML)
the standard method of specifying the format of Web pages
E-government
the use of information systems to provide citizens, organizations, and other governmental agencies with information about public service and to allow interaction with the government
Describe protocols
they define the procedures that different computers follow when they transmit and receive data
A hashtag (#) is used in a tweet _______ a. to show who the tweet is from b. to show who the tweet is to c. to indicate it is of extreme importance d. to indicate the topic and relate the tweet to other tweets about the same topic e. to indicate how the tweet is delivered
to indicate the topic and relate the tweet to other tweets about the same topic
Social Media Marketing
utilization of social media or social networks to market a product, company, or brand
Which one of the following is an example of synchronous communication? a. online reviews b. work flow automation systems c. bulletin board systems d. videoconferencing e. email
videoconferencing
The term ________ was coined by Harvard business professor Jeffrey Rayport to describe how good business techniques can be driven by word-of-mouth or person-to-person communication a. viral marketing b. e-business c. stealth market d. affiliate business e. blog marketing
viral marketing
________ are comprised of members from different geographic areas assembled as needed to collaborate on a certain project a. work groups b. virtual teams c. non-core teams d. task forces e. command groups
virtual teams
social media
web based application that allow people to interact
Broad Market, Low-Cost Strategy
when a company offers its goods and/ or services at the lowest price it can while still making a profit so that it can draw a vast range of customers to the market ex: Walmart
Best-Cost Provider Strategy
when a company offers products or services of reasonably good quality at competitive prices ex: Dell
Broad Market, Differentiation Strategy
when a company tries to provide better products or services than its competitors to try to appeal to a vast range of consumers (broad market) ex: BMW and Apple