BUS 311 Midterm 1

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

66) Discuss the different functional information systems including some of the applications of each.

1) Accounting & Finance: These are systems used for managing, controlling, and auditing the financial resources of the organization. Sample applications include: accounts payable, expense accounts, cash management, and payroll processing. 2) Human Resources: These are systems used for managing, controlling, and auditing the human resources of the organization. Sample applications include: recruiting and hiring, education and training, benefits management, employee termination, and workforce planning. 3) Marketing: These are systems used for managing new product development, distribution, pricing, promotional effectiveness, and sales forecasting of the products and services offered by the organization. Same applications include market research and analysis, new product development, promotion and advertising, pricing and sales analysis, and product location analysis. 4) Operations: These are systems used for managing, controlling, and auditing the production and operations resources of the organization. Sample applications include inventory management, cost and quality tracking, materials and resource planning, job costing, and resource utilization

11) Identify a key factor of globalization. A) evolution of technology B) anchor point milestones C) concept development projects D) timeboxing strategies E) external interface requirements

A

12) Which of the following statements is true about servers? A) They are used to provide services to users within large organizations or to Web users. B) They are primarily used as the main, central computing system for major corporations. C) They are used primarily to assist in solving massive scientific problems. D) They are optimized for visualization and rendering of three-dimensional models. E) They are used for personal computing and small business computing

A

13) Identify the focus of managers at the tactical level of an organization. A) deploying organizational resources to achieve the strategic objectives of the organization B) managing routine, day-to-day business processes and interactions with customers C) designing long-term strategic questions facing the organization D) solving complex problems with broad and long-term ramifications for the organization E) maintaining the efficiency of business processes within the organization

A

14) Which of the following can be cited as an example of outsourcing? A) Microsoft hands over its customer service function to Convergys, located in India. B) Volkswagen acquires a steel manufacturing plant to reduce its overall production costs. C) Dell sources computer parts from suppliers located in Russia. D) Audi starts a manufacturing facility in China to take advantage of low labor costs. E) P&G acquires a retail outlet to reduce its distribution costs.

A

16) ________ decisions deal with complex problems with broad and long-term ramifications for an organization. A) Executive-level B) Functional-level C) Tactical-level D) Operational-level E) Managerial-level

A

19) The operating system of a computer is an example of ________ software. A) system B) open source C) transitory D) peripheral E) application

A

20) Which of the following is a geoeconomic challenge of operating in the digital world? A) differences in network infrastructures B) differences in the concept of time and life focus C) differences in measurement units D) differences in export and import regulations E) differences in languages

A

21) Which of the following statements is true of an intranet? A) It secures proprietary information stored within the corporate local area network. B) It is easily accessible to the public. C) It can be used to access advertorial information. D) It can be used by anyone with an Internet connection. E) It cannot be accessed by using virtual private networks.

A

22) The convergence of information technology and operations technology, offering the potential for tremendous improvements in efficiency, product quality, agility, and flexibility, allowing companies to mass-produce customized products and better monitor supply chains, refers to which term below? A) Industrial Internet of Things B) Internet of Things C) Applications in the Cloud D) The Technology Effect E) The Technology of Things

A

25) A global project called One Laptop per Child is attempting to distribute low-cost laptop computers to children in developing countries around the world in an attempt to shrink the ________. A) digital divide B) systems integration C) power distance D) horizontal disparity E) information privacy

A

3) Which of the following actions is a part of operational planning? A) making day-to-day decisions that are highly structured and recurring B) effectively utilizing and deploying organizational resources to achieve strategic objectives C) focusing on long-term strategic questions facing the organization D) dealing with complex problems with broad and long-term ramifications for the organization E) focusing on balancing performance across the organization

A

3) Who among the following coined the term "knowledge worker"? A) Peter Drucker B) Alvin Toffler C) Johannes Gutenberg D) Thomas L. Friedman E) Mark Zuckerberg

A

30) Which of the following computer networks is used for providing wireless communication between devices, using technologies such as Bluetooth? A) personal area network B) storage area network C) campus area network D) metropolitan area network E) body sensor network

A

33) Which of the following storage methods is used for storing long-term copies of organizational data? A) archival B) backup C) operational D) translational E) protocol

A

36) A hypertext document is otherwise known as a ________. A) Web page B) Web host C) Web ring D) Webmaster E) Web consortium

A

38) Which of the following is NOT one of Porter's five primary forces? A) Threat of flooding the industry with excellent products B) Rivalry among competing sellers in an industry C) Threat of potential new entrants in an industry D) Bargaining power of suppliers in an industry E) Substitute products from another industry

A

39) ________ refer(s) to a program or set of programs that tell the computer to perform certain tasks. A) Software B) Firmware C) Hardware logic D) Data E) Networks

A

4) The various services offered by Google, such as Gmail (e-mail), Google Drive (word processing), or Google Calendar, are good examples of ________. A) cloud computing B) computer assembling C) data mining D) systems integration E) internetworking

A

4) ________ are a set of activities an organization performs in order to reach their business goals. A) Business processes B) Business standards C) Business technocracies D) Business data flow models E) Business cases

A

41) Web servers process user requests for pages using the ________. A) Hypertext Transfer Protocol B) TOC Protocol C) Address Resolution Protocol D) Dynamic Host Configuration Protocol E) Trivial File Transfer Protocol

A

45) Which of the following IS personnel is responsible for managing disaster recovery within an organization? A) IS security manager B) IS auditor C) Webmaster D) programmer E) database administrator

A

45) Which of the following is likely to have the suffix ".org" after the domain name in its URL? A) The Red Cross Society B) Starbucks C) The Federal Bureau of Investigation D) McDonalds E) Harvard Business School

A

46) Which of the following is the highest-ranking IS personnel responsible for strategic planning and IS use throughout a firm? A) chief information officer B) IS security manager C) IS auditor D) systems analyst E) database administrator

A

48) Which of the following is the host name in the URL "labs.google.co.in/jack carver"? A) labs B) google C) co D) in E) jack carver

A

50) The protocol used by the Internet is called the ________. A) Transmission Control Protocol (TCP) B) Dynamic Host Configuration Protocol (DHCP) C) Address Resolution Protocol (ARP) D) Trivial File Transfer Protocol (TFTP) E) TOC protocol

A

57) Which of the following types of information systems supports the coordination of suppliers, product or service production, and distribution? A) supply chain management system B) electronic commerce system C) intelligent system D) collaboration system E) geographic information system

A

6) ________ level manager. A) operational B) tactical C) strategic D) managerial E) executive

A

61) Which of the following can be cited as an example of a supply chain management system? A) procurement planning B) market analysis C) knowledge portal D) sales force automation E) product demand forecasting system

A

64) Microsoft's Exchange/Outlook and Lotus Notes provide people with e-mail, automated calendaring, and online, threaded discussions, enabling close contact with others, regardless of their location. Identify this type of information system. A) collaboration system B) office automation system C) data mining and visualization system D) functional area information system E) geographic information system

A

65) Data centers managed by a third party that rents out space to multiple organizational customers are known as ________. A) collocation facilities B) multi-bay stations C) serial port facilities D) data ease facilities E) datahub stations

A

65) With respect to the types of information systems used in organizations, Amazon.com is an example of a(n) ________ system. A) electronic commerce B) geographic information C) virtualization and data mining D) supply chain management E) office automation

A

67) What a company does, how a company uniquely does it, how a company gets paid for doing it, and what costs are involved are all part of an organization's ________. A) business model B) competitive model C) revenue model D) strategic model E) value model

A

69) With respect to the types of information systems used in organizations, an Online Analytical Processing (OLAP) system is an example of a(n) ________ system. A) business intelligence B) geographic information C) electronic commerce D) office automation E) social software and collaboration

A

70) What example of a platform based business model would Airbnb and Uber represent. A) Service B) Subscriptions C) Communications D) Collaboration E) Products

A

71) With respect to the types of information systems used in organizations, sales force automation is an example of a(n) ________ system. A) customer relationship management B) electronic commerce C) geographic information D) supply chain management E) data mining and visualization

A

78) Which of the following statements is true about the software as a service model? A) The customer has no knowledge or control over the underlying infrastructure and has only limited ability to control or configure application-specific settings. B) The customer has to manage the licenses for the operating systems being used. C) The customer can run his or her own applications that are typically designed using tools provided by the service provider. D) The customer is provided with the basic capabilities of processing, storage, and networking. E) The user has control over the applications, but has limited or no control over the underlying infrastructure.

A

8) ________ refers to anything that occurs as part of a daily business of which a record must be kept. A) transaction B) investment C) capital asset D) value chain analysis E) use case

A

80) Which of the following statements is true about the infrastructure as a service model? A) The customer has to manage the licenses for the operating systems being used. B) The customer has no knowledge or control over the underlying infrastructure and has only limited ability to control or configure application-specific settings. C) The customer can run his or her own applications that are typically designed using tools provided by the service provider. D) The customer does not have to manage operating system licenses. E) The user has control over the applications, but has limited or no control over the underlying infrastructure.

A

84) In the context of organizational requirements for innovation, to deploy innovative information systems well, people in the organization must be willing to do whatever they can to bypass and eliminate internal bureaucracy, set aside political squabbles, and pull together for the common good. These requirements can be categorized as ________ requirements. A) process B) customer C) resource D) quality E) risk tolerance

A

85) Organizations deploying innovative information systems must have the human capital necessary to deploy the new systems. These requirements can be categorized as ________ requirements. A) resource B) process C) risk tolerance D) customer E) quality

A

87) Select the statement below that best describes computer ethics A) It is used to describe moral issues and standards of conduct as they pertain to the use of information systems. B) It is used to describe moral issues and standards of conduct as they pertain to the use of networks. C) It is used to describe moral issues and standards of conduct as they pertain to the users of networks. D) It is used to describe the moral issues of how users interact with other users. E) It is used to describe how issues are resolved between knowledge workers.

A

9) A network of a broad range of physical objects that can automatically share data over the Internet is called ________. A) the Internet of Things B) the Broad Internet C) the Industrial Internet of Things D) the Wireless Internet Network E) the Internet of Big Data

A

9) At the ________ level of an organization, functional managers focus on monitoring and controlling operational-level activities and providing information to higher levels of the organization. A) managerial B) executive C) strategic D) superficial E) illusive

A

9) With respect to the general classes of computers, a ________ is the most expensive and most powerful kind of computer, which is used primarily to assist in solving massive scientific problems. A) supercomputer B) workstation C) mainframe computer D) server E) personal computer

A

94) WorldTravel (www.worldtravel.com) is a travel Web site that provides detailed information about the different places that tourists can visit across the globe. Additionally, it also helps visitors to book tickets and hotels in these destinations. Which of the following, if true, would most assure the customers of their online privacy? A) When collecting personal information, WorldTravel explicitly states the purpose of the information and that it will not be used for anything else. B) WorldTravel informs its members that it is following the best practices in the industry. C) When collecting personal information, WorldTravel explicitly tells all of its customers that the information collected will be protected by a third party who specializes in this domain. D) WorldTravel decides not to send any spam mails to any of its members. E) When collecting personal information, WorldTravel explicitly tells all of its customers that the information collected is protected under the Electronic Communications Privacy Act.

A

63) List and explain the different components of a network.

A network consists of three separate components-servers, clients, and peers. • A server is any computer on the network that makes access to files, printing, communications, and other services available to users of the network. Servers only provide services. • A client is any computer, such as a user's PC or laptop, on the network, or any software application, such as Microsoft's Outlook e-mail client, that uses the services provided by the server. Clients only request services. A client usually has only one user, whereas many different users share the server. • A peer is any computer that may both request and provide services.

98) Write a short note on the infrastructure as a service model.

Answer: In the infrastructure as a service (IaaS) model, only the basic capabilities of processing, storage, and networking are provided. Hence, the customer has the most control over the resources. The IaaS model provides the customer with the greatest flexibility; on the other hand, while the infrastructure is provided, managing licenses for operating systems and so on is still the responsibility of the customer, and setup costs are considerably higher.

63) Explain the differences between tactical-level decision making and executive-level decision making by managers in organizations.

At the managerial level (or tactical level) of the organization, functional managers focus on monitoring and controlling operational-level activities and providing information to higher levels of the organization. Managers at this level, referred to as midlevel managers, focus on effectively utilizing and deploying organizational resources to achieve the strategic objectives of the organization. Managerial-level decision making is not nearly as structured or routine as operational-level decision making. Managerial-level decision making is referred to as semistructured decision making because solutions and problems are not clear-cut and often require judgment and expertise. At the executive level (or strategic level) of the organization, managers focus on long-term strategic questions facing the organization, such as which products to produce, which countries to compete in, and what organizational strategy to follow. Executive-level decisions deal with complex problems with broad and long-term ramifications for the organization.

62) Describe the differences between operational-level decision making and tactical-level decision making by managers in organizations.

At the operational level of a firm, the routine, day-to-day business processes and interactions with customers occur. Operational planning typically has a time frame of a few hours or days, and the managers at the operational level, such as foremen or supervisors, make day-to-day decisions that are highly structured and recurring. At the managerial level (or tactical level) of the organization, functional managers focus on monitoring and controlling operational-level activities and providing information to higher levels of the organization. Managers at this level, referred to as midlevel managers, focus on effectively utilizing and deploying organizational resources to achieve the strategic objectives of the organization. Managerial-level decision making is not nearly as structured or routine as operational-level decision making. Managerial-level decision making is referred to as semistructured decision making because solutions and problems are not clear-cut and often require judgment and expertise.

1) Identify a true statement about the function of knowledge workers. A) They use knowledge to perform their jobs, but do not create knowledge. B) They create, modify, and/or synthesize knowledge as a fundamental part of their jobs. C) They lack the ability to solve non-routine problems at work. D) They modify knowledge created by others, but do not create knowledge themselves. E) They work in a monotonous workplace and lack innovation.

B

1) Which of the following tasks is performed by application software? A) printing documents B) writing a business letter C) presenting information via a monitor D) updating the system clock E) saving data to a disk

B

11) With respect to the general classes of computers, a ________ is any computer on a network that makes access to files, printing, communications, and other services available to users of the network. A) workstation B) server C) personal computer D) supercomputer E) mainframe

B

12) The managerial level of an organization is also known as the ________ level. A) functional B) tactical C) executive D) operational E) strategic

B

14) With respect to the general classes of computers, a ________ is used for small business computing. A) workstation B) personal computer C) mainframe computer D) server E) supercomputer

B

15) The Internet of Things and the massive amounts of data generated enabled the creation of service-oriented business models. Identify this model. A) service B) servitization C) extreme data D) big data E) a database

B

16) The most prominent type of system software, the ________, coordinates the interaction between hardware components, peripherals, application software, and users. A) random-access memory B) operating system C) read-only memory D) base station E) point to point protocol

B

18) Which of the following is a governmental challenge of operating in the digital world? A) differences in power distance and uncertainty avoidance B) import and export regulations C) aging population in the United States D) videoconferences across different time zones E) availability of labor force and salary differences

B

19) Managers at the ________ level include the president and chief executive officer, vice presidents, and possibly the board of directors. A) functional B) executive C) tactical D) operational E) illusive

B

19) Peter Drucker stated that a knowledge society would emerge in the future that meant ________. A) knowledge workers are typically professionals who are well educated. B) processing knowledge would be as important as processing land, labor, or capital. C) a society would be computer literate. D) professionals would possess many different computer devices. E) knowledge workers would lead society.

B

22) Governmental regulations such as the ________ Act mandate archiving business documents and relevant internal communication, including e-mail and instant messages. A) Glass-Steagall B) Sarbanes-Oxley C) Robinson-Patman D) Celler-Kefauver E) Taft-Hartley

B

23) Identify a major ethical challenge society faces today when considering the strong linkage between computer literacy and a person's ability to compete in the information age. A) horizontal disparity B) digital divide C) electronic gap D) power distance E) knowledge divide

B

28) A ________ is any computer on the network, or any software application, that uses only the services provided by the server. A) peer B) client C) host D) console E) port

B

28) For a firm, reduced prices, need for increased quality, and demand for more services would result due to ________. A) threat of substitute products from other industries B) customers' bargaining power C) high threat of new entrants into the market D) traditional rivals within the industry E) increase in suppliers' bargaining power

B

29) ________ is the process of analyzing an organization's activities to determine where value is added to products and/or services and what costs are incurred for doing so. A) Value networking B) Value chain analysis C) Value migration D) Value shop E) Value grid trial

B

30) The extent to which goals are accomplished faster, at lower cost, or with relatively little time and effort is called ________. A) goal setting B) efficiency C) effectiveness D) accomplishment E) effort

B

34) The ________ is a system of interlinked documents on the Internet, or a graphical user interface to the Internet that provides users with a simple, consistent interface to access a wide variety of information. A) private branch exchange B) World Wide Web C) point to point protocol D) Media Access Control Address E) parameter random access memory

B

36) When senior managers at the executive level of the organization conduct ________, they form a vision of where the organization needs to head. A) executive planning B) strategic planning C) organizational planning D) resource planning E) operational planning

B

39) If the ABC company is losing customers on a regular basis, the force that would explain this is most likely to be ________. A) the bargaining power of customers or the rivalry of sellers in the industry B) the threat of new entrants or the bargaining power of customers C) the threat of new entrants in an industry or the rivalry of sellers in the industry D) the potential of substitute products or the bargaining power of customers E) the threat of new entrants or the threat of substitute products

B

40) The ".com" suffix in a Uniform Resource Locator is reserved for ________. A) non-profit organizations B) commercial organizations C) network organizations D) government entities E) educational organizations

B

42) Which of the following statements is true about a Uniform Resource Locator? A) It is used to locate specific information in a Web page. B) It is used to identify and locate a particular Web page. C) It is a protocol that helps Web servers store Web pages. D) It is a standard method for specifying the format of Web pages. E) It is a software application used to display the features of a Web page.

B

44) Which of the following is true about the responsibility of an IS manager in the context of information systems management? A) He is the highest-ranking official and is responsible for IS use throughout the firm. B) He is responsible for managing an existing information system. C) He is the lowest-ranking official responsible for managing databases throughout the organization. D) He is responsible for managing security measures of a newly installed information system. E) He is the highest-ranking official and is responsible for strategic planning throughout the organization.

B

47) that will respond to the Web request. A) domain name B) host name C) client name D) top-level domain name E) port name

B

49) Which of the following core competencies is part of an IS personnel's business knowledge and skills? A) cloud computing B) technological communication and presentation C) systems development life cycle D) integrating subsystems and systems E) virtualization

B

5) With respect to decision making in organizations, ________ decisions are those in which the procedures to follow for a given situation can be specified in advance. A) comparative B) structured C) unscrupulous D) asymmetrical E) disfigured

B

51) Connecting host computers and their networks together to form even larger networks is called ________. A) data mining B) internetworking C) Ethernet framing D) network simulation E) queuing

B

56) Which of the following types of information systems enables customers to buy goods and services from a firm's Web site? A) supply chain management system B) electronic commerce system C) geographic information system D) collaboration system E) customer relationship management system

B

58) Identify the purpose of a transaction processing system used in organizations. A) to support the activities within a specific functional area of the firm B) to handle day-to-day business event data at the operational level of the organization C) to produce detailed information to help manage a firm or part of a firm D) to support the coordination of suppliers, product or service production, and distribution E) to enable customers to buy goods and services from a firm's Web site

B

68) Which of the following occurred in the 1990-2000 generation of computing? A) The mainframe era began. B) The personal computer era ended and the interpersonal computing era began. C) The mainframe era ended and the personal computer era began. D) The interpersonal computing era ended and the internetworking era began. E) The internetworking era ended.

B

68) With respect to types of information systems used in organizations, an inventory management and planning system is an example of a(n) ________ system. A) geographic planning B) management information C) electronic commerce D) virtualization E) social software

B

69) The Game, Inc. company is offering a new game that can expand exponentially to new users. The company is offering the very basic game for free allowing the user to upgrade to several levels of a paid subscription model. Choose the selection below that best exemplifies this revenue model. A) Affiliate marketing B) Freemium C) Channel marketing D) Licensing E) Subscriptions

B

73) Which of the following defines marginal cost? A) It is the cost of an alternative that must be forgone in order to pursue a certain action. B) It is the cost of producing an additional unit of output. C) It is the cost that is independent of the level of goods or services produced by the business. D) It is the cost that has already been incurred and cannot be recovered. E) It is the cost incurred in making an economic exchange.

B

75) Iver Audio is an all-in-one music management tool that was first marketed in 1999. Most users can use the Basic version that is free, but a $19.99 upgrade provides extra features such as supertagging, faster ripping and burning. Which of the following explains this approach for applying freeconomics? A) labor exchange approach B) freemium approach C) zero marginal cost approach D) cross subsidies approach E) gift economy approach

B

77) Which type of innovation is best described as using innovative ways to connect offerings with customers? A) Process innovation B) Channel innovation C) Service innovation D) Brand innovation E) Structure innovation

B

81) Which of the following statements is true about a public cloud? A) It gives an organization a high degree of customizability over its data and applications. B) It can be used by any interested party on a pay-per-use basis. C) It is internal to an organization. D) It does not free an organization from the issues associated with managing the cloud infrastructure. E) It gives an organization a high degree of control over its data and applications

B

84) ________ is used to transmit voice and video communication over the Internet. A) Edge computing B) IP convergence C) Distributed computing D) IP routing E) IP console

B

87) According to the disruptive growth engine, executive leadership will allow a firm to ________. A) effectively identify and evaluate potential disruptive innovations B) gain credibility and to bridge sustaining and disruptive product development C) gain the greatest disruptive opportunities D) build a disruptive team of expert innovators E) educate those closest to customers and competitors in order to identify opportunities

B

87) Customers can run their own applications, which are typically designed using tools provided by the service provider in a(n) ________ model. A) infrastructure as a service B) platform as a service C) software as a service D) application as a service E) hardware as a service

B

88) Which of the following statements is true about the e-business innovation cycle? A) The vertical dimension of the cycle shows the life expectancy of a particular information technology and the horizontal dimension shows time. B) The vertical dimension of the cycle shows the extent to which an organization derives value from a particular information technology and the horizontal dimension shows time. C) The vertical dimension of the cycle shows the expected investments required for a particular information technology and the horizontal dimension shows time. D) The vertical dimension of the cycle shows the efficiency of a particular information technology and the horizontal dimension shows life expectancy of that information technology. E) The vertical dimension of the cycle shows the user-friendliness of a particular technology and the horizontal dimension shows the investment in that technology.

B

89) The cloud computing model has several unique and essential characteristics that distinguish cloud computing from an in-house infrastructure. One of these characteristics is ________. A) narrow network access B) rapid elasticity C) external network capability D) packaged networking E) cloud engineered data

B

95) Which of the following steps should be taken by a person to ensure his or her privacy online? A) Avoid Web sites that are monitored by independent organizations. B) Visit Web sites anonymously. C) Adjust his or her Web browser settings to save cookies. D) Ensure he or she receives a confirmation e-mail whenever he or she buys products online. E) Maintain only one e-mail account and use it when making online purchases.

B

1) At the ________ level of a firm, the routine, day-to-day business processes and interactions with customers occur. A) strategic B) tactical C) operational D) managerial E) executive

C

11) ________ decision making in an organization is referred to as semistructured decision making because solutions and problems are not clear-cut and often require judgment and expertise. A) Illusive-level B) Operational-level C) Managerial-level D) Executive-level E) Strategic-level

C

13) Which of the following general classes of computers designed for medical, engineering, or animation and graphics design uses is optimized for visualization and rendering of threedimensional models, and typically have fast processors, large memory, and advanced video cards?

C

14) Jane Estroisch works as a manager in a multidomestic firm. She focuses on the long-term questions facing the organization such as which countries to compete in and what organizational policies to follow. Jane is in the ________ level of the organization. A) operational B) tactical C) executive D) functional E) managerial

C

15) With respect to the five general classes of computers, a ________ is typically used for scientific research. A) mainframe computer B) workstation C) supercomputer D) microcomputer E) server

C

17) TransCorp is an IT firm that is looking to outsource its payroll processes. Which of the following statements, if true, would most strengthen the decision to outsource? A) Companies in other countries can do the same amount of work at a comparable cost. B) Outsourcing has become a trend among most firms in developed nations. C) Companies in other countries are more efficient in all aspects of work and are also cost effective. D) Firms across the globe are adopting cloud computing systems. E) The firm is enjoying good profit margins.

C

17) With respect to organizational decision-making levels, for ________ decisions, some procedures to follow for a given situation can be specified in advance, but not to the extent where a specific recommendation can be made. A) unstructured B) planned C) semistructured D) asymmetrical E) structured

C

18) ________ software is the collection of programs that control the basic operations of computer hardware. A) Application B) Transitory C) System D) Open source E) Peripheral

C

20) Operating systems are often written in ________, a very low-level computer programming language that allows the computer to operate quickly and efficiently. A) structured query language B) hypertext markup language C) assembly language D) extensible markup language E) practical extraction and report language

C

20) ________ decisions are referred to as unstructured decisions because the problems are relatively complex and non-routine. A) Managerial-level B) Tactical-level C) Executive-level D) Operational-level E) Illusive-level

C

21) The term urbanization is best described as ________. A) the expansion of city boundaries B) the movement of urban areas to the country C) the movement of rural populations to urban areas D) the movement of people between cities E) the loss of people in major cities

C

24) Which of the following actions would an organization take if it decides to pursue a bestcost provider strategy? A) offering the best prices in its industry on its goods and/or services B) attempting to gain monopoly in the market by means of an unhealthy competition C) offering products or services of reasonably good quality at competitive prices D) providing high quality products at low prices in specific markets E) offering low quality products at low prices with high quality after-sales services

C

24) ________ define the procedures that different computers follow when they transmit and receive data. A) Consoles B) Keyloggers C) Protocols D) Hosts E) Hypertexts

C

25) Which of the following is an example of a best-cost provider strategy? A) Different car manufacturers compete in the tiny super car category with prices starting at $150,000 and running as high as $600,000. B) Aerodoungle's Eridla brand is considered a luxury car. Some of Eridla's models like the ES model, however, are in the midrange of prices for cars. C) Global furniture retailer Rusicwood provides customers with affordable solutions for better living by offering home furnishings that combine good design, function, and quality with low prices. D) Wild Hog builds motorcycles that target only the high end of the heavyweight market-the high-end premium cruiser market-with names such as Wolf, Mastiff, and Bulldog. E) Streetsuit's everyday low prices (EDLP) strategy hinges upon its ability to obtain consumer goods at the cheapest possible price and pass these savings on to consumers.

C

26) Walmart pursues a ________ strategy by which it offers the best prices in its industry on its goods and/or services. A) best-cost provider B) decreased market share C) low-cost leadership D) broad differentiation E) focused differentiation

C

26) ________ is the transmission capacity of a computer or communications channel, which represents how much binary data can be reliably transmitted over the medium in one second. A) Latency B) Data buffer C) Bandwidth D) Jitter E) Codec

C

29) A ________ is any computer that may both request and provide services. A) console B) client C) peer D) host E) port

C

31) The extent to which tasks are accomplished well is called ________. A) goal setting B) efficiency C) effectiveness D) accomplishment E) effort

C

32) With respect to computer networks, ________ are also referred to as Wi-Fi networks. A) storage area networks B) wireless body sensor networks C) wireless local area networks D) campus area networks E) personal area networks

C

37) Which of the following features of the Web contains not only information, but also references or links to other documents? A) proxy server B) Web ring C) hypertext D) codec E) domain name

C

41) Value creation occurs when an organization can ________. A) sell more products at the same price over a given period B) create new products in an industry C) provide products at a lower cost or with superior benefits to the customer D) increase its customer base over time E) increase capacity in production at the same per unit cost

C

41) Which of the following statements is true about data? A) It can be defined as a representation of reality. B) It is the ability to understand information. C) It has no meaning in and of itself. D) It is the ability to make decisions or predictions based on information. E) It organizes or manipulates information to make it suitable for a given task.

C

43) Which of the following statements is true about knowledge? A) It has no meaning in and of itself. B) It is a set of unformatted words and numbers. C) It is the ability to understand information. D) It helps to convert information into raw data. E) It has little value in comparison with raw data.

C

44) Which of the following is likely to have the suffix ".com" after the domain name in its URL? A) UNICEF B) The Federal Reserve C) Microsoft D) The World Wide Fund for Nature E) Massachusetts Institute of Technology

C

5) Which of the following terms means "knowing how to use a computer"? A) information security B) cloud computing C) computer literacy D) computer compatibility E) collaborative thinking

C

50) Which of the following core competencies is part of an IS personnel's systems knowledge and skills? A) hardware platforms B) virtualization C) information gathering and analysis D) cabling and network interface cards E) application software

C

51) A company's ________ secures proprietary information stored within the corporate local area network and/or wide area network so that the information can be viewed only by authorized users. A) Web ring B) static Web site C) firewall D) proxy server E) Web page

C

52) Most companies allow their employees to use ________ networks to connect to the company's intranet while on the road or working from home. A) near-me area B) metropolitan area C) virtual private D) body sensor E) storage area

C

52) The process of connecting separate information systems and data to improve business processes and decision making is known as ________. A) database development B) business intelligence C) systems integration D) cloud computing E) data mining

C

6) A fundamental component of the IS infrastructure is the ________, that is, the computers that run the applications and databases necessary for processing transactions or analyzing business data. A) protocol B) archival storage C) hardware D) system software E) data center

C

6) The ability to independently learn new technologies as they emerge and assess their impact on your work and life is called ________. A) computer networking B) computer adaptation C) computer fluency D) computer compatibility E) computer assembling

C

60) The purpose of an intelligent system is to ________. A) enable people to communicate, collaborate, and coordinate with each other B) create, store, analyze, and manage spatial data C) emulate or enhance human capabilities D) support the coordination of suppliers, product or service production, and distribution E) produce detailed information to help manage a part of the firm

C

62) Identify the purpose of an office automation system. A) to create, store, analyze, and manage spatial data B) to provide access to databases in order to support quantitative decision making C) to support a wide range of predefined day-to-day activities of individuals and small groups D) to support interaction between the firm and its customers E) to enable customers to buy goods and services from a firm's Web site

C

66) Which of the following occurred in the 1946-1958 generation of computing? A) The interpersonal computing era ended and the internetworking era began. B) The internetworking era ended. C) The mainframe era began. D) The mainframe era ended and the personal computer era began. E) The personal computer era ended and the interpersonal computing era began

C

66) With respect to the types of information systems used in organizations, a word processor is an example of a(n) ________ system. A) electronic commerce B) supply chain management C) office automation D) geographic information E) data mining and virtualization

C

67) Which of the following occurred in the 1964-1990 generation of computing? A) The mainframe era began. B) The personal computer era ended and interpersonal computing began. C) The mainframe era ended and the personal computer era began. D) The interpersonal computing era ended and the internetworking era began. E) The internetworking era ended.

C

68) Which of the following is NOT a typical revenue model in the digital world? A) Affiliate marketing B) Subscriptions C) Channel marketing D) Licensing E) Freemium

C

7) Which of the following best describes the network effect? A) The value of a network depends on the number of mobile devices that are attached. B) It refers to the type of network an organization employs. C) It refers to the notion that the value of a network increases with the number of users. D) It refers to the effect of the wireless devices that are attached. E) It refers to the idea that networks are attached to each other.

C

70) With respect to the types of information systems used in organizations, a product demand forecasting system is an example of a(n) ________ system. A) visualization B) geographic information C) decision support D) social software E) electronic commerce

C

71) Manufacturers of hardware and software often apply the concept of planned obsolescence, meaning that ________. A) the companies have already decided when to launch their next product B) the product is designed in such a way as to extend its life span C) the product is designed to last only for a certain life span D) the product is designed to avoid obsolescence E) the companies do not enter markets that have the risk of product obsolescence

C

72) According to basic economics within a competitive marketplace, the price of a product is set by its ________. A) opportunity cost B) sunk cost C) marginal cost D) transaction cost E) fixed cost

C

79) Which of the following statements is true about the platform as a service model? A) The customer is provided with the basic capabilities of processing, storage, and networking. B) The customer has no knowledge or control over the underlying infrastructure and has only limited ability to control or configure application-specific settings. C) The customer can run his or her own applications that are typically designed using tools provided by the service provider. D) Only the basic capabilities of processing, storage, and networking are provided. E) The customer has to manage the licenses for the operating systems being used.

C

79) Which type of innovation is best described as supporting and enhancing the value of an offering? A) Process innovation B) Channel innovation C) Service innovation D) Brand innovation E) Structure innovation

C

80) The steps (in order) in the disruptive innovation cycle is ________. A) Matching, Choosing, Executing, and Assessing B) Matching, Evaluating, Executing, and Assessing C) Choosing, Matching, Executing, and Assessing D) Choosing, Evaluating, Executing, and Assessing E) Evaluating, Matching, Executing, and Assessing

C

81) The emergence of a highly successfully business that is technology based with potential for growth and scalability is often referred to as a(an) ________. A) new age company B) innovative company C) startup D) kickstarter E) novel

C

83) Both Sony's PlayStation Network and FedEx's systems were developed and are continuously updated to help the companies ________. Choose the option that best fits. A) maximize their profit B) ensure the systems operate at peak performance C) gain a competitive advantage over their competitors D) be sure their systems are not ubiquitous E) maintain efficiency

C

83) Which of the following is used to increase Web application performance? A) Trusted computing B) Distributed computing C) Content delivery networks D) IP convergence E) Green computing

C

85) Which of the following differentiates grid computing from cloud computing? A) Grid computing uses a large number of computers. B) Grid computing is a natural evolution of the widespread adoption of virtualization and utility computing. C) Grid computing is applied to a single large problem. D) Grid computing involves over-the-Internet provision of dynamically scalable and often virtualized resources. E) Grid computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources.

C

86) ________ are new technologies, products, or services that eventually surpass the existing dominant technology or product in a market. A) Constructive innovations B) Adaptive innovations C) Disruptive innovations D) Facultative innovations E) Extensive innovations

C

88) ________, the use of the Internet protocol (IP) for transporting voice, video, fax, and data traffic, has allowed enterprises to make use of new forms of communication and collaboration, as well as traditional forms of communication, at much lower costs. A) Grid computing B) IP edging C) IP convergence D) Edge computing E) IP console

C

90) ________ is concerned with what information an individual should have to reveal to others in the workplace or through other transactions, such as online shopping. A) Information accessibility B) Information accuracy C) Information privacy D) Information asymmetry E) Information piracy

C

99) Briefly discuss the types of clouds.

Cloud service providers such as Amazon.com offer what is referred to as a public cloud. Services in a public cloud can be used by any interested party on a pay-per-use basis; hence, they are often used for applications that need rapid scalability (i.e., the ability to adapt to increases or decreases in demand for processing or data storage), or in cases where there is insufficient capital or other resources to build or expand an IT infrastructure. In contrast, a private cloud (or internal cloud) is internal to an organization and can help the organization to balance demand and supply of computing resources within the organization; similar to a public cloud, a private cloud provides self-service access to resources, allowing business users to provision resources on-demand using a utility computing model. A private cloud does not free an organization from the issues associated with managing the cloud infrastructure, but it does give the organization a high degree of customizability, flexibility, and control over its data and applications.

10) A dataset comprised of extremely large amounts of complex data would best be described as ________. A) mega data B) network data C) extreme data D) big data E) a database

D

10) The executive level of an organization is also known as the ________ level. A) managerial B) tactical C) operational D) strategic E) illusory

D

10) With respect to the general classes of computers, a ________ is very large and is used primarily as the main, central computing system for major corporations. A) personal computer B) supercomputer C) server D) mainframe computer E) workstation

D

15) Managers in the ________ level of an organization are referred to as "executives." A) operational B) tactical C) functional D) strategic E) managerial

D

16) Outsourcing has seen a huge increase because of the ________. A) increase in decentralization B) increase in the use of cloud computing C) increase in advertising costs D) decrease in telecommunication costs E) decrease in the cost of raw materials

D

17) Which of the following is an example of an operating system? A) Safari B) Microsoft Office C) Mozilla Firefox D) Ubuntu Linux E) Microsoft Surface

D

18) At the ________ level of an organization, managers focus on long-term strategic questions facing the organization, such as which products to produce, which countries to compete in, and what organizational strategy to follow. A) managerial B) tactical C) operational D) executive E) illusory

D

2) Which of the following predictions made by Peter Drucker is true? A) Knowledge workers have less bargaining power than workers in other industries. B) Knowledge workers lack valuable real-world skills. C) Knowledge workers lack reliance on formal education. D) Knowledge workers are continually learning how to do their jobs better. E) Knowledge workers are paid less in comparison with their prior industrial counterparts.

D

23) Information systems at the ________ level of an organization often help in automating repetitive activities. A) tactical B) strategic C) managerial D) operational E) executive

D

24) Which of the following can be cited as an example of a digital divide? A) Unlike Joey, Ryan has access to more books and good advice because he studies in a better school. B) Unlike Ben, Claudia possesses superior analytical skills that make her better at mathematics. C) Kevin has better chances of promotion when compared to Vincent because of his people skills. D) Lora has access to more information than Frank because she knows how to operate a computer. E) Sam has better multitasking skills than Neal that make him a better manager.

D

27) Bandwidth is measured in ________. A) moles per second B) joules per second C) parts per million D) bits per second E) relays per second

D

31) ________ networks enable any computer or device on the network to provide and request services. All members of the network have equivalent capabilities and responsibilities. A) Server-centric B) Server-to-peer C) Client-to-peer D) Peer-to-peer E) Client-centric

D

32) A metric deemed most critical to accessing progress toward a certain goal is referred to as a(an) ________. A) critical factor B) critical performance indicator C) critical performance initiative D) key performance indicator E) performance metric

D

33) Personnel forecasting is a functional area information system contained within the ________ department of an organization. A) Accounting B) Financial C) Marketing D) Human Resources E) Operations

D

34) With respect to the components of a business model, ________ is the utility that the product/service must offer to customers. A) cost structure B) value grid C) value migration D) value proposition E) revenue stream

D

35) A ________ is a software application that can be used to locate and display Web pages including text, graphics, and multimedia content. A) Webcam B) keylogger C) proxy server D) Web browser E) Webmaster

D

37) The term given to a company that is first to enter a market thus creating a competitive advantage is ________. A) competitive mover B) strategic mover C) executive mover D) first-mover advantage E) first-mover competitor

D

38) ________ refers to physical computer equipment, such as the computer monitor, central processing unit, or keyboard. A) Adware B) Malware C) Stealware D) Hardware E) Spyware

D

39) With regards to the World Wide Web, Web pages are stored on ________. A) Web consoles B) Web rings C) Web consortiums D) Web servers E) Web hosts

D

40) ________ reflect(s) the organization's specific assets that are utilized to achieve cost or product differentiation from its competitors. A) Products B) Goodwill C) Technology D) Resources E) People

D

42) Which of the following statements is true about information? A) It has no meaning in and of itself. B) It organizes or manipulates knowledge to make it suitable for a given task. C) It is a set of unformatted words and numbers. D) It is a representation of reality. E) It is the ability to make predictions based on data.

D

46) Which of the following is likely to have the suffix ".edu" after the domain name in its URL? A) Yahoo! B) UNICEF C) The Federal Reserve D) Harvard Business School E) America Online

D

48) Which of the following core competencies are part of an IS personnel's technical knowledge and skills? A) systems analysis and design B) integrating subsystems and systems C) interpersonal skills and group dynamics D) network administration E) technological communication and presentation

D

49) Which of the following statements is true about an IP address? A) The format of an IP address is a 64-bit numeric address. B) It is written as eight numbers separated by periods. C) Each number separated by periods can have any number between 0 and 999. D) It can be used to navigate to particular Web addresses. E) It is written as a number with a period at the end.

D

55) Which of the following types of information systems creates, stores, analyzes, and manages spatial data? A) electronic commerce system B) collaboration system C) virtualization system D) geographic information system E) decision support system

D

59) The purpose of a(n) ________ is to support and integrate all facets of the business, including planning, manufacturing, sales, marketing, and so on. A) intelligent system B) functional area information system C) electronic commerce system D) enterprise resource planning system E) management information system

D

63) With respect to the types of information systems used in organizations, a grocery store checkout cash register with a connection to a network is an example of a(n) ________. A) intelligent system B) functional area information system C) decision support system D) transaction processing system E) electronic commerce system

D

7) With respect to the five general classes of computers, ________ are typically used for mission critical applications, such as transaction processing. A) workstations B) supercomputers C) servers D) mainframes E) personal computers

D

71) A ________ is defined as an economic system in which assets or services are shared between private individuals, either free or for a fee. A) services economy B) communication economy C) flexible economy D) sharing economy E) social economy

D

72) With respect to the types of information systems used in organizations, financial, operations, and human resource management is an example of a(n) ________ system. A) social software B) data mining and visualization C) geographic information D) enterprise resource planning E) electronic commerce

D

74) Which of the following actions of a firm suggests that it uses the freemium approach for applying freeconomics? A) It provides free services to customers and gets paid for it by third parties. B) It reduces the sale price of one item in order to sell something else of value. C) It distributes products to customers without an appreciable cost to anyone. D) It offers basic services for free, but charges a premium for special features. E) It allows people to participate and collaborate to create something of value.

D

75) Under the ________ model, organizations "rent" resources such as processing, data storage, or networking from an external provider on an as-needed basis and pay only for the services used. A) cluster computing B) grid computing C) distributed computing D) utility computing E) parallel computing

D

77) The ability to adapt to increases or decreases in demand for processing or data storage is known as ________. A) extensibility B) portability C) reliability D) scalability E) usability

D

8) Which of the following is an economic change brought about by globalization enabled by information technology? A) increase in the frequency of worldwide fads and phenomena B) development of low-cost computing platforms C) availability of low-cost communication systems D) increase in the outsourcing of labor E) decentralization of organizations

D

82) ________ is the securing of business financing from individuals in the marketplace. A) Capitalizing B) eLoans C) Internet funding D) Crowdfunding E) Self sourcing

D

82) ________ is used to solve large-scale computing problems. A) Trusted computing B) Edge computing C) IP convergence D) Grid computing E) Distributed computing

D

83) According to ________, the number of transistors that could be squeezed onto a silicon chip would double every 18 months. A) Metcalfe's law B) Megan's law C) Murphy's law D) Moore's law E) Ashby's law

D

86) In grid computing, the slowest computer creates a bottleneck and slows down the entire grid. A(n) ________ grid, consisting of a large number of homogeneous computers, can help overcome these problems. A) trusted B) edged C) clustered D) dedicated E) parallel

D

89) In an e-business innovation cycle, after an organization scans the environment for new emerging and enabling technologies, the next step is to ________. A) create jobs, groups, and processes that are all devoted to scanning the environment B) select the database and data storage advances C) address the current opportunity to grab customers and market share D) match the most promising new technologies with current economic opportunities E) assess the value of the use of technology for customers and internal clients

D

91) Information about one's identity and place of living is an example of ________. A) behavioral data B) geographic data C) psychographic data D) demographic data E) attitudinal data

D

92) Which of the following statements is true about the companies operating in the online world and a customer's online privacy? A) The vendor cannot track the Web pages a customer looks at. B) The vendor cannot track what products a customer examines in detail. C) The vendor is not capable of knowing the method of payment a customer chooses to use. D) The vendor is not required by law to respect a customer's privacy. E) The vendor cannot know where a customer is having the product delivered.

D

94) Define disruptive innovation and how it leads to the innovator's dilemma

Disruptive innovations are new technologies, products, or services that eventually surpass the existing dominant technology or product in a market. Within every market, there are customers who have relatively high, moderate, or low performance requirements from the existing product offerings. Over time, as disruptive innovations and incremental improvements are introduced into an industry, the capabilities of the products in all segments (i.e., low to high performance) improve; as product capabilities improve at the high-performance end of the market, the number of potential customers for these products gets relatively smaller. At the same time, as the low-end products also improve, they are increasingly able to capture more and more of the mainstream marketplace. These developments caused by disruptive innovations, typically ignored by established market leaders, lead to loss of their market dominance and hence lead to market failure. This is known by the term innovator's dilemma.

12) Joe and Megan know how to use a computer. Which of the following describes this fact? A) computer knowledge worker B) expert computer user C) computer expert D) computer fluency E) computer literacy

E

13) Which of the following best explains the process of moving business processes or tasks to another company? A) offshoring B) liquidating C) cloud computing D) downsizing E) outsourcing

E

2) Why are information systems typically used at the operational level? A) to create a risk information sheet B) to define all project tasks C) to identify all business activities D) to create use cases E) to increase efficiency

E

21) To assist ________ decision making, information systems are used to obtain aggregate summaries of trends and projections of the future. A) managerial-level B) functional-level C) tactical-level D) operational-level E) executive-level

E

22) At the ________ level of an organization, information systems provide key performance indicators (KPIs) that are focused on balancing performance across the organization. A) illusive B) operational C) tactical D) managerial E) executive

E

23) With respect to computer networking, ________ refers to the physical pathway (cable(s) and wireless) used to carry network information. A) multiplatform B) transmission control protocol C) random-access memory D) traceroute E) transmission media

E

25) With respect to computer networks, a typical ________ network has a bandwidth of 10 Mbps to 1 Gbps. A) personal area B) metropolitan area C) wide area D) campus area E) local area

E

27) Which of the following is an implication for firms that have a threat of new entrants into their market? A) increased cost B) reduced quality C) increased demand for services D) increased price E) decreased market share

E

35) Inventory management is an application that is part of the ________ functional area. A) Accounting B) Financial C) Marketing D) Human Resources E) Operations

E

38) The standard method of specifying the format of Web pages is called ________. A) Structured Query Language (SQL) B) Practical Extraction and Report Language (PERL) C) Extensible Markup Language (XML) D) Assembly Language (AL) E) Hypertext Markup Language (HTML)

E

40) Which of the following statements is true about information systems (IS) and information technology (IT)? A) IT programs have a stronger managerial focus than IS programs. B) IS programs have a stronger data retrieval capacity than IT programs. C) Software and telecommunications are present in IS, but excluded from IT. D) The difference between IT and IS is increasing due to globalization. E) IT programs are more technical than IS programs.

E

43) The suffix ".org" is reserved for ________. A) governmental entities B) commercial organizations C) network organizations D) educational institutions E) non-profit organizations

E

47) In information systems management, a systems consultant is responsible for ________. A) analyzing business requirements and selecting information systems that meet those needs B) coding, testing, debugging, and installing programs C) auditing information systems for compliance with internal and external standards D) managing security measures and disaster recovery E) providing information systems knowledge to external clients

E

53) Which of the following types of information systems facilitates collaboration and knowledge sharing? A) visualization system B) word processor C) intelligent system D) electronic commerce system E) social software

E

54) Which of the following types of information systems enables people to communicate, team up, and coordinate with each other? A) electronic commerce system B) geographic information system C) virtualization system D) intelligent system E) collaboration system

E

67) With respect to the types of information systems used in organizations, an automated system for analyzing bank loan applications is an example of a(n) ________ system. A) geographic information B) electronic commerce C) social software D) visualization E) intelligent

E

69) Which of the following occurred in the 1958-1964 generation of computing? A) The internetworking era began. B) The personal computer era expanded. C) The interpersonal computing era ended. D) The interpersonal computing era began. E) The mainframe era expanded.

E

7) With respect to organizational decision-making levels, ________ decisions can be programmed directly into operational information systems so that they can be made with little or no human intervention. A) asymmetrical B) semistructured C) unstructured D) comparative E) structured

E

70) The prediction that the number of transistors on a chip would double about every two years is known as ________. A) Megan's law B) Ashby's law C) Murphy's law D) Metcalfe's law E) Moore's law

E

76) As defined by the National Institute of Standards and Technology (NIST), "________ is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction." A) Green computing B) Social networking C) Internetworking D) Web phishing E) Cloud computing

E

76) ________ use(s) information systems to enhance a person's perception of reality by providing relevant information about the user's surroundings with the use of special glasses or other devices. A) 3-D glasses B) Teleport C) Virtual reality D) HoloLens E) Augmented reality

E

78) Which type of innovation is best described as using the company's talent and assets in innovative ways? A) Process innovation B) Channel innovation C) Service innovation D) Brand innovation E) Structure innovation

E

8) Which of the following is a difference between a server and a workstation? A) A workstation has fast network connectivity when compared to a server. B) A workstation is used primarily as the main, central computing system for major corporations. C) A workstation has high reliability when compared to a server. D) A workstation has more memory and more disk storage when compared to a server. E) A workstation is typically used by one user at a time.

E

88) Mike is at Jim's house and admires his digital music collection. He then downloads the entire collection for his own personal use. A) It is legal for Mike because he has Jim's agreement. B) Mike must pay Jim for the right to download the music. C) Mike can download the music if the value is less than $100. D) Mike commits a misdemeanor. E) Mike commits an ethical intellectual property violation.

E

89) Which of the following is used to describe the issues and standards of conduct as they pertain to the use of information systems? A) virtual ethics B) social informatics C) cyber security D) cloud computing E) computer ethics

E

93) The ________ Act of 1986 made it much more difficult for anyone, including the government, to eavesdrop on phone conversations. A) Electronic Communication Modernization B) Internet Privacy C) Sarbanes-Oxley D) Gramm-Leach-Bliley E) Electronic Communications Privacy

E

29) The development of low-cost computing platforms and communication technologies is an economic change brought about by globalization enabled by information technology.

FALSE

32) One of the main reasons for a company to outsource its business is to focus on non-core business activities.

FALSE

33) Countries such as India remain popular for offshore outsourcing because of rising salaries.

FALSE

34) The network effect refers to the notion that the value of a network is based on the number of networks being used.

FALSE

35) Vendors are required by law to respect the privacy of people who make Web purchases.

FALSE

4) The application software used for various business processes can directly interact with the various types of computer hardware.

FALSE

43) Unstructured decisions can be programmed directly into operational information systems so that they can be made with little or no human intervention.

FALSE

44) At the executive level, information systems are typically used to optimize processes and to better understand the underlying causes of any performance problems.

FALSE

45) Tactical-level decision making is more structured and routine than operational-level decision making.

FALSE

48) With respect to the organizational decision making levels, top-level managers typically focus on problems within a specific business function, such as marketing or finance.

FALSE

51) Operational, managerial, and executive decision-making levels are all supported by a single type of information system.

FALSE

53) Workstations are optimized for access by many concurrent users and therefore have more advanced microprocessors, more memory, a larger cache, and more disk storage than singleuser computers.

FALSE

56) The fundamental information units of computers are called relays.

FALSE

57) The name "Internet" is derived from the concept of wireless networking

FALSE

59) Functional area information systems are designed to support decision making

FALSE

59) With respect to the domain name, the suffix ".com" is reserved for network organizations.

FALSE

60) Bar Codes are much more robust than Radio Frequency ID (RFID) because they can be hand scanned quickly.

FALSE

60) Choosing and implementing new or innovative information systems is sufficient to gain or sustain competitive advantage.

FALSE

75) The technical area of competency of an IS professional is the easiest to maintain in the digital world because of the huge popularity of individual technologies.

FALSE

76) are used by a narrow range of organizations only to process customer transactions more efficiently.

FALSE

77) The purpose of a knowledge management system is to create, store, analyze, and manage spatial data.

FALSE

84) Software refers to a group of two or more computer systems linked together with communications equipment.

FALSE

85) IS personnel with service mentality put up roadblocks to customers' new systems ideas and give reasons that the new ideas cannot, or will not, work.

FALSE

90) A supercomputer is primarily used as the main, central computing system for major corporations

FALSE

91) Risk tolerance for people within the organization should be low for the deployment of innovative information systems.

FALSE

92) A public cloud is internal to an organization and can help the organization to balance demand and supply of computing resources within the organization.

FALSE

93) The applications under the software as a service model are typically the toughest to deploy.

FALSE

94) In the platform as a service (PaaS) model, the customer uses only applications provided via a cloud infrastructure.

FALSE

96) The Electronic Communications Privacy Act (ECPA) offered far stronger support for email communications than it did for voice mail.

FALSE

96) VoIP is an acronym that stands for Voice over Infrastructure Procedures

FALSE

100) Briefly describe grid computing.

Grid computing refers to combining the computing power of a large number of smaller, independent, networked computers (often regular desktop PCs) into a cohesive system in order to solve problems that only supercomputers were previously capable of solving. Similar to cloud computing, grid computing makes use of distributed resources; however, in contrast to cloud computing, the resources in a grid are typically applied to a single large problem. To make grid computing work, large computing tasks are broken into small chunks, each of which can then be completed by individual computers. However, as the individual computers are also in regular use, the individual calculations are performed during the computers' idle time so as to maximize the use of existing resources.

64) Why aren't IP addresses normally used to navigate Web addresses instead of domain names?

IP addresses can be used instead of URLs to navigate to particular Web addresses. This practice is not done regularly, as IP addresses are far more difficult to remember than domain names, and an organization may assign its domain name to a server with a different IP address. While the IP address behind a domain name may change, the domain name stays the same.

37) Discuss Peter Drucker's predictions about knowledge workers and the knowledge society

In 1959, Peter Drucker predicted the rise in the importance of information and of information technology (IT) and coined the term knowledge worker. Knowledge workers are professionals who are relatively well educated and who create, modify, and/or synthesize knowledge as a fundamental part of their jobs. Drucker's predictions about knowledge workers were very accurate. As he predicted, they are generally paid better than their prior agricultural and industrial counterparts; they rely on and are empowered by formal education, yet they often also possess valuable real-world skills; they are continually learning how to do their jobs better; they have much better career opportunities and far more bargaining power than workers ever had before; they make up about a quarter of the workforce in the United States and in other developed nations; and their numbers are rising quickly. Drucker also predicted that, with the growth in the number of knowledge workers and with their rise in importance and leadership, a knowledge society would emerge. He reasoned that, given the importance of education and learning to knowledge workers and the firms that need them, education would become the cornerstone of the knowledge society. Possessing knowledge, he argued, would be as important as possessing land, labor, or capital.

73) Briefly explain Moore's law

In 1965, Intel cofounder Dr. Gordon Moore hypothesized that the number of transistors on a chip would double about every two years. When Moore made this bold prediction, he did not limit it to any specified period of time. This prediction became known as Moore's Law. Interestingly, whereas the first CPU had 2,200 transistors, the newest models have broken the 5-billion-transistor mark, so Dr. Moore's prediction has been fairly accurate so far. The number of transistors that can be packed into a modern CPU and the speed at which processing and other activities occur are remarkable. For example, the Intel Core i7 Extreme CPU can complete hundreds of millions of operations every second.

98) Discuss the Electronic Communications Privacy Act and its implications for e-mail privacy.

In 1986, Congress passed the Electronic Communications Privacy Act (ECPA), which offered far stronger support for voice mail than it did for e-mail communications. This act made it much more difficult for anyone (including the government) to eavesdrop on phone conversations. E-mail privacy is, therefore, much harder to protect. In addition, no other laws at the federal or state levels protect e-mail privacy. The ECPA and the court case judgments thus far on e-mail monitoring suggest that companies must be prudent and open about their monitoring of e-mail messages and Internet usage. Companies should use good judgment in monitoring e-mail and should make public their policy about monitoring messages. One primary reason that employees perceive their e-mail to be private is the fact that they are never told otherwise. In addition, employees should use e-mail only as appropriate, based on their company's policy and their own ethical standards.

97) Distinguish between the software as a service model and the platform as a service model.

In the software as a service (SaaS) model, the customer uses an application provided via a cloud infrastructure. The consumer cares only about the application, with no knowledge or control over the underlying infrastructure and has only limited ability to control or configure application-specific settings. The customer does not have to worry about maintaining or updating the software, the underlying platform, or the hardware infrastructure. In the platform as a service (PaaS) model, the customer can run his or her own applications that are designed using tools provided by the service provider. In this model, the user has control over the applications, but has limited or no control over the underlying infrastructure. As the underlying computing platform is provided, the customer does not have to worry about purchasing software licenses, such as operating systems for Web servers or database management systems, and the service provider manages the functioning and updating of the platform provided

64) Explain how information systems implemented in the operational level are different from those implemented at the strategic level.

Information systems at the operational level are designed to automate repetitive activities, such as sales transaction processing, and to improve the efficiency of business processes at the customer interface. Information systems at the strategic level are used to obtain aggregate summaries of trends and projections of the future. At the executive level, information systems provide KPIs that are focused on balancing performance across the organization.

101) Explain how scalability is an issue for organizations when managing their cloud infrastructure.

One of the biggest promises of cloud computing is scalability, such that organizations can scale up or down their infrastructure as needed. Yet, not every provider will be able to meet every organization's demands. Thus, organizations must carefully evaluate to what extent the provider will be able to meet current and future business needs in terms of data storage, transaction volumes, and so on.

65) List Porter's primary competitive forces that analyze the competition within an industry

Porter's primary competitive forces that analyze the competition within an industry include: 1. the rivalry among competing sellers in an industry. 2. the threat of potential new entrants into an industry. 3. the bargaining power that customers have within an industry. 4. the bargaining power that suppliers have within an industry. 5. the potential for substitute products from other industries.

92) List and discuss six types of innovation

Profit model innovation: finding novel ways of generating revenues from offerings (dropbox using freemium approach) Network innovation: harnessing the capabilities and strengths of others (glaxosmithkline or marriot using open innovation for new product or service ideas) Structure innovations: using the company's talent and assets in innovative ways (southwest airlines focusing on one aircraft type) Process innovations: changing primary processes used to produce product or service (toyota pioneering lean production) Product performance innovations: creating novel products or ipmroving existing products through differentiation (dyson's airblade hand dryers) Product system innovations: creating bundles of complementary offerings (microsoft bundling individual office programs into Office suite) Service innovations: supporting and enhancing value of offering (Zappo's WOW philosophy of delivering excellent customer service) Channel innovations: using innovative ways to connect offerings with customers (Niketown offering immersive experiences) Brand innovations: positioning the brand in innovative ways (virgin family of brands) Customer engagement innovations: developing meaningful connections with customers (Swarm encouraging users to frequently "check in" to places

62) Briefly describe system software

System software is the collection of programs that control the basic operations of computer hardware. The most prominent type of system software, the operating system (e.g., Windows 8, OS X, Ubuntu Linux), coordinates the interaction between hardware components (e.g., the CPU and the monitor), peripherals (e.g., printers), application software (e.g., office programs), and users. Operating systems are often written in assembly language, a very lowlevel computer programming language that allows the computer to operate quickly and efficiently. The operating system is designed to insulate you from this low-level language and make computer operations unobtrusive. Further, the operating system provides a common layer for different underlying devices, so that applications only have to be developed for different operating systems, rather than for each different computer model. The operating system performs all of the day-to-day operations that we often take for granted when using a computer, such as updating the system clock, printing documents, or saving data to a disk. Just as our brain and nervous system control our body's breathing, heartbeat, and senses without our conscious realization, the system software transparently controls the computer's basic operations

2) Information systems infrastructure consists of hardware, system software, storage, networking, and data centers.

TRUE

26) Advances in cloud computing (think Gmail, Evernote, or DropBox) allow for accessing emails, files, notes, and the like from different devices, enhancing portability and mobility in computing.

TRUE

27) The use of nearly any information technology or system to support every part of the business is known as e-business.

TRUE

28) The trend of using one's own device for communicating in the workplace is an example of consumerization of IT.

TRUE

3) Application software helps to automate business processes, and it enables processes that would otherwise not even be possible.

TRUE

30) Increase in frequency of international travel, tourism, and immigration is a cultural change brought about by globalization enabled by information technology.

TRUE

31) Globalization is the integration of economies throughout the world, enabled by innovation and technological progress.

TRUE

42) Someone with an automating perspective thinks of technology as a way to help complete a task.

TRUE

46) Managerial-level decision making is referred to as semistructured decision making

TRUE

47) Executive-level decisions are referred to as unstructured decisions

TRUE

49) For unstructured organizational decisions, few or no procedures to follow for a given situation can be specified in advance.

TRUE

5) An organization's IS infrastructure has a broad and flexible set of capabilities that can be utilized in a variety of ways.

TRUE

50) Most organizations have three general decision-making levels: operational, managerial, and executive.

TRUE

52) In an organizational setup, a functional area represents a discrete area of an organization that focuses on a specific set of activities.

TRUE

53) Organizational learning is the ability of an organization to use past behavior and information to improve its business processes.

TRUE

54) Organizational strategy is a firm's plan to accomplish its mission and goals as well as to gain or sustain competitive advantage over rivals.

TRUE

54) Transmission media refers to the physical pathway used to carry network information

TRUE

55) In an organization, managers use value chain analysis to identify opportunities where information systems can be used to develop a competitive advantage.

TRUE

55) The easiest way to understand computer networking is through the human communication model

TRUE

56) The set of activities that add value throughout the organization is known as the value chain within an organization.

TRUE

57) The use of information systems has become one of the primary ways that organizations improve their value chains.

TRUE

58) Choosing and implementing an emerging information system is not sufficient to gain or sustain competitive advantage.

TRUE

58) The format of an IP address is a 32-bit numeric address written as four numbers separated by periods.

TRUE

72) Networking hardware and software facilitate the interconnection of different computers, enabling collaboration within organizations, across organizations, and literally around the world.

TRUE

73) Knowledge is the ability to understand information, form opinions, and make decisions or predictions based on the information.

TRUE

74) An information system is a combination of hardware, software, and telecommunications networks that people build and use to collect, create, and distribute data.

TRUE

78) Office automation systems such as Microsoft Office and the OpenOffice.org Productivity Suite provide word processing, spreadsheet, and other personal productivity tools, enabling knowledge workers to accomplish their tasks.

TRUE

79) IS personnel with service mentality believe that the customers own the technology and the information and that the technology and information are there for the customers, not for the systems personnel.

TRUE

86) Technology use by organizations can be strategic and a powerful enabler of competitive advantage.

TRUE

90) Sir John Maddox, a physicist, was quoted in Scientific American in 1999 saying, "The most important discoveries of the next 50 years are likely to be ones of which we cannot now even conceive."

TRUE

91) Using a utility computing model, cloud computing helps to transform IT infrastructure costs from a capital expenditure to an operational expenditure.

TRUE

95) Measured service is typically used in a utility computing model

TRUE

61) Discuss the difference between being effective and being efficient

The extent to which something is accomplished faster, at lower cost, or with relatively little time and effort is being efficient. The extent to which something is accomplished well is being effective.

36) Discuss the five IT Megatrends that shape the Digital Future

The five IT Megatrends that shape the Digital Future are: A) Mobile. One of the biggest trends we're seeing today is the move toward mobile devices. In most developed countries, most adults have a mobile phone, and typically, people have their mobile phones within their reach 24/7. Compare that with the access to your laptop or PC. In the developing world, mobile devices are frequently seen leapfrogging traditional PCs; owing to the lack of stable, reliable power or landline telephone infrastructure, mobile devices are often the primary means of accessing the Internet. For organizations, this increase in mobility has a wide range of implications, from increased collaboration to the ability to manage a business in real time—at any time, from anywhere—to changes in the way new (or existing) customers can be reached. Users are increasingly using mobile devices as part of their workrelated activities using the "bring your own device" (BYOD) policy. B) Social Media. A second megatrend is social media. The rise of social media is largely based on the network effect—referring to the notion that the value of a network (or tool or application based on a network) increases with the number of other users. In other words, if a network has few users, it has little or no value. You may be one of the more than 1.6 billion (and growing) Facebook users who share status updates or pictures with friends and family, or you may use apps such as Snapchat, Twitter, or WhatsApp to communicate with your friends. Today, the use of social media has gone way beyond friends and families. University professors use social networks to provide students with updates about course-related topics, and organizations use social media to encourage employee collaboration or to connect with their customers. In addition, companies can harness the power of the crowd by using social media to get people to participate in innovation and other activities. C) The Internet of Things. A third megatrend is the Internet of Things (IoT)—a network of a broad range of physical objects that can automatically share data over the Internet. Such objects (or "things") can range from an automobile tire equipped with a pressure sensor to a smart meter enabling remote monitoring of energy consumption to a cow with an injectable ID chip. Already in 2008, more devices were connected to the Internet than there were people living on earth. Fueled by advances in chips and wireless radios and decreasing costs of sensors (devices that can detect and respond to changes in the physical environment), in the not-too-distant future everything that can generate useful information will be equipped with sensors and wireless radios. In other words, anything that can generate data or uses data can be connected, accessed, or controlled via the Internet (sometimes referred to as "pervasive computing"). With the ability to connect "things" such as sensors, meters, signals, motors, actuators, or cameras, the potential for gathering useful data is almost limitless. D) Cloud Computing. The fourth megatrend is cloud computing. Whereas traditionally each user would install a number of different applications for various tasks—from creating documents to listening to music—as well as store documents, pictures, and other data on his or her computer, web technologies enable using the Internet as the platform for applications and data. Now, much of the functionality previously offered by applications installed on each individual computer is offered by applications "in the cloud," accessed via a web browser. Increasingly, not only the applications, but also the data, reside in the cloud to be accessed at anytime from anywhere. 13 Copyright © 2018 Pearson Education, Inc. E) Big Data. Together, these transformations of our social and work interactions enabled by 24/7 connectivity have given rise to a fifth trend, Big Data. Big Data are typically described as extremely large and complex datasets, which are characterized as being of high volume, variety, and velocity (i.e., the data are being collected and analyzed at ever-increasing rates). Following the old adage that information is power, organizations are continuously seeking to get the right information to make the best business decisions. Yet organizations are generating and collecting ever more data from internal and external sources. The rise of social media has further increased the amount of unstructured data available to organizations.

61) Describe the different classes of computers.

The five general classes of computers are supercomputer, mainframe, server, workstation, and personal computer. • A supercomputer is the most expensive and most powerful kind of computer. It is used primarily to assist in solving massive scientific problems. • A mainframe computer, while being very large, is used primarily as the main, central computing system for major corporations. Optimized for high availability, resource utilization, and security, mainframes are typically used for mission critical applications, such as transaction processing. • A server is any computer on a network that makes access to files, printing, communications, and other services available to users of the network. Servers are used to provide services to users within large organizations or to Web users. Servers are optimized for access by many concurrent users and therefore have more advanced microprocessors, more memory, a larger cache, and more disk storage than single-user computers. • Workstations, designed for medical, engineering, architectural, or animation and graphics design uses, are optimized for visualization and rendering of three-dimensional models, and typically have fast processors, large memory, and advanced video cards. • Personal computers (PCs) are used for personal computing and small business computing. In addition, portable computers—notebook computers, netbooks, tablets, and smartphones—have increasingly become part of an organization's information systems infrastructure.

100) What is the digital divide? Identify its challenges.

The gap between those individuals in our societies who are computer literate and have access to information resources like the Internet and those who do not is referred to as the digital divide. The digital divide is one of the major ethical challenges facing society today when you consider the strong linkage between computer literacy and a person's ability to compete in the information age. The digital divide in America is rapidly shrinking, but there are still major challenges to overcome. In particular, people in rural communities, the elderly, people with disabilities, and minorities lag behind national averages for Internet access and computer literacy. Outside the United States, the gap gets even wider and the obstacles get much more difficult to overcome, particularly in the developing countries where infrastructure and financial resources are lacking. For example, most developing countries are lacking modern informational resources such as affordable Internet access or efficient electronic payment methods like credit cards.

97) Discuss the guidelines given by the Computer Ethics Institute regarding ethical use of computers.

The guidelines prohibit the following: -Using a computer to harm others -Interfering with other people's computer work -Snooping in other people's files -Using a computer to steal -Using a computer to bear false witness -Copying or using proprietary software without paying for it -Using other people's computer resources without authorization or compensation -Appropriating other people's intellectual output In addition, the guidelines recommend the following: -Thinking about social consequences of programs you write and systems you design -Using a computer in ways that show consideration and respect for others

81) Describe the technical, business, and systems competencies that IS personnel should possess

The technical competency area includes knowledge and skills in hardware, software, networking, and security. In a sense, this is the "nuts and bolts" of information systems. This is not to say that the IS professional must be a high-level technical expert in these areas. On the contrary, the IS professional must know just enough about these areas to understand how they work and how they can and should be applied. Typically, the IS professional manages or directs those who have deeper, more detailed technical knowledge. The technical area of competency is the most difficult to maintain because of the rapid pace of technological innovation in the digital world. The business competency area is one that sets the IS professional apart from others who have only technical knowledge and skills. It is absolutely vital for IS professionals to understand the technical areas and the nature of the business as well. IS professionals must also be able to understand and manage people and projects, not just the technology. These business skills propel IS professionals into project management and, ultimately, high-paying middle- and upper-level management positions. Systems competency is another area that sets the IS professional apart from others with only technical knowledge and skills. Those who understand how to build and integrate systems and how to solve problems will ultimately manage large, complex systems projects as well as manage those in the firm who have only technical knowledge and skills.

95) Discuss three new ways to think about investments in disruptive innovations as suggested by the e-business innovation cycle.

The three new ways to think about investments in disruptive innovations as suggested by the e-business innovation cycle are: 1. Put Technology Ahead of Strategy. This approach says that technology is so important to strategy and to success that you have to begin with technology. Given how important technology is today and how fast it changes, if you start with a strategy and then try to retrofit technology into your aging strategy, you are doomed. This approach argues that you begin by understanding technology and develop a strategy from there. 2. Put Technology Ahead of Marketing. The second way that this approach turns conventional wisdom on its head is that, like strategy, marketing also takes a backseat to the technology. A very traditional marketing-oriented approach would be to go first to your customers and find out from them what their needs are and what you ought to be doing with technology. The trouble with this approach is that, given the rapid evolution of technology, your customers are not likely to know about new technologies and their capabilities. They are the last place you ought to be looking for ideas about new technologies and their impact on your business. If they know about the new technology, then chances are your competitors already do too, meaning that this technology is not the one to rest your competitive advantage on. 3. Innovation Is Continuous. The third way that this approach is interesting—and potentially troubling—is that the process has to be ongoing. The Emerging Technologies group is constantly on the lookout for the "next new thing" that will revolutionize the business. The rate of information technology evolution is not likely to slow down, and innovative organizations truly cannot—and do not—ever rest.

93) Explain the organizational requirements for innovation

There are three types of organizational requirements for innovation: 1. Process requirements—To deploy innovative information systems well, people in the organization must be willing to do whatever they can to bypass and eliminate internal bureaucracy, set aside political squabbles, and pull together for the common good. 2. Resource requirements—Organizations deploying innovative information systems must also have the human capital necessary to deploy the new systems. The organization must have enough employees available with the proper systems knowledge, skills, time, and other resources to deploy these systems. Alternatively, the organization must have resources and able systems partners available to outsource the development of such systems if necessary. 3. Risk tolerance requirements—The last characteristic of an organization ready for the deployment of innovative information systems is that its members must have the appropriate tolerance for risk and uncertainty as well as the willingness to deploy and use new systems that may not be as proven and pervasive as more traditional technologies. If people within the organization desire low risk in their use of information systems, then gambling on cutting-edge systems will probably not be desirable or tolerable for them.

102) Discuss a few steps taken to maintain one's privacy when shopping online.

To make sure one's online shopping experience is a good one, a customer can take a few additional steps to maintain his privacy: 1. Choose Web Sites That Are Monitored by Independent Organizations — Several independent organizations monitor the privacy and business practices of Web sites (e.g., www.truste.com). 2. Avoid Having "Cookies" Left on the Machine — Many commercial Web sites leave cookies on the user's machine so that the owner of the site can monitor where the user goes and what he does on the site. To enhance one's privacy, a user should carefully manage his browser's cookie settings or get special "cookie management" software. 3. Visit Sites Anonymously — There are ways to visit Web sites anonymously. Using services provided by companies such as Anonymizer (www.anonymizer.com), one has a high degree of privacy from marketers, identity thieves, or even coworkers when surfing the Web. 4. Use Caution When Requesting Confirmation E-Mail — When one buys products online, many companies will send him a confirming e-mail message to let him know that the order was received correctly. A good strategy is to have a separate e-mail account, such as one that is available for viewing via a Web browser that one uses when making online purchases. 5. Beware What You Post or Say Online — As an old adage goes, "the Internet never forgets"; anything from status updates to Twitter messages to blog posts can be stored forever, and most information remains somewhere on the Web, even after the original page has long been taken down. It is safe to say that probably almost everybody engages in some regrettable activities at some point in time. Yet, having such activities appear on the Web can be devastating for one's career

82) Briefly describe transaction processing systems

Transaction processing systems (TPS) are used by a broad range of organizations to not only more efficiently process customer transactions, but also generate a tremendous amount of data that can be used by the organization to learn about customers or ever-changing product trends. Your local grocery store uses a TPS at the checkout that scans bar codes on products; as this occurs, many stores will print discount coupons on the backs of receipts for products related to current purchases. Every hour, online retailer Amazon.com's Web site processes thousands of transactions from around the world. This massive amount of data is fed into large data warehouses and is then analyzed to provide purchase recommendations to future customers. In addition, TPS data are sorted and organized to support a broad range of managerial decision making using a variety of systems; the most common of these is generally referred to as a management information system. TPS data also provide input into a variety of information systems within organizations, including decision support systems, intelligent systems, data mining and visualization systems, knowledge management systems, social software, geographic information systems, and functional area information systems.

80) Define data—the most basic element of an information system. Give an example

Unformatted data, or simply data, are raw symbols, such as words and numbers. Data have no meaning in and of themselves, and are of little value until processed. For example, if a person was asked what 465889727 meant or stood for, he or she would be unable to say. However, if the same data was presented as 465-88-9727 and the person was told it was located in a certain database, in John Doe's record, in a field labeled "SSN," he or she might rightly surmise that the number was actually the Social Security number of someone named John Doe

99) With respect to online privacy, list the widely accepted fair information practice principles outlined by the U.S. Federal Trade Commission which must be followed by businesses operating online.

When surveyed about concerns related to Internet use, most consumers list issues of information privacy as a top concern. As a result, governments have pressured businesses to post their privacy policies on their Web sites. As outlined in the U.S. Federal Trade Commission "Fair Information Practice Principles" widely accepted fair information practices include: 1. Notice/Awareness — Providing information about what data are gathered, what the data are used for, who will have access to the data, whether provision of the data is required or voluntary, and how confidentiality will be ensured. Such information is typically contained in data privacy statements on a Web site. 2. Choice/Consent — Providing options about what will be done with the data (e.g., subscription to mailing lists after a purchase). Typically, consumers are given a choice to opt-in (i.e., signal agreement to the collection/further use of the data, e.g., by checking a box) or optout (i.e., signal that data cannot be collected/used in other ways). 3. Access/Participation — Providing customers with means to access data collected about them, check for accuracy, and request correction of inaccuracies. 4. Integrity/Security — Ensuring integrity of the data (e.g., by using only reputable sources of data), as well as implementing safeguards against unauthorized access, disclosure, or destruction of data. 5. Enforcement/Redress — Providing means to enforce these practices, and/or for customers to receive remedies, for example, through self-regulation or appropriate laws and regulations.

74) Briefly explain the history of computing

When the Zuse Z1 Computer (a mechanical computer using program punch cards) was introduced in 1936, almost all business and government information systems consisted of file folders, filing cabinets, and document repositories. Huge rooms were dedicated to the storage of these records. Information was often difficult to find, and corporate knowledge and history were difficult to maintain. Only certain employees knew specific information. When these employees left the firm, so did all their knowledge about the organization. The computer provided the solution to the information storage and retrieval problems facing organizations up to the 1940s. Shifts in computing eras were facilitated by fundamental changes in the way computing technologies worked. Each of these fundamental changes is referred to as a distinct generation of computing


संबंधित स्टडी सेट्स

Databases 2 | CS 3306 | All questions: Self-Quizzes, Graded Quizzes, and Review Quizzes

View Set

Chapter 1 SmartBook - Introduction to HR

View Set

Psych Sex and Relationships mid-term

View Set

1120- Practice Questions- Exam 1

View Set

NU471 Week 5 EAQ #4 Evolve Elsevier: Disaster Planning - Mastery Level Target: Level 3

View Set

The Hound of the Baskervilles - Le Chien des Baskerville (A.C.Doyle)

View Set

Chapter 5: Business-Level Strategy: Creating and Sustaining Competitive Advantages

View Set

Cognitive Psychology Chapter 1, 2, 3, 4

View Set

Shock, Sepsis, and Multiple Organ Dysfunction Syndrome (Iggy ch. 37 & Urden ch. 34)

View Set