MIS Final Exam

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Moore's Law applies to all types of technology, including hard drives and fiber optic cable transmission speeds

false

cluster computing uses special software to enable several homogeneous or heterogeneous computers collectively to solve computing tasks

false

The data required for the following case would be primary data: I looked up the covid positive case on Baylor's website to decide if I want to go to the football game. True False

2

The managerial definition of Moore's Law suggests that the cost of chips doubles every eighteen months. True False

2

The shift from atoms to bits does not stand to impact content creators, middlemen, and retailers. True False

2

To create the below dashboard where the three sheets can interact with each other, you need to just drag the sheets to the dashboard without doing anything else. True False

2

What differentiates microcontrollers from general-purpose computers? None of the above Microcontrollers have no operating system Microcontrollers are faster than general-purpose computers. Microcontrollers have no processor, memory, or input/output.

2

Which of the following represents one of the primary components of the value chain? 1.Human resource management 2. Outbound logistics 3. Research and development 4. Firm infrastructure 5. Procurement

2

Zara saves money by simplifying pricing. An item sold in Bangkok is likely to cost the same as a similar item sold in Barcelona. True False

2

_____ refers to a precise set of instructions that tell the computer hardware what to do. A mnemonic Software An input device An output device Desktop

2

One contributor to the ease with which young entrepreneurs can succeed is a low-cost distribution to massive markets worldwide. This is enabled by: App stores Sproxil Legacy systems Esoko and M-Pesa

1

"AU" is an online multiplayer social deduction game developed and published by American game studio B. As part of their strategy, B asks gamers to make YouTube videos while playing this game. This strategy has attracted several individuals to start playing this game. Moreover, more game programmers are now interested in being part of this company's development team because of the increased number of gamers who have started playing the AU. Based on the scenario mentioned above, what powerful resource does studio B incorporates? Network effects Patent Distribution channels Switching costs

1

-------- is usually targeted by nature where the emails are exclusively designed to target any exact user: Spear phishing Whaling Business Email Compromise Vishing

1

A bank customer receives a message, ostensibly from the bank's website, asking her to provide her login information. Assuming the message is intended to defraud the customer, what type of infiltration technique is being used here? Phishing Virus infections Spyware Social engineering Malware

1

After importing a Texas election excel data file into Tableau, there are some missing counties on the map and there is a notification on the bottom right saying "99 unknown". The reason for this error message is that some counties in Texas have the same name as some counties in other states, and Tableau is not able to process these ambiguous counties. true False

1

Cinematch develops a map of user ratings and steers users toward titles preferred by people with tastes that are most like theirs. True False

1

Consumers buying commodities are highly ------- since they have so many similar choices. price-focused loyal quality-conscious brand-driven technologically discriminating

1

Dumpster diving refers to physically trawling through trash to mine any valuable data or insights that can be stolen or used in a security attack. True False

1

Factors such as weather, natural disaster, terrorism, labor strife, or political unrest can shut down a firm's operations. Which of the following is one of the measures taken by firms to hedge such risks? Spreading productions facilities across the globe. Sourcing raw materials from countries with low labor costs. Diverting marketing and advertising budgets to accommodate greater production. Requesting government intervention in the form of subsidies or nationalization. Driving up profitability by increasing prices of market goods.

1

Firms are increasingly shifting spending from the Web to other media such as print, radio, and television as these are often easier to track and analyze. False True

1

In Tableau, you need to create both "parameter" and "calculated field" to generate a Value Chooser with different values in the dropdown menu for people to choose (e.g., the Value Chooser shown below). True False

1

Netflix uses data to create tailored audience promotions. True False

1

The "Salesforce" software company is an example of ............ enterprise software. CRM BI Database Management Systems SCM

1

The average time for a Zara concept to go from idea to appearance in store is fifteen days. Zara's success is due to the combination of vertical integration and technology-orchestrated coordination of supplies. Based on the scenario above, what powerful resource contributes to Zara's success? Value chain Brand Differentiation Network effects

1

The essential difference between Machine Learning and Deep Learning is that Deep Learning uses Neural Networks, which do not need human intervention and effort. True False

1

The third wave of computing was characterized by the introduction of _____. personal computers minicomputers mainframe computers laptops Internet computing

1

Which of the following functions is likely to be performed by enterprise software? Inventory tracking Internet browsing Spreadsheet accounting Word processing Making PowerPoint presentations

1

Which of the following is one of the challenges Netflix faces in the transition to streaming ? Content acquisition costs Using data collected from customer behavior on Netflix's website Determining clusters of movies Capturing the Long Tail

1

Which of the following is true of the difference between operating systems and application software? 1 Operating systems control the hardware, while application software performs the work that users and firms are directly interested in accomplishing 2. Operating systems are software packages offered by a third party, while application software contains programs that are designed in-house 3. Operating systems support tasks performed by a single user, while application software supports tasks performed by multiple users. 4. Operating systems control the hardware elements visible to the human eye, while application software controls the hardware elements invisible to the human eye.

1

Which of the statements explains why many AI systems are biased nowadays? The biases in data The impact of politics The discrepancy in algorithm Humans' mistakes when perform

1

_____ are the super tiny on-off switches in a chip that work collectively to calculate or store things in memory. 1. Transistors 2.Multicore processors 3. Inductors 4. Conductors Single-core processors

1

_____ refers to a software package that integrates the many functions of a business, such as accounting, finance, inventory management, and human resources. Enterprise resource planning Database management system Desktop software Supply chain management Customer relationship management

1

all of the following are phishing techniques, except for: 1. Triggering 2. spear phishing 3. whaling 4. clone phsining

1

define and list SDLC Phases

1. Planning 2. Analysis 3. Design 4. Development 5. Testing 6. Implementation 7. Maintenance process of developing a new software/technological

A black hat hacker looks for weaknesses in security mechanisms, with a view to help plug the holes that might be exploited by cyber-criminals. True False

2

A given company produces many key parts in-house, from the battery packs to the slick touch-screen control panels. The process belongs to which part of the value chain? Service Inbound logistics Marketing and sales Outbound logistics

2

According to an independent study, Zara books some 85 percent of its products at full price compared to the industry average markdowns ratio of 50 percent. This is made possible by: leveraging contract manufacturers to produce only staple items with longer shelf-lives, which account for one-eighth of dollar volume. the practice of having limited production runs of its designs. coordinating the outbound shipments of all Inditex brands with return legs loaded with return materials and half-finished items. applying data analytics to purchase trends. keeping a major part of the production processes under direct proprietary control.

2

An online service provider provides its users with hosted computers, an operating system, and a database management system (DBMS). This allows customers to add their own applications to the hosted services. Which of the following cloud-based offerings is being provided to the users? SaaS PaaS IaaS

2

If a computer system can be equated to a layered cake, which of the following combinations represents the computer system in the bottom-to-top order? 1. User, application, hardware, operating system 2. Hardware, operating system, application, user 3. Operating system, hardware, user, application 4. Application, operating system, hardware, user 5. User, operating system, hardware, application

2

In determining the number of classes in a frequency distribution, we use the following rule: 2^k >=n. In this equation, n is the maximum value in this dataset. True False

2

Management Information Systems (MIS) is about programming and coding. true false

2

Microsoft's Xbox operating system provides Xbox programmers with a set of common standards to use to access controllers, the Kinect motion sensor, play sounds, draw graphics, save files, and more. With out this, games would: Be more reliable Cost more Look same Not be restricted to just Microsoft's platforms Be a lot easier to write

2

Price elasticity refers to the: numerical measure of the: 1. responsiveness of the supply of a product to a change in its production cost. 2. rate at which demand for a product or service fluctuates with price change. 3. rate at which product prices vary in response to changes in customer demand. 4. change in the demand for a good in response to a change in income. range of production costs that change as a direct function of the availability of raw materials.

2

Tableau can import Excel files and Spatial files only. True False

2

Tech firms are among the best performing firms in the world. According to the chapter, which firm is the most valuable firm in the United States, and has also posted some of the most profitable quarters of any business in any industry. Amazon Apple Google IBM

2

Technology experts in the area of ................. specialize in technology for competitive advantage. Database design Strategy Process design Hardware User-interface design

2

which of the following businesses case explains "cross-side effect": 1. the more gamer on the xbox platform, the greater the fun when playing the game 2. more powerful window os lead to more windows user growth 3. more visa cardholders lead to more potential customers for merchants 4. the more people who are creating and sharing images using PDF platform, the greater the benefite people get from using the same platform.

2 and 3

Cloud vendors that are hosting hardware, operating system, database, and other software, which clients then can use to build their own application, are said to be providing? Service legal agreement Service oriented architecture PaaS IaaS SaaS

3

Computer hardware refers to: 1. handheld computing devices meant largely for mobile use outside an office setting. 2. the mechanism through which users interact with a computer. 3. the physical components of information technology. 4. a precise set of instructions that orchestrate the functioning of the computer. 5. a program that fulfills the requests of a client.

3

Due to limited productions runs, Zara's customers: create a greater opportunity for increased markdowns and write-offs. tend to delay their shopping until the products go on sale. visit the stores more often. buy products at discounted rates after a few weeks.

3

How does Cinematch offer Netflix additional operational advantages for the DVD-by-mail business? Cinematch offers alternate recommendations of movies based on critical acclaim and box office performance. Netflix leases the Cinematch collaborative filtering software to smaller firms at a fee, withholding the valuable user ratings. Cinematch is linked to warehouses and recommends movies that are likely to be in stock. Cinematch is a source of additional revenue to Netflix as a marketing tool for recommending newly-released movies.

3

If a new entrant hopes to attract customers from an established incumbent, the new entrant must ensure that the value they offer exceeds the incumbents' value in addition to any perceived scale advantages advertising expenses switching costs brand benefits market depreciation

3

Netflix offered its subscribers a selection of over one hundred thousand DVD-by-mail titles, while other video rental firms can only offer as much as three thousand. This presents a significant ------ for Netflix over its rivals. studio preference variable cost scale advantage marginal cost price advantage

3

What are software development methodologies? 1. An approach to organizing and managing agile projects that breaks deliverables into "sprints." 2. Developing work continually and iteratively, with a goal of more frequent product rollouts and constant improvement across smaller components of the larger project. 3. Methods to divide tasks related to software creation and deployment up into tasks targeted at building better products with stronger product management guidelines and techniques. 4. An expansion of the scope of a project.

3

What is a phishing attack called when it is designed to look like an email from a user's superior within the organization?: Snowshoeing Whaling BEC Clone Phishing

3

Which of the following factors is responsible for enabling the advance of Moore's Law? 1. The availability of better cooling technologies ensures chips can continue growing smaller and more power efficient. 2. Constant interaction among three forces - size, heat, and power - makes Moore's Law practical and ensures that it will endure for decades to come. 3. The distance between pathways inside silicon chips gets smaller with each successive generation. 4. With the exponential growth in information technology-enabled businesses, the demand for computers makes Moore's Law possible. 5. Silicon is commonly available in hte form of sand or silicon dioxide, which helps keep the costs of chip production low.

3

Which of the following is not an example of Open Source Software? Linux WordPress Stata R studio Python

3

Which of the following statements regarding cloud computing is true? 1. Cloud computing has shifted power towards venture firms in those industries that has previously needed little startup capital. 2. The shift to cloud computing does not alter the margin structure for many in the computing industry. 3. Cloud computing has led to decreased hardware and software sales at many firms, while increasing service expenses. 4. Cloud computing has raised the barriers for entry to new entrants to the information technology markets.

3

Zara is susceptible to any disruption in northern Spain because: 1. Zara's products are sold at much lower costs around the world than in Spain, and this harms profitability. 2. it conducts its trade operations based on the American dollar rather than the stronger euro 3. it moves all of its deliveries through just two locations, both in Spain. 4. most of Zara's products are sold in markets outside Spain and Europe. 5. Zara's production facilities in Asia and Central America are threatening employment in Spain.

3

Zara's IT expenditure is low by fashion industry standards and is also highly effective. Which of the following makes this possible? Utilizing the money spent on IT infrastructure to improve the IT skills of its employees through training programs. Outsourcing IT management to third-party firms which provide IT services at lower costs. argeting technology investment at points in the value chain where it has the most significant impact. Using the best and most expensive software and hardware in the market, as it lowers any maintenance costs later. Investing IT funding in improving the infrastructure and cutting down employee overhead costs.

3

Zara's production costs could rise at higher rates than its competitors because many of the firm's costs are tied to the ------. franc yen euro pound dollar

3

_____ refers to applications installed on a personal computer, typically to support tasks performed by a single user. Enterprise software Software as a service Desktop software Server program Database management program

3

what should employees do if they suspect a phishing attempt? 1. forward the email to a friend or colleague to ask them if they can check the link out first 2. click on the link anyway and see where it takes you 3. double check the email ID and the content then contact their supervisor or the IT department to confirm its authenticity 4. interact with the scammer directly by confronting them and getting down to the bottom of

3

------- refers to competitors watching a pioneer's efforts and learning from their successes and missteps. Further, these competitors enter the market quickly with a comparable or superior product at a lower cost. Strategic positioning Operational effectiveness Sustainable competitive advantage Fast follower strategy

4

........ is a column in a database table. Foreign key Record Primary key Field

4

A(n) ------- is someone who uncovers computer weaknesses and reveals them to manufacturers or system owners without exploiting these vulnerabilities. corporate spy hacktivist ethical cyber criminal white hat hacker data harvester

4

Brands are built through ------. excessive advertising customer profiling customer awareness customer experience

4

Computer systems are often infected with malware by means of exploits that sneak in masquerading as something they are not. These exploits are called: worms viruses honeypots trojans rootkits

4

Strategic positioning is fundamentally about being ------. superior efficient profitable different scalable

4

The long tail is a phenomenon whereby firms can make money by: sell the same product to virtually every customer the Internet can reach. selling the same product at different prices with only minor tweaks in their design. reselling multiple versions of a single product under different brand names. offering a selection of products or services vastly greater than conventional retailers. leveraging customers to promote their products or services.

4

Which of the following best describes this data? person age sex year income 1 27 1 2015 1600 2 28 1 2016 1500 Time-series data Cross-sectional data Secondary data Panel data

4

Which of the following is an example of application software? Linux Android Mac OS MS Word

4

Which of the following is not a reason Microsoft is experimenting with underwater data? Energy efficiency Cooling All of these are reasons for experimenting Ease of maintenance

4

Which of the following is true? 2. Waterfall development has been fully replaced by agile development 1. Waterfall development encourages change 3. None of these 4. Both waterfall and agile development approaches use the same SDLC phases

4

Which of the following statements is a valid reason for chip manufacturers to carry minimal inventory? 1. Chip manufacturers maintain low inventories to hedge the move of semiconductor technology away from silicon-based chips. 2. The potential physical and electronic damage to silicon chips if left unused for extended periods of time deters manufacturers from maintaining higher inventories. 3.Chip manufacturers leverage the higher costs of chip-based products to their advantage by keeping supply low compared to demand. 4. Products with a significant chip-based component rapidly fall in value and can cause huge losses when overproduced. 5. Rising transportation costs greatly increase the costs of manufacturing and make moving inventory between locations highly expensive.

4

Who are the targets of whaling phishing attacks? IT professionals Intro-level employees Middle management Executives

4

____ provide the standards, syntax, statements, and instructions for writing computer software. Database management systems Operating systems Application servers Programming languages Platforms

4

which of the following refers to a variant of utility computing where vendors provide storage and servers and the user develops its own software: 1. SaaS 2. Service Level agreement 3. Paas 4. Iaas

4

which of the following statements is true : 1. the core task of computer scientist is to deliver information systems to meet defined requirements 2. the core skill needed for MIS is logic/procedure 3. the generic job titles for computer scientists are system analyst and designer 4. the focus of MIS is an organization

4

Businesses benefit from economies of scale when the cost of an investment can be: used to build a brand image for products through advertising. diverted to implementing technology upgrades in the business model. leveraged to recruit consumers to promote a product or service used in serving a niche and loyal customer base. spread across increasing units of production.

5

Operational effectiveness refers to: 1. matching the benefits of a successful positions while maintaining an existing position 2. the implementation of technology in a business context 3. performing different tasks or the same tasks in different ways. 4, the number of times inventory is sold or used during the course of a year 5, performing the same tasks better than rivals perform them.

5

User ratings act as ------ for Netflix's customers. barriers to entry marginal costs variable costs fixed costs switching costs

5

Which of the following is not one of the powerful resources Netflix benefits from? Switching costs Scale advantage Data assets Brand Network effects

5

Which of the following represents one of the primary components of the value chain? Human resource management Firm infrastructure Procurement Research and development Outbound logistics

5

Zara store staff gain as much as three hours in prime selling time to assist customers at stores. Which of Zara's practices is instrumental in these time savings? Collecting data from customers on what kind of clothes to stock in stores, using PDAs. Three hundred member-string design teams churning out up to thirty thousand items a year. Tweaking shipping models through Air-France-KLM Cargo to coordinate outbound shipments with return legs loaded with raw materials. Concepts going from ideas to appearances in stores in fifteen days in an average Distribution centers ironing clothes in advance and packing them on hangers, with security and price tags affixed.

5

what is the difference between privacy and security

_____ is customer sharing their personal information assuming it's protected. some examples would include sharing a social security number , your home address, your bank account numbers, etc. ____ is protecting that data through mitigating risks. Duo authentication would be an example of protecting a customer's information. another example would be to change your password every 6 months or so

list two jobs that MIS graduates go into

business analyst, IT consultant, network administrator

amount of lead in water samples alert customers with lead leavel exceeding safe drinking water standards combine lead level, customer, and drinking water standards data to isolate violations is subjective is unprocessed is processed is processed and understood

data knowledge to action information knowledge data information knowledge

Define the Data Warehouse concept in Database Management Systems

data warehouses have a colleciton of all information and data in one place. With this, the DMS can locate any information needed regarding customers ID'S, items, etc, and store it to use it in the future. This shows a pattern of what that person buys so they can suggest similar things, and it also keeps track of addresses and phone nubmers to help out with that in the future.

the introduction of ______ characterized as the seventh wave of computing

edge computing

What is the Desktop software and how is it different from Enterprise software?

enterprise software are applications that address the needs of multiple users throughout an organization or work group

Define Hardware as a Service (HaaS) and explain its types.

hardware as a service is when the firm makes its own software but wants to pay another organization to run it and monitor it on their platform PaaS - where the client can add their own applicatoin to the hosted services IaaS - where the customer can choose from a variety of different services that the organization offers

what kind of impact has technology had in the area of human resources?

human resources are when people come to get help with either a product or a service. technology has helped in the way that they can sort the people and their information into a database so they can have a reference if that person ever need help again. For example, LinkedIn uses technology to scan different resumes to find which person would be beneficial for the job and technology can also send that same resume out to different employers who might fit the job you want

two risks as software as a service

one of them is being too reliable on the network. In this case, the software can slow down depending on how good the internet connection is one of them is making the customer update the applications whenever they get in there, causing it to buffer and having non-professional updating in there to make it not run as good.

Explain Open Source Software (OSS). How do the developers of OSS generate revenue?

open source software is free for the customer where they can have access to information. people are able to change the information on there and provide extra info if needed. The developers generate revenue by providing services and assistane to whoever needs it.

explain the application of technology in marketing using an example

people would market by newspaper ads or on billboards. technology has taken over everything so there is advertisement on apps, google searches. The use of technology has increased the probability that a consumer will see your product/ service through marketing on their iphone, computer, tv.

which are the four kinds of network effects

positive same-side effect, negative same-side, positive cross side, negative cross side

Uber and Airbnb are larger than any taxi firm or hotel chain on the planet. In what important ways does the infrastructure used by these firms to deliver services differ from more traditional rivals?

the way you find the best uber/house you want to stay at is through the app. The app will compare prices and locations to accommodate you best. The payment mthod is also different in a sense that you don't have a huge waiting time whenever you book something. You can put your card information in and use it every time after that. You can also get up-to-date information on your service.

What is Moore's Law?

•Every year computation of power doubles, and this doubling leads to exponential growth. This allows for the technology to be cheaper because there are better things out there that are being developed


Set pelajaran terkait

Judicial Process and Behavior Midterm

View Set

Psychology Chapter 3: Development

View Set

Marketing Management Chapter Fourteen

View Set

Preguntas (questions) y respuestas (answers) #1 español-inglés (Spanish-English)

View Set