omis 351

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

If it cost $1 to fix an error in the Planning (1st) step of the SDLC, how much would that error cost in the Implementation (6th) step? $100,000 $10,000 $1,000 $50,000 None of these.

$100,000

How many BYTES can a 1 GHz 32 bit chip process per second? (1 Million) * 32 * 8 (1 Billion) * 32 (1 Billion) * 32 / 8 (1 Billion) * 32 * 8 None of these.

(1 Billion) * 32 / 8

Which of the following is essential to data mining? A computer program that automates the process Multiple spreadsheets in different departments A hierarchical organization structure Microsoft Access Customer feedback

A computer program that automates the process

_____ refers to a precise set of instructions that tell the computer hardware what to do. A mnemonic An input device An output device Software Desktop

Software

How many BITS in the ASCII expression "RFID"? 4 8 16 32 None of these.

32

A _____ is a system that provides rewards and usage incentives, typically in exchange for a method that provides a more detailed tracking and recording of consumer activity. sugging report canned report dashboard legacy system loyalty program

loyalty program

Which of the following is FALSE? Data mining is done mostly by the computer (automatically). A data mart is smaller than a data warehouse. SQL is a computer language to create queries (ask questions about the data). A data warehouse would probably be stored on Access in a Fortune 500 company. Data warehouses support OLAP, mining, and data marts.

A data warehouse would probably be stored on Access in a Fortune 500 company.

Which of the following is true of SAP (best answer)? SAP, being a Desktop Application, stores all system data on the user's local machine. SAP is optimized for the healthcare industry but can also be used in the manufacturing industry. SAP saves data as soon as it is entered into the user interface, eliminating input problems. A database sits at the center of a company's SAP system. B & D are both true

A database sits at the center of a company's SAP system.

Which of the following was NOT an item you needed to include on your web page for VC1? A picture of yourself Your resume A page showing you know how to calculate a grade in MS Excel. A page showing a corporate example of matching a technology solution to a business problem. A brief Career Statement.

A page showing a corporate example of matching a technology solution to a business problem.

What is a business process? A type of CPU used in Finance "It involves describing the desired features and operations of the system including screen layouts, business rules, process diagrams, pseudo code, and other documentation" A heritable foundation of economic growth strategy A standardized set of activities that accomplish a specific task, such as processing a customer's order When a company like Apple releases the latest generation smartphone

A standardized set of activities that accomplish a specific task, such as processing a customer's order

What is the correct order, from most sophisticated (most useful to businesses) to least sophisticated? BI, data, information, query result BI, information, query result, data data, information, query result, BI BI, query result, information, data None of these.

BI, query result, information, data

From an order of magnitude standpoint, about what percentage of college students have a Facebook account? Basically 0% About 10% About half (50%) About 75-90% Basically all (100%)

About 75-90%

Which concepts does the Zara case illustrate (choose best answer)? Advertising leads to brand. Rare products are often attractive to customers. A value chain which is hard to imitate. Tech can help co.s learn what customers want. All of B, C and D (but not A).

All of B, C and D (but not A).

Which area of corporate law is connected to technology? Privacy Patents Piracy Intellectual property All of the above

All of the above

SAP (pick the BEST SINGLE answer)...: makes ERP software. makes CRM software. is the World's Largest Business Software Company is used by over 50% of the Forbes 500 companies. All of the these.

All of the these.

What does a fourth generation (4GL... highest level) software language do? Make the computer's internal operations more streamlined and efficient. Solves all business problems. Allows the user to specify the desired outcome, and the computer handles the rest (writes/produces the program). Nothing... they have yet to be developed. None of these.

Allows the user to specify the desired outcome, and the computer handles the rest (writes/produces the program).

If Dr. Downing went onto RateMyProfessor.com and rated himself as "Hot", he would be guilty of: SnapChating. first-degree felony punishable by over 30 years in prison. Astroturfing Falacious blogging. Orkuting

Astroturfing

Which sort of initiative would be more likely to yield more money to a company? An effective change... Information Age change An efficient change... Computer Age change An efficient change... Information Age change An effective change... Computer Age change None of these.

An effective change... Information Age change

____ is a class of computer software that seeks to reproduce or mimic human thought, decision making, or brain functions. Biometrics Artificial intelligence Android Legacy software Intranet

Artificial intelligence

Which of the following is OMIS 351 most likely to prepare you to do with regard to Electronic Medical Records (EMR)? Be able to program an EMR scanning database for use at major hospitals Be able to suggest and discuss technology solution options for EMR implementations Be a C-level technology executive at a mid-tier hospital or medical clinic Implement an ECR scanner to take medical information automatically from patients None of these.

Be able to suggest and discuss technology solution options for EMR implementations

Why would worker shifts be more efficient at FreshDirect than traditional grocery stores? Because traditional grocery stores suffer from the Fast Follower Problem. Because traditional grocery stores suffer from Operational Effectiveness. Because FreshDirect employees do not have to commute into Manhattan. Because FreshDirect can aggregate customers' orders and smooth out the demand for labor. None of these.

Because FreshDirect can aggregate customers' orders and smooth out the demand for labor.

Why is Unit 2 (this unit, "Strategic Frameworks") important? Pick the most important reason: Because I need to be able to use technology to solve business problems. Because I need to be able to determine whether a technology solution to a business problem is beneficial for my organization. Because I need to understand technologies before I can appropriately match them to business problems. Because I need to understand Business Intelligence. None of these.

Because I need to be able to determine whether a technology solution to a business problem is beneficial for my organization.

Why is knowing about data, information, and information management important to all Business majors? It's not Because all majors need to be Access experts Because all majors will need to deal with information Because the management of information represents one of the most difficult, if not impossible, challenges any major will face. None of these.

Because all majors will need to deal with information

Why should you care about bits and bytes? Because managing businesses, which all contain technology, is generally easier and more effective the more I understand about technology and the better context I have. I do not need to care. Because I need to be a technical programmer to have any chance to succeed. Vertical niches Because progressing as an analyst, regardless of my major, will require programming in a low-level language at some point and I need to be ready.

Because managing businesses, which all contain technology, is generally easier and more effective the more I understand about technology and the better context I have.

Why is our final course Unit, Unit 7, important (pick the single best answer)? Because we need Business Intelligence Because we've got these wonderful devices that process 1's and 0's quickly and remember them almost perfectly, and we need to understand how they get connected. Because we need to understand how to match technology solutions to business problems. Because obtaining and managing information, and profiting from it, represents a large part of the future (and present) of our economy. Because Web 2.0 is exploding, users are generating content, many voices are being heard, and businesses better pay attention.

Because obtaining and managing information, and profiting from it, represents a large part of the future (and present) of our economy.

____ is the general term used to describe the massive amount of data available to today's managers. Data aggregator systems Data Mining Big Data Transaction systems Business intelligence.

Big Data

Dr. Downing has said, and many experts agree, that the most powerful force in business (and maybe life) is... Patents Network Effects. Brand. Customer Power. Scale.

Brand.

How did Dr. Downing improve the organic search results for his Kirk Herbstreit joke in fall 2012 (How would anyone improve such results)? By using Cloud Computing. By using Just-in-Time E-Commerce. By practicing Internet privacy and security legislation. By linking text like "NIU BCS Kirk Herbstreit joke" to ChuckDowning.com from webpages. By using RFID.

By linking text like "NIU BCS Kirk Herbstreit joke" to ChuckDowning.com from webpages.

Which of the following factors contributes to an ad's quality score? Number of characters in the ad Cost per Click Cost per Impression Image richness Click through Rate

Click through Rate

How difficult is it to create a report in Access (as done in VC5 and VC6)? VERY difficult - at least 15 steps Somewhat difficult - at least 7 steps Easy - Just click on the query, go to Create and click Report No more difficult than the ratio of a company's annual cost to its inventory None of these.

Easy - Just click on the query, go to Create and click Report

Advertisers pay ad partners for _______________ whenever a user responds to an ad by performing a specified activity such as signing up for a service, requesting material, or making a purchase. Interstitials Cost-per-action ads Engagement ads Pay-per-click ads Paid inclusion ads

Cost-per-action ads

Which of the four tabs in Access is used to build and "ask" questions (queries) about the data? File Create External Data Database Tools None of these.

Create

Brands are built through Customer awareness. Data assets. Excessive advertising. Customer profiling Customer experience

Customer experience

Which of the following efforts by Google is aimed at encouraging increased smartphone access worldwide? Tie-up with Facebook to offer search capabilities across social networks The five-year deal with Verizon Wireless to be its preferred search engine Collaboration with Microsoft to offer Office software over the Web Introduction of interest-based ads Giving the Android OS to mobile phone manufacturers for free

Giving the Android OS to mobile phone manufacturers for free

_____ refer to databases focused on addressing the concerns of a specific problem or business unit. Data marts Dashboards Hadoop Data aggregators Data analytics

Data marts

_____ is the process of using computers to identify hidden patterns in and to build models from large data sets. E-discovery Optimization Report canning Data mining

Data mining

The Harvard Business Review declared _______________ the "Sexiest Job of the Twenty-First Century." chief privacy officer entrepreneur Programmer Data scientist Datacentre Engineer

Data scientist

In an Access table, the _________ view is used to 1.. Add, remove or rearrange fields 2.. Define the name, the data type and other properties of each field 3.. Designate a primary key for the table. Datasheet View Report View Form View Sectional View Design View

Design View

_____ refers to applications installed on a personal computer, typically to support tasks performed by a single user. Enterprise software Server program Desktop software Software as a service Database management program

Desktop software

Dr. Downing received two of the same letters from the Northwestern Alumni Association on the same day. What is most likely the cause of this? A data analyst placed Dr. Downing in the "high income" category and the marketing plan focuses on frequently contacting these persons Dr. Downing has both undergraduate and graduate degrees from Northwestern, so he might be duplicated in the system Human error: A secretary typed "2" when choosing the number of copies to print Analytics tools revealed that Dr. Downing's donation pattern shows that he responds to repeated mailings and other "squeaky wheel" techniques None of these.

Dr. Downing has both undergraduate and graduate degrees from Northwestern, so he might be duplicated in the system

_____ refer to a promotion technique popular with social media that attempts to get consumers to interact with an ad, and then shares that action with friends. Impressions Rich media advertisements Cookies Interstitials Engagement ads

Engagement ads

_____ refers to a software package that integrates the many functions of a business, such as accounting, finance, inventory management, and human resources. Supply chain management Desktop software Customer relationship management Database management system Enterprise resource planning

Enterprise resource planning

_____ is the biggest photo-sharing/storing site on the Web, taking in around three billion photos each month. Facebook Picasa Shutterfly Flickr Photobucket

Facebook

Which of the following statements is true about Facebook? Global growth of Facebook is saturated, with most of the planet's population already having Facebook accounts. Approximately 20 percent of Facebook users reside in China. Entrepreneurs beware: Mark Zuckerberg lost most of the value in the firm he founded to the Winklevoss twins, providing evidence that entrepreneurs should have a founder with a strong legal background. Facebook has largely avoided privacy concerns by allowing posts to expire over time. Facebook is highly profitable, with a growing ad business on mobile platforms.

Facebook is highly profitable, with a growing ad business on mobile platforms.

____ is a method of querying and reporting that takes data from standard relational databases, calculates and summarizes the data, and then stores the data in a special database called a data cube. Ad hoc reporting E-discovery Data aggregation Online analytical processing Data adjacency

Online analytical processing

f a web site owner (Person A) pays about 60 cents per click to advertise on Google, what would be the best way listed below for a competitor (Person B) to hurt him (assuming that competitor was willing to engage in unethical practices)? Pay 80 cents per click for its own (Person B) ads. Use SOE and pay nothing for its own (Person B) ads. Get allies (of the competitor) (Person B) to click on the competitors (Person B) ads in high volume to indicate more interest. Advertise (Person B) on FaceBook. Get allies (of the competitor) (Person B) to click on the owner's (Person A) ads in high volume and buy nothing.

Get allies (of the competitor) (Person B) to click on the owner's (Person A) ads in high volume and buy nothing.

_____ refers to software that is free and where anyone can look at and potentially modify the code. Social software Proprietary software Licensed software Open source software Software as a service

Open source software

Which of these examples best illustrates the "Scale" lens? Using a Loyalty Card to encourage customers to return frequently ("Lock in"... reduce customer power). Amazon slightly raising prices on books knowing that you're likely to go to them first and possibly not even compare prices elsewhere. Using a web site to share inventory status with both customers and suppliers. Personal Audio suing Apple ("Play Lists"), Adam Carolla (Podcasts), and others, saying it had exclusive rights to their technical innovations. Google using its massive user base to easily introduce and achieve success with new offerings, often giving those offerings away for free.

Google using its massive user base to easily introduce and achieve success with new offerings, often giving those offerings away for free.

Why do you suppose Google is offering you 5 GB on Drive for free, free email, free web sites, etc.? Google likes me. Google wants to have more places to place more ads. Google wants to store my information so they can look at it and invade my privacy. Maybe something with Russia. None of the above.

Google wants to have more places to place more ads.

Which of the following is a source of bargaining power of buyers? Greater choice of products High switching costs Loyalty programs Network effects Unique and highly differentiated products

Greater choice of products

Which of the following strategies was followed by Amazon's founder to grow the company in the early days? He focused more on Amazon's quarterly results. He postponed profit harvesting. He reduced warehousing capacity. He built e-commerce operations only for Amazon's customers in the United States. None of these.

He postponed profit harvesting.

According to Dr. Downing, when using the Value Chain Analysis "lens" to consider competitive/strategic advantage, the main aspects companies should be examining are... How recognizable their company name is. Do they have a proxy for trust and quality? How they manage to get stuff from their suppliers (inbound logistics), run their operations, and get stuff to their customers (outbound logistics) Whether the value of their products or services go UP when more and more people purchase or use them Whether the size of their company is sufficient to protect their market space. Whether it is difficult enough for their customers to be able to choose a different product or service (leave them)

How they manage to get stuff from their suppliers (inbound logistics), run their operations, and get stuff to their customers (outbound logistics)

Why/when should you use a relational database (like Access)? If I have information in more than one spreadsheet or source and I need to tie them together to get business answers. If the file is too big for Excel. If I need to perform sophisticated mathematical calculations on the data. If I have a large amount of information on a spreadsheet and need to "slice and dice" it. distributed denial of service

If I have information in more than one spreadsheet or source and I need to tie them together to get business answers.

Which of the following is FALSE? Excel is the biggest DSS in use today. If I have many spreadsheets that need to be tied together (e.g., Customers, Orders, Products), I should use a Pivot Table. If all of my data is in one spreadsheet, I should use a Pivot Table. An EIS is basically a summary-level DSS (like a dashboard). The most common use of AI in business/society is Expert Systems.

If I have many spreadsheets that need to be tied together (e.g., Customers, Orders, Products), I should use a Pivot Table.

When Dr. Downing holds up his left hand and his right hand, and then joins them together, what point is he trying to make? Amazon and Apple are good companies. If you understand your business, and also understand possible technology solutions, you can make a "match". If people will work together, we will have a more productive technology environment in the future The ROI of process improvements in the business processes area is likely to overcome the ROI of simply using "old school" methods of doing business. None of these.

If you understand your business, and also understand possible technology solutions, you can make a "match".

Which of the following is NOT a benefit of using Excel and web pages, as done in VC1? If you want to drop the lowest value (like a Quiz) in a range, and get the average of the remaining values, use =AVERAGE(,-1) If you have one formula that needs to be used for numerous cells, a great way to accomplish that is to use auto-fill (drag the black cross in the lower-right of the cell to the new cells). If you want to show your formulas to your clients/customers/etc., choose "Show formulas", screen shot the sheet, and insert that screen shot into a web page. VLOOKUP is a useful formula to look up and return values from a pre-defined table. All of these are benefits.

If you want to drop the lowest value (like a Quiz) in a range, and get the average of the remaining values, use =AVERAGE(,-1)

If Jewel uses its Point of Sale terminals, along with a Preferred Card, at the cash register to store information about individual's purchasing habits and then make strategic decisions with this information, this is an example of: SCM Ineffective business practices. Poor business practices. Computer Age business practices. Information Age business practices.

Information Age business practices.

The _____ department in an organization not only ensures that systems get built and keep running but also take on strategic roles targeted at proposing solutions for how technology can give the firm a competitive edge: Information Systems Technical Systems Legacy Systems Computer Systems. None of these.

Information Systems

Which of the following is NOT one of Porter's Five Forces? Bargaining power of customers. Existing rivals. Threat of new entrants. Internet of Things (IoT) Bargaining power of suppliers

Internet of Things (IoT)

How are News Feeds a source of value for users on Facebook? It fosters the virality of information sharing vital to delivering value from the social graph. They are innovative and Facebook is the only social network to offer the feature. They are effective in protecting a user's personal information from others. They ensure that a single post will reach all friends and fans. They offer cross connectivity for users across several social networking sites.

It fosters the virality of information sharing vital to delivering value from the social graph.

What is crowdsourcing? It is the act of taking a job traditionally performed by a designated agent and outsourcing it to an undefined generally large group of people in the form of an open call. It is the act of moving a job from a group of ineffective employees to an efficient employee. It is the process of selling products to people in the guise of conducting marketing research. It is the act where a group of people moves from one country to another while looking out for better work opportunities. It is the movement of employees from one department to another with the aim of improving their skill sets.

It is the act of taking a job traditionally performed by a designated agent and outsourcing it to an undefined generally large group of people in the form of an open call.

Which of the following statements is true of the term "cloud"? It refers to a collection of computing resources available for access over the Internet. It refers to the phenomenon of adapting products and services for different languages and regional differences. It refers to a situation when the value of a product or service increases as the number of its users expands. It refers to a situation when others take advantage of a user or a service without providing any sort of reciprocal benefit. It refers to a closed network or a single set of services controlled by one dominant firm.

It refers to a collection of computing resources available for access over the Internet.

Which of the following statements holds true of network effects? It refers to a collection of resources available for access over the Internet. It refers to adapting products and services for different languages and regional differences. It refers to a situation when the value of a product or service increases as the number of its users expands. It refers to a situation when others take advantage of a user or a service without providing any kind of reciprocal benefit. It refers to a closed network or a single set of servi

It refers to a situation when the value of a product or service increases as the number of its users expands.

Which of the following statements holds true for the term cache? It refers to the Internet directory service that allows devices and services to be named and discoverable. It refers to the process of improving a page's organic search results. It refers to Internet content that can't be indexed by Google and other search engines. It refers to a temporary storage space used to speed computing tasks. It refers to software that traverses available Web links in an attempt to perform a given task.

It refers to a temporary storage space used to speed computing tasks.

Which of the following statements holds true for the term click fraud? It refers to a program that requires customer consent in the form of a click. It refers to a program that enrolls all customers by default, but that allows consumers to discontinue participation with the help of a click. It refers to the generation of bogus clicks, either for financial gain or to attack rivals by draining their online ad budget. It refers to a small computer program that extends the feature set or capabilities of another application. It refers to recruiting a network of users with the goal of spreading IP addresses across several systems and making a fraud effort more difficult to detect.

It refers to the generation of bogus clicks, either for financial gain or to attack rivals by draining their online ad budget.

Which of the following statements holds true for search engine optimization (SEO)? It refers to the Internet directory service that allows devices and services to be named and discoverable. It refers to the process of improving a page's organic search results. It refers to Internet content that can't be indexed by Google and other search engines. It refers to a temporary storage space used to speed computing tasks. It refers to software that traverses available Web links in an attempt to perform a given task.

It refers to the process of improving a page's organic search results.

What is a web site? It's just a computer file or files (in html) that's on a "web server", which is a computer that can "serve", or present, pages to anyone with a browser. A .pdf file which is accessible to everyone. This file can be seen in Firefox, Chrome, or Internet Explorer. A network location within a company's Intranet. Filler - not the answer None of these.

It's just a computer file or files (in html) that's on a "web server", which is a computer that can "serve", or present, pages to anyone with a browser.

__________management systems are morphing into social media technologies that accelerate the ability of firms to quickly organize and leverage teams of experts Information Knowledge Supplier Enterprise Database

Knowledge

____ is the process of creating a series of bogus Web sites, all linking back to the pages one is trying to promote. Click scam Link fraud Phishing DNS cache poisoning SQL injection

Link fraud

Which of the following terms is used as an alternative, with similar meaning, to switching costs? Lock-in Complementary benefits Exchange benefits Straddling costs Network impedance

Lock-in

What's a good example of information as an asset? Speeding up the boarding lines at American Airlines. MasterCard using your payment history to establish a credit score for you and selling it. Having the best laptop at NIU. MasterCard processing 15,000,000 credit card statements in under 2 hours. None of these.

MasterCard using your payment history to establish a credit score for you and selling it.

_____ are designed to provide rapid notification to their readership rather than detailed or in-depth comments. Microblogs Wikis Folksonomies Blogs

Microblogs

With regard to data, for you to make a large contribution to your organization, you could suggest which? Move organizational information out of spreadsheets, into a relational DBMS, and then centralize the database. Move away from paper and store everything in spreadsheets. Store all organizational information in Access (or another relational DBMS) on a top-level executive's (or someone else important) computer. Keep separate data files for all important information to provide better security. None of the above

Move organizational information out of spreadsheets, into a relational DBMS, and then centralize the database.

Which of the following factors has helped Facebook build up trust among its users? Superior technology compared to rivals Mutual and reciprocal approval of friend requests Free nature of applications available to users Low switching costs Availability of venture capital funds

Mutual and reciprocal approval of friend requests

____ is the primary technology that enables Google Wallet to make wireless payments with the wave of a phone. NFC or Near Field Communication Wi-fi IoT or Internet of things Telematics Li-Fi

NFC or Near Field Communication

As discussed in class, the guy who "invented" sliced bread actually invented: Bread Slicing Neither A nor B Both A and B None of these.

Neither A nor B

What solution has Netflix come up with to address the need to deliver content to customers' televisions? Netflix has entered into a revenue sharing agreement with Apple to produce customized set top boxes. Netflix makes custom chips for television makers so they can offer Netflix in a way that replicates Google Chromecast and Amazon FireTV. Netflix launched a self-branded hardware division to build and market its own set top boxes. Netflix has acquired Vudu, a firm that specializes in the online streaming business. Netflix provides tools to firms seeking to build Netflix access into their devices

Netflix provides tools to firms seeking to build Netflix access into their devices

Which of the following is an example of Web 1.0? Wikipedia Facebook Online Schedule for OMIS 351 WordPress Craigslist

Online Schedule for OMIS 351

For years, which of the following is the only major media category that has seen an increase in spending? Online advertising Radio jingles Television ads Print media Telemarketing

Online advertising

_____ are critical for capturing sales data, and are usually linked to inventory systems to subtract out any sold items. Point-of-sale systems Legacy systems CRM systems Server farms Data aggregators

Point-of-sale systems

Computers, without human assistance, are only better than humans at ________. Learning language and recognizing patterns. Processing 1's and 0's incredibly quickly, and remembering 1's and 0's almost perfectly. Playing chess. Turning 1's and 0's into recognizable software code. Playing Jeopardy.

Processing 1's and 0's incredibly quickly, and remembering 1's and 0's almost perfectly.

____ are third-party computers that pass traffic to and from specific addresses without revealing the address of the connected users. Routers Web crawlers Spiders Proxy servers Subnetwork masks

Proxy servers

Crowdsourcing tools and question-and-answer sites like _____ allow firms to reach out for expertise beyond their organizations. Quora MyYearbook.com MySpace Twitter Zappos

Quora

______________ refers to a technology which can (among other things) be used to "track your luggage at the airport" IPO RFID SEO SEM IPS

RFID

Which of the following is an example of volatile memory? Random-access memory Flash memory Optical disk drive Nanodrive Read-only memory

Random-access memory

Which of the following is NOT one of the Seven Lenses to Evaluate Strategic Business Options? SDLC Brand Value Chain Network Effects Porter's Five Forces

SDLC

____ is by far the most popular language for creating and manipulating databases XML HTML SQL PHP None of these.

SQL

Which of the following is one of the characteristics of using software as a service model? Longer deployment times Scalable systems Fixed operating expenses Heightened financial risk Higher maintenance costs

Scalable systems

Which of the following is a way to recognize potentially disruptive innovations Seeking the opinions of venture capitalists, research academics, and passionate internal engineering staff. Become more consumer-focused Indulge in bottom-line obsession. Increase conversation within same product groups.

Seeking the opinions of venture capitalists, research academics, and passionate internal engineering staff.

__________ refers to generating fake followers, likes, +1s, retweets, shares, or YouTube views. Social influence fraud Keyword stuffing Spamdexing Disbarring fraud None of the above

Social influence fraud

_____ refers to performing different tasks than rivals or the same tasks in a different way. Straddling Operational effectiveness Strategic positioning Vertical integration Scale advantage

Strategic positioning

Dr. Downing received the "Google Death Penalty" because he _____________. searched for too many similar terms within a timeframe that was deemed too short. Suggested, in a not-so-subtle manner, that students click on his ads, and they all did roughly at the same time. clicked on a mesothelioma lawyer ad on a search result, costing that law firm roughly $400. was not friendly to Google's senior management. None of these.

Suggested, in a not-so-subtle manner, that students click on his ads, and they all did roughly at the same time.

Which of the following statements about technology is true? Technology alone is enough to provide sustainable competitive advantage to a firm. Technology plays a marginal role in creating strategic differences. Technological improvements are not important in strengthening a firm's strategic advantages. Technological improvements can often be copied by rivals, leading to a profit-eroding arms race. Technology cannot be used by late entrants to gain a share of the industry.

Technological improvements can often be copied by rivals, leading to a profit-eroding arms race.

After completing the Sales Order (Step #2 in the SAP Document Flow Instructions Word document), what is a good way to verify you've done it (you should be able to answer this whether you chose Option 1 or Option 2 for VC3)? View the Document Flow by going to "Logistics-> Sales and Distribution -> Sales -> Order - > Display" Making sure it controls/runs the machine/computer. Send an email to the professor and ask him to check it. Making sure it controls/runs the machine/computer AND controls the flow. View the Document Flow in the Citrix (anywhereapps.niu.edu) main menu.

View the Document Flow by going to "Logistics-> Sales and Distribution -> Sales -> Order - > Display"

Technology experts in the area of _____ specialize in technology for competitive advantage. user-interface design process design strategy database design hardware

strategy

Which of these examples best illustrates the "Network Effects" lens? Amazon slightly raising prices on books knowing that you're likely to go to them first and possibly not even compare prices elsewhere. Using a web site to share inventory status with both customers and suppliers. Personal Audio suing Apple ("Play Lists"), Adam Carolla (Podcasts), and others, saying it had exclusive rights to their technical innovations. The increasing value of Dr. Downing's research conclusions, using student surveys, as his class sizes grow. MySpace getting overcome and crushed by Facebook to the point of near irrelevance.

The increasing value of Dr. Downing's research conclusions, using student surveys, as his class sizes grow.

The acronym VoIP is considered by many to be a disruptive innovation. It refers to: The technology used in internet telephony Cloud computing Semiconductor manufacturing technology DWDM None of these.

The technology used in internet telephony

Which of the following statements holds true for Wikis? Their key use is to anonymously share new ideas in an unattributed manner. Their key use is creating an effective form for online advertising, customer tracking, and service personalization. Their key use is to discover and reinforce affiliations, identify experts, message individuals or groups, and virally share media. Their key use is to poll a diverse crowd and aggregate opinions to form a forecast of an eventual outcome. Their key use is to collaborate on common tasks or to create a common knowledge base.

Their key use is to collaborate on common tasks or to create a common knowledge base.

Which of the following is NOT a good example of a way technology could improve a business process? "Disintermediate" or remove a middle person in the process by electronically connecting buyers and sellers. Allow for the process to be redesigned to become more efficient and effective. Allow for the process to be completed more quickly (with other attributes remaining constant). Use the most up-to-date smart phone technology. Allow for the process to be completed more accurately (with other attributes remaining constant).

Use the most up-to-date smart phone technology.

_____ are served by ad networks or other customer profiling firms to identify users and record behavior across multiple Web sites. Plug-ins Creatives Interstitials Third-party cookies Honeypots

Third-party cookies

What was the main point of VC3, whether you chose Option 1 or Option 2? To get you, the business leaders of tomorrow, looking at and thinking about SAP, the world's leading business software, so you are better prepared for your careers. Putting two or more lower power processor cores on a single chip. To have you understand the complexity and power of Moore's Law. To have you understand why application software is always more important than operating system software, even on a dual core processor. Connecting a combination of parallel and series-connected processors to a single larger processor to supplement its functioning.

To get you, the business leaders of tomorrow, looking at and thinking about SAP, the world's leading business software, so you are better prepared for your careers.

Which of the following is FALSE with regard to peer collaboration, production, and the Sharing Economy? Since Wordpress powers roughly 1 in 5 Internet sites, users can enjoy the advantage of the "long tail" and find content on nearly anything they want. About half of the Top 10 Internet sites are social. Twitter is one of the largest photo-sharing apps in the world. Even though Wikipedia's budget is less than $2 Million, it is one of the Top 10 visited Internet sites. Airbnb has more rooms for rent that the entire Hilton hotel chain.

Twitter is one of the largest photo-sharing apps in the world.

The term wiki refers to a(n): record of online journal entries, usually made in a reverse chronological order. link in a blog post that refers readers back to cited sources. online community that allows users to establish personal profiles and communicate with others. Web site that can be modified by permitted users, from directly within a Web browser. type of short-message blogging, often made via mobile device and designed to provide rapid notification to their readership.

Web site that can be modified by permitted users, from directly within a Web browser.

According to Dr. Downing, what is the information age? When the internet defined what information we see When computers were invented and began storing information. When information became cheap to store on disk space When companies/people finally realized that information is an asset None of these.

When companies/people finally realized that information is an asset

The term "content adjacency" refers to: placing advertisements to reach consumers based on various traits such as demographics and purchase history. a technique used by online publishers to increase the effectiveness of their campaigns. advertisements that are targeted based on a user's query. a concern that an advertisement will run near offensive material, embarrassing an advertiser and/or degrading their products or brands. problems associated with advertisements that run before a user arrives at the home page of a website.

a concern that an advertisement will run near offensive material, embarrassing an advertiser and/or degrading their products or brands.

Which of the following would NOT be a good example of matching a technology to a business problem? Mangold Insurance having their adjustors use IPads to capture relevant information, including signatures, at an auto accident scene. Huskie Bus service using GPS devices on buses to allow riders to see real-time bus locations. Your roommate purchasing a faster laptop than you (yours is 2 GHz) to use in OMIS 351. Delila's Scarf Shop using RFID tags ("wireless barcodes") on scarfs to track inventory and speed the purchasing process

Your roommate purchasing a faster laptop than you (yours is 2 GHz) to use in OMIS 351.

Cookies refer to small computer programs that extend the features or capabilities of another application. the design and content components of an advertisement. a line of identifying text, assigned and retrieved by a given Web server and stored by a user's browser. terms that prevent specific ads from being published. a temporary storage space used to keep a running count of the number of ad impressions.

a line of identifying text, assigned and retrieved by a given Web server and stored by a user's browser.

In database terminology, a record represents a list of data, arranged in columns and rows all of the data in a given column a single instance of whatever the table keeps track of a field or combination of fields used to uniquely identify a file one or more keys that relate separate tables in a database

a single instance of whatever the table keeps track of

The bulk of Facebook's revenue comes from: data aggregation services. application development. subscription fees. data harvesting. advertising

advertising

If there are 80 million power drills in the U.S., used for an average of 13 minutes each per year, a good Sharing Economy / Collaborative Consumption business idea would be... Internet exchange colocation centers. an app or site that allowed users to post used drills for sale, and other users to purchase the used drills (an EBay sort of app for drills). an app or site that worked like Uber, where those with drills would be dispatched to personal homes or businesses to perform work requiring a power drill. an app or site that allowed multiple users in close proximity to "check out" and return a single drill. None of these.

an app or site that allowed multiple users in close proximity to "check out" and return a single drill.

Systems that use data created by other systems to provide reporting and analysis for organizational decision making are called _____________systems. application server supply chain management enterprise resource management business intelligence customer relationship management

business intelligence

Moore's Law states that: magnetic disk storage density doubles annually. the cost per unit of useful light emitted by an LED falls by a factor of 10 every decade. the value of a telecommunications network is proportional to the square of the number of connected users of the system. chip performance per dollar doubles every eighteen months. the cost of a semiconductor chip fabrication plant is cut in half every four years.

chip performance per dollar doubles every eighteen months.

The ___________ measures the percentage of people who clicked on an ad to arrive at a destination-site. click churn rate link click-through rate click landing-page rate impression score

click-through rate

When Dr. Downing demonstrated how incredibly expensive it would be for you to buy an "A" in OMIS 351, his point was that... special software is installed on several computers and enables them to work together on a common problem. computers are designed with many microprocessors that work together, simultaneously, to solve problems. computing speed and storage capacity has progressed at a similarly incredible speed, following Moore's Law. microprocessors with two or more (typically lower power) calculating processor cores are fabricated on the same piece of silicon to solve multiple problems. COB student ethics are easy to be compromised.

computing speed and storage capacity has progressed at a similarly incredible speed, following Moore's Law.

The _____ refers to a situation where ads appear alongside text the advertiser would like to avoid. fast follower problem ad network failure problem collaborative filtering problem content adjacency problem affiliate advertising problem

content adjacency problem

Firms that collect and resell data are known as ______ data barons data mongers knowledge consultancies data miners data aggregators

data aggregators

What did Facebook get in trouble for in March 2018? for running the organization single-handedly. for valuing the firm at $15 billion, which exceeded investor expectations. for employing antitrust laws and limiting the investors' degree of control. for allowing Cambridge Analytica and others too much access to users' data, which in many cases was used to influence the 2016 U.S. elections. for retaining a majority of voting rights in the public company.

for allowing Cambridge Analytica and others too much access to users' data, which in many cases was used to influence the 2016 U.S. elections.

The process of computers identifying a user's physical location for the purpose of delivering tailored ads or other content is called _____. parallelism geotargeting triangulation network parallax trilateration

geotargeting

Solid state components are less likely to fail because they: are driven by precise sets of software instructions. have the capability to both enable and inhibit the flow of electricity. have no moving parts. are composed of germanium instead of silicon. contain storage that retains data even when powered down.

have no moving parts.

One of Facebook's key resources for competitive advantage is: technology network internalities. open source software. high switching costs. low venture capital investment.

high switching costs.

The cost of producing an additional unit of a product is known as its: isocost. transaction cost. marginal cost. redundancy cost. implicit cost.

isocost.

The Web site displayed when a user clicks on an ad is called the: landing page. organic result home page start page redirecting page

landing page.

Viral promotion involves offering rebates and incentives to customers for adopting a product or service paying celebrities to use a product visibly to lure customers into unwittingly buying the product. emphasizing customer retention and satisfaction, rather than a dominant focus on sales transactions. leveraging a firm's customers to promote a product or service. sending a pre-written set of messages to customers or prospects over time.

leveraging a firm's customers to promote a product or service.

Which is considered a vision where low-cost sensors allows a vast network to collect data, analyze input and automatically coordinate collective action? Cloud computing Three dimensional printers IoT Software as a Service All the above

loT

Less popular open source products are not likely to attract the community of users and contributors necessary to help improve these products over time. This situation reiterates the belief that _____ are a key to success. proprietary products brand strategies network effects technology expenses advertising campaigns

network effects

Software that is free and whose code can be accessed and potentially modified by anyone is referred to as _____. shared source files proprietary software available files licensed documents open source software

open source software

Google's stated mission is to: establish itself as the most valuable media company in the world. organize the world's information and make it universally accessible and useful. pair Internet surfers with advertisers and earn revenue along the way. foster technological innovation to promote a knowledge-driven culture. make the world more open and connected.

organize the world's information and make it universally accessible and useful.

The third wave of computing was characterized by the introduction of _____. personal computers mainframe computers minicomputers Internet computing laptops

personal computers

A(n) _____ is a search performed on Google or any other search engine. impression PageRank query link crawl

query

A(n) ______ is a tool for extracting, combining, and displaying data from one or more tables, according to any criteria specified. ETL (extraction, transformation, and loading) relational database referential integrity form query

query

Dynamic pricing: refers to pricing that shifts over time based on conditions associated with product supply and demand. refers to pricing that is always a notch higher than competition. refers to pricing strategies that focuses on consistency even if environmental conditions fluctuate wildly. is also known as the bargaining power of customers. refers to pricing that is always a notch below competition.

refers to pricing that shifts over time based on conditions associated with product supply and demand.

Databases organized in such a way that multiple tables are interconnected based on common keys, are referred to as _____ databases. Goofy hierarchical operational object-oriented relational analytical

relational

Which of the following is not considered an advantage of Hadoop? flexibility. relational structure. scalability cost effectiveness. fault tolerance.

relational structure.

Cloud computing refers to: replacing computing resources with services provided over the Internet. a technology that can make a single computer behave like many separate computers. designing computers with many microprocessors that work together, simultaneously, to solve problems. designing microprocessors with two or more calculating processor cores on the same piece of silicon. manufacturing semiconductors as a stack of multiple, interconnected layers instead of in one flat plane.

replacing computing resources with services provided over the Internet.

The guy who "invented" sliced bread helps show us that being in the food industry would be best. that we can match technology to business problems. there's no need to understand individual components of a problem solution. that technology is not useful. None of these.

that we can match technology to business problems.

The ability to track customers, analyze campaign results, and modify tactics are the distinct advantages offered by _____ to the field of marketing. the Web print media television radio outdoor advertising

the Web

Some of the radical changes brought about by new technologies include: the stagnation of advertising the proliferation of telecommunications into the hands of a few an increase in computing costs owing to the growth of licensed software a decrease in the standards of corporate ethics the creation of an unprecedented set of security and espionage threats

the creation of an unprecedented set of security and espionage threats

Knowledge is defined as _____________ raw facts and figures the data presented in a context so that it can answer a question or support decision making. the insight derived from experience and expertise. a listing of primary data. the process of breaking a complex topic into smaller parts.

the insight derived from experience and expertise.

The software business is extremely profitable compared to the hardware business because: the marginal cost to produce an additional copy of a software product is effectively zero. of the lack of market price regulations and guidelines. software producers serve niche businesses sectors with high profit margins. software development is a one-time process with no upgrade costs. software firms benefit from special tax exemptions that aid profitability.

the marginal cost to produce an additional copy of a software product is effectively zero.

The phrase inventory turns refers to: the stock of inventory returned to a manufacturer due to poor quality. also known as gross-profit margin turnover the number of times an inventory item moves within a warehouse the time it takes a product to be replaced by a newer model or upgraded product the number of times inventory is sold or used during a specific period.

the number of times inventory is sold or used during a specific period.

Big firms fail to see disruptive innovations as a threat because: they primarily focus on the bottom line. they fail to listen to customer needs. they overestimate the impact of these innovations. they don't indulge in playing catch-up. they concentrate only on future financial performance.

they primarily focus on the bottom line.

Over 20 percent of Google's revenues come from running ads on: the Android platform its organic search pages third-party Web sites competing search engines built-in toolbars

third-party Web sites

Dell, previously the world's number one PC manufacturer, has seen its market share shrink because of rivals copying its value chain and reducing the price advantage it enjoyed over rivals. Dell's present struggles: underscore the importance of continually assessing a firm's strategic position among changing market conditions. are a result of rivals adopting supply chain management software products that have yielded competitive advantages. imply that if a firm's value chain helps to create and strengthen other strategic assets over time, it can be a key source for competitive advantage. highlight the fact that scale advantages of an established firm are a huge factor in discouraging newer entrants to a market. demonstrate that resource-based thinking can help firms avoid the trap of carelessly entering markets simply because growth is spotted.

underscore the importance of continually assessing a firm's strategic position among changing market conditions.

A table in Access must have a primary key to: uniquely identify records and form relationships with other tables. keep the data "unlocked". match its foreign key. establish primary business-technology solutions. None of the above

uniquely identify records and form relationships with other tables.

Facebook has offered a system where Web site operators can choose to accept a user's Facebook credentials for logging in. Web site operators appreciate this feature because: they can charge users for accessing their content and hence, generate revenue. they can afford to not worry at all about Web site maintenance. users can access websites without creating an account, reducing a potential barrier to customer acquisition. Facebook's advertising programs offer better revenue for viewed content. they can associate their offerings away from the Facebook brand.

users can access websites without creating an account, reducing a potential barrier to customer acquisition.

Peer production refers to: the process of tracking and responding to online mentions of a product, organization, or individual. graphical editing tools, such as those found in a wiki, page layout program, or other design tool. programming hooks, or guidelines published by firms that tell other programs how to get a service to perform a task such as send or receive data. content that is more complex than simple text or photos and includes animation, audio, and video. users collaboratively working to create content, products, and services.

users collaboratively working to create content, products, and services.

The set of activities through which a product or service is created and delivered to customers is known as a(n) _____. marketing plan value chain inventory turnover strategic position pure play

value chain

investor groups that provide funding in exchange for an ownership stake in the firm are called _____. credit unions venture capital firms hedge fund managers mutual fund executives greenfield investors

venture capital firms

Search engines use _____ to discover documents for indexing and retrieval. caches landing pages web-crawling spiders proxy servers interstitials

web-crawling spiders

Cloud computing is not suited for situations: involving offloading of expensive computing tasks. where complex legacy systems have to be ported. with no existing regulatory compliance issues. where pricing economics favor renting over buying. characterized by limited-time tasks.

where complex legacy systems have to be ported.


Set pelajaran terkait

EXCEL - Chapter 5, EXCEL Chapter 7, Excel Chapter 7, Excel Chapter 5

View Set

The dissolution of the monasteries

View Set

Financial Management & Policy - Ch 16

View Set

Chapter 8 - Using Supporting Materials

View Set