Ball Ole miss MIS 309 Final Review

Ace your homework & exams now with Quizwiz!

Facebook COO Sheryl Sandberg came to the firm from previous employment at Yahoo. a. True b. False

False

Netflix competitors in streaming are small and mostly unprofitable. a. True b. False

False

Which of the following is one of the sources of revenue for open source vendors? a. Licensing OSS for incorporation into subsequent open source products b. Selling open source products at prices well below commercial products c. Marketing versions of open source software masked as proprietary software d. Claiming royalties on software based on open source code e. Selling support and consulting services

e

_____ are critical for capturing sales data, and are usually linked to systems which manager a firm's inventory. a. Point-of-sale systems b. Legacy systems c. CRM systems d. Server farms e. Data aggregators

A

_____ is a non-profit organization that shares audit information on contract manufacturers among members of the apparel industry and other industries. a. Fair Factories Clearinghouse b. Pricewaterhouse Coopers c. Amnesty International d. Klynveld Main Goerdeler e. Transparency International

A

Web hosting services

A firm that provides hardware and services to run the websites of others.

In order to achieve a negative cash conversion cycle a firm would want to: a. increase its account payable period and its inventory turns. b. decrease its account payable period and its inventory turns. c. increase its account payable terms and decrease its inventory turns. d. decrease its account payable terms and increase its inventory turns. e. analyze systems and stop whatever processes are causing this, since a negative cash conversion cycle is associated with losses, not profits.

A. Increase its accounts payble period and its inventory turns

. Firms that can't generate cash quickly enough are referred to as having _____. a. liquidity problems b. sagging problems c. high inventory turns d. stock-outs e. vertical integration problems

A. Liquidity problems

Android is a software product developed by Google that allows cell phone manufacturers to control hardware and establishes standards for developing and executing applications on its platform. Android is thus an example of a(n) _____. a. operating system b. programming language c. user interface d. distributed system e. database management system

A. Operating system

Updates that plug existing holes in a software are called a. patches. b. compliance. c. maculations. d. keys. e. dongles.

A. Patches

Crowdsourcing tools and question-and-answer sites like _____ allow firms to reach out for expertise beyond their organizations. a. Quora b. Oculus VR c. Alibaba d. Twitter e. M-PESA

A. Quora

The hypertext transfer protocol (http) defines the communication between: a. Web browsers and Web servers. b. operating systems and Web browsers. c. hardware and operating systems. d. mail servers and hardware. e. hardware and Web browsers.

A. Web browsers and Web servers

4. One of the risks associated with SaaS is the: a. dependence on a single vendor. b. inability to migrate to new versions of software. c. reduced reliance on a network connection. d. costs associated with storing large amounts of data in-house. e. user interface of Web-based software being more sophisticated than desktop alternatives.

A. dependence of a single vendor

Which of the following is an operating system? a. Linux b. USB 2.0 c. Microsoft Access d. Notepad e. Wi-Fi

A. linux

2. Large firms often find new markets attractive, but might not have products ready for delivery. What strategy do such firms use to get potential adopters to delay their purchasing decisions? a. Preannounce forthcoming efforts b. Make their new products compatible with the leading standard c. Spread costs across increasing units of production or in serving multiple customers d. Give away products for half of a two-sided market to seed the market e. Leverage customers of their other products to promote a new product

A. preannoucne forthcoming efforts

All of the costs associated with the design, development, testing, implementation, documentation, training and maintenance of a software system are collectively termed as: a. total cost of ownership. b. economies of scale. c. economic value added. d. return on investment. e. cost to company.

A. total cost of ownership

Big firms fail to see disruptive innovations as a threat because: a. they concentrate only on future financial performance. b. They primarily focus on the bottom line. c they don't indulge in playing catch-up. d. they overestimate the impact of these innovations. e. they fail to listen to customer needs.

B

For years, which of the following is the only major media category that has seen an increase in spending? a. radio jingles b. online advertising c. print media d. telemarketing e. television ads

B

From our chapter 9 lecture, what is a party line? a. A Facebook message type. b. An offering from BellSouth in the 1970s, where multiple households shared a phone line, but have different phone numbers. c. It is unrelated and was not discussed during the chapter 9 lecture. d. A group account on Twitter.

B

A social media app that is an example of microblogging is ______________. a. Facebook b. Twitter c. Instagram d. YouTube

B. Twitter

_____ perform the work that users and firms are directly interested in accomplishing and can be thought of as places where a user's real work is done. a. Emulators b. Applications c. Platforms d. Embedded systems e. Operating systems

B. applications

Another major concern for firms in the sharing economy is uncertainty around the ability of these firms to continue to consider their workers as ____________ and not employees. a. investors b. critics c. independent contractors d. liabilities e. None of the above are true.

C

Benefits related to a firm's size are referred to as _____. a. network effects b. brand recall c. scale advantages d. vertical integration e. disintermediation

C

The resource-based view of competitive advantage states that for a firm to maintain sustainable competitive advantage it must control a set of exploitable resources that have four critical characteristics. What are these characteristics? a. inventory turns, high margins, long account payable periods, brand building relationships b. operational effectiveness, strategic positioning, scale, distribution channels c. rareness, value, imperfect imitability, non substitutability d. a website, an app, cloud-based systems, a savvy technology staff e. low margin, high delivery, infrastructure, customizable

C

Which of the following sets of interrelated forces threatens to slow down the progression of Moore's Law? a. Weight, speed, and capacity b. Density, clock speed, and wafer thickness c. Size, heat, and power d. Silicon availability, efficiency, and energy e. Memory, cache size, and speed

C

4. Which of the following is not a data factor Amazon considers in delivering packages to customers? a. Weather b Traffic c. Employee job satisfaction d. Fuel prices e. Fleet availability

C. Employee job satisfaction

3. _____ refers to applications installed on a personal computer, typically to support tasks performed by a single user. a. Enterprise software b. Server program c. Desktop software d. Software as a service e. Database management program

C. desktop software

As of 2018, bitcoin's highest daily transaction volume was approximately _____________. a. 446 b. 46,000 c. 4.6 million d. 440,000 e. None of the above are true.

D

Churn rate is a term that refers to the: a. number of new users that each existing user attracts through word-of-mouth and social sharing. b. number of movie titles that are difficult to assign reliable user ratings. c. average number of recommended titles in a user's queue. d. rate at which customers leave a product or service. e. rate at which the demand for a product or service fluctuates with price change.

D

How are news feeds a source of value for users on Facebook? a. They offer cross connectivity for users across several social networking sites. b. They are innovative and Facebook is the only social network to offer the feature. c. They ensure that a single post will reach all friends and fans. d. It fosters the virality of information sharing vital to delivering value from the social graph. e. They are effective in protecting a user's personal information from others.

D

Today Netflix is so focused on _____________ that it offers its streaming-only subscription as the default option for consumers. a. special promotions b. viewer feedback c. rating content d. digital distribution e. None of the above are true.

D

Which of the following statements is true about Airbnb's revenue model? a. Airbnb currently does not make money via transactions, only from advertising listings on its website. b. Airbnb only charges property owners who rent on the website. c. Airbnb only charges guests who rent on the website. d. Airbnb charges both property owners and guests as part of transactions on their website. e. Airbnb doesn't charge transactions for the three years after it enters a market, so as to generate two-sided network effects of property rents and guests searching for properties to stay in.

D

. In database systems, a row is also known as a _____. a. table b. column c. key d. record e. field

D. Record

The fault-tolerant nature of the DNS ensures that: A. if users can't reach a host computer, they are redirected back to the previous page. B. mistyped or misspelled Web addresses are automatically corrected. C. if a document or file can't be accessed, it won't result in a 404 error. D. the service continues functioning even if one nameserver goes down. E. mismatched host names and domain names are still assigned with the correct IP address.

D. the service continues functioning even if one nameserver goes down.

_________ is the process of using computers to identify hidden patterns in and to build models from large data sets.

Data Mining

FID tags allow Zara staff to take in-store inventory less frequently than rivals, saving money on staffing. a. True b.False

False

3. Which of the following is not a reason why Rent the Runway appeals to designers? a. The firm introduces high-end designer brands to new customers. b. The firm brings in younger customers, averaging about a decade younger than department store customers. c. Most Rent the Runway customers rent brands they've never bought before. d. Some designers have used Rent the Runway to test new looks. e. All of the above are reasons why Rent the Runway appeals to designers.

E

The _____ problem exists when rivals watch a pioneer's efforts, learn from their successes and missteps, and then enter the market quickly with a comparable or superior product at a lower cost. a. late entrant b. early starter c.first mover d. intellectual property e.fast follower

E

The sharing economy consists of which of the following? a. recirculation of goods b. increased utilization of durable assets c. exchange of services d. sharing of productive assets e. All of the above are true.

E

_____ is a nonvolatile, chip-based storage, often used in mobile phones, cameras, and MP3 players. a. Random-access memory b. Cache memory c. Optical storage memory d. Holographic memory e. Flash memory

E

A(n) _____ refers to a heads-up display of critical indicators that allow managers to get a graphical glance at key performance metrics a. interstitial b. embassy c. canned report d. prediction interface e. dashboard

E. Dashboard

1. The domain name service (DNS) is a distributed database that allows users to communicate with other computers by: a. assigning IP addresses to different domain names. b. mapping host names to domain names. c. creating IP addresses that are unique to servers. d. assigning domain names to different IP addresses. e. mapping host and domain names to IP addresses of computers.

E. Mapping host and domain names to IP addresses of computers.

1. High switching costs serve to weaken the value of network effects as a value asset. a. True b. False

False

4. Facebook can be completely indexed by search engines, like Google and Bing, being able to index all of Facebook content. a. True b. False

False

1. Amazon's goal is to eventually use copter-style drones to deliver small packages to consumers in thirty minutes or less. True or Flase?

True

A device gets its IP address from whichever organization is currently connecting it to the Internet. a. True b. False

True

Based on a survey reviewed during our Chapter 9 lecture, Instagram is the most popular social media app among 18-24 year old females. a. True b. False

True

By shifting to a streaming model, Netflix stands to eliminate shipping and handling costs. a. True b. False

True

Customers who are on the fence about a choice can choose a second style as a backup for an additional fee. a. True b. False

True

Firms using SaaS products can dramatically lower several costs associated with the care and feeding of their information systems. a. True b. False

True

Modern supercomputing is typically done via a technique called massively parallel processing. a. True b. False

True

Multicore processors can run older software written for single-brain chips. a. True b. False

True

Polybius is known in history and creating a method for communicating using letters in the Greek alphabet place on a square or tablets. a. True b. False

True

Profit margins for disruptive innovations are usually worse than those for incumbent technologies. a. True b. False

True

RM provides logic in the majority of smartphones, including products by Apple and Samsung. a. True b. False

True

Rent the Runway's logistics and operations are so efficient that many items arriving by 8 a.m. can be turned around in twelve hours for same-day send-out. a. True b. False

True

Spear phishing attacks specifically target a given organization or group of users. a. True b. False

True

The data a firm can leverage is a true strategic asset when it is valuable, rare, imperfectly imitable, and non-substitutable. True or False?

True

The halo effect from a positive experience renting a designer's more daring dresses may prompt a woman to purchase more frequently-worn staples like a little black cocktail dress, leather leggings, or accessories. a. True b. False

True

Timing and technology alone will not yield sustainable competitive advantage. a. True B. False

True

Uber prices services according to demand. This allows the company to increase rates during peak periods in order to attract more potential suppliers into the market to meet demand. a. True b. False

True

Zara's use of technology across the value chain allows the firm to manufacture more unique items than rivals H&M and Gap. a. True b. False

True

In security circles the phrase "compliance" refers to a. legal or professionally binding steps that an organization must take. b. security audit practices used by the tech divisions of Big Four accounting firms. c. a firm's installing software to fulfill government surveillance requirements. d. the U.S. government legislation requiring organizations to share security breaches with law enforcement and industry trade organizations. e. only deploying open source software that is downloaded from approved GitHub locations.

a. legal or professionally binding steps that an organization must take.

Which of these would be an example of a DDoS attack? a. An extortion attempt where hackers threaten to reveal names and social security information stolen from medical records databases b. Overloading a popular social networking site with inbound messages in order to shut down access to the site c. Launching a targeted phishing campaign on a department of defense or other surveillance network. d. Stealing proprietary data directly from mobile phones using a distributed network of difficult-to-trace online services. e. Launching tough-to-track click-fraud efforts.

b. Overloading a popular social networking site with inbound messages in order to shut down access to the site

Technology experts in the area of process design: a. work to make sure systems are easy to use. b. leverage technology to make firms more efficient. c. specialize in technology for competitive advantage. d. focus on systems dealing with critical business data. e. provide direction on technology-related security issues.

b. leverage technology to make firms more efficient.

company uses radio frequency identification (RFID) tags to keep track of its inventory. This is an example of the impact of technology in the area of _____. a. accounting b. operations c. advertising d. human resources e. finance

b. operations

1. The Sarbanes-Oxley Act is also known as ... a. Oxbow Act b. Sars Act c. SOX d. Socks

c. SOX

Internet service provider

organization or firm that provides access to the internet

IP address

value used to identify a device that is connected to the internet, has 4 numbers seperated by dots


Related study sets

Chapter 1 - Strategic Management: Creating Competitive Advantages

View Set

EPS 7 HW (1,2,4,5,6,7,8,9,10,11,12,13,14)

View Set

windows Server 2008 Active Directory Domain Services Lesson 1

View Set

Ch 10: Wireless, Mobile, Computing and Mobile Commerce

View Set

MEDIA LITERACY : DECONSTRUCTING MEDIA MESSAGES

View Set

CE Shop Challenging Questions (National Portion)

View Set

1601 Infectious Respiratory Problems and Disorders adaptive quizzing

View Set