MIS 301 - Exam 2

Ace your homework & exams now with Quizwiz!

T/F: A market where there are many buyers but only one dominant seller is known as a(n) oligolopy

False

T/F: API's are products and services that allow for the development and integration of complementary goods.

False

T/F: In Python, 'Hello', is the same as "Hello"

False

T/F: High switching costs serve to weaken the value of network effects as a value asset.

false

Waterfall

traditional

T/F: The higher the value of a user's overall investment, the more they are likely to consider the staying power of any offering before choosing to adopt it.

true

What is the syntax for creating a comment in Python?

#This is a comment

Why open source?

- Cost - Reliability - Security - Scalability - Agility and time to market.

Volatile Memory

-anything not saved, not coming back -RAM (random access memory)

Nonvolatile Memory

-opposite of volatile examples: hard drive, disc drive, solid state

Open source risks

-security -legal

Hardware/Software Layer Cake

1. User 2. Applications 3. Operating System 4. Hardware

Approaches to developing software

1. waterfall 2. agile 3. scrum

A firm can spend no money and time, yet expect to enhance its offerings, by: A: allowing other firms to contribute to its platform B: going public through an initial public stock offering C: outsourcing critical processes to third parties D: adopting an envelopment strategy E: preannouncing a forthcoming product to lower sales of current offerings

A

Android is a software product developed by Google that allows cell phone manufacturers to control hardware and establishes standards for developing and executing applications on its platform. Android is thus an example of a(n) _____. A: operating system B: programming language C: user interface D: distributed system E: database management system

A

In Python, which statement is used to stop a loop? A: break B: exit C: stop

A

Open source software products often have fewer bugs than their commercial counterparts because of the A: large number of persons who have looked at the code. B: stringent quality checks undertaken by the original developers. C: emphasis placed on technological superiority of OSS products. D: relatively poorer standards of commercially programmed software. E: pyramidal programming practice followed by OSS developers.

A

What are software development methodologies? A: methods to divide tasks related to software creation and deployment up into tasks targeted at building better products with stronger product mgmt guidelines and techniques B: an expansion of the scope of a project C: developing work continually ant iteratively, with a goal of more frequent product rollouts and constant improvement across smaller components of the larger project D: an approach to organizing and managing agile projects that breaks deliverables into "sprints" E: none of the above are true

A

Which of the following is an operating system? A: Linux B: USB 2.0 C: Microsoft Access D: Notepad E: Wi-Fi

A

A firm can spend no money and time, yet expect to enhance its offerings, by: A: preannouncing a forthcoming product to lower sales of current offerings. B: allowing other firms to contribute to its platform. C: going public through an initial public stock offering.

B

A server running _____ can create smaller compartments in memory that each behave as a separate computer with its own operating system and resources. A: private clouds B: virtualization software C: genetic algorithms D: neural networks E: open source software

B

Computer hardware refers to: A: precise set of instructions that orchestrate the functioning of the computer B: the physical components of information technology C: the mechanism through which users interact with a computer D: a program that fulfills the requests of a client E: handheld computing devices meant largely for mobile use outside of an office setting

B

Cyber criminals who infiltrate systems and collect data for illegal resale are called _____. A: cash-out fraudsters B: data harvesters C: corporate spies D: ethical hackers E: information hoarders

B

Which of the following is one of the characteristics of using software as a service model? A: longer deployment times B: scalable systems C: fixed operating expenses D: heightened financial risk E: higher maintenance costs

B

Which of the following products or services is not subject to network effects? A: banking services B: snack chip manufacturing C: video game consoles D: social networks E: cell phone services

B

Which of the following types of infiltration techniques does one open up to by posting sensitive personal information and details about ones workplace on social networking sites? A: phishing B: social engineering C: password theft D: virus infections E: physical threats

B

_______ is a class of computer software that seeks to reproduce or mimic human thought, decision making, or brain functions. A: biometrics B: artificial intelligence C: android D: legacy software E: intranet

B

_________ perform the work that users and firms are directly interested in accomplishing and can be thought of as places where a user's real work is done. A: emulators B: applications C: platforms D: embedded systems E: operating systems

B

A protester seeking to make a political point by leveraging technology tools, often through system infiltration, defacement, or damage is called an _______ A: activist B: cyber agitator C: hacktivist D: ethical hacker E: cybersquatter

C

In database terminology, a record represents: A: a list of data, arranged in columns and rows B: all of the data in a given column C: a single instance of whatever the table keeps track of D: a field or combination of fields used to uniquely identify a file E: one or more keys that relate separate tables in a database

C

Less popular open source products are not likely to attract the community of users and contributors necessary to help improve these products over time. This situation reiterates the belief that _____ are a key to success. A: proprietary products B: brand strategies C: network effects D: technology expenses E: advertising campaigns

C

Viral promotion involves: A: paying celebrities to use a product visibly to lure customers into unwittingly buying the product. B: offering rebates and incentives to customers for adopting a product or service. C: leveraging a firm's customers to promote a product or service.

C

What is a correct syntax to output "Hello World" in Python? A: No answer text provided. B: p("Hello World") C: print("Hello World") D: echo("Hello World");

C

What is the correct file extension for Python files? A: No answer text provided. B: .pyt C: .py D: .py

C

Which of the following is a valid statement on information security? A: security breaches cannot be prevented despite the adoption of the best security policieis B: tech lapses are solely responsible for almost all security breaches C: information security is everybody's responsibility D: greater expenditure on security products is the only way to contain security breaches E: a reactive, rather than proactive, approach is better suited for dealing with security breaches

C

Which of the following is an example of a two-sided market? A: instagram B: twitter C: square D: whatsapp E: goodrx

C

_____ is said to occur when one market attempts to conquer a new market by making it a subset, component, or feature of its primary offering. A: market leapfrogging B: acquisition C: envelopment

C

_____ refers to applications installed on a personal computer, typically to support tasks performed by a single user. A: enterprise software B: server program C: desktop software D: software as a service E: database management program

C

_____ refers to the process of combining aspects of reporting, data exploration and ad hoc queries, and sophisticated data modeling and analysis. A: logistics B: queritic modeling C: business intelligence D: electronic trading E: big data

C

_________ refer to older information systems that are often incompatible with other systems, technologies, and ways of conducting business. A: data aggregator systems B: loyalty card systems C: legacy systems D: transaction systems E: mnemonic systems

C

Computer ________ refers to software that is free and where anyone to look at and potentially modify the code. A: social software B: proprietary software C: licensed software D: open source software E: software as a service

D

Firmware refers to: A: computer hardware elements visible to the human eye B: control software stored on removable discs C: control software stored on hard drives D: control software stored on nonvolatile memory chips E: computer hardware elements invisible to the human eye

D

Which of the following factors represents one of the sources of value derived from network effects? A: congestion B: price transparency C: information symmetry D: staying power E: complementary costs

D

Which of the following functions is likely to be performed by enterprise software? A: word processing B: spreadsheet accounting C: making PowerPoint presentations D: inventory tracking E: internet browsing

D

Which of the following statements is consistent with ground realities regarding information security? A: cyber-crime is not yet considered a serious enough threat to warrant the attention of law-enforcement agencies B: law enforcement agencies are well resourced to fight cyber-crimes effectively C: gov'ts usually outmatch private industry in terms of retaining top talent with incentives and generous pay D: law enforcement agencies struggle to hire, train, and retain staff capable of keeping pace with today's cyber criminals E: cyber-crime is not rewarding in terms of financial gain

D

Windows OS, the iPhone, the Wii, and Facebook's application programming interfaces allow for the development and integration of complementary goods by third parties. Based on this evidence, all these products or services are said to be _____. A: pure plays B: competitors C: adaptors D: platforms E: venture capitalists

D

You are at a packed stadium for the big game and you want to upload a photo of your team's touchdown using Instagram. Your mobile phone shows five bars of service, but you still can't access the Internet. This is likely an example of ______. A: the osborne effect B: envelopment C: network effects D: congestion effects E: rival access

D

_____ refers to software that is free and where anyone to look at and potentially modify the code. A: social software B: proprietary software C: licensed software D: open source software E: software as a service

D

______ is the term used to describe raw facts and figures. A: information B: knowledge C: analytics D: data E: intelligence

D

_______ refers to a precise set of instructions that tell the computer hardware what to do A: a mnemonic B: an input device C: an output device D: software E: desktop

D

Metcalfes law is known as: A: systemic events B: cluster effects C: group impressions D: herd instincts E: network externalities

E

_________ is the process of using computers to identify hidden patterns in and to build models from large datasets. A: data harvesting B: E-discovery C: optimization D: report canning E: data mining

E

T/F: Enterprise Resource Planning software has proven popular in part because the standardization these products impose makes them exceptionally easy to deploy.

False

T/F: With SaaS, firms get the most basic offerings but can also do the most customization, putting their own tools (operating systems, databases, programming languages) on top.

False

What is the syntax in Python to print Hello World?

Print("Hello,World!")

T/F Expedia used APIs to increase the distribution of travel products that it sells, relying on partners to plug into its technology and inventory.

True

T/F: Mobile software developers often find iOS more attractive than the Android operating system, because Android runs on many more types of devices than iOS and the Android operating system is fragmented into different versions, each combination of which needs to be tested.

True

T/F: Moving first plays a significant role in markets influenced by network effects.

True

T/F: Python is a popular programming language.

True

T/F: Scalability allows a firm to scale from startup to blue chip without having to significantly rewrite its code.

True

T/F: Some of the largest technology companies now support open source software initiatives.

True

T/F: The LAMP stack of open source products is used to power many of the internets most popular websites.

True

T/F: The marginal cost to produce an additional copy of a software product is effectively zero.

True

T/F: the phrase social proof refers to positive influence created when someone finds out that others are doing something.

True

Agile

-iterative approach -scrummaster

T/F: specialty devices like video game consoles, television set-up boxes, kindles, and smart appliances typically do not need an operating system

false

SaaS

paying to have software somewhere else


Related study sets

Virtual Lab Assignment Questions

View Set

Chapter 10: Organizational Behavior

View Set

Business Strat & Policy Exam 3 Self-Test Questions

View Set

Final Exam IT 276 Data Communication

View Set

Crash Course Baseball: MLB Teams and League Structure

View Set

Anatomy S2B3 - Cardiac Embryology

View Set