You are on page 1of 9

1.

(TCO A) which of the following decisions requires knowledge based on collaboration and
interaction?
How long will it take to manufacture this product?
Should we work with outside vendors on new products and services?
In which geographical locations are our products garnering the most sales?
Which product design is the most efficient for the user in terms of energy use?
1. (TCO A) The costs for firms operating on a global scale have been drastically reduced by
Networking technology
Investments in organizational complementary assets
The internet
The rise of digital content
(TCO A) Which of the following objectives best describes the business strategy behind the
development of smart grid initiatives by power companies, as discussed in the chapter case?
Answer: Operational Excellence

2. (TCO B) Which of the following businesses use the market creator business model?
an Online auction house
an online newspaper
a video-sharing site
an online bookseller
3. (TCO B) ________ are visual tools for presenting performance data in a BI system.
Dashboards and scorecards
Parameterized reports
Reports and drill-down feature
Scenario and models
2. (TCO B) Which of the following describes how the Simon framework of decision making works in
high-velocity decision environments?
A) All four steps of the process are handled by software algorithms; humans are eliminated
from the decisions because they are too slow.
B) The first three steps of the process are handled by software algorithms and the final step is
handled by experienced managers.
C) The first two steps of Simon's framework are eliminated and the final two steps are handled
by software algorithms.
D) All fours steps are performed by humans with the support of high-speed, high-volume DSS
and ESS.

3. (TCO C) The type of logical database model that treats data as if they were stored in two dimensional
tables is the

OODBMS
Pre-digital DBMS
Relational DBMS
Hierarchical DBMS
3. (TCO C) A field identified in a record as holding the unique identifier for that record is called the
Primary key.
Key field.
primary field.
unique ID.

4. (TCO D) The telephone system is an example of a ________ network.


Peer-to peer
Wireless
Packet-switched
Circuit- switched
4. (TCO D) To use the analog telephone system for sending digital data, you must also use

a modem.
a router.
DSL.
twisted wire.

5. (TCO E) Enterprise applications have become easier to install because:


They have been reduced in function

Vendors have modularized the application so they can be rolled out a module at a time
Vendors have changed their design to make the application more adaptable to diverse business processes
Users have become more familiar with how to use the applications
5. (TCO E) which of the following factors provides an understanding of why computing resources
today are ever more available than in previous decades?
Network economies
Law of mass digital storage and moores law
Declining communication costs, universal standards, and the internet
All of above
6. (TCO F) Agile Methodologies
Were developed because traditional methodologies did not work
Because software development is unlike any other development activity
Users seldom know what they want when the project starts
All of above
7. (TCO G) A salesperson clicks repeatedly on the online ads of a competitor in order to drive the
competitors advertising costs up. This is an example of (Points : 4)
Phishing
Pharming
Spoofing
Click Fraud

(TCO A) You work for an auto manufacturer and distributor. How could you use information
systems to achieve greater customer intimacy?
Answer: You could create a Web site that allows customers to customize cars, communicate with
support personnel and other car owners. You could create an automated e-mail service reminding

car owners to take their car in for periodic checkups. You could have an information system that
tracks customer preferences in local areas, so you can provide cars that reflect local customer needs
and desires.
(TCO A) You have been hired to work with 10 salespeople from different branches of a national
business in creating an online training site for new Sales employees. Identify six collaboration tools
that are available to help the team work together. Which single tool would be the most helpful for
the project, in your opinion, and why?

Answer: Collaboration tools include e-mail and instant messaging;


social networking; wikis; virtual worlds, collaboration platforms such
as virtual meeting systems, Google Apps/Google Sites. The most
helpful of these might be a collaboration platform because it would
enable people to have discussions, calendars, conferences, and share
documents.

(TCO A)Assess at least two benefits of using enterprise systems.


Answer: Enterprise systems integrate the firms key business processes in sales, production,
finance, logistics, and human resources into a single software system so that information can flow
throughout the organization, improving coordination, efficiency, and decision making. These
systems help create a more uniform organization in which everyone uses similar processes and
information, and measures their work in terms of organization-wide performance standards. The
coordination of the firms key business processes allows the firm to respond more rapidly to
customer demands.

Answer 2: It helps facilitate decision making and involves organizational business process in all
areas of the business. These are in sales, production, finance, and human resources to name just a
few. These are integrated into a single software system so that the information can flow efficiency
through electronic collaboration among many employees and top level management. These systems
also help the organization create a uniform process and helps measure their work similar
organization wide performance standards. This helps the organization respond more rapidly to
customers. (quizlet.com)

(TCO B) You are advising the owner of Small town Computer, a new, local computer repair store
that also builds custom computers to order. What competitive strategies could Small town
Computer exert? Which ones will it have difficulty exercising?

Answer: Differentiate. Niche. The most difficult would be differentiating strategy because it would
be hard to create a unique business which means there will always be competitors such as custom
built computers as DELL. They will have competed with their deals compared to what they can
offer. It is best to start of just local and offer local service and repair within that small town. This
could branch out of the towns limits for expansion.

(TCO B) Describe four types of application that are especially well-suited for mobile-commerce

(TCO B)You are evaluating BI software from a variety of vendors. Identify six elements in the BI
environment. Use your understanding of the importance of these elements to formulate six questions to
ask the vendor in order to determine how their software will interplay with your needs.
(TCO C) If you were to design the new contracts database for a publishing house what fields do you
anticipate needing? Which of these fields might be in use in other databases used by the company?
Answer: Author first name, author last name, author address, agent name and address, title of
book, book ISBN, date of contract, amount of money, payment schedule, date contract ends.
Other databases might be an author database (author names, address, and agent details), a book
title database (title and ISBN of book), and financial database (payments made).

(TCO C) What types of relationships are possible in a relational database? Describe and give an example
of each.
Answer: A relationship is an association among (two or more) entities. Three types of relationships
exist: one-to-one (1:1), one-to-many (1:M), and many-to-many (M:N or M:M.)

1:1
An academic department is chaired by one professor; a professor may chair only one academic
department.
1:M
A customer may generate many invoices; each invoice is generated by one customer.
M:N
An employee may have earned many degrees; a degree may have been earned by many employees.
(TCO C) Describe the ways in which database technologies could be used by an office stationery supply
company to achieve low-cost leadership
Answer: Databases could be used to make the supply chain more efficient and minimize
warehousing and transportation costs. You can use OLAP to better analyze sales forecasts. You can
also use sales databases and predictive analysis to determine what supplies are in demand by which
customers, and whether needs are different in different geographical areas. DSS databases could be
used to predict future trends in office supply needs, to help anticipate demand. You could use text
mining to identify service issues or inefficiencies within the company. Databases could be used to
determine the most efficient methods of transportation and delivery. In addition you could allow
customers to order supplies through the Web and have these orders influence the entire supply
chain and minimize warehousing costs.

(TCO D) How are RFID systems used in inventory control and supply chain management?
Answer: In inventory control and supply chain management, RFID systems capture and manage
more detailed information about items in warehouses or in production than bar coding systems. If a
large number of items are shipped together, RFID systems track each pallet, lot, or even unit item
in the shipment. This technology may help companies improve receiving and storage operations by
enhancing their ability to "see" exactly what stock is stored in warehouses or on retail store shelves.
(TCO D) What is cloud computing and how do you think its developments could impact businesses?

Cloud Computing is web based applications that are stored on remote servers and accessed
via the cloud of the Internet using a standard web browser. Technology services are
provided over a network, primarily the Internet. These may be infrastructure services, such
as storage or networking, or platform services, such as IBM's application development and
test service, or software services, such as salesforce.com.
There are some who believe that cloud computing represents a sea change in the
way computingwill be performed by corporations as business computing shifts out
of private data centers intocloud services (Carr, 2008). This remains a matter of
debate. Cloud computing is more immediately appealing to small and mediumsized businesses that lack resources to purchase and own their own hardware and
software. However, large corporations have huge investments in complex
proprietary systems supporting unique business processes, some of which give
them strategic advantages. For them, the most likely scenario is a
hybrid computing model where firms use their own infrastructure for their most
essential core activities and adopt public cloud computing for less-critical systems
or for additional processing capacity during peak business periods. Cloud
computing will gradually shift firms from having a fixed infrastructure capacity
toward a more flexible infrastructure, some of it owned by the firm, and some of it
rented from giant computer centers owned by computer hardware vendors.
Since organizations using cloud computing generally do not own the infrastructure,
they do not have to make large investments in their own hardware and software.
Instead, they purchase their computing services from remote providers and pay
only for the amount of computing power they actually use

TCO D) what are the business advantages of using voice over IP (VOIP) technology?

Answer: Business can lower costs by using the Internet to deliver voice information, avoiding the
tolls charged by local and long-distance telephone networks. They can lower costs from not having
to create a separate telephone network. VOIP enables communication by supporting Internet
conference calls using video. VOIP also provides flexibility - phones can be added or moved to
different offices without rewiring or reconfiguring the network.

(TCO E) Distinguish between grid computing, cloud computing, and utility computing.

Answer: Grid computing involves connecting geographically remote computers into a


single network to create a computational grid that combines the computing power of
all the computers on the network with which to attack large computing problems. In
cloud computing, technology services are provided over a network, primarily the
Internet. These may be infrastructure services, such as storage or networking, or
platform services, such as IBM's application development and test service, or software
services, such as salesforce.com. On-demand computing occurs when firms pay
subscription fees or pay only for their usage of a vendor's cloud computing services.

(TCO E) What additional complexities are faced in global supply chains? How does the Internet help in
managing global supply chains?
Answer: Global supply chains typically span greater geographic distances and
time differences than domestic supply chains and have participants from a
number of different countries. Although the purchase price of many goods might
be lower abroad, there are often additional costs for transportation, inventory,
and local taxes or fees. Performance standards may vary from region to region
or from nation to nation. Supply chain management may need to reflect foreign
government regulations and cultural differences. All of these factors impact how
a company takes orders, plans distribution, organizes warehousing, and
manages inbound and outbound logistics throughout the global markets it
services. The Internet helps companies manage many aspects of their global
supply chains, including sourcing, transportation, communications, and
international finance. As goods are being sourced, produced, and shipped,
communication is required among retailers, manufacturers, contractors, agents,
and logistics providers. With Internet technology, supply chain members
communicate through a Web-based system. Firms use intranets to improve
coordination among their internal supply chain processes, and they use
extranets to coordinate supply chain processes shared with their business
partners.

(TCO E) Explain why standards are so important in information technology? What standards have been
important for the growth of Internet technologies?

Answer: Standards are important because they result in different manufacturers creating
products that can be used either with each other or to communicate with each other. For
example, without standards, each light-bulb manufacturer would have to also create
specific light-bulb sockets for use with their light bulbs. In the same way, computers and
computer technology have been enabled through standards. Standards have allowed many
different manufacturers to contribute to the same, standardized definitions of a
technological application. For example, the ASCII data standards made it possible for
computer machines from different manufacturers to exchange data, and standardized
software languages have enabled programmers to write programs that can be used on
different machines.
The standards that have been important for the growth of the Internet include TCP/IP, as a
networking standard, and WWW standards for displaying information as Web pages,
including html
(TCO F) Differentiate between intangible and tangible benefits and list three examples of each. In what
types of systems are intangible benefits more predominant?
Answer: Tangible benefits can be quantified and given a monetary value. For example, a

monetary value can be given to increased productivity, lower operational costs, reduced
workforce, lower computer expenses, lower outside vendor costs, lower clerical and
professional costs, reduced rate of growth in expenses, and reduced facility,
telecommunications, software, services, and personnel costs. Intangible benefits cannot be
immediately quantified but may lead to quantifiable gains in the long run such as higher
sales. Examples of intangible benefits include: improved asset utilization, resource control,
organizational planning, decision making, operations; increased flexibility, learning, job
satisfaction ,client satisfaction, employee goodwill, more timely information and more
information, the fulfillment of legal requirements and a better corporate image. Systems
that produce more intangible benefits are MIS, DSS, and collaborative work systems.
(TCO F) What qualities of object-oriented development make this method especially suitable for Internet
applications?
Answer: Object-oriented development uses the object as the basic unit of systems analysis and
design. The system is modeled as a collection of objects and the relationships between them. Ecommerce companies need to be able to add, change, and retire their technology capabilities very
rapidly. Object-oriented development allows objects to be reused and repackaged with other objects
to create new software, saving money and development time.
(TCO G) Define the basic concept of responsibility, accountability, and liability as applied to ethical
decision. How are these concepts related?
Answer: Responsibility is the first key element of ethical action. Responsibility means that
an individual, group, or organization accepts the potential costs, duties, and obligations for
decisions made. Accountability is a feature of systems and social institutions. It means that
mechanisms are in place to determine who took responsible action; i.e., who is responsible

for the action. Liability is a feature of political systems in which a body of law is in place
that permits individuals to recover the damages done to them by others.
These concepts are related as follows: I will assume the blame or benefit for the actions I
take (responsibility); this blame or benefit accrues to me through the requirement that I be
able to explain why I have taken the actions I have (accountability) for actions traceable to
me by defined mechanisms in the organization, and if those actions result in harm to
another, I will be held by law to reparations for those actions (liability).
(TCO G) Discuss the issue of security challenges on the Internet as that issue applies to a global
enterprise. List at least 5 Internet security challenges.
Answer: Large public networks, including the internet, are more vulnerable because they are
virtually open to anyone and because they are so huge that when abuses do occur, they can have an
enormously widespread impact. When the internet becomes the part of the corporate network, the
organizations information system can be vulnerable to action from outsiders. Computers that are
constantly connected to the internet via cable modem or DSL line are more open to penetration by
outsiders because they use a fixed internet address where they can be more easily identified. The
fixed internet address creates the target for hackers. To benefit from electronic commerce, supply
chain, management and other digital business processes, companies need to be open to outsiders
such as customers, suppliers, and trading partners. Corporate systems must be extended outside
the organization so that employees working with wireless and other mobile computing devices can
access them. This requires a new security culture and infrastructure, allowing corporations to
extend their security policies to include procedures for suppliers and other business partners. Some
of the challenges to internet security are computer viruses, line taps, loss of the machine itself,
tapping, sniffing, message alteration, theft and fraud, hacking, computer viruses, vandalism, denial
of service attacks, copying of data, alteration of data.

You might also like