Fill This Form To Receive Instant Help

Help in Homework
trustpilot ratings
google ratings


Homework answers / question archive / Miami Dade College,Miami-CIS 410 1)conveys understanding, accumulated learning, and expertise as they apply to a current problem

Miami Dade College,Miami-CIS 410 1)conveys understanding, accumulated learning, and expertise as they apply to a current problem

Management

Miami Dade College,Miami-CIS 410

1)conveys understanding, accumulated learning, and expertise as they apply to a current problem.

A.         Data

B.         Information

C. Knowledge

D. Experience

E. Wisdom

 

 

2.                    is (are) data that have been organized to have meaning and value to a recipient.

a.         Insights

b.         Information

c.         Knowledge

d.         Experience

e.         Wisdom

 

 

3.         is/are the computer hardware, software, and communications technologies that are used by IT personnel to produce IT services.

A.         IT components

B.         IT services

C.         Information technology

D.         An information system

E.         A computer-based information system

 

 

4.                    include B2B and B2C.

a.         Enterprise resource planning systems

b.         Computer-based information systems

 C. Functional area information systems

D. Interorganizational information systems

 

 

5.                    is a feature that must be offered by a competing organization in order to survive in the marketplace.

A. Competitive advantage

 B. An entry barrier

C.         Strategic advantage

D.         Rapid time-to-market

E.         One-to-one marketing

 

 

6.                    activities create value for which customers are willing to pay, whereas     activities do not add value directly to the firm’s products or services.

a.         Support, primary

b.         Human resource management, inbound logistics

 

c.         Procurement, operations

D. Primary, support

E. Accounting, outbound logistics

 

 

7.                    issues involve collecting, storing, and disseminating information about individuals.

A. Privacy

B.         Accuracy

C.         Transwerferability

D.         Property

E.         Accessibility

 

 

8.                    issues involve the authenticity and fidelity of information that is collected and processed.

a.         Privacy

B. Accuracy

C.         TrAnswerferability

D.         Property

E.         Accessibility

 

 

9.         issues involve who may obtain information and how much they should pay for this information.

a.         Privacy

b.         Accuracy

c.         Transferability

d.         Property

e.         Accessibility

 

10.       is a legal concept that gives individuals the right to recover the damages done to them by other individuals, organizations, or systems.

A.         Privacy

B.         Responsibility

C.         TrAnswerferability

D.         Accountability E. Liability

 

11.       determines who is responsible for the actions taken.

A.         Privacy

B.         Responsibility

C.         TrAnswerferability D. Accountability

E. Liability

 

 

 

12.       means accepting the consequences of your decisions and actions.

A.         Privacy

B.         Responsibility

C.         Transferability

D.         Accountability

E.         Liability

 

 

 

 

 

13.       Applying copyrights and trademarks is an example of a(n):

a.         Accounting business process

b.         Finance business process C. Marketing business process

D. Production business process

E. Management information systems business process

 

14.       As a manager in your company, you expect to retrieve        from operational systems and present it as         to your boss, who will react based on his                   .

a.         knowledge, information, data

b.         information, data, knowledge C. data, information, knowledge

D. data, information, experience

E. information, experience, wisdom

 

15. An organization’s information technology architecture:

A.         provides a guide for current operations.

B.         provides a blueprint for future directions.

C.         integrates the information requirements of the organization and all users.

D.         is analogous to the architecture of a house. E. all of the above

 

 

16.       A(n)     is a computer program designed to support a specific task or business process.

a.         Interface

b.         Application

c.         Functional area

d.         Network

e.         Database

 

 

 

17. An organization’s IT components include all of the following except:

A.         a network.

B.         programs C. procedures

D. a database

E. monitors

 

18.       An organization’s        consists of the physical facilities, IT components, IT services, and IT management that will support the entire organization.

A. information technology architecture B. information technology infrastructure

C.         information technology

D.         information system

E.         computer-based information system

 

19. A listing of all courses offered at your university would be considered, whereas a listing of all courses required in your major would be considered .

A.         information, data

B.         knowledge, information

C.         information, knowledge D. data, information

E. data, knowledge

 

20. A purchase of books in the college bookstore is. The report at the end of the day showing sales totals for the day is         .

A.         information, knowledge

B.         information, data C. data, information

D. data, database

E. data item, business intelligence

 

 

21. Business pressures on organizations are created when there are changes in

A.         Social factors

B.         Economic factors

C.         Legal factors

D.         Political factors

E.         Changes in all of the above will create business pressures.

 

 

22.       Buyer power is when buyers have many choices from whom to buy and     when buyers have few choices.

A. high, the same B. high, low

C.         low, low

D.         low, high

E.         low, the same

 

 

23. Collecting sales tax is an example of a(n):

A.         Accounting Business Process

B.         Finance Business Process C. Marketing Business Process

D. Production Business Process

E. Management Information Systems Business Process

 

23.       Competitive advantage for an organization manifests itself as all of the following except:

a.         Lower costs

b.         Higher quality

c.         Increased time to market

d.         Increased profits

e.         Increased speed

 

 

 

24.       Development in software technologies result in

a.         Increased competition from established industry rivals

b.         Increased competition from new entrants into the industry

c.         Increased competition from new entrants offering substitute products or services

d.         A and B only E. A, B and C

 

 

25.       Enterprise resource planning systems

a.         were designed to process transactions faster.

b.         evolved because newer technologies made older systems obsolete. C. use a common database for all functional areas.

D. are utilized to conduct site analyses.

E. All the above statements are true.

 

 

 

26.       For many organizations, business process reengineering

a.         Is easy to implement.

b.         Is not disruptive to implement.

c.         Has little impact on facilities.

d.         Is inexpensive.

e.         Has a major impact on the corporate culture.

 

27.       For most companies, the Web            the threat that new competitors will enter the market by

            traditional barriers to entry.

A. decreases, increasing B. increases, decreasing

C. increases, increasing

D. decreases, decreasing

 

 

28.       How does the Internet affect the way you purchase your textbooks?

a.         The Internet gives you fewer choices.

b.         The Internet increases your bargaining power.

c.         The Internet provides you with less information.

d.         The Internet decreases your bargaining power.

e.         The Internet increases your switching costs.

 

29.       Hyo runs an ice cream store with her family. Which of the following activities is a part of their procurement process?

A.         Recording their daily sales revenue

B.         Sending an order to their sugar supplier

C.         Making the ice cream

D.         Setting up an employee schedule

E.         Taking an order for an ice cream cake

 

30.       Hyo runs an ice cream store with her family. Which of the following activities is a part of their procurement?

A.         Send an order to a supplier.

B.         Decide what to order.

C.         Record daily sales revenue

D.         Record goods received

E.         Send a check to a supplier

 

31.       Hyo runs an ice cream store with her family. Which of the following activities is a part of their fulfillment process?

A.         Receiving goods from their supplier

 

B.         Making ice cream

C.         Recording daily sales revenue

D.         Recording goods received

E.         Making a custom-order ice cream cake

 

32.       How does society keep owners of electronic bulletin boards from disseminating offensive or untrue content? This is a difficult question because it involves the conflict between          on the one hand and   on the other.

a.         The public, the individual

b.         The public, ethics

c.         Freedom of speech, privacy

d.         The individual, freedom of speech

e.         Ethics, security

 

 

 

33.       If Amazon uses a list of all your purchases (books bought, price paid, dates) to recommend other books to you, then it is applying its    .

A.         data

B.         information C. knowledge

D. experience

E. wisdom

 

34.       . IT personnel use        to produce       . A. IT components, IT services

B.         computer-based information systems, IT architecture

C.         IT infrastructure, IT architecture

D.         IT infrastructure, IT platform

E.         IT components, IT architecture

 

35.       In your new position, you are told that you will be working with a business analyst. What would you expect this work to entail?

A.         Review computer code.

B.         Explain the business process

C.         Test programs

D.         Identify new technology that might benefit the organization

E.         Create Web sites and pages

 

36.       Information-based industries are most susceptible to which one of Porter’s five forces?

A.         threat of entry of new competitors

 

B.         bargaining power of suppliers

C.         bargaining power of customers D. threat of substitute products

E. rivalry among existing firms in an industry

 

37.       If there are substitutes for an organization’s products or services, then the threat of substitutes is            .

A.         many, high

B.         few, low

C.         few, high

D.         many, low

E.         few, negligible

 

38. IT will impact managers’ jobs in all of the following ways except: A. managers will have time to get into the field

B.         managers can spend more time planning

C.         managers can spend more time “putting out fires”

D.         managers can gather information more quickly

E.         none of the above

 

 

38.       Knowledge workers

A.         handle day-to-day operations within an organization.

B.         make tactical decisions. C. advise middle managers

D. make routine decisions.

E. are generalists

 

 

39. Managing pay and payroll is an example of a(n):

A.         Accounting Business Process

B.         Finance Business Process

C.         Marketing Business Process

D.         Human Resources Business Process

E.         Management Information Systems Business Process

 

40. Managing account collections is an example of a(n):

A. Accounting Business Process B. Finance Business Process

C.         Marketing Business Process

D.         Production Business Process

 

E.         Management Information Systems Business Process

 

41. Managing purchasing is an example of a(n):

A.         Accounting Business Process

B.         Finance Business Process

C.         Marketing Business Process D. Production Business Process

E. Management Information Systems Business Process

 

42. Market pressures include which of the following? A. the global economy

B.         weak competition

C.         a homogeneous workforce

D.         weak customers

E.         high-cost offshore labor

 

 

43.       New technologies can produce new products very, which the threat from substitute products.

A.         slowly, decreases

B.         slowly, increases

C.         slowly, does not affect D. quickly, increases

E. quickly, does not affect

 

 

 

44.       Office automation systems

a.         support only the clerical staff.

b.         are comprised of software that is used to develop documents and spreadsheets C. include report generators.

D. are a type of interorganizational system.

E. are usually developed in-house.

 

 

45.       Producing identical items in large quantities is called:

a.         strategic systems.

b.         customer focus.

c.         continuous improvement. D. mass production.

E. mass customization.

 

 

 

 

46.       Producing customized items in large quantities is called:

a.         strategic systems.

b.         customer focus.

c.         continuous improvement.

d.         mass production. E. mass customization.

 

47.       Porter’s competitive forces model helps organizations identify       , whereas his value chain model helps organizations identify specific  .

A. competitive opportunities, activities B. general strategies, activities

C.         activities, competitive opportunities

D.         activities, general strategies

E.         primary activities, support activities

 

48.       Porter’s help(s) companies identify general strategies, whereas his            help(s) to identify specific activities where companies can use the strategies for greatest impact.

a.         value chain model, competitive forces model

b.         primary activities, support activities

c.         competitive forces model, primary activities D. competitive forces model, value chain model

E. value chain model, support activities

 

49. Privacy advocates prefer which model of informed consent? A. Opt-in

B.         Opt-out

C.         Either A or B

D.         Neither A nor B

 

 

50.       Refer to IT’s About Business Section Reference 1: 1.1 – Warby Parker : Which of the following statements is false?

a.         Warby Parker is using IT to provide better customer experience

b.         Warby Parker is using IT to reduce it’s cost to increase profit margins

c.         Warby Parker’s innovative IT based business model can be easily replicated

 

51.       Refer to IT’s About Business 1.3 – Different Types of Robots

 

            enable an individual to maintain a consistent connection with co-workers, customers, or clients.

A.         Drones

B.         Telepresence Robots

C.         Autonomous Cars

D.         Remote Sensors

 

52.       Refer to Closing Case: Baxter: Coming to Work Right Next to You Modern industrial robots must be suited to the following situations:

A.         They can be used in the same production line as human workers

B.         They can easily be modified to learn new tasks

C.         They should be low cost and easy to install

D.         A and C only E. All of the above

 

53. Reconciling bank accounts is an example of a(n):

A.         Accounting Business Process

B.         Finance Business Process

C.         Marketing Business Process

D.         Production Business Process

E.         Management Information Systems Business Process

 

54.       Refer to IT’s About Business 2.2 – Chevron: The changes over the past few years at Chevron were brought about by        and      at the company level and       at the local level.

a.         BPI, BPM, BPR

b.         BPR, BPI, BPM

c.         BPM, Six Sigma, BPR D. BPR, BPM and BPI

 

55.       Refer to IT’s About Business 2.3 – “Bring Your Own Device” Can Cause Problems: Hamilton Fraser’s human resource department created an acceptable use policy for their employees’ personal communication devices for the following reason:

a.         They didn’t want their employees wasting time playing games on their iPhones B. They didn’t want the corporate data to be accessible on mobile devices that were lost/misplaced

C.         They wanted to monitor how their employees were spending their time

D.         They didn’t want their employees to use social media while working

E.         They only wanted employees to use Android devices

 

56.       Refer to IT’s About Business 2.4 – The Surui Tribe of the Amazon: The Surui Tribe’s use of technology demonstrates how IT can be used to

A. to conserve natural resources B. to prevent deforestation

C.         to catch criminals

D.         to create carbon off-sets

E.         to create awareness about environmental problems

 

57.       Refer to IT’s About Business 2.5 – Massachusetts Mutual Transforms Its Information Systems: What kind of transformation did Massachusetts Mutual Transforms undergo?

a.         BPI B. BPR

C. BPM

 

58.       Refer IT’s About Business 2.1 – Sharing Bicycles. Alta’s competitive advantage stems from the fact that

a.         they have a unique product or service

b.         they have un-replicable business model

c.         they have a first mover advantage

d.         they are the cost leader in their industry

e.         none of the above

 

59. Refer to Closing Case – IBM’s Watson: IBM Watson differs from other information systems’ capabilities in the following manner:

A.         it can store vast amounts of information

B.         it can search through a large amount of information

C.         it can process natural language commands

D.         it can process large amounts of information in response to a query and assign confidence measures to a set of possible solutions

E.         it can selectively update information based on current trends on the Internet

 

60.       Refer to Opening Case– What to Do About WikiLeaks?: Which of the following is false about WikiLeaks?

A.         Anyone can submit files to WikiLeaks.

B.         The most controversial expose involved the U.S. government.

C.         Governments and companies are using network forensics to identify intruders who break into systems.

D.         Because of WikiLeaks, governments and companies are trying to use data leak prevention software to prevent unauthorized downloads.

E.         WikiLeaks is legally protected in the U.S. because it is merely a conduit for the documents.

 

61.       Refer to IT’s About Business 3.1: Pinterest: Pinterest’s user agreements allows A. Users to pin images that they have created

B.         Users to pin images from any website

C.         Users to pin images others have pinned

D.         A and C

E.         A, B and C

 

62.       Refer to IT’s About Business 3.2 -- The Dot Clones: It is easy to replicate online business models because of the following reasons

a.         eCommerce website and their business models are easy to replicate

b.         eCommerce websites can be easily sold and rebranded

c.         eCommerce websites do not require a large amount of investment

d.         eCommerce website cannot have a presence in more than one country

 

63.       Refer to IT’s About Business 3.3 -- Google Glass: Big Brother Really Is Watching You: Which of the following is true about the privacy issues surrounding the use of Google glass to record audio and visual information?

a.         It is possible to get the consent of everyone who is being recorded

b.         Audio and visual recordings from Google Glass can be used for any purpose, including legal proceedings

c.         Audio and visual recordings data are solely the property of Google

d.         Users of Google Glass have to announce to the public if they are going to record or photograph anything

 

 

64.       Refer to Closing Case: Traget Provides a Surprise: which of the following is not a source of information used by Target to profile their customers?

a.         Shopping patterns for each guest

b.         Online shopping activities

c.         User’s e-mail correspondences

d.         Customer’s public records

e.         Customer’s credit information

 

 

65.       Shelli runs a small boutique in Tel Aviv. She accepts credit cards and writes the number on her copy of the receipt in case there is a problem later. This practice involves which ethical issue related to IT?

A.         Privacy

B.         Accuracy

C.         Accountability

D.         Property (such as intellectual property)

E.         Accessibility to information

 

 

66.       Shelli runs a small boutique in Tel Aviv. She has built up a very nice client base and regularly sends her clients a newsletter. A new bakery business down the block wants to buy Shelli’s client list from her. If Shelli does sell the list, which ethical issue related to IT would be involved?

A.         Privacy

B.         Accuracy

C.         Accountability

D.         Property (such as intellectual property)

 

67.       Shelli runs a small boutique in Tel Aviv. She has built up a very nice client base and regularly sends her clients a newsletter. She keeps all her client data on her laptop in a password- protected file. Her decision to protect the file reflects which ethical issue related to IT?

A.         Privacy

B.         Accuracy

C.         Accountability

D.         Property (such as intellectual property) E. Accessibility to information

 

 

68.       Shelli runs a small boutique in Tel Aviv. She has built up a very nice client base and regularly sends her clients a newsletter. Clients fill out a form to join her mailing list. Shelli indicates on the form that client information will not be shared without permission. This policy illustrates which ethical issue related to IT?

A.         Privacy

B.         Accuracy

C.         Accountability

D.         Property (such as intellectual property)

E.         Accessibility to information

 

69.       Shelli runs a small boutique in Tel Aviv. Her intern just came to her with a new design for her Web site. Shelli really likes the design, and she informs the intern that he is quite the artist. Section reference 1The intern responds that he found the design on the Internet. Shelli replies that they can’t use it. Her decision reflects which ethical issue related to IT?

A.         Privacy

B.         Accuracy

C.         Accountability

D.         Property (such as intellectual property)

E.         Accessibility to information

 

70.       Shelli runs a small boutique in Tel Aviv. Her intern was checking the boutique’s Facebook page and noticed some negative comments. He deleted them. At the end of the day, when they

 

were closing up, he told Shelli about the comments and what he had done. Shelli was not pleased, and she told him so. Why wasn’t Shelli pleased?

A. She didn’t like hearing anything negative about her store. B. People are free to say what they wish.

C.         She thought he should ask her before he deleted them.

D.         He wasn’t supposed to be checking Facebook.

E.         All of these are reasons for Shelli’s not being pleased.

 

 

71.       The title of the executive who is in charge of the people who design and build information systems, the people who use those systems, and the people responsible for managing those systems is the

a.         CEO

b.         CFO C. CIO

D. CIS

E. CIT

 

72.       The list of all your purchases from Amazon (books bought, price paid, dates) is defined as

            .

a.         data

b.         information

c.         knowledge

d.         experience

e.         wisdom

 

73.       The IT infrastructure is comprised of and      .

A. IT components, IT personnel B. IT components, IT services

C.         IT services, IT personnel

D.         IT personnel, computer-based information systems

E.         Computer-based information systems, IT personnel

 

74.       The workforce in developed countries is exhibiting all of the following trends except:

a.         It is becoming more diversified.

b.         It includes more women.

c.         It includes more single parents.

d.         It includes fewer persons with disabilities.

e.         It includes more minority-group members.

 

75.       Today’s customers have         .

a.         less knowledge about products

b.         less sophistication

c.         difficulty in finding information about products D. higher expectations

E. difficulty in comparing prices

 

76. The digital divide is an example of which type of societal pressure? A. social responsibility

B.         government regulations

C.         protection against terrorism

D.         ethics

E.         information overload

 

77.       The Bodymetrics body scanner is best characterized as an example of:

a.         mass production.

b.         customer focus.

c.         real-time customer input. D. mass customization.

E. continuous improvement.

 

78.       The threat of competitors’ entering a market is very high in industries that perform a(n)

            role and in industries where the primary product or service is        .

a.         intermediation, physical

b.         broker, physical

c.         sales, financial

d.         financial, digital

e.         intermediation, digital

 

79.       The threat of competitors’ entering the automobile manufacturing industry is      because barriers to entry are so     .

a.         low, low

b.         high, high

c.         high, low D. low, high

 

80.       The costs of delivering products in the          channel are much higher than delivering products in the            channel.

a.         e-commerce, digital

b.         digital, e-commerce

c.         digital, physical

 

d.         physical, financial E. physical, digital

 

81.       The visibility of Internet applications on the Web makes proprietary systems more difficult to keep secret. This is an example of which of Porter’s five forces?

A.         threat of entry of new competitors

B.         bargaining power of suppliers

C.         bargaining power of customers

D.         threat of substitute products

E.         rivalry among existing firms in an industry

 

82.       Ted works in his family’s bakery business. They supply bread and rolls to neighboring restaurants, and they have their own store front where they sell breads, rolls, pastries, cookies and cupcakes. Ted wants to start a Cookie Club that gives each member (joining is free) a free cookie after they have purchased a dozen. This idea

Reflects which one of Porter’s five competitive forces?

A.         threat of entry of new competitors

B.         bargaining power of suppliers C. bargaining power of customers

D. threat of substitute products

E. rivalry among existing firms in an industry

 

83.       Ted works in his family’s bakery business. They supply bread and rolls to neighboring restaurants, and they have their own-store front where they sell breads, rolls, pastries, cookies and cupcakes. Ted wants to build a web site for the business that will allow customers to order cookies and cupcakes for later pickup.  Is this idea

A. A strategic information system B. In alignment with the business.

C.         in support of a cost leadership strategy

D.         likely to provide long term competitive advantage

E.         a support activity within the value chain

 

84.       The      ethical standard states that an ethical action is the one that provides the most good or does the least harm.

A.         Common good

B.         Fairness

C.         Rights D. Utilitarian

E. Well-being

 

85.       The ethical standard states that an ethical action is the one that best protects and respects the moral rights of the affected parties.

A.         Common good

B.         Fairness C. Rights

D. Utilitarian

E. Well-being

 

86.       The ethical standard states that ethical actions treat all human beings

equally.

A.         Common good B. Fairness

C.         Rights

D.         Utilitarian

E.         Well-being

 

87.       The ethical standard states that respect and compassion for all others is the basis for ethical actions.

A.         Common good

B.         Fairness

C.         Rights

D.         Utilitarian

E.         Well-being

 

88.       The process of profiling:

A. Increases individual privacy. B. Decreases individual privacy.

C.         Has no effect on individual privacy.

D.         Is illegal in more than half of the states.

E.         Is legal but unethical.

 

 

 

 

Option 1

Low Cost Option
Download this past answer in few clicks

13.83 USD

PURCHASE SOLUTION

Already member?


Option 2

Custom new solution created by our subject matter experts

GET A QUOTE

Related Questions