Search
Info
Warning
Danger

Study Resources (Accounting)

61) A collection of independent firms that use information technology to coordinate their value chains to produce a product or service for a market collectively is called a(n) A) industry value chain. B) business ecosystem. C) value web. D) consortia. 62) If two organizations pool markets and expertise that result in lower costs and generate.
0 Views
View Answer
31) ________ unleash powerful economies of scale and result in declines in manufactured computer products. A) Internet and Web technologies B) Technology standards C) Linux and open-source software D) Client/server technologies 32) The multitasking, multi-user, operating system developed by Bell Laboratories that operates on a wide variety of computing platforms is A) Unix. B) Linux. C) OS X. D).
0 Views
View Answer
71) The ________ PC, becoming the standard PC in the Personal Computer Era, uses the Windows operating system software on a computer with an Intel microprocessor. 72) A(n)________ server is used to communicate between a Web server and an organization's back-end systems. 73) ________ uses individual atoms and molecules to create computer.
0 Views
View Answer
51) As described in the chapter case, the competitive force of ________ resulted in Starbuck's downturn in 2008, and it employed information systems in a strategy of ________ to combat this force. A) traditional competitors; product differentiation B) new market entrants; product specialization C) substitute products; market niche D) customers; customer intimacy 52) The Internet.
0 Views
View Answer
51) Which of the following statements about Linux is not true? A) It plays a major role in the back office running local area networks. B) It is available in free versions downloadable from the Internet. C) It has garnered 80 percent of the server operating system market. D) Linux applications are embedded in.
0 Views
View Answer
61) It is not feasible for companies to produce error-free software because A) any programming code is susceptible to error. B) it is too expensive to create perfect software. C) errors can be introduced in the maintenance stage of development. D) any software of any complexity will have errors. 62) The most common source of.
0 Views
View Answer
83) Discuss at least three key technology trends that raise ethical issues. Give an example of an ethical or moral impact connected to each one. 84) Define the basic concepts of responsibility, accountability, and liability as applied to ethical decisions. How are these concepts related? 85) What are the steps in conducting.
0 Views
View Answer
1) Even in today's legal climate, there is little incentive for firms to cooperate with prosecutors investigating financial crimes at their firm. 2) Advances in data storage have made routine violation of individual privacy more difficult. 3) The last step in analyzing an ethical issue should be to identify the stakeholders—people who.
4 Views
View Answer
11) Mass customization is a form of mass production. 12) Strong linkages to customers and suppliers decrease switching costs. 13) Business processes are collections of standard operating procedures. 14) The value chain model classifies all company activities as either primary or support. 15) In the value chain model, primary activities are most directly related.
0 Views
View Answer
71) A(n) ________ is a set of logically related activities for accomplishing a specific business result. 72) Applications that allow managers to interactively manipulate current and historical data to discover patterns and trends that will help their decision making are referred to as ________. 73) An ESS commonly uses a(n) ________ to.
0 Views
View Answer
1) All organizations have bedrock, unassailable assumptions that define their goals and products. 2) An adhocracy is a knowledge-based organization where goods and services depend on the expertise and knowledge of professionals. 3) From the point of view of economics, information systems technology can be viewed as a factor of production that.
2 Views
View Answer
61) Which of the following types of collaboration tools allows you to communicate with avatars using text messaging? A) virtual worlds B) screen sharing C) collaborative writing D) large audience Webinars 62) Which of the following is not one of the reasons for the increased business focus on collaboration and teamwork? A) the need for creating.
0 Views
View Answer
21) Which of the following best illustrates the relationship between entities and attributes? A) the entity CUSTOMER with the attribute PRODUCT B) the entity CUSTOMER with the attribute PURCHASE C) the entity PRODUCT with the attribute PURCHASE D) the entity PRODUCT with the attribute CUSTOMER 22) Which of the following is not one of the.
0 Views
View Answer
21) Identifying customers is a responsibility of the ________ function. A) finance and accounting B) human resources C) manufacturing and production D) sales and marketing 22) Producing bills of materials is a business process within the ________ function. A) finance and accounting B) human resources C) manufacturing and production D) sales and marketing 23) Which of the following is an.
0 Views
View Answer
51) You have been hired by Inspiration Inc., to help improve their profit margin. Inspiration Inc. is a business communications consultancy that services many clients in different industries throughout the United States. The end products of the company are customized recommendations for the best use of a client's existing resources.
0 Views
View Answer
83) You are advising the owner of Smalltown Computer, a new, local computer repair store that also builds custom computers to order. What competitive strategies could Smalltown Computer exert? Which ones will it have difficulty exercising? 84) You are consulting with the owner of Better Bodies, a national chain of gyms..
0 Views
View Answer
31) The process in law-governed societies in which laws are known and understood and there is an ability to appeal to higher authorities to ensure that the laws are applied correctly is called A) liability. B) due process. C) the courts of appeal. D) accountability. 32) The feature of social institutions that means mechanisms are.
0 Views
View Answer
41) The Federal Trade Commission FIP principle of Notice/Awareness states that A) customers must be allowed to choose how their information will be used for secondary purposes other than the supporting transaction. B) data collectors must take responsible steps to assure that consumer information is accurate and secure from unauthorized use. C) there.
0 Views
View Answer
11) In white-collar fraud, information systems are most typically used as a means to hide financial evidence of crimes. 12) The Copyright Office began registering software programs in the 1990s. 13) The drawback to copyright protection is that the underlying ideas behind the work are not protected, only their reproduction in a.
0 Views
View Answer
41) Connecting geographically remote computers in a single network to create a "virtual supercomputer" is called A) co-location. B) edge computing. C) grid computing. D) utility computing. 42) The business case for using grid computing involves all of the following except A) cost savings. B) increased accuracy. C) speed of computation. D) agility. 43) Which of the following does grid.
0 Views
View Answer
51) In the United States, the claim to privacy is protected primarily by each of the following except A) Constitutional guarantees of freedom of speech and association. B) Privacy Act of 1974. C) Fourth Amendment protections against unreasonable search and seizure. D) COPPA. 52) Which of the following statements about trade secrets is not true? A).
0 Views
View Answer
21) The 2012 FTC report on industry-best practices for protecting individuals' privacy focused on each of the following topics except A) mobile privacy. B) phasing out of self-regulatory codes. C) data brokers. D) large platform providers. 22) Which of the following best describes how new information systems result in legal gray areas? A) They work with.
0 Views
View Answer
87) Describe at least two benefits of using enterprise systems. 88) You have been hired to work with 10 salespeople from different branches of a national business in creating an online training site for new sales employees. Identify six collaboration tools that are available to help the team work together. Which.
0 Views
View Answer
41) The project operation A) combines relational tables to provide the user with more information than is otherwise available. B) creates a subset consisting of columns in a table. C) organizes elements into segments. D) identifies the table from which the columns will be selected. 42) Big data does not refer to A) datasets with fewer.
0 Views
View Answer
81) Explain why standards are so important in information technology. What standards have been important for the growth of Internet technologies? 82) Distinguish between grid computing, cloud computing, and utility computing. 83) List and describe four services that comprise IT infrastructure, beyond physical devices and software applications. .
0 Views
View Answer
1) A primary example of centralized processing is client/server computing. 2) In N-tier computing, significant parts of Web site content, logic, and processing are performed by different servers. 3) Application server software is responsible for locating and managing stored Web pages. 4) IT infrastructure consists of just those physical computing devices required to.
4 Views
View Answer
41) The four major enterprise applications are A) SCMs, CRMs, DSSs, and KMSs. B) SCMs, CRMs, ESSs, and KMSs. C) enterprise systems, SCMs, DSSs, and CRMs. D) enterprise systems, SCMs, CRMs, and KMSs. 42) Enterprise systems are also known as ________ systems. A) resource planning B) enterprise resource planning C) enterprise support D) management information 43) An example of a.
0 Views
View Answer
81) What is the connection between organizations, information systems, and business processes? 82) What are cross-functional business processes? Give an example. 83) Your aunt has asked you for your suggestions to make her business, a local sandwich shop, more efficient. Describe at least three types of business processes that a sandwich shop.
0 Views
View Answer
31) Non-typical business problems with causes and effects that are rapidly changing are typically handled by which type of information system? A) MIS B) TPS C) ESS D) DSS 32) ________ systems are especially suited to situations in which the procedure for arriving at a solution may not be fully defined in advance. A) Management information B).
0 Views
View Answer
31) The type of logical database model that treats data as if they were stored in two-dimensional tables is the A) non-relational DBMS. B) mobile DBMS. C) relational DBMS. D) hierarchical DBMS. 32) Oracle Database Lite is a(n) A) DBMS for small handheld computing devices. B) Internet DBMS. C) mainframe relational DBMS. D) DBMS for midrange computers. 33) Microsoft SQL.
0 Views
View Answer
21) As discussed in the chapter opening case, which of the four generic strategies did Sears employ to combat the competition offered by Target, Walmart, and Macy's? A) low-cost leadership B) focus on market niche C) customer and supplier intimacy D) product differentiation 22) The interaction between information systems and organizations is influenced A) primarily by.
0 Views
View Answer
81) One of the capabilities of Internet communication is the ability of the individual to appear essentially anonymous by using made-up user names. Is anonymity the same thing as privacy, and should it be a right? What ethical issues are raised by increased anonymity? 82) List and describe the five moral.
0 Views
View Answer
31) An example of a divisionalized bureaucracy is a A) startup firm. B) university. C) Fortune 500 firm. D) midsize manufacturer. 32) The costs incurred when a firm buys on the marketplace what it cannot make itself are referred to as A) switching costs. B) transaction costs. C) procurement. D) agency costs. 33) Which of the following statements is not.
0 Views
View Answer
21) Which type of infrastructure services provides voice and video connectivity to employees, customers, and suppliers? A) networking B) telephone C) VOIP D) telecommunications 22) Which of the following is not an IT infrastructure service component? A) operating system software B) computing platforms to provide a coherent digital environment C) physical facility management to manage the facilities housing.
1 Views
View Answer
61) The practice of contracting custom software development to an outside firm is commonly referred to as A) outsourcing. B) scaling. C) service-oriented architecture. D) application integration. 62) A formal contract between customers and their service providers that outlines the specific responsibilities of the service provider and to the customer is called a(n) A) SOA. B) SLA. C).
0 Views
View Answer
71) Capital and ________ are the primary production inputs that the organization uses to create products and services. 72) Organizational ________ describes the divergent viewpoints about how resources, rewards, and punishments should be distributed, and the struggles resulting from these differences. 73) New technologies that radically change the business landscape and environment.
0 Views
View Answer
11) In green computing, reducing computer power consumption is a top priority. 12) Autonomic computing is implemented primarily with enterprise or ISP servers. 13) Java software is designed to run on any computing device, regardless of the specific microprocessor or operating system it uses. 14) Web services can exchange information between two different.
1 Views
View Answer