In just five years, _____ has bought a whopping 103 firms. b. c. d. e. |
c.Google |
Technology experts in the area of _____ specialize in technology for competitive advantage. a.
b.
c.
d.
e. |
d.strategy |
Many firms are developing so-called "C-level" specialties in emerging areas with a technology focus, such as:
a.
b.
c.
d.
e. |
CPO |
The _____ is a piece of U.S. legislation that raises executive and board responsibility and ties criminal penalties to certain accounting and financial violations. a.
b.
c.
d.
e. |
d. Sarbanes – Oxley Act |
Yahoo! was started by _____ and _____.
b.
c.
d.
e. |
a.Jerry Yang; David Filo |
Some of the radical changes brought about by new technologies include: a. b. c. d. e. |
b.the creation of an unprecedented set of security and espionage threats. |
A company uses radio frequency identification (RFID) tags to keep track of its inventory. This is an example of the impact of technology in the area of _____.
a.
b.
c.
d.
e. |
a.operations |
Crowdsourcing tools and question-and-answer sites like _____ allow firms to reach out for expertise beyond their organizations. a.
b.
c.
d.
e. |
e.Quora |
A company uses WebEx, a popular commercial application, to conduct training sessions for its employees who are spread across different countries. This is an example of the impact of technology in the area of _____.
b.
c.
d.
e. |
d. human resources |
Technology experts in the area of process design:
b.
c.
d.
e. |
e.leverage technology to make firms more efficient. |
_____ is the third most popular social network in the United States and was founded by Catherine Cook. a.
b.
c.
d.
e. |
b. MyYearbook.com |
Technology experts in the area of user-interface design:
b.
c.
d.
e. |
b.work to make sure systems are easy to use. |
Tony Hsieh served as CEO of _____, and eventually sold the firm to Amazon for $900 million.
b.
c.
d. e. |
e. Zappos |
Sergey Brin and Larry Page were both twenty-something doctoral students at Stanford University when they founded:
a.
b.
c.
d.
e. |
c.Google. |
The Emerging Technology Presentations (ETP) will be graded on which of the following criteria? Content Relevance Quality Of Presentation Technical Accuracy |
Content Relevance Quality Of Presentation Technical Accuracy |
TLA is a TLA which stands for [T] [L] [A]. |
Three Letter Acronym |
CPO is an acronym which stands for [C] [P] [O]. |
Chief Privacy Officer |
There are a few departments within an organization on which technology has NO impact. |
False |
The [I] [S] department in an organization not only ensures that systems get built and keep running but also take on strategic roles targeted at proposing solutions for how technology can give the firm a competitive edge. |
Information System |
The rise of open source software has lowered computing costs for start-up and blue chip companies worldwide. |
True |
Technology experts in the area of user-interface design specialize in technology for competitive advantage. |
False |
Firms are increasingly shifting spending from the Web to other media such as print, radio, and television as these are often easier to track and analyze. |
False |
The United States holds the number one ranking in home broadband access. |
False |
A focus solely on technology is a definite recipe for success. |
False |
Facebook was founded by Kevin Rose. |
False |
Linus Torvals created the Linux operating system. |
True |
In his twenties, Tony Hsieh sold LinkExchange to Amazon for over a half a million dollars. |
False |
Oracle acquired the highest number of companies in the span of half a decade. |
False |
Data analytics and business intelligence are driving discovery and innovation. |
True |
The number of U.S. patent applications waiting approval has significantly declined in the past decade. |
False |
[N] effects exist when a product or service becomes more valuable as more people use it. |
Network |
Durable brands are built through customer experience. |
True |
Netflix uses data to create tailored audience promotions. |
True |
The Netflix work culture is in many ways similar to its peers. |
False |
ROI is a term used to represent the:
b.
c.
d.
e. |
a. amount earned from an expenditure. |
Dell’s fall in market share due to rivals copying its value chain is cited as a precedent for Zara. However, which of the following factors suggests that Zara’s value chain might be more difficult to copy?
b.
c.
d.
e. |
d.Clothing is more complex than computing, in terms of number of new models offered. |
The Zara experience involves a regular supply of new stocks on the shelves, because of which customers tend to visit Zara’s stores more often than they visit other retailers’ stores. However, such a policy will become more expensive to maintain if:
b.
c.
d.
e. |
c.fuel costs rise. |
In retail in general and fashion in particular, having _____ is considered the kiss of death.
b.
c.
d.
e. |
e.excess inventory |
A firm is said to have suffered from the [O] Effect when it preannounces a forthcoming product or service, and experiences a sharp and detrimental drop in sales of current offerings as users wait for the new item. |
Osborne |
Netflix offers its subscribers a selection of over one hundred thousand titles, while other video rental firms can only offer as much as three thousand. This presents a significant _____ for Netflix over its rivals.
b.
c.
d.
e. |
e.scale advantage |
Brands are built through _____.
b.
c.
d.
e. |
a.customer experience |
Which of the following statements is true about retailing?
b.
c.
d.
e. |
Nearly limitless selection allows Internet retailers to leverage the long tail. |
Netflix enjoys the triple scale advantage of the largest customer base, the largest selection, and the largest network of distribution centers. This can be attributed to:
b.
c.
d.
e. |
Netflix’s first-mover advantage. |
Elaborate customer surveys help Zara designers predict fashion trends months into the future and design products accordingly. |
False |
An information system consists of hardware, software, data, procedures, and the people who interact with and are impacted by the system. |
False |
In terms of percentage of revenue spent on advertising, Zara has possibly the lowest figures in the whole industry. |
True |
The [C] Effect suggest that increasing numbers of users lowers the value of a product or service. |
Congestion |
Viral promotion involves:
b.
c.
d.
c. |
leveraging a firm’s customers to promote a product or service. |
Which of the following is an example of a measure taken by a firm to encourage the development of complementary goods?
b.
c.
d.
e. |
Apple’s iTunes that allows developers to sell their products online |
Profitability of online auctions is derived mainly from selling:
b.
c.
d.
e. |
differentiated goods. |
A firm can spend no money and time, yet expect to enhance its offerings, by: a.
b.
c.
d.
e. |
allowing other firms to contribute to its platform. |
Firms that constantly innovate do so to develop open standards for competitors to become compatible. |
False |
In the context of network effects, the term "network" refers to wireless systems that connect pieces of electronics. |
False |
The natural state of a market where network effects are present is for there to be intense competition between several rivals. |
False |
[C] are nearly identically products or services which are offered from multiple vendors. |
Commodities |
Many telecom firms began digging up the ground and laying webs of fiberglass to meet the growing demand for Internet connectivity. However, rivals and startups began to imitate these firms and soon these new assets were not so rare and each day they seemed to be less valuable. It can be inferred from this example that:
b.
c.
d.
e. |
resource-based thinking can help avoid the trap of carelessly entering markets simply because growth is spotted. |
The paths through which products or services get to customers are known as _____.
b.
c.
d.
e. |
distribution channels |
Dell, previously the world’s number one PC manufacturer, has seen its market share shrink because of rivals copying its value chain and reducing the price advantage it enjoyed over rivals. Dell’s present struggles:
b.
c.
d.
e. |
underscore the importance of continually assessing a firm’s strategic position among changing market conditions. |
Kathy has access to the Internet and is able to search and compare the price and quality of the products she wants to purchase. However, Martin does not have access to the Internet and stays in a remote town where he is not able to get such details regarding the product or service he wants to purchase. Such a decision situation where Kathy has more or better knowledge about products or services than Martin is known as _____.
b.
c.
d.
e. |
information asymmetry |
Metcalfe’s Law is used to explain the concept of switching costs. |
False |
Changes that impact one industry do not necessarily impact other industries in the same way. |
True |
If a firm’s goods are highly differentiated, the Internet can lessen the firm’s supplier bargaining power. |
False |
This process of converting a code into machine-readable form is known as:
a.
b.
c.
d.
e. |
Compiling |
Java is not optimized to take advantage of interface elements specific to the Mac or Windows operating systems. As a result:
b.
c.
d.
e. |
Java is unsuitable for desktop applications. |
Which of the following is an example of application software?
a.
b.
c.
d.
e. |
MS Word |
_____ provide the standards, syntax, statements, and instructions for writing computer software.
b.
c.
d..
e. |
Programming languages |
Systems that use data created by other systems to provide reporting and analysis for organizational decision making are called _____ systems.
b.
c.
d.
e. |
business intelligence |
Replacing computing resources – either an organization’s or individual’s hardware or software – with services provided over the Internet is known as [C] computing. |
Cloud |
Moore’s Law is dead. |
False |
What is the result of the rapid, technological change predicted by Moore’s law? A. Open Source Software B. Wearable technology C. Free computers D.. E-waste E. Ubiquitous computing |
E-waste |
The process of separating out the densely packed materials inside tech products so that the value in e-waste can be effectively harvested is extremely skill intensive. |
False |
Grid computing, though faster and more efficient, is an expensive alternative to supercomputers. |
False |
Moore’s Law has impacted the camera industry such that the firms that sell the most cameras aren’t camera companies, but phone manufacturers |
True |
All of the costs associated with the design, development, testing, implementation, documentation, training and maintenance of a software system are collectively termed as:
b.
c.
d.
e. |
total cost of ownership. |
_____ provide the infrastructure backbone to SaaS and hardware cloud efforts, as well as many large-scale Internet services.
b.
c.
d.
e. |
Server farms |
Which of the following is true of software as a service (SaaS)?
b.
c.
d.
e. |
It refers to software that is made available by a third-party online. |
_____ is a term used to describe unpredictable, but highly impactful events. a.
b.
c.
d.
e. |
Black swans |
Vendors frequently sign _____ with their customers to ensure a guaranteed uptime and define their ability to meet demand spikes.
b.
c.
d.
e. |
service level agreements |
[L] is the dominant Open Source Software (OSS) Operating System (it was used in a Demo in class). |
Linux |
From a IT Managerial perspective, the cost of data storage should be measured in: A. Dollars B. Transmission Speed C. Web D. Bits E. Bytes |
Bytes |
EDI is easier to code and more robust than XML because it can be extended. |
False |
Desktop applications are typically designed for a single user. |
True |
The care and feeding of information systems is usually simple and inexpensive. |
False |
One of the drawbacks of open source software is that it cannot be easily migrated to more powerful computers as circumstances dictate. |
False |
SaaS offerings usually work well when the bulk of computing happens at the client end of a distributed system. |
False |
Linux is one of the most used operating systems in desktop computers, but can be found only in a tiny fraction of mobile phones, and consumer electronics. |
False |
Based on the author’s take on e-waste management, a manager would do well to learn that:
b.
c.
d.
e. |
disposal and recycling partners must be audited with the same vigor as suppliers and other partners. |
Moore’s Law has been in effect since the _____ wave of computing.
b.
c.
d.
e. |
second |
1 petabyte = 1 _____ bytes
b.
c.
d.
e. |
quadrillion |
Which of the following is a way to recognize potentially disruptive innovations?
b.
c.
d.
e. |
Remove shortsightedness regarding the future. |
Which of the following is an example of volatile memory?
b.
c.
d.
e. |
Random-access memory |
The Brain of a computer is also known as the [C] [P] [U]. What do the letters CPU stand for? |
Central Processing Unit |
The current wave of computing is characterized by which of the following: A. PCs Break Onto The Scene, Affordable For Everyone B. Large, Room Sized Computers C. Ubiquitous (Everywhere And In Everything) D. Minicomputers, Fridge-sized E. The Internet, Everyone Is Connected |
Ubiquitous (Everywhere And In Everything) |
As identified by the Group 1 Emerging Technology Presentation on RFID, one of the current, potential dangers or problems of RFID is: Too complicated B. Limited use in retail business C. Cancer from radio waves D. Skimming information E. Too much data on the tags |
Skimming information |
Attacks that are so new that they have not been clearly identified, and so have not made it into security screening systems are called _____.
b.
c.
d.
e. |
zero-day exploits |
Cyber criminals who infiltrate systems and collect data for illegal resale are called _____.
b.
c.
d.
e. |
data harvesters |
A domain name service is a collection of software that:
b.
c.
d.
e. |
maps an Internet address to an IP address. |
Technologies that measure and analyze human body characteristics for identification or authentication are known as _____.
b.
c.
d.
e. |
biometrics |
Spyware is defined as a type of software that:
b.
c.
d.
e. |
monitors user actions or scans for files surreptitiously. |
An organization’s partner firms that should be regularly audited to ensure that they are compliant with security frameworks include:
b.
c.
d.
e. |
technology providers and contract firms. |
Which of the following is a valid statement on information security?
b.
c.
d.
e. |
Information security is everybody’s responsibility. |
The typical Web user has 6.5 passwords, each of which is used at four sites, on average. |
True |
Regularly updated software lowers a system’s vulnerable attack surface. |
True |
Cyber criminals who infiltrate systems and collect data for illegal resale are called cash-out fraudsters. |
False |
A black hat hacker looks for weaknesses in security mechanisms, with a view to help plug the holes that might be exploited by cyber-criminals. |
False |
In public-key encryption systems, the functions of the public and private keys are interchangeable. |
False |
Spear phishing attacks specifically target a given organization or group of users. |
True |
When using a public wireless network, using VPN software is not advisable as it can reveal your communications to any network eavesdroppers. |
False |
As identified by the Group 2 Emerging Technology Presentation, BCI stand for [B] [C] [I]? |
Brain Computer Interface |
As identified by the Group 2 Emerging Technology Presentation, which of the following are BCI methods: Semi-Invasive Method Non-Invasive Method Invasive Method |
Semi-Invasive Method Non-Invasive Method Invasive Method |
The Internet has no center and no one owns it. |
True |
A device gets its IP address from whichever organization is currently connecting it to the Internet. |
True |
The User Datagram Protocol (UDP) acts as a substitute to TCP when there is a need for speed of communication and quality can be sacrificed. |
True |
It is feared that innovation might suffer as a result of the transition of Internet services from flat-rate pricing to metered usage. |
True |
In the URL, the host name is the name of the network a user tries to connect to. |
False |
DSL technology is expensive for service providers in the United States because of the sparsely populated cities. |
True |
Circuit-switched networks are more efficient than packet-switched networks because of the nature of the dedicated connection they provide. |
False |
The basis of CAPTCHA is the: The Internet Turing test Amdahl’s Law Bandwidth Moore’s Law |
Turing test |
During the video "How the internet works in 5 minutes or less", the internet is described as what? Wire Cloud Two Computers Wild-west Electricity |
Wire |
_____ act as storage places where a firm’s servers get super-fast connections as close to the action as possible.
b.
c.
d.
e. |
Colocation facilities |
The address one types into a Web browser is also known as a: a.
b.
c.
d.
e. |
uniform resource locator. |
Peering usually takes place at neutral sites called _____.
b.
c.
d.
e. |
IXPs |
What protocol do most Web developers use to upload the Web pages, graphics, and other files for their Web sites?
b.
c.
d.
e. |
FTP |
The domain name service (DNS) is a distributed database that allows users to communicate with other computers by:
b.
c.
d.
e. |
mapping host and domain names to IP addresses of computers. |
Key Inc., an American guitar maker, recently lost an action to recover the domain name piano-key.com, claiming that the defendant infringed on its registered trademark. What did Key Inc. specifically accuse the defendant of?
b.
c.
d.
e. |
Cybersquatting |
Which of the following statements is true of the term "FTTH"?
b.
c.
d.
e. |
It refers to broadband service provided via light-transmitting fiber-optic cables. |
[P] is the primary issue in how companies entice customers to provide them with data. |
Privacy |
During our in-class discussion on Business Intelligence (Unit 5), we identified Microsoft Excel as a database program. |
False |
The most significant enabler of Business Intelligence is: Data B. People C. Education D. Technology E. Culture |
Technology |
Firms that base decisions on hunches are said to be gambling, not managing. |
True |
Random occurrences in data mining results can be detected by dividing the data and building a model with one portion and using another portion to verify the results. |
True |
Turning data into useable information is hindered by transactional databases that are set up to be simultaneously accessed for reporting and analysis. |
False |
Data miners should realize that first findings of analytics always reveal an optimal course of action. |
False |
A study by Gartner Research claims that the amount of data on corporate hard drives doubles every eighteen months. |
False |
Conventional reports look more like a spreadsheet, with the various dimensions of analysis in rows and columns, with summary values at the intersection. |
False |
In database terminology, a record represents:
b.
c.
d.
e. |
a single instance of whatever the table keeps track of. |
One of the factors that complicates the elimination of legacy systems is the:
b.
c.
d.
e. |
costs associated with breaking extended vendor or outsourcer agreements. |
A(n) _____ refers to a heads-up display of critical indicators that allow managers to get a graphical glance at key performance metrics.
b.
c.
d.
e. |
dashboard |
Which of the following questions relate to data quantity?
b.
c.
d.
e. |
How much data is needed? |
Which of the following is often considered a defensible source of competitive advantage?
b.
c.
d.
e. |
Data |
Knowledge is defined as:
b.
c.
d.
e. |
the insight derived from experience and expertise. |
Amazon went seven whole years without turning a profit. |
True |
Accounts payable periods do not vary. |
False |
Amazon instantly links its Kindle customers with the firm’s entire inventory of physical products. |
True |
Amazon’s cloud computing business is taking baby steps in that category. |
False |
Amazon got its start selling games online. |
False |
Amazon has limited its products to only books. |
False |
Data may NOT be a defensible source of competitive advantage (a true strategic asset) if it is… Lacking Substitutes B. Imperfectly Imitable C. Valuable D. Rare E. Disruptive |
Disruptive |
The periood between distributing cash and collecting funds associated with a given operation (a.k.a. the Cash Coversion Cycle) may never be negative. |
False |
From the Group 3 Emerging Technology Presentation on Solar Roadways, which of the following was NOT identified as a benefit? Heated B. No Potholes C. Sustaining Technology D. Durable E. Lights Up |
Sustaining Technology |
According to the Group 3 Emerging Technology Presentation on Solar Roadways, if a parking lot or highway is full of vehicles, the solar surfaces will not product energy. |
False |
Which of the following models is used for most databases? Access B. Relational C. Hierarchical D. Network E. Spreadsheet |
Relational |
Mark, a retailer, is unable to sell his products. He doesn’t have sufficient cash to meet his on-going expenses. In this scenario, Mark is facing a(n) _____.
b.
c.
d.
e. |
liquidity problem |
Identify the true statement about Amazon.
b.
c.
d.
e. |
Amazon’s profitability has varied widely and analysts continue to struggle to interpret the firm’s future. |
Inventory turns is:
b.
c.
d.
e. |
the number of times inventory is sold or used during a specific period. |
Amazon Web Services (AWS):
b.
c.
d.
e. |
offer several advantages, including increased scalability, reliability, and security. |
Amazon
b.
c.
d.
e. |
has expanded to dozens of categories beyond books. |
In Amazon, shelvers are in charge of:
b.
c.
d.
e. |
placing items in available spaces. |
Each time an ad is served to a user for viewing is referred to as a(n) [I]. |
Impression |
[P] is the algorithm developed by Google cofounder Larry Page to rank Web sites. |
PageRank |
[O] search refers to the search engine results that are returned and ranked according to relevance. |
Organic Search |
Google uses the kind of Intel or AMD processors, low-end hard drives, and RAM chips that one would find in a desktop PC. |
True |
In-game advertising makes more sense in racing or other sports games than it does for games set in the past, future, or on other worlds. |
True |
Huddle in Google+ helps users manage sharing contacts. |
False |
Google’s interest-based ads have been accused of profiling users on the basis of race, religion, sexual orientation, health, political, or trade union affiliation, and certain financial categories. |
False |
Text ads appearing on Google search pages are billed on a cost-per-thousand impressions (CPM) basis. |
False |
Online advertising represents the only advertising category trending with positive growth. |
True |
Enriching click fraud refers to the practice in which site operators generate false page views in order to boost their site’s CPM earnings. |
False |
Running ads on a Web site is a guaranteed path to profits. |
False |
Google allows users to install a cookie that enables them to opt out of interest-based tracking. |
True |
If several people use the same browser on the same computer without logging on to that machine as separate users, then all of their Web surfing activity may be mixed into the same cookie profile. |
True |
"Cookies cannot reliably identify individual user."
b.
c.
d.
e. |
a.Individual users use different browsers on the same computer to surf the Web. |
If a firm’s pages are not near the top of query results, customers may never discover its Web site. This has led to _____ becoming a critical function for many marketing organizations.
b.
c.
d.
e. |
e.search engine optimization |
Which of the following is Google’s biggest acquisition to date?
a.
b.
c.
d.
e. |
b.Motorola Mobility |
Which of the following statements holds true for the term cache?
b.
c.
d.
e. |
b.It refers to a temporary storage space used to speed computing tasks. |
Which of the following statements holds true for the term spider?
b.
c.
d.
e. |
b.It refers to software that traverses available Web links in an attempt to perform a given task. |
Which of the following statements holds true for the term server farm?
b.
c.
d.
e. |
e.It refers to a massive network of computer servers running software to coordinate their collective use. |
Nearly 30 percent of Google’s revenues come from running ads on:
b.
c.
d.
e. |
a.third-party Web sites. |
_____ allows users to pay for goods, store gift cards, and redeem coupons using their mobile phones.
b.
c.
d.
e. |
a.Google Wallet |
Which of the following formulas is used by Google to determine the rank order of sponsored links appearing on its search results pages?
b.
c.
d.
e. |
d.Ad rank = Maximum CPC × Quality score |
Which of the following statements holds true for the term dark Web?
b.
c.
d.
e. |
d.It refers to Internet content that can’t be indexed by Google and other search engines. |
Which of the following statements holds true for search engine optimization (SEO)?
b.
c.
d.
e. |
b.It refers to the process of improving a page’s organic search results. |
Which of the following is true about market maturity?
b.
c.
d.
e. |
e.Without substantial year-on-year growth, stock prices of firms do not move. |
Google mounts racks of servers inside standard-sized shipping containers, each with as many as 1,160 servers per box. Google assumes individual components will regularly fail, but no single failure should interrupt the firm’s operations. By doing so, Google can ensure its network is:
b.
c.
d.
e. |
e.fault-tolerant. |
Which of the following statements holds true for the term plug-in?
b.
c.
d.
e. |
e.It refers to a small computer program that extends the feature set or capabilities of another application. |
Which of the following metrics is used by Google to develop a precise ad ranking formula that rewards top-performing ads?
b.
c.
d.
e. |
e.An advertisement’s quality score |
Of the various social products associated with a user’s profile on Google+, _____ offers group texting.
b.
c.
d.
e. |
b.Messenger |
Which of the following is an example of an anomalous pattern typical of online advertising frauds?
b.
c.
d.
e. |
d.Too many visits to a new, obscure site |
_____ are served by ad networks or other customer profiling firms to identify users and record behavior across multiple Web sites.
b.
c.
d.
e. |
b.Third-party cookies |
Which of the following statements holds true for the term cost-per-click?
b.
c.
d.
e. |
d.It refers to the maximum amount of money an advertiser is willing to pay for each click on their ad. |
Which of the following statements holds true for the term click farm?
b.
c.
d.
e. |
e.It refers to recruiting a network of users with the goal of spreading IP addresses across several systems and making a fraud effort more difficult to detect. |
HEHEHE
Share This
Unfinished tasks keep piling up?
Let us complete them for you. Quickly and professionally.
Check Price