HEHEHE

Your page rank:

Total word count: 7362
Pages: 27

Calculate the Price

- -
275 words
Looking for Expert Opinion?
Let us have a look at your work and suggest how to improve it!
Get a Consultant

In just five years, _____ has bought a whopping 103 firms.
a.
Microsoft

b.
Hewlett-Packard

c.
Google

d.
Oracle

e.
IBM

c.Google

Technology experts in the area of _____ specialize in technology for competitive advantage.

a.
user-interface design

b.
hardware

c.
database design

d.
strategy

e.
process design

d.strategy

Many firms are developing so-called "C-level" specialties in emerging areas with a technology focus, such as:

a.
CIO.

b.
CEO.

c.
CPO.

d.
CFO.

e.
CTO.

CPO

The _____ is a piece of U.S. legislation that raises executive and board responsibility and ties criminal penalties to certain accounting and financial violations.

a.
Fair Labor Standards Act

b.
Sherman Antitrust Act

c.
Civil Rights Act

d.
Sarbanes-Oxley Act

e.
Norris-LaGuardia Act

d. Sarbanes – Oxley Act

Yahoo! was started by _____ and _____.
\
a.
Jerry Yang; David Filo

b.
Kevin Rose; Mark Zuckerberg

c.
Steve Chen; Chad Hurley

d.
Sergey Brin; Larry Page

e.
Catherine Cook; Shawn Fanning

a.Jerry Yang; David Filo

Some of the radical changes brought about by new technologies include:

a.
an increase in computing costs owing to the growth of licensed software.

b.
the creation of an unprecedented set of security and espionage threats.

c.
the proliferation of telecommunications into the hands of a few.

d.
an increase in the standards of corporate ethics.

e.
the stagnation of advertising.

b.the creation of an unprecedented set of security and espionage threats.

A company uses radio frequency identification (RFID) tags to keep track of its inventory. This is an example of the impact of technology in the area of _____.

a.
operations

b.
human resources

c.
finance

d.
accounting

e.
advertising

a.operations

Crowdsourcing tools and question-and-answer sites like _____ allow firms to reach out for expertise beyond their organizations.

a.
Twitter

b.
MySpace

c.
MyYearbook.com

d.
Zappos

e.
Quora

e.Quora

A company uses WebEx, a popular commercial application, to conduct training sessions for its employees who are spread across different countries. This is an example of the impact of technology in the area of _____.
a.
marketing

b.
finance

c.
accounting

d.
human resources

e.
operations

d. human resources

Technology experts in the area of process design:
a.
work to make sure systems are easy to use.

b.
specialize in technology for competitive advantage.

c.
provide direction on technology-related security issues.

d.
focus on systems dealing with critical business data.

e.
leverage technology to make firms more efficient.

e.leverage technology to make firms more efficient.

_____ is the third most popular social network in the United States and was founded by Catherine Cook.

a.
MySpace

b.
MyYearbook.com

c.
Facebook

d.
LinkedIn

e.
Twitter

b. MyYearbook.com

Technology experts in the area of user-interface design:
a.
leverage technology to make firms more efficient.

b.
work to make sure systems are easy to use.

c.
provide direction on technology-related security issues.

d.
focus on effective back-up systems for critical business data.

e.
specialize in technology for competitive advantage.

b.work to make sure systems are easy to use.

Tony Hsieh served as CEO of _____, and eventually sold the firm to Amazon for $900 million.
a.
Napster

b.
LinkExchange

c.
MyYearbook.com

d.
Yahoo!

e.
Zappos

e. Zappos

Sergey Brin and Larry Page were both twenty-something doctoral students at Stanford University when they founded:

a.
Yahoo!

b.
YouTube.

c.
Google.

d.
Napster.

e.
Amazon.

c.Google.

The Emerging Technology Presentations (ETP) will be graded on which of the following criteria?

Content

Relevance

Quality Of Presentation

Technical Accuracy

Content Relevance Quality Of Presentation Technical Accuracy

TLA is a TLA which stands for [T] [L] [A].

Three Letter Acronym

CPO is an acronym which stands for [C] [P] [O].

Chief Privacy Officer

There are a few departments within an organization on which technology has NO impact.

False

The [I] [S] department in an organization not only ensures that systems get built and keep running but also take on strategic roles targeted at proposing solutions for how technology can give the firm a competitive edge.

Information System

The rise of open source software has lowered computing costs for start-up and blue chip companies worldwide.

True

Technology experts in the area of user-interface design specialize in technology for competitive advantage.

False

Firms are increasingly shifting spending from the Web to other media such as print, radio, and television as these are often easier to track and analyze.

False

The United States holds the number one ranking in home broadband access.

False

A focus solely on technology is a definite recipe for success.

False

Facebook was founded by Kevin Rose.

False

Linus Torvals created the Linux operating system.

True

In his twenties, Tony Hsieh sold LinkExchange to Amazon for over a half a million dollars.

False

Oracle acquired the highest number of companies in the span of half a decade.

False

Data analytics and business intelligence are driving discovery and innovation.

True

The number of U.S. patent applications waiting approval has significantly declined in the past decade.

False

[N] effects exist when a product or service becomes more valuable as more people use it.

Network

Durable brands are built through customer experience.

True

Netflix uses data to create tailored audience promotions.

True

The Netflix work culture is in many ways similar to its peers.

False

ROI is a term used to represent the:
a.
amount earned from an expenditure.

b.
relative profitability of an investment project, of a capitalist enterprise, or of the capitalist economy as a whole.

c.
average IT expenditure of a firm as a percentage of its revenue.

d.
efficiency of converting collected raw data into information that can be leveraged.

e.
rate of return on the ownership interest of common stock owners.

a. amount earned from an expenditure.

Dell’s fall in market share due to rivals copying its value chain is cited as a precedent for Zara. However, which of the following factors suggests that Zara’s value chain might be more difficult to copy?
a.
Zara is backward vertically integrated while Dell has tended to be more forward vertically integrated.

b.
Zara’s scale advantage ensures its market share is more than that of all its rivals’ put together.

c.
Zara’s costs are pegged to the stronger euro as compared to Dell, which was dollar-based.

d.
Clothing is more complex than computing, in terms of number of new models offered.

e.
The computer industry, unlike clothing, is influenced by several extrinsic factors, such as economic recession.

d.Clothing is more complex than computing, in terms of number of new models offered.

The Zara experience involves a regular supply of new stocks on the shelves, because of which customers tend to visit Zara’s stores more often than they visit other retailers’ stores. However, such a policy will become more expensive to maintain if:
a.
star designers demand a higher fee for its designs.

b.
PDAs are not used.

c.
fuel costs rise.

d.
Zara’s horizontal integration fails.

e.
Zara outsources its production process.

c.fuel costs rise.

In retail in general and fashion in particular, having _____ is considered the kiss of death.
a.
dispersed production facilities

b.
limited production runs

c.
a large labor force

d.
too many storefronts

e.
excess inventory

e.excess inventory

A firm is said to have suffered from the [O] Effect when it preannounces a forthcoming product or service, and experiences a sharp and detrimental drop in sales of current offerings as users wait for the new item.

Osborne

Netflix offers its subscribers a selection of over one hundred thousand titles, while other video rental firms can only offer as much as three thousand. This presents a significant _____ for Netflix over its rivals.
a.
variable cost

b.
marginal cost

c.
studio preference

d.
price advantage

e.
scale advantage

e.scale advantage

Brands are built through _____.
a.
customer experience

b.
excessive advertising

c.
data assets

d.
customer awareness

e.
customer profiling

a.customer experience

Which of the following statements is true about retailing?
a.
More money can be made through the sale of latest products than obscure items.

b.
Internet retailers stock their shelves with only popular items.

c.
Both traditional and internet retailers face limitations such as shelf space and geography.

d.
Accessibility rather than selection attracts customers.

e.
Nearly limitless selection allows Internet retailers to leverage the long tail.

Nearly limitless selection allows Internet retailers to leverage the long tail.

Netflix enjoys the triple scale advantage of the largest customer base, the largest selection, and the largest network of distribution centers. This can be attributed to:
a.
Netflix’s first-mover advantage.

b.
Netflix’s effective and aggressive pricing strategy.

c.
Netflix’s specialized focus on advertising and marketing.

d.
Netflix going public to generate funds for expansion.

e.
the bargaining clout it exercises over movie studios and the government.

Netflix’s first-mover advantage.

Elaborate customer surveys help Zara designers predict fashion trends months into the future and design products accordingly.

False

An information system consists of hardware, software, data, procedures, and the people who interact with and are impacted by the system.

False

In terms of percentage of revenue spent on advertising, Zara has possibly the lowest figures in the whole industry.

True

The [C] Effect suggest that increasing numbers of users lowers the value of a product or service.

Congestion

Viral promotion involves:
a.
emphasizing customer retention and satisfaction, rather than a dominant focus on sales transactions.

b.
offering rebates and incentives to customers for adopting a product or service.

c.
sending a pre-written set of messages to customers or prospects over time.

d.
paying celebrities to use a product visibly to lure customers into unwittingly buying the product.

c.
leveraging a firm’s customers to promote a product or service.

leveraging a firm’s customers to promote a product or service.

Which of the following is an example of a measure taken by a firm to encourage the development of complementary goods?
a.
Nintendo’s Wii games targeted at families, women, and older age groups

b.
Google’s support of the Open Social standard for social networking

c.
Microsoft bundling new products into Windows, Internet Explorer browser, and other offerings

d.
Adobe giving away the Acrobat Reader for free

e.
Apple’s iTunes that allows developers to sell their products online

Apple’s iTunes that allows developers to sell their products online

Profitability of online auctions is derived mainly from selling:
a.
popular products.

b.
newly released goods.

c.
trade goods.

d.
differentiated goods.

e.
commodities.

differentiated goods.

A firm can spend no money and time, yet expect to enhance its offerings, by:

a.
outsourcing critical processes to third parties.

b.
allowing other firms to contribute to its platform.

c.
preannouncing a forthcoming product to lower sales of current offerings.

d.
adopting an envelopment strategy.

e.
going public through an initial public stock offering.

allowing other firms to contribute to its platform.

Firms that constantly innovate do so to develop open standards for competitors to become compatible.

False

In the context of network effects, the term "network" refers to wireless systems that connect pieces of electronics.

False

The natural state of a market where network effects are present is for there to be intense competition between several rivals.

False

[C] are nearly identically products or services which are offered from multiple vendors.

Commodities

Many telecom firms began digging up the ground and laying webs of fiberglass to meet the growing demand for Internet connectivity. However, rivals and startups began to imitate these firms and soon these new assets were not so rare and each day they seemed to be less valuable. It can be inferred from this example that:
a.
the telecommunications market is only big enough to support one or two major players.

b.
resource-based thinking can help avoid the trap of carelessly entering markets simply because growth is spotted.

c.
technology assets that require high investment and maintenance are liable to becoming obsolete much quicker than others.

d.
the immense scale advantages enjoyed by major firms can help them fight off competition from newer entrants.

e.
the scale of technology investment required to run a business is not a huge enough factor to act as a barrier to entry for new, smaller competitors.

resource-based thinking can help avoid the trap of carelessly entering markets simply because growth is spotted.

The paths through which products or services get to customers are known as _____.
a.
information pathways

b.
horizontal markets

c.
distribution channels

d.
vertical markets

e.
proxy networks

distribution channels

Dell, previously the world’s number one PC manufacturer, has seen its market share shrink because of rivals copying its value chain and reducing the price advantage it enjoyed over rivals. Dell’s present struggles:
a.
highlight the fact that scale advantages of an established firm are a huge factor in discouraging newer entrants to a market.

b.
underscore the importance of continually assessing a firm’s strategic position among changing market conditions.

c.
are a result of rivals adopting supply chain management of software products that have yielded competitive advantages.

d.
imply that if a firm’s value chain helps to create and strengthen other strategic assets over time, it can be a key source for competitive advantage.

e.
demonstrate that resource-based thinking can help firms avoid the trap of carelessly entering markets simply because growth is spotted.

underscore the importance of continually assessing a firm’s strategic position among changing market conditions.

Kathy has access to the Internet and is able to search and compare the price and quality of the products she wants to purchase. However, Martin does not have access to the Internet and stays in a remote town where he is not able to get such details regarding the product or service he wants to purchase. Such a decision situation where Kathy has more or better knowledge about products or services than Martin is known as _____.
a.
positional awareness

b.
information asymmetry

c.
strategic superiority

d.
operational precedence

e.
data redundancy

information asymmetry

Metcalfe’s Law is used to explain the concept of switching costs.

False

Changes that impact one industry do not necessarily impact other industries in the same way.

True

If a firm’s goods are highly differentiated, the Internet can lessen the firm’s supplier bargaining power.

False

This process of converting a code into machine-readable form is known as:

a.
sequencing.

b.
debugging.

c.
assimilating.

d.
compiling.

e.
integrating.

Compiling

Java is not optimized to take advantage of interface elements specific to the Mac or Windows operating systems. As a result:
a.
Java is not platform independent.

b.
Java code has to be compiled and then interpreted, before being executed by the processor.

c.
Java code that is compiled for the native OS and processor is slower than code running through a JVM interpreter.

d.
Java lacks a structured programming style.

e.
Java is unsuitable for desktop applications.

Java is unsuitable for desktop applications.

Which of the following is an example of application software?

a.
Mac OS

b.
Linux

c.
MS Windows

d.
Adobe Flash

e.
MS Word

MS Word

_____ provide the standards, syntax, statements, and instructions for writing computer software.
a.
Application servers

b.
Platforms

c.
Operating systems

d..
Programming languages

e.
Database management systems

Programming languages

Systems that use data created by other systems to provide reporting and analysis for organizational decision making are called _____ systems.
a.
supply chain management

b.
business intelligence

c.
customer relationship management

d.
enterprise resource management

e.
application server

business intelligence

Replacing computing resources – either an organization’s or individual’s hardware or software – with services provided over the Internet is known as [C] computing.

Cloud

Moore’s Law is dead.

False

What is the result of the rapid, technological change predicted by Moore’s law?

A.

Open Source Software

B.

Wearable technology

C.

Free computers

D..

E-waste

E.

Ubiquitous computing

E-waste

The process of separating out the densely packed materials inside tech products so that the value in e-waste can be effectively harvested is extremely skill intensive.

False

Grid computing, though faster and more efficient, is an expensive alternative to supercomputers.

False

Moore’s Law has impacted the camera industry such that the firms that sell the most cameras aren’t camera companies, but phone manufacturers

True

All of the costs associated with the design, development, testing, implementation, documentation, training and maintenance of a software system are collectively termed as:
a.
total cost of ownership.

b.
economic value added.

c.
return on investment.

d.
cost to company.

e.
economies of scale.

total cost of ownership.

_____ provide the infrastructure backbone to SaaS and hardware cloud efforts, as well as many large-scale Internet services.
a.
Neural networks

b.
Data warehouses

c.
Private clouds

d.
Server farms

e.
Content delivery networks

Server farms

Which of the following is true of software as a service (SaaS)?
a.
SaaS vendors are less attuned to customer needs.

b.
Saas firms face diseconomies of scale.

c.
It refers to software that is made available by a third-party online.

d.
Firms spend more using SaaS.

e.
There are no accounting and corporate finance implications for SaaS.

It refers to software that is made available by a third-party online.

_____ is a term used to describe unpredictable, but highly impactful events.

a.
Flash outs

b.
Black swans

c.
Straddling

d.
Viral trojans

e.
Power plays

Black swans

Vendors frequently sign _____ with their customers to ensure a guaranteed uptime and define their ability to meet demand spikes.
a.
infrastructure provider contracts

b.
host vendor terms

c.
open source contracts

d.
requests for information

e.
service level agreements

service level agreements

[L] is the dominant Open Source Software (OSS) Operating System (it was used in a Demo in class).

Linux

From a IT Managerial perspective, the cost of data storage should be measured in:

A.

Dollars

B.

Transmission Speed

C.

Web

D.

Bits

E.

Bytes

Bytes

EDI is easier to code and more robust than XML because it can be extended.

False

Desktop applications are typically designed for a single user.

True

The care and feeding of information systems is usually simple and inexpensive.

False

One of the drawbacks of open source software is that it cannot be easily migrated to more powerful computers as circumstances dictate.

False

SaaS offerings usually work well when the bulk of computing happens at the client end of a distributed system.

False

Linux is one of the most used operating systems in desktop computers, but can be found only in a tiny fraction of mobile phones, and consumer electronics.

False

Based on the author’s take on e-waste management, a manager would do well to learn that:
a.
dealing with e-waste at home can be ten times cheaper than sending it abroad.

b.
it is simple enough for firms to monitor and track e-waste management through international agencies such as Fair Factories Clearinghouse.

c.
disposal and recycling partners must be audited with the same vigor as suppliers and other partners.

d.
environmentalists target only the big firms as they can afford to compensate for any environmental damage wrought by their practices.

e.
appointing environmentalists like Al Gore to the firm’s board of directors helps avoid legal action and brand tarnishing due to bad e-waste management practices.

disposal and recycling partners must be audited with the same vigor as suppliers and other partners.

Moore’s Law has been in effect since the _____ wave of computing.
a.
first

b.
fourth

c.
second

d.
third

e.
fifth

second

1 petabyte = 1 _____ bytes
a.
trillion

b.
million

c.
billion

d.
sextillion

e.
quadrillion

quadrillion

Which of the following is a way to recognize potentially disruptive innovations?
a.
Pay attention to slow-expensive advancements in technology.

b.
Become more consumer-focused.

c.
Remove shortsightedness regarding the future.

d.
Indulge in bottom-line obsession.

e.
Increase conversation within same product groups.

Remove shortsightedness regarding the future.

Which of the following is an example of volatile memory?
a.
Nanodrive

b.
Read-only memory

c.
Optical disk drive

d.
Flash memory

e.
Random-access memory

Random-access memory

The Brain of a computer is also known as the [C] [P] [U]. What do the letters CPU stand for?

Central Processing Unit

The current wave of computing is characterized by which of the following:

A.

PCs Break Onto The Scene, Affordable For Everyone

B.

Large, Room Sized Computers

C.

Ubiquitous (Everywhere And In Everything)

D.

Minicomputers, Fridge-sized

E.

The Internet, Everyone Is Connected

Ubiquitous (Everywhere And In Everything)

As identified by the Group 1 Emerging Technology Presentation on RFID, one of the current, potential dangers or problems of RFID is:
A.

Too complicated

B.

Limited use in retail business

C.

Cancer from radio waves

D.

Skimming information

E.

Too much data on the tags

Skimming information

Attacks that are so new that they have not been clearly identified, and so have not made it into security screening systems are called _____.
a.
brute force attacks

b.
zero-day exploits

c.
non-precedent breaches

d.
novel attacks

e.
first mover attacks

zero-day exploits

Cyber criminals who infiltrate systems and collect data for illegal resale are called _____.
a.
information hoarders

b.
ethical hackers

c.
data harvesters

d.
corporate spies

e.
cash-out fraudsters

data harvesters

A domain name service is a collection of software that:
a.
directs the flow of traffic across the Internet.

b.
allots domain names to different Web sites.

c.
assigns IP addresses to different systems.

d.
maintains a registry of different IP addresses.

e.
maps an Internet address to an IP address.

maps an Internet address to an IP address.

Technologies that measure and analyze human body characteristics for identification or authentication are known as _____.
a.
overlamination processes

b.
bio-embedded systems

c.
holographs

d.
biometrics

e.
smart tags

biometrics

Spyware is defined as a type of software that:
a.
monitors user actions or scans for files surreptitiously.

b.
infects other software and decreases the network speeds.

c.
scans for loopholes in other software and releases malware payloads.

d.
clogs up network traffic and disables networks.

e.
serves up unwanted advertisements after being installed without user knowledge.

monitors user actions or scans for files surreptitiously.

An organization’s partner firms that should be regularly audited to ensure that they are compliant with security frameworks include:
a.
clients.

b.
technology providers and contract firms.

c.
international standards organizations.

d.
law-enforcement agencies.

e.
government regulatory bodies.

technology providers and contract firms.

Which of the following is a valid statement on information security?
a.
Technology lapses are solely responsible for almost all security breaches.

b.
A reactive, rather than proactive, approach is better suited for dealing with security breaches.

c.
Security breaches cannot be prevented despite the adoption of the best security policies.

d.
Information security is everybody’s responsibility.

e.
Greater expenditure on security products is the only way to contain security breaches

Information security is everybody’s responsibility.

The typical Web user has 6.5 passwords, each of which is used at four sites, on average.

True

Regularly updated software lowers a system’s vulnerable attack surface.

True

Cyber criminals who infiltrate systems and collect data for illegal resale are called cash-out fraudsters.

False

A black hat hacker looks for weaknesses in security mechanisms, with a view to help plug the holes that might be exploited by cyber-criminals.

False

In public-key encryption systems, the functions of the public and private keys are interchangeable.

False

Spear phishing attacks specifically target a given organization or group of users.

True

When using a public wireless network, using VPN software is not advisable as it can reveal your communications to any network eavesdroppers.

False

As identified by the Group 2 Emerging Technology Presentation, BCI stand for [B] [C] [I]?

Brain Computer Interface

As identified by the Group 2 Emerging Technology Presentation, which of the following are BCI methods:

Semi-Invasive Method

Non-Invasive Method

Invasive Method

Semi-Invasive Method Non-Invasive Method Invasive Method

The Internet has no center and no one owns it.

True

A device gets its IP address from whichever organization is currently connecting it to the Internet.

True

The User Datagram Protocol (UDP) acts as a substitute to TCP when there is a need for speed of communication and quality can be sacrificed.

True

It is feared that innovation might suffer as a result of the transition of Internet services from flat-rate pricing to metered usage.

True

In the URL, the host name is the name of the network a user tries to connect to.

False

DSL technology is expensive for service providers in the United States because of the sparsely populated cities.

True

Circuit-switched networks are more efficient than packet-switched networks because of the nature of the dedicated connection they provide.

False

The basis of CAPTCHA is the:

The Internet

Turing test

Amdahl’s Law

Bandwidth

Moore’s Law

Turing test

During the video "How the internet works in 5 minutes or less", the internet is described as what?

Wire

Cloud

Two Computers

Wild-west

Electricity

Wire

_____ act as storage places where a firm’s servers get super-fast connections as close to the action as possible.
a.
Internet exchange points

b.
Incubation facilities

c.
Dispatch facilities

d.
Colocation facilities

e.
Preening facilities

Colocation facilities

The address one types into a Web browser is also known as a:

a.
unique resource locator.

b.
universal redirection link.

c.
uniform resource locator.

d.
universal redirection locator.

e.
uniform resource link.

uniform resource locator.

Peering usually takes place at neutral sites called _____.
a.
STPs

b.
ISPs

c.
IPs

d.
https

e.
IXPs

IXPs

What protocol do most Web developers use to upload the Web pages, graphics, and other files for their Web sites?
a.
SNMP

b.
SMTP

c.
FTP

d.
TCP

e.
HTTP

FTP

The domain name service (DNS) is a distributed database that allows users to communicate with other computers by:
a.
mapping host names to domain names.

b.
assigning domain names to different IP addresses.

c.
creating IP addresses that are unique to servers.

d.
mapping host and domain names to IP addresses of computers.

e.
assigning IP addresses to different domain names.

mapping host and domain names to IP addresses of computers.

Key Inc., an American guitar maker, recently lost an action to recover the domain name piano-key.com, claiming that the defendant infringed on its registered trademark. What did Key Inc. specifically accuse the defendant of?
a.
Computer trespassing

b.
Domain hoarding

c.
Sugging

d.
Cybersquatting

e.
Internet stalking

Cybersquatting

Which of the following statements is true of the term "FTTH"?
a.
It refers to high-speed data lines provided by many firms all across the world that interconnect and collectively form the core of the Internet.

b.
It refers to a situation when separate ISPs link their networks to swap traffic on the Internet.

c.
It refers to broadband service provided via light-transmitting fiber-optic cables.

d.
It refers to a system that connects end users to the Internet.

e.
It refers to the language used to compose Web pages

It refers to broadband service provided via light-transmitting fiber-optic cables.

[P] is the primary issue in how companies entice customers to provide them with data.

Privacy

During our in-class discussion on Business Intelligence (Unit 5), we identified Microsoft Excel as a database program.

False

The most significant enabler of Business Intelligence is:
A.

Data

B.

People

C.

Education

D.

Technology

E.

Culture

Technology

Firms that base decisions on hunches are said to be gambling, not managing.

True

Random occurrences in data mining results can be detected by dividing the data and building a model with one portion and using another portion to verify the results.

True

Turning data into useable information is hindered by transactional databases that are set up to be simultaneously accessed for reporting and analysis.

False

Data miners should realize that first findings of analytics always reveal an optimal course of action.

False

A study by Gartner Research claims that the amount of data on corporate hard drives doubles every eighteen months.

False

Conventional reports look more like a spreadsheet, with the various dimensions of analysis in rows and columns, with summary values at the intersection.

False

In database terminology, a record represents:
a.
a single instance of whatever the table keeps track of.

b.
each category of data contained in a row.

c.
a list of data, arranged in columns and rows.

d.
one or more keys that relate separate tables in a database.

e.
a field or combination of fields used to uniquely identify a file.

a single instance of whatever the table keeps track of.

One of the factors that complicates the elimination of legacy systems is the:
a.
low market value for outdated hardware and software.

b.
unavailability of suitable data porting methods to offset data redundancy.

c.
frequency at which technology improves as per Moore’s law.

d.
absence of regulatory mechanisms to handle the efficient disposal of legacy systems.

e.
costs associated with breaking extended vendor or outsourcer agreements.

costs associated with breaking extended vendor or outsourcer agreements.

A(n) _____ refers to a heads-up display of critical indicators that allow managers to get a graphical glance at key performance metrics.
a.
embassy

b.
dashboard

c.
prediction interface

d.
interstitial

e.
canned report

dashboard

Which of the following questions relate to data quantity?
a.
What data is needed to compete on analytics and to meet our current and future goals?

b.
How should the firm handle security and access?

c.
Can we even get the data we’ll need?

d.
How much data is needed?

e.
Where will the systems be housed?

How much data is needed?

Which of the following is often considered a defensible source of competitive advantage?
a.
Market capital

b.
Technology

c.
Data

d.
Profits

e.
Infrastructure

Data

Knowledge is defined as:
a.
the process of breaking a complex topic into smaller parts.

b.
the insight derived from experience and expertise.

c.
the data presented in a context so that it can answer a question or support decision making.

d.
raw facts and figures.

e.
a listing of primary data.

the insight derived from experience and expertise.

Amazon went seven whole years without turning a profit.

True

Accounts payable periods do not vary.

False

Amazon instantly links its Kindle customers with the firm’s entire inventory of physical products.

True

Amazon’s cloud computing business is taking baby steps in that category.

False

Amazon got its start selling games online.

False

Amazon has limited its products to only books.

False

Data may NOT be a defensible source of competitive advantage (a true strategic asset) if it is…
A.

Lacking Substitutes

B.

Imperfectly Imitable

C.

Valuable

D.

Rare

E.

Disruptive

Disruptive

The periood between distributing cash and collecting funds associated with a given operation (a.k.a. the Cash Coversion Cycle) may never be negative.

False

From the Group 3 Emerging Technology Presentation on Solar Roadways, which of the following was NOT identified as a benefit?
A.

Heated

B.

No Potholes

C.

Sustaining Technology

D.

Durable

E.

Lights Up

Sustaining Technology

According to the Group 3 Emerging Technology Presentation on Solar Roadways, if a parking lot or highway is full of vehicles, the solar surfaces will not product energy.

False

Which of the following models is used for most databases?
A.

Access

B.

Relational

C.

Hierarchical

D.

Network

E.

Spreadsheet

Relational

Mark, a retailer, is unable to sell his products. He doesn’t have sufficient cash to meet his on-going expenses. In this scenario, Mark is facing a(n) _____.
a.
high inventory turnover problem

b.
environmental problem

c.
sugging problem

d.
stock-out problem

e.
liquidity problem

liquidity problem

Identify the true statement about Amazon.
a.
Amazon’s AWS cloud computing business is one of the smallest players in that category.

b.
Amazon was founded by Sam Walton.

c.
Amazon has maintained consistent profitability over the years and analysts continue to predict profits in the firm’s future.

d.
Amazon’s profitability has varied widely and analysts continue to struggle to interpret the firm’s future.

e.
Amazon initially adopted the domain of a non-profit organization.

Amazon’s profitability has varied widely and analysts continue to struggle to interpret the firm’s future.

Inventory turns is:
a.
the number of times an inventory item moves within a warehouse.

b.
high when the rate of selling merchandise is low.

c.
also known as gross-profit margin turnover.

d.
the stock of inventory returned to a manufacturer due to poor quality.

e.
the number of times inventory is sold or used during a specific period.

the number of times inventory is sold or used during a specific period.

Amazon Web Services (AWS):
a.
is a fool-proof system.

b.
doesn’t provide services such as programming environments.

c.
forms a majority percentage of Amazon’s overall revenue.

d.
was introduced in 2012, although some offerings were available since 2010.

e.
offer several advantages, including increased scalability, reliability, and security.

offer several advantages, including increased scalability, reliability, and security.

Amazon
a.
started making profits from the second year of its operation.

b.
has maintained consistent profitability over the years and analysts continue to predict profits in the firm’s future.

c.
has centered its focus on quarterly results.

d.
has expanded to dozens of categories beyond books.

e.
initially adopted the domain of a non-profit organization.

has expanded to dozens of categories beyond books.

In Amazon, shelvers are in charge of:
a.
all the activities associated with the preventive maintenance of a warehouse.

b.
keeping track of items that produce the most sales volume.

c.
placing items in available spaces.

d.
building one’s order from a warehouse’s inventory.

e.
signalling a warehouse ‘problem solver’ in the case of an issue in the warehouse.

placing items in available spaces.

Each time an ad is served to a user for viewing is referred to as a(n) [I].

Impression

[P] is the algorithm developed by Google cofounder Larry Page to rank Web sites.

PageRank

[O] search refers to the search engine results that are returned and ranked according to relevance.

Organic Search

Google uses the kind of Intel or AMD processors, low-end hard drives, and RAM chips that one would find in a desktop PC.

True

In-game advertising makes more sense in racing or other sports games than it does for games set in the past, future, or on other worlds.

True

Huddle in Google+ helps users manage sharing contacts.

False

Google’s interest-based ads have been accused of profiling users on the basis of race, religion, sexual orientation, health, political, or trade union affiliation, and certain financial categories.

False

Text ads appearing on Google search pages are billed on a cost-per-thousand impressions (CPM) basis.

False

Online advertising represents the only advertising category trending with positive growth.

True

Enriching click fraud refers to the practice in which site operators generate false page views in order to boost their site’s CPM earnings.

False

Running ads on a Web site is a guaranteed path to profits.

False

Google allows users to install a cookie that enables them to opt out of interest-based tracking.

True

If several people use the same browser on the same computer without logging on to that machine as separate users, then all of their Web surfing activity may be mixed into the same cookie profile.

True

"Cookies cannot reliably identify individual user."
Which of the following is the reason for the statement shown above?
a.
Individual users use different browsers on the same computer to surf the Web.

b.
Individuals use different log-in accounts on the same computer to browse the Internet.

c.
Internet service providers assign arbitrary IP addresses to devices accessing the Internet from the same network.

d.
Cookies assigned by Web servers are prone to duplication.

e.
The explosion in Internet-enabled mobile devices has resulted in an acute shortage of IP addresses.

a.Individual users use different browsers on the same computer to surf the Web.

If a firm’s pages are not near the top of query results, customers may never discover its Web site. This has led to _____ becoming a critical function for many marketing organizations.
a.
last mile access

b.
content adjacency

c.
load balancing

d.
geotargeting

e.
search engine optimization

e.search engine optimization

Which of the following is Google’s biggest acquisition to date?

a.
DoubleClick

b.
Motorola Mobility

c.
Zagat

d.
Android

e.
YouTube

b.Motorola Mobility

Which of the following statements holds true for the term cache?
a.
It refers to software that traverses available Web links in an attempt to perform a given task.

b.
It refers to a temporary storage space used to speed computing tasks.

c.
It refers to Internet content that can’t be indexed by Google and other search engines.

d.
It refers to the Internet directory service that allows devices and services to be named and discoverable.

e.
It refers to the process of improving a page’s organic search results.

b.It refers to a temporary storage space used to speed computing tasks.

Which of the following statements holds true for the term spider?
a.
It refers to a temporary storage space used to speed computing tasks.

b.
It refers to software that traverses available Web links in an attempt to perform a given task.

c.
It refers to the Internet directory service that allows devices and services to be named and discoverable.

d.
It refers to Internet content that can’t be indexed by Google and other search engines.

e.
It refers to the process of improving a page’s organic search results.

b.It refers to software that traverses available Web links in an attempt to perform a given task.

Which of the following statements holds true for the term server farm?
a.
It refers to a closed network or single set of services controlled by one dominant firm.

b.
It refers to a group of surreptitiously infiltrated computers linked and controlled remotely.

c.
It refers to a network of users with distinct IP addresses, engaged in click fraud.

d.
It refers to a tracking cookie used to identify users and record behavior across multiple Web sites.

e.
It refers to a massive network of computer servers running software to coordinate their collective use.

e.It refers to a massive network of computer servers running software to coordinate their collective use.

Nearly 30 percent of Google’s revenues come from running ads on:
a.
third-party Web sites.

b.
competing search engines.

c.
the Android platform.

d.
built-in toolbars.

e.
its organic search pages.

a.third-party Web sites.

_____ allows users to pay for goods, store gift cards, and redeem coupons using their mobile phones.
a.
Google Wallet

b.
Google+

c.
Takeout

d.
Android

e.
Google Currents

a.Google Wallet

Which of the following formulas is used by Google to determine the rank order of sponsored links appearing on its search results pages?
a.
Ad rank = Minimum CPC × Click-through rate

b.
Ad rank = Churn rate × Average cost-per-click

c.
Ad rank = Maximum CTR × Number of impressions

d.
Ad rank = Maximum CPC × Quality score

e.
Ad rank = Cost-per-thousand impressions × Number of impressions

d.Ad rank = Maximum CPC × Quality score

Which of the following statements holds true for the term dark Web?
a.
It refers to a temporary storage space used to speed computing tasks.

b.
It refers to the Internet directory service that allows devices and services to be named and discoverable.

c.
It refers to the process of improving a page’s organic search results.

d.
It refers to Internet content that can’t be indexed by Google and other search engines.

e.
It refers to software that traverses available Web links in an attempt to perform a given task.

d.It refers to Internet content that can’t be indexed by Google and other search engines.

Which of the following statements holds true for search engine optimization (SEO)?
a.
It refers to a temporary storage space used to speed computing tasks.

b.
It refers to the process of improving a page’s organic search results.

c.
It refers to the Internet directory service that allows devices and services to be named and discoverable.

d.
It refers to Internet content that can’t be indexed by Google and other search engines.

e.
It refers to software that traverses available Web links in an attempt to perform a given task.

b.It refers to the process of improving a page’s organic search results.

Which of the following is true about market maturity?
a.
Finding new growth markets that are as lucrative as matured markets becomes easier for leaders.

b.
Small fluctuations in annual revenues create huge movements in the stock prices of firms.

c.
Mature markets are gradually discarded by all firms in the industry.

d.
Prices tend to increase due to the mass exit of competing firms from the market.

e.
Without substantial year-on-year growth, stock prices of firms do not move.

e.Without substantial year-on-year growth, stock prices of firms do not move.

Google mounts racks of servers inside standard-sized shipping containers, each with as many as 1,160 servers per box. Google assumes individual components will regularly fail, but no single failure should interrupt the firm’s operations. By doing so, Google can ensure its network is:
a.
data optimized.

b.
service-regulated.

c.
organically searched.

d.
traffic efficient.

e.
fault-tolerant.

e.fault-tolerant.

Which of the following statements holds true for the term plug-in?
a.
It refers to the generation of bogus clicks, either for financial gain or to attack rivals by draining their online ad budget.

b.
It refers to a program (typically a marketing effort) that requires customer consent.

c.
It refers to recruiting a network of users with the goal of spreading IP addresses across several systems.

d.
It refers to a program that enrolls all customers by default, but that allows consumers to discontinue participation if they want to.

e.
It refers to a small computer program that extends the feature set or capabilities of another application.

e.It refers to a small computer program that extends the feature set or capabilities of another application.

Which of the following metrics is used by Google to develop a precise ad ranking formula that rewards top-performing ads?
a.
Number of keywords that trigger an ad

b.
Ratio of graphical content to text content in the ad

c.
The minimum cost-per-click an advertiser is willing to pay

d.
Relevance of keywords to Web site content

e.
An advertisement’s quality score

e.An advertisement’s quality score

Of the various social products associated with a user’s profile on Google+, _____ offers group texting.
a.
Stream

b.
Messenger

c.
Sparks

d.
Hangouts

e.
Circle

b.Messenger

Which of the following is an example of an anomalous pattern typical of online advertising frauds?
a.
Clicks that fit standard surfing patterns for geography

b.
A low number of clicks originating from a certain country

c.
Clicks that fit the standard surfing patterns for time

d.
Too many visits to a new, obscure site

e.
Uniform click-through rates across comparable sites

d.Too many visits to a new, obscure site

_____ are served by ad networks or other customer profiling firms to identify users and record behavior across multiple Web sites.
a.
Plug-ins

b.
Third-party cookies

c.
Honeypots

d.
Interstitials

e.
Creatives

b.Third-party cookies

Which of the following statements holds true for the term cost-per-click?
a.
It refers to the ad rates quoted in cost-per-thousand impressions.

b.
It refers to the number of users who clicked an ad divided by the number of times the ad was delivered.

c.
It refers to the cost an advertiser is willing to bear for a particular amount of time a surfer spends on an ad.

d.
It refers to the maximum amount of money an advertiser is willing to pay for each click on their ad.

e.
It refers to the number of customers joining a particular social networking Web site.

d.It refers to the maximum amount of money an advertiser is willing to pay for each click on their ad.

Which of the following statements holds true for the term click farm?
a.
It refers to the generation of bogus clicks, either for financial gain or to attack rivals by draining their online ad budget.

b.
It refers to a program that requires customer consent.

c.
It refers to a small computer program that extends the feature set or capabilities of another application.

d.
It refers to a program that enrolls all customers by default, but that allows consumers to discontinue participation if they want to.

e.
It refers to recruiting a network of users with the goal of spreading IP addresses across several systems and making a fraud effort more difficult to detect.

e.It refers to recruiting a network of users with the goal of spreading IP addresses across several systems and making a fraud effort more difficult to detect.

Share This
Flashcard

More flashcards like this

NCLEX 10000 Integumentary Disorders

When assessing a client with partial-thickness burns over 60% of the body, which finding should the nurse report immediately? a) ...

Read more

NCLEX 300-NEURO

A client with amyotrophic lateral sclerosis (ALS) tells the nurse, "Sometimes I feel so frustrated. I can’t do anything without ...

Read more

NASM Flashcards

Which of the following is the process of getting oxygen from the environment to the tissues of the body? Diffusion ...

Read more

Unfinished tasks keep piling up?

Let us complete them for you. Quickly and professionally.

Check Price

Successful message
sending