Midterm Review Flashcards
Zara’s use of information recourses has given it a substantial advantage over its competitors.
True
This risks of using information resources include all of the following except:
Missing cooperative opportunities
Porter’s value chain framework suggests that a competitive advantage can stem from:
Lowering costs and adding value
Kodak was once the largest supplier of photographic film. In 2004 it was dropped from the Dow Jones Industrial Average after having been listed for 74 years. Kodak failed to use IT to fend off which one of the following of Porter’s 5 competitive forces?
Threat of substitute products
What is co-opetition?
Companies cooperate and compete at the same time
(Example: Microsoft builds laptops but also supplies their OS to other laptop makers)
Sustaining competitive advantage
Resources must be difficult to transfer or relatively immobile
Suppose Zara has a linked supply chain with Silk City, a fabric supplier. Zara and Silk City use IT to seamlessly exchange data, communicating requirements as well as delivery expectations. The relationship between Zara andterm-48 Silk City is best described as:
Strategic alliance
L.L. Bean is an online/catalog retail company that aggressively uses tools like instant messaging to communicate with customers regarding potential purchases and uses Facebook for branding activities. This use of technology supports which strategy?
Social business strategy
Organizations seek to gain a competitive advantage by differentiation, cost, or _________.
focus
In which type of organizational structure is power distributed, and particularly suited for an environment that is dynamic and unstable?
Networked
The dimensions of national culture include all of the following EXCEPT:
The acceptance of technology by society
IS plays three important roles in management control processes. These processes are data collection, evaluation, and _______________.
communication
Which one of the following is a valid statement?
Most jobs today have a significant information systems component.
The Department of Veterans Affairs (VA) realized it did not have adequate policies, education or technology in place for remote workers when:
An employee whose laptop carrying unencrypted, sensitive military personnel information was stolen.
ERP systems have all of the following characteristics except:
They are expensive but are easy to use.
Enterprise systems are large information systems that provide the core functionality needed to run a business and share data across all divisions of the business.
True
A manager must know enough about the IT architecture and IT infrastructure so that he or she can:
Make realistic use of IT and know what to expect from IT.
Risks associated with cloud computing include all of the following EXCEPT:
Scalability
1. Increased dependency on third-party suppliers
- Security
- Retooling existing applications to move to the cloud
- Lack of standards for virtual infrastructures
If you receive an email that says it is from Sam Johnson, your boss, with an odd EXE file as an attachment, it could be dangerous for all of the following reasons except:
- It could be dangerous because the email might be from Sam’s computer without his or her knowledge.
- It could be dangerous because Sam gave someone his password once a long time ago.
- It could be dangerous because the email might not really be from Sam.
- It could be dangerous even if it was sent knowingly because Sam didn’t know a virus might be attached.
None of the above (indicating that all are true).
Included in the five critical elements that are used to raise security in a firm are all of the following except:
Law enforcement
- Infrastructure
- Training
- Policies
- Investments
Organizational, cultural, and control variables are considered the ________ used by decision makers to effect change in their organization.
managerial levers
This framework is called the ____________________ because it relates business strategy with IS strategy and organizational strategy.
Information Systems Strategy Triangle
A link between a firm’s IS strategy and organizational strategy focuses more on its external requirements than internal requirements.
True
Different organization structures reflect the different organizational strategies that are used by firms to implement their business strategy.
True
When using information technologies to collect data for the purpose of monitoring workers, a manager should do all of the following EXCEPT:
Require workers to complete additional tasks.
Cognizant needed to reinvent its organizational structure many times to make sure that it properly facilitates the flow of information between employees.
True
Which virtual team challenge is more difficult for managers to manage/manipulate since there may be a great deal of difference between groups and individuals?
Diversity
Virtual teams and remote work have advantages but no known disadvantages over face-to-face teams and showing up at an office.
False
The speed and magnitude at which organizations must make changes today continues to decrease as a result of technology.
False
In this business structure the firm is a hierarchy organized around a set of functions. Each group has a core competency that it concentrates upon.
Functional
A legacy system is all of the following, except:
A system that often holds the middle tier of a multiple-tier system.
All of the following are reasons why a company may choose to use cloud computing for its IT infrastructure EXCEPT:
Reduce dependency on third-party suppliers
On the black market, stolen data in a “kit” that contains credit card information plus social security number and medical information is worth:
between $100 and $1,000 per record
A hacker who buys credit card information from hackers receives a short-term guarantee in case the card is declined.
True
GE recognized that it could only sustain its competitive advantage for a limited time as competitors attempted to outmaneuver them. What was the model that Welch applied to help solve this problem?
Destroy your business
When an organization qualifies its product or service in a way that allows it to appear unique in the marketplace, this is called:
Differentiation