Short Answers Flashcards

1
Q

Short Answer: Identify the three ways in which information technology can impact managers and three ways it can impact non-managerial workers.

A

Potential IT impact on managers:
• Reduces the number of managers
• Provide managers with real-time or near real-time information, meaning managers will have less time to make decisions.
• Will increase the likelihood that managers will have to supervise globally
Potential IT impact on non-managerial workers.
• May eliminate jobs
• May cause employees to experience a loss of identity
• Can cause job stress and physical problems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Book Essay Question/Short Answer: Identify and discuss Porter’s model for Competitive Forces.

A
  • Threat of entry of new competition. Threat is high when entry is easy and low when there are significant barriers to entry. An entry barrier is a product or service feature that customers have learned to expect from organizations in certain industry.
  • The bargaining power of suppliers. Supplier power is high when buyers have few choices from whom to buy and low when buyers have many choices. Therefore, organizations would rather have more potential suppliers so they will be in a stronger position to negotiate price, quality, and delivery term.
  • The bargaining power of customers (buyers). Buyer power is high when buyers have many choices from whom to buy and low when buyers have few choices. For example, in the past, there were few locations for students to buy books.
  • The threat of substitute products or services. If there are many substitutes then the threat of substitutes is high. If there are few alternatives then the threat is low. IT industries experience great threats, such as vulnerabilities of desktops, servers, smart devices, open source software.
  • The rivalry among existing firms in the industry. The threat is high when there is intense competition among many firms in the industry. The threat is low when the competition is among fewer firms and is not as intense. A good example is grocery industry where margins are thin and they compete essentially on price.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Book Essay Question/Short Answer: Define ethics, list and describe the three fundamental tenets of ethics

A

Ethics refers to the principles of right and wrong that individuals use to make choices that guide their behavior…
Tenets are:
• Responsibility means you accepted the consequences of your decisions and actions.
• Accountability refers to determining who is responsible for actions that were taken.
• Liability is a legal concept that gives individuals the right to recover the damages done to them by other organizations, or individuals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Book Essay Question/Short Answer: Name six problems that can be minimized by using the database approach.

A
The database approach minimizes the following problem:
• Data redundancy
• Data isolation
• Data inconsistency
• Data security
• Data integrity
• Data independence
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Book Essay Question/Short Answer: Differentiate between the internet and the World Wide Web, and describe the most common methods for accessing the Internet

A

The internet is a global network of computer networks, using a common communication protocol, TCP/IP. The World Wide Web is a system that stores, retrieves, formats, and displays information accessible via a browser. Methods for connecting to the internet include, dial-up, DSL, cable-modem, satellite, and fiber optics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Book Essay Question/Short Answer: Identify the four major threats to wireless networks, and explain, with examples, how each one can damage a business.

A

The four major threats to wireless network are rogue access points, war driving eaves-dropping, and radio frequency jamming, details follow:
• Rogue access point is an unauthorized access point to a wireless network.
• War driving is the act of locating WLAN while driving around a city.
• Eavesdropping refers to efforts by unauthorized users to access data traveling over wireless network.
• Radio frequency jamming occurs when a person or a device, whether intentionally or unintentionally interferes with wireless network transmission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Book Essay Question/Short Answer: Describe the four main types of wireless transmission media.

A
  • Microwave systems are used for high volume, long distance line-of-sight transmission, one advantage is high volume, and disadvantage is they are susceptible to environmental interference during severe weather.
  • Satellite communication make use of communication satellites, data is received and transmitted via line-of-sight, one advantage is their enormous foot print reaches whole world, disadvantage is environmental interference.
  • Radio transmission use radio-waves frequencies to send data directly between transmitters and receivers. An advantage is radio waves travel easily through normal office walls. A disadvantage is that they are susceptible to snooping by anyone who has similar equipment operating on the same frequency.
  • Infrared light, usually are used in remote control devices, it does not penetrate walls so does not interfere with other devices in adjoining rooms. A disadvantage is they can be blocked by furniture.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Book Essay Question/Short Answer: Explain what Crowdsourcing is.

A

The process of taking a job traditionally performed by an employee or consultant and out sourcing to an undefined group of people in the form of an open call.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Book Essay Question/Short Answer: Explain the purpose of Transaction Processing System, and provide at least one example.

A

TPSs monitor, store, collect, and process data generated from all business transactions. These data provide the inputs into the organizations database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Book Essay Question/Short Answer: Describe the two major components of operational CRM systems, and list three applications used in each component.

A

These systems support the front office business processes that interact directly with customers (sales, marketing, and service). The two major components of CRM are:
Customer facing applications include customer service and support, sales force automation, marketing, campaign management.
Customer-touching applications include search and comparison capabilities, technical, and other information and services, and other information and services, customized products and services, automated response, and loyalty programs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Book Essay Question/Short Answer: Describe and provide examples of the three different ways in which organizations use BI

A

The development of one or a few related BI applications. This BI target often is a point solution for a departmental need, such as campaign management in marketing. A data-mart is created for this to store necessary data.
The development of infrastructure to support enterprise wide BI. This target supports current and future BI needs, example, and an enterprise data warehouse.
Support for organizational transformation. With this target, BI is used to fundamentally change how a company competes in the market place. BI supports a new business model and enables business strategy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly