Skip to document

393 Midterm Study Guide Laudon

Columbia college Management 393 books by Laudon midterm study guide fo...
Course

Business Communication (MGMT254W)

3 Documents
Students shared 3 documents in this course
Academic year: 2021/2022
Uploaded by:
0followers
0Uploads
3upvotes

Comments

Please sign in or register to post comments.

Preview text

Which of the following best describes how new information systems can result in legal gray areas? They result in new situations that are not covered by old laws.

Which of the following best describes the effect that new information technology has on society? It has a ripple effect, raising new ethical, social, and political issues.

The obligations that individuals and organizations have regarding the preservation of existing values and institutions fall within which of the following moral dimensions of the information age? Quality of life

Which of the following is not one of the current key technology trends that raises ethical issues? Increase in data quality

Which of the five moral dimensions of the information age do the central business activities of DoubleClick involve? Information rights and obligations

Which of the following is a data analysis technology that finds hidden connections between data in disparate sources? NORA

All of the following are steps in the process for analyzing an ethical issue except: assigning responsibility.

A colleague at work takes small amounts of office supplies for her own personal use, saying that this is a tiny loss to the company. You tell her that if everyone were to take office supplies, then the loss would no longer be minimal. Your rationale expresses which of the following ethical principles? Kant's Categorical Imperative

A man steals from a grocery store in order to feed his starving family. Which of the following best expresses the utilitarian principle in evaluating this situation? His action is acceptable, because the higher social value is the survival of the family.

Which of the following best describes Immanuel Kant's categorical imperative? If an action is not right for everyone to take, it is not right for anyone to take.

The ethical "no free lunch" rule states that: if something someone else has created is useful to you, it has value, and you should assume the creator wants compensation for this work.

What specific principles for conduct can be used to guide ethical decisions? Six ethical principles for judging conduct include the Golden Rule, Immanuel Kant's Categorical Imperative, Descates' rule or change, the Utilitarian Principle, the Risk Aversion Principle, and the ethical "no free lunch" rule. These principles should be used in conjunction with an ethical analysis.

According to ________, you should take the action that produces the least harm.

1

the risk aversion principle

When a cookie is created during a website visit, it is stored: on the hard drive of the visitor's computer.

Why do contemporary information systems technology and the Internet pose challenges to the protection of individual privacy and intellectual property? Contemporary data storage and data analysis technology enables companies to easily gather personal data about individuals from many different sources and analyze these data to create detailed electronic profile about individuals and their behaviors. Data flowing over the Internet can be monitored at many points. Cookies and other Web monitoring tools closely track the activities of Web site visitors. Not all Web sites have strong privacy protection policies, and they do not always allow for informed consent regarding the use of personal information. Traditional copyright laws are insufficient to protect against software privacy because digital material can be copied so easily and transmitted to many different locations simultaneously over the Internet.

The GDPR created a ________ framework in order to enable U. businesses to legally use personal data from EU countries. safe harbor

Why do contemporary information systems technology and the Internet pose challenges to the protection of individual privacy and intellectual property? Contemporary data storage and data analysis technology enables companies to easily gather personal data about individuals from many different sources and analyze these data to create detailed electronic profile about individuals and their behaviors. Data flowing over the Internet can be monitored at many points. Cookies and other Web monitoring tools closely track the activities of Web site visitors. Not all Web sites have strong privacy protection policies, and they do not always allow for informed consent regarding the use of personal information. Traditional copyright laws are insufficient to protect against software privacy because digital material can be copied so easily and transmitted to many different locations simultaneously over the Internet.

What percent of global Internet users use Google Search and other Google services such as YouTube? Nearly 80 percent

The NAI is an industry association formed to help with which of the following? Online privacy issues

Which of the following adjusts copyright laws to the Internet age by making it illegal to circumvent technology- based protections of copyrighted materials? Digital Millennium Copyright Act

Advertisers use ________ in order to display more relevant ads based on a user's search and browsing history. behavioral targeting

________ grants the owner exclusive ownership of the ideas behind an invention for 20 years. Patent law

2

All of the following are typically factors in a firm's decision to engage consulting and system integration services except: The firm's staff knows more about the firm's IT infrastructure than service providers.

Which of the following is the most popular mobile operating system? Android

The ability to be in multiple states at once, dramatically increasing processing power, is a hallmark of: quantum computing. Which of the following is a recent addition to the mobile digital platform? Wearable computing devices

At what percent of capacity do most servers operate?

15-20%

Which of the following types of computing involves purchasing computing power from a remote provider and paying only for the computing power used?

On-demand

A(n) ________ is an integrated circuit which contains two or more processors to enhance performance and reduce power consumption. multicore processor

SaaS refers to: hosting and managing access to software applications delivered over the Internet to clients on a subscription basis.

Which of the following involves practices and technologies to minimize the environmental effects of manufacturing and managing computing devices? Green computing

Which type of software is created and updated by a worldwide community of programmers and available for free? Open source

Linux is: an example of open-source software.

Which of the following statements about Linux is not true? It has garnered 20 percent of the server operating system market.

Running a Java program on a computer requires: a Java Virtual Machine to be installed on that computer.

4

Sets of loosely coupled software components that exchange information with each other using standard web communication standards and languages are referred to as: web services. Which of the following is the foundation technology for web services? XML

Which of the following refers to a set of self-contained services that communicate with each other to create a working software application? SOA

The practice of contracting custom software development to an outside firm is commonly referred to as: outsourcing. A formal contract between customers and their service providers that outlines the specific responsibilities of the service provider and to the customer is called a(n): SLA.

________ provides a standard format for data exchange, enabling web services to pass data from one process to another. XML

Which of the following refers to the ability of a computer, product, or system to expand to serve a larger number of users without breaking down? Scalability

Hardware and software acquisition costs account for about ________ percent of TCO. 20

Which model can be used to analyze the direct and indirect costs to help firms determine the actual cost of specific technology implementations? Total cost of ownership

Which of the following is not one of the main six factors to consider when evaluating how much your firm should spend on IT infrastructure? Your firm's organizational culture

Which of the following best illustrates the relationship between entities and attributes? B) The entity CUSTOMER with the attribute PURCHASE

  1. A database ________ describes a database entity. C) record

  2. ________ creates confusion that hampers the creation of information systems that integrate data from different sources. B) Data redundancy

  3. Data ________ occurs when the same data is duplicated in multiple files of a database. A) redundancy 5

  4. An organization's rules for sharing, disseminating, acquiring, standardizing, classifying, and inventorying information is called a(n): A) information policy.

  5. Which of the following is not a method for performing a data quality audit? C) Surveying data definition and query files

  6. In a large organization, which of the following functions would be responsible for policies and procedures for managing internal data resources? A) Data administration

  7. The Internet is based on which three key technologies? C) Client/server computing, packet switching, and the development of communications standards for linking networks and computers

  8. In TCP/IP, IP is responsible for which of the following? A) Disassembling and reassembling packets during transmission

  9. What are the four layers of the TCP/IP reference model? C) Application, Transport, Internet, and Network Interface

  10. On which of the following protocols is the Internet based? A) TCP/IP

  11. Client/server computing is a: D) distributed computing model where clients are linked to one another through a network that is controlled by a network server computer.

  12. Which signal types are represented by a continuous waveform? E) Analog

  13. Which type of network is used to connect digital devices within a city or metropolitan area? MAN

  14. Bandwidth is the: B) number of cycles per second that can be sent through a medium. C) difference between the highest and lowest frequencies that can be accommodated on a single channel.

  15. Digital subscriber lines: A) operate over existing telephone lines to carry voice, data, and video.

  16. T1 lines: E) are high-speed, leased data lines providing guaranteed service levels. Difficulty: Moderate

  17. ________ integrate disparate channels for voice communications, data communications, instant messaging, email, and electronic conferencing into a single experience. E) Unified communications

7

  1. Web browser software requests web pages from the Internet using which of the following protocols? B) HTTP

  2. Which of the following pulls content from websites and feeds it automatically to users' computers? B) RSS

  3. Which process is used to protect transmitted data in a VPN? A) Tunneling

  4. Shopping bots use ________ software for searching the Internet. C) intelligent agent

  5. A(n) ________ is software for locating and managing stored web pages. A) web server

The Internet of Things (IoT) refers to: billions of Internet-connected sensors.

Which digital cellular standard is used widely throughout the world except the United States? GSM

Wireless sensor networks (WSNs) are used for the following tasks except: identifying vehicles for trucking firms.

4G networks use which of the following standards? LTE and WiMax

Which of the following statements about 5G is true? 5G will be able to transmit data in the gigabit range.

Bluetooth can be used to link up to ________ devices within a 10-meter area using low-power, radio-based communication. eight

The 802 set of standards is known as: A) WLAN.

Which type of application does Macy's use to track items for sale on store shelves? RFID application

A(n) ________ is a box consisting of a radio receiver/transmitter and antennas that links to a wired network, router, or hub. access point

You can use text mining tools to analyze unstructured data, such as memos and legal cases. -TRUE

You can manipulate data on a web server by using a CGI script.

8

True

Intranets link different systems and networks within a firm. True

Producing a bill of materials is a business process in which of the following functional areas? Manufacturing and production

The ________ function is responsible for making sure customers are aware of the company's products. sales and marketing

Identifying customers is a business process handled by the marketing function. True

One example of a business process is shipping a product to a customer. True

To monitor the status of internal operations and the firm's relations with the external environment, managers need which of the following types of system? TPS

The term management information systems refers to a specific category of information systems serving: middle management functions.

The four major types of enterprise applications are: ERP, SCM, CRM, and KMS.

Which of the following types of system would you use to manage relationships with your customers? CRM

Which of the following would you use to consolidate the relevant knowledge and experience in the firm and make it available to improve business processes and management decision making? KMS

Using ________ to enable government relationships with citizens, businesses, and other arms of government is called e-government. the Internet and networking technologies

A web interface used to present integrated personalized business content to users is called a portal. True

Customer relationship management systems coordinate all of the business processes that deal with customers in sales, marketing, and service. True

Which of the following is the greatest obstacle in enabling collaboration between employees at different, distant corporate locations? Time zones

Which of the following is not a business benefit of collaboration?

10

Improved compliance with government regulations

Which of the following job categories is expected to experience the most growth over the next eight years? Security analysts

Which of the following statements about organizations is not true? An informal group can be considered to be an organization.

Which of the following technologies disrupted the traditional publishing industry? World Wide Web

All of the following statements are true about information technology's impact on business firms except: it helps firms expand in size.

According to research on organizational resistance, the four components that must be changed in an organization in order to successfully implement a new information system are: tasks, technology, people, and structure.

All of the following are competitive forces in Porter's model except: disruptive technologies.

The four major competitive strategies are: low-cost leadership, product differentiation, focus on market niche, and customer and supplier intimacy.

All of the following are IT-enabled products and services providing competitive advantage except: Nike's use of celebrities to market their products.

The Internet increases the bargaining power of customers by: making information available to everyone.

Which of the following would a company employ to measure and compare its business processes to similar processes of other companies within their industry? Benchmarking

When two organizations pool markets and expertise that result in lower costs and generate profits, they are creating: synergies.

The expenses incurred by a customer or company in lost time and resources when changing from one supplier or system to a competing supplier or system are known as: switching costs.

Smart products are an example of the Internet of Things. True

High product differentiation is a sign of a transparent marketplace. False

Mass customization offers individually tailored products or services using the same resources as mass production.

11

Was this document helpful?

393 Midterm Study Guide Laudon

Course: Business Communication (MGMT254W)

3 Documents
Students shared 3 documents in this course

University: Columbia College

Was this document helpful?
Which of the following best describes how new information systems can result in legal gray areas?
They result in new situations that are not covered by old laws.
Which of the following best describes the effect that new information technology has on society?
It has a ripple effect, raising new ethical, social, and political issues.
The obligations that individuals and organizations have regarding the preservation of existing values and
institutions fall within which of the following moral dimensions of the information age?
Quality of life
Which of the following is not one of the current key technology trends that raises ethical issues?
Increase in data quality
Which of the five moral dimensions of the information age do the central business activities of DoubleClick
involve?
Information rights and obligations
Which of the following is a data analysis technology that finds hidden connections between data in disparate
sources?
NORA
All of the following are steps in the process for analyzing an ethical issue except:
assigning responsibility.
A colleague at work takes small amounts of office supplies for her own personal use, saying that this is a tiny
loss to the company. You tell her that if everyone were to take office supplies, then the loss would no longer be
minimal. Your rationale expresses which of the following ethical principles?
Kant's Categorical Imperative
A man steals from a grocery store in order to feed his starving family. Which of the following best expresses the
utilitarian principle in evaluating this situation?
His action is acceptable, because the higher social value is the survival of the family.
Which of the following best describes Immanuel Kant's categorical imperative?
If an action is not right for everyone to take, it is not right for anyone to take.
The ethical "no free lunch" rule states that:
if something someone else has created is useful to you, it has value, and you should assume the creator wants
compensation for this work.
What specific principles for conduct can be used to guide ethical decisions?
Six ethical principles for judging conduct include the Golden Rule, Immanuel Kant's Categorical Imperative,
Descates' rule or change, the Utilitarian Principle, the Risk Aversion Principle, and the ethical "no free lunch"
rule. These principles should be used in conjunction with an ethical analysis.
According to ________, you should take the action that produces the least harm.
1
Copyright © 2020 Pearson Education, Inc.