1/119
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
McDonald's chooses a division of labor where their staff is inexperienced and must be trained before they can serve the general public. Thus, they do not have to pay high salaries to their workers. What kind of strategy has McDonald's successfully employed?
Cost Leadership
Product Differentiation
industry-wide
Early Adopter
Co
Cost Leadership
Each year, you become excited when the new Apple iPhone releases. In your eyes, you would pay $2,000 for the latest and greatest Apple technology. What concept does this demonstrate?
Margin
Profit
Value
Cost
Value
You run Salt Lake's most successful diamond and jewelry store. One morning, you hear the news that overnight, one of the mines that your gems are harvested from has been detonated with C4. According to Porter's 5 Forces model, which threat is your jewelry store facing?
Rivalry
Power of Suppliers
Threat of New Entrants
Threat of New Entrants
Power of Suppliers
After a successful marketing campaign, your company has sold over 125,000 units of its automated flying car. However, you have no idea how you plan to ship all these huge cars. What primary activity is your issue derived from?
outbound logistics
customer service
inbound logistics
operation/manufacturing
outbound logistics
After working closely with the operations team of your company, you notice that the value chain seems to be more integrated than ever. What concept from the textbook did your firm successfully utilize?
linkages
margin
outputs
activities
linkages
King Kong Construction implements DOMO Business Intelligence software to achieve optimal efficiency and cost in allocating workforce to construction projects. By doing this, King Kong has achieved competitive advantage by
enhancing its products or services
raising barriers of entry
reducing cost via process implementations
creating a new product or service
reducing cost via process implementations
Best Buy has an approarch that involves greeting customers when they walk through the front doors, offering assistance when people begin browsing through their product offerings, assisting with payment through payment plans, and offering returns for products that didn't meet customer expectations. What is this approach known as?
Cost Leader Strategy
Public Relations
Business Process
bargaining power of customers
Business Process
Uber, a ride-sharing app, began offering their services much before other now popular ride-sharing apps such as Lyft and Juno. What strategy did Uber benefit from?
Establish Alliances Early
Product Differentiation
First Mover Advantage
High Switching Costs
First Mover Advantage
A baking company uses eggs, sugar, flour, chocolate chips, and water to create cookies. This is the ______ activity of their value chain.
operations
marketing
inbound logistics
outbound logistics
operations
ason's Burgers, a famous diner, recently started taking orders online to reduce the customer wait time. This arrangement was perfect for busy office workers who frequented the place, and the sales went up considerably. Jason's Burgers attempted to ________.
lock in customers
establish alliances
create a new product
reduce costs
raise barriers to market entry
lock in customers
BI systems have 5 standard components. These are hardware, software, data, procedures, and ?
People
Machines
Programs
Policies
People
If you are asking questions such as, “How can we increase sales?” and “How can we reduce food waste?” You are in teh ? task of Business Intelligence Systems
Deciding
Informing
Problem Solving
Project Management
Problem Solving
At the end of each year, a digital musical service sends a report to each of their listeners explaining how much time they spent listening to music, their favorite artists, songs, and albums. This is an example of ? publishing.
Push
Pull
Push
Your startup company has begun making sales across the nation. You want to find out exactly how well the sales of your company have been doing in your city. However, your data analysts tells you that they only have a system that can determine total sales by state. What problem is occurring with your startup’s data?
Dirty data
Granularity
Too many data points
Inconsistent data
Granularity
You are the CFO of a large firm in Salt Lake City. You receive a report each quarter of all he data your finance department has utilized for the past three months. It is likely that the data was obtained from the data mart.
True
False
True
A way of analyzing and ranking customers according to their purchasing patterns
What am I ?
RFM analysis
This requires the user to request business intelligence (BI) results
What am I ?
Pull Publishing
A term used to describe data collections that are characterized by huge volume, rapid velocity, and great variety
Big data
Which of the following is true about unsupervised data mining?
-Analysts do not create a model or hypothesis before running a analysis
-Unsupervised data mining requires tools such as regression analysis
-Neural networks are popular unsupervised data mining application
-Data miners develop a model prior to the analysis and apply statistical techniques to data.
-Analysts do not create a model or hypothesis before running a analysis
What is problematic operational data termed as
dirty data
Your local dentist utilizes a complex application that specifically tracks the status of teeth and the progression of abnormalities, such as cavities. What type of application is being used?
-Free application
-Vertical market application
-One of a kind application
-Horizontal market application
-Vertical market application
iphone come with a pre-downloaded application called “weather” in which information can be found on the current and predicted weather anywhere in the world. This application is only available to and compatible with IOS. what type of application is this an example of?
-Web application
-thin client application
-native application
-one of a kind application
-native application
Your new boss lets you know that, if you choose to bring your personal laptop to work, you will be held responsible for any damage or information loss. This is an example of
-an open sourced project
-a native application
-a closed source project
-a BYOD policy
-a BYOD policy
You are developing a new scheduling application for your personal business. The project has a relatively small budget and you don’t believe it will increase appointments-merely the convenience of scheduling them. What type of application best suits your needs?
-thin client application
-social application
-native application
-thick client application
-thin client application
Snapchat is a social media application that is free to download and to use. What is Snapchats monetized product?
-news
-filters
-freemium services
-you are the product
you are the product
Pokemon Go is a mobile application that uses the camera and GPS system of a users phone to digitally superimpose imaginary creatures on top of real world scenery. This is an example of
-augmented reality
-virtual reality
-internet of things
-BYOD
-augmented reality
Garlicoin- which traded at a price as high of $2.11 per “coin” on January 29, 2018- is a digital only currency that was first developed as a bit of an online joke. It was able to gain real value because of its popularity-despite having no gold backing. What is Garlicoin an example of?
-internet of things
-stock
-cryptocurrency
-digital reality
cryptocurrency
The University of Utah has legally obtained the right to install microsoft office software on all of the computers available to students for use at the Marriott library. This is an example of a
-open source application
-site license
-PC virtualization
-closed source application
-site license
The united states military requires a high security, one of a kind application to fit their unique needs. Which of the following is NOT true about a one of a kind application?
-They are relatively inexpensive to develop
-only trusted programmers can make changes to the code
-they are typically closed source
-they require maintenance
-They are relatively inexpensive to develop
A computers CPU controls the flow of data according to its instructions. CPU’S depend on a group of microchips located on the motherboard to process information. What is the CPU an example of?
-software
-hardware
-a byte
-firmware
-hardware
Many business students may question why a database is necessary for a business to track information. “why not just use an excel spreadsheet?” Which reason explains why database processing is a crucial feature for any business to utilize?
-Databases are easier for entry level employees to understand
-databases can keep track of multiple themes
-not every machine has access to excel
-databases have an online component that spreadsheets do not.
-databases can keep track of multiple themes
Which programming language do businesses utilize to code inside a database?
-java
-SQL
-PHP
-phyton
SQL
You are tasked with helping a startup company create a new database. However you do not know much about database processing. You choose to hire a vendor such as IBM or Microsoft to help through this process. What is this type of program called?
-database management systems
-database defined querying
-database model
-business process development software
-database management systems
Your boss wishes for to find all customers who live out of state by using a SQL command within the database. Is this something that is possible to achieve through SQL?
True or false
True
Before companies actually start on building a database, they often start out with a data model to determine which components are required for the database to be effective.
True or false
true
Albert creates a relational database to store employee performance statistics. He stores each employees data in independent rows and creates a column named “employee number” to assign unique numbers to each employee. This column is referred to as an
-primary key
-foreign key
-functionally dependent record
-key authentic
-primary key
You have been assigned the task of creating a data model for the organization you work for. You begin to research the various components of a data model and find that entities are the “verbs” of a model and attributes are the “nouns”
True or False
False
When you begin entering data into the database you have created for your organization, you realize that information is poorly structured and will cause issues further down the road. Perhaps you should break up the information into more well structured tables. Which process should you most likely undergo to alleviate the database of future error?
-database redesign
-database integrity
-normalization
-database process remodel
normalization
You have just begun working at a company who is starting to restructure their database. They have asked you to review the data model that was once used to build the database that is in effect today. However, you realize that the data model has two entities that were never added into the real database. Since they are not part of the actual database, it is not necessary to question if they should be incorporated when you meet with the IS department after your review.
true or false
false
What was bells law?
New class of computers establishing a new industry each decade
What is moores law?
The number of transistors per square inch on a chip doubles every 18 months.
What is Nielsens law?
Network connection speeds for high end users will increase by 50 percent per year
What is kryders law?
the storage density on magnetic dicks are increasing at an exponential rate.
What are the five components of an information system
hardware, software, data, procedures, and people
h and s are computer side
data is bridge
p and p is human side
What was the information age?
production, distribution. control of the information is the primary driver of the economy
What was the digital revolution?
the conversion from mechanical/analog devices to digital devices
What is IT?
products, methods, inventions, and standards used for the purpose of producing information.
what is IS?
an assembly of hardware, software, data, procedures, and people that produce information
YOU CAN BUY IT BUT NOT IS!!!
what are the five data characteristics?
-accurate
-timely
-relevant
-barely sufficient
-worth its cost
How does strategy determine IS?
Industry structure→competitive strategy→value chains→businesses processes→ information systems
What are the four strategies a company may choose and what do they mean
What are primary activities?
activities to do with creating, marketing, and delivering products to customers
What are support activities?
activities that allow primary activities to occur
What are businesses processes?
a network of activities that generate value by transforming inputs into outputs
cost of business process=cost of inputs+cost of activities
What are product implementations?
creates new products
What are process implementations?
locks in customers/suppliers
Similar to home electricity use, the cloud allows organizations to dynamically increase and decrease programmatically so that they only pay for the resources that they actually use. This is because cloud use is
-inelastic
-static
-elastic
-rigid
Elastic
You own a company that outsources the manufacture of its product. The higher your order, the lowern average cost per unit. What benefit does your company have in common with the cloud?
-the internet of things
-product differentiation
-ethernet
-economies of scale
Economies of scale
A lawyer with high profile client is concerned with the security of their data and wishes to maintain complete control over their data location. Under these circumstances, it would make sense for this legal office to store their data in the cloud?
True or False
False
University of Utah employees utilize Office 365 and its cloud capabilities to store and collaborate on files from multiple devices. This is am example of
-PaaS (platform as a service)
-SaaS (software as a service)
-IaaS (infrastructure as a service_
-traditional on premises
-SaaS (software as a service)
Content delivery networks are able to decrease load-time, increase reliability, and reduce the workload on the origin server. Which of the following characteristics of CDNs contributes to these benefits.
-they utilize transmission control protocol (TCP)
-they hold specialized information that is frequently updated
-they increase delivery costs
-they are geographically distributed
they are geographically distributed
Apples Airpods are able to utilize wireless network technology to connect to a users cellular device and play high quality audio. Which type of network is this an example of?
-MAN
-WAN
-PAN
-LAN
PAN
After a piece of mail is addressed, the postal system puts a “registered mail” sticker on the package. This sticker guarantees the delivery of the package. Similarly, after a packet of information is addressed on the internet to a specific IP, what guarantees the timely and accurate delivery of the information packet?
-Domain Name System (DNS)
-Domain Name
-Transmission Control Protocol (TCP)
-IP address
-Transmission Control Protocol (TCP)
Netflix accounts for more than 30 percent of all internet traffic in North America between 9 PM and 12 AM. Video streaming requires a relatively high amount of bandwidth to process. For this reason, Netflix most likely supports Net Neutrality.
-true or false
true
A criminal investigator is working on a case involving cybercrime. They have been able to trace the origin of the suspicious activity to a local library. Which of the following made this discovery possible?
-IP address
-PAN
-CDN
-TCP
IP address
You are a small vendor that operates an online store. You decide to use cloud technology to help process orders/online activity and to store data. Which of the following is NOT a benefit of this decision?
-small capital requirement
-speedy developments
-visibility of security
-known cost structure
-Visibility of security
What is business intelligence systems (BI)
informations systems that process operational and other data to identifyee patterns, relationships, amd trends for us by businesses professionals and other knowledge workers.
What are the five standard components of BI?
-hardware
-software
-data
-procedures
-people
What are the 3 primary activities of BI?
-Acquire data
-Perform analysis (process of creating BI)
-Publish results
what is a data mart?
a subset of a data warehouse. addresses a particular component functional area of the business.
what is curse of dimensionality"?
to many attributes may create a “great” model that fit the sample data but useless as a predictor
what is granularity?
the level of detail represented by data. Could be fine or to coarse
What is RFM analysis?
analyze and rank customers according to their purchasing patterns.
R=recently
F=frequently
M=money
what is OLAP
online analytical processing
provides the ability to sum, count, average, and other simple arithmetic operations on groups of data.
What is a dimension?
a characteristic of a measure, cannot be measured
what is a data warehouse
cleanse data, catalog data using metadata, organize and relate data warehouse
What is data mining
the application of statistical techniques to find pattern and relationships among data for classification and prediction.
What is big data?
huge volume, rapid velocity, variety
what is mapreduce?
a way of processing big data. a technique for harnessing power of thousands computers working in parallel.
What is knowledge management (KM)?
creating value from intellectual capital and sharing knowledge with those who need that capital.
-improves process quality
-increase team strength
what is a content management system?
support management and delivery of documents
What is a BI server?
webserver for publishing BI
-two major functions are management/delivery
What is CPU?(central processing unit)
-retrieve content to process
-decode and execute content
-stores results somewhere
What is RAM? (random access memory)
-where the results of CPU computations are stored
-RAM is volatile
what is volatile memory?
computer storage that only maintains its data if the device is powered
what is non-volatile memory?
type of computer memory that can retrieve stored information even after having been turned on/off
What are binary digits? (bits)
represented by bits, which are ones and zeroes
What are thick clients?
native applications like MS office
What are thin clients?
web application like canvas and google drive
What does a license mean?
right to use specified number of copies, limits vendors liability
What is a site license?
flat fee to install software product on all company computers or all computers at a specific site.
What is an open source?
when there is no flat fee
What is virtualization?
process by which one physical computer hosts many different virtual computers within it.
What is PC virtualization?
personal computer hosts several different operating systems
What is server virtualization?
server computer hosts other server computers , makes cloud computing feasible
What is desktop virtualization?
the virtual computer is stored on a remote server and delivered to the users device
What is horizontal market application?
common apps
What is vertical market applications?
serves the need of a specific industry
What is firmware?
special software installed on read only memory
What is GNU?
general public license agreement