Looks like no one added any tags here yet for you.
A positive development for public, private, and hybrid cloud computing environments is the emerging ability of IT systems to manage themselves and adapt to changes in the computing environment, business policies, and operating objectives.
Autonomic Computing
An important consideration for businesses considering a hybrid cloud computing approach is that a secure, reliable, low-latency connection must be provided by their _____.
Private Network
Autonomous vehicles will rely on 5G for their _____.
Sensors
Clara has a device that responds to her voice commands by reviewing her calendar appointments, performing search queries, and playing streaming music. This is an example of a(n) _____.
smart speaker
Dodge works for a manufacturing firm where IoT and smart building systems monitor and control the usage of electrical systems. This benefits the firm primarily through _____.
reduce costs
Examples of the application of the IoT to improve customer service and experience include _____.
mobile card readers & smart trackers
If your home air conditioner has an IP address, it is part of the ____.
Internet of Things
IoT applications can be classified into four groups based on two key qualities: their degree of sensing and degree of action.
true
James entered into a public cloud computing arrangement without reviewing the standard contract carefully. What problem is he most likely to face as a result?
unexpected cloud service costs
Marion is an IoT developer working for a large organization. Why does his supervisor want him to stay informed about the network upgrades that major mobile carriers are currently making?
5G availability is expected to quickly increase as these upgrades proceed.
One benefit of the cloud computing option known as software as a service is _____.
lower costs compared w/ licensing needed applications
Pharmaceutical companies can use battery-powered sensors and either 4G or 5G connectivity to monitor their products for damaging temperature changes during shipment. What type of IoT application is this?
connect and monitor
Redundancy in data center hardware and file storage locations is a common problem for businesses who decide to implement cloud computing.
false
Security is a serious issue with IoT applications because _____.
they can expose internal systems yo hacking, viruses, and malware
smart cars
have sensors that monitor objects in the car's blind spots and at the front and rear of the car
The way consumers and large enterprises use the IoT is evolving because of advances in _____.
mobile communications
Which IoT devices can be used to improve workplace safety in mining, heavy industries, and construction?
safety helmets and wristbands embedded w/ sensors
Which statement about the influence of the IoT on cities or city planning is FALSE?
Athens, Greece was named the first "Smart City" in Europe because of its efficient public transportation system
Which type of IoT application performs predictive analysis and initiates preemptive action using sensor data augmented with external data?
predict and adapt
Why do cloud computing service arrangements often pose challenges for organizations that are transitioning to the cloud?
Cloud computing arrangements can be lengthy and complex
A key ingredient to e-commerce infrastructure is _____.
web server platflorm
A successful e-commerce system must address the stages experienced by customers as they approach and complete a purchasing transaction, known as the _____.
sales life cycle
An approach to building customer profiles that captures user-provided information, such as information from warranties, surveys, user registrations, and contest-entry forms completed online, relies on _____.
explicit personalization technique
Based on a 1992 Supreme Court ruling, an Internet-based merchant needed to collect sales taxes only when _____.
buyers lived in a state where the merchant had a physical presence
Clarabel, who is helping design her firm's e-commerce infrastructure, tells a colleague, "It is encouraging to remember that computer hardware continues to become more powerful without becoming more expensive thanks to _____."
Moore's law
Consortium-operated exchanges are open to any set of buyers and sellers within a given market.
false
During the purchasing stage of e-commerce, accepted payment methods typically vary because _____.
additional safeguards and measures are required for first-time buyers in B2C e-commerce
Francis purchases a new tablet device through an e-commerce Web site. In this scenario, the last stage of the multistage model for e-commerce takes place when _____.
the merchant's technical support team helps Francis configure his device
How can a business best increase traffic to its e-commerce site?
acquire links to its site on popular, related sites
Implicit personalization techniques capture user-provided information, such as information from warranties, surveys, user registrations, and contest-entry forms completed online.
false
In which of the following forms of e-commerce is the seller most likely to offer a customized product offering to a potential buyer?
business-to-consumer (B2C) e-commerce
Large shipping organizations have sped up and simplified the transfer of inventory and information to consumers through the development of _____.
software tools and interfaces
Mavis, a corporate buyer, is busy reviewing price quotations on several suppliers' Web sites. She clicks items on one supplier's quotation form and enters the desired delivery date to find out whether they can deliver them on time. Which stage of the model for e-commerce is Mavis in?
selection and negotiation
One reason for the growth in business-to-consumer (B2C) e-commerce is that online B2C shoppers have the ability to design a _____ product.
personalized
Smart cards are less protected from misuse that conventional credit, charge, and debit cards because the smart card information is not encrypted.
false
The ______ technique is a security technique associated with the use of credit cards at the time of purchase that checks additional digits printed on the back or front of the credit cards.
card verification number
The most successful e-commerce solutions can be upgraded to meet unexpected user traffic because of their _____.
scalability
Tom's Art Supplies used to sell art supplies through mail order catalogs, but the company's data entry specialists often had difficulty deciphering their customers' handwriting on the order forms. Since switching to an e-commerce site, Tom's has enjoyed which advantage of e-commerce?
increased order accuracy
Which of the following factors is NOT one of the main reasons Web developers must often rewrite existing Web applications for mobile devices?
PIC security standard requirements
Wholesale e-commerce applications often focus on improving a plant manager's efficiency in researching prices and availability from suppliers for _____.
manufacturing, repair, and operations goods and services
Which of the following is not true about digital twins?
Virtual replication of manufacturing processes made of encapsulated traffic in IP packets.
What objective of manufacturing processes can the digital twin technology help achieve according to the authors?
Taking into account the field practices of manufacturing during design to optimize the design outcome.
What topics are addressed in Section 4 of the case study?
New value-added services powered by the digital twin technology that have potential.
The digital twin technique emanated from what concept some 20 years ago?
Project Life Cycle Mgmt
Digital twin is a digital representation of a physical item or assembly using __________ and __________, holding information from multiple sources across the product lifecycle.
integrated simulations; service data
What is the second stage of constructing the virtual twin?
Focuses on the system specifications and the level of modeling precision required.
How does digital twin help to improve the security of the internal monitoring and control network in the use case of plant-wide process monitoring?
By making the monitoring and control information source verifiable and traceable.
__________ is an estimate of the number of remaining years that a component or system will be able to function in accordance with its intended purpose before warranting replacement.
Remaining useful life
Among the different digital twin types, __________ virtually represent how a set of components that work together as part of a more comprehensive system, interact and produce performance data that can be analyzed to make informed decisions. To answer this question, you may need to look up sources outside of the case study.
asset twins
Which of the following technologies is primarily used in applying 3D visualization and multisensory fusion to bring to the human operators a sense of presence in digital twins?
Augmented reality (AR) and virtual reality (VR)
On what data does Ant Financial use AI to operate a variety of businesses including credit rating, services, health insurance, and wealth management?
data from its mobile-payments platform
Services such as recommendation of a song by music streaming service are carried out by:
AI triggered algorithms solely
Which firms are moving towards AI-based models that enable digital automation?
both new forms and traditional forms
Which of the following is NOT an example of AI algorithm based automated decision? a. Setting prices of products that can vary by the minute b. Identifying the location of a new manufacturing plant c. Scheduling car rides in ride sharing firms d. Responding to customer service questions that are routinely asked
d. Responding to customer service questions that are routinely asked
Which component of the AI factory enables testing of hypotheses regarding new algorithms to ensure that the suggested actions are having the intended effect
Experimentation platform
The case mentions Alfred Chandler. What business concept is he widely recognized for that he wrote in detail in a classic book?
All successful companies must have a structure that matches their strategy, and not the other way around
What is the IT operation in Microsoft known as that functions as Microsoft AI factory?
core engineering
In AI-driven models, scaling up of processes reaches a point at which it delivers diminishing returns.
false
Which company is mentioned in the case study to be using AI to facilitate processes in customer service, customer insights, and investment recommendations?
Fidelity Investments
Which of the following is NOT a principle recommended by the authors for transforming an organization to an AI driven one?
A large number of employees from the operations function to build the capabilities
__________ algorithms must be taught how to perform the work they're designed to do.
machine learning
General Data Protection Regulation (GDPR) gives consumer __________ for any algorithm-based decision.
right to receive an explanation
Firms achieve the most significant performance improvements when humans and machines work together.
true
Companies need __________. They are employees who continually work to ensure that AI systems are functioning properly, safely, and responsibly.
sustainers
Data compliance officers try to ensure that the data that is feeding AI systems complies with the __________ regulations.
GDPR and other consumer protection
SEB, a major Swedish bank, now uses __________ to interact with millions of customers.
a virtual assistant called Aida
The music streaming service Pandora uses __________ to generate personalized playlists for each of its millions of users according to their preferences in songs, artists, and genres.
AI algorithm
Most activities at __________ require people to do new and different things (such as train a chatbot) and to do things differently (use that chatbot to provide better customer service).
human-machine interface
For many business processes, __________ is the primary obstacle to improvement.
poor scalability
For Mercedes-Benz executives, __________ presented a growing challenge.
inflexible processes
A key feature of an enterprise system is that _____.
it employs a database of key operational and planning data that can be shared by all
Although having greater access to operational data is beneficial to an organization, it can be challenging to _____.
analyze it to derive insights
EAs a result of implementing an ERP system, Women's World Banking _____.
can make data-based decisions regarding its new investment
CRM software allows employees from one business function to use data from other functions to help them make decisions because _____.
stores data about every contact a company has with a customer through every channel so that the company can truly understand customer action
Entering textual data in place of numeric data will result in rejection of the transaction.
true
Gordon is assisting with planning his employer's enterprise system implementation. He knows that continually assessing the progress of the project and identifying project-related risks will be key to its success. How can Gordon best address this particular aspect of the implementation?
define metrics
How much time do many project managers recommend be allocated for training staff to facilitate a successful enterprise system implementation?
30-60 days per employee
In batch processing systems, data processing is completed _______ data capture.
some time after
Innitrobe is ramping up to begin an ERP implementation. To promote its success, Innitrobe seeks project oversight and verification and validation of system performance from _____.
an experienced, independent resource
Millie's company is implementing an ERP, and her direct reports are complaining loudly of their frustrations with the new system. What should Millie request from upper management to alleviate this?
an extensive training program for system users
One tip for success with an ERP implementation is to have the project _____.
managed by full time executive
Percy is attracted by the advantages of enterprise software but his small business cannot afford to make a major up-front investment in new applications at this time. Percy _____.
could try hosted enterprise software, which offers a pay-as-you-go approach
Computer aided design
use of software to assist in the creation, analysis, and modification of the design of a component or product.
With an online transaction processing (OLTP) system, multiple transactions are accumulated over a period of time and prepared for processing in a large batch of similar transactions.
false
Which data analysis tool benefits organizations through the identification unique patterns, correlations, and anomalies within a vast amount of diverse data?
artificial intelligence
Which of the following statements is true of product lifecycle management (PLM) software?
provides document required for FDA and environmental compliance
What tool would likely be the best choice for a heavy machinery manufacturer seeking to improve the accuracy of its product demand forecasting?
an algorithm that analyzes key variables to identify the primary drivers for production and demand
Supply chain management involves many situations where data from one function of an organization is used to make critical decisions in another area. What is one example?
Sales ordering includes confirming the availability of desired items in the inventory and the customer's available credit.
Purchasing
The traditional receiving, inventory control, and accounts payable TPSs support which business function?
What are three types of hosted enterprise software?
on premises, cloud based, and hybrid
A LinkedIn report on AI skills among users identified three skill sets that are complementary to AI. Which of the following skill sets is NOT one of them?
mechanical engineering skills
A genetic algorithm is an approach to solving problems based on the _____.
theory of evolution
According to experts, what organizational practice will allow the growth of AI to create new jobs?
upskilling the workforce
An artificial neural network
learns each time it processes some input
An expert system's knowledge acquisition facility serves as an interface between _____.
experts and knowledge base
Because they must interpret what a user is looking for and return relevant results in a timely manner, natural language processing is widely used in _____.
search engines
Drones that deliver packages, unmanned home vacuum cleaners, and toy dogs that entertain children are all examples of _____.
robots
How are machine learning and artificial intelligence different?
they learn thru different processes
In 1977, a patient moved a cursor across a screen using only electrical signals from his brain, and an account of this event was published as the first successful experiment with _____.
brain computer interface
In which field is brain computer interface technology seeing the most growth through research?
medicine