HEHEHE – Flashcard

Unlock all answers in this set

Unlock answers
question
In just five years, _____ has bought a whopping 103 firms. a. Microsoft b. Hewlett-Packard c. Google d. Oracle e. IBM
answer
c.Google
question
Technology experts in the area of _____ specialize in technology for competitive advantage. a. user-interface design b. hardware c. database design d. strategy e. process design
answer
d.strategy
question
Many firms are developing so-called "C-level" specialties in emerging areas with a technology focus, such as: a. CIO. b. CEO. c. CPO. d. CFO. e. CTO.
answer
CPO
question
The _____ is a piece of U.S. legislation that raises executive and board responsibility and ties criminal penalties to certain accounting and financial violations. a. Fair Labor Standards Act b. Sherman Antitrust Act c. Civil Rights Act d. Sarbanes-Oxley Act e. Norris-LaGuardia Act
answer
d. Sarbanes - Oxley Act
question
Yahoo! was started by _____ and _____. a. Jerry Yang; David Filo b. Kevin Rose; Mark Zuckerberg c. Steve Chen; Chad Hurley d. Sergey Brin; Larry Page e. Catherine Cook; Shawn Fanning
answer
a.Jerry Yang; David Filo
question
Some of the radical changes brought about by new technologies include: a. an increase in computing costs owing to the growth of licensed software. b. the creation of an unprecedented set of security and espionage threats. c. the proliferation of telecommunications into the hands of a few. d. an increase in the standards of corporate ethics. e. the stagnation of advertising.
answer
b.the creation of an unprecedented set of security and espionage threats.
question
A company uses radio frequency identification (RFID) tags to keep track of its inventory. This is an example of the impact of technology in the area of _____. a. operations b. human resources c. finance d. accounting e. advertising
answer
a.operations
question
Crowdsourcing tools and question-and-answer sites like _____ allow firms to reach out for expertise beyond their organizations. a. Twitter b. MySpace c. MyYearbook.com d. Zappos e. Quora
answer
e.Quora
question
A company uses WebEx, a popular commercial application, to conduct training sessions for its employees who are spread across different countries. This is an example of the impact of technology in the area of _____. a. marketing b. finance c. accounting d. human resources e. operations
answer
d. human resources
question
Technology experts in the area of process design: a. work to make sure systems are easy to use. b. specialize in technology for competitive advantage. c. provide direction on technology-related security issues. d. focus on systems dealing with critical business data. e. leverage technology to make firms more efficient.
answer
e.leverage technology to make firms more efficient.
question
_____ is the third most popular social network in the United States and was founded by Catherine Cook. a. MySpace b. MyYearbook.com c. Facebook d. LinkedIn e. Twitter
answer
b. MyYearbook.com
question
Technology experts in the area of user-interface design: a. leverage technology to make firms more efficient. b. work to make sure systems are easy to use. c. provide direction on technology-related security issues. d. focus on effective back-up systems for critical business data. e. specialize in technology for competitive advantage.
answer
b.work to make sure systems are easy to use.
question
Tony Hsieh served as CEO of _____, and eventually sold the firm to Amazon for $900 million. a. Napster b. LinkExchange c. MyYearbook.com d. Yahoo! e. Zappos
answer
e. Zappos
question
Sergey Brin and Larry Page were both twenty-something doctoral students at Stanford University when they founded: a. Yahoo! b. YouTube. c. Google. d. Napster. e. Amazon.
answer
c.Google.
question
The Emerging Technology Presentations (ETP) will be graded on which of the following criteria? Content Relevance Quality Of Presentation Technical Accuracy
answer
Content Relevance Quality Of Presentation Technical Accuracy
question
TLA is a TLA which stands for [T] [L] [A].
answer
Three Letter Acronym
question
CPO is an acronym which stands for [C] [P] [O].
answer
Chief Privacy Officer
question
There are a few departments within an organization on which technology has NO impact.
answer
False
question
The [I] [S] department in an organization not only ensures that systems get built and keep running but also take on strategic roles targeted at proposing solutions for how technology can give the firm a competitive edge.
answer
Information System
question
The rise of open source software has lowered computing costs for start-up and blue chip companies worldwide.
answer
True
question
Technology experts in the area of user-interface design specialize in technology for competitive advantage.
answer
False
question
Firms are increasingly shifting spending from the Web to other media such as print, radio, and television as these are often easier to track and analyze.
answer
False
question
The United States holds the number one ranking in home broadband access.
answer
False
question
A focus solely on technology is a definite recipe for success.
answer
False
question
Facebook was founded by Kevin Rose.
answer
False
question
Linus Torvals created the Linux operating system.
answer
True
question
In his twenties, Tony Hsieh sold LinkExchange to Amazon for over a half a million dollars.
answer
False
question
Oracle acquired the highest number of companies in the span of half a decade.
answer
False
question
Data analytics and business intelligence are driving discovery and innovation.
answer
True
question
The number of U.S. patent applications waiting approval has significantly declined in the past decade.
answer
False
question
[N] effects exist when a product or service becomes more valuable as more people use it.
answer
Network
question
Durable brands are built through customer experience.
answer
True
question
Netflix uses data to create tailored audience promotions.
answer
True
question
The Netflix work culture is in many ways similar to its peers.
answer
False
question
ROI is a term used to represent the: a. amount earned from an expenditure. b. relative profitability of an investment project, of a capitalist enterprise, or of the capitalist economy as a whole. c. average IT expenditure of a firm as a percentage of its revenue. d. efficiency of converting collected raw data into information that can be leveraged. e. rate of return on the ownership interest of common stock owners.
answer
a. amount earned from an expenditure.
question
Dell's fall in market share due to rivals copying its value chain is cited as a precedent for Zara. However, which of the following factors suggests that Zara's value chain might be more difficult to copy? a. Zara is backward vertically integrated while Dell has tended to be more forward vertically integrated. b. Zara's scale advantage ensures its market share is more than that of all its rivals' put together. c. Zara's costs are pegged to the stronger euro as compared to Dell, which was dollar-based. d. Clothing is more complex than computing, in terms of number of new models offered. e. The computer industry, unlike clothing, is influenced by several extrinsic factors, such as economic recession.
answer
d.Clothing is more complex than computing, in terms of number of new models offered.
question
The Zara experience involves a regular supply of new stocks on the shelves, because of which customers tend to visit Zara's stores more often than they visit other retailers' stores. However, such a policy will become more expensive to maintain if: a. star designers demand a higher fee for its designs. b. PDAs are not used. c. fuel costs rise. d. Zara's horizontal integration fails. e. Zara outsources its production process.
answer
c.fuel costs rise.
question
In retail in general and fashion in particular, having _____ is considered the kiss of death. a. dispersed production facilities b. limited production runs c. a large labor force d. too many storefronts e. excess inventory
answer
e.excess inventory
question
A firm is said to have suffered from the [O] Effect when it preannounces a forthcoming product or service, and experiences a sharp and detrimental drop in sales of current offerings as users wait for the new item.
answer
Osborne
question
Netflix offers its subscribers a selection of over one hundred thousand titles, while other video rental firms can only offer as much as three thousand. This presents a significant _____ for Netflix over its rivals. a. variable cost b. marginal cost c. studio preference d. price advantage e. scale advantage
answer
e.scale advantage
question
Brands are built through _____. a. customer experience b. excessive advertising c. data assets d. customer awareness e. customer profiling
answer
a.customer experience
question
Which of the following statements is true about retailing? a. More money can be made through the sale of latest products than obscure items. b. Internet retailers stock their shelves with only popular items. c. Both traditional and internet retailers face limitations such as shelf space and geography. d. Accessibility rather than selection attracts customers. e. Nearly limitless selection allows Internet retailers to leverage the long tail.
answer
Nearly limitless selection allows Internet retailers to leverage the long tail.
question
Netflix enjoys the triple scale advantage of the largest customer base, the largest selection, and the largest network of distribution centers. This can be attributed to: a. Netflix's first-mover advantage. b. Netflix's effective and aggressive pricing strategy. c. Netflix's specialized focus on advertising and marketing. d. Netflix going public to generate funds for expansion. e. the bargaining clout it exercises over movie studios and the government.
answer
Netflix's first-mover advantage.
question
Elaborate customer surveys help Zara designers predict fashion trends months into the future and design products accordingly.
answer
False
question
An information system consists of hardware, software, data, procedures, and the people who interact with and are impacted by the system.
answer
False
question
In terms of percentage of revenue spent on advertising, Zara has possibly the lowest figures in the whole industry.
answer
True
question
The [C] Effect suggest that increasing numbers of users lowers the value of a product or service.
answer
Congestion
question
Viral promotion involves: a. emphasizing customer retention and satisfaction, rather than a dominant focus on sales transactions. b. offering rebates and incentives to customers for adopting a product or service. c. sending a pre-written set of messages to customers or prospects over time. d. paying celebrities to use a product visibly to lure customers into unwittingly buying the product. c. leveraging a firm's customers to promote a product or service.
answer
leveraging a firm's customers to promote a product or service.
question
Which of the following is an example of a measure taken by a firm to encourage the development of complementary goods? a. Nintendo's Wii games targeted at families, women, and older age groups b. Google's support of the Open Social standard for social networking c. Microsoft bundling new products into Windows, Internet Explorer browser, and other offerings d. Adobe giving away the Acrobat Reader for free e. Apple's iTunes that allows developers to sell their products online
answer
Apple's iTunes that allows developers to sell their products online
question
Profitability of online auctions is derived mainly from selling: a. popular products. b. newly released goods. c. trade goods. d. differentiated goods. e. commodities.
answer
differentiated goods.
question
A firm can spend no money and time, yet expect to enhance its offerings, by: a. outsourcing critical processes to third parties. b. allowing other firms to contribute to its platform. c. preannouncing a forthcoming product to lower sales of current offerings. d. adopting an envelopment strategy. e. going public through an initial public stock offering.
answer
allowing other firms to contribute to its platform.
question
Firms that constantly innovate do so to develop open standards for competitors to become compatible.
answer
False
question
In the context of network effects, the term "network" refers to wireless systems that connect pieces of electronics.
answer
False
question
The natural state of a market where network effects are present is for there to be intense competition between several rivals.
answer
False
question
[C] are nearly identically products or services which are offered from multiple vendors.
answer
Commodities
question
Many telecom firms began digging up the ground and laying webs of fiberglass to meet the growing demand for Internet connectivity. However, rivals and startups began to imitate these firms and soon these new assets were not so rare and each day they seemed to be less valuable. It can be inferred from this example that: a. the telecommunications market is only big enough to support one or two major players. b. resource-based thinking can help avoid the trap of carelessly entering markets simply because growth is spotted. c. technology assets that require high investment and maintenance are liable to becoming obsolete much quicker than others. d. the immense scale advantages enjoyed by major firms can help them fight off competition from newer entrants. e. the scale of technology investment required to run a business is not a huge enough factor to act as a barrier to entry for new, smaller competitors.
answer
resource-based thinking can help avoid the trap of carelessly entering markets simply because growth is spotted.
question
The paths through which products or services get to customers are known as _____. a. information pathways b. horizontal markets c. distribution channels d. vertical markets e. proxy networks
answer
distribution channels
question
Dell, previously the world's number one PC manufacturer, has seen its market share shrink because of rivals copying its value chain and reducing the price advantage it enjoyed over rivals. Dell's present struggles: a. highlight the fact that scale advantages of an established firm are a huge factor in discouraging newer entrants to a market. b. underscore the importance of continually assessing a firm's strategic position among changing market conditions. c. are a result of rivals adopting supply chain management of software products that have yielded competitive advantages. d. imply that if a firm's value chain helps to create and strengthen other strategic assets over time, it can be a key source for competitive advantage. e. demonstrate that resource-based thinking can help firms avoid the trap of carelessly entering markets simply because growth is spotted.
answer
underscore the importance of continually assessing a firm's strategic position among changing market conditions.
question
Kathy has access to the Internet and is able to search and compare the price and quality of the products she wants to purchase. However, Martin does not have access to the Internet and stays in a remote town where he is not able to get such details regarding the product or service he wants to purchase. Such a decision situation where Kathy has more or better knowledge about products or services than Martin is known as _____. a. positional awareness b. information asymmetry c. strategic superiority d. operational precedence e. data redundancy
answer
information asymmetry
question
Metcalfe's Law is used to explain the concept of switching costs.
answer
False
question
Changes that impact one industry do not necessarily impact other industries in the same way.
answer
True
question
If a firm's goods are highly differentiated, the Internet can lessen the firm's supplier bargaining power.
answer
False
question
This process of converting a code into machine-readable form is known as: a. sequencing. b. debugging. c. assimilating. d. compiling. e. integrating.
answer
Compiling
question
Java is not optimized to take advantage of interface elements specific to the Mac or Windows operating systems. As a result: a. Java is not platform independent. b. Java code has to be compiled and then interpreted, before being executed by the processor. c. Java code that is compiled for the native OS and processor is slower than code running through a JVM interpreter. d. Java lacks a structured programming style. e. Java is unsuitable for desktop applications.
answer
Java is unsuitable for desktop applications.
question
Which of the following is an example of application software? a. Mac OS b. Linux c. MS Windows d. Adobe Flash e. MS Word
answer
MS Word
question
_____ provide the standards, syntax, statements, and instructions for writing computer software. a. Application servers b. Platforms c. Operating systems d.. Programming languages e. Database management systems
answer
Programming languages
question
Systems that use data created by other systems to provide reporting and analysis for organizational decision making are called _____ systems. a. supply chain management b. business intelligence c. customer relationship management d. enterprise resource management e. application server
answer
business intelligence
question
Replacing computing resources - either an organization's or individual's hardware or software - with services provided over the Internet is known as [C] computing.
answer
Cloud
question
Moore's Law is dead.
answer
False
question
What is the result of the rapid, technological change predicted by Moore's law? A. Open Source Software B. Wearable technology C. Free computers D.. E-waste E. Ubiquitous computing
answer
E-waste
question
The process of separating out the densely packed materials inside tech products so that the value in e-waste can be effectively harvested is extremely skill intensive.
answer
False
question
Grid computing, though faster and more efficient, is an expensive alternative to supercomputers.
answer
False
question
Moore's Law has impacted the camera industry such that the firms that sell the most cameras aren't camera companies, but phone manufacturers
answer
True
question
All of the costs associated with the design, development, testing, implementation, documentation, training and maintenance of a software system are collectively termed as: a. total cost of ownership. b. economic value added. c. return on investment. d. cost to company. e. economies of scale.
answer
total cost of ownership.
question
_____ provide the infrastructure backbone to SaaS and hardware cloud efforts, as well as many large-scale Internet services. a. Neural networks b. Data warehouses c. Private clouds d. Server farms e. Content delivery networks
answer
Server farms
question
Which of the following is true of software as a service (SaaS)? a. SaaS vendors are less attuned to customer needs. b. Saas firms face diseconomies of scale. c. It refers to software that is made available by a third-party online. d. Firms spend more using SaaS. e. There are no accounting and corporate finance implications for SaaS.
answer
It refers to software that is made available by a third-party online.
question
_____ is a term used to describe unpredictable, but highly impactful events. a. Flash outs b. Black swans c. Straddling d. Viral trojans e. Power plays
answer
Black swans
question
Vendors frequently sign _____ with their customers to ensure a guaranteed uptime and define their ability to meet demand spikes. a. infrastructure provider contracts b. host vendor terms c. open source contracts d. requests for information e. service level agreements
answer
service level agreements
question
[L] is the dominant Open Source Software (OSS) Operating System (it was used in a Demo in class).
answer
Linux
question
From a IT Managerial perspective, the cost of data storage should be measured in: A. Dollars B. Transmission Speed C. Web D. Bits E. Bytes
answer
Bytes
question
EDI is easier to code and more robust than XML because it can be extended.
answer
False
question
Desktop applications are typically designed for a single user.
answer
True
question
The care and feeding of information systems is usually simple and inexpensive.
answer
False
question
One of the drawbacks of open source software is that it cannot be easily migrated to more powerful computers as circumstances dictate.
answer
False
question
SaaS offerings usually work well when the bulk of computing happens at the client end of a distributed system.
answer
False
question
Linux is one of the most used operating systems in desktop computers, but can be found only in a tiny fraction of mobile phones, and consumer electronics.
answer
False
question
Based on the author's take on e-waste management, a manager would do well to learn that: a. dealing with e-waste at home can be ten times cheaper than sending it abroad. b. it is simple enough for firms to monitor and track e-waste management through international agencies such as Fair Factories Clearinghouse. c. disposal and recycling partners must be audited with the same vigor as suppliers and other partners. d. environmentalists target only the big firms as they can afford to compensate for any environmental damage wrought by their practices. e. appointing environmentalists like Al Gore to the firm's board of directors helps avoid legal action and brand tarnishing due to bad e-waste management practices.
answer
disposal and recycling partners must be audited with the same vigor as suppliers and other partners.
question
Moore's Law has been in effect since the _____ wave of computing. a. first b. fourth c. second d. third e. fifth
answer
second
question
1 petabyte = 1 _____ bytes a. trillion b. million c. billion d. sextillion e. quadrillion
answer
quadrillion
question
Which of the following is a way to recognize potentially disruptive innovations? a. Pay attention to slow-expensive advancements in technology. b. Become more consumer-focused. c. Remove shortsightedness regarding the future. d. Indulge in bottom-line obsession. e. Increase conversation within same product groups.
answer
Remove shortsightedness regarding the future.
question
Which of the following is an example of volatile memory? a. Nanodrive b. Read-only memory c. Optical disk drive d. Flash memory e. Random-access memory
answer
Random-access memory
question
The Brain of a computer is also known as the [C] [P] [U]. What do the letters CPU stand for?
answer
Central Processing Unit
question
The current wave of computing is characterized by which of the following: A. PCs Break Onto The Scene, Affordable For Everyone B. Large, Room Sized Computers C. Ubiquitous (Everywhere And In Everything) D. Minicomputers, Fridge-sized E. The Internet, Everyone Is Connected
answer
Ubiquitous (Everywhere And In Everything)
question
As identified by the Group 1 Emerging Technology Presentation on RFID, one of the current, potential dangers or problems of RFID is: A. Too complicated B. Limited use in retail business C. Cancer from radio waves D. Skimming information E. Too much data on the tags
answer
Skimming information
question
Attacks that are so new that they have not been clearly identified, and so have not made it into security screening systems are called _____. a. brute force attacks b. zero-day exploits c. non-precedent breaches d. novel attacks e. first mover attacks
answer
zero-day exploits
question
Cyber criminals who infiltrate systems and collect data for illegal resale are called _____. a. information hoarders b. ethical hackers c. data harvesters d. corporate spies e. cash-out fraudsters
answer
data harvesters
question
A domain name service is a collection of software that: a. directs the flow of traffic across the Internet. b. allots domain names to different Web sites. c. assigns IP addresses to different systems. d. maintains a registry of different IP addresses. e. maps an Internet address to an IP address.
answer
maps an Internet address to an IP address.
question
Technologies that measure and analyze human body characteristics for identification or authentication are known as _____. a. overlamination processes b. bio-embedded systems c. holographs d. biometrics e. smart tags
answer
biometrics
question
Spyware is defined as a type of software that: a. monitors user actions or scans for files surreptitiously. b. infects other software and decreases the network speeds. c. scans for loopholes in other software and releases malware payloads. d. clogs up network traffic and disables networks. e. serves up unwanted advertisements after being installed without user knowledge.
answer
monitors user actions or scans for files surreptitiously.
question
An organization's partner firms that should be regularly audited to ensure that they are compliant with security frameworks include: a. clients. b. technology providers and contract firms. c. international standards organizations. d. law-enforcement agencies. e. government regulatory bodies.
answer
technology providers and contract firms.
question
Which of the following is a valid statement on information security? a. Technology lapses are solely responsible for almost all security breaches. b. A reactive, rather than proactive, approach is better suited for dealing with security breaches. c. Security breaches cannot be prevented despite the adoption of the best security policies. d. Information security is everybody's responsibility. e. Greater expenditure on security products is the only way to contain security breaches
answer
Information security is everybody's responsibility.
question
The typical Web user has 6.5 passwords, each of which is used at four sites, on average.
answer
True
question
Regularly updated software lowers a system's vulnerable attack surface.
answer
True
question
Cyber criminals who infiltrate systems and collect data for illegal resale are called cash-out fraudsters.
answer
False
question
A black hat hacker looks for weaknesses in security mechanisms, with a view to help plug the holes that might be exploited by cyber-criminals.
answer
False
question
In public-key encryption systems, the functions of the public and private keys are interchangeable.
answer
False
question
Spear phishing attacks specifically target a given organization or group of users.
answer
True
question
When using a public wireless network, using VPN software is not advisable as it can reveal your communications to any network eavesdroppers.
answer
False
question
As identified by the Group 2 Emerging Technology Presentation, BCI stand for [B] [C] [I]?
answer
Brain Computer Interface
question
As identified by the Group 2 Emerging Technology Presentation, which of the following are BCI methods: Semi-Invasive Method Non-Invasive Method Invasive Method
answer
Semi-Invasive Method Non-Invasive Method Invasive Method
question
The Internet has no center and no one owns it.
answer
True
question
A device gets its IP address from whichever organization is currently connecting it to the Internet.
answer
True
question
The User Datagram Protocol (UDP) acts as a substitute to TCP when there is a need for speed of communication and quality can be sacrificed.
answer
True
question
It is feared that innovation might suffer as a result of the transition of Internet services from flat-rate pricing to metered usage.
answer
True
question
In the URL, the host name is the name of the network a user tries to connect to.
answer
False
question
DSL technology is expensive for service providers in the United States because of the sparsely populated cities.
answer
True
question
Circuit-switched networks are more efficient than packet-switched networks because of the nature of the dedicated connection they provide.
answer
False
question
The basis of CAPTCHA is the: The Internet Turing test Amdahl's Law Bandwidth Moore's Law
answer
Turing test
question
During the video "How the internet works in 5 minutes or less", the internet is described as what? Wire Cloud Two Computers Wild-west Electricity
answer
Wire
question
_____ act as storage places where a firm's servers get super-fast connections as close to the action as possible. a. Internet exchange points b. Incubation facilities c. Dispatch facilities d. Colocation facilities e. Preening facilities
answer
Colocation facilities
question
The address one types into a Web browser is also known as a: a. unique resource locator. b. universal redirection link. c. uniform resource locator. d. universal redirection locator. e. uniform resource link.
answer
uniform resource locator.
question
Peering usually takes place at neutral sites called _____. a. STPs b. ISPs c. IPs d. https e. IXPs
answer
IXPs
question
What protocol do most Web developers use to upload the Web pages, graphics, and other files for their Web sites? a. SNMP b. SMTP c. FTP d. TCP e. HTTP
answer
FTP
question
The domain name service (DNS) is a distributed database that allows users to communicate with other computers by: a. mapping host names to domain names. b. assigning domain names to different IP addresses. c. creating IP addresses that are unique to servers. d. mapping host and domain names to IP addresses of computers. e. assigning IP addresses to different domain names.
answer
mapping host and domain names to IP addresses of computers.
question
Key Inc., an American guitar maker, recently lost an action to recover the domain name piano-key.com, claiming that the defendant infringed on its registered trademark. What did Key Inc. specifically accuse the defendant of? a. Computer trespassing b. Domain hoarding c. Sugging d. Cybersquatting e. Internet stalking
answer
Cybersquatting
question
Which of the following statements is true of the term "FTTH"? a. It refers to high-speed data lines provided by many firms all across the world that interconnect and collectively form the core of the Internet. b. It refers to a situation when separate ISPs link their networks to swap traffic on the Internet. c. It refers to broadband service provided via light-transmitting fiber-optic cables. d. It refers to a system that connects end users to the Internet. e. It refers to the language used to compose Web pages
answer
It refers to broadband service provided via light-transmitting fiber-optic cables.
question
[P] is the primary issue in how companies entice customers to provide them with data.
answer
Privacy
question
During our in-class discussion on Business Intelligence (Unit 5), we identified Microsoft Excel as a database program.
answer
False
question
The most significant enabler of Business Intelligence is: A. Data B. People C. Education D. Technology E. Culture
answer
Technology
question
Firms that base decisions on hunches are said to be gambling, not managing.
answer
True
question
Random occurrences in data mining results can be detected by dividing the data and building a model with one portion and using another portion to verify the results.
answer
True
question
Turning data into useable information is hindered by transactional databases that are set up to be simultaneously accessed for reporting and analysis.
answer
False
question
Data miners should realize that first findings of analytics always reveal an optimal course of action.
answer
False
question
A study by Gartner Research claims that the amount of data on corporate hard drives doubles every eighteen months.
answer
False
question
Conventional reports look more like a spreadsheet, with the various dimensions of analysis in rows and columns, with summary values at the intersection.
answer
False
question
In database terminology, a record represents: a. a single instance of whatever the table keeps track of. b. each category of data contained in a row. c. a list of data, arranged in columns and rows. d. one or more keys that relate separate tables in a database. e. a field or combination of fields used to uniquely identify a file.
answer
a single instance of whatever the table keeps track of.
question
One of the factors that complicates the elimination of legacy systems is the: a. low market value for outdated hardware and software. b. unavailability of suitable data porting methods to offset data redundancy. c. frequency at which technology improves as per Moore's law. d. absence of regulatory mechanisms to handle the efficient disposal of legacy systems. e. costs associated with breaking extended vendor or outsourcer agreements.
answer
costs associated with breaking extended vendor or outsourcer agreements.
question
A(n) _____ refers to a heads-up display of critical indicators that allow managers to get a graphical glance at key performance metrics. a. embassy b. dashboard c. prediction interface d. interstitial e. canned report
answer
dashboard
question
Which of the following questions relate to data quantity? a. What data is needed to compete on analytics and to meet our current and future goals? b. How should the firm handle security and access? c. Can we even get the data we'll need? d. How much data is needed? e. Where will the systems be housed?
answer
How much data is needed?
question
Which of the following is often considered a defensible source of competitive advantage? a. Market capital b. Technology c. Data d. Profits e. Infrastructure
answer
Data
question
Knowledge is defined as: a. the process of breaking a complex topic into smaller parts. b. the insight derived from experience and expertise. c. the data presented in a context so that it can answer a question or support decision making. d. raw facts and figures. e. a listing of primary data.
answer
the insight derived from experience and expertise.
question
Amazon went seven whole years without turning a profit.
answer
True
question
Accounts payable periods do not vary.
answer
False
question
Amazon instantly links its Kindle customers with the firm's entire inventory of physical products.
answer
True
question
Amazon's cloud computing business is taking baby steps in that category.
answer
False
question
Amazon got its start selling games online.
answer
False
question
Amazon has limited its products to only books.
answer
False
question
Data may NOT be a defensible source of competitive advantage (a true strategic asset) if it is... A. Lacking Substitutes B. Imperfectly Imitable C. Valuable D. Rare E. Disruptive
answer
Disruptive
question
The periood between distributing cash and collecting funds associated with a given operation (a.k.a. the Cash Coversion Cycle) may never be negative.
answer
False
question
From the Group 3 Emerging Technology Presentation on Solar Roadways, which of the following was NOT identified as a benefit? A. Heated B. No Potholes C. Sustaining Technology D. Durable E. Lights Up
answer
Sustaining Technology
question
According to the Group 3 Emerging Technology Presentation on Solar Roadways, if a parking lot or highway is full of vehicles, the solar surfaces will not product energy.
answer
False
question
Which of the following models is used for most databases? A. Access B. Relational C. Hierarchical D. Network E. Spreadsheet
answer
Relational
question
Mark, a retailer, is unable to sell his products. He doesn't have sufficient cash to meet his on-going expenses. In this scenario, Mark is facing a(n) _____. a. high inventory turnover problem b. environmental problem c. sugging problem d. stock-out problem e. liquidity problem
answer
liquidity problem
question
Identify the true statement about Amazon. a. Amazon's AWS cloud computing business is one of the smallest players in that category. b. Amazon was founded by Sam Walton. c. Amazon has maintained consistent profitability over the years and analysts continue to predict profits in the firm's future. d. Amazon's profitability has varied widely and analysts continue to struggle to interpret the firm's future. e. Amazon initially adopted the domain of a non-profit organization.
answer
Amazon's profitability has varied widely and analysts continue to struggle to interpret the firm's future.
question
Inventory turns is: a. the number of times an inventory item moves within a warehouse. b. high when the rate of selling merchandise is low. c. also known as gross-profit margin turnover. d. the stock of inventory returned to a manufacturer due to poor quality. e. the number of times inventory is sold or used during a specific period.
answer
the number of times inventory is sold or used during a specific period.
question
Amazon Web Services (AWS): a. is a fool-proof system. b. doesn't provide services such as programming environments. c. forms a majority percentage of Amazon's overall revenue. d. was introduced in 2012, although some offerings were available since 2010. e. offer several advantages, including increased scalability, reliability, and security.
answer
offer several advantages, including increased scalability, reliability, and security.
question
Amazon a. started making profits from the second year of its operation. b. has maintained consistent profitability over the years and analysts continue to predict profits in the firm's future. c. has centered its focus on quarterly results. d. has expanded to dozens of categories beyond books. e. initially adopted the domain of a non-profit organization.
answer
has expanded to dozens of categories beyond books.
question
In Amazon, shelvers are in charge of: a. all the activities associated with the preventive maintenance of a warehouse. b. keeping track of items that produce the most sales volume. c. placing items in available spaces. d. building one's order from a warehouse's inventory. e. signalling a warehouse 'problem solver' in the case of an issue in the warehouse.
answer
placing items in available spaces.
question
Each time an ad is served to a user for viewing is referred to as a(n) [I].
answer
Impression
question
[P] is the algorithm developed by Google cofounder Larry Page to rank Web sites.
answer
PageRank
question
[O] search refers to the search engine results that are returned and ranked according to relevance.
answer
Organic Search
question
Google uses the kind of Intel or AMD processors, low-end hard drives, and RAM chips that one would find in a desktop PC.
answer
True
question
In-game advertising makes more sense in racing or other sports games than it does for games set in the past, future, or on other worlds.
answer
True
question
Huddle in Google+ helps users manage sharing contacts.
answer
False
question
Google's interest-based ads have been accused of profiling users on the basis of race, religion, sexual orientation, health, political, or trade union affiliation, and certain financial categories.
answer
False
question
Text ads appearing on Google search pages are billed on a cost-per-thousand impressions (CPM) basis.
answer
False
question
Online advertising represents the only advertising category trending with positive growth.
answer
True
question
Enriching click fraud refers to the practice in which site operators generate false page views in order to boost their site's CPM earnings.
answer
False
question
Running ads on a Web site is a guaranteed path to profits.
answer
False
question
Google allows users to install a cookie that enables them to opt out of interest-based tracking.
answer
True
question
If several people use the same browser on the same computer without logging on to that machine as separate users, then all of their Web surfing activity may be mixed into the same cookie profile.
answer
True
question
"Cookies cannot reliably identify individual user." Which of the following is the reason for the statement shown above? a. Individual users use different browsers on the same computer to surf the Web. b. Individuals use different log-in accounts on the same computer to browse the Internet. c. Internet service providers assign arbitrary IP addresses to devices accessing the Internet from the same network. d. Cookies assigned by Web servers are prone to duplication. e. The explosion in Internet-enabled mobile devices has resulted in an acute shortage of IP addresses.
answer
a.Individual users use different browsers on the same computer to surf the Web.
question
If a firm's pages are not near the top of query results, customers may never discover its Web site. This has led to _____ becoming a critical function for many marketing organizations. a. last mile access b. content adjacency c. load balancing d. geotargeting e. search engine optimization
answer
e.search engine optimization
question
Which of the following is Google's biggest acquisition to date? a. DoubleClick b. Motorola Mobility c. Zagat d. Android e. YouTube
answer
b.Motorola Mobility
question
Which of the following statements holds true for the term cache? a. It refers to software that traverses available Web links in an attempt to perform a given task. b. It refers to a temporary storage space used to speed computing tasks. c. It refers to Internet content that can't be indexed by Google and other search engines. d. It refers to the Internet directory service that allows devices and services to be named and discoverable. e. It refers to the process of improving a page's organic search results.
answer
b.It refers to a temporary storage space used to speed computing tasks.
question
Which of the following statements holds true for the term spider? a. It refers to a temporary storage space used to speed computing tasks. b. It refers to software that traverses available Web links in an attempt to perform a given task. c. It refers to the Internet directory service that allows devices and services to be named and discoverable. d. It refers to Internet content that can't be indexed by Google and other search engines. e. It refers to the process of improving a page's organic search results.
answer
b.It refers to software that traverses available Web links in an attempt to perform a given task.
question
Which of the following statements holds true for the term server farm? a. It refers to a closed network or single set of services controlled by one dominant firm. b. It refers to a group of surreptitiously infiltrated computers linked and controlled remotely. c. It refers to a network of users with distinct IP addresses, engaged in click fraud. d. It refers to a tracking cookie used to identify users and record behavior across multiple Web sites. e. It refers to a massive network of computer servers running software to coordinate their collective use.
answer
e.It refers to a massive network of computer servers running software to coordinate their collective use.
question
Nearly 30 percent of Google's revenues come from running ads on: a. third-party Web sites. b. competing search engines. c. the Android platform. d. built-in toolbars. e. its organic search pages.
answer
a.third-party Web sites.
question
_____ allows users to pay for goods, store gift cards, and redeem coupons using their mobile phones. a. Google Wallet b. Google+ c. Takeout d. Android e. Google Currents
answer
a.Google Wallet
question
Which of the following formulas is used by Google to determine the rank order of sponsored links appearing on its search results pages? a. Ad rank = Minimum CPC × Click-through rate b. Ad rank = Churn rate × Average cost-per-click c. Ad rank = Maximum CTR × Number of impressions d. Ad rank = Maximum CPC × Quality score e. Ad rank = Cost-per-thousand impressions × Number of impressions
answer
d.Ad rank = Maximum CPC × Quality score
question
Which of the following statements holds true for the term dark Web? a. It refers to a temporary storage space used to speed computing tasks. b. It refers to the Internet directory service that allows devices and services to be named and discoverable. c. It refers to the process of improving a page's organic search results. d. It refers to Internet content that can't be indexed by Google and other search engines. e. It refers to software that traverses available Web links in an attempt to perform a given task.
answer
d.It refers to Internet content that can't be indexed by Google and other search engines.
question
Which of the following statements holds true for search engine optimization (SEO)? a. It refers to a temporary storage space used to speed computing tasks. b. It refers to the process of improving a page's organic search results. c. It refers to the Internet directory service that allows devices and services to be named and discoverable. d. It refers to Internet content that can't be indexed by Google and other search engines. e. It refers to software that traverses available Web links in an attempt to perform a given task.
answer
b.It refers to the process of improving a page's organic search results.
question
Which of the following is true about market maturity? a. Finding new growth markets that are as lucrative as matured markets becomes easier for leaders. b. Small fluctuations in annual revenues create huge movements in the stock prices of firms. c. Mature markets are gradually discarded by all firms in the industry. d. Prices tend to increase due to the mass exit of competing firms from the market. e. Without substantial year-on-year growth, stock prices of firms do not move.
answer
e.Without substantial year-on-year growth, stock prices of firms do not move.
question
Google mounts racks of servers inside standard-sized shipping containers, each with as many as 1,160 servers per box. Google assumes individual components will regularly fail, but no single failure should interrupt the firm's operations. By doing so, Google can ensure its network is: a. data optimized. b. service-regulated. c. organically searched. d. traffic efficient. e. fault-tolerant.
answer
e.fault-tolerant.
question
Which of the following statements holds true for the term plug-in? a. It refers to the generation of bogus clicks, either for financial gain or to attack rivals by draining their online ad budget. b. It refers to a program (typically a marketing effort) that requires customer consent. c. It refers to recruiting a network of users with the goal of spreading IP addresses across several systems. d. It refers to a program that enrolls all customers by default, but that allows consumers to discontinue participation if they want to. e. It refers to a small computer program that extends the feature set or capabilities of another application.
answer
e.It refers to a small computer program that extends the feature set or capabilities of another application.
question
Which of the following metrics is used by Google to develop a precise ad ranking formula that rewards top-performing ads? a. Number of keywords that trigger an ad b. Ratio of graphical content to text content in the ad c. The minimum cost-per-click an advertiser is willing to pay d. Relevance of keywords to Web site content e. An advertisement's quality score
answer
e.An advertisement's quality score
question
Of the various social products associated with a user's profile on Google+, _____ offers group texting. a. Stream b. Messenger c. Sparks d. Hangouts e. Circle
answer
b.Messenger
question
Which of the following is an example of an anomalous pattern typical of online advertising frauds? a. Clicks that fit standard surfing patterns for geography b. A low number of clicks originating from a certain country c. Clicks that fit the standard surfing patterns for time d. Too many visits to a new, obscure site e. Uniform click-through rates across comparable sites
answer
d.Too many visits to a new, obscure site
question
_____ are served by ad networks or other customer profiling firms to identify users and record behavior across multiple Web sites. a. Plug-ins b. Third-party cookies c. Honeypots d. Interstitials e. Creatives
answer
b.Third-party cookies
question
Which of the following statements holds true for the term cost-per-click? a. It refers to the ad rates quoted in cost-per-thousand impressions. b. It refers to the number of users who clicked an ad divided by the number of times the ad was delivered. c. It refers to the cost an advertiser is willing to bear for a particular amount of time a surfer spends on an ad. d. It refers to the maximum amount of money an advertiser is willing to pay for each click on their ad. e. It refers to the number of customers joining a particular social networking Web site.
answer
d.It refers to the maximum amount of money an advertiser is willing to pay for each click on their ad.
question
Which of the following statements holds true for the term click farm? a. It refers to the generation of bogus clicks, either for financial gain or to attack rivals by draining their online ad budget. b. It refers to a program that requires customer consent. c. It refers to a small computer program that extends the feature set or capabilities of another application. d. It refers to a program that enrolls all customers by default, but that allows consumers to discontinue participation if they want to. e. It refers to recruiting a network of users with the goal of spreading IP addresses across several systems and making a fraud effort more difficult to detect.
answer
e.It refers to recruiting a network of users with the goal of spreading IP addresses across several systems and making a fraud effort more difficult to detect.
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New