MIS180 Midterm 1-SDSU

question

Greg Provenzo owns and runs a Blockbuster video store. Greg is implementing a drive-thru rental process that is the same as you would find at a fast-food restaurant. Customers can pick-up and drop-off their videos without leaving their cars. Greg’s new system has become so popular that Videos Plus, a competitor down the street, is attempting to recreate Greg’s video drive-thru rental process. Greg’s system is an example of a _________.
answer

First-mover advantage
question

Your boss, Ty Jacob, has asked you to analyze the music industry using Porter’s Five Forces Model. Which of the following represents the threat of substitute products or services in the music industry?
answer

Game systems like Wii, social networks like Facebook.
question

What provides an example of data?
answer

Who is customer number 12345XX?
question

Greg works for Geneva Steel Corporation. Greg’s duties include managing the overall processes for the company and transforming the steel resources into goods. Which department would Greg most likely work in?
answer

Operations manager
question

Your boss, Kerry Miller, has asked you to analyze the soft-drink industry using Porter’s Five Forces Model. Which of the following represents rivalry in the soft-drink industry?
answer

Coke and Pepsi submit bids to the owner of a football stadium for the exclusive sale of their products during games.
question

Your boss, Tom Repicci, has asked you to analyze the airline industry using Porter’s three generic strategies. Which of the following companies are using a focused strategy?
answer

Sky Taxi-a rent by-the-hour personal plane service.
question

MIS can be an important enabler of business success and innovation. Which of the following statements is accurate when referring to MIS?
answer

MIS is a valuable tool that can leverage the talents of people who know how to use and manage it effectively.
question

Some industries’ competition is much more intense than others. Retail grocery stores such as Kroger, Safeway, and Albertson’s in the United States experience fierce competition and offer similar marketing campaigns to compete. What is this an example of in terms of Porter’s five forces?
answer

Rivalry among existing competitors
question

Your boss, Kerry Miller, has asked you to analyze the soft-drink industry using Porter’s Five Forces Model. Which of the following represents a threat of a new entrant in the soft-drink industry?
answer

Zevia Natural Diet Soda begins selling directly over the Internet
question

When evaluating the six-step decision making process, what occurs during the solution implementation step?
answer

The process will begin again if the decisions made were incorrect.
question

What is the primary goal of the As-Is process model?
answer

To simplify, eliminate, and improve the To-Be process.
question

FedEx is a great example of a company that created a competitive advantage through combining _______________.
answer

MIS and traditional distribution and logistics processes.
question

When evaluating the six-step decision making process, what occurs during the problem identification step?
answer

The problem is defined as clearly and precisely as possible.
question

An optimization analysis finds the optimum value for a target variable by repeatedly changing other variables, subject to specified constraints. What can a manager determine by changing revenue and cost variables in an optimization analysis?
answer

Calculate the highest potential profits.
question

Which of the following is not considered a part of decision making at the managerial level?
answer

Developing overall business goals and objectives.
question

Which of the following are the four common types of effectiveness MIS metrics?
answer

Usability, customer satisfaction, conversion rates, financial
question

Which of the following is a challenge facing an ebusiness?
answer

Increasing liabilities.
question

Internet marketers must develop ___________ to build strong relationships with customers to ensure loyalty.
answer

Consumer trust.
question

Which ebusiness tool increases the speed of business by allowing the transfer of documents with the same speed as the telephone?
answer

Email.
question

What do Netflix and Amazon use to drive their recommendation tools?
answer

User-generated content
question

Which of the following is not a topic or feature that is included in Web 3.0?
answer

Social networking
question

What is the primary way that social networks work?
answer

Connecting people by matching profile information.
question

Cell phone manufacturers often refer to their products as mobile devices. Which of the following would not be included in the folksonomy for a cell phone?
answer

Technology platform.
question

Which of the following is not an example of a social bookmarking website?
answer

Facebook.
question

Which of the following demonstrates potential issues with Business 2.0 and information vandalism?
answer

Open source allows anyone to be able to edit, damage, or destroy content.
question

M&M’s offers people the opportunity to order the candy in special colors or with customized sayings. How would you classify M&M’s ebusiness strategy?
answer

Mass customization.
question

What is an Internet monitoring technique that captures keystrokes on their journey from the keyboard to the motherboard?
answer

Hardware Key Logger.
question

Employees need to understand that email privacy exists to an extent and that corporate email is solely owned by _________.
answer

The company.
question

What type of Internet monitoring technique records information about a customer during a web surfing session, such as what websites were visited and how long the visit was, what ads were viewed, and what was purchased?
answer

Clickstream.
question

Which of the following are all common forms of viruses?
answer

Backdoor program, worm, Trojan-horse virus
question

Which of the following occurs when organizations use software that filters content, such as email, to prevent the accidental or malicious transmission of unauthorized information?
answer

Content filtering.
question

Which of the following is not included as a common stipulation an organization would follow when creating an employee monitoring policy?
answer

Do not state the consequences of violating the policy.
question

An MIS infrastructure is ___________ and ____________.
answer

Dynamic and continually changing.
question

Cheap electricity is great for keeping business energy costs down, but this mean that we have to rely more on ____________ for power.
answer

Coal.
question

What charts the cost to the company of the unavailability of information and technology and the cost to the company of recovering from a disaster over time?
answer

Disaster recovery cost curve.
question

A disaster recovery plan contains a _____________ that outlines the costs to support the plan.
answer

Disaster recovery cost curve.
question

What is a challenge for cloud computing that could cause employee performance to decrease?
answer

Required internet connectivity.
question

Which characteristics support an agile MIS infrastructure?
answer

Accessibility, availability, maintainability, portability, reliability, scalability, usability
question

Which characteristics support a sustainable MIS infrastructure?
answer

Grid computing, cloud computing and virtualization
question

What are core drivers of the information age?
answer

Data, information, business intelligence and knowledge.
question

Knowledge
answer

1. Justified true belief 2. Enables action 3. Intellectual assets such as patents and trademarks 4. Experience or info. that can be communicated or shared 5. The Mental Model we all form through experience, values and education
question

Chief Information Officer (CIO)
answer

oversees all uses of IT and ensures the strategic alignment of IT with business goals and objectives
question

Chief Knowledge Officer (CKO)
answer

responsible for collecting, maintaining, and distributing the organizations knowledge
question

Chief Privacy Officer (CPO)
answer

responsible for ensuring the ethical and legal use of information.
question

Chief Security Officer (CSO)
answer

responsible for ensuring the security of IT systems
question

Chief Technology Officer (CTO)
answer

responsible for ensuring the throughput, speed, accuracy,availability and reliability of IT
question

Porter’s Five Forces Model
answer

Threat of substitute products, buyer power, threat of new entrants and supplier power all come about from rivalry amongst existing competitors
question

The 6-Step Decision Making Process
answer

1. Problem identification (not easy to do) 2. Data collection, collecting data on frequency 3. Solution generation 4. Solution test 5. Solution selection 6. Solution implementation
question

Operational Decision Making
answer

employees develop, control and maintain core business activities required to run the day-to-day operations
question

Structured Decisions
answer

Situations where established processes offer potential solutions
question

Managerial Decision Making
answer

Employees evaluate company operations to identify, adapt to and leverage change
question

Semistructured Decisions
answer

Occur in situations in which a few established processes help to evaluate potential solutions, but not enough to lead to definite recommended decision
question

Strategic Decision Making
answer

Managers develop overall strategies, goals and objectives
question

Unstructured Decisions
answer

Occurs in situations in which no procedures or rules exist to guide decision makers toward the correct choice
question

Critical Success Factors (CSFs)
answer

create high-quality products retain competitive advantages reduce product costs increase customer satisfaction hire and retain the best professionals
question

Key Performance Indicators (KPIs)
answer

Turnover rates of employees Number of product returns Number of new customers Average customer spending
question

Online Analytical Processing (OLAP)
answer

Manipulation of data-information to create business intelligence in support of strategic decision making
question

Four Quantitative Models Used by DSS include:
answer

1. What-If analysis 2. Sensitivity analysis 3. Goal-seeking analysis 4. Optimization analysis
question

Five most common categories of artificial intelligence are:
answer

1. Expert System-computerized advisory programs that imitate the reasoning processes of experts in solving difficult problems 2. Neural Network (ANN)- attempts to emulate the way the human brain works (fuzzy logic) 3. Genetic Algorith-artificial intelligent system that mimics the evolutionary, survival of the fittest process to generate increasingly better solutions to a problem (shopping bot) 4. Intelligent agent-special purpose knowledge-based information system that accomplishes specific tasks on behalf of its users 5. Virtual Reality-computer-simulated environment that can be a simulation of the real/imaginary world
question

Streamlining
answer

Improves business process efficiencies by simplifying or eliminating unnecessary steps
question

Bottleneck
answer

Occur when resources reach full capacity and cannot handle any additional demands
question

EBusiness Advantages
answer

Expanding global reach Opening new markets Reducing costs Improving operations Improving effectiveness
question

Mass Customization
answer

The ability of an organization to tailor its products/services to the customer’s specifications (M&Ms)
question

Personalization
answer

Occurs when a company knows enough about a customers likes and dislikes that it can fashion offers more likely to appeal to that person
question

Clickstream data can reveal:
answer

Number of page views Pattern of websites visited Length of stay on website Data and time visited Number of customers with shopping carts Number of abandoned shopping carts
question

EBusiness Revenue Models
answer

Advertising fees (google) License fees (media downloads) Subscription fees (consumer reports) Transaction fees (credit card processing) Value-added service fees (Telecomm)
question

Explicit Knowledge
answer

Consists of anything that can be documented, archived, and codified, often with the help of IT
question

Tacit Knowledge
answer

Knowledge contained in peoples heads
question

Crowdsourcing
answer

The wisdom of the crowd -Asynchronous communication -Synchronous communication

Get instant access to
all materials

Become a Member