COB 204 Final Exam Latest 2023 Rated A
COB 204 Final Exam Latest 2023 Rated A Amazon exercise covered -abstract modeling -collaboration -system thinking Components of the right side of the IS model -procedure -people Moore's Law -number of transistors per square inch on integrated circuits had doubled every year since their invention -coined by founder of intel (Gordon Moore) -proven accurate -theory, not fact Blockbusters demise can be attributed to failed to adapt to the changing technological landscape center of IT vs IS framework IS Guo used what example to explain the difference between knowledge and data? Issac Newton Dr. Guo is running analysis of female students' academic performance vs that of male students. He obtained the result: Average Male 3.45 vs. Average Female 3.54. Such result is an example of ___. information In the IS model, which component is the "bridge"? Data In Chapter 1, what did we learn from the figure of Amazon Stock Price and Net Income? Information is contextual The best way to find out if an action is a categorical imperative is to ____. let the world scrutinize it Collaboration is defined as a group of people ________. working together to achieve a common goal In our feedback activity, what did Dr. Guo ask you to design? wallet Identify a primary purpose of collaboration making decisions Which of the following is NOT a capability involved in version control? decision making Marci, a purchasing agent, orders 300 refrigerators per month from an online vendor portal. In doing so, she has made a(n) ________ decision. operational Managerial decisions are decisions about ________. the utilization of resources ________ decisions are those that support broad-scope, organizational issues. strategic Following standardized guidelines to calculate sales commissions is an example of a(n) ________. structured decision A company's top managers meet to decide on a potential merger with one of its competitors. They discuss various aspects of the merger, such as business valuations and conducting due diligence. This is an example of ________ decision making. unstructured According to our discussion in class, which of the following collaboration technologies requires the longest learning curve? Sharepoint Porter's five forces model is used to assess ________. industry structure According to Porter's five forces model, which of the following firms would be least affected by the threat of substitutes? a firm that sells the only drug for a disease I-scream-4 Ice Cream recently faced competition against their flagship brand of "Orange peel ice cream." A competitor made significant in-roads into the market by offering three varieties of "Orange peel ice cream." I-scream-4 Ice Cream decided to counter this threat by introducing five new varieties of ice creams. Which competitive strategy is I-scream-4 Ice Cream implementing? product differentiation Focused differentiation occurs when ________. better service is provided within an industry segment Focused cost leadership is observed when a product has the lowest cost ________. within an industry segment The difference between the value that an activity generates and the cost of the activity is called the ________. margin Which of the following value chain activities involves collecting, storing, and physically distributing the product to buyers? operations On Tuesday, we conducted an analysis of industry structure using which of the following? JMU COB Which of the following statements is consistent with the central idea of business process design? Organizations should create new business processes instead of improving existing systems. Locking in customers by making it difficult or expensive for customers to move to another product is called establishing high ________. switching Costs A database is used instead of a spreadsheet when ________. lists of data involve a single theme Which of the following is the smallest element in a database? Byte The columns in a database are also called ________. feilds A foreign key is A physical manifestation of a relationship. The modification or deletion of data in a database is an example of ________ operations of a database management system. processing Which of the following is an international standard language for processing a database? SQL Sonya is the database administrator for RedTriangle media. She is responsible for validating the data model to be used by the DBMS, and specifying the database requirements to endure all appropriate user input is considered. This is an example of Sonya's ________ tasks. development A(n) ________ is a request for data from a database. query Each entity in a database has a unique attribute called a(n) identifier The forked lines on the lines representing relationship between two related entities are referred to as ________. crow's feet We have discussed in class that Amazon IT service relies on the following components: Computing, Storage, Database Compared to traditional IT service, could computing allows clients to ____. pay as much as they use. Just like utilities. Which of the following is an example of IaaS? Amazon S3 A computer ________ is a collection of computers that communicate with one another over transmission lines or wirelessly network In cloud computing, resources are said to be "pooled" because organizations ________. share the same physical hardware through virtualization When we discussed the benefits of being scalable, which product did we use as an example of releasing an app like gambling? Pokemon Go Compared to in-house hosting, cloud-based hosting ________. minimizes the risk of investing in technology that will soon become obsolete Which of the following is a benefit of in-house hosting? in-depth visibility of security and disaster preparedness The term ________ means that the computing resources leased can be increased or decreased dynamically in a short span of time and that organizations pay for just the resources that they use. elasticity ________ are programs that run on a server-tier computer and manage traffic by sending and receiving Web pages to and from clients. web servers In the opening case of ARES, what is the biggest issue that was bothering the executive team? Find the market outlets Which of the following workgroup processes is related to sales and marketing? lead tracking ________ processes span an organization and support activities in multiple departments. Enterprise ________ is a measure of the ratio of process outputs to inputs. Process efficiency Which of the following conditions exists when data are isolated in separated information systems? information silo Tony requests a credit approval of $25,000. Instead, he gets $15,000 approved as customer credit. Which of the following problems caused by information silos is most likely the reason behind it? disjointed processes ________ is the activity of altering existing and designing new business processes to take advantage of new information systems. Business process reengineering A(n)________ system is a suite of applications, a database, and a set of inherent processes for managing all the interactions with the customer, from lead generation to customer service. customer relationship management Identify the top two ERP vendors SAP and Oracle The major benefit of enterprise application integration is that it ________. enables organizations to use existing applications In the context of security threats, pretexting, sniffing, spoofing, and phishing are all examples of ________. unauthorized data access or disclosure When we talked about the concept of vulnerability, Dr. Guo used which one of the following as an example? Human Body Email spoofing is a synonym for ________. phishing Sally has been working really hard lately and asks her manager for a raise. Her manager tells her that she is already the highest paid employee on the floor. Sally doesn't believe her manager, and illegally accesses the employee database to look at salary data. Sally's act can be termed as ________. hacking ________ are small files that enables a browser to access Web sites without having to sign in every time. cookies Which of the following is a critical security function that should be addressed by the senior management of an organization? establishing the security policy In information security, which of the following is TRUE about managing risk? Organizations should implement safeguards that balance the trade-off between risk and cost. Which of the following is classified as a technical safeguard? firewalls Which of the following statements is TRUE about biometric identification? It often faces resistance from users for its invasive nature. A ________ is a string of bits used to encrypt data. key In asymmetric encryption, each site has a ________ for encoding messages. public key The process of hardening a Web site is a ________ safeguard. technical
Geschreven voor
- Instelling
- COB 204
- Vak
- COB 204
Documentinformatie
- Geüpload op
- 4 november 2023
- Aantal pagina's
- 12
- Geschreven in
- 2023/2024
- Type
- Tentamen (uitwerkingen)
- Bevat
- Vragen en antwoorden
Onderwerpen
-
cob 204 final exam latest 2023 rated a
Ook beschikbaar in voordeelbundel