Computer Software Information Technology
This discussion is about Computer Software Information Technology,
Information technology
any computer-based tool that people use to work with information and support the information and information-processing needs of an organization
Hardware
the physical components of a computer, physical devices that make up a computer (or computer system)
Software
set of instructions that hardware executes to carry out a specific task for you
Input device
enter information and commands
Output device
hear, see, or otherwise recognize the results of information-processing requests
Storage device
store information for use at a later time
CPU
hardware that interprets and executes software and coordinates all hardware
RAM
temporary holding area for information and software
Telecommunications device
send information to and receive it from another person or computer in a network
Connecting device
lets you connect peripherals to your computer
Application software
enables you to solve specific problems or perform specific tasks
System software
handles tasks specific to technology management and coordinates the interaction of all technology devices
Operating system software
controls application software and manages hardware devices
Utility software
provides additional functionality to your operating system
Personal digital assistant (PDA)
small handheld computer for personal tasks like appointment scheduling and address book maintenance
Tablet PC
pen-based computer with the functionality of a notebook or desktop
Notebook computer
small, portable, fully functional, battery-powered computer.
Desktop computer
most popular type of personal computer
Minicomputer (mid-range computer)
meets needs of several people simultaneously in a small or medium-sized business
Mainframe computer
meets needs of hundreds of people in a large business
Supercomputer
fastest, most powerful, and most expensive type of computer
Personal productivity software
SOFTWARE – INTELLECTUAL INTERFACE helps you perform personal tasks
Software suite
several applications bundled together (usually productivity software)
Word processing
helps you create letters, memos, and other basic documents
Spreadsheet
helps you work with numbers, perform calculations and create graphs
Presentation
helps you create and edit information that will appear in slides
Desktop publishing
extends word processing by including design and formatting techniques to enhance the appearance of the document
Personal information management (PIM)
helps you create and maintain to-do lists, appointments, calendars, etc.
Personal finance
helps you maintain your checkbook and handle other personal finance tasks
Web authoring
helps you design and develop Web sites
Graphics
helps you create and edit photos and art
Communications
helps you communicate with others
Database management system (DBMS)
helps you specify the logical organization for a database; access and use the information within a database
Vertical market software
application software for a specific industry
Horizontal market software
– application software suitable for use in many industries
Utility Software
adds functionality to operating system software
Anti-virus software
detects and removes or quarantines computer viruses
Crash-proof software
helps save information if your system crashes
Uninstaller software
removes software from your hard disk
Disk optimization software
organizes information on your hard disk
Spam blocker
filters unwanted e-mail
Binary digit (bit)
smallest unit of information your computer can process
Byte –
eight bits or the number of bits it takes to represent one natural character
ASCII (American Standard Code for Information Interchange)
coding system that personal computers use
Keyboards
most frequently input devices for notebooks and desktops to enter information and commands
Stylus
most frequently used input devices for PDAs and tablet PCs to enter information and commands
Pointing Device –
used to input commands
Touchpad
dark rectangle you use to move the cursor with your finger
Pointing stick
a little rod, used mostly on notebooks
Scanners –
used to convert information that exists in visible form into electronic form
Image scanner –
captures images, photos, text, and artwork
Bar code scanner –
reads information in the form of vertical bars
Biometric scanner –
scans a human physical attribute, like a fingerprint or iris, for security purposes
Viewable image size (VIS) –
the size of the image on a monitor
Resolution of a screen –
the number of pixels it has
Pixels (picture elements) –
the dots that make up the image
Dot pitch –
the distance between the centers of two like-colored pixels
Megabyte (MB or M or Meg) –
– about 1 million bytes
Gigabyte (GB or Gig)
about 1 billion bytes
Terabyte (TB)
about 1 trillion bytes
Hard disk –
magnetic storage with one or more thin metal platters sealed inside the drive
Insourcing –
IT specialists inside your organization
Selfsourcing –
do-it-yourself approach many end users take with little or no help from IT specialists
Outsourcing –
a third-party organization (i.e., let someone do the work and pay them for it)
Systems development life cycle (SDLC) –
a structured step-by-step approach for developing information systems
Also called a waterfall
methodology, an approach in which each phase of the SDLC is followed by another, from planning through implementation
Planning phase
– create a solid plan for developing your information system
Project scope –
clearly defines the high-level system requirements
Scope creep –
occurs when the scope of the project increases
Feature creep –
occurs when developers add extra features that were not part of the initial requirements
Project scope document –
a written definition of the project scope and is usually no longer than a paragraph
Project plan –
defines the what, when, and who questions of system development
Project manager
– an individual who is an expert in project planning and management, defines and develops the project plan and tracks the plan to ensure all key project milestones are completed on time
Project milestones
– represent key dates for which you need a certain group of activities performed
Analysis phase –
involves end users and IT specialists working together to gather, understand, and document the business requirements for the proposed system
Business requirements
– the detailed set of knowledge worker requests that the system must meet in order to be successful
Requirements definition document –
prioritizes the business requirements and places them in a formal comprehensive document
Design phase –
build a technical blueprint of how the proposed system will work
Development phase –
take all of your detailed design documents from the design phase and transform them into an actual system
Testing phase
– verifies that the system works and meets all of the business requirements defined in the analysis phase
Test conditions
the detailed steps the system must perform along with the expected results of each step
Unit testing –
tests individual units of code
System testing –
verifies that the units of code function correctly when integrated
Integration testing –
verifies that separate systems work together
User acceptance testing (UAT) –
determines if the system satisfies the business requirements
Implementation phase –
distribute the system to all of the knowledge workers and they begin using the system to perform their everyday jobs
User documentation –
highlights how to use the system
Online training –
runs over the Internet or off a CD-ROM
Workshop training –
is held in a classroom environment and lead by an instructor
Parallel implementation
– use both the old and new system simultaneously
Plunge implementation
– discard the old system completely and use the new
Pilot implementation
– start with small groups of people on the new system and gradually add more users
Phased implementation
– implement the new system in phases
Maintenance phase –
monitor and support the new system to ensure it continues to meet the business goals
Selfsourcing (end-user development)
– the development and support of IT systems by end users with little or no help from IT specialists
Prototype –
a model of a proposed product, service, or system
Prototyping –
the process of building a model that demonstrates the features of a proposed product, service, or system
Outsourcing –
the delegation of specified work to a third party for a specified length of time, at a specified cost, and at a specified level of service
Intellectual property
– intangible creative work that is embodied in physical form
Copyright
– legal protection afforded an expression of an idea
Fair Use Doctrine
– may use copyrighted material in certain situations
Pirated software
– the unauthorized use, duplication, distribution, or sale of copyrighted software
Privacy –
the right to left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent
Phishing (carding, brand spoofing) –
a technique to gain personal information for the purpose of identity theft
Pharming –
rerouting your request for a legitimate Web site
Cookie –
a small file that contains information about you and your Web activities, which a Web site places on your computer
Spam –
unsolicited e-mail from businesses advertising goods and services
Adware –
software to generate ads that installs itself when you download another program
Spyware (sneakware, stealthware) –
software that comes hidden in downloaded software and helps itself to your computer resources
Trojan horse software –
software you don’t want inside software you do want
Hackers –
knowledgeable computer users who use their knowledge to invade other people’s computers
Computer virus (virus) –
software that is written with malicious intent to cause annoyance or damage
Worm –
type of virus that spreads itself from computer to computer usually via e-mail
Denial-of-service (DoS) attack –
floods a Web site with so many requests for service that it slows down or crashes
Anti-virus software –
detects and removes or quarantines computer viruses
Firewall –
hardware and/or software that protects a computer or network from intruders
Encryption –
scrambles the contents of a file so that you can’t read it without having the right decryption key
in this video, samir describes how business executives use a bi application to drill down and see _____ data, the detail in the data such as data on a particular store or data on a particular item.
Granular
With E-commerce and the Internet, which of the following depicts a trend in advertising?
E-commerce and Internet advertising have grown while traditional advertising and commerce have remained flat.
What is emerging as a major business area of innovation that offers a flexible collection of computers on the Internet that can perform tasks previously performed on corporate computers?
Cloud Computing
Which of the following most accurately describes an information system?
A set of components that gather, analyze, store, and utilize information for making better decisions for a firm
What are the dimensions of information systems?
Organizations, People, and Information Technology
What are the steps of the problem solving process?
Problem Identification, Solution Design, Solution Evaluation and Choice, and Implementation
As Julie explains to Trey, she needs sales data in order to plan future cookie production. Based on her explanation, data is defined as _____.
recorded facts or figures
When Julie describes calculating the average number of cookies sold in February, she is describing an example of obtaining _____ from _____.
information; data
Based on the information in this video, which of the following describes high quality data?
It is correct, current, and complete.
In this video dramatization, Julie and Trey discuss the need to document any changes they make to a cookie recipe. If they change the recipe for red velvet cookies and don’t change the list of ingredients they use for the procurement of inputs, this is an example of failure of data to be _____.
correct
As Julie explains to Trey, she needs information obtained from high quality data to help her make good decisions. Which of the following four documents would not be a good source of information for Julie?
a social media report that shows the total number of “likes” for each cookie
What primary goal does the San Francisco Giants’ “dynamic ticket pricing” help accomplish?
It allows ticket prices to fluctuate according to demand
Businesses in America will spend approximately $600 ____________ on hardware, software, and telecommunications equipment in 2015.
Billion
With new laws requiring the storage of emails and other important documents, estimates of information systems storage now exceeds 1.8:
Zettabytes
When talking about changes related to information technology, the text identifies three interrelated changes that are responsible for the bulk of innovations. These include the mobile digital platform, ________________________, and the growth of cloud computing.
the growing use of big data
___________________ is a business driver which focuses on ways to achieve better efficiencies to increase profits.
Operational Excellence
If a competitor to your business introduces an effective product or service (i.e., when Citibank first introduced the ATM), your need to follow is considered an example of the business driver:
Survival
A manager upset that he or she is not receiving forecasts, sales projections, or appropriate dashboards is expressing frustration for having a poor ______________ business driver:
Improved Decision Making
An automobile rental company interested in learning and adapting to the needs of its customers is focusing on the business driver:
Customer and Supplier Intimacy
Which is an example of a business using information systems for customer intimacy?
Mandarin Oriental Hotel’s customer-preference tracking system
In its simplest form, ___________ represents streams of raw facts with limited usefulness until organized.
Data
An information system can be defined technically as a set of interrelated components that collect (or retrieve), process, store, and distribute information to support which of the following?
Decision making and control in an organization
What is the name for the process of converting raw data into a more meaningful form?
Processing
What is the name for the field that deals with behavioral issues as well as technical issues surrounding the development, use, and impact of information systems used by managers and employees in the firm?
Management Information Systems
Information systems, management information systems, information technology, information management, and computer information systems are often confused with one another. Which of these focuses primarily on hardware and software?
Information Technology
Which of the following is NOT an element of critical thinking?
Providing iterative feedback
Which of the following business problems is NOT a problem in the technology dimension?
Complexity of task
Which of the following is NOT a step in the problem-solving process?
Solution analysis
Which of the following is NOT considered to be a typical people problem?
Political Conflict
The problem solving model consists of problem identification, solution design, ________________, and implementation.
Solution evaluation and choice
in this video, samir describes how business executives use a bi application to drill down and see _____ data, the detail in the data such as data on a particular store or data on a particular item.
Granular
If you are solving a problem using the problem solving model, the phase where you identify as many possible solutions as possible would represent the ___________ phase.
Solution Design
The final phase of the problem solving model is the ___________ phase.
Implementation
Accountants rely heavily on information systems to do all of the following EXCEPT ________.
Manage financial investments
Which of the following is FALSE about the information systems occupations through 2022?
Offshore outsourcing will decrease demand in the US for managerial IS positions
_____________ is the largest single group in the U.S. business labor force and this group dramatically benefits from information to help with the decision making process.
Management
Among fields such as accounting, finance, marketing, and others, which has undergone the most change because of technology in the past 5 years?
Marketing
Checking for quality and paying creditors would fall within which two functional areas?
Manufacturing and production, and finance and accounting
Enterprise Systems are also known as ________________.
Enterprise Resource Planning (ERP) Systems
ESS, DSS, and MIS systems all fall under the generic term of _______ systems as they help with the decision making process.
Business Intelligence
What solution would a corporation use if they had a collection of mostly older systems which they wanted to connect to one another?
Enterprise applications
_____ refers to the use of social networking to extend a business’ collaboration efforts in order to engage and connect better with their employees, suppliers, and/or their customers.
Social Business
Based on the information in this video, which of the following is the most accurate description of a business intelligence system?
an information system that processes data into information containing patterns, relationships, and trends
In this video, Samir describes how business executives use a BI application to drill down and see _____ data, the detail in the data such as data on a particular store or data on a particular item.
Granular
According to Samir’s explanation to Ryan, all of the following statements about data marts are true except _____.
They are larger than data warehouses.
In this video, Samir describes the role of the business intelligence team in three primary activities that include data acquisition, data analysis, and _____.
Publishing results
Based on the information in this video, modern business intelligence reporting tools use _____ interfaces that display the results of data analysis.
Graphical Dashboard
ABB implemented a __________ system to help staff more effectively locate information about company projects and initiatives.
dynamic knowledge sharing
An antique dealer buying items and hoping to sell them for more than he or she paid for them is the very definition of a:
business
The four major functions of a business include manufacturing/production, sales/marketing, finance/accounting, and _________________.
human resources
Which of the following statements represents a responsibility of the sales and marketing functional area?
Identifying customers
in this video, samir describes how business executives use a bi application to drill down and see _____ data, the detail in the data such as data on a particular store or data on a particular item.
Granular
The order fulfillment process involves which of the following functional areas of the business?
Sales, accounting, manufacturing, and production
Which of the following is FALSE about the needs for information by different groups in an organization?
Knowledge workers need access to financial performance information.
A secretary assisting management is considered a _________ worker.
Data
Which of the following entities is NOT a part of the firm’s environment?
Employees
____________ focus on day-to-day operations of a business including managing sales, payroll, and receipts.
Transaction processing systems
in this video, samir describes how business executives use a bi application to drill down and see _____ data, the detail in the data such as data on a particular store or data on a particular item.
Granular
_______________ is an emerging area where data is organized in a meaningful way to help managers make data-driven business decisions.
Business Intelligence
Examining a map that depicts different colors based on flu outbreaks is an example of a digital ____________.
Dashboard
__________________ are designed to capture critical processes, procedures, and experience to ensure this critical content isn’t lost when someone leaves the organization.
Knowledge management systems
eBay is an example of a/n ___________ because it sells products over the Internet.
Electronic Commerce
Someone visiting a government website to purchase a fishing license is specifically an example of:
E-government
________________ commonly involves sites like Twitter and Facebook to collaborate with customers.
Social Business
Which of the following is NOT a reason that collaboration and teamwork are more important today than ever?
Growth of outsourcing
A ______________ is a social website that allows groups to meet together and share knowledge about a specific area like coins, space, or stamps.
community
Which of the following is NOT an application used in social business?
___________ commerce is a way for individuals to provide feedback and reviews about products and services.
Social
Which of the following is a file storage and synchronization service for cloud storage, file sharing, and collaborative editing?
Google Drive
A key benefit of collaboration is _______________, which focuses on deriving better and more unique ideas for products and services.
Innovation
Which capability of social software allows users to use real-time information streams, status updates, and announcements?
Feeds and Notifications
_________________ are information systems professionals who help bridge the relationships between programmers and end users to identify requirements for improved systems.
Systems Analysts
What is the advantage of having a centralized information services department, which operates as a separate department similar to other departments?
This is more likely to produce more compatible systems and more coherent long-term systems development plans.
A ________ is a senior manager who oversees the use of IT in the firm.
CIO
For the sale of online used textbooks with many suppliers and low cost to switch to a different supplier, is an example of:
Customers having a lot of power
What are the four generic information system strategies for dealing with competitive forces?
Low-cost leadership, product differentiation, focus on market niche, and strengthening customer and supplier intimacy
What is the domestic exporter strategy characterized by?
Heavy centralization of corporate activities in the home country of origin
in this video, samir describes how business executives use a bi application to drill down and see _____ data, the detail in the data such as data on a particular store or data on a particular item.
Granular
Transnational firms have no single national headquarters but instead have many regional headquarters and perhaps a world headquarters. What is the transnational strategy characterized by?
Nearly all the value-adding activities are managed from a global perspective without reference to national borders.
Six sigma is a specific measure of _________, representing ____________________.
quality; 3.4 defects per million opportunities
Based on the information provided in this video, Porter’s Five Forces Model is useful to analyze a business and identify its _____.
strategic position within its industry
As David explains to Lauren, which of the following can force a business and its competitors to compete on price?
bargaining power of buyers
In this video dramatization, David diagrams Michael Porter’s Five Forces Model. The force at the center of this model that is affected by the other forces is the _____.
intensity of rivalry within the industry
According to David, Walmart negotiates with manufacturers and wholesalers to keep their profit margins low so that Walmart can offer lower prices to its customers. This is an example of _____.
strong bargaining power of buyers [Walmart is the buyer]
Walmart’s decision to build fulfillment centers illustrates which force in Porter’s Five Forces Model?
Threat of new entrants
Which of Porter’s competitive forces model would describe an organization that loses customers due to its product prices being too high?
Substitute products and services
Which of the following is NOT an impact of the Internet on competitive forces and industry structure?
Reduces the price of products and services
Which type of activity within the value chain model is directly related to the production and distribution for a firm’s products and services?
Primary activities
Which of the following is NOT an example of a primary activity in the value chain?
Human resources management
Which of the following is NOT a way that information systems provide a competitive advantage?
Collecting and storing large amounts of data
Porter’s Five Forces Model states that the intensity of the competitive forces determines all of the following EXCEPT industry ________.
segmentation
Which of the following is NOT part of the description of a value web?
They promote communication among units.
When a firm does something in which they are a world-class leader, that activity would be considered to be a _____________ for the company.
core competency
If Koa’s Puppy Food Corporation maintains a highly centralized operation with all corporate operations taking place in its home country, it is said to have a ___________ global strategy.
Domestic Exporter
A networked system configuration supports which of the following international business strategies?
Multinational and transnational
If Koa’s Puppy Food Corporation maintains a highly centralized operation with financial management, but decentralizes production and marketing to other countries, is said to have a ___________ global strategy.
Multinational
If Koa’s Puppy Food Corporation maintains a strategy to take advantage of local competitive advantages and avoids the notion of national boarders, it is said to have a ___________ global strategy.
Transnational
Companies often use information systems to improve quality by ______________ as a way to set standards for products and services against predefined standards.
Benchmarking
To help improve quality, Delta Airlines installed customer care systems at some of its airport gates. The goal of this information system is to improve ______________________.
customer service and the quality of the product
Automobiles have the opportunity to use computer-aided design (CAD) to create virtual models of parts and even prototype vehicles. This use of information systems to improve quality is related to ______________________.
improving design quality and precision
The acronym related to organizational improvements, TQM, stands for ____________________.
Total quality management
The popular quality management technique that specifically calls for 3.4 defects per million opportunities is called
six sigma
______________ is a term, when described from a customer perspective, that involves demanding durability, safety, ease of use, as well as service effectiveness and responsiveness.
Quality
______________ is the total time it takes a child to purchase lemonade ingredients, create the lemonade, and set up operations for a neighborhood lemonade stand.
Cycle Time
______ is the acronym related to a leading model for improving business processes to enhance competitiveness.
BPM
____________ is the final and ongoing step of the business process management model.
Continuous Measurement
Which of the following is FALSE regarding the description of business process management (BPM)?
It works on increasing process throughput and quality.
In the Datacard Case, the company decided on a complete business process transformation. An example of a successful business process redesign described in the case included ________________.
the distribution of pricing to Datacard’s partners
–
____________ is a business process improvement model which is most know———-
n and used when dramatic change is needed to gain improvements in productivity and efficiency.
Business process reengineering
With E-commerce and the Internet, which of the following depicts a trend in advertising?
E-commerce and Internet advertising have grown while traditional advertising and commerce have remained flat.
What is emerging as a major business area of innovation that offers a flexible collection of computers on the Internet that can perform tasks previously performed on corporate computers?
Cloud computing
If you include hardware, software, networking, and necessary management consulting, this amounts to over ________ in 2015 in the United States
$1 trillion
A collection of computers on the Internet that allow for innovations such as software as a service (SaaS) is simply called (the):
Cloud
IoT stands for the:
Internet of Things
For technology, which are the three interrelated advances that make MIS so exciting now and into the future?
Big data, cloud computing, and the mobile digital platform
Which of the following most accurately describes an information system?
A set of components that gather, analyze, store, and utilize information for making better decisions for a firm
What are the dimensions of information systems?
Organizations, People, and Information Technology
Apple’s ITunes and a traditional music store have very different business ___________ with regards to how they produce and deliver products to customers.
Models
An online store asking you to complete a customer satisfaction survey to better understand its customers after making a purchase is primarily addressing which business objective?
customer and supplier intimacy
An example of the business objective ___________ would include one online coin shop offering a free app that can detect fake coins, and all other online stores following this strategy or potentially going out of business.
Survival
_____ is output from an information system that is returned to key people who analyze it to, evaluate it, and refine inputs for the system.
Feedback
What are the steps of the problem solving process?
Problem Identification, Solution Design, Solution Evaluation and Choice, and Implementation
What are the four elements of critical thinking?
Maintaining doubt and suspending judgment, Being aware of different perspectives, Testing alternatives and letting experience guide, and Being aware of organizational and personal limitations
The Problem-Solving Model consists of __________________, solution design, solution evaluation and choice, and implementation.
problem identification
The Problem-Solving Model phase where you determine a performance discrepancy that might be caused by an outdated system is the ________ phase.
problem identification
Regarding dimensions of business problems, a lack of properly trained employees is considered a ______________ dimension.
People
Which of the following is false about information systems?
Customers and suppliers are considered important elements of the information system as they provide key data.
_________ is when a company transfers tasks of the firm to other firms that operate in low-wage countries, possibly reducing job opportunities within the U.S.
Offshoring
What are the major objectives that businesses use information systems to achieve?
Operational excellence, new products, services, and business models; customer/supplier intimacy; improved decision making; competitive advantage; and day-to-day survival
Because important financial documents are required to be submitted via the Internet in formats such as XBRL, ______________ has been impacted by information systems.
Accounting
_________________ has been impacted by information systems as things like traditional guest comment cards are transformed into online guest comment cards.
Marketing
Outsourcing to domestic U.S. firms and _____________ outsourcing are both considered ways to reduce costs by US organizations.
Offshore
Expansion to global markets requires more coordination of resources for a firm to create their goods. This has transformed the need for information systems for the field of ________________.
Operations management
Checking for quality and paying creditors would fall within which two functional areas?
Manufacturing and production, and finance and accounting
Enterprise Systems are also known as ________________.
Enterprise Resource Planning (ERP) Systems
Business ______________ are the strategized steps and activities that are coordinated within an organization.
processes
_______________________ are the functional business processes responsible for quality assurance.
manufacturing and production
_______________________ is the functional business process responsible for managing cash accounts.
finance and accounting
Technology, economy, politics, and global changes are typically classified best by which of the following?
Broad, general, external environment groups that influence an organization’s strategy
in this video, samir describes how business executives use a bi application to drill down and see _____ data, the detail in the data such as data on a particular store or data on a particular item.
Granular
ESS, DSS, and MIS systems all fall under the generic term of _______ systems as they help with the decision making process.
business intelligence
What solution would a corporation use if they had a collection of mostly older systems which they wanted to connect to one another?
Enterprise Applications
________________ focus(es) on providing decision making data available for middle managers to make sound business decisions.
Management information systems
in this video, samir describes how business executives use a bi application to drill down and see _____ data, the detail in the data such as data on a particular store or data on a particular item.
Granular
Creating a new system that provides charts and graphs to assist senior management make non-routine decisions is called (a):
Executive support systems.
Systems designed to help maintain and improve customer data and its relationship with customers are called __________________ systems.
customer relationship management
in this video, samir describes how business executives use a bi application to drill down and see _____ data, the detail in the data such as data on a particular store or data on a particular item.
Granular
A single screen of graphs or charts of key performance indicators is known as a(n) ________________________.
digital dashbaord
_____ refers to the use of social networking to extend a business’ collaboration efforts in order to engage and connect better with their employees, suppliers, and/or their customers.
Social Business
What is social business?
Use of social networking platforms to engage employees, customers, and suppliers
An important word associated with social business is ___________ which includes customers, suppliers, employees, managers, and oversight committees.
conversations
___________________ is/are an application of social business that allows for the opportunity to share documents.
File Sharing
Virtually anyone can set up a(n) ________________, an application of social business which allows for publishing opinions and experiences about a variety of topics.
Blog
Which of the following is an interorganizational system that provides a seamless flow of information to both suppliers of raw materials as well as to customers?
supply chain management system
_____ is responsible for enterprise-wide governance and usage of information to maximize the value of the organization’s data.
Chief data officer
Many companies have social networks that gather and use information from customers and employees thus creating an important role for the _____ to coordinate the protection of all data.
chief privacy officer
When a leading discount store’s database was breached, a lot of attention was on the company’s ____________________, who is specifically responsible for training employees about security.
chief security officer
The senior leadership position responsible for the organization’s data is called the ____________ officer.
chief data
in this video, samir describes how business executives use a bi application to drill down and see _____ data, the detail in the data such as data on a particular store or data on a particular item.
Granular
The senior leadership position responsible for the organization’s internal knowledge (i.e. tacit knowledge) is called the ____________.
chief knowledge officer
_____ are the people or groups, both internal and external to the organization, for whom applications are developed.
end users
For the sale of online used textbooks with many suppliers and low cost to switch to a different supplier, is an example of:
customers having a lot of power.
What are the four generic information system strategies for dealing with competitive forces?
Low-cost leadership, product differentiation, focus on market niche, and strengthening customer and supplier intimacy
Michael Porter developed the ________________ model, which emerged as a leading model for better understanding the important concept of competitive advantage.
competitive forces
Porter’s competitive forces model includes _________ forces that impact every organization.
5
Porter’s competitive force concerned about barriers to entry is/are _______________.
new market entrants
in this video, samir describes how business executives use a bi application to drill down and see _____ data, the detail in the data such as data on a particular store or data on a particular item.
Granular