Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Software Engineering Expert

Part I :

1. The move of retail banking to use ATMs after Citibank unveiled its first ATMs illustrates the use of information systems to achieve which business objective?

A) improved efficiency

B) customer and supplier intimacy

C) survival

D) competitive advantage

2. The average number of tickets sold daily online is an example of

A) input.

B) raw data.

C) meaningful information.

D) feedback.

3. What is the most important function of an enterprise application?

A) increasing speed of communicating

B) enabling business functions and departments to share information

C) enabling a company to work collaboratively with customers and suppliers

D) enabling cost-effective e-business processes

4. A(n) ________ system collects data from various key business processes and stores the data in a single, comprehensive data repository, usable by other parts of the business.

A) transaction

B) enterprise

C) automatic reporting

D) management information

5. Which of the following statements is not true about information technology's impacts on business firms?

A) It helps firms expand in size.

B) It helps firms lower the cost of market participation.

C) It helps reduce transaction costs.

D) All statements are true 2

6. Which of the following is the competitive force?

A) suppliers

B) organization politics

C) external environment

D) internal environment

7. A rival of your company, AutoTown, is going to implement analytic software that mines customer data with a goal of enabling the building of automobiles that customers actually want. This can be categorized as using information systems for which competitive strategy?

A) low-cost leadership

B) product differentiation

C) focus on market niche

D) customer intimacy

8. To what competitive force did the printed encyclopedia industry succumb?

A) positioning and rivalry among competitors

B) low cost of entry

C) substitute products or services

D) customer's bargaining power

9. In the information age, the obligations that individuals and organizations have concerning rights to intellectual property fall within the moral dimension of

A) property rights and obligations.

B) system quality.

C) accountability and control.

D) information rights and obligations.

10. Which of the following is not one of the five steps discussed in the chapter as a process for analyzing an ethical issue?

A) Identify the responsible persons.

B) Identify the stakeholders.

C) Identify the options you can reasonably take.

D) Identify and clearly describe the facts. 3

11. The network standard for connecting desktop computers into local area networks that enabled the widespread adoption of client/server computing and local area networks and further stimulated the adoption of personal computers is

A) TCP/IP

B) COBOL

C) Ethernet

D) ASCII

12. Which of the following is NOT an example of the emerging mobile computing platforms?

A) netbooks

B) the Kindle

C) cell phones

D) All are the example of the emerging mobile computing platforms

13. Duplicate data in multiple data files is called data ________.

A) redundancy

B) repetition

C) independence

D) partitions

14. The type of database management approach that represented with two-dimensional tables is the

A) hierarchical DBMS.

B) relational DBMS.

C) network DBMS.

D) object-oriented DBMS.

15. Which is one of the layers in TCP/IP reference model?

A) hardware

B) physical

C) network interface

D) software

16. The Internet is based on which three key technologies?

A) TCP/IP, HTML, and HTTP

B) TCP/IP, HTTP, and packet switching

C) client/server computing, packet switching, and the development of communications

standards for linking networks and computers

D) client/server computing, packet switching, and HTTP 4

17. The six important business objectives of information technology are new products, services, and business models; customer and supplier intimacy; survival; competitive

advantage; operational excellence; and

A) improved flexibility.

B) improved decision making.

C) improved business practices.

D) improved efficiency.

18. The business value of an effective supply chain management system includes all of the following except

A) faster time to market.

B) cost reduction.

C) supply matched to demand.

D) increased inventory levels.

19. A company's suppliers and the processes for managing relationships with them is the

A) supplier's internal supply chain.

B) external supply chain.

C) upstream portion of the supply chain.

D) downstream portion of the supply chain.

20. A suite of integrated software modules for finance and accounting, human resources, manufacturing and production, and sales and marketing best describes

A) SCM software.

B) ERP systems.

C) ERM software.

D) CRM modules. 5

Part II: Essay Questions

Instruction :

The essay questions are from Ch1(Information System in business today), Ch3 (Information Systems, organisation and strategy) , Ch4 (Ethical and social issues in Information Systems) and Ch9 (Achieving operational excellence and customer intimacy:

enterprise applications).

Sample questions

1. You work as a manager to operate the show at the Opera House. How could you use information systems to achieve greater customer intimacy?

2. Discuss Porter's competitive forces model and how does it help company to implement the strategies and use of Information Systems?

3. For the use of employee monitoring system, discuss the impacts of using this system on the ethical, social and political issues.

4. What is ERP (SCM, CRM)? Why do companies invest in ERP (SCM, CRM)? What are the concerns of implementing an ERP (SCM, CRM)?

Part II: Essay Questions (30 marks). In each question, you are expected to write the answer between one to two pages.

1. Kmart's Inc., operating for more than 30 retail stores in New South Wales , sell a range of merchandise, including accessories, home furnishings, and housewares. Senior management has decided that Kmart's needs to tailor merchandise more to local tastes.

For example, stores in Sydney might stock more trendy style of clothes than outside's Sydney retail stores. Based on the above scenario, which competitive strategy Kmart is using? How could information systems help Kmart to implement this new strategy?

How does the implemented Information System can improve the value chain of Kmart?

What data need to be collected in order to implement the Information System to add value to Kmart?

Discuss decisions need to be made prior to implementing information system.

2. Ever get the feeling somebody is trailing you on the Web, watching your every click? Wonder why you start seeing display ads and pop-ups just after you've been scouring the Web for a car, a dress, or cosmetic product? Well, you are right: your behaviour is being tracked, and you are being targeted on the Web so that you are exposed to certain ads and not others. The Web sites you visit track the search engine queries you enter, pages visited, Web content viewed, ads clicked, videos watched, content shared, and the products you purchase. Google is the largest Web tracker, monitoring thousands of Websites. It is noted that Google knows more than about you you're your mother does. Which of the five moral dimensions of information system identified in the above case? Discuss them.

3. Brisbane-based Toyota Australia, with a network of 30 dealers, did not know enough to operate efficiently with their own main business functions (e.g. accounting, sales, marketing, inventory, human resources). How could ERP system help solve this problem?

Software Engineering, Computer Science

  • Category:- Software Engineering
  • Reference No.:- M9752462

Have any Question?


Related Questions in Software Engineering

Assignment lab - statement of workclient liberty vacation

Assignment Lab - Statement of Work Client: Liberty Vacation Planning Inc. (LVP) Project: Website Assessment 1. Project Objectives With this statement of work, LVP is engaging you to conduct a website assessment to determ ...

Write reply to this article with references with apa

Write reply to this article with references with APA bibliography. Hate Crimes Over the past couple of years, hate crimes have been on the rise in America's largest cities. Studies show that there were sharp spikes in th ...

Reply to this article with apa referencehate crimes

Reply to this article with APA reference. Hate crimes According to Merriam-Webster, hate crime is any of various crimes (such as assault or defacement of property) when motivated by hostility to the victim as a member of ...

Proposaldesign of an efficient gps tracking system tag for

Proposal Design of an efficient GPS Tracking System (tag) for monitoring small species IMPLEMENTING EMBEDDED SYSTEMS USING SYSML Task Using PapyrusSysML Software (Downloadable online - Evaluation Copy- Latest Version) Mo ...

Address the following integrating biblical perspectives

Address the following, integrating biblical perspectives where appropriate: Define a hate crime and describe how white supremacist groups use the Internet to spread their message of hate. Explain why hate crime legislati ...

In this assignment you will answer the following questions

In this assignment, you will answer the following questions related to Android platform and Android security design. 1. Describe Android architecture in detail by explaining the four conceptual layers. 2. Describe Androi ...

Assignment part 1objectives to learn to identify the

Assignment Part 1 Objectives: To learn to identify the relevant use cases for a given application, describe the use cases and develop an object-oriented domain model. Problem Statement - Standing Orders Management System ...

The research paper for this course is about some of the

The research paper for this course is about some of the best sources of digital evidence for child abuse and exploitation, domestic violence, and gambling according to the National Institute of Justice. Research commerci ...

Research projectin the course we have covered various

RESEARCH PROJECT In the course, we have covered various security and privacy issues that arise in the cyberspace field. We have learned to identify these risks and have discussed the current approaches and developments f ...

Instructionsprivacy-preserving data miningdata mining

INSTRUCTIONS PRIVACY-PRESERVING DATA MINING Data mining technology can be exploited to reveal sensitive information from the original data. Thus it is important to preservethe privacy of the parties that the data refer t ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As