Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Management Theories Expert

Q1. __________ involves the evaluation of strengths and weaknesses, which are internal factors; and opportunities and threats, which are external factors.
a. Strategic analysis
b. Business performance
c. Operational planning
d. SWOT analysis

Q2. __________ involve the purchase of materials, the processing of materials into products, and delivery of products to customers.
a. Supply chains
b. Logistics
c. Primary activities
d. Support activities

Q3. How a company generates revenue from its assets is referred to as its __________.
a. asset infrastructure
b. business model
c. corporate culture
d. organizational structure

Q4. Why are companies, such as Monsanto and Wells Fargo, willing to invest in the building of new data centers?
a. To stop wasting capital maintaining outdated energy-inefficient data centers.
b. To comply with government energy regulations.
c. To develop new computing capabilities.
d. To improve business process performance.

Q5. A negative ethical impact of mobile marketing efforts is that they can be __________.
a. invasive
b. expensive
c. innovative
d. pervasive

Q6. Which of the following is a characteristic of competitive advantage?
a. It is a long lasting edge over competitors if based on IT.
b. It is short-lived if competitors quickly duplicate it.
c. It requires the use of social media and networks.
d. It always provides a big strategic payoff.

Q7. Which of the following statements about mobile market opportunities is false?
a. Mobiles are replacing computers as the primary way to connect with public and private networks and to get work done.
b. Mobile gadgets are starting to look and feel like handheld computers, able to run all sorts of software.
c. Desktop and laptop computers are taking on more and more nontraditional duties, like streaming media to TV sets, stereos, and other household appliances.
d. Touch-navigate devices running on 3G and 4G networks create business opportunities and eliminate business threats.

Q8. Decision makers manipulate models in a DSS to perform __________ analysis, which refers to changing assumptions or data in the model to see the impacts of those changes on the outcome.
a. goal seeking
b. experimental
c. structured
d. what-if

Q9. When employees log into the company network or e-mail accounts, or access data or documents to perform their jobs, two critical factors impacting their productivity are:
a. password strength and availability of mobile networks.
b. cloud computing and software applications.
c. virtualization and private clouds.
d. speed of the response and the reliability of the hardware.

Q10. Cloud computing is Internet-based computing in which shared resources, such as hard drives and software apps, are provided to computers and other devices __________, like a public utility.
a. in batch
b. via mobile networks
c. on-demand
d. via SaaS

Q11. __________ is data that has been processed, organized, or put into context so that it has meaning and value to the person receiving it.
a. Information
b. A transaction
c. Knowledge
d. A report

Q12. Sales of fresh produce drop during an E. coli food contamination crisis. What type of reports would be generated in this unique situation?
a. Periodic
b. Exception
c. Ad hoc
d. Functional

Q13. A __________ is a visual presentation of critical data, such as the results of a report or analysis, to more quickly understand data.
a. dashboard
b. GUI
c. touch screen
d. KPI

Q14. A transaction processing system (TPS):
a. processes raw data.
b. does reporting.
c. extracts, transforms, and loads data.
d. does advanced data analysis.

Q15. The main difference between a database and data warehouse is that:
a. databases are designed and optimized to store data, whereas data warehouses are designed and optimized to respond to analysis questions that are critical for a business.
b. databases are designed and optimized to analyze data, whereas data warehouses are designed and optimized to store data for sharing.
c. databases are designed to detect trends in the data, whereas data warehouses are designed to support supply chains.
d. databases are designed to support traditional commerce, whereas data warehouses are designed to support e-commerce.

Q16. Companies implement __________ systems to retain and archive their business records that are not needed for current operations or decisions, but that must be accessible for legal or auditing obligations.
a. electronic records management
b. database management
c. archive management
d. infrastructure management

Q17. According to the principle of __________, the more recent the data, the more valuable they are.
a. data uncertainty
b. 90/90 data use
c. diminishing data value
d. data in context

Q18. Creating backups of records is not a form of electronic records management (ERM) because:
a. the content on backups is not organized so that it can be accurately and easily retrieved.
b. business records and documents may need to be modified.
c. records and documents cannot be stored together.
d. the requirement to save records is new.

Q19. Which is not a benefit of having a unified view of customers?
a. More accurate customer data to support marketing, sales, support, and service initiatives.
b. Better responsiveness to ensure that customer service representatives have up-to-date, reliable information on the customers.
c. Faster transaction processing by organizing the data in one location.
d. Better revenue management and more responsive business decisions.

Q20. The high costs of data warehouses can make them too expensive for a company to implement. As an alternative, many firms create lower-cost, scaled-down __________.
a. data marts
b. data stores
c. multidimensional databases
d. SBUs

Q21. __________ shows the power of the individual in the connected age a better research tool than major corporations had in the 1990s.
a. Facebook
b. Google
c. Microsoft
d. eBay

Q22. __________ are networks that are capable of transmitting data at very fast rates, but operate in a limited area, such as an office building, campus, or home.
a. MANs
b. Hot spots
c. LANs
d. WANs

Q23. __________ are built by attaching a wireless access point (WAP) to the edge of the wired network.
a. WLANs
b. WiMAX
c. Wi-Fi hot spots
d. Base stations

Q24. Virtual private networks (VPN) are private tunnels in the Internet that are created by __________.
a. content indexing
b. usernames and passwords
c. biometrics
d. encryption

Q25. __________ transmits voice and data in packets and has become one of the most cost effective ways to communicate.
a. TCP
b. UDP
c. VoIP
d. UM

Q26. __________ is a general term that means fast transmission speed.
a. Bandwidth
b. Protocol
c. TCP/IP
d. Broadband

Q27. What is the most cost-effective approach to managing fraud?
a. prevention
b. detection
c. prosecution
d. compliance

Q28. Fraud management starts with corporate governance culture and ethics __________.
a. in the accounting department
b. in the IT department
c. at the top levels of the organization
d. at the lowest levels of the organization

Q29. A fiduciary responsibility is both a legal and an ethical obligation.
a. True
b. False

Q30. Crime can be divided into two categories depending on the tactics used to carry out the crime. What are those two categories?
a. personal and non-personal
b. felonies and misdemeanors
c. insider and outsider
d. violent and nonviolent

Q31. __________ is a security technology for wireless networks that improves on the authentication and encryption features of WEP.
a. Network access control (NAC)
b. Security exchange commission (SEC)
c. Wi-Fi protected access (WPA)
d. Intrusion detection system (IDS)

Q32. __________, such as AirSnort and WEPcrack, are readily available tools that can be used to gain unauthorized access to networks putting them at great risk.
a. Wireless packet analyzers
b. Password crackers
c. Firewall sniffers
d. Intrusion detectors

Q33. Public and private __________ are sites where many sellers and many buyers buy and sell.
a. networks
b. exchanges
c. sources
d. value chains

Q34. California's Office of Traffic Safety (OTS) partnered with the Taxi Magic app team to __________.
a. reduce DUI
b. sponsor contests
c. interface with Facebook
d. reduce poverty

Q35. __________ refers to word-of-mouth marketing in which customers promote a product or service by telling others about it.
a. Affiliate marketing
b. Customizing ads
c. Sourcing
d. Viral marketing

Q36. Ethical standards and laws frequently __________ technological innovation.
a. lag behind
b. keep pace
c. conflict with
d. lead ahead of

Q37. __________ are e-marketplaces that serve one industry, e.g., automotive, chemical, along the entire supply chain.
a. Vertical exchanges
b. Supply hubs
c. Horizontal exchanges
d. Collaboration hubs

Q38. One of the problems with __________ advertising is that advertisers knew very little about the recipients.
a. direct mail
b. Web
c. interactive
d. social media

Q39. __________ handhelds are a special technology that involves computer-generated images superimposed on pictures of real things and can be used by advertisers in several ways.
a. Augmented reality
b. Foursquare
c. WAP
d. Skype

Q40. The underlying technologies needed for location-based commerce and services are __________ and __________.
a. GPS; GIS
b. TPS; laptops
c. portals; servers
d. social networks; sensors

Q41. How can handheld mobile computing devices and technology significantly improve performance in the healthcare system?
a. Make it easier and faster to get prescriptions
b. Reduce the preventable errors made by healthcare providers
c. Reduce the need for emergency medical care

Q42. Writing apps for handheld devices, such as smartphones, is __________.
a. easy because only a few lines of code are needed
b. easy because the devices have limited features
c. difficult because of many different models and OSs
d. about the same as writing apps for computers.

Q43. Engineers can find the location of any receiving station to within 50 feet by __________, using the distance from a GPS to three satellites to make the computation.
a. latitude
b. longitude
c. triangulation
d. altitude

Q44. The __________ continues to be a leader in making digital music, movies and podcasts available to consumers for a fee.
a. iTunes Store
b. Amazon.com
c. Fox Mobile
d. Grooveshark.com

Q45. __________ refers to a search strategy that focuses on finding information in a particular content area, such as travel, finance, legal, and medical.
a. Vertical search
b. Horizontal search
c. Tag search
d. Web 3.0 search

Q46. Most large and medium sized companies utilize an Intranet based on __________ technology for internal collaboration and communication, which gives them control of the content.
a. Web 1.0
b. Web 2.0
c. social tagging
d. wikis

Q47. Which is not a social media activity metric?
a. pageviews
b. posts
c. unique number of visitors
d. quality and speed of issue resolution

Q48. Why do companies create private social networks?
a. To better understand their customers
b. To communicate short messages with followers
c. To interact with employees using avatars
d. To broadcast messages to very large groups of followers.

Q49. Facebook and other __________ are different from the broader category of online communities in that they usually allow individuals to control who can access information they post to the site.
a. bookmarking sites
b. mashups
c. social networking sites
d. wikis

Q50. Which is not a social media survey metric?
a. time spent on site
b. satisfaction
c. content relevance
d. quality and speed of issue resolution

 

Management Theories, Management Studies

  • Category:- Management Theories
  • Reference No.:- M91424450
  • Price:- $45

Priced at Now at $45, Verified Solution

Have any Question?


Related Questions in Management Theories

Styles of leadershipinstructionsama style with

Styles of Leadership Instructions AMA style with references When preparing for your discussion post on this case, it is recommended that you read through it several times. Read through it the first time to familiarize yo ...

Archetypes in actionsenge ross smith roberts amp kleiner

Archetypes in Action Senge, Ross, Smith, Roberts, & Kleiner (1994) noted: At its broadest level, systems thinking encompasses a large and fairly amorphous body of methods, tools, and principles, all oriented to looking a ...

A survey of us adults found that 69 of those who text on

A survey of U.S. adults found that 69% of those who text on cell phones receive spam or unwanted messages. You randomly select 100 U.S. adults who text on cell phones. A) Determine whether you can use a normal distributi ...

Questionthere are several types of networks while the

Question: There are several types of networks; while the concepts are the same, only the names of the elements change. A network is a set of nodes connected by links, for example. However, some of the academic literature ...

Questionwrite a paper of 1000-1500 words that addresses the

Question: Write a paper of 1,000-1,500 words that addresses the following: 1. Discuss two or three of the major shifts that have occurred in managerial theories and concepts pertaining to the evolution of human resources ...

Questionthere is no consensus on a definition of complex

Question: There is no consensus on a definition of complex systems or complex adaptive systems. Both terms are frequently used interchangeably within the literature. Rather, it is much easier to look at the characteristi ...

Question 1supply chain management is instrumental as it

Question: 1. Supply chain management is instrumental as it pertains to marketing as marketing plays a key role in integrating supply chain processes and promoting collaboration between stakeholders. 2. In this week's dis ...

Chapter- gravity modela manufacturer of cat towers wishes

Chapter- Gravity Model A manufacturer of cat towers wishes to locate a super assembly facility to meet their cat tower assembly needs for the next millennium. Currently, carpet, cylinders, yarn and fasteners are purchase ...

Write a paper of 1000-1500 words that addresses the

Write a paper of 1,000-1,500 words that addresses the following: 1. Discuss two or three of the major shifts that have occurred in managerial theories and concepts pertaining to the evolution of human resources. 2. Descr ...

Identify how protecting sovereign boundaries in regards to

Identify how protecting sovereign boundaries in regards to intellectual property has a positive effect on the GDP . Your answer should be in complete sentences

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As