Follow and like us on our Facebook page where we post on the new release subject and answering tips and tricks to help save your time so that you can never feel stuck again.
Shortcut

Ctrl + F is the shortcut in your browser or operating system that allows you to find words or questions quickly.

Ctrl + Tab to move to the next tab to the right and Ctrl + Shift + Tab to move to the next tab to the left.

On a phone or tablet, tap the menu icon in the upper-right corner of the window; Select "Find in Page" to search a question.

Share Us

Sharing is Caring

It's the biggest motivation to help us to make the site better by sharing this to your friends or classmates.

Strategy Management and Acquisition

Equips students with the knowledge and skills to develop effective business strategies and navigate the complexities of mergers, and strategic partnerships.

strategy

management

acquisition

planning

execution

integration

synergy

due diligence

competitive analysis

growth

market entry

investment

merger

consolidation

divestiture

partnership.

Ethics refers to rules of right and wrong that people use to make choices to guide their behaviors.

  • True
  • False

It is used to by-pass security controls to gain unauthorized access to a system.

  • Hacking

__consist of specific projects with clear boundaries that define what the initiative is designed to achieve as well as what it is and is not designed to do.

  • [No Answer]

Resources that were developed due to historical events or over a long period usually are costly to imitate is the Historical conditions.

  • True
  • False

An organization employs the people, who build and make use of hardware and software, operate within law and regulations, and share and maintain the data.

  • Program
  • People
  • Hardware
  • Software

The CIO should only be responsible about the IT department and IT professionals.

  • True
  • False

It aims to produce a high-quality software that meets or exceeds customer expectations, reaches completion within times and cost estimates.

  • SDLC

Defining the scope of the problem is also important in this stage as well.

  • Disposal
  • Implementation
  • Planning
  • Analysis

The resource-based view is a model that sees resources as key to a not superior firm performance.

  • True
  • False

“Big picture”-need to develop unified vision for systems characteristics and functions.

  • Architect

Individuals who have direct contact with software applications as they use them to carry out specific tasks .

  • End-Users

Strategic Information System Planning has 7 phases.

  • True
  • False

General Managers are never end users.

  • True
  • False

A business analysts study organization’s business processes to identify opportunities for improvement.

  • True
  • False

This is example of B2B where this could include businesses that create specialized software, office furniture, uniforms, etc.

  • True
  • False

This could include manufacturers or suppliers that provide materials or products for other businesses.

  • B2C
  • B2D
  • B2G
  • B2B

It is a set of guidelines that defines how an organization should use information technology and information systems responsibly.

  • ICT policy

This means superior performance relative to other competitors in the same industry or superior performance relative to the industry average.

  • Competitive advantage

These are unauthorized programs that can annoy users, steal sensitive data or be used to control equipment that is controlled by computers.

  • Viruses

The success of SISP is observable in the light of organization’s success.

  • True
  • False

The details used in such crimes include social security numbers, date of birth, credit and debit card numbers, passport numbers, etc.

  • True
  • False

During this phase, the system will be installed and evaluated in the organization’s operational environment.

  • Implementation

Maintenance is the step when end users can fine-tune the system, if they wish, to boost performance, add new capabilities or meet additional user requirements.

  • True
  • False

When a consumer sells a good or service to another consumer it is the _______.

  • B2G
  • C2B
  • B2B
  • C2C

It is one of the biggest problems with digital products

  • Piracy

It is the tool used to analyze firm’s internal resources and capabilities to find out if they can be a source of sustained competitive advantage.

  • Heterogeneous
  • Immobile
  • VRIO framework
  • Framework

Ecommerce businesses can not also sell through online marketplaces such as Amazon, eBay or Etsy.

  • True
  • False

Knowledge worker in charge of a functional area or team

  • Functional Manager

The collection of money from consumers in advance of a product being available in order to raise the startup capital necessary to bring it to market.

  • Crowdfunding

B2B is stands for __.

  • Business to Business

The resources and capabilities that are based on company’s culture or interpersonal relationships.

  • Costly to Imitate
  • Causal ambiguity
  • Historical conditions
  • Historical conditions.
  • Social Complexity

These types of stores are generally built on ecommerce platforms such as Shopify or BigCommerce.

  • [No Answer]

Response lag, also known as impact log.

  • True
  • False

Executive level is concerned with high-level, long-range decisions.

  • True
  • False

When we witness content and processes becoming expressed and performed in digital form, we are in the presence of:

  • Declining cost of storage
  • Convergence
  • The digitization process
  • The increasing user friendliness of Information Technology

There are ____phases of the SDLC.

  • 7
  • 4
  • 6
  • 5

Operational level is concerned with midterm decision making and a functional focus

  • True
  • False

It is the first step of Procurement System.

  • Budget Approval
  • Needs Recognition
  • Review of Request
  • Purchase Requisition

Planning is the section addresses security considerations unique to the second SDLC phase.

  • True
  • False

It involves mainframe, workstations, peripheral, connecting devices.

  • Software
  • Application
  • Hardware
  • Program

How many steps does the Procurement System has?

  • 8
  • 7
  • 10
  • 9

Selecting features, building and optimizing classifiers using machine learning techniques.

  • Answer:
  • Answer 4
  • Data Science and Data Scientists

Competence is an ability to perform tasks successfully and is a cluster of related skills, knowledge, capabilities and processes.

  • True
  • False

A skill or set of skills provided in exchange for compensation. The service provider’s time can be purchased for a fee.

  • Services

The first question of the framework asks if a resource adds value by enabling a firm to exploit opportunities or defend against threats.

  • Valuable

It is a system composed of many components which may interact with each other.

  • System Engineering
  • System Development
  • Complex System
  • Procurement System

It refers to the unauthorized use of copyrighted materials.

  • Copyright infringement

Decision making and activities in organizations occur at the same levels.

  • True
  • False

The focus of this level is on tactical decision.

  • Managerial Level

It is the maximum amount of money the firm’s customers are ready to spend in order to obtain the firm’s product.

  • Customer willingness to pay

The focus of this level is on internal operations.

  • [No Answer]

Price is a consequence of a negotiation between the firm and the customer, depending on the available information and the degree of competition in the market.

  • True
  • False

The CIO must have a broad understanding of how the company is positioned to execute its strategy.

  • True
  • False

After the payment process, buyers make a record of it for bookkeeping and auditing.

  • True
  • False

__is refers to the use of information technology to commit crimes.

  • Cyber-crime

This includes the characteristics of the new technology - how visible, complex, and unique it is

  • IT project barrier

In usng the tool, the first step is to find out if your company is organized to exploit these resources.

  • True
  • False

The rapid proliferation of easy-to-use computing devices has resulted in more digitization – the process by which content and processes become expressed and performed in digital form.

  • True
  • False

Structured analysis is a traditional systems development technique that is time-tested and easy to understand.

  • True
  • False

Operational level is concerned with short-term activities.

  • True
  • False

The objective of managerial level is to improve effectiveness of organization, or one of its functions, within the broad strategic guidelines set by exec team.

  • True
  • False

The Internet has made it much easier to protect intellectual property.

  • True
  • False

During this phase of SDLC, the security architecture is designed.

  • Design

__is created when resources that in their next best use would be worth a given amount are transformed into something that a customer is willing to pay more for.

  • [No Answer]

PaaS has become a cost-effective way to use enterprise systems.

  • True
  • False

Decision Support Systems is the supports this level.

  • Managerial Level

An individual who is charged with the day-to-day maintenance of a system or collection of systems.

  • Administrator

Developing a plan of action including time scale and resources required.

  • IT Consulting

One of the first computers used for such information processing was the _______, installed at the U.S. Bureau of the Census in 1951 for administrative use and at General Electric in 1954 for commercial use.

  • UNIVAC I
  • UNICO I
  • UNICAV I
  • UNILAB I

Programmers, network administrators, and webmasters all belong to the category of:

  • General managers
  • Information systems professionals
  • Analysts
  • End-users

Executive Information Systems is the support of this level.

  • Executive Level

An email is sent to the target victim that promises them a lot of money in favor of helping them to claim their inheritance money.

  • Advance Free Fraud

SDLC stands for System Development Lifecycle.

  • True
  • False

If it is a large system involving many different departments, maintenance and support may be needed for a shorter time.

  • True
  • False

Who invented the WWW?

  • Tim Berners-Lee

Scope can not be refined during the initialization process.

  • True
  • False

It is achieved by offering unique products and services and charging premium price for that.

  • [No Answer]

The __ involves gathering requirements for the system

  • analysis phase

Functional managers are often end users of IT systems.

  • True
  • False

They have a broad view of operations, business processes, inter organizational coordination challenges and opportunities and a broad understanding to execute strategy.

  • CIO's

It occurs when a cyber-criminal impersonates someone else identity to practice malfunction.

  • Identity theft
  • Copyright infringement
  • Fraud
  • Phishing

Innovative products, processes or new business models provide weak competitive edge due to the first mover advantage.

  • True
  • False

The first small-scale mechanical information system was Herman Hollerith’s census tabulator.

  • True
  • False

Individual who is ultimately responsible for the successful completion of a project.

  • Project Manager

There is great potential to create value by working with the firm’s suppliers and creating incentives for them to supply you with needed resources for less money.

  • Decreasing Supplier Opportunity Cost

It is created in the transaction is computed as the difference between customer willingness to pay and supplier opportunity cost

  • Total Value

The firm seeks to create competitive advantage through the initiative.

  • True
  • False

At this stage, business needs are studied with the intention of making business processes more efficient.

  • Planning
  • Implementation
  • Disposal
  • Analysis

B2C includes retailers or ecommerce retailers that sell products to the end consumer.

  • True
  • False

The objective of this level is efficient transaction processing under a limited degree of uncertainty.

  • Operational Level

Using the tool the second step is to identify valuable, rare and costly to imitate resources

  • True
  • False

There are 7 phases of SDLC.

  • True
  • False

It is related to operations research but differs from it in that it is more a planning and design function, frequently involving technical innovation.

  • System Engineering

When the attacker has gained access to the system, they can do whatever they want.

  • Hacking

This is usually done by accessing personal details of someone else.

  • Identify theft

It occurs when a person clicks such a link with no intention of knowing more about the click but to make more money.

  • Click Fraud

Maintenance and support covers all activities that are required once the system is in place

  • True
  • False

It is where as a standard security best practice, most organizations keep backups of the data at remote places.

  • Data loss

__is an integrated set of components for collecting, storing, and processing data and for providing information, knowledge, and digital products.

  • Information system

Individual who builds high-quality, innovative, and performing software that complies with coding standards, technical designs and the framework provided by architects.

  • Developer

It includes the entire process of planning, building, deploying, using, updating, and maintaining an information system.

  • SDLC

It is the actual amount of money the firm disbursed to acquire the resources needed to create its product or service.

  • Firm cost

It refers to rules of right and wrong that people use to make choices to guide their behaviors.

  • Ethics

SDLC is a systematic process for building software that ensures the quality and correctness of the software built.

  • True
  • False

They have technical training but their day-to-day activities do not involve technical development.

  • Analysts and Managerial Staff

Differentiation strategy is used in this situation and company positions itself more on branding, advertising, design, quality and new product development (like Apple Inc. or even Starbucks) rather than efficiency, outsourcing or process innovation.

  • True
  • False

This barrier is given by IT assets and capabilities

  • IT Resources Barrier

Any tangible good that requires inventory to be replenished and orders to be physically shipped to customers as sales are made.

  • Physical Product

It is a digital application that is used to regulate the purchasing of goods and services.

  • Procurement System

This can also be accomplished by using automated software that makes the clicks.

  • Click Fraud

What are some ways that today’s managers are affected by new IT trends?

  • Both A and B
  • The amount of money available for them to spend on IT has increased.
  • New software programs reduce productivity and efficiency.
  • Consumers are changing and become more tech-savvy.

__ are physical things.

  • Tangible assets

They need to have the skills of their executive counterparts while maintaining IT operations.

  • CIO's

IT is becoming accessible to more and more people

  • True
  • False

Instagram, Facebook, Pinterest, and Snapchat all have __ options that ecommerce brands can sell their products through.

  • conversational commerce

It refers to the buying and selling of goods or services using the internet, and the transfer of money and data to execute these transactions.

  • E-commerce

If organizations would have the same amount and mix of resources, they could employ different strategies to out compete each other.

  • False
  • True

The first large-scale mechanical information system was __.

  • [No Answer]

The automatic recurring purchase of a product or service on a regular basis until the subscriber chooses to cancel.

  • Subscription

Individual in charge of a team within the IT function of an organization,who they are?

  • Information Systems Manager

T-dependent strategic initiatives have five defining characteristics.

  • True
  • False

Intangible assets are everything else that has no physical presence but can still be owned by the company.

  • True
  • False

Data is the design of the socio-technical systems design involve what data are collected, to whom the data should be available and in which formats the data should be stored.

  • True
  • False

In this phase, includes the integrate the information system into its environment

  • Implementation

It is the minimum amount of money suppliers are willing to accept to provide the firm with the needed resources.

  • Supplier opportunity cost

Ethics in MIS seek to protect and safeguard individuals and society by using information systems responsibly.

  • True
  • False

Downloadable digital goods, templates, and courses, or media that must be purchased for consumption or licensed for use.

  • Digital Product

It involve the use of fake Wi-Fi hotspots that look like legitimate ones.

  • Phishing

__ is the time it takes for corrective monetary and fiscal policies, designed to smooth out the economic cycle or respond to an adverse economic event, to affect the economy once they have been implemented.

  • [No Answer]

This is now becoming very common especially with mobile devices such as smartphones.

  • Biometric identification

In ________ the WWW, invented by Tim Berners-Lee as a means to access the interlinked information stored in the globally dispersed computers connected by the Internet, began operation and became the principal service delivered on the network.

  • 2001
  • 1994
  • 1990
  • 1991

Individual who performs analysis in a specific field or topic area.

  • Analyst

It define customer willingness to pay as the maximum amount of money that a customer is willing to give the firm to acquire its products or services.

  • Value is in the eye of the customer

It is the process of defining, designing, testing and implementing a new software application or program.

  • System Engineering
  • System Analyst
  • System Development
  • Complex System

The sale of products in bulk, often to a retailer that then sells them directly to consumers.

  • Wholesale

The sale of a product, which is manufactured and shipped to the consumer by a third party.

  • Dropshipping

The sale of a product by a business directly to a customer without any intermediary.

  • Retail
Comments
Paypal Donation

To keep up this site, we need your assistance. A little gift will help us alot.

Donate

- The more you give the more you receive.

Related Subject

Massage Machines

Knowledge Management

Initiating Major Organizational Shifts

Entrepreneurship Information

Barber Shop Business Plans

Social Media Specialist

Marketing

Management

Business Administration

Strategic Business Analysis

Strategic Management

Social Media Communications and Marketing

Risk Management

Logistics Management

Fundamentals of Business Analytics

Fundamentals of Accounting Theory and Practice

Franchising

Distribution Management

Configuration Management

Medical Office Administration

Hospitality Management

Inventory Production Control

Food Service Management

Emergency and Disaster Management

Real Estate Appraisal and Property Management

Investment and Portfolio Management

Credit and Collection

Animation Project

Advanced Database Management Systems

Retail Merchandising

Architectural Studies

Society and Culture with Family Planning

Project Management

Principles of Management

Management Accounting

Fundamentals of Nursing Practice

Health Assessment

Mechatronics

System Analysis Design and Development

Property Management System

Numerical Methods

Systems Integration and Architecture

Calculus

Venture Capital

Real Estate Consulting and Investment Analysis

Product Management

New Market Development

Bacteria

Small Business Management

Investment

Economics

Treasury Management

Basic Finance

Engineering Economincs


Show All Subject
Affiliate Links

Shopee Helmet

Shopee 3D Floor

Lazada Smart TV Box