Filters
Question type

Study Flashcards

Polaroid had a unique competitive advantage for many years until it forgot to observe competitive intelligence. The firm went bankrupt when people began taking digital pictures. Polaroid provides a great example of Porter's supplier power.

A) True
B) False

Correct Answer

verifed

verified

What is production?


A) Material items or products that customers will buy to satisfy a want or need.
B) Tasks performed by people that customers will buy to satisfy a want or need.
C) The process where a business takes raw materials and processes them or converts them into a finished product for its goods or services.
D) The rate at which goods and services are produced based upon total output given total inputs.

E) None of the above
F) All of the above

Correct Answer

verifed

verified

Which of the following is not a common approach to closing an MIS skills gap?


A) Social recruiting.
B) Off-site training.
C) Competitive salary.
D) Mentoring services.

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

What is a report?


A) A document containing data organized in a table, matrix, or graphical format allowing users to easily comprehend and understand information.
B) A collection of large complex data sets, including structured and unstructured, which cannot be analyzed using traditional database methods and tools.
C) A view of data at a particular moment in time.
D) A world where interconnected, Internet-enabled devices or "things" can collect and share data without human intervention.

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

Where would you categorize weaknesses in a SWOT analysis?


A) Internal, helpful
B) Internal, harmful
C) External, helpful
D) External, harmful

E) None of the above
F) A) and C)

Correct Answer

verifed

verified

In terms of system thinking, what is input?


A) Data entered in a computer
B) Controls to ensure correct processes
C) The resulting information from the computer program
D) The computer program that processes the data

E) C) and D)
F) None of the above

Correct Answer

verifed

verified

In recruiting lingo, what are perfect MIS candidates sometimes called?


A) Turquoise turtles.
B) Red rabbits.
C) Purple squirrels.
D) White unicorns.

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

Which of the following represents the types of data commonly found in the accounting department?


A) Tax data.
B) Payroll data.
C) Transactional data.
D) All of the above.

E) All of the above
F) C) and D)

Correct Answer

verifed

verified

Which of the following is considered a good?


A) Milk and eggs
B) Managing a team
C) Selling groceries
D) All of the above

E) All of the above
F) None of the above

Correct Answer

verifed

verified

Why do students need to study information technology?


A) Information technology is everywhere in business
B) Information technology is rarely discussed in business
C) Information technology is rarely used in organizations
D) Information technology is found in only a few businesses

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Who is responsible for ensuring the security of business systems and developing strategies and safeguards against attacks by hackers and viruses?


A) Chief Knowledge Officer (CKO) .
B) Chief Security Office (CSO) .
C) Chief Technology Officer (CTO) .
D) Chief Information Officer (CIO) .

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

Technology provides countless business opportunities, but can also lead to pitfalls and traps for a business.

A) True
B) False

Correct Answer

verifed

verified

In a SWOT analysis, which of the following could you discover as potential inner weaknesses (harmful) ?


A) Cost advantages.
B) Damaged reputation.
C) New markets.
D) Competitor issues.

E) B) and C)
F) All of the above

Correct Answer

verifed

verified

What helps acquire and catalog the knowledge assets in an organization?


A) Knowledge assets.
B) Knowledge facilitators.
C) Predictive analytics.
D) Business analytics.

E) None of the above
F) All of the above

Correct Answer

verifed

verified

What includes support value activities and primary value activities and is used to determine how to create the greatest possible value for customers?


A) Supplier power.
B) Operations management.
C) Porter's Five Forces Model.
D) The Value Chain analysis.

E) A) and C)
F) B) and D)

Correct Answer

verifed

verified

There are many different stakeholders found in an organization. Stakeholders drive business strategies, and depending on the stakeholder's perspective, the business strategy can change. Which of the following is a main concern for employees?


A) Exceptional customer service.
B) Fair compensation.
C) Professional associations.
D) Reliable contracts.

E) C) and D)
F) B) and C)

Correct Answer

verifed

verified

The chief technology officer is responsible for ensuring the security of business systems and developing strategies and safeguards against attacks from hackers and viruses.

A) True
B) False

Correct Answer

verifed

verified

Which of the following is not a typical way that a company would duplicate a competitive advantage?


A) Acquiring the new technology.
B) Copying the business operations.
C) Hiring away key employees.
D) Carrying large product inventories.

E) B) and C)
F) C) and D)

Correct Answer

verifed

verified

Teaching, waiting tables, and cutting hair belong in which category?


A) Goods
B) Services
C) Production
D) Productivity

E) All of the above
F) B) and C)

Correct Answer

verifed

verified

Who is responsible for collecting, maintaining, and distributing company knowledge?


A) Chief Knowledge Officer (CKO) .
B) Chief Privacy Officer (CPO) .
C) Chief Technology Officer (CTO) .
D) Chief Information Officer (CIO) .

E) None of the above
F) B) and C)

Correct Answer

verifed

verified

Showing 361 - 380 of 473

Related Exams

Show Answer