All Matches
Solution Library
Expert Answer
Textbooks
Search Textbook questions, tutors and Books
Oops, something went wrong!
Change your search query and then try again
Toggle navigation
FREE Trial
S
Books
FREE
Tutors
Study Help
Expert Questions
Accounting
General Management
Mathematics
Finance
Organizational Behaviour
Law
Physics
Operating System
Management Leadership
Sociology
Programming
Marketing
Database
Computer Network
Economics
Textbooks Solutions
Accounting
Managerial Accounting
Management Leadership
Cost Accounting
Statistics
Business Law
Corporate Finance
Finance
Economics
Auditing
Ask a Question
Search
Search
Sign In
Register
study help
business
marketing strategy planning
Questions and Answers of
Marketing Strategy Planning
Below your own activity list, make a list of the assumptions you are making. Once complete, share your list and listen to the lists of assumptions other students recorded. Are you surprised how many
In teams, discuss each individual list of five practices. The output of this step is to generate a list of 10 practices.
You are developing an expert system to play Go. Give three examples of if/then rules you might use.
Search online for advances in AI expected over the next 5 years. Which advances are the most helpful for society, and which the most concerning?
Now, start to develop a pattern-matching system. Describe three input nodes and your output node.
Each individual, using the chapter as a guide, writes down five personal practices.
On Instagram, find three examples of firms using that outlet to support their hiring process. Do the same with Reddit, Facebook, and Twitter. For each, describe the best use of that source by a
Record your vote for the two most beautiful buildings.
Practice learning new procedures for your smartphone (or laptop if you do not have a smartphone). Find a friend or classmate with a similar phone and find a software app that person uses that would
As a class, compile your votes for the most beautiful buildings. Class members should now discuss why they liked the buildings they chose. Be as specific as possible about the terms you use to
Did any of your votes change after the discussion?
Record how others describe what beauty means to them. Are these terms similar or different from your own terms?
In some ways a new IS is like a new building. Individuals other than the designer use it. Should the designer of either make the building or IS to suit their own description of beautiful?
Record which of the four employability skills listed in Chapter 1 and discussed in Chapter 2 is important for the architect and the IS designer?
In what other settings do individuals have precisely the same data but differ on information?
If a person believes external data and internal information are the same thing, what will surprise them?
If you treat data and information as different, what employability skill will improve for you?
How accurate was the student’s activity list? How accurate was your activity list?
1. What have you purchased in the past week without cash for which you previously used cash?2. If a vendor wants to sell products using a cashless system via the cloud, which aspects of the cloud are
Net neutrality is an issue that continues to be challenging for the government. Do you favor net neutrality, or would you prefer a more commercial structure where content providers can be charged a
In Google search, type in “What is my IP address.” Also, again using Google, discover your school’s IP address.
Look up articles on the Internet about peering agreements. Describe two current peering issues faced by major networks.
In this chapter, we only briefly discussed TCP/IP, the Internet protocol suite. Read more about TCP/IP at Wikipedia using the term Internet Protocol Suite. Where and when did the Internet protocol
Can your business scale up to produce 1,000 sandwiches a day? If it did, would it produce economies of scale, where the average cost of making a sandwich decreases as the size of the operation
Read more about personal area networks and specify two products that you would buy, assuming you have the funds, and the reasons you would buy them.
Using Google, discover which large companies and government agencies such as the Department of Defense are using the cloud and the size of their contracts. Describe three of these large customers,
List the attributes you want in a router. One is cost. What are three other important attributes to consider when buying a router? Specify the highest and lowest value for these attributes for use in
For you to advise your house on how to update its system, what are three specifics the decision-makers need to know before they hire someone? That is, based on your reading of the discussion boards,
Using Google or other search engines, read about how athletes are using wearable devices. Describe four ways that athletes and coaches can use wearable devices to improve performance (for example,
Again using a search engine, discover how wearables can help students in the classroom. Describe four ways that students and teachers can use wearable devices to improve performance.
Finally, use a search engine to learn how wearables can be used by athletes. Describe three ways that athletes can use wearables in ways that improve their performance.
How would your team describe the public data? What is common about public data?
Draw an entity-relationship diagram for a girl scout troop selling girl scout cookies.
How would your team describe the private data? What is common about private data? What are some things a business should not ask or know about people? What is it about private data that makes it
Draw an entity-relationship diagram for a family owned kennel. At the kennel each animal is kept in a numbered cell and is fed by only one member of the family. Some customers have several animals.
If you are OK sharing financial data with your financial companies, and healthcare with your doctors, what makes us not want to share this data publicly?
Did you disagree about any of the choices of your classmates on public and private data? That is, which public data should be private and vice versa?
Do you think your generation has a different outlook on public and private data than older generations? What do you think your children’s outlook will be?
What rules should a company use about public and private data to avoid offending employees or customers? As a group, try to write down one or two sentences of a policy on data privacy for employees
Pick a major professional sport. List the data that a company like Synergy needs to record. Be careful not to record the output of the analysis such as the percentage of successful plays or the
What are three questions you think a coach in this sport might ask the database? Go back to step 1 and add data to your answer to make sure all the data needed to answer these three questions is
For Synergy, which of the Database Administration tasks listed in Figure do not apply?
Create a simple player table. Include at least six fields and five records.
What three other tables are needed in your database?
Look back at Chapter 1 and the four Employability Skills listed there. For a coach, provide an example of each of the four Employability Skills.
How is the job of a coach similar to that of an IS graduate?
For college students, what are the three most common uses of digital personal assistants?
Search online to read about a common AI system such as Amazon’s Alexa or IBM’s Watson. Give an example of how that system acquires, stores, and applies knowledge. Specify the knowledge in your
What is one unusual, but helpful thing to ask a voice assistant?
Visit WebMD.com and navigate to the main Symptom Checker page. Enter some symptoms and observe how the expert system presents a general diagnosis.
Try the following statement: “Hey Siri, I told Susan to turn on a 7:30 alarm.” What happened?
Go to the Wikipedia entry for “artificial neural networks” and read the introduction about neural networks. Describe an example listed on the page of a successful neural network.
Try, “Hey Siri, what was Amazon’s closing price yesterday?”, then “What was Amazon’s average closing price the last 3 days?”
Search the Internet for examples of deep learning AI. a. Describe how a business might use deep learning to improve one of its common business processes such as procurement, sales, or hiring.b.
Try, “Can alligators throw a javelin?”
Refer to Figure for examples and describe a business process your university or college uses and how AI could make that process more effective.
Refer to Figure for examples of dull, dirty, and dangerous roles for robots. Using the Internet, find an example of each of these three types of robots and describe their use.
If you are able to compare Android and Apple in your group, which do you prefer?
Again using Figure for examples, describe how your university might use each type. a. Specify in your answer the process in which the robot will play a role.b. Describe a possible objective of
One AI challenge is recognizing context. If you change the rules of the game, Alpha Go will become much less effective. One example is to allow players to move an existing piece. What are two other
What other games and activities will AI try to win next? According to Figure, which lists the strengths of AI, robots, and humans, what games or activities will be hardest for machines? Name two and
Consider a hospital. What safeguards discussed in this chapter would reduce the risk of data loss due to human errors and to computer crime?
Use the Internet and read about concerns about the security of democratic elections. If you were consulting with government agencies to help make elections more secure, what three suggestions would
Describe three safeguards used at your university. How does each cost the university in reduced efficiency, and how does each reduce freedoms of end users?
Again, using the Internet read about the vulnerabilities of smart TVs. Make a list of three best practices when using a smart TV in your home.
As a class generate a list of the most common 15 practices.
Describe how your university should prepare for security incidents.
Read about the vulnerabilities of newer cars. Focus on current human-driven cars, not the vulnerabilities of driverless cars. What systems have hackers breached, and what vulnerabilities should new
Vote individually on the most important practices. Every student can vote for five practices. The output of this step is the top 10 list for the class.
For two of your personal accounts, create a new strong password. List the two accounts here (e.g., Facebook) but not the password, of course.
Commit to a time in 2 weeks when the teams will reassemble and discuss the top 10 list. The goal is for each student to do these good practices for 2 weeks and report to the team on which ones were
Of the personal security safeguards listed in Figure, which three can you implement? How will these safeguards reduce your freedom?
At this future meeting generate a list for the class of the top five practices that should be maintained by students but that most students find hard to do.
Of the five smartphone practices listed in Figure, which two can you implement? How will these safeguards reduce your freedom.
For one of the attacks shown in the cells in Figure, search the Internet. Find an example of how this attack was used. Describe that attack situation and provide three safeguards that would have
Using a search engine, read about the attack method called ProjectSauron. What types of computer systems was it designed to attack? How does Sauron work? How does it steal passwords?
Human safeguards are often taken for granted, but they are important. Read about the famous embezzlement in Oregon by Elma Magkamit. What safeguards would have prevented her from stealing money from
Go to blockchain.info and answer the following questions:a. What is the current price of bitcoin?b. How many bitcoin wallets are in use?c. The mempool stores all transactions prior to confirmation.
Go to haveibeenpwned.com/to see if your email has been compromised. Enter an old or discarded email address and read about breaches that have exposed that account. Write down two breaches that have
Go to https://www.blockchain.com/explorer. What is the current price of a bitcoin? What is the latest block to be approved, and how long did it take to mine? What was its size and what was the name
What type of safeguard is blockchain? Why?
What is the asset being protected in the Bitcoin blockchain?
Explain how asymmetric encryption is used in blockchain.
Using the Internet, find three other possible use cases for blockchain.
The first issue is the number of concession stands. Just considering the standard level of service, make a list of the advantages and disadvantages of having fewer and having many stands. Make sure
The second issue has to do with how a standard service stand operates. One option is to receive customers’ orders, dispense items, calculate cost, and make payment with one employee. A second is to
A third issue is configuration of the stand. One option is the one-station stand—all activities are done at one spot. In contrast, multiple stations have the customer ordering and employee
For each of these processes, suggest how they may be improved by non-IS means; that is, by management and by process management principles.
How well do you know the procedures for using voice-activated systems? How often do you experiment with new procedures? What is the most recent new procedure you have learned?
Look at Figure, a list of options for improving a process with IS. For three of these five provide an example of how your voice-activated system can improve a personal process. Specify the process
What was the undergraduate enrollment at your school in the fall of this academic year? _________
Identify the series of activities in your new Campus Visit process. With your team create a diagram that shows a series of activities you desire for the high-tech tours. Also be clear about the
What is the value of 50 pesos in U.S. dollars today? _________
Specify data needed by each activity in the process. The data might not reside at the school; for example, you may want visiting students to find current students who went to their high school by
What is the meaning of the word furtive? _________
Turn in a report on your proposed Campus Visit process. Include a diagram of the activities in the process as well as the objectives and KPIs for your process. For each activity in the process,
Show the most recent Twitter post of LeBron James. _________
Who spoke at Gettysburg before Lincoln gave his address? _________
Which college in California has the nickname Anteater? _________
What is the name of the closest movie house to the Empire State Building in New York City? _________
Showing 1 - 100
of 1397
1
2
3
4
5
6
7
8
9
10
11
12
13
14