All Matches
Solution Library
Expert Answer
Textbooks
Search Textbook questions, tutors and Books
Oops, something went wrong!
Change your search query and then try again
Toggle navigation
FREE Trial
S
Books
FREE
Tutors
Study Help
Expert Questions
Accounting
General Management
Mathematics
Finance
Organizational Behaviour
Law
Physics
Operating System
Management Leadership
Sociology
Programming
Marketing
Database
Computer Network
Economics
Textbooks Solutions
Accounting
Managerial Accounting
Management Leadership
Cost Accounting
Statistics
Business Law
Corporate Finance
Finance
Economics
Auditing
Hire a Tutor
AI Tutor
New
Search
Search
Sign In
Register
study help
computer sciences
information systems
Questions and Answers of
Information systems
Make an informal diagram of the four main actors: the Customer (Philly Bikes), Sales (Sue), the Warehouse (Wally), and Accounting (Ann). Draw arrows that show the data that flows between each of the
Using the same four main actors, this time show with the arrows how the material (the bikes) moves.
One concern of a business is fraud. One fraud technique is to create customers who are not customers but who are co-conspirators. The conspirator inside the business credits the account of the
Select any of the main activities or subactivities in the Sales process and:a. Specify what event triggers this activity to occur.b. Identify what activity follows this activity.c. For one data entry
Having completed one or both tutorials, make two suggestions about how:a. SAP could make its software easier to use.b. the tutorial(s) could be improved to help new students learn about processes and
Create a process diagram in BPMN for the spa that shows activities from contacting Groupon for the first time through the end of the spa’s promotion.
What are the objectives of each process in Questions 1 and 2? Label each as either an effective or efficient objective.
Describe how Groupon’s IS supports this process.
Groupon’s Procurement process integrates with the spa’s Sales process. How is this integration accomplished?
What other IS (social media, smartphones, and so on) could Groupon use to improve its Promotion or Sales process?
If you completed the case study/tutorial in Chapter 7, how is the Sales process in SAP similar to the Procurement process in SAP? In what important ways are they different?
Explain how this team uses alerts. Summarize the advantages of using alerts.
Summarize the advantages to this team of using Lync.
Summarize the advantages to this team of using SharePoint.
Explain how you think Office 365 contributes to the efficiency of the development team. How might it contribute to the quality of this text.
Which aspects of Office 365 described here could have value to you when accomplishing student team projects? Explain why they add value compared to what you are currently doing.
In your own words, define dog fooding. Do you think dog fooding is likely to predict product success? Why or why not? When would dog fooding not predict product success?
Is dog fooding a structured or a dynamic process? List possible objectives of dog fooding processes.
Explain how this team uses the shared whiteboard to generate minutes. What are the advantages of this technique?
How well does Twitter support the class discussion process?
What are the objectives and measures of the class discussion process?
What other educational processes can Twitter support? What are the objectives of these processes, and how does Twitter help achieve them?
Can in-class use of Twitter be used to integrate educational processes? These processes might include student assessment, student collaboration, technology use, and class discussion.
Visit Zillow at www.zillow.com. Enter the address of someone’s home (your parents’ perhaps) and obtain an appraisal of it. Check out the appraised values of the neighbors’ homes. Do you think
Suppose you are in charge of designing the university golf course’s Facebook page. Describe three features that the golf course could put on its page (e.g., a link to tee time reservations).
Whereas the golf course deals directly with consumers, CBI, the bicycle wholesaler, deals with retailers that then sell to consumers. How does this change the way CBI uses social media? Specify
Go to Wikipedia. Read the “About Wikipedia” page and the “Collaborative Writing” page. Make a diagram that shows the process of creating and updating a Wikipedia page. Is page creation and
Search the Web using the words Google My Maps and follow the links to learn how to make your own maps. Then create a map of your own. Does My Maps have all the features of a social media app?
Visit Digg, Delicious, and Quora. Prepare a report or presentation to the class that explains the site, which social media characteristics are evident, and what personal or business process the site
Search the Web using the words Office 365 and read about this Microsoft product. Which social media characteristics are evident? Do you think this approach will be successful for Microsoft?
Assess your own stock of social capital. What activities around campus would help you increase your social capital? What social media apps could you use to increase your social capital?
Become a prosumer. Find a cause or group on Facebook that you believe in and contribute in ways that you do not typically contribute. Does the organization value your help in an encouraging way? If
This case implies that the frequent acquisition and disposition of tourism brands poses problems for information systems. Summarize what you think those problems might be. Consider all five
Visit www.kiwiexperience.com and click “Pass map.” Select a variety of activities in the Adrenalin, Nature, and Kiwi Culture menus. Find a pass that would allow you to participate in all of your
Explore the social media links on the kiwiexperience.com home page. a. What are you initial reactions? Does the layout and concept invite you to participate and provide your own content? b. This Web
Why did you set your boundaries where you did?
What does your score on this exercise suggest?
Which Informing process (Reporting or Data Mining) would have improved your answers?
Reread the two examples at the beginning of the chapter that involved Target and Netflix. Specify the process that BI improves at each firm and a second process that BI could support. Explain the
In this chapter, we say that questions are more important than answers. Look at Figures 11-12, 11-13, and 11-14 and write down questions you have that might reveal patterns in the data shown in these
Reread the opening scenario. CBI owns the computers, and workers should be productive with their time, but how did you react to the story? Do you think that CBI should know how employees use the
The following sayings about data and information are often used in business to convey an important idea. As you read these, select three and write down how they could be used to convey an idea from
Mary wants to know when she’s lost a customer. One way to help her would be to produce a report, say in PDF format, showing the top 50 customers from the prior year. Mary could print that report or
Describe the best possible application of an OLAP tool at Carbon Creek. Can it be used to solve the lost customer problem? Why or why not? What is the best way, if any, for Mary to use OLAP at Carbon
Describe the best possible application of RFM analysis at Carbon Creek. Can it be used to solve the lost customer problem? Why or why not? What is the best way, if any, for Mary to use RFM at Carbon
Describe the best possible application of market basket analysis at Carbon Creek. Can it be used to solve the lost customer problem? Why or why not? What is the best way, if any, for Mary to use
Which of the analysis options in this exercise will provide Mary the best value? If you owned Carbon Creek Gardens and you were going to implement just one of these applications, which would you
To learn phishing fundamentals, visit www.microsoft.com/protect/fraud/phishing/symptoms.aspx. To see recent examples of phishing attacks, visit www.fraudwatchinternational.com/phishing-alerts/. a.
Reread the opening vignettes regarding CBI at the beginning of Chapters 7 and 8. Using that information as a background, generate a two- to three-page document that summarizes the security management
Consider the 12 categories of vulnerability in Figure 12-14. Describe the three most serious vulnerabilities to each of the following businesses: a. CBI b. Your university c. A neighborhood
Describe a potential technical safeguard for each of the vulnerabilities you identified in your answer to question 12-3. a. CBI b. Your university c. A neighborhood accounting firm
Describe a potential data safeguard for each of the vulnerabilities you identified in your answer to question 12-3. If no data safeguard is appropriate to a business, explain why. a. CBI b. Your
Describe a potential human safeguard for each of the vulnerabilities you identified in your answer to question 12-3. a. CBI b. Your university c. A neighborhood accounting firm
Describe how each of the organizations in question 12-3 should prepare for security incidents. a. CBI b. Your university c. A neighborhood accounting firm
How likely are the vulnerabilities you identified in question 12-3? If you were the owner or a senior manager in these organizations, which of the items you described in questions 12-4 through 12-7
Many small businesses operate with local servers running in broom closets or the like. Explain what using a cloud vendor that is compliant with these standards and statements means to such companies.
“Outlook on Human Resources in the ICT Labour Market: 2008–2015” suggests that ICT workers need to have several core skills. a. What are these key skills? b. Identify ways that a student could
Watch the video “A Vision of Students Today” (www.youtube.com/watch?v=dGCJ46vyR9o). Discuss this video with your group and identify three ways that courses could be designed to improve the way
1. Are the social media sites that Mabel’s Labels uses Information Systems? 2. What do you think are the benefits to Mabel’s Labels of joining and participating in their various social media
Running at the Speed of the Web: The Running Room 1. Do you think The Running Room would be as successful as it is if it didn’t have a website? In other words, is the company’s website a critical
Do people who use free email systems understand the implications of the tradeoffs that they have made?
Is email different from postal or telephone services? Is it more like a postcard, where privacy should not be assumed?
How complete a profile can Google assemble of a typical user?
Should these forms of communication service be regulated? If so, how and by whom?
Is there a difference between what Google is doing and how spam filters work?
Re-read the “MIS in Use” case to refresh your memory of the Edoc HELM system. a. Using Figure 2.1 as a guide, draw the paper-based process described in the case. b. Now draw the process after
Singing Valley Resort is a top-end (rooms cost from $400 to $2500 per night), 50-unit resort located high in the mountains of Colorado. Singing Valley prides itself on its beautiful location, it’s
This chapter introduced the concept of Business Process Management (BPM). In the discussion, three methods for improving business processes were listed: Total Quality Management (TQM), Six Sigma, and
1. What are the primary benefits realized by Edoc’s use of HELM software? 2. Could HELM also result in increased revenue? Explain your answer. 3. Can you think of other benefits that might arise
High Touch—High Tech 1. What challenges are created when providing anywhere, anytime services? 2. What business and technology issues would be faced by an organization that wants to have a complete
Apply the value chain model to a video game developer, such as Electronic Arts (www.EA.com). What is its competitive strategy? Describe the tasks Electronic Arts must accomplish for each of the
Apply the value chain model to a video game retail company, such as EB Games (www.EBGames.com). What is its competitive strategy? Describe the tasks EB Games must accomplish for each of the primary
Explain the relationship of value and cost according to the Porter model. When does it make sense to add cost to a business process?
1. Identify the value chain involved in a obtaining a new bicycle from winter borne Custom Bicycles. Can you identify the primary activities that create value for the customer when purchasing a new
1. ICS Courier focused on business-to-business customers, servicing law firms, insurance companies, and accounting and medical offices. How did the fact that drivers arrived consistently at the same
Assume that you have been asked to prepare a computer hardware budget. Your company has identified three classes of computer user. Class A employees use the computer for email, Web browsing, Internet
Search the Internet for the term Open Office. Explain what Open Office is. How do users obtain it? How much does it cost? Given this information, why do you think companies use Microsoft Office
Describe the three categories of applications software. Give an example of each.
Explain Figure 4-14. Search the Internet for an example of horizontal and vertical market software (other than those mentioned in this chapter). Search as well for the product QuickBooks. Briefly
1. Where are the main markets for Locarna’s systems? 2. What problem does Locarna solve? 3. How important are systems such as Locarna’s? 4. How have recent technological changes affected or
Network Effects, Increasing Returns, and Lock In 1. How do the challenges faced by Stantec differ from those faced by other industries? 2. What are the implications of this case for companies that
Samantha Green owns and operates Twigs Tree Trimming Service. Recall from Chapter 3 that Samantha has a degree from a forestry program, and recently opened her business in Winnipeg. Her business
Fired Up, Inc., is a small business owned by Curt and Julie Robards. Based in Brisbane, Australia, Fired Up manufacturers and sells Fired Now, a lightweight camping stove the. Recall from Chapter 3
The following two tables could be used to store the data in Figure 5-15 in a database. ChoirMember (LastName, FirstName, Email, Phone, Part) MusicalWork (NameOfWork, Composer, Part, CopyNumber)This
A three table database design for the data in the spreadsheet in Figure 5-15 is as follows:ChoirMember (LastName, FirstName, Email, Phone, Part) MusicalWork (NameOfWork, Composer)CheckOut (LastName,
1. How serious a problem is duplicate information to the financial services industry? Is it more serious for some industries than others? (Hint: How much of an issue is it for the health
1. What problem does active.com solve for event organizers? 2. Does active.com have any other advantages other than economies of scale? 3. Are there are any network effects for active.com? 4. What
Suppose you manage a group of seven employees in a small business. Each of your employees wants to be connected to the Internet. Consider two alternatives:• Alternative A: Each employee has his or
You have decided to start up a web-based business. You are considering what you need to make it happen.a. Explain the steps you would take in assigning a domain name for your website.b. Use the web
You have decided to set up a web-based business. You have investigated the costs, chosen an ISP, and are ready to get working on your site. You’ve heard that a quick way to get your site up and
1. What problem does MyBus solve? 2. How important was access to the TransLink website and the text messaging API? 3. Does this system cooperate or compete with Translink? 4. What technological
1. What implications WiMax have for existing established traditional telephone companies. 2. Beyond television, what other new capabilities could be enabled by this technological innovation? 3. What
Choose one of the following basic business processes: inventory management, operations, manufacturing, HR management, or accounting/financial management. Use the Internet to identify three vendors
Consider Carrie’s Custom Clothing company described at the start of this chapter. Assume that Carrie uses one system to collect information about her customers, another spreadsheet to collect
Distance learning is an application of inter organizational information systems. Although it may seem odd to label students as organizations, they are customers, in the same sense that consumers are
1. Consider the 5 components of an information system provided in Figure 1-1 in Chapter 1. Which of these components was the reason for the lack of success in the first round of ERP implementation at
1. What are the advantages of this technology? 2. How does this technology allow John Deere to compete against lower-cost manufacturers and producers? 3. Are there any other advantages to using this
How does the data storage trend affect your university? What types of data are growing the fastest? Of these, what amount is generated by students? By classroom activities? By administration? By
OLTP systems are focused on providing three things: (1) efficient data input, (2) reliability, and (3) effective processing of a single transaction at a time. Use the knowledge you have gained to
Suppose you work for the university and have access to student, class, professor, department, and grade data. Suppose you want to determine whether grade inflation exists, and, if so, where it seems
Showing 700 - 800
of 1599
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
Last