All Matches
Solution Library
Expert Answer
Textbooks
Search Textbook questions, tutors and Books
Oops, something went wrong!
Change your search query and then try again
Toggle navigation
FREE Trial
S
Books
FREE
Tutors
Study Help
Expert Questions
Accounting
General Management
Mathematics
Finance
Organizational Behaviour
Law
Physics
Operating System
Management Leadership
Sociology
Programming
Marketing
Database
Computer Network
Economics
Textbooks Solutions
Accounting
Managerial Accounting
Management Leadership
Cost Accounting
Statistics
Business Law
Corporate Finance
Finance
Economics
Auditing
Hire a Tutor
AI Study Help
New
Search
Search
Sign In
Register
study help
business
management information systems
Questions and Answers of
Management Information Systems
With the rise of electronic commerce, what do you think will happen to those without computer skills, Internet access, computers, smartphones, and so on? Will they be able to survive and advance by
Do you think information technology has made it easier to do business? Or has it only raised the bar on what is required to be able to do business in the twenty-first century? Support your answer
In some cases, individuals engage in cybersquatting so that they can sell the domain names to companies expensively. In other cases, companies engage in cybersquatting by registering domain names
Should Mr. Coffee sell coffeemakers online? Hint: Take a look at the discussion of channel conflict in this chapter.
Discuss the reasons for EC failures.
Why is order fulfillment in B2C considered difficult?
Discuss the various ways to pay online in B2C. Which method(s)would you prefer and why?
What are the major benefits of G2C electronic commerce?
Discuss the benefits to sellers and buyers of a B2B exchange.
Distinguish between business-to-business forward auctions and buyers’ bids for RFQs.
Discuss the reasons for having multiple EC business models.
Discuss the major limitations of e-commerce.Which of these limitations are likely to disappear? Why?
Access Microsoft’s Bing translator (www.bing.com/translator)or Google (translate.google.com) translation pages. Type in a paragraph in English and select, for example, English-to-French.When you
Second Life (www.secondlife.com) is a three-dimensional, online world built and owned by its residents. Residents of Second Life are avatars who have been created by real people. Access Second Life,
Access various search engines other than Google. Search for the same terms on several of the alternative search engines and on Google.Compare the results on breadth (number of results found) and
Research the companies involved in Internet telephony (Voice-over IP). Compare their offerings as to price, necessary technologies, ease of installation, and so on. Which company is the most
Access the website of Music Canada (www.musiccanada.com).Discuss what you find there regarding digital rights and copyright infringement (that is, downloading music files through P2P networks, for
Compare and contrast Google Sites (https://gsuite.google.ca/intl/en_ca/products/sites/) and Microsoft Office 365 (www.office.com). Which site would you use to create your own website? Explain your
Access the website of your university. Does the website provide high-quality information (the right amount, clear, accurate, etc.)? Do you think a high-school student who is thinking of attending
Access Google (or YouTube) videos and search for “Cisco Magic.”This video shows Cisco’s next-generation telepresence system. Compare and contrast it with current telepresence systems.
Visit the websites of companies that manufacture telepresence products for the Internet. Prepare a report. Differentiate between telepresence products and videoconferencing products.
From your own experience or from the vendor’s information, list the major capabilities of Lotus Notes/Domino. Do the same for Microsoft Exchange. Compare and contrast the products. Explain how the
You plan to take a two-week vacation to Australia this year. Using the Internet, find information that will help you plan the trip. Such information includes, but is not limited to, the following:a.
Access the website for that agency or company (in question 6) to learn the process that you must use. How much will it initially cost to register your domain name? How much will it cost to maintain
Access www.icann.org and obtain the name of an agency or company that can register a domain for the TLD that you selected. What is the name of that agency or company?
Set up your own website using your name for the domain name(e.g., KellyRainer).a. Explain the process for registering a domain.b. Which top-level domain will you use and why?
Access http://ipv6.com and https://www.arin.net/resources/guide/ipv6/ and learn more about the advantages of IPv6.
Access several P2P applications, such as SETI@home. Describe the purpose of each application, and indicate which ones you would like to join.
Calculate how much bandwidth you consume when using the Internet every day. How many emails do you send daily and what is the size of each? (Your email program may have email file size
Should businesses monitor network usage? Do you see a problem with employees using company-purchased bandwidth for personal use? Please explain your answer.
Network neutrality is an operating model under which Internet service providers (ISPs) must allow customers equal access to content and applications, regardless of the source or nature of the
How are the network applications of communication and collaboration related? Do communication tools also support collaboration?Give examples.
Explain how the Internet works. Assume you are talking with someone who has no knowledge of information technology (in other words, keep it very simple).
What are the implications of having fibre-optic cable to everyone’s home?
You are working at a doctor’s office. You gather data on the following entities: PATIENT, PHYSICIAN, PATIENT DIAGNOSIS, and TREATMENT.Develop a table for the entity, PATIENT VISIT. Decide on the
Draw the entity-relationship diagram for library patrons and the process of checking out books.
Draw the entity-relationship diagram for a company that has departments and employees. In this company, a department must have at least one employee, and company employees may work in only one
Describe the advantages and disadvantages of relational databases.
What are the implications of having incorrect data points in your Big Data? What are the implications of incorrect or duplicated customer data? How valuable are decisions that are based on faulty
Is Big Data really a problem on its own, or are the use, control, and security of the data the true problems? Provide specific examples to support your answer.
Investigate the Sony PlayStation Network hack that occurred in April 2011.a. What type of attack was it?b. Was the success of the attack due to technology problems at Sony, management problems at
Software piracy is a global problem. Access the following websites:www.bsa.org and www.microsoft.com/en-ca/security. What can organizations do to mitigate this problem? Are some organizations dealing
Enter www.alltrustnetworks.com and other vendors of biometrics.Find the devices they make that can be used to control access into information systems. Prepare a list of products and major
Visit https://cyber.gc.ca/en/about-cyber-centre (Canadian Centre for Cyber Security) and click on “Education and Training,” then “Get Cyber Safe.” Read one of the Cyber Security news articles
Assume that the daily probability of a major earthquake in Los Angeles is 0.07 percent. The chance that your computer centre will be damaged during such a quake is 5 percent. If the centre is
A critical problem is assessing how far a company is legally obligated to go in order to secure personal data. Because there is no such thing as perfect security (i.e., there is always more that one
What types of user authentication are used at your university or place of work? Do these measures seem to be effective? What if a higher level of authentication were implemented? Would it be worth
Is security a technical issue? A business issue? Both? Support your answer.
Why should information security be a prime concern to management?
Do you believe that a university should be allowed to monitor email sent and received on university computers? Why or why not? Support your answer.
Access www.cookiecentral.com and www.theguardian.com/technology/2020/apr/08/zoom-privacy-video-chat-alternatives.Do these sites provide information that helps you protect your privacy?If so, then
Access www.albion.com/netiquette/corerules.html. What do you think of this code of ethics? Should it be expanded? Is it too general?
Access your university’s guidelines for ethical computer and Internet use. Are there limitations as to the types of websites that you can visit and the types of material you can view? Are you
The Electronic Frontier Foundation (www.eff.org) has a mission of protecting rights and promoting freedom in the “electronic frontier.”Review the organization’s suggestions about how to protect
In 2008 a web site called HYPERLINK “http://www.eightmaps.com” www.eightmaps.com arose which held the names, addresses and maps of individuals who made donations to support a proposal in the U.S.
Access the Association for Computing Machinery’s code of ethics for its members (see www.acm.org/code-of-ethics). Discuss the major points of this code. Is this code complete? Why or why not?
Access the Computer Ethics Institute’s website at www.cpsr.org/issues/ethics/cei. The site offers the “Ten Commandments of Computer Ethics.” Study these and decide whether any others should be
An information security manager routinely monitored Web surfing among the company’s employees. The manager discovered that many employees were visiting the “sinful six” websites. (Note: The
Research the Ashley Madison breach.a. Discuss the legality and the ethics of the Ashley Madison website.b. Discuss the legality and the ethics of the actions of the hackers who stole data from the
Research the Volkswagen “Diesel Dupe.” The fundamental tenets of ethics include responsibility, accountability, and liability. Discuss each of these tenets as it applies to the Volkswagen scandal.
Access various search engines to find information relating to the use of drones (unmanned aerial vehicles) for electronic surveillance purposes in Canada.a. Take the position favouring the use of
Frank Abagnale, the criminal played by Leonardo DiCaprio in the motion picture Catch Me If You Can, ended up in prison. After he left prison, however, he worked as a consultant to many companies on
In 2008, the Massachusetts Bay Transportation Authority (MBTA)obtained a temporary restraining order barring three Massachusetts Institute of Technology (MIT) students from publicly displaying what
Describe the five forces in Porter’s competitive forces model and explain how increased access to high-speed Internet has affected each one.
What might the impact of globalization be on your standard of living?
What does globalization mean to you in your choice of a major? In your choice of a career? Will you have to be a “lifelong learner”? Why or why not?
Why is it so difficult for an organization to actually implement business process reengineering?
Consider the student registration process at your university:a. Describe the steps necessary for you to register for your classes each semester.b. Describe how information technology is used (or is
Is the vast amount of medical information on the Web a good thing? Answer from the standpoint of a patient and from the standpoint of a physician.
Given that information technology is impacting every industry, what does this mean for students attending a school of business? Provide specific examples to support your answer.
Given that information technology is impacting every industry, what does this mean for a company’s employees? Provide specific examples to support your answer.
What are the major reasons why it is important for employees in all functional areas to become familiar with IT?
Robots have the positive impact of being able to relieve humans from working in dangerous conditions. What are some negative impacts of robots in the workplace?
Information technology makes it possible to “never be out of touch.”Discuss the pros and cons of always being available to your employers and clients (regardless of where you are or what you are
Your university wants to recruit high-quality high school students from your province. Provide examples of (a) the data that your recruiters would gather in this process, (b) the information that
Describe a business that you would like to start. Discuss how information technology could: (a) help you find and research an idea for a business, (b) help you formulate your business plan, and (c)
15-16 Identify and describe five problems of international networks that prevent companies from developing effective global systems.
15-15 Identify and describe solutions to the five management challenges of developing global systems.
15-14 What would your company need to do to create a successful e-commerce presence in China? Explain.
15-12 Describe the political, cultural, and organizational obstacles for foreign companies that want to do business online in China.
15-10 In this project you’ll use the web to research overseas distributors and customs regulations and use Internet-based software to calculate prices in foreign currencies.You are in charge of
15-9 Companies with many overseas locations need a way to inform employees about available job openings in these locations. In this project you’ll use database software to design a database for
15-8 Your company manufactures and sells tennis racquets and would like to start selling outside the United States. You are in charge of developing a global web strategy, and the first countries you
15-7 United Parcel Service (UPS) has been expanding its package delivery and logistics services in China, serving both multinational companies and local businesses. UPS drivers in China need to use
15-6 Describe ways the Internet can be used in MyLab MIS international information systems.
15-5 If you were a manager in a company that operates in many countries, what criteria would you use to determine whether an application should be developed as a global application or as a local
15-4 What are the issues and technical alternatives to be considered when developing international information systems?
• Define cooptation and explain how it can be used in building global systems.
15-3 What are the challenges posed by global information systems and management solutions for these challenges?
15-2 What are the alternative strategies for developing global businesses?
internationalization of business?
15-4 What are the issues and technical alternatives to be considered when developing international information systems?15-1 What major factors are driving the
15-3 What are the challenges posed by global information systems and management solutions for these challenges?
15-2 What are the alternative strategies for developing global businesses?
15-1 What major factors are driving the internationalization of business?
4. Ask about how much training you would receive in how to use the company’s data products.
3. Ask exactly how you would be using Microsoft Office tools in your job.
2. Use the web to research the company, its products, services, and customers, and the way it operates. Think about what the company needs to do to expand sales globally.
1. Review Sections 15-1, 15-3, and 15-4 of this chapter, Chapter 6 on data management, and the Chapter 12 discussion of business intelligence and analytics.
5. Do you have any foreign language proficiency?
Showing 3100 - 3200
of 6653
First
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
Last