Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

11. BIS infrastructure components correspond to EA's ______ architecture. Question 11 options: A) technology B) application C) data/information D) All of the above 12. A(n)

11. BIS infrastructure components correspond to EA's ______ architecture.

Question 11 options:

A)

technology

B)

application

C)

data/information

D)

All of the above

12. A(n) ___ is a set of interrelated components that work together to support business processes, operations, and activities.

Question 12 options:

work system

business information system (BIS)

business computing platform

enterprise architecture (EA)

13. Which of the following is an example of leveraging IT and information systems to create and/or enhance products or services?

Question 13 options:

A)

driverless vehicles

B)

Apple Pay

C)

smart appliances

D)

All of the above

14. According to Michael Porter's description of the progression of IS strategy, and organization chooses its value chain strategy after it _____.

Question 14 options:

A)

analyzes the structure of the industry in which it competes

B)

chooses its competitive strategy

C)

implements work systems

D)

All of the above

15. Increasing broadband connection speeds to Internet Service Providers (ISPs), is best described by _____'s Law.

Question 15 options:

A)

Moore

B)

Metcalf

C)

Nielsen

D)

Bell

16. Which of the following laws best explains why Facebook, as a company, has a very high market capitalization?

Question 16 options:

A)

Metcalf's Law

B)

Bell's Law

C)

Nielsen's Law

D)

Moore's Law

17. Which of the following is an example of a question that enterprise architecture (EA) challenges business managers to ask?

Question 17 options:

Do we have the programs and applications needed to process our data to produce strategically relevant information?

Do we have the data management technologies and networks needed to support strategic data processing?

Does our security architecture offer sufficient protection to our technical infrastructure, applications, and data?

All of the above

18. The evolution of information systems in today's businesses is being shaped by _______.

Question 18 options:

A)

technological advancements

B)

globalization and other competitive forces within the business environment

C)

cybercrime and cyberattacks

D)

All of the above

19. Businesses began to recognize the potential of information technology (IT) to provide competitive advantage during the _____.

Question 19 options:

A)

1990s

B)

2000s

C)

2010s

D)

None of the above

20. If he were writing today, Bell would probably identify _____ as a technology that will shape the evolution of business computing in the 2020s.

Question 20 options:

Big Data

the Internet of Things (IoT)

self-driving vehicles

All of the above

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Essential SQLAlchemy Mapping Python To Databases

Authors: Myers, Jason Myers

2nd Edition

1491916567, 9781491916568

More Books

Students also viewed these Databases questions