Project #68209 - Management Information System

Review Questions chapters 7-12 Text: Management Information Systems Managing the Digital firm, by Kenneth C. Laudon and Jane P. Laudon 13th edition ISBN-10: 0133050696/ ISBN-13: 978-0133050691 The student will write short essay answers to the “Review Questions” at the end of each chapter. The student should please use the wording of the question in Black font and then the answers in Blue font. Review Questions should be single spaced. Students will also write responses to the “Discussion Questions” the same way. Chapter 7 “Review Questions” 1) What are the principal components of telecommunications networks and key networking technologies? - Describe the features of a simple network and the network infrastructure for a large company. - Name and describe the principal technologies and trends that have shaped contemporary telecommunications systems. 2) What are the main telecommunications transmission media and types of networks? - Name the different types of physical transmission media and compare them in terms of speed and cost. - Define a LAN, and describe its components and the functions of each component. - Name and describe the principal network topologies. 3) How do the internet and Internet technology work, and how do they support communication an e-business? - Define the internet, describe how it works, and explain how it proves business value. - Explain how the domain name system (DNS) an IP addressing system work. - List and describe the principle Internet services. - Define and describe VoIP and virtual private networks, and explain how they provide value to businesses. - List and describe alternative ways of locating information on the web. - Compare web 2.0 and web 3.0 4) What are the principle technologies and standards for wireless networking, communications, and internet access? - Define Bluetooth, WiFi, Wimax, and 3G and 4G networks. - Describe the capabilities of each and for which types of applications each is best suited. 5) Why are RFID and wireless sensor networks (WSNs) valuable for business? - Define RFID, explain how it work, and describe how it provides value to businesses. - Define WSNs, explain how they work, and describe the kinds of applications that use them. Discussion Questions 1) It has been said that within the next few years, smartphones will become the single most important digital device we own. Discuss the implications of this statement. 2) Should all major retailing and manufacturing companies switch to RFID? Why or why not? 3) Compare WiFi and high speed cellular systems for accessing the internet. What are the advantages and disadvantages of each? Chapter 8 “Review Questions” 1) Why are information systems vulnerable to destruction, error, and abuse? - List and describe the most common threats against contemporary information systems. - Define malware and distinguish among a virus, a worm, and a Trojan horse. - Define a hacker and explain how hackers create security problems and damage systems. - Define computer crime. Provide two examples of crime in which computers are targets and two examples in which computers are used as instruments of crime. - Define identity theft and phising and explain why identity theft is such a big problem today. - Describe the security and system reliability problems created by employees. - Explain how software defects affect system reliability and security. 2) What is the business value of security and control? -Explain how security and control provide value for businesses. - Describe the relationship between security and control and recent U.S. government regulatory requirements and computer forensics. 3) What are the components of an organizational framework for security and control? - Define general controls and describe each type of general control. - Define application controls and describe each type of application control. -Describe the function of risk assement and explain how it is conducted for information systems. -define and describe the following: security policy, acceptable use of policy, and identity management. -Explain how MIS auditing promotes security and control. 4. What are the most important tools and technologies for safeguarding information resources? - Name and describe three authentication methods. - Describe the roles of firewalls, intrusion detection system, and antivirus software in promoting security. - Explain how encryption and digital certificates in a public key infrastructure. -Distinguish between fault tolerance and high availability computing, and between disaster recovery planning and business continuity planning. - Identify and describe the security problems posed by cloud computing. - Describe measures for improving software quality and reliability. Discussion Questions 1) Security isn’t simply a technology issues, it’s a business issue. Discuss. 2) If you were developing a business continuity plan for your company, where would you start? What aspects of the business would the plan address? 3) Suppose your business has an e-commerce web site where it sold goods and accepted credit card payments. Discuss the major security threats to this web site and their potential impact. What can be done to minimize these threats? Chapter 9 “Review Questions” 1) How do enterprise systems help businesses achieve operational excellence? -Define an enterprise system and explain how enterprise software works. - Describe how enterprise systems provide value for a business. 2) How do supply chain management systems coordinate planning, production, and logistics with suppliers? - Define a supply chain and identify each of its components. -Explain how supply chain management systems help reduce the bullwhip effect and how they provide value for a business. - Define and compare supply chain planning systems and supply chain execution systems. -Describe the challenges of global supply chains and how internet technology can help companies manage them better. - Distinguish between push-based and a pull-based model of supply chain management and explain how contemporary supply chain management systems facilitate a pull-based model. 3) How do customer relationship management systems help firms achieve customer intimacy? - Define customer relationship management and explain why customer relationships are so important today. - Describe how partner relationship management and employee relationship management are related to customer relationship management. -Describe the tools and capabilities of customer relationship management software for sales, marketing, and customer service, -Distinguish between Operational and analytical CRM. 4) What are the challenges posed by enterprise applications? -List and describe the challenges posed by enterprise applications. -Explain how these challenges can be addressed 5) How are enterprise applications taking advantage of new technologies? - How are enterprise applications taking advantage of SOA, web services, open source softeware, and wireless technology? - Define Social CRM and explain how customer relationship management systems are using social networking. “Discussion Questions” 1) Supply Chain management is less about managing the physical movement of goods and more about managing information. Discuss the implications of this statement. 2) If a company wants to implement an enterprise application, it had better do its homework. Discuss the implications of this statement. 3) Which enterprise application should a business install first: ERP, SCM, or CRM? Explain your answer. Chapter 10 “Review Questions” 1) What are the unique features of e-commerce, digital markets, and digital goods? -Name and describe four business trends and three technology trends shaping e-commerce today. - List and describe the eight unique features of e-commerce. - Define a digital market and digital goods and describe their distinguishing features. 2) What are the principle e-commerce business and revenue models? -Name and describe the principal e-commerce business models. -Name and describe the e-commerce revenue models. 3) How has e-commerce transformed marketing? - Explain how social networking and the “wisdom of crowds” help companies improve their marketing. -Define behavioral targeting and explain how it works at individual web sites and on advertising networks. -Define the social graph and explain how it is used in e-commerce marketing. 4) How has e-commerce affected business- to- business transactions? - Explain how internet technology supports business-to-business electronic commerce. -Define and describe net marketplaces and explain how they differ from private industrial networks (private exchanges). 5) What is the role of m-commerce in business, and what are the most important m-commerce applications? - List and describe important types of m-commerce services and applications. 6) What issues must be addressed when building an e-commerce presence? - List and describe each of the factors that go into building of an e-commerce web site. -List and describe four business objectives, four system functionalities, and four information requirements of a typical e-commerce website. - List and describe each of the options for building and hosting e-commerce web sites.] “Discussion Questions” 1) How does the Internet Change consumer and supplier relationships? 2) The internet may not make corporations obsolete, but the corporations will have to change their business models. Do you agree? Why or why not? 3) How have the social technologies changed e-commerce?

Subject Business
Due By (Pacific Time) 05/01/2015 12:00 am
Report DMCA
TutorRating
pallavi

Chat Now!

out of 1971 reviews
More..
amosmm

Chat Now!

out of 766 reviews
More..
PhyzKyd

Chat Now!

out of 1164 reviews
More..
rajdeep77

Chat Now!

out of 721 reviews
More..
sctys

Chat Now!

out of 1600 reviews
More..
sharadgreen

Chat Now!

out of 770 reviews
More..
topnotcher

Chat Now!

out of 766 reviews
More..
XXXIAO

Chat Now!

out of 680 reviews
More..
All Rights Reserved. Copyright by AceMyHW.com - Copyright Policy