Deck 3: Strategic Uses of Information Technology

ملء الشاشة (f)
exit full mode
سؤال
Since the 1990's, strategic use of information systems has emphasized linking companies to suppliers, customers, and other parties in one's value chain.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
One disadvantage to demand-pull, business-to-business e-business is the infrastructure.
سؤال
The Internet has allowed increased focus on CRM.
سؤال
The strategic use of IT has transitioned from an outward focus to its current state, an inward focus.
سؤال
According to Porter, the only way to sustain advantage through the Internet is to create a distinct value chain that offers unique value.
سؤال
End-user computing is an example of strategic information systems use that works inward.
سؤال
The Internet has eliminated the problem of manufacturers and suppliers needing the same infrastructure.
سؤال
Corporate portals are difficult to implement because of the additional desktop software required for access.
سؤال
The Internet can no longer be viewed as a strategic use of Information Technology because of the demise of the dot coms.
سؤال
The importance of the Internet is its support for a sale to a customer - not the servicing of the product.
سؤال
It is possible to use an intranet to foster a sense of community within an organization.
سؤال
Electronic tenders are an extension of the computational capabilities of a computer.
سؤال
Close integration is when one party provides another party with ad hoc access to its internal information.
سؤال
A demand-pull business model is a customer-centric model that initiates activities after a customer's order has been placed.
سؤال
An electronic tender is an electronic communication capability in a product or service that allows that product or service to be paid for by another computer.
سؤال
An intranet is a closed system that utilizes Internet technologies to service employees and customers of an organization.
سؤال
In a private exchanges, information passes through the chain in a burst and is available to
all parties at the same time, rather than sequentially over time.
سؤال
Reengineering business processes is an outward focused strategy.
سؤال
In tight business-to-business e-business integration, two parties exchange information in a formal manner.
سؤال
In tight integration, two parties share at least one business process.
سؤال
According to Carr, which of the following is a reason why IT has reached the end of its buildout?

A) IT prices have dropped.
B) The capacity of the Internet has caught up with demand.
C) There are many computer vendors.
D) All of the above
سؤال
According to Carr, IT management should focus on which of the following?

A) managing risks
B) keeping costs down
C) staying ahead of the technology curve
D) Both A and B
سؤال
Decentralizing control over a company intranet:

A) encourages more timely and relevant content.
B) discourages development of sites with company information.
C) minimizes problems with data redundancy and security.
D) Both A and C
سؤال
Which of the following is not a potential B2C problem?

A) The information systems are not always reliable.
B) global competition
C) capability for personalized customer attention
D) must deal with multiple legal systems
سؤال
IT's economic impact comes from:

A) incremental improvements.
B) wholesale improvements.
C) "big bang" IT projects.
D) None of the.above
سؤال
A challenge associated with implementing a company intranet is:

A) implementing proprietary Internet technology.
B) difficulty integrating the intranet with existing legacy systems.
C) encouraging people to put information on the intranet.
D) All of the above
سؤال
In the 1990s, strategic use of IT in most businesses turned inward to:

A) intranets.
B) reengineering business processes.
C) ERP systems.
D) Both B and C
E) Both A and C
سؤال
A(n) ________ is an electronic communication capability in a product or service that allows that product or service to be tended.

A) electronic transmission
B) EDI
C) electronic tender
D) None of the above
سؤال
A unique aspect of a company intranet is:

A) fostering a sense of alienation by employees.
B) promoting company culture.
C) creating a sense of belonging for employees.
D) Both B and C
سؤال
Which of the following is not considered a strategic uses of IT in business?

A) business-to-employee
B) business-to-government
C) business-to-customer
D) business-to-business
سؤال
In ________ business-to-business e-business integration, two parties exchange information in a formal manner.

A) loose
B) merged
C) close
D) tight
سؤال
Which strategic use of the Internet is no longer in use?

A) business-to-employee
B) business-to-consumer
C) business-to-business
D) All of the above are still in use.
سؤال
Which of the following is an advantage of B2C e-business?

A) elimination of geographic boundaries
B) automated order processing
C) Manufacturers can bypass retailers.
D) All of the above
سؤال
An example of B2B e-business is:

A) collaborating with competitors to set prices.
B) collaborating with non-competitors to achieve efficiencies.
C) acquiring suppliers.
D) Both A and C
سؤال
According to Michael Porter, the way to sustain advantage through the Internet is to:

A) create a distinct value chain.
B) create a distinct demand chain.
C) create a distinct knowledge chain.
D) None of the above
سؤال
Which of the following is not true of intranets?

A) They utilize standard protocols.
B) They result in open systems using nonproprietary technologies.
C) They result in wider access to company information.
D) All of the above
سؤال
In ________ business-to-business e-business integration, two parties share at least one business process as partners.

A) loose
B) merged
C) close
D) tight
سؤال
Which of the following is part of a company's value chain?

A) the upstream supply chain
B) the downstream demand chain
C) retailers
D) All of the above
سؤال
When e-business applications run over a public network:

A) access costs are drastically reduced.
B) communications costs are drastically reduced.
C) application costs are drastically reduced.
D) training costs are drastically reduced.
E) All of the above
سؤال
Strategic Uses of Information Systems include:

A) Working Outward, Working Inward, and Working Across.
B) Working Outward, Working Inward, and Working Between.
C) Working Outward, Working Inward, and Working Around.
D) Working Between, Working Across and Working Around.
سؤال
List the advantages of B2B e-business.
سؤال
Distinguish between e-enablement, e-business, and e-commerce.
سؤال
Distinguish between three types of strategic uses of IT in business.
سؤال
Distinguish between loose, close and tight integration of B2B e-business.
سؤال
List and describe three key components provided by the Internet that has allowed companies to accelerate online business activity.
سؤال
Briefly describe the three lessons that the past has taught about how to use IT strategically, according to Brown and Hagel.
سؤال
How do companies use the technology of the internet for competitive advantage?
سؤال
According to Porter, how can the Internet be used to sustain a competitive advantage?
سؤال
What is an Intranet? Identify several key benefits of intranets.
سؤال
According to Carr, long term successful IT management hinges on defense, not offense. Carr further indicates that the Management of IT should focus on which three areas?
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 3: Strategic Uses of Information Technology
1
Since the 1990's, strategic use of information systems has emphasized linking companies to suppliers, customers, and other parties in one's value chain.
True
2
One disadvantage to demand-pull, business-to-business e-business is the infrastructure.
True
3
The Internet has allowed increased focus on CRM.
True
4
The strategic use of IT has transitioned from an outward focus to its current state, an inward focus.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
5
According to Porter, the only way to sustain advantage through the Internet is to create a distinct value chain that offers unique value.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
6
End-user computing is an example of strategic information systems use that works inward.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
7
The Internet has eliminated the problem of manufacturers and suppliers needing the same infrastructure.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
8
Corporate portals are difficult to implement because of the additional desktop software required for access.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
9
The Internet can no longer be viewed as a strategic use of Information Technology because of the demise of the dot coms.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
10
The importance of the Internet is its support for a sale to a customer - not the servicing of the product.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
11
It is possible to use an intranet to foster a sense of community within an organization.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
12
Electronic tenders are an extension of the computational capabilities of a computer.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
13
Close integration is when one party provides another party with ad hoc access to its internal information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
14
A demand-pull business model is a customer-centric model that initiates activities after a customer's order has been placed.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
15
An electronic tender is an electronic communication capability in a product or service that allows that product or service to be paid for by another computer.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
16
An intranet is a closed system that utilizes Internet technologies to service employees and customers of an organization.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
17
In a private exchanges, information passes through the chain in a burst and is available to
all parties at the same time, rather than sequentially over time.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
18
Reengineering business processes is an outward focused strategy.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
19
In tight business-to-business e-business integration, two parties exchange information in a formal manner.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
20
In tight integration, two parties share at least one business process.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
21
According to Carr, which of the following is a reason why IT has reached the end of its buildout?

A) IT prices have dropped.
B) The capacity of the Internet has caught up with demand.
C) There are many computer vendors.
D) All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
22
According to Carr, IT management should focus on which of the following?

A) managing risks
B) keeping costs down
C) staying ahead of the technology curve
D) Both A and B
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
23
Decentralizing control over a company intranet:

A) encourages more timely and relevant content.
B) discourages development of sites with company information.
C) minimizes problems with data redundancy and security.
D) Both A and C
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
24
Which of the following is not a potential B2C problem?

A) The information systems are not always reliable.
B) global competition
C) capability for personalized customer attention
D) must deal with multiple legal systems
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
25
IT's economic impact comes from:

A) incremental improvements.
B) wholesale improvements.
C) "big bang" IT projects.
D) None of the.above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
26
A challenge associated with implementing a company intranet is:

A) implementing proprietary Internet technology.
B) difficulty integrating the intranet with existing legacy systems.
C) encouraging people to put information on the intranet.
D) All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
27
In the 1990s, strategic use of IT in most businesses turned inward to:

A) intranets.
B) reengineering business processes.
C) ERP systems.
D) Both B and C
E) Both A and C
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
28
A(n) ________ is an electronic communication capability in a product or service that allows that product or service to be tended.

A) electronic transmission
B) EDI
C) electronic tender
D) None of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
29
A unique aspect of a company intranet is:

A) fostering a sense of alienation by employees.
B) promoting company culture.
C) creating a sense of belonging for employees.
D) Both B and C
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
30
Which of the following is not considered a strategic uses of IT in business?

A) business-to-employee
B) business-to-government
C) business-to-customer
D) business-to-business
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
31
In ________ business-to-business e-business integration, two parties exchange information in a formal manner.

A) loose
B) merged
C) close
D) tight
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
32
Which strategic use of the Internet is no longer in use?

A) business-to-employee
B) business-to-consumer
C) business-to-business
D) All of the above are still in use.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
33
Which of the following is an advantage of B2C e-business?

A) elimination of geographic boundaries
B) automated order processing
C) Manufacturers can bypass retailers.
D) All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
34
An example of B2B e-business is:

A) collaborating with competitors to set prices.
B) collaborating with non-competitors to achieve efficiencies.
C) acquiring suppliers.
D) Both A and C
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
35
According to Michael Porter, the way to sustain advantage through the Internet is to:

A) create a distinct value chain.
B) create a distinct demand chain.
C) create a distinct knowledge chain.
D) None of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
36
Which of the following is not true of intranets?

A) They utilize standard protocols.
B) They result in open systems using nonproprietary technologies.
C) They result in wider access to company information.
D) All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
37
In ________ business-to-business e-business integration, two parties share at least one business process as partners.

A) loose
B) merged
C) close
D) tight
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
38
Which of the following is part of a company's value chain?

A) the upstream supply chain
B) the downstream demand chain
C) retailers
D) All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
39
When e-business applications run over a public network:

A) access costs are drastically reduced.
B) communications costs are drastically reduced.
C) application costs are drastically reduced.
D) training costs are drastically reduced.
E) All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
40
Strategic Uses of Information Systems include:

A) Working Outward, Working Inward, and Working Across.
B) Working Outward, Working Inward, and Working Between.
C) Working Outward, Working Inward, and Working Around.
D) Working Between, Working Across and Working Around.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
41
List the advantages of B2B e-business.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
42
Distinguish between e-enablement, e-business, and e-commerce.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
43
Distinguish between three types of strategic uses of IT in business.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
44
Distinguish between loose, close and tight integration of B2B e-business.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
45
List and describe three key components provided by the Internet that has allowed companies to accelerate online business activity.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
46
Briefly describe the three lessons that the past has taught about how to use IT strategically, according to Brown and Hagel.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
47
How do companies use the technology of the internet for competitive advantage?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
48
According to Porter, how can the Internet be used to sustain a competitive advantage?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
49
What is an Intranet? Identify several key benefits of intranets.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
50
According to Carr, long term successful IT management hinges on defense, not offense. Carr further indicates that the Management of IT should focus on which three areas?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.