Deck 20: Developing a 21st-Century Organization
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/27
Play
Full screen (f)
Deck 20: Developing a 21st-Century Organization
1
Which of the following was the original design for the Internet?
A) Email
B) Document exchange
C) Display of static content
D) All of these
A) Email
B) Document exchange
C) Display of static content
D) All of these
D
Explanation: All of these were the original design for the Internet.
Explanation: All of these were the original design for the Internet.
2
Which of the following is a benefit a business can receive by deploying the latest in security technology?
A) Fewer disruptions to organizational systems
B) Increased productivity of employees
C) Greater advances in administration
D) All of these
A) Fewer disruptions to organizational systems
B) Increased productivity of employees
C) Greater advances in administration
D) All of these
D
Explanation: All of these are benefits from security.
Explanation: All of these are benefits from security.
3
IT infrastructure is the hardware,software,and telecommunications equipment that,when combined,provide the underlying foundation to support the organization's goals.
True
Explanation: IT infrastructure is the hardware, software, and telecommunications equipment that, when combined, provide the underlying foundation to support the organization's goals.
Explanation: IT infrastructure is the hardware, software, and telecommunications equipment that, when combined, provide the underlying foundation to support the organization's goals.
4
Which of the following is a reason why businesses want to have the appropriate levels of authentication,access control,and encryption?
A) Only authorized individuals can gain access to the network.
B) Only authorized individuals can access applications for which they are entitled.
C) Individuals cannot understand or alter information while in transit.
D) All of these.
A) Only authorized individuals can gain access to the network.
B) Only authorized individuals can access applications for which they are entitled.
C) Individuals cannot understand or alter information while in transit.
D) All of these.
Unlock Deck
Unlock for access to all 27 flashcards in this deck.
Unlock Deck
k this deck
5
IT infrastructure,security,ebusiness,and integrations are the four primary information technology areas where organizations are focusing.
Unlock Deck
Unlock for access to all 27 flashcards in this deck.
Unlock Deck
k this deck
6
Which of the following is the best security practice used today?
A) Network firewalls
B) User passwords
C) Virus protection
D) None of these
A) Network firewalls
B) User passwords
C) Virus protection
D) None of these
Unlock Deck
Unlock for access to all 27 flashcards in this deck.
Unlock Deck
k this deck
7
Where is the position of IT infrastructure within the organization?
A) Top
B) Middle
C) Bottom
D) Depends on the company as to the position of the IT infrastructure
A) Top
B) Middle
C) Bottom
D) Depends on the company as to the position of the IT infrastructure
Unlock Deck
Unlock for access to all 27 flashcards in this deck.
Unlock Deck
k this deck
8
Which of the following is one of the new series of business success factors that are helping to determine marketplace winners?
A) Organization agility
B) A focus on core competencies
C) Instantaneous business response
D) All of these
A) Organization agility
B) A focus on core competencies
C) Instantaneous business response
D) All of these
Unlock Deck
Unlock for access to all 27 flashcards in this deck.
Unlock Deck
k this deck
9
Which of the following is not one of the primary information technology areas on which organizations are focusing?
A) IT infrastructure
B) Security
C) Database
D) Integration
A) IT infrastructure
B) Security
C) Database
D) Integration
Unlock Deck
Unlock for access to all 27 flashcards in this deck.
Unlock Deck
k this deck
10
What uses active or passive tags in the form of chips or smart labels?
A) Mobile commerce
B) Telematics
C) Electronic tagging
D) Radio frequency identification
This is the definition of RFID.
A) Mobile commerce
B) Telematics
C) Electronic tagging
D) Radio frequency identification
This is the definition of RFID.
Unlock Deck
Unlock for access to all 27 flashcards in this deck.
Unlock Deck
k this deck
11
What is the blending of computers and wireless telecommunications technologies with the goal of efficiently conveying information over vast networks to improve business operations?
A) Mobile commerce
B) Telematics
C) Electronic tagging
D) Radio frequency identification
A) Mobile commerce
B) Telematics
C) Electronic tagging
D) Radio frequency identification
Unlock Deck
Unlock for access to all 27 flashcards in this deck.
Unlock Deck
k this deck
12
Telematics is the blending of computers and wireless telecommunications technologies with the goal of efficiently conveying information over vast networks to improve business operations.
Unlock Deck
Unlock for access to all 27 flashcards in this deck.
Unlock Deck
k this deck
13
Which of the following is one of the 21st-century organizational trends on the business side?
A) Uncertainty in terms of future business scenarios and economic outlooks.
B) Emphasis on strategic analysis for cost reduction and productivity enhancement.
C) Focus on improved business resiliency via the application of enhanced security.
D) All of these.
A) Uncertainty in terms of future business scenarios and economic outlooks.
B) Emphasis on strategic analysis for cost reduction and productivity enhancement.
C) Focus on improved business resiliency via the application of enhanced security.
D) All of these.
Unlock Deck
Unlock for access to all 27 flashcards in this deck.
Unlock Deck
k this deck
14
What is a technique for identifying and tracking assets and individuals via technologies such as RFID and smart cards?
A) Mobile commerce
B) Telematics
C) Electronic tagging
D) Radio frequency identification
A) Mobile commerce
B) Telematics
C) Electronic tagging
D) Radio frequency identification
Unlock Deck
Unlock for access to all 27 flashcards in this deck.
Unlock Deck
k this deck
15
Which company is a leader in the transformation of the broadcasting industry?
A) UPS
B) PBS
C) Cisco
D) Sony
A) UPS
B) PBS
C) Cisco
D) Sony
Unlock Deck
Unlock for access to all 27 flashcards in this deck.
Unlock Deck
k this deck
16
Telematics is a technique for identifying and tracking assets and individuals via technologies such as RFID and smart cards.
Unlock Deck
Unlock for access to all 27 flashcards in this deck.
Unlock Deck
k this deck
17
Core business relationships and models are dramatically changing,including shifts from which of the following?
A) Customer-centricity to product-centricity
B) Mass customization to mass production
C) The value in material things to the value of knowledge and intelligence
D) All of these
A) Customer-centricity to product-centricity
B) Mass customization to mass production
C) The value in material things to the value of knowledge and intelligence
D) All of these
Unlock Deck
Unlock for access to all 27 flashcards in this deck.
Unlock Deck
k this deck
18
Which company was the victim of a distributed denial-of-service (DDoS)attack that forced the company to close operations and to eventually transfer over 2,500 customers to a rival organization?
A) Marks & Spencer
B) Public Broadcasting Service
C) CloudNine Communications
D) The Gap
A) Marks & Spencer
B) Public Broadcasting Service
C) CloudNine Communications
D) The Gap
Unlock Deck
Unlock for access to all 27 flashcards in this deck.
Unlock Deck
k this deck
19
What is the ability to purchase goods and services through a wireless Internet-enabled device?
A) Mobile commerce
B) Telematics
C) Electronic tagging
D) Radio frequency identification
A) Mobile commerce
B) Telematics
C) Electronic tagging
D) Radio frequency identification
Unlock Deck
Unlock for access to all 27 flashcards in this deck.
Unlock Deck
k this deck
20
The original design of the Internet and the web was for simple email,document exchange,and the display of static content,not for sophisticated and dynamic business applications that require access to back-end systems and databases.
Unlock Deck
Unlock for access to all 27 flashcards in this deck.
Unlock Deck
k this deck
21
Electronic __________ is a technique for identifying and tracking assets and individuals via technologies such as RFID and smart cards.
Unlock Deck
Unlock for access to all 27 flashcards in this deck.
Unlock Deck
k this deck
22
___________ commerce is the ability to purchase goods and service through a wireless Internet-enabled device.
Unlock Deck
Unlock for access to all 27 flashcards in this deck.
Unlock Deck
k this deck
23
Explain how the integration of business and technology is shaping 21st-century organizations.
Unlock Deck
Unlock for access to all 27 flashcards in this deck.
Unlock Deck
k this deck
24
RFID uses ________ or passive tags in the form of chips or smart labels.
Unlock Deck
Unlock for access to all 27 flashcards in this deck.
Unlock Deck
k this deck
25
___________ is the blending of computers and wireless telecommunications technologies with the goal of efficiently conveying information over vast networks to improve business operations.
Unlock Deck
Unlock for access to all 27 flashcards in this deck.
Unlock Deck
k this deck
26
List and describe the four 21st-century trends that businesses are focusing on.Rank them in order of business importance and justify your ranking.
Unlock Deck
Unlock for access to all 27 flashcards in this deck.
Unlock Deck
k this deck
27
IT ____________ is the hardware,software,and telecommunications equipment that,when combined,provide the underlying foundation to support the organization's goals.
Unlock Deck
Unlock for access to all 27 flashcards in this deck.
Unlock Deck
k this deck