How JustAnswer Works:
  • Ask an Expert
    Experts are full of valuable knowledge and are ready to help with any question. Credentials confirmed by a Fortune 500 verification firm.
  • Get a Professional Answer
    Via email, text message, or notification as you wait on our site.
    Ask follow up questions if you need to.
  • 100% Satisfaction Guarantee
    Rate the answer you receive.
Ask getsetgo Your Own Question
getsetgo
getsetgo, MBA
Category: Homework
Satisfied Customers: 3487
Experience:  MBA from IIM Calcutta, Engineer, 8+ years of exp. at executive level
15962517
Type Your Homework Question Here...
getsetgo is online now
A new question is answered every 9 seconds

1. The six important business objectives of information technology

This answer was rated:

1. The six important business objectives of information technology are new products, services, and business models; customer and supplier intimacy; survival; competitive advantage; operational excellence; and:

improved flexibility.
improved decision making.
improved business practices.
improved efficiency.


2. Buying or selling goods over the Internet is called:

E commerce.
e-business.
an intranet.
an extranet.


3, The feature of political systems in which a body of laws is in place that permits individuals to recover the damages done to them by other actors, systems, or organizations is referred to as:

accountability.
responsibility.
due process.
liability.


4. The multitasking, multi-user, operating system developed by Bell Laboratories that operates on a wide variety of computing patforms is

unix

Linuz

OSX

COBOL


5. Data mining is a tool for allowing users to:

quickly compare transaction data gathered over many years.
find hidden relationships in data.
obtain online answers to ad hoc questions in a rapid amount of time.
summarize massive amounts of data into much smaller, traditional reports.


6. The telephone system is an example of a __________ network.

peer-to-peer
wireless
packet-switched
circuit-switched

7. Specific security challenges that threaten clients in a client/server environment include:

tapping, sniffing, message alteration, and radiation.
hacking, vandalism, and denial of service attacks.
theft, copying, alteration of data, and hardware or software failure.
unauthorized access, errors, and spyware.

8. Which of the following traditional solutions enables manufacturers to deal with uncertainties in the supply chain?

Safety stock
Continuous replenishment
Just-in-time strategies
Demand planning

9. Which of the following is NOT one of the unique features of e-commerce technology?
Information density
Transparency
Richness
Social technology

10. Which of the following
managerial roles is NOT supported by information systems?

Spokesperson
Resource allocator
Leader
Nerve center

getsetgo :

Hello

getsetgo :

I am working on it

getsetgo :

Will post the answer shortly

getsetgo :

Please download your answer Here

getsetgo and 4 other Homework Specialists are ready to help you
THIS ANSWER IS LOCKED!

You need to spend $3 to view this post. Add Funds to your account and buy credits.

Related Homework Questions