Mis Laudon & Laudon 9e Chapter 6

In: Business and Management

Submitted By arletteam
Words 4304
Pages 18
Chapter 6

1) The device that acts as a connection point between computers and can filter and forward data to a specified destination is called a(n):
A) hub.
B) switch.
C) router.
D) NIC.

2) The Internet is based on which three key technologies?
A) TCP/IP, HTML, and HTTP
B) TCP/IP, HTTP, and packet switching
C) Client/server computing, packet switching, and the development of communications standards for linking networks and computers
D) Client/server computing, packet switching, and HTTP

3) The method of slicing digital messages into parcels, transmitting them along different communication paths, and reassembling them at their destinations is called:
A) multiplexing.
B) packet switching.
C) packet routing.
D) ATM.

4) The telephone system is an example of a ________ network.
A) peer-to-peer
B) wireless
C) packet-switched
D) circuit-switched

5) Which of the following is not a characteristic of packet switching?
A) Packets travel independently of each other.
B) Packets are routed through many different paths.
C) Packet switching requires point-to-point circuits.
D) Packets include data for checking transmission errors.

6) In TCP/IP, IP is responsible for:
A) disassembling and reassembling of packets during transmission.
B) establishing an Internet connection between two computers.
C) moving packets over the network.
D) sequencing the transfer of packets.

7) In a telecommunications network architecture, a protocol is:
A) a device that handles the switching of voice and data in a local area network.
B) a standard set of rules and procedures for control of communications in a network.
C) a communications service for microcomputer users.
D) the main computer in a telecommunications network.

8) What are the four layers of the TCP/IP reference model?
A) Physical, application, transport, and network interface
B) Physical,…...

Similar Documents

Management Information Systems Laudon 12th Edition

...formulas Spreadsheet formulas Spreadsheet charts and formulas Spreadsheet formulas and logical functions Spreadsheet formulas Chapter 5 Chapter Chapter SOFTWARE SKILLS CHAPTER Chapter 2* Chapter 10 5* 7 Chapter 8 Chapter 11 Chapter 14 Chapter 14* Human Resources Employee training and skills tracking Job posting database and Web page Manufacturing and Production Analyzing supplier performance and pricing Database design Database querying and reporting Database design Web page design and creation Chapter 13* Chapter 15 Spreadsheet date functions Database functions Data filtering Importing data into a database Database querying and reporting Spreadsheet data tables Spreadsheet formulas Chapter 2 Inventory management Bill of materials cost sensitivity analysis Chapter 6 Chapter 12* Sales and Marketing Sales trend analysis Database querying and reporting Chapter 1 Customer reservation system Improving marketing decisions Customer profiling Customer service analysis Sales lead and customer analysis Blog creation and design Database querying and reporting Spreadsheet pivot tables Database design Database querying and reporting Database design Database querying and reporting Database design Database querying and reporting Blog creation tool Chapter 3 Chapter 12 Chapter 6* Chapter 9 Chapter 13 Chapter 4 1IIICI MCI...

Words: 452 - Pages: 2

Mis Week 6 Project

...Week 6 Course Project MIS535 Managerial Applications of Information Technology The goal is to add value to current clients as well as prospects. In addition, the company wants to get busy families and business owners to agree to set appointment in order to meet with a financial service professional. Lastly, the company wants people to utilize its Information Systems. New York Life Insurance Company was founded in 1845. The headquarters are in New York City. New York Life Insurance Company is a Fortune 100 company and one of the oldest and largest mutual life companies in the United States. The company maintains operations in all 50 states and also services areas in Asia and Latin America. The company has over 60,000 licensed insurance agents and over 17,000 non-licensed employees. New York Life also holds the highest possible ratings for financial strength. This is based on the life insurance industry’s four principal ratings agencies. With the industries sales growth being around 12% in 2010, New York Life Insurance Company had an increase in sales that was 39% over 2009. The biggest thing about being in the insurance business is sales. As long as New York Life Insurance Company is compliant with the regulations, the company can be creative in building the business to be a dominant force in the industry. By solving the problem, agents will be able to collaborate with managing partners. This will allow the rest of team to be able to revisit appointments that...

Words: 725 - Pages: 3

Essentials of Management Information Systems Kenneth C. Laudon and Jane P. Laudon

...Oracle database and technologies including Oracle Real Application Clusters, Oracle Fusion Middleware Application Server and Weblogic. Maruti Suzuki has built its Enterprise Resource Planning (ERP) system on Oracle E-Business Suite and added Hyperion Enterprise to further enhance financial consolidation and reporting efficiency.” L= 5:30. URL http://www.youtube.com/watch?v=aZWAzbRm-ms CASE “Oracle Corporation (NASDAQ: ORCL) specializes in developing and marketing enterprise software products particularly database management systems. Through organic growth and a number of high-profile acquisitions, Oracle enlarged its share of the software market. By 2007 Oracle ranked third on the list of largest software companies in the world, after Chapter 5 Case 1 Maruti Suzuki Business Intelligence and Enterprise Databases 2 continued Microsoft and IBM. Subsequently it became larger than IBM after its acquisition of Hyperion and BEA. The corporation has arguably become best-known due to association with its flagship Oracle database. The company also builds tools for database development, middle-tier software, enterprise resource planning software (ERP), customer relationship management software (CRM) and supply chain management (SCM) software. The founder and CEO of Oracle Corporation, Larry Ellison, has served as Oracle’s CEO throughout the company’s history. Ellison also served as the Chairman of the Board until his replacement by Jeffrey O. Henley in 2004. Ellison retains his......

Words: 666 - Pages: 3

Laudon 6

...Chaper 4 (Hardware) Review Questions Laudon & Laudon book (2007) | |In which of the following computer categories will you find the highest FLOPS performance? | | | | | |a. Server computer | | |b. desktop computer | | |c. mainframe computer | | |d. Grid computing | | | | | |Answer: d Page Reference: 120 Difficulty: Moderate | | | | | |AACSB: Reflective Thinking | | |Which of the following......

Words: 351 - Pages: 2

Laudon Feature 3

...Chapter 3 Information Systems, Organizations, and Strategy LEARNING OBJECTIVES After reading this chapter, you will be able to: 1. Identify and describe important features of organizations that managers need to know about in order to build and use information systems successfully. 2. Evaluate the impact of information systems on organizations. 3. Demonstrate how Porter’s competitive forces model and the value chain model help businesses use information systems for competitive advantage. 4. Demonstrate how information systems help businesses use synergies, core competencies, and network-based strategies to achieve competitive advantage. 5. Assess the challenges posed by strategic information systems and management solutions. 3.4 CHAPTER OUTLINE 3.1 ORGANIZATIONS AND INFORMATION SYSTEMS What Is an Organization? Features of Organizations HOW INFORMATION SYSTEMS IMPACT ORGANIZATIONS AND BUSINESS FIRMS Economic Impacts Organizational and Behavioral Impacts The Internet and Organizations Implications for the Design and Understanding of Information Systems USING INFORMATION SYSTEMS TO ACHIEVE COMPETITIVE ADVANTAGE Porter’s Competitive Forces Model Information System Strategies for Dealing with Competitive Forces The Internet’s Impact on Competitive Advantage The Business Value Chain Model Synergies, Core Competencies, and Network-Based Strategies USING SYSTEMS FOR COMPETITIVE ADVANTAGE: MANAGEMENT ISSUES Sustaining Competitive Advantage Performing a Strategic Systems......

Words: 19830 - Pages: 80

Chapter 6 Mis Test Bank

...Management Information Systems, 13e (Laudon/Laudon) Chapter 6 Foundations of Business Intelligence: Databases and Information Management 1) A grouping of characters into a word, a group of words, or a complete number is called a record. Answer: FALSE Diff: 1 Page Ref: 211 AACSB: Use of information technology CASE: Content Objective: 6.3 2) Each characteristic or quality describing a particular entity is called an attribute. Answer: TRUE Diff: 1 Page Ref: 211 AACSB: Use of information technology CASE: Content Objective: 6.3 3) Program-data dependence refers to the coupling of data stored in files and software programs that use this data such that changes in programs require changes to the data. Answer: TRUE Diff: 2 Page Ref: 214 AACSB: Use of information technology CASE: Content Objective: 6.1 4) A DBMS separates the logical and physical views of data. Answer: TRUE Diff: 2 Page Ref: 215 AACSB: Use of information technology CASE: Content Objective: 6.2 5) Every record in a file should contain at least one key field. Answer: TRUE Diff: 1 Page Ref: 217 AACSB: Use of information technology CASE: Content Objective: 6.3 6) NoSQL technologies are used to manage sets of data that don't require the flexibility of tables and relations. Answer: TRUE Diff: 1 Page Ref: 217 AACSB: Use of information technology CASE: Content Objective: 6.2 7) Data governance deals with the policies and......

Words: 5114 - Pages: 21

Mis Chapter 10

...Chapter 10 – Assignment (written portion) Chris Marchionni Please read Chapter 10 carefully and complete this written assignment. <Chapter Questions> 1. What is the purpose of this chapter (Chapter 10)? To inform us on how business processes, Information systems, and applications are developed and understand how they relate and differ. Also, it explains how organizations use business process management and the activities associated with it. 2. What is a business process? A business process is a network of activities, repositories, roles, resources, and flows that interact to accomplish a business function. 3. What are activities? Activities are collections of related tasks that receive inputs and produce outputs. 4. What is a repository? A repository is a collection of something; an inventory is a physical repository and a database is a data repository. 5. In a business process, a role refers to collections of activities. 6. What is business process management (BPM)? BPM is a cyclical process for systematically creating, assessing, and altering business processes. 7. Please specify each step in the business process management cycle. Step 1: as-is model Step 2: create components Step 3: implementing new or changed process Step 4: create policy and procedures 8. What is an as-is model? It is a model of the existing business process. 9. The Object Management Group is a software-industry standards organization that created a standard set of...

Words: 852 - Pages: 4

Laudon Ch5

...Management Information Systems MANAGING THE DIGITAL FIRM Kenneth C. Laudon New York University f Jane P. Laudon Azimuth Information Systems PEARSON feerttifie tall Pearson Education International Brief Contents Part One Chapter 1 Chapter 2 Chapter 3 Chapter 4 Part One Project Organizations, Management, and the Networked Enterprise 1 Information Systems in Global Business Today 2 Global E-Business: How Businesses Use Information Systems 38 Information Systems, Organizations, and Strategy 80 Ethical and Social Issues in Information Systems 124 Analyzing Business Processes for an Enterprise System 165 Part Two Chapter 5 Chapter 6 Chapter 7 Chapter 8 Part Two Project Information Technology Infrastructure 167 IT Infrastructure and Emerging Technologies 168 Foundations of Business Intelligence: Databases and Information Management 222 Telecommunications, the Internet, and Wireless Technology 260 Securing Information Systems 312 Creating a New Internet Business 351 Part Three Chapter 9 Chapter 10 Chapter 11 Chapter 12 Part Three Project Key System Applications for the Digital Age 353 Achieving Operational Excellence and Customer Intimacy: Enterprise Applications 354 E-Commerce: Digital Markets, Digital Goods 388 Managing Knowledge 428 Enhancing Decision Making 470 Designing an Enterprise Information Portal 508 Part Four Chapter 13 Chapter 14 Chapter 15 Part Four Project Building and Managing Systems 509 Building Systems 510 Project......

Words: 3508 - Pages: 15

Bank Test Laudon Chapter 1

...Management Information Systems, 12e (Laudon) Chapter 1 Information Systems in Global Business Today 1) Internet advertising is growing at approximately 10 percent a year. Answer: TRUE Diff: 3 Page Ref: 6 AACSB: Reflective Thinking CASE: Content Objective: 1.1 2) Developing a new product, fulfilling an order, and hiring a new employee are examples of business processes. Answer: TRUE Diff: 1 Page Ref: 11 AACSB: Reflective Thinking CASE: Content Objective: 1.3 3) A fully digital firm produces only digital goods or services. Answer: FALSE Diff: 2 Page Ref: 11 AACSB: Reflective Thinking CASE: Content Objective: 1.1 4) A business model describes how a company produces, delivers, and sells a product or service to create wealth. Answer: TRUE Diff: 1 Page Ref: 13 AACSB: Reflective Thinking CASE: Content Objective: 1.3 5) Information technology (IT) consists of all the hardware that a firm needs to use in order to achieve its business objectives, whereas information systems consist of all the software and business processes needed. Answer: FALSE Diff: 2 Page Ref: 15 AACSB: Use of IT CASE: Content Objective: 1.3 6) Computers are only part of an information system. Answer: TRUE Diff: 1 Page Ref: 17 AACSB: Use of IT CASE: Content Objective: 1.3 7) Information systems literacy describes the behavioral approach to information systems, whereas computer literacy describes the technical approach. Answer: ......

Words: 4839 - Pages: 20

Mis 301

...MIS 301 Introduction to Information Technology Management FALL 2010 - Unique Numbers: 03905, 03910, 03915 Instructor tructorBin Gu – bin.gu@mccombs.utexas.edu Dr. Information, Risk, & Operations Management (IROM) Dept. Office CBA 5.228 Office Hours MW 4:00-5:00 pm or by appointment Qian Tang - qian.tang@phd.mccombs.utexas.edu Teaching Assistant CBA 1.308B Office TBD Office Hours Course Description Information technology (IT) has transformed all aspects of 21st century business and everyday life. New IT investments continue to be staggering. Worldwide, over $2.5 trillion is invested in IT. In the U.S., over 50% of capital expenditures are related to IT. Information systems influence business processes, organizational structures, and the ways people do business, work, and communicate. Emerging technologies have triggered new forms of organization and business process innovation; they have also impacted organizational structure, culture, politics, decision making, and society as a whole. IT is transforming how physical products are designed, how services are bundled with products, and how individuals interact with businesses and with other individuals. A silent transformation is occurring as more and more physical products use embedded IT to improve customer experience and product performance. The pervasiveness of IT is expanding global trade and changing how and where work is performed. It is vital that future managers—in every area of business—have a...

Words: 3229 - Pages: 13

Chapter 6

...Chapter 6 ------------------------------------------------- Team Member Roles (Page 134) ------------------------------------------------- The section of chapter 6 talks about the 9 different role theories that can be present in a group setting. This list was developed by R. Meredith Belbin and his team and were created to be seen as an extension of an individual’s personality. Out of the 9 roles that were provided I believe that a group could survive with only 4, the creative problem solver, coordinator, team worker and the specialist. The book defines a role as, “A tendency to behave, contribute, and relate to others in a particular way”. When you combed this with the aspects of what will make a team functional, you could get by with just 4 of the roles because a group will require the collective effort of everyone instead of being a something that could be performed by an individual. With good communication and trust amongst the team anything could be possible. This important in both education and in the work place since both areas rely of the efficient use of their teams to accomplish their goals. ------------------------------------------------- ------------------------------------------------- Work Accomplishment and High Productivity (Page 133) ------------------------------------------------- This area is a key learning point because it gives examples that will help put teamwork into perspective using modern day companies as examples. The main reason......

Words: 757 - Pages: 4

Mis Laudon

...of service attack,“ wrote Stone (Twitter co-found Biz Stone). “Attacks such as this are malicious efforts orchestrated to disrupt and make unavailable services such as online banks, credit card payment gateways, and in this case, Twitter for intended customers or users. We are defending against this attack now and will continue to update our status blog as we continue to defend and later investigate.“ In a denial-of-service attack, a malicious party barrages a server with so many requests that it can’t keep up, or causes it to reset. As a result, legitimate users can only access the server very slowly — or not at all, as appears to be the case here. (www.wired.com, Van Buskirk, Elliott, Denial-of-Service Attack Knocks Twitter Offline, Aug 6, 2009) Computer Crime Computer crime is a growing national and international threat to the continued development of e-business and e-commerce. When the Internet was first created in the late 1960s, the designers intentionally built it to be open and easily accessible. Little did they know 40 years later, that structure would be the very cause of so much crime and vandalism. This table lists the best known examples of computer crime. Identity Theft The fastest growing crime off or on the Internet is identity theft. Even though identity theft is most likely to occur in an offline environment, once your personal information has been stolen its easy to use it in an online environment. There are many precautions people......

Words: 3151 - Pages: 13

Chapter 6

...Chapter 6 - (30 points) 3. If a person consumes fewer units of a good, will marginal utility of the good increase as total utility decreases? Why or why not? Yes, it will, as long as the marginal utility of the units of the good no longer consumed was not negative. To illustrate, suppose the situation is as shown in Exhibit 1a. If the consumer consumes 5 units of good X, total utility is 40 utils and marginal utility is 6 utils. If she consumes one less unit of good X, or 4 units, total utility drops to 34 utils but marginal utility rises to 7 utils. (5 points) 4. If the marginal utility of good A is 4 utils and its price is $2 and the marginal utility of good B is 6 utils and its price is $1, is the individual consumer maximizing (total) utility if she spends a total of $3 buying one unit of each good? If not, how can more utility be obtained? The individual consumer is not maximizing utility. She is receiving 2 utils per dollar spent on good A and 6 utils per dollar spent on good B. She can increase her utility by purchasing more of good B (the good for which she receives more utility per dollar) and less of good A (the good for which she receives less utility per dollar). (5 points) 1. The marginal utility for the third unit of X is 60 utils and the marginal utility for the fourth unit of X is 45 utils. If the law of diminishing marginal utility holds, what is the minimum total utility? We can’t...

Words: 550 - Pages: 3

Chapter 1 Mis

...Management Information Systems Laudon & Laudon Lecture Notes on Management Information Systems (Chapters: 1, 2, 5, and 9) 1. Concepts of MIS/IS 2. What’s New in Management Information Systems? 3. Digital Firm 4. Strategic Business Objectives of Information Systems 5. Information Systems (IS) Vs. Information Technology (IT) 6. Perspectives on Information Systems 7. Information System and its Functions 8. Contemporary Approaches to Information Systems. 9. Dimensions of Information Systems 10. Defining IT infrastructure: 11. Evolution of IT infrastructure 12. The IT Infrastructure Ecosystem 13. Types of Structured Business Information Systems 14. Systems That Span the Enterprise Concepts of MIS/IS: Management Information Systems: MIS means the whole network of systems which support the organization to manage their business affairs. • Many organizations have information systems that are entirely manual. Such systems are a subset of a wider class of systems, computer-based information systems, which rely on information technology as well as humans for their operational functions. IS need not be necessarily computer-based. Management information systems (MIS) deals with behavioral issues as well as technical issues surrounding the development, use, and impact of information systems used by managers and employees in the firm. As such, MIS is defined as the study of......

Words: 6353 - Pages: 26

Air Canada Case by Laudon & Laudon

...Case: AIR CANADA TAKES OFF WITH MAINTENIX Air Canada is Canada's most prominent airline. It is the largest provider of scheduled passenger services in the Canadian market, the Canada-U.S. trans-border market, and in the international market to and from Canada. The airline serves over 33 million customers annually and provides direct passenger service to over 170 destinations on five continents. But the company's information systems had plenty of room for improvement. When Air Canada technicians worked on planes, they used several different legacy software packages installed over the past 15 years. The systems weren't able to interact with one another or with finance and inventory systems. The inefficiencies of these systems were costing Air Canada the time of its engineers and money that could have been used on maintaining its planes, instead of needlessly maintaining excess inventory. Air Canada turned to Mxi Technologies for help in addressing these problems. Mxi is reknowned in the airline industry for its Maintenix software package, which provides integrated, intelligent aviation MRO (maintenance, repair, and operations) software to aviation organizations hoping to improve productivity. The benefits of Maintenix that interested Air Canada were enhanced visibility of fleet-wide data, timelier decision-making; support of its currently existing business model, and increased operational efficiencies. Maintenix provides a system platform that is accessible via the......

Words: 803 - Pages: 4