{"id":94,"date":"2018-06-08T19:13:00","date_gmt":"2018-06-08T19:13:00","guid":{"rendered":"http:\/\/opentextbook.site\/informationsystems\/back-matter\/answers-to-study-questions\/"},"modified":"2018-06-08T21:57:36","modified_gmt":"2018-06-08T21:57:36","slug":"answers-to-study-questions","status":"publish","type":"back-matter","link":"https:\/\/opentextbook.site\/informationsystems\/back-matter\/answers-to-study-questions\/","title":{"rendered":"Answers to Study Questions"},"content":{"raw":"\n<div class=\"__UNKNOWN__\">\n<p><span style=\"line-height: 1.5em\">Chapter 1<\/span><\/p>\n<p>&nbsp;<\/p>\n<p style=\"margin-left: 18.05pt\">1. What are the five components that make up an information system?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. h<\/i><i>ardware, <\/i><i>software, data, people, process<\/i><i> <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">2. What are three examples of information system hardware?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. There are<\/i><i> a <\/i><i>number<\/i><i> of <\/i><i>possible <\/i><i>answers: a PC, a printer, a mouse, tablets, mobile phones<\/i><i>, etc<\/i><i>.<\/i><\/p>\n<p style=\"margin-left: 18.05pt\">3. Microsoft Windows is an example of which component of information systems?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. It is an operating system, which is a part of the software component.<\/i><\/p>\n<p style=\"margin-left: 18.05pt\">4. What is application software?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. Software that does something useful. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">5. What roles do people play in information systems?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. The text includes examples such as helpdesk support, systems analyst, programmer, and CIO. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">6. What is the definition of a process?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. A process is a series of steps undertaken to achieve a desired outcome or goal. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">7. What was invented first, the personal computer or the Internet (ARPANET)?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. The<\/i><i> Internet was activated in 1969;<\/i><i> the personal computer was introduced in 1975. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">8. In what year were restrictions on commercial use of the Internet first lifted? When were eBay and Amazon founded?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. Restrictions were lifted in 1991,<\/i><i> Amazon <\/i><i>was <\/i><i>founded<\/i><i> in 1994, and <\/i><i>eBay<\/i><i> was<\/i><i> founded<\/i><i> in 1995<\/i><i>. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">9. What does it mean to say we are in a \u201cpost-PC world\u201d?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. The personal computer will no longer be the primary way that people interact and do business.<\/i><\/p>\n<p style=\"margin-left: 18.05pt\">10. What is Carr\u2019s main argument about information technology?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. That information technology is just a commodity and cannot be used to gain a competitive advantage. <\/i><\/p>\n<p>&nbsp;<\/p>\n<p>Chapter 2<\/p>\n<p>&nbsp;<\/p>\n<p style=\"margin-left: 18.05pt\">1. Write your own description of what the term <i>information systems hardware<\/i> means.<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. Answers will vary<\/i><i>, but <\/i><i>should say<\/i><i> <\/i><i>something about <\/i><i>information systems hardware<\/i><i> consisting<\/i><i> of the physical parts of computing devices that can actually be touched. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">2. What is the impact of Moore\u2019s Law on the various hardware components described in this chapter?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. The student<\/i><i> should pick one of the components and discuss the impact of the fact that computing <\/i><i>doubles in speed<\/i><i> every two years. Most devices are getting smaller, faster, cheaper, and this should be indicated in the answer. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">3. Write a summary of one of the items linked to in the \u201cIntegrated Computing\u201d section.<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. The student should write a summary of one of the linked articles. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">4. Explain why the personal computer is now considered a commodity.<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. The PC has become a commodity in the sense that there is very little differentiation between computers, and the primary factor that controls their sale is their price. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">5. The CPU can also be thought of as the _____________ of the computer.<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. brain<\/i><\/p>\n<p style=\"margin-left: 18.05pt\">6. List the following in increasing order (slowest to fastest): megahertz, kilohertz, gigahertz.<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. kilohertz, megahertz, gigahertz<\/i><\/p>\n<p style=\"margin-left: 18.05pt\">7. What is the bus of a computer?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. The bus is the electrical connection between different computer components. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">8. Name two differences between RAM and a hard disk.<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. RAM is volatile;<\/i><i> the hard disk is non-volatile. Data access in RAM is faster than on the hard disk. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">9. What are the advantages of solid-state drives over hard disks?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. The main advantage is spe<\/i><i>ed: an SSD has much faster data-<\/i><i>access speeds than a traditional hard disk. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">10. How heavy was the first commercially successful portable computer?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. The Compaq PC was 28 pounds. <\/i><\/p>\n<p>&nbsp;<\/p>\n<p>Chapter 3<\/p>\n<p>&nbsp;<\/p>\n<p style=\"margin-left: 18.05pt\">1. Come up with your own definition of software. Explain the key terms in your definition.<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. A variety of<\/i><i> answers <\/i><i>are <\/i><i>possible, <\/i><i>but <\/i><i>should be similar to <\/i><i>the <\/i><i>definition in <\/i><i>the <\/i><i>text: Software is the set of instructions that tell the hardware what to do. Software is created through the process of programming. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">2. What are the functions of the operating system?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. The<\/i><i> operating system manages the hardware resources of the computer, provides the user-interface components, and provides a platform for software developers to write applications.<\/i><\/p>\n<p style=\"margin-left: 18.05pt\">3. Which of the following are operating systems and which are applications: Microsoft Excel, Google Chrome, iTunes, Windows, Android, Angry Birds.<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. Microsoft Excel (application), Google Chrome (application), iTunes (application), <\/i><i>WIndows<\/i><i> (operating system), Android (operating sys<\/i><i>tem), Angry Birds (application)<\/i><i> <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">4. What is your favorite software application? What tasks does it help you accomplish?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. Students will have various answers to this question. They should pick an application, not an operating system. They should be able to list at least one thing that it helps them accomplish. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">5. What is a \u201ckiller\u201d app? What was the killer app for the PC?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. A killer app is application software that is so useful that people will purchase the hardware just so they can run it. The killer app for the PC was the spreadsheet (<\/i><i>Visicalc<\/i><i>). <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">6. How would you categorize the software that runs on mobile devices? Break down these apps into at least three basic categories and give an example of each.<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. There are various ways to answer this question. Students should identify that there are mobile operating systems and mobile apps. Most likely, <\/i><i>students<\/i><i> will break down mobile apps into multiple categories: games, GPS, reading, communication, etc. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">7. Explain what an ERP system does.<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. An ERP (enterprise resource p<\/i><i>lanning) system is a software application with a centralized database that is implemented across the entire organization.<\/i><\/p>\n<p style=\"margin-left: 18.05pt\">8. What is open-source software? How does it differ from closed-source software? Give an example of each.<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. Open-source software is software that makes the source code available for anyone to copy and use. It is free to download, copy, and distribute. Closed-source software does not make the source code available and generally is not free to download, copy, and distribute. There are <\/i><i>many<\/i><i> examples <\/i><i>of<\/i><i> both, such as: Firefox (open source), Linux (open source), iTunes (closed source), Microsoft Office (closed source). <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">9. What does a software license grant?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. Software licenses are not all the same, but generally the<\/i><i>y<\/i><i> grant the user <\/i><i>the right<\/i><i> to use the software on a limited basis. The terms of the license dictate <\/i><i>users\u2019<\/i><i> rights <\/i><i>in detail<\/i><i>. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">10. How did the Y2K (year 2000) problem affect the sales of ERP systems?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. Organizations purchased ERP software to replace their older systems in order to avoid any problems with the year 2000 in their software. <\/i><\/p>\n<p>&nbsp;<\/p>\n<p>Chapter 4<\/p>\n<p>&nbsp;<\/p>\n<p style=\"margin-left: 18.05pt\">1. What is the difference between data, information, and knowledge?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. Data are the raw bits and pieces of facts and statistics with no context. Data can be quantitative or qualitative. Information is data that has been given context. Knowledge is information that has been aggregated and analyzed and can be used for making decisions. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">2. Explain in your own words how the data component relates to the hardware and software components of information systems.<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. There are <\/i><i>numerous<\/i><i> answers to this question, <\/i><i>but all should be <\/i><i>variations on<\/i><i> the following<\/i><i>: Data is processed by the hardware via software. A database is software that runs on the hardware. Hardware stores the data, software processes the data.<\/i><\/p>\n<p style=\"margin-left: 18.05pt\">3. What is the difference between quantitative data and qualitative data? In what situations could the number 42 be considered qualitative data?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. Quantitative data is numeric, the result of a measurement, count, or some other mathematical calculation. Qualitative data is descriptive. The number 42 could be qualitative if it is a designation instead of a measurement, count, or calculation. For example: that player<\/i><i>\u2019<\/i><i>s jersey has number 42 on it. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">4. What are the characteristics of a relational database?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. A relational database is one in which data is organized into one or more tables. Each table has a set of fields, which define the nature of the data stored in the table. A record is one instance of a set of fields in a table. All the tables are related by one or more fields in common.<\/i><\/p>\n<p style=\"margin-left: 18.05pt\">5. When would using a personal DBMS make sense?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. When working on a smaller database for personal use, or when disconnected from the network. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">6. What is the difference between a spreadsheet and a database? List three differences between them.<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. A database is generally more powerful and complex than a spreadsheet, with the ability to handle multiple types of data and link them together. Some differences: A database has defined field types, a spreadsheet does not. A database uses a standardized query language (such as SQL), a spreadsheet does not. A database can hold much larger amounts of data than a spreadsheet. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">7. Describe what the term <i>normalization<\/i> means.<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. To normalize a database means to design it in a way that: 1) reduces duplication of data between tables and 2) gives the table as much flexibility as possible.<\/i><\/p>\n<p style=\"margin-left: 18.05pt\">8. Why is it important to define the data type of a field when designing a relational database?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. A data type tells the database what functions can be performed with the data. The second important reason to define <\/i><i>the <\/i><i>data type is so that the proper amount of storage space is allocated for <\/i><i>the<\/i><i> data. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">9. Name a database you interact with frequently. What would some of the field names be?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. The student can choose any sort of system that they interact with, such as Amazon or their school<\/i><i>\u2019<\/i><i>s online systems. The fields would be the names of data being collected, such as <\/i><i>\u201c<\/i><i>first name<\/i><i>\u201d<\/i><i>, or <\/i><i>\u201c<\/i><i>address<\/i><i>\u201d<\/i><i>. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">10. What is metadata?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. Metadata is data about data<\/i><i>.<\/i><i> It refers to the data used to describe other data, such as the length of a song in iTunes, which describes the music file. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">11. Name three advantages of using a data warehouse.<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. The text lists the following<\/i><i> <\/i><i>(<\/i><i>the student should pick at least three of these<\/i><i>)<\/i><i>: <\/i><\/p>\n<p style=\"margin-left: 90.05pt\"><i><\/i><i>i. The process of developing a data warehouse forces an organization to better understand the data that it is currently collecting and, equally important, what data is not being collected.<\/i><\/p>\n<p style=\"margin-left: 90.05pt\"><i><\/i><i>ii. A data warehouse provides a centralized view of all data being collected across the enterprise and provides a means <\/i><i>of<\/i><i> determining data that is inconsistent.<\/i><\/p>\n<p style=\"margin-left: 90.05pt\"><i><\/i><i>iii. Once all data is identified as consistent, an organization can generate one version of the truth. This is important when the company wants to report consistent statistics about itself, such as revenue or number of employees.<\/i><\/p>\n<p style=\"margin-left: 90.05pt\"><i><\/i><i>iv. By having a data warehouse, snapshots of data can be taken over time. This creates a historical record of data, which allows for an analysis of trends.<\/i><\/p>\n<p style=\"margin-left: 90.05pt\"><i><\/i><i>v. A data warehouse provides tools to combine data, which can provide new information and analysis.<\/i><\/p>\n<p style=\"margin-left: 18.05pt\">12. What is data mining?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. Data mining is the process of analyzing data to find previously unknown trends, patterns, and associations in order to make decisions. <\/i><\/p>\n<p>&nbsp;<\/p>\n<p>Chapter 5<\/p>\n<p>&nbsp;<\/p>\n<p style=\"margin-left: 18.05pt\">1. What were the first four locations hooked up to the Internet (ARPANET)?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. UCLA, Stanford, <\/i><i>MIT, and the University of Utah<\/i><\/p>\n<p style=\"margin-left: 18.05pt\">2. What does the term <i>packet<\/i> mean?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. The fundamental unit of data transmitted over the Internet. Each packet has the sender<\/i><i>\u2019<\/i><i>s address, the destination address, a sequence number, and a piece of the overall message to be sent.<\/i><\/p>\n<p style=\"margin-left: 18.05pt\">3. Which came first, the Internet or the World Wide Web?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. t<\/i><i>he Internet<\/i><\/p>\n<p style=\"margin-left: 18.05pt\">4. What was revolutionary about Web 2.0?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. Anyone could post content to the web, without the need for understanding HTML or web-server technology.<\/i><\/p>\n<p style=\"margin-left: 18.05pt\">5. What was the so-called killer app for the Internet?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. e<\/i><i>lectronic mail (e-<\/i><i>mail)<\/i><\/p>\n<p style=\"margin-left: 18.05pt\">6. What makes a connection a <i>broadband<\/i> connection?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. A broadband connection is defined as one that has speeds of at least 256,000 bps.<\/i><\/p>\n<p style=\"margin-left: 18.05pt\">7. What does the term VoIP mean?<\/p>\n<p style=\"margin-left: 54.05pt\">a. Voice over Internet protocol \u2013 a way to have voice conversations over the Internet.<\/p>\n<p style=\"margin-left: 18.05pt\">8. What is an LAN?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. A<\/i><i>n<\/i><i> LAN is a local network, usually operating in the same building or on the same campus. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">9. What is the difference between an intranet and an extranet?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. An intranet consists of t<\/i><i>he set of web pages and resources availab<\/i><i>le on a<\/i><i> company\u2019s internal network.<\/i><i> These items are not available to those outside of the company. An extranet<\/i><i> <\/i><i>is<\/i><i>&nbsp;a part of the company's network that <\/i><i>is<\/i><i> made available securely to those outside of the company. Extranets can be used to allow customers to log in and check the status of their orders, or for suppliers to check their customers' inventory levels.<\/i><\/p>\n<p style=\"margin-left: 18.05pt\">10. What is Metcalfe\u2019s Law?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. Metcalfe\u2019s Law states that the value of a telecommunications network is proportional to the square of the number of connected users of the system.<\/i><\/p>\n<p>&nbsp;<\/p>\n<p>Chapter 6<\/p>\n<p>&nbsp;<\/p>\n<p style=\"margin-left: 18.05pt\">1. Briefly define each of the three members of the information security triad.<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. T<\/i><i>he three members are as follows:<\/i><\/p>\n<p style=\"margin-left: 90pt\"><i><\/i><i>i. Confidentiality: we want to be able to restrict access to those who are allowed to see <\/i><i>given information.<\/i><i> <\/i><\/p>\n<p style=\"margin-left: 90pt\"><i><\/i><i>ii. Integrity: the assurance that the information being accessed has not been altered and tr<\/i><i>uly represents what is intended.<\/i><i> <\/i><\/p>\n<p style=\"margin-left: 90pt\"><i><\/i><i>iii. Availability: information can be accessed and modified by anyone authorized to do so in an appropriate timeframe.<\/i><\/p>\n<p style=\"margin-left: 18.05pt\">2. What does the term <i>authentication<\/i>&nbsp;mean?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. The process of ensuring that a person is <\/i><i>who<\/i><i> <\/i><i>he or she<\/i><i> claim<\/i><i>s<\/i><i> to be. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">3. What is multi-factor authentication?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. The use of more than one method of authentication. The methods are: something you know, something you have, and something you are. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">4. What is role-based access control?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. With role-based <\/i><i>access control (RBAC), instead of giving specific users access rights to an information resource, users are assigned to roles and then those roles are assigned the access. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">5. What is the purpose of encryption?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. To keep <\/i><i>transmitted <\/i><i>data secret so that only those with the proper key can read it. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">6. What are two good examples of a complex password?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. There are many examples of this. Students need to provide examples of passwords that are a minimum of eight characters, <\/i><i>with<\/i><i> at least one upper-case letter, one special character, and one number. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">7. What is pretexting?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. Pretexting occurs when an attacker calls a helpdesk or security administrator <\/i><i>and pretends<\/i><i> to be a particular <\/i><i>authorized user<\/i><i> having trouble logging in<\/i><i>. <\/i><i>Then, by providing some personal information about <\/i><i>the authorized user<\/i><i>, <\/i><i>the attacker<\/i><i> convince<\/i><i>s<\/i><i> the <\/i><i>security <\/i><i>person to reset the password and <\/i><i>tell him what it is<\/i><i>.<\/i><\/p>\n<p style=\"margin-left: 18.05pt\">8. What are the components of a good backup plan?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. Knowing what needs to be backed up, regular backups of all data<\/i><i>, offsite storage of all backed-<\/i><i>up data, and a test of the restoration process. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">9. What is a firewall?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. A firewall can be either a hardware firewall or a software firewall. A hardware firewall is a device that is connected to the network and filters the packets based on a set of rules. A software firewall runs on the operating system and intercepts packets as they arrive to a computer.<\/i><\/p>\n<p style=\"margin-left: 18.05pt\">10. What does the term <i>physical security<\/i> mean?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. Physical security is the protection of the actual hardware and networking components that store and transmit information resources.<\/i><\/p>\n<p>Chapter 7<\/p>\n<p>&nbsp;<\/p>\n<p style=\"margin-left: 18.05pt\">1. What is the productivity paradox?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. The productivity paradox is <\/i><i>based on <\/i><i>Erik <\/i><i>Brynjolfsson\u2019s<\/i><i> <\/i><i>finding<\/i><i>, based on research he conducted in the early 1990s, <\/i><i>that the addition of information technology to business<\/i><i> had not improved productivity at all.<\/i><\/p>\n<p style=\"margin-left: 18.05pt\">2. Summarize Carr\u2019s argument in \u201cDoes IT Matter.\u201d<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. Information technology is now a commodity and cannot be used to provide an organization with competitive advantage. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">3. How is the 2008 study by Brynjolfsson and McAfee different from previous studies? How is it the same?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. It is different because it shows that IT can bring a competitive advantage, given the right conditions. It is the same in <\/i><i>the sense <\/i><i>that it shows that IT, by itself, does not bring competitive advantage. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">4. What does it mean for a business to have a competitive advantage?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. A company is said to have a competitive advantage over its rivals when it is able to sustain profits that exceed average for the industry. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">5. What are the primary activities and support activities of the value chain?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. The primary <\/i><i>activities<\/i><i> are <\/i><i>those<\/i><i> that directly impact the creation of a product or service. The support <\/i><i>activities<\/i><i> are <\/i><i>those<\/i><i> that support the primary activities. Primary: inbound logistics, operations, outbound logistics, sales\/marketing, and service. Support: firm infrastructure, human resources, technology development, <\/i><i>and procurement<\/i><i>. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">6. What has been the overall impact of the Internet on industry profitability? Who has been the true winner?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. The overall impact <\/i><i>has been<\/i><i> a reduction in average industry profitability. The consumer has been the true winner. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">7. How does EDI work?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. EDI is the computer-to-computer exchange of business documents in a standard electronic format between business partners.<\/i><\/p>\n<p style=\"margin-left: 18.05pt\">8. Give an example of a semi-structured decision and explain what inputs would be necessary to provide assistance in making the decision.<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. A semi-structured decision is one in which most of the factors needed for making the decision are known but human experience and other outside factors may still play a role. The student should provide an example of a decision that uses an information system to provide information but is not made by the system. Examples would include: budgeting decisions, diagnosing a medical condition, and investment decisions. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">9. What does a collaborative information system do?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. A collaborative system is software that allows multiple users to interact on a document or topic in order to complete a task or make a decision.<\/i><\/p>\n<p style=\"margin-left: 18.05pt\">10. How can IT play a role in competitive advantage, according to the 2008 article by Brynjolfsson and McAfee?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. The article suggests that <\/i><i>IT can influence competitive advantage when <\/i><i>good management develops and delivers <\/i><i>IT-supported <\/i><i>process <\/i><i>innovation<\/i><i>.<\/i><\/p>\n<p>&nbsp;<\/p>\n<p>Chapter 8<\/p>\n<p>&nbsp;<\/p>\n<p style=\"margin-left: 18.05pt\">1. What does the term <i>business process<\/i> mean?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. A process is a series of tasks that are completed in order to accomplish a goal. A business process, therefore, is a process that is focused on achieving a goal for a business. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">2. What are three examples of business process from a job you have had or an organization you have observed?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. Students can answer this in almost any way. The examples should consist of more than a single step. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">3. What is the value in documenting a business process?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. There are many answers to this. From the text: it allows for better control of the process<\/i><i>,<\/i><i> and <\/i><i>for <\/i><i>standardization. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">4. What is an ERP system? How does an ERP system enforce best practices for an organization?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. An ERP (enterprise resource p<\/i><i>lanning) system is a software application with a centralized database that is implemented across the entire organization. It enforces best practices through the business processes embedded in the software. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">5. What is one of the criticisms of ERP systems?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. ERP system<\/i><i>s<\/i><i> can lead to the commoditization of business processes, meaning that every company that uses an ERP <\/i><i>system <\/i><i>will perform business processes the same way. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">6. What is business process reengineering? How is it different from incrementally improving a process?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. Business process r<\/i><i>eengineering (BPR) occurs when a business process is redesigned from the ground up. It is different from incrementally improving a process <\/i><i>in that<\/i><i> it does not simply take the existing process and modify it. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">7. Why did BPR get a bad name?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. BPR became an excuse to lay<\/i><i> <\/i><i>off employees and try to complete the same amount of work using fewer employees. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">8. List the guidelines for redesigning a business process.<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. The guidelin<\/i><i>es are as follows:<\/i><i> <\/i><\/p>\n<p style=\"margin-left: 90.05pt\"><i><\/i><i>i. Organize around outcomes, not tasks. <\/i><\/p>\n<p style=\"margin-left: 90.05pt\"><i><\/i><i>ii. Have those who use the outcomes of the process perform the process.<\/i><\/p>\n<p style=\"margin-left: 90.05pt\"><i><\/i><i>iii. Subsume information-processing work into the real work that produces the information. Treat geographically dispersed resources as though they were centralized.<\/i><\/p>\n<p style=\"margin-left: 90.05pt\"><i><\/i><i>iv. Link parallel activities instead of integrating their results. <\/i><\/p>\n<p style=\"margin-left: 90.05pt\"><i><\/i><i>v. Put the decision points where the work is performed, and build controls into the process. <\/i><\/p>\n<p style=\"margin-left: 90.05pt\"><i><\/i><i>vi. Capture information once, at the source. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">9. What is business process management? What role does it play in allowing a company to differentiate itself?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. Business process management (BPM) can be thought of as an intentional effort to plan, document, implement, and distribute an organization<\/i><i>\u2019<\/i><i>s business processes with the support of information technology. It can play a role in differentiation <\/i><i>through built-in reporting, and <\/i><i>by empowering employees, enforcing best practices, <\/i><i>and <\/i><i>enforcing consistency. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">10. What does ISO certification signify?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. ISO certification shows that you know what you do, do what you say, and have documented your processes. <\/i><\/p>\n<p>&nbsp;<\/p>\n<p>Chapter 9<\/p>\n<p>&nbsp;<\/p>\n<p style=\"margin-left: 18.05pt\">1. Describe the role of a systems analyst.<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. To understand business requirements and translate them into the requirements <\/i><i>of<\/i><i> an information system. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">2. What are some of the different roles for a computer engineer?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. hardware engineer, software engineer, net<\/i><i>work engineer, systems engineer<\/i><i> <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">3. What are the duties of a computer operator?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. D<\/i><i>uties include keeping the operating systems up to date, ensuring available memory and disk storage, and overseeing the physical environment of the computer. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">4. What does the CIO do?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. The CI<\/i><i>O aligns the plans and operations of the information systems with the strategic goals of the organization. This includes tasks such as budgeting, strategic planning, and personnel decisions <\/i><i>relevant to<\/i><i> the information-systems function. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">5. Describe the job of a project manager.<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. A project manager is responsible for keeping projects on time and on budget. This person works with the stakeholders of the project to keep the team organized and communicates the status of the project to management. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">6. Explain the point of having two different career paths in information systems.<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. To allow for career growth for those who do not want to manage other employees but instead want to focus on technical skills. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">7. What are the advantages and disadvantages of centralizing the IT function?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. There are several possible answers here. Advantages <\/i><i>of<\/i><i> centralizing include more control over the company\u2019s systems and data. Disadvantages include a more limited availability of IT resources. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">8. What impact has information technology had on the way companies are organized?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. The organizational structure has been flattened, with fewer layers of management. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">9. What are the five types of information-systems users?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. i<\/i><i>nnovators, early adopters, early majo<\/i><i>rity, late majority, laggards<\/i><i> <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">10. Why would an organization outsource?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. Because it needs<\/i><i> a specific ski<\/i><i>ll for a limited amount of time, <\/i><i>and\/<\/i><i>or because it can cut costs by outsourcing. <\/i><i> <\/i><\/p>\n<p>&nbsp;<\/p>\n<p>Chapter 10<\/p>\n<p>&nbsp;<\/p>\n<p style=\"margin-left: 18.05pt\">1. What are the steps in the SDLC methodology?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. The steps are Preliminary Analysis, System Analysis, System Design, Programming, Testing, Implementation, and Maintenance.<\/i><\/p>\n<p style=\"margin-left: 18.05pt\">2. What is RAD software development?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. Rapid application development (RAD) is a software-development (or systems-development) methodology that focuses on quickly building a working model of the software, getting feedback from users, and then using that feedback to update the working model.<\/i><\/p>\n<p style=\"margin-left: 18.05pt\">3. What makes the lean methodology unique?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. The biggest difference between the lean methodology and the other methodologies is that the full set of requirements for the <\/i><i>system is<\/i><i> not known when the project is launched. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">4. What are three differences between second-generation and third-generation languages?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. Three k<\/i><i>ey differences are as follows:<\/i><\/p>\n<p style=\"margin-left: 90.05pt\"><i><\/i><i>i. The words used in the language: third generation languages use more <\/i><i>English<\/i><i>-like words than second-generation languages.<\/i><\/p>\n<p style=\"margin-left: 90.05pt\"><i><\/i><i>ii. Hardware specificity: third generation languages are not specific to hardware, second-generation languages are. <\/i><\/p>\n<p style=\"margin-left: 90.05pt\"><i><\/i><i>iii. Learning curve: third generation languages are easier to learn and use.<\/i><\/p>\n<p style=\"margin-left: 18.05pt\">5. Why would an organization consider building its own software application if it is cheaper to buy one?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. They may wish to build their own in order t<\/i><i>o have something that is unique (<\/i><i>d<\/i><i>ifferent from their competitors),<\/i><i> <\/i><i>and\/or <\/i><i>something that more closely matches their business processes. They also may choose to do this if they have more time <\/i><i>and\/<\/i><i>or more money available to do it. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">6. What is responsive design?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. Responsive design is a method <\/i><i>of<\/i><i> developing <\/i><i>websites <\/i><i>that allows <\/i><i>them<\/i><i> to be viewed on many different types of devices without losing capability or effectiveness. With a responsive website, images resize themselves based on the size of the device<\/i><i>\u2019<\/i><i>s screen, and text flows and sizes itself properly for optimal viewing.<\/i><\/p>\n<p style=\"margin-left: 18.05pt\">7. What is the relationship between HTML and CSS in website design?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. While HTML is used to define the components of a web page, cascading style sheets (CSS) are used to define the styles of the components on a page. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">8. What is the difference between the pilot implementation methodology and the parallel implementation methodology?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. The pilot methodology implement<\/i><i>s<\/i><i> new software for just one group of people while the rest of the users use the previous version of the software. The parallel implementation methodology use<\/i><i>s<\/i><i> both the old and the new applications at the same time. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">9. What is change management?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. The oversight of the changes brought about in an organization. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">10. What are the four different implementation methodologies?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. d<\/i><i>irect c<\/i><i>utover, pilot, parallel, phased<\/i><\/p>\n<p>&nbsp;<\/p>\n<p>Chapter 11<\/p>\n<p>&nbsp;<\/p>\n<p style=\"margin-left: 18.05pt\">1. What does the term <i>globalization<\/i> mean?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><em>a.<\/em> Globalization<i> refer<\/i><i>s<\/i><i> to the integration of goods, services, and culture<\/i><i>s<\/i><i> among the nations of the world.<\/i><\/p>\n<p style=\"margin-left: 18.05pt\">2. How does Friedman define the three eras of globalization?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. The three eras are as follows:<\/i><i> <\/i><\/p>\n<p style=\"margin-left: 90.05pt\"><i><\/i><i>i. \u201c<\/i><i>Globalization 1.0<\/i><i>\u201d<\/i><i> occurred from 1492 until about 1800. In this era, globalization was centered around countries. It was about how much horsepower, wind power, and steam power a country had and how creatively it was deployed. The world shrank from size <\/i><i>\u201c<\/i><i>large<\/i><i>\u201d<\/i><i> to size <\/i><i>\u201c<\/i><i>medium.<\/i><i>\u201d<\/i><\/p>\n<p style=\"margin-left: 90.05pt\"><i><\/i><i>ii. \u201c<\/i><i>Globalization 2.0<\/i><i>\u201d<\/i><i> occurred from about 1800 until 2000, interrupted only by the two World Wars. In this era, the dynamic force driving change was <\/i><i>comprised of <\/i><i>multinational companies. The world shrank from size <\/i><i>\u201c<\/i><i>medium<\/i><i>\u201d<\/i><i> to size <\/i><i>\u201c<\/i><i>small.<\/i><i>\u201d<\/i><\/p>\n<p style=\"margin-left: 90.05pt\"><i><\/i><i>iii. \u201c<\/i><i>Globalization 3.0<\/i><i>\u201d<\/i><i> is our current era, beginning in the year 2000. The convergence of the personal computer, fiber-optic Internet connections, and software has created a <\/i><i>\u201c<\/i><i>flat-world platform<\/i><i>\u201d<\/i><i> that allows small groups and even individuals to go global. The world has shrunk from size <\/i><i>\u201c<\/i><i>small<\/i><i>\u201d<\/i><i> to size <\/i><i>\u201c<\/i><i>tiny.<\/i><i>\u201d<\/i><\/p>\n<p style=\"margin-left: 18.05pt\">3. Which technologies have had the biggest effect on globalization?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. There are several answers to this. Probably the most obvious are the Internet, the graphical interface of <\/i><i>Windows<\/i><i> and the World Wide Web, and workflow software. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">4. What are some of the advantages brought about by globalization?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. Advantages include the ability to locate expertise and labor around the world, the ability to operate 24 hours a day, and a larger market for products.<\/i><\/p>\n<p style=\"margin-left: 18.05pt\">5. What are the challenges of globalization?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. Challenges include infrastructure differences, labor laws and regulations, legal restrictions, <\/i><i>and <\/i><i>differe<\/i><i>nt languages, customs,<\/i><i> and preferences.<\/i><\/p>\n<p style=\"margin-left: 18.05pt\">6. What does the term <i>digital divide<\/i> mean?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. The separation betwe<\/i><i>en those who have access to the<\/i><i> global network and those who do not. The digital divide can occur between countries, regions, or even neighborhoods. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">7. What are Jakob Nielsen\u2019s three stages of the digital divide?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. e<\/i><i>cono<\/i><i>mic, usability, and empowerment<\/i><i> <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">8. What was one of the key points of <i>The Rise of the Network Society<\/i>?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. There are two key points <\/i><i>to<\/i><i> choose from. <\/i><i>One <\/i><i>is<\/i><i> that economic activity <\/i><i>was, when the book was published in <\/i><i>1996,<\/i><i> being organized around the networks that the new tel<\/i><i>ecommunication technologies had<\/i><i> provided. <\/i><i>The other<\/i><i> is that this new, global economic activity was different from the past, because <\/i><i>\u201c<\/i><i>it is an economy with the capacity to work as a unit in real time on a planetary scale.<\/i><i>\u201d<\/i><\/p>\n<p style=\"margin-left: 18.05pt\">9. Which country has the highest average Internet speed? How does your country compare?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. According to the chart in the chapter, South Korea has the highest Internet speeds. <\/i><i>S<\/i><i>tudent<\/i><i>s<\/i><i> will need to look up their own to compare. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">10. What is the OLPC project? Has it been successful?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. One Laptop Per Child. By most measures, <\/i><i>it<\/i><i> has not been a successful program. <\/i><\/p>\n<p>&nbsp;<\/p>\n<p>Chapter 12<\/p>\n<p>&nbsp;<\/p>\n<p style=\"margin-left: 18.05pt\">1. What does the term <i>information systems ethics<\/i> mean?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. There are <\/i><i>various ways of <\/i><i>answering<\/i><i> this<\/i><i> question<\/i><i>, but <\/i><i>the answer<\/i><i> should include s<\/i><i>omething about the application of ethics to the new capabilities and cultural norms brought about by information technology. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">2. What is a code of ethics? What is one advantage and one disadvantage of a code of ethics?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. A code of ethics is a document that outlines a set of acceptable behaviors for a professional or social group.<\/i><i> <\/i><i>A<\/i><i>nswers may differ for the second part, but from the text: o<\/i><i>ne advantage of a code of ethics is that it <\/i><i>clarifies the acceptable standards of <\/i><i>behavior for a professional group.<\/i><i> One disadvantage is that it does not necessarily have legal authority. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">3. What does the term <i>intellectual property<\/i> mean? Give an example.<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. Intellectual property is defined as <\/i><i>\u201c<\/i><i>property (as an idea, invention, or process) that derives from the work of the mind or intellect.<\/i><i>\u201d<\/i><\/p>\n<p style=\"margin-left: 18.05pt\">4. What protections are provided by a copyright? How do you obtain one?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. Copyright<\/i><i> protections <\/i><i>address the following<\/i><i>: who can make copies of the work, who can make derivative works from the original work, who can perform the work publicly, who can display the work publicly, and who can distribute the work. You obtain a copyright as soon as the work is put into tangible form.<\/i><\/p>\n<p style=\"margin-left: 18.05pt\">5. What is fair use?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. Fair use is a limitation on copyright law that allows for the use of protected works without prior authorization in specific cases. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">6. What protections are provided by a patent? How do you obtain one?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. Once a patent is granted, it provides the inventor with protection from others infringing on <\/i><i>the<\/i><i> patent. In the US, a patent holder has the right to <\/i><i>\u201c<\/i><i>exclude others from making, using, offering for sale, or selling the invention throughout the United States or importing the invention into the United States for a limited time in exchange for public disclosure of the invention when the patent is granted.<\/i><i>\u201d<\/i><i> You obtain a patent by filing an application with the patent office. A patent will be granted if the work is deemed to be original, useful, and non-obvious. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">7. What does a trademark protect? How do you obtain one?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. A trademark protects a word, phrase, logo, shape<\/i><i>,<\/i><i> or sound that identifies a source of goods or services. You can obtain one by registering with the Patent and Trademark Office (US). There is also a <\/i><i>common-<\/i><i>law trademark. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">8. What does the term <i>per<\/i><i>sonally identifiable<\/i><i> information<\/i> mean?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. Information about a person that can be used to uniquely<\/i><i> establish that person<\/i><i>\u2019<\/i><i>s identit<\/i><i>y is called personally identifiable information, or PII. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">9. What protections are provided by HIPAA, COPPA, and FERPA?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. The a<\/i><i>nswers<\/i><i> are as follows<\/i><i>: <\/i><\/p>\n<p style=\"margin-left: 90.05pt\"><i><\/i><i>i. HIPAA: <\/i><i>protects <\/i><i>records related to health care as a special class of personally identifiable information. <\/i><\/p>\n<p style=\"margin-left: 90.05pt\"><i><\/i><i>ii. COPPA: <\/i><i>protects <\/i><i>information <\/i><i>collected from<\/i><i> children under the age of thirteen.<\/i><\/p>\n<p style=\"margin-left: 90.05pt\"><i><\/i><i>iii. FERPA: <\/i><i>protects <\/i><i>student educational records.<\/i><\/p>\n<p style=\"margin-left: 18.05pt\">10. How would you explain the concept of NORA?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. There are various ways to answer this. <\/i><i>The basic answer is that NORA (non-obvious relationship a<\/i><i>wareness) is the process of collecting large quantities of a variety of information and then combining it to create profiles of individuals.<\/i><\/p>\n<p>&nbsp;<\/p>\n<p>Chapter 13<\/p>\n<p>&nbsp;<\/p>\n<p style=\"margin-left: 18.05pt\">1. Which countries are the biggest users of the Internet? Social media? Mobile?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. S<\/i><i>tudents will need to look outside the text for this, as it changes all the time. There are also different ways of measurement: number of users, % of <\/i><i>population<\/i><i>, most <\/i><i>active users, etc. Some good sites to use are <\/i><a class=\"rId6\" href=\"http:\/\/www.internetworldstats.com\/stats.htm\"><i>Internet World Stats<\/i><\/a><i>, <\/i><a class=\"rId7\" href=\"http:\/\/blog.kissmetrics.com\/facebook-statistics\/\"><i>Kissmetrics<\/i><\/a><i>, and the <\/i><a class=\"rId8\" href=\"http:\/\/data.worldbank.org\/indicator\/IT.CEL.SETS.P2\"><i>World Bank<\/i><\/a><i>.<\/i><\/p>\n<p style=\"margin-left: 18.05pt\">2. Which country had the largest Internet growth (in %) between 2008 and 2012?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. Iran, at 205%<\/i><\/p>\n<p style=\"margin-left: 18.05pt\">3. How will most people connect to the Internet in the future?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. via mobile devices<\/i><i> <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">4. What are two different applications of wearable technologies?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. There are many answers to this question;<\/i><i> <\/i><i>two examples are Google Glass and<\/i><i> Jawbone UP.<\/i><\/p>\n<p style=\"margin-left: 18.05pt\">5. What are two different applications of collaborative technologies?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. There <\/i><i>are many answers to this; two examples are<\/i><i> software that routes us to our destination <\/i><i>in the shortest amount of time<\/i><i>, <\/i><i>and <\/i><i>websites that review different companies. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">6. What capabilities do printable technologies have?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. Using 3-D printers, designers can quickly test prototypes or build something as a proof of concept. <\/i><i>Printable technologies<\/i> <i>also make<\/i><i> it possible to bring manufacturing to the desktop computer. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">7. How will advances in wireless technologies and sensors make objects \"findable\"?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. Advances in wireless technologies and sensors will allow physical objects to send and receive data about themselves. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">8. What is enhanced situational awareness?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. Data from large numbers of sensors can give decision makers a heightened awareness of real-time events, particularly when the sensors are used with advanced display or visualization technologies.<\/i><\/p>\n<p style=\"margin-left: 18.05pt\">9. What is a nanobot?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. A nanobot is a robot whose components are on the scale of about a nanometer.<\/i><\/p>\n<p style=\"margin-left: 18.05pt\">10. What is a UAV?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. An unmanned aerial vehicle<\/i><i> <\/i><i>\u2013 <\/i><i>a small airplane or helicopter that can fly without a pilot. <\/i><i>UAVs<\/i><i> are run by computer or <\/i><i>remote control<\/i><i>.<\/i><\/p>\n<p>&nbsp;<\/p>\n<\/div>\n\n","rendered":"<div class=\"__UNKNOWN__\">\n<p><span style=\"line-height: 1.5em\">Chapter 1<\/span><\/p>\n<p>&nbsp;<\/p>\n<p style=\"margin-left: 18.05pt\">1. What are the five components that make up an information system?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. h<\/i><i>ardware, <\/i><i>software, data, people, process<\/i><i> <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">2. What are three examples of information system hardware?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. There are<\/i><i> a <\/i><i>number<\/i><i> of <\/i><i>possible <\/i><i>answers: a PC, a printer, a mouse, tablets, mobile phones<\/i><i>, etc<\/i><i>.<\/i><\/p>\n<p style=\"margin-left: 18.05pt\">3. Microsoft Windows is an example of which component of information systems?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. It is an operating system, which is a part of the software component.<\/i><\/p>\n<p style=\"margin-left: 18.05pt\">4. What is application software?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. Software that does something useful. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">5. What roles do people play in information systems?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. The text includes examples such as helpdesk support, systems analyst, programmer, and CIO. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">6. What is the definition of a process?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. A process is a series of steps undertaken to achieve a desired outcome or goal. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">7. What was invented first, the personal computer or the Internet (ARPANET)?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. The<\/i><i> Internet was activated in 1969;<\/i><i> the personal computer was introduced in 1975. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">8. In what year were restrictions on commercial use of the Internet first lifted? When were eBay and Amazon founded?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. Restrictions were lifted in 1991,<\/i><i> Amazon <\/i><i>was <\/i><i>founded<\/i><i> in 1994, and <\/i><i>eBay<\/i><i> was<\/i><i> founded<\/i><i> in 1995<\/i><i>. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">9. What does it mean to say we are in a \u201cpost-PC world\u201d?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. The personal computer will no longer be the primary way that people interact and do business.<\/i><\/p>\n<p style=\"margin-left: 18.05pt\">10. What is Carr\u2019s main argument about information technology?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. That information technology is just a commodity and cannot be used to gain a competitive advantage. <\/i><\/p>\n<p>&nbsp;<\/p>\n<p>Chapter 2<\/p>\n<p>&nbsp;<\/p>\n<p style=\"margin-left: 18.05pt\">1. Write your own description of what the term <i>information systems hardware<\/i> means.<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. Answers will vary<\/i><i>, but <\/i><i>should say<\/i><i> <\/i><i>something about <\/i><i>information systems hardware<\/i><i> consisting<\/i><i> of the physical parts of computing devices that can actually be touched. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">2. What is the impact of Moore\u2019s Law on the various hardware components described in this chapter?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. The student<\/i><i> should pick one of the components and discuss the impact of the fact that computing <\/i><i>doubles in speed<\/i><i> every two years. Most devices are getting smaller, faster, cheaper, and this should be indicated in the answer. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">3. Write a summary of one of the items linked to in the \u201cIntegrated Computing\u201d section.<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. The student should write a summary of one of the linked articles. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">4. Explain why the personal computer is now considered a commodity.<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. The PC has become a commodity in the sense that there is very little differentiation between computers, and the primary factor that controls their sale is their price. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">5. The CPU can also be thought of as the _____________ of the computer.<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. brain<\/i><\/p>\n<p style=\"margin-left: 18.05pt\">6. List the following in increasing order (slowest to fastest): megahertz, kilohertz, gigahertz.<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. kilohertz, megahertz, gigahertz<\/i><\/p>\n<p style=\"margin-left: 18.05pt\">7. What is the bus of a computer?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. The bus is the electrical connection between different computer components. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">8. Name two differences between RAM and a hard disk.<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. RAM is volatile;<\/i><i> the hard disk is non-volatile. Data access in RAM is faster than on the hard disk. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">9. What are the advantages of solid-state drives over hard disks?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. The main advantage is spe<\/i><i>ed: an SSD has much faster data-<\/i><i>access speeds than a traditional hard disk. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">10. How heavy was the first commercially successful portable computer?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. The Compaq PC was 28 pounds. <\/i><\/p>\n<p>&nbsp;<\/p>\n<p>Chapter 3<\/p>\n<p>&nbsp;<\/p>\n<p style=\"margin-left: 18.05pt\">1. Come up with your own definition of software. Explain the key terms in your definition.<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. A variety of<\/i><i> answers <\/i><i>are <\/i><i>possible, <\/i><i>but <\/i><i>should be similar to <\/i><i>the <\/i><i>definition in <\/i><i>the <\/i><i>text: Software is the set of instructions that tell the hardware what to do. Software is created through the process of programming. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">2. What are the functions of the operating system?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. The<\/i><i> operating system manages the hardware resources of the computer, provides the user-interface components, and provides a platform for software developers to write applications.<\/i><\/p>\n<p style=\"margin-left: 18.05pt\">3. Which of the following are operating systems and which are applications: Microsoft Excel, Google Chrome, iTunes, Windows, Android, Angry Birds.<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. Microsoft Excel (application), Google Chrome (application), iTunes (application), <\/i><i>WIndows<\/i><i> (operating system), Android (operating sys<\/i><i>tem), Angry Birds (application)<\/i><i> <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">4. What is your favorite software application? What tasks does it help you accomplish?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. Students will have various answers to this question. They should pick an application, not an operating system. They should be able to list at least one thing that it helps them accomplish. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">5. What is a \u201ckiller\u201d app? What was the killer app for the PC?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. A killer app is application software that is so useful that people will purchase the hardware just so they can run it. The killer app for the PC was the spreadsheet (<\/i><i>Visicalc<\/i><i>). <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">6. How would you categorize the software that runs on mobile devices? Break down these apps into at least three basic categories and give an example of each.<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. There are various ways to answer this question. Students should identify that there are mobile operating systems and mobile apps. Most likely, <\/i><i>students<\/i><i> will break down mobile apps into multiple categories: games, GPS, reading, communication, etc. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">7. Explain what an ERP system does.<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. An ERP (enterprise resource p<\/i><i>lanning) system is a software application with a centralized database that is implemented across the entire organization.<\/i><\/p>\n<p style=\"margin-left: 18.05pt\">8. What is open-source software? How does it differ from closed-source software? Give an example of each.<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. Open-source software is software that makes the source code available for anyone to copy and use. It is free to download, copy, and distribute. Closed-source software does not make the source code available and generally is not free to download, copy, and distribute. There are <\/i><i>many<\/i><i> examples <\/i><i>of<\/i><i> both, such as: Firefox (open source), Linux (open source), iTunes (closed source), Microsoft Office (closed source). <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">9. What does a software license grant?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. Software licenses are not all the same, but generally the<\/i><i>y<\/i><i> grant the user <\/i><i>the right<\/i><i> to use the software on a limited basis. The terms of the license dictate <\/i><i>users\u2019<\/i><i> rights <\/i><i>in detail<\/i><i>. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">10. How did the Y2K (year 2000) problem affect the sales of ERP systems?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. Organizations purchased ERP software to replace their older systems in order to avoid any problems with the year 2000 in their software. <\/i><\/p>\n<p>&nbsp;<\/p>\n<p>Chapter 4<\/p>\n<p>&nbsp;<\/p>\n<p style=\"margin-left: 18.05pt\">1. What is the difference between data, information, and knowledge?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. Data are the raw bits and pieces of facts and statistics with no context. Data can be quantitative or qualitative. Information is data that has been given context. Knowledge is information that has been aggregated and analyzed and can be used for making decisions. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">2. Explain in your own words how the data component relates to the hardware and software components of information systems.<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. There are <\/i><i>numerous<\/i><i> answers to this question, <\/i><i>but all should be <\/i><i>variations on<\/i><i> the following<\/i><i>: Data is processed by the hardware via software. A database is software that runs on the hardware. Hardware stores the data, software processes the data.<\/i><\/p>\n<p style=\"margin-left: 18.05pt\">3. What is the difference between quantitative data and qualitative data? In what situations could the number 42 be considered qualitative data?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. Quantitative data is numeric, the result of a measurement, count, or some other mathematical calculation. Qualitative data is descriptive. The number 42 could be qualitative if it is a designation instead of a measurement, count, or calculation. For example: that player<\/i><i>\u2019<\/i><i>s jersey has number 42 on it. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">4. What are the characteristics of a relational database?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. A relational database is one in which data is organized into one or more tables. Each table has a set of fields, which define the nature of the data stored in the table. A record is one instance of a set of fields in a table. All the tables are related by one or more fields in common.<\/i><\/p>\n<p style=\"margin-left: 18.05pt\">5. When would using a personal DBMS make sense?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. When working on a smaller database for personal use, or when disconnected from the network. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">6. What is the difference between a spreadsheet and a database? List three differences between them.<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. A database is generally more powerful and complex than a spreadsheet, with the ability to handle multiple types of data and link them together. Some differences: A database has defined field types, a spreadsheet does not. A database uses a standardized query language (such as SQL), a spreadsheet does not. A database can hold much larger amounts of data than a spreadsheet. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">7. Describe what the term <i>normalization<\/i> means.<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. To normalize a database means to design it in a way that: 1) reduces duplication of data between tables and 2) gives the table as much flexibility as possible.<\/i><\/p>\n<p style=\"margin-left: 18.05pt\">8. Why is it important to define the data type of a field when designing a relational database?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. A data type tells the database what functions can be performed with the data. The second important reason to define <\/i><i>the <\/i><i>data type is so that the proper amount of storage space is allocated for <\/i><i>the<\/i><i> data. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">9. Name a database you interact with frequently. What would some of the field names be?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. The student can choose any sort of system that they interact with, such as Amazon or their school<\/i><i>\u2019<\/i><i>s online systems. The fields would be the names of data being collected, such as <\/i><i>\u201c<\/i><i>first name<\/i><i>\u201d<\/i><i>, or <\/i><i>\u201c<\/i><i>address<\/i><i>\u201d<\/i><i>. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">10. What is metadata?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. Metadata is data about data<\/i><i>.<\/i><i> It refers to the data used to describe other data, such as the length of a song in iTunes, which describes the music file. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">11. Name three advantages of using a data warehouse.<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. The text lists the following<\/i><i> <\/i><i>(<\/i><i>the student should pick at least three of these<\/i><i>)<\/i><i>: <\/i><\/p>\n<p style=\"margin-left: 90.05pt\"><i><\/i><i>i. The process of developing a data warehouse forces an organization to better understand the data that it is currently collecting and, equally important, what data is not being collected.<\/i><\/p>\n<p style=\"margin-left: 90.05pt\"><i><\/i><i>ii. A data warehouse provides a centralized view of all data being collected across the enterprise and provides a means <\/i><i>of<\/i><i> determining data that is inconsistent.<\/i><\/p>\n<p style=\"margin-left: 90.05pt\"><i><\/i><i>iii. Once all data is identified as consistent, an organization can generate one version of the truth. This is important when the company wants to report consistent statistics about itself, such as revenue or number of employees.<\/i><\/p>\n<p style=\"margin-left: 90.05pt\"><i><\/i><i>iv. By having a data warehouse, snapshots of data can be taken over time. This creates a historical record of data, which allows for an analysis of trends.<\/i><\/p>\n<p style=\"margin-left: 90.05pt\"><i><\/i><i>v. A data warehouse provides tools to combine data, which can provide new information and analysis.<\/i><\/p>\n<p style=\"margin-left: 18.05pt\">12. What is data mining?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. Data mining is the process of analyzing data to find previously unknown trends, patterns, and associations in order to make decisions. <\/i><\/p>\n<p>&nbsp;<\/p>\n<p>Chapter 5<\/p>\n<p>&nbsp;<\/p>\n<p style=\"margin-left: 18.05pt\">1. What were the first four locations hooked up to the Internet (ARPANET)?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. UCLA, Stanford, <\/i><i>MIT, and the University of Utah<\/i><\/p>\n<p style=\"margin-left: 18.05pt\">2. What does the term <i>packet<\/i> mean?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. The fundamental unit of data transmitted over the Internet. Each packet has the sender<\/i><i>\u2019<\/i><i>s address, the destination address, a sequence number, and a piece of the overall message to be sent.<\/i><\/p>\n<p style=\"margin-left: 18.05pt\">3. Which came first, the Internet or the World Wide Web?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. t<\/i><i>he Internet<\/i><\/p>\n<p style=\"margin-left: 18.05pt\">4. What was revolutionary about Web 2.0?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. Anyone could post content to the web, without the need for understanding HTML or web-server technology.<\/i><\/p>\n<p style=\"margin-left: 18.05pt\">5. What was the so-called killer app for the Internet?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. e<\/i><i>lectronic mail (e-<\/i><i>mail)<\/i><\/p>\n<p style=\"margin-left: 18.05pt\">6. What makes a connection a <i>broadband<\/i> connection?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. A broadband connection is defined as one that has speeds of at least 256,000 bps.<\/i><\/p>\n<p style=\"margin-left: 18.05pt\">7. What does the term VoIP mean?<\/p>\n<p style=\"margin-left: 54.05pt\">a. Voice over Internet protocol \u2013 a way to have voice conversations over the Internet.<\/p>\n<p style=\"margin-left: 18.05pt\">8. What is an LAN?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. A<\/i><i>n<\/i><i> LAN is a local network, usually operating in the same building or on the same campus. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">9. What is the difference between an intranet and an extranet?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. An intranet consists of t<\/i><i>he set of web pages and resources availab<\/i><i>le on a<\/i><i> company\u2019s internal network.<\/i><i> These items are not available to those outside of the company. An extranet<\/i><i> <\/i><i>is<\/i><i>&nbsp;a part of the company&#8217;s network that <\/i><i>is<\/i><i> made available securely to those outside of the company. Extranets can be used to allow customers to log in and check the status of their orders, or for suppliers to check their customers&#8217; inventory levels.<\/i><\/p>\n<p style=\"margin-left: 18.05pt\">10. What is Metcalfe\u2019s Law?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. Metcalfe\u2019s Law states that the value of a telecommunications network is proportional to the square of the number of connected users of the system.<\/i><\/p>\n<p>&nbsp;<\/p>\n<p>Chapter 6<\/p>\n<p>&nbsp;<\/p>\n<p style=\"margin-left: 18.05pt\">1. Briefly define each of the three members of the information security triad.<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. T<\/i><i>he three members are as follows:<\/i><\/p>\n<p style=\"margin-left: 90pt\"><i><\/i><i>i. Confidentiality: we want to be able to restrict access to those who are allowed to see <\/i><i>given information.<\/i><i> <\/i><\/p>\n<p style=\"margin-left: 90pt\"><i><\/i><i>ii. Integrity: the assurance that the information being accessed has not been altered and tr<\/i><i>uly represents what is intended.<\/i><i> <\/i><\/p>\n<p style=\"margin-left: 90pt\"><i><\/i><i>iii. Availability: information can be accessed and modified by anyone authorized to do so in an appropriate timeframe.<\/i><\/p>\n<p style=\"margin-left: 18.05pt\">2. What does the term <i>authentication<\/i>&nbsp;mean?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. The process of ensuring that a person is <\/i><i>who<\/i><i> <\/i><i>he or she<\/i><i> claim<\/i><i>s<\/i><i> to be. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">3. What is multi-factor authentication?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. The use of more than one method of authentication. The methods are: something you know, something you have, and something you are. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">4. What is role-based access control?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. With role-based <\/i><i>access control (RBAC), instead of giving specific users access rights to an information resource, users are assigned to roles and then those roles are assigned the access. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">5. What is the purpose of encryption?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. To keep <\/i><i>transmitted <\/i><i>data secret so that only those with the proper key can read it. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">6. What are two good examples of a complex password?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. There are many examples of this. Students need to provide examples of passwords that are a minimum of eight characters, <\/i><i>with<\/i><i> at least one upper-case letter, one special character, and one number. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">7. What is pretexting?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. Pretexting occurs when an attacker calls a helpdesk or security administrator <\/i><i>and pretends<\/i><i> to be a particular <\/i><i>authorized user<\/i><i> having trouble logging in<\/i><i>. <\/i><i>Then, by providing some personal information about <\/i><i>the authorized user<\/i><i>, <\/i><i>the attacker<\/i><i> convince<\/i><i>s<\/i><i> the <\/i><i>security <\/i><i>person to reset the password and <\/i><i>tell him what it is<\/i><i>.<\/i><\/p>\n<p style=\"margin-left: 18.05pt\">8. What are the components of a good backup plan?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. Knowing what needs to be backed up, regular backups of all data<\/i><i>, offsite storage of all backed-<\/i><i>up data, and a test of the restoration process. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">9. What is a firewall?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. A firewall can be either a hardware firewall or a software firewall. A hardware firewall is a device that is connected to the network and filters the packets based on a set of rules. A software firewall runs on the operating system and intercepts packets as they arrive to a computer.<\/i><\/p>\n<p style=\"margin-left: 18.05pt\">10. What does the term <i>physical security<\/i> mean?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. Physical security is the protection of the actual hardware and networking components that store and transmit information resources.<\/i><\/p>\n<p>Chapter 7<\/p>\n<p>&nbsp;<\/p>\n<p style=\"margin-left: 18.05pt\">1. What is the productivity paradox?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. The productivity paradox is <\/i><i>based on <\/i><i>Erik <\/i><i>Brynjolfsson\u2019s<\/i><i> <\/i><i>finding<\/i><i>, based on research he conducted in the early 1990s, <\/i><i>that the addition of information technology to business<\/i><i> had not improved productivity at all.<\/i><\/p>\n<p style=\"margin-left: 18.05pt\">2. Summarize Carr\u2019s argument in \u201cDoes IT Matter.\u201d<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. Information technology is now a commodity and cannot be used to provide an organization with competitive advantage. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">3. How is the 2008 study by Brynjolfsson and McAfee different from previous studies? How is it the same?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. It is different because it shows that IT can bring a competitive advantage, given the right conditions. It is the same in <\/i><i>the sense <\/i><i>that it shows that IT, by itself, does not bring competitive advantage. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">4. What does it mean for a business to have a competitive advantage?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. A company is said to have a competitive advantage over its rivals when it is able to sustain profits that exceed average for the industry. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">5. What are the primary activities and support activities of the value chain?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. The primary <\/i><i>activities<\/i><i> are <\/i><i>those<\/i><i> that directly impact the creation of a product or service. The support <\/i><i>activities<\/i><i> are <\/i><i>those<\/i><i> that support the primary activities. Primary: inbound logistics, operations, outbound logistics, sales\/marketing, and service. Support: firm infrastructure, human resources, technology development, <\/i><i>and procurement<\/i><i>. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">6. What has been the overall impact of the Internet on industry profitability? Who has been the true winner?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. The overall impact <\/i><i>has been<\/i><i> a reduction in average industry profitability. The consumer has been the true winner. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">7. How does EDI work?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. EDI is the computer-to-computer exchange of business documents in a standard electronic format between business partners.<\/i><\/p>\n<p style=\"margin-left: 18.05pt\">8. Give an example of a semi-structured decision and explain what inputs would be necessary to provide assistance in making the decision.<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. A semi-structured decision is one in which most of the factors needed for making the decision are known but human experience and other outside factors may still play a role. The student should provide an example of a decision that uses an information system to provide information but is not made by the system. Examples would include: budgeting decisions, diagnosing a medical condition, and investment decisions. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">9. What does a collaborative information system do?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. A collaborative system is software that allows multiple users to interact on a document or topic in order to complete a task or make a decision.<\/i><\/p>\n<p style=\"margin-left: 18.05pt\">10. How can IT play a role in competitive advantage, according to the 2008 article by Brynjolfsson and McAfee?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. The article suggests that <\/i><i>IT can influence competitive advantage when <\/i><i>good management develops and delivers <\/i><i>IT-supported <\/i><i>process <\/i><i>innovation<\/i><i>.<\/i><\/p>\n<p>&nbsp;<\/p>\n<p>Chapter 8<\/p>\n<p>&nbsp;<\/p>\n<p style=\"margin-left: 18.05pt\">1. What does the term <i>business process<\/i> mean?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. A process is a series of tasks that are completed in order to accomplish a goal. A business process, therefore, is a process that is focused on achieving a goal for a business. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">2. What are three examples of business process from a job you have had or an organization you have observed?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. Students can answer this in almost any way. The examples should consist of more than a single step. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">3. What is the value in documenting a business process?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. There are many answers to this. From the text: it allows for better control of the process<\/i><i>,<\/i><i> and <\/i><i>for <\/i><i>standardization. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">4. What is an ERP system? How does an ERP system enforce best practices for an organization?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. An ERP (enterprise resource p<\/i><i>lanning) system is a software application with a centralized database that is implemented across the entire organization. It enforces best practices through the business processes embedded in the software. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">5. What is one of the criticisms of ERP systems?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. ERP system<\/i><i>s<\/i><i> can lead to the commoditization of business processes, meaning that every company that uses an ERP <\/i><i>system <\/i><i>will perform business processes the same way. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">6. What is business process reengineering? How is it different from incrementally improving a process?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. Business process r<\/i><i>eengineering (BPR) occurs when a business process is redesigned from the ground up. It is different from incrementally improving a process <\/i><i>in that<\/i><i> it does not simply take the existing process and modify it. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">7. Why did BPR get a bad name?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. BPR became an excuse to lay<\/i><i> <\/i><i>off employees and try to complete the same amount of work using fewer employees. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">8. List the guidelines for redesigning a business process.<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. The guidelin<\/i><i>es are as follows:<\/i><i> <\/i><\/p>\n<p style=\"margin-left: 90.05pt\"><i><\/i><i>i. Organize around outcomes, not tasks. <\/i><\/p>\n<p style=\"margin-left: 90.05pt\"><i><\/i><i>ii. Have those who use the outcomes of the process perform the process.<\/i><\/p>\n<p style=\"margin-left: 90.05pt\"><i><\/i><i>iii. Subsume information-processing work into the real work that produces the information. Treat geographically dispersed resources as though they were centralized.<\/i><\/p>\n<p style=\"margin-left: 90.05pt\"><i><\/i><i>iv. Link parallel activities instead of integrating their results. <\/i><\/p>\n<p style=\"margin-left: 90.05pt\"><i><\/i><i>v. Put the decision points where the work is performed, and build controls into the process. <\/i><\/p>\n<p style=\"margin-left: 90.05pt\"><i><\/i><i>vi. Capture information once, at the source. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">9. What is business process management? What role does it play in allowing a company to differentiate itself?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. Business process management (BPM) can be thought of as an intentional effort to plan, document, implement, and distribute an organization<\/i><i>\u2019<\/i><i>s business processes with the support of information technology. It can play a role in differentiation <\/i><i>through built-in reporting, and <\/i><i>by empowering employees, enforcing best practices, <\/i><i>and <\/i><i>enforcing consistency. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">10. What does ISO certification signify?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. ISO certification shows that you know what you do, do what you say, and have documented your processes. <\/i><\/p>\n<p>&nbsp;<\/p>\n<p>Chapter 9<\/p>\n<p>&nbsp;<\/p>\n<p style=\"margin-left: 18.05pt\">1. Describe the role of a systems analyst.<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. To understand business requirements and translate them into the requirements <\/i><i>of<\/i><i> an information system. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">2. What are some of the different roles for a computer engineer?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. hardware engineer, software engineer, net<\/i><i>work engineer, systems engineer<\/i><i> <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">3. What are the duties of a computer operator?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. D<\/i><i>uties include keeping the operating systems up to date, ensuring available memory and disk storage, and overseeing the physical environment of the computer. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">4. What does the CIO do?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. The CI<\/i><i>O aligns the plans and operations of the information systems with the strategic goals of the organization. This includes tasks such as budgeting, strategic planning, and personnel decisions <\/i><i>relevant to<\/i><i> the information-systems function. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">5. Describe the job of a project manager.<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. A project manager is responsible for keeping projects on time and on budget. This person works with the stakeholders of the project to keep the team organized and communicates the status of the project to management. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">6. Explain the point of having two different career paths in information systems.<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. To allow for career growth for those who do not want to manage other employees but instead want to focus on technical skills. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">7. What are the advantages and disadvantages of centralizing the IT function?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. There are several possible answers here. Advantages <\/i><i>of<\/i><i> centralizing include more control over the company\u2019s systems and data. Disadvantages include a more limited availability of IT resources. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">8. What impact has information technology had on the way companies are organized?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. The organizational structure has been flattened, with fewer layers of management. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">9. What are the five types of information-systems users?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. i<\/i><i>nnovators, early adopters, early majo<\/i><i>rity, late majority, laggards<\/i><i> <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">10. Why would an organization outsource?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. Because it needs<\/i><i> a specific ski<\/i><i>ll for a limited amount of time, <\/i><i>and\/<\/i><i>or because it can cut costs by outsourcing. <\/i><i> <\/i><\/p>\n<p>&nbsp;<\/p>\n<p>Chapter 10<\/p>\n<p>&nbsp;<\/p>\n<p style=\"margin-left: 18.05pt\">1. What are the steps in the SDLC methodology?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. The steps are Preliminary Analysis, System Analysis, System Design, Programming, Testing, Implementation, and Maintenance.<\/i><\/p>\n<p style=\"margin-left: 18.05pt\">2. What is RAD software development?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. Rapid application development (RAD) is a software-development (or systems-development) methodology that focuses on quickly building a working model of the software, getting feedback from users, and then using that feedback to update the working model.<\/i><\/p>\n<p style=\"margin-left: 18.05pt\">3. What makes the lean methodology unique?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. The biggest difference between the lean methodology and the other methodologies is that the full set of requirements for the <\/i><i>system is<\/i><i> not known when the project is launched. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">4. What are three differences between second-generation and third-generation languages?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. Three k<\/i><i>ey differences are as follows:<\/i><\/p>\n<p style=\"margin-left: 90.05pt\"><i><\/i><i>i. The words used in the language: third generation languages use more <\/i><i>English<\/i><i>-like words than second-generation languages.<\/i><\/p>\n<p style=\"margin-left: 90.05pt\"><i><\/i><i>ii. Hardware specificity: third generation languages are not specific to hardware, second-generation languages are. <\/i><\/p>\n<p style=\"margin-left: 90.05pt\"><i><\/i><i>iii. Learning curve: third generation languages are easier to learn and use.<\/i><\/p>\n<p style=\"margin-left: 18.05pt\">5. Why would an organization consider building its own software application if it is cheaper to buy one?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. They may wish to build their own in order t<\/i><i>o have something that is unique (<\/i><i>d<\/i><i>ifferent from their competitors),<\/i><i> <\/i><i>and\/or <\/i><i>something that more closely matches their business processes. They also may choose to do this if they have more time <\/i><i>and\/<\/i><i>or more money available to do it. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">6. What is responsive design?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. Responsive design is a method <\/i><i>of<\/i><i> developing <\/i><i>websites <\/i><i>that allows <\/i><i>them<\/i><i> to be viewed on many different types of devices without losing capability or effectiveness. With a responsive website, images resize themselves based on the size of the device<\/i><i>\u2019<\/i><i>s screen, and text flows and sizes itself properly for optimal viewing.<\/i><\/p>\n<p style=\"margin-left: 18.05pt\">7. What is the relationship between HTML and CSS in website design?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. While HTML is used to define the components of a web page, cascading style sheets (CSS) are used to define the styles of the components on a page. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">8. What is the difference between the pilot implementation methodology and the parallel implementation methodology?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. The pilot methodology implement<\/i><i>s<\/i><i> new software for just one group of people while the rest of the users use the previous version of the software. The parallel implementation methodology use<\/i><i>s<\/i><i> both the old and the new applications at the same time. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">9. What is change management?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. The oversight of the changes brought about in an organization. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">10. What are the four different implementation methodologies?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. d<\/i><i>irect c<\/i><i>utover, pilot, parallel, phased<\/i><\/p>\n<p>&nbsp;<\/p>\n<p>Chapter 11<\/p>\n<p>&nbsp;<\/p>\n<p style=\"margin-left: 18.05pt\">1. What does the term <i>globalization<\/i> mean?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><em>a.<\/em> Globalization<i> refer<\/i><i>s<\/i><i> to the integration of goods, services, and culture<\/i><i>s<\/i><i> among the nations of the world.<\/i><\/p>\n<p style=\"margin-left: 18.05pt\">2. How does Friedman define the three eras of globalization?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. The three eras are as follows:<\/i><i> <\/i><\/p>\n<p style=\"margin-left: 90.05pt\"><i><\/i><i>i. \u201c<\/i><i>Globalization 1.0<\/i><i>\u201d<\/i><i> occurred from 1492 until about 1800. In this era, globalization was centered around countries. It was about how much horsepower, wind power, and steam power a country had and how creatively it was deployed. The world shrank from size <\/i><i>\u201c<\/i><i>large<\/i><i>\u201d<\/i><i> to size <\/i><i>\u201c<\/i><i>medium.<\/i><i>\u201d<\/i><\/p>\n<p style=\"margin-left: 90.05pt\"><i><\/i><i>ii. \u201c<\/i><i>Globalization 2.0<\/i><i>\u201d<\/i><i> occurred from about 1800 until 2000, interrupted only by the two World Wars. In this era, the dynamic force driving change was <\/i><i>comprised of <\/i><i>multinational companies. The world shrank from size <\/i><i>\u201c<\/i><i>medium<\/i><i>\u201d<\/i><i> to size <\/i><i>\u201c<\/i><i>small.<\/i><i>\u201d<\/i><\/p>\n<p style=\"margin-left: 90.05pt\"><i><\/i><i>iii. \u201c<\/i><i>Globalization 3.0<\/i><i>\u201d<\/i><i> is our current era, beginning in the year 2000. The convergence of the personal computer, fiber-optic Internet connections, and software has created a <\/i><i>\u201c<\/i><i>flat-world platform<\/i><i>\u201d<\/i><i> that allows small groups and even individuals to go global. The world has shrunk from size <\/i><i>\u201c<\/i><i>small<\/i><i>\u201d<\/i><i> to size <\/i><i>\u201c<\/i><i>tiny.<\/i><i>\u201d<\/i><\/p>\n<p style=\"margin-left: 18.05pt\">3. Which technologies have had the biggest effect on globalization?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. There are several answers to this. Probably the most obvious are the Internet, the graphical interface of <\/i><i>Windows<\/i><i> and the World Wide Web, and workflow software. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">4. What are some of the advantages brought about by globalization?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. Advantages include the ability to locate expertise and labor around the world, the ability to operate 24 hours a day, and a larger market for products.<\/i><\/p>\n<p style=\"margin-left: 18.05pt\">5. What are the challenges of globalization?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. Challenges include infrastructure differences, labor laws and regulations, legal restrictions, <\/i><i>and <\/i><i>differe<\/i><i>nt languages, customs,<\/i><i> and preferences.<\/i><\/p>\n<p style=\"margin-left: 18.05pt\">6. What does the term <i>digital divide<\/i> mean?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. The separation betwe<\/i><i>en those who have access to the<\/i><i> global network and those who do not. The digital divide can occur between countries, regions, or even neighborhoods. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">7. What are Jakob Nielsen\u2019s three stages of the digital divide?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. e<\/i><i>cono<\/i><i>mic, usability, and empowerment<\/i><i> <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">8. What was one of the key points of <i>The Rise of the Network Society<\/i>?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. There are two key points <\/i><i>to<\/i><i> choose from. <\/i><i>One <\/i><i>is<\/i><i> that economic activity <\/i><i>was, when the book was published in <\/i><i>1996,<\/i><i> being organized around the networks that the new tel<\/i><i>ecommunication technologies had<\/i><i> provided. <\/i><i>The other<\/i><i> is that this new, global economic activity was different from the past, because <\/i><i>\u201c<\/i><i>it is an economy with the capacity to work as a unit in real time on a planetary scale.<\/i><i>\u201d<\/i><\/p>\n<p style=\"margin-left: 18.05pt\">9. Which country has the highest average Internet speed? How does your country compare?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. According to the chart in the chapter, South Korea has the highest Internet speeds. <\/i><i>S<\/i><i>tudent<\/i><i>s<\/i><i> will need to look up their own to compare. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">10. What is the OLPC project? Has it been successful?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. One Laptop Per Child. By most measures, <\/i><i>it<\/i><i> has not been a successful program. <\/i><\/p>\n<p>&nbsp;<\/p>\n<p>Chapter 12<\/p>\n<p>&nbsp;<\/p>\n<p style=\"margin-left: 18.05pt\">1. What does the term <i>information systems ethics<\/i> mean?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. There are <\/i><i>various ways of <\/i><i>answering<\/i><i> this<\/i><i> question<\/i><i>, but <\/i><i>the answer<\/i><i> should include s<\/i><i>omething about the application of ethics to the new capabilities and cultural norms brought about by information technology. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">2. What is a code of ethics? What is one advantage and one disadvantage of a code of ethics?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. A code of ethics is a document that outlines a set of acceptable behaviors for a professional or social group.<\/i><i> <\/i><i>A<\/i><i>nswers may differ for the second part, but from the text: o<\/i><i>ne advantage of a code of ethics is that it <\/i><i>clarifies the acceptable standards of <\/i><i>behavior for a professional group.<\/i><i> One disadvantage is that it does not necessarily have legal authority. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">3. What does the term <i>intellectual property<\/i> mean? Give an example.<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. Intellectual property is defined as <\/i><i>\u201c<\/i><i>property (as an idea, invention, or process) that derives from the work of the mind or intellect.<\/i><i>\u201d<\/i><\/p>\n<p style=\"margin-left: 18.05pt\">4. What protections are provided by a copyright? How do you obtain one?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. Copyright<\/i><i> protections <\/i><i>address the following<\/i><i>: who can make copies of the work, who can make derivative works from the original work, who can perform the work publicly, who can display the work publicly, and who can distribute the work. You obtain a copyright as soon as the work is put into tangible form.<\/i><\/p>\n<p style=\"margin-left: 18.05pt\">5. What is fair use?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. Fair use is a limitation on copyright law that allows for the use of protected works without prior authorization in specific cases. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">6. What protections are provided by a patent? How do you obtain one?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. Once a patent is granted, it provides the inventor with protection from others infringing on <\/i><i>the<\/i><i> patent. In the US, a patent holder has the right to <\/i><i>\u201c<\/i><i>exclude others from making, using, offering for sale, or selling the invention throughout the United States or importing the invention into the United States for a limited time in exchange for public disclosure of the invention when the patent is granted.<\/i><i>\u201d<\/i><i> You obtain a patent by filing an application with the patent office. A patent will be granted if the work is deemed to be original, useful, and non-obvious. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">7. What does a trademark protect? How do you obtain one?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. A trademark protects a word, phrase, logo, shape<\/i><i>,<\/i><i> or sound that identifies a source of goods or services. You can obtain one by registering with the Patent and Trademark Office (US). There is also a <\/i><i>common-<\/i><i>law trademark. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">8. What does the term <i>per<\/i><i>sonally identifiable<\/i><i> information<\/i> mean?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. Information about a person that can be used to uniquely<\/i><i> establish that person<\/i><i>\u2019<\/i><i>s identit<\/i><i>y is called personally identifiable information, or PII. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">9. What protections are provided by HIPAA, COPPA, and FERPA?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. The a<\/i><i>nswers<\/i><i> are as follows<\/i><i>: <\/i><\/p>\n<p style=\"margin-left: 90.05pt\"><i><\/i><i>i. HIPAA: <\/i><i>protects <\/i><i>records related to health care as a special class of personally identifiable information. <\/i><\/p>\n<p style=\"margin-left: 90.05pt\"><i><\/i><i>ii. COPPA: <\/i><i>protects <\/i><i>information <\/i><i>collected from<\/i><i> children under the age of thirteen.<\/i><\/p>\n<p style=\"margin-left: 90.05pt\"><i><\/i><i>iii. FERPA: <\/i><i>protects <\/i><i>student educational records.<\/i><\/p>\n<p style=\"margin-left: 18.05pt\">10. How would you explain the concept of NORA?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. There are various ways to answer this. <\/i><i>The basic answer is that NORA (non-obvious relationship a<\/i><i>wareness) is the process of collecting large quantities of a variety of information and then combining it to create profiles of individuals.<\/i><\/p>\n<p>&nbsp;<\/p>\n<p>Chapter 13<\/p>\n<p>&nbsp;<\/p>\n<p style=\"margin-left: 18.05pt\">1. Which countries are the biggest users of the Internet? Social media? Mobile?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. S<\/i><i>tudents will need to look outside the text for this, as it changes all the time. There are also different ways of measurement: number of users, % of <\/i><i>population<\/i><i>, most <\/i><i>active users, etc. Some good sites to use are <\/i><a class=\"rId6\" href=\"http:\/\/www.internetworldstats.com\/stats.htm\"><i>Internet World Stats<\/i><\/a><i>, <\/i><a class=\"rId7\" href=\"http:\/\/blog.kissmetrics.com\/facebook-statistics\/\"><i>Kissmetrics<\/i><\/a><i>, and the <\/i><a class=\"rId8\" href=\"http:\/\/data.worldbank.org\/indicator\/IT.CEL.SETS.P2\"><i>World Bank<\/i><\/a><i>.<\/i><\/p>\n<p style=\"margin-left: 18.05pt\">2. Which country had the largest Internet growth (in %) between 2008 and 2012?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. Iran, at 205%<\/i><\/p>\n<p style=\"margin-left: 18.05pt\">3. How will most people connect to the Internet in the future?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. via mobile devices<\/i><i> <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">4. What are two different applications of wearable technologies?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. There are many answers to this question;<\/i><i> <\/i><i>two examples are Google Glass and<\/i><i> Jawbone UP.<\/i><\/p>\n<p style=\"margin-left: 18.05pt\">5. What are two different applications of collaborative technologies?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. There <\/i><i>are many answers to this; two examples are<\/i><i> software that routes us to our destination <\/i><i>in the shortest amount of time<\/i><i>, <\/i><i>and <\/i><i>websites that review different companies. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">6. What capabilities do printable technologies have?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. Using 3-D printers, designers can quickly test prototypes or build something as a proof of concept. <\/i><i>Printable technologies<\/i> <i>also make<\/i><i> it possible to bring manufacturing to the desktop computer. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">7. How will advances in wireless technologies and sensors make objects &#8220;findable&#8221;?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. Advances in wireless technologies and sensors will allow physical objects to send and receive data about themselves. <\/i><\/p>\n<p style=\"margin-left: 18.05pt\">8. What is enhanced situational awareness?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. Data from large numbers of sensors can give decision makers a heightened awareness of real-time events, particularly when the sensors are used with advanced display or visualization technologies.<\/i><\/p>\n<p style=\"margin-left: 18.05pt\">9. What is a nanobot?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. A nanobot is a robot whose components are on the scale of about a nanometer.<\/i><\/p>\n<p style=\"margin-left: 18.05pt\">10. What is a UAV?<\/p>\n<p style=\"margin-left: 54.05pt\"><i><\/i><i>a. An unmanned aerial vehicle<\/i><i> <\/i><i>\u2013 <\/i><i>a small airplane or helicopter that can fly without a pilot. <\/i><i>UAVs<\/i><i> are run by computer or <\/i><i>remote control<\/i><i>.<\/i><\/p>\n<p>&nbsp;<\/p>\n<\/div>\n","protected":false},"author":1,"menu_order":1,"template":"","meta":{"pb_show_title":"on","pb_short_title":"","pb_subtitle":"","pb_authors":[],"pb_section_license":""},"back-matter-type":[],"contributor":[],"license":[],"class_list":["post-94","back-matter","type-back-matter","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/opentextbook.site\/informationsystems\/wp-json\/pressbooks\/v2\/back-matter\/94","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/opentextbook.site\/informationsystems\/wp-json\/pressbooks\/v2\/back-matter"}],"about":[{"href":"https:\/\/opentextbook.site\/informationsystems\/wp-json\/wp\/v2\/types\/back-matter"}],"author":[{"embeddable":true,"href":"https:\/\/opentextbook.site\/informationsystems\/wp-json\/wp\/v2\/users\/1"}],"version-history":[{"count":1,"href":"https:\/\/opentextbook.site\/informationsystems\/wp-json\/pressbooks\/v2\/back-matter\/94\/revisions"}],"predecessor-version":[{"id":110,"href":"https:\/\/opentextbook.site\/informationsystems\/wp-json\/pressbooks\/v2\/back-matter\/94\/revisions\/110"}],"metadata":[{"href":"https:\/\/opentextbook.site\/informationsystems\/wp-json\/pressbooks\/v2\/back-matter\/94\/metadata\/"}],"wp:attachment":[{"href":"https:\/\/opentextbook.site\/informationsystems\/wp-json\/wp\/v2\/media?parent=94"}],"wp:term":[{"taxonomy":"back-matter-type","embeddable":true,"href":"https:\/\/opentextbook.site\/informationsystems\/wp-json\/pressbooks\/v2\/back-matter-type?post=94"},{"taxonomy":"contributor","embeddable":true,"href":"https:\/\/opentextbook.site\/informationsystems\/wp-json\/wp\/v2\/contributor?post=94"},{"taxonomy":"license","embeddable":true,"href":"https:\/\/opentextbook.site\/informationsystems\/wp-json\/wp\/v2\/license?post=94"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}