You are on page 1of 73

Info Systems In Class Quizzes

**IF YOU WANT TO ADD PEOPLE TO THE DOC GO


AHEAD BUT MAKE SURE THEY ADD THEIR MC TO,
HIGHLIGHT THE CORRECT ANSWERS AND DELETE
DUPLICATES (CONTROL “F” YOUR QUESTION TO
FIND DUPLICATES)**

Chapter 1
Which of the following is a pillar among the three pillars of ICT?
a. Tangible vs. ethereal
b. Data, Information & knowledge
c. Communications technology platform
d. Return on IT investment
e. Service-based economies

In measurement terminology, a cell phone bill is likely ordered primarily:


Select one:
a. Alphabetically
b. Chronologically
c. Spatially
d. Horizontally
e. Vertically

In business, we use information to:


a. Reduce uncertainty around decisions
b. Propose an informed course of action
c. Interpret data
d. Create metadata
e. A and B are correct

Technological progress is measured:


Select one:
a. by impact on business process Incorrect
b. by impact on system output
c. by impact on system input
d. A and B are correct
e. B and C are correct

Measurement that can specify a real zero level is referred to as:


a. Rational
b. Zero-based
c. Objective
d.Ratio
e.Normative

In data management terminology, NOIR stands for:


a)Normative, Objective, Integrated, Rational
b)Nominal, Ordinal, Interval, Ratio
c)Nominal, Ordinal, Integrated, Rational
d) Named, Objective, integrated, Relational
e) normal, ordinary, interesting, resolved

Data and Information are:


a) The same
b) Part of a continuum
c) Never measure
d) All of the above
e) B and C are correct

For a business to be viable, the ____ must eventually be greater than the ____.
a) Cost of output/value of output
b) Value of output/cost of output
c) Value of input/cost of output
d) Value of output/cost of inputc
e) Cost of input/value of output

In measurement technology, LATCH stands for:


a) Localised, Active, Terminal, Captured, Harmonised
b) Local, Archived, Traditional, Captured, Heterogeneous
c) Labelled, Articulated, Trusted, Categorised, Homogenised
d) Large, Autonomous, Timely, Current, Horizontal
e) Location, Alphabetical, Time, Categorical, Hierarchical

A broad view of technology would include:


a) Language
b) Software manuals and help files
c) Blueprints
d) Information
e) All of the above

The shift from a goods economy to a knowledge economy has increased the
importance of
a) Intangibles
b) Education
c) Manufacturing
d) Tangibles
e) Financial analysis
Industrialized countries have seen _____ as a proportion of all jobs since at least the
1930’s:
a) A decline in service jobs
b) An increase in manufacturing jobs
c) A steady rise in both manufacturing and service jobs
d) A decline in manufacturing jobs
e) A steady decline in both manufacturing and service jobs.

The narrow view of technology used in this course would include:


a) The spoken word in various media
b) Problem solving and advice
c) The application of scientific knowledge for practical purposes
d) Prototyping and modelling
e) Consulting and explanation

A variable such thing as Chevrolet, Ford, Ferrari, or Male or Female is at what level
of measurement?
a) Ordinal
b) Interval
c) Nominal
d) Location
e) Alphabetic

Effectiveness is:
a) doing the thing right
b) doing the right thing
c) the opposite of efficiency
d) the same as efficiency
e) not possible to measure

A measurement system is considered valid if it is both _____ and _____.


a) true / accurate
b) precise/true
c) accurate/precise
d) A and B are correct
e) B and C are correct

In communication, the term latency refers to:


a) synchronicity
b) broadcasting
c) narrowcasting
d) lag
e) none of the above
In communication, the term synchronicity refers to:
a) lag
b) monoligicity
c) narrowcasting
d) broadcasting
e) time

A doctor, a lawyer and a statistician are on a hunting trip. What does the statistician
say?
a) Got him!
b) Darn, we missed.
c) Take another shot!
d) Where did he go?
e) I am a mean deviate.

Which of the products below has the highest price per pound?
a) Mercedes Benz E-class
b) Pentium III chip
c) Gold
d) Hot rolled steel
e) Viagra

The twin metrics of a system are:


a) Effectiveness and effort
b) Input and output
c) Efficiency and effectiveness
d) Efficiency and output
e) Output and effort

**Which of the following is true of capitalism?


a) Shareholders must be paid annually
b) Problems must be solved at an increasing rate
c) Margins must be continually growing
d) Profit must increase year over year
e) B C and D are correct

The term broadcasting refers to __ communication


a) One to many
b) Many to one
c) One to one
d) Synchronous
e) Asynchronous
Information:
a) Always results in change
b) Cannot lead to change
c) Has the potential to lead to change
d) Must be measured before it changes
e) None of the above

The service sector in Canada represents a(n) ______ part of GDP compared with
manufacturing:
a) Smaller
b) Larger
c) Shrinking
d) Equal
e) integral

Measurement that assumes an underlying order is referred to as


a) Alphabetical
b) Integrated
c) Ordinal
d) Scalar
e) Normative

The service sector includes the occupations of:


a) Education and Finance
b) Health and mining
c) Transportation and manufacturing
d) A, B and C are all included in the service sector
e) Neither A, B or C are included in the service sector.

The app Periscope is an example of _____.


a. synchronicity
b. narrowcasting
c. broadcasting
d. asynchronous communication
e. none of the above

Precision can be seen as:


a. the same as accuracy
b. more important than resolution
c. a cluster of measurement attempts
d. measured as the farthest attempt away from the true value
e. the number of decimal or binary digits in the measurement
Technology can be:
a. Tangible
b. Intangible
c. Unmeasured
d. A and B are correct
e. B and C are correct

Data is ____ ____ in a context(whats the difference between a,b and e?):
a. Useful if
b. Useless except
c. Always located
d. Never located
e. Both a and b are correct

An accepted definition of information is:


a. A message received and understood
b. Data that has been measured
c. Knowledge acquired through study, experience or instruction
d. All of the above
e. A and C are correct

"The economic landscape of the present and future is no longer shaped by physical
flows of material goods and products but by ethereal streams of data, images and
symbols." This quote refers to what is called the:
a. Knowledge Economy
b. Digital Economy
c. Information Society
d. Experience Economy
e. All of the above are correct

In measurement terminology, a restaurant menu is likely ordered primarily:


a. Alphabetically
b. Chronologically
c. Categorically
d. Vertically

The three sectors of the Canadian economy are:


a) Primary, Services, Farming
b) Primary, Secondary, Tertiary
c) Services, Manufacturing, Sciences and related
d) Mining, Farming, Manufacturing
e) Banking, Health, Education

The two potential impacts ICT can have on value creation are:
a. Input augmenter and output reducer
b. Input enhancer and value enhancer
c. Output reducer and input enhancer
d. Output reducer and input enhancer
e. Input reducer and output enhancer

Creative class workers include:

a) Scientists

b) Engineers

c) Media workers

d) Designers

e) All of the above

Communication is:

a. Unrelated to information

b. Post-information

c. Only explained by semiotics

d. What humans do

e. Secondary to measurement

The shift to a services-based economy has been fuelled and facilitated by:

a. A drop in manufacturing as a % of GDP

b. ICT

c. The rise of “creative classes”

d. All of the above


e. Neither A, B nor C is correct

The degree of closeness of measurements of a quantity to that quantity's actual


(true) value is:
a. Accuracy
b. Precision
c. Trueness
d. Accuracy and precision
e. Precision and trueness

A services-based economy has which characteristics? Select one:


a. Economic growth increasingly linked to intangibles
b. Employers catering to the "creative class"
c. Services increasingly crossing borders
d. Services influenced by an aging population
e. All of the above

The degree to which repeated measurements under unchanged conditions show the
same results is:
a. Accuracy
b. Precision
c. Trueness
d. Accuracy and precision
e. Precision and trueness

In an article on capitalism, McKinsey proposes that the purpose of business is to:


a. Increase wealth for shareholders
b. Solve problems
c. Facilitate the "creative classes"
d. Provide meaningful employment
e. Contribute to social order

What are the components of the hierarchy discussed in Chapter 1?


a. Measurement, data, tangibility
b. Metadata, data, wisdom
c. Data, information, knowledge
d. Measurement, data, metadata
e. Data, wisdom, knowledge

The so-called ”weightless economy “is characterized by economic commodities that


have little or no ______.:
Select one:
a. Dimensionality
b. physical manifestation
c. value
d. endurance
e. Longevity

Acting upon information is:

a. Not as important as reacting

b. Always required

c. Not necessary

d. As valid as not acting

e. C and D are correct

Knowledge arises from:


a) Accumulated experience with the outcomes of decisions
b) Information in context
c) Measurement
d) Action rather than reaction
e) Context

Data is:
a. Pre-information
b. Post-information
c. Unrelated to measurement
d. The same as information
e. Never in context

Which of the products below has the lowest price per pound?
a. Mercedes Benz E-class
b. Pentium III chip
c. Gold
d. Hot rolled steel
e. Viagra

Tangible/intangible can be understood as:


Select one:
a. Seen/unseen
b. Concrete/conceptual
c. Objective/subjective
d. None of the above
e. A, B and C are correct
Chapter 2
The Black Box in an airplane is an example of an:
a) Sensor
b) Beacon
c) Legacy data
d) Application
e) Geo-fence

If Sir John A. Macdonald were transported to today, he would suffer from a lack of_____?
a) Common language
b) Common decency
c) Exformation
d) Blended whiskey
e) Culture

Artificial Intelligence researchers have given up trying to create rules for machines to
teach them to recognize objects. Instead, they are now _____.
a) Using the “tabula rasa” approach
b) Teaching the machines through code-based algorithms
c) Allowing machines to discover objects in the wild
d) Hiding the context of discovery and allowing machines to create their own
e) Showing machines large quantities of pictures of an object with a label
and allowing the machines to make their own rules

The new go-to technology to percent unauthorised drones around airports is


a) Aircraft black box
b) Beacons
c) Geo-fencing
d) Narrowcasting
e) Broadcasting

Author Victor Hugo and his publisher exchanged messages consisting of which of
the two characters below?
a) ? and !
b) ? and $
c) $ and Y
d) ? and N
e) Y and N

"If a piece of information can be used to characterize the situation of a participant in an


interaction, then that information is _____."
Select one:
a. exformation
b. context
c. terroir
d. trajectory
e. Timely

Beacons allow for which activities:


a) Location tracking
b) Application Launching
c) Proximity sensing
d) Electronic Payment
e) A, B and C are correct

The 6 T’s of context are:


a) Time, Terroir, Trajectory, Terrain, Table, Tools
b)Tables, Tradition, Territory, Terrain, Trends, Tools
c) Time, Tags, Tools, Trial (and error), Traps, Trends
d) Trajectory, Terrain, Trial, Trends, Tools, Teams
e) Time, Terroir, Team, Trail, Task, Tools

Digital is to analog as:


a) Wavelength is to velocity
b) Colour is to sound
c) Integers are to real numbers
d) Signal is to noise
e) Data is to information

The letters R, G and B refer to what?


a) Primary Colours
b) Red, Green and Blue

A rudimentary ____ is created when a child first encounters a dog


A. A feedback loop
B. Context
C. Information matrix
D. Schema
E. Interpretation

The sentence “models, policies, rules or standards that govern which data is collected and
how it is stored, arranged, and put into use in a database system and or organization”
describes
a. Data architecture
b. Systems development
c. Information
d. Exformation
e. Latency
In the physical sciences the ____ associated with a situation is the measure of the degree of
randomness
a. Latency
b. Entropy
c. variation
d. Exformation
e. Excelleration

Sparkl and nuGrill are:


a. Data transmission protocols
b. Iphone apps to assess communication frequency
c. Researchers at Queen's’ School for the study of communication
d. Fictitious Competitors in toothpaste segment of the dental hygienist
industry
e. None of the above are correct

Un-information is potentially more ____ than non-information


a. Damaging
b. Interesting
c. Important
d. Misleading
e. B and c are correct

Exformation can be described as _____:


a) latency
b) common sense
c) failed communication
d) unintended context
e) published data

How many contexts are required in order to generate new knowledge?


a) 2
b) 1
c) 3
d) None
e) 5

Mobile payment systems are _____ financial institutions.


a) thumping
b) disenfranchising
c) supporting
d) facilitating
e) disintermediating
From the beginning of time until 2003, humanity generated about 5 exabytes of data.
How long does it currently take us to generate that much data?

a) 2 years

b) 2 days

c) 10 years

d) 2 minutes

e) 5 days

The ICT approach to Kat’z non-information is to:

a) Manage and act

b) Alert

c) Filter

d) Reject

e) Retransmit

Entropy is the friend of ____ but the enemy of good ____.

a) Interpretation/structure

b) Organization/understanding

c) Data volume/decision making

d) Messaging/understanding

e) None of the above are correct

Which of the following is a goal of Information Architecture?

a) To determine how we are performing


b) To understand our place in the market

c) To determine how to move forward

d) To reply to our employees, customers, stakeholders, regulators, partners and


even competitors

e) All of the above

A process is defined as_______.


a.None of these answers are correct
b. All of these answers are correct
c.Something with input and an output
d.A series of actions that produce something or that lead to a particular result
e. A system with known boundaries

Context is the same as?

a) Circumstance

b) Setting

c) Circumstance and setting

d) Network

e) Awareness and agility

"Effective communication depends on a shared body of knowledge between the


persons communicating." This sentence describes:

a. Information

b. Non-information

c. un-information
d. Disinformation

e. exformation

The hardware cost (in 2013 USD) to compute at the rate of 1 GFLO has dropped
from ____ to ____ between 1961 and 2015.

a) 6 million

b) 8.3 million

c) 83 trillion

d) 8.3 trillion / 0.08

e) Its impossible to compute at that rate

If we can't tell the difference between a digital and an analog representation of


something, then it's _____.

a. a problem of latency

b. Exformation

c. information

d. not numerical

e. Good enough

Data becomes information when located in a(n) _____.

a. Environment

b. legacy system

c. informational matrix

d. context

e. frame of reference

The resolution of a sensor is ____.


a. The intersection of digital and analog

b. The smallest change it can detect in the quantity that it is measuring

c. The number of pixels in a display

d. Demonstrated by the Wagon Wheel Effect

e. None of the above is correct (and yes, this is proper grammar:)

The Wagon Wheel Effect is often seen

a) In old western movies

b) The Matrix

c) Marketing studies

d) Beacons and sensors

e) Geo-fencing

Which of the following is NOT one of Katz's 5 faces of information?

a. Re-information

b. b. Information

c. c. Disinformation

d. d. Un-information

e. e. Non-information

Beacons are ___ than sensors

a) Cheaper
b) Lighters

c) Less functional

d) More widely used

e) More independent

Which of the 6 Ts of context is not strictly required to be present for a context to


occur?

a. Task

b. Time

c. Terrior

d. Trail

e. Tools

The opposite of context is?

a. Content

b. Tool

c. Vacuum

d. Task

e. Terrior

The operating system (iOS, Windows, Android) function to assemble and package
data for transport is referred to as _____.
a. packaging
b. assembly
c. marshalling
d. concatenation Incorrect
e. email

Beacons can _____.


a. allow for the calculation of secondary indicators
b. marshal legacy data
c. provide exformational context
d. A and B are correct
e. None of the above are correct

Analog is the real _____ of nature.


a. numbers
b. integers
c. digits
d. resolution
e. Distribution

_____ is a concept whereas _____ is tangible data.


a. Knowledge/learning
b. Measurement/measuring
c. Wisdom/knowledge
d. Vacuum/emptiness
e. Length/6 cm.

GFLOPS stands for?


a. the floppy disk drives on old school computers
b. the failure rate of integer calculations
c. graphical system operations
d. the resolution necessary for liquid information
e. the power to execute 1 billion floating point calculations per second

The feedback loop in the knowledge creation process can also be thought of as?
a. exformation
b. experience
c. new information
d. context
e. wisdom

Nescience is _____:
a) Context
b) Content
c) The scientific method
d) The utter absence of knowledge
e) The step before learning

As resolution increases, so increases _____.


a. information
b. entropy
c. dis-information
d. data
e. analog
M-commerce is facilitated by?
a. text messaging
b. mobile payment systems
c. location services
d. B and C are correct
e. A and B are correct

Beacons send a message like _____.


a. Here I am!
b. I am here!
c. Where are you?
d. A and B are correct
e. A and C are correct

According to Katz, which of the following is characterised as being possibly true,


probably unimportant and/or possibly confusing?
a. Non-information
b. Uninformation
c. Disinformation
d. Misinformation
e. Information

A loose translation of ‘tabula-rasa’ is?


a. Context
b. Information
c. Blank slate
d. Red table

According to Katz, non-information is:


a. Untrue
b. Frequently transmitted as information
c. rejected by machine recipients
d. Potentially damaging
e. Possibly true

Because we care both that messaging is occurring and what is being massaged
a.Shannon is our man
b.Neither Weiner nor Shannon were right about information
c.Both Weiner and Shannon were wrong about entropy
d.Weiner is our man
e. Business needs a new model of information flows

Sustainable competitive advantage differs from simple competitive advantage in that it is _____.
a. Full of holes
b. Valuable
c. Indestructible
d. Regular
e. Persistent

Broadly speaking, _____ represents the highest level of decision making, involving basic
questions of status, financial viability, strategy, and compliance within an organisation.
a. Strategic imperatives
b. Corporate governance
c. Competitive advantage
d. The board of directors
e. Tactics

A superiority gained by an organization when it can provide the same value as its competitors but
at a lower price, or can charge higher prices by providing greater value through differentiation.
_____ results from matching _____ to the opportunities.
a. None of these answers is correct
b. Competitive advantage / core competencies
c. Sales / revenue
d. Value / competition
e. Revenue / sales

Competitive advantage occurs when a firm _____.


a. Gets a price advantage on its competitors
b. It's the first to market
c. Overtakes its rivals in sales
d. Does something that its rivals cannot
e. Makes money

In the average organisation, Measurement (as an activity) is primarily done by _____.


a. in-memory computing
b. humans
c. middle managers
d. Decision Support Systems (DSS)
e. machines

Kianu Reeves and Lawrence Fishburn starred in what iconic 1999 thriller?
a. The Matrix
b. Integers Gone Wild!
c. Latency be damned
d. Whose bits are they anyways?
e. Seinfeld

Facts are?
a. information
b. measurement
c. metrics
d. knowledge
e. data
ICT impacts or is impacted by how many of the 11 discrete areas of the knowledge creation
process?
a. all 11
b. each of the 11 except for the contexts
c. only the 4 between the inner contexts
d. none - ICT cannot directly impact knowledge creation
e. what knowledge creation process?

Chapter 7
A system ‘backend’ provides:
a) Processing power
b) Permanent storage
c) Database management
d) RAM
e) Local storage

Every machine connected to the internet requires a(n):


a) A machine-readable interface
b) Internet protocol (IP) address
c) Router
d) Wifi connection
e) Table of contents

Your cell phone has ____.


a) The most efficient frontend possible
b) Evolved from system backend research
c) No local processing power
d) A variable connection to the cloud
e) More computing power than all NASA in 1969

Software is called ‘soft’ because it’s ____


a) easily offended
b) not hard to create
c)not easily nailed down
d) manipulating numbers
e) easily changed

In database terminology, CRUD stands for:


a. Create, Refine, Update, Determine
b. Create, Read, Update, Delete
c. Control, Render, Undo, Determine
d. Concatenate, Read, Undo, Delete
e. None of the other answers is correct
A system ‘frontend’ is
A. Mirror image of a backend
B. Always connected to a database
C. Used for processing
D. Always stored in the cloud
E. Different than a backend

The primary key from one table, when included in another table becomes _____
a.One:one relationship
b.Loose key
c.Foreign key
d.Native key
e.Liability

When area codes (ACs) were being assigned in North America, the rule was?
A. No area code could start with 1
B. No area code could start with 0
C. All of these answers are correct
D. States/provinces with only one AC within their boundary were assigned an AC with a
0 as the middle number
E. Numbers were assigned based on population

In object oriented programming, code is executed in response to ___?


A. System speed
B. Affordance
C. Sequentiality
D. User input
E. Events

An interface is where _____.


a. processing occurs
b. systems talk to each other and exchange stuff
c. databases manage data
d. processing meets RAM
e. the system backend stops

A computer is an electronic machine that:


a) Transmits to a printer
b) Processes data (some say information)
c) Organises output
d) None of the above
e) A, B and C are correct.

A computer differs from a classic system in that it includes ___.


a) No feedback loop
b) Access to new function
c) A memory component
d) A spreadsheet
e) A CPU

In object oriented programming, which of the following are considered objects?


a) File folders
b) All of these answers are correct
c) Command buttons
d) Printer icons
e) A single cell in a spreadsheet

The 'cloud' is another way to say _____.


a. remote
b. local
c. database
d. backend
e. frontend

In a database, a 'record' represents a(n) _____.


a. a collection of entities
b. collection of fields describing the entity
c. user interface
d. arbitrary selection of properties
e. thing

In a database, tables are referred to as _____.


a. interfaces
b. reports
c. queries
d. entities
e. attributes

An interface is a(n):
a) A system concept
b) Process system
c) Meeting place
d) Analog construct
e) Database entity

Bit is an acronym from _____.


a. bilateral transit
b. binary digit
c. bit or byte
d. big digit
e. binary logit

Everyday examples of a database include:

a. all of these answers are correct

b. Dictionary

c. building directory

d. contact list

e. TV schedule listing

In a database table, a 'field' represents a(n) _____.

a. attribute

b. Entity

c. relationship

d. foreign key

e. primary key

The correct order of Network Communication Layers from top to bottom is:

a. Hardware, Application, TCP, IP

b. TCP, IP, Application, Hardware

c. the order is not important

d. Application, TCP, IP, Hardware

e. the order depends on the application.

The blank space character in ASCII _____.


a. has its own code

b. is not represented

c. is exactly half the value of a binary digit

d. cannot be changed

e. is easily changed

Computer fonts are ____.

a) Often shown as ASCII values only

b) Pictures of what we want to represent

c) Are only used in writing papers

d) Used for manipulating numbers

e) Not easily manage

A Computer is an example of:


a.A basic input-process-output system
b.An information storage device
C.An operating system
d.System Software
e.Application software

In object-oriented programming, the characteristics of objects are referred to as:


a.Processors
b.Entities
c.Properties
d.Objects
e.Commands

Processing can be done ___


a.Both locally and remotely
b.Locally (in RAM) only
c. Only remotely if you are on wifi
d.Is never done locally
e.Is always done remotely
Monospaced fonts __
a.Are mirror images of each other
b.Cannot be shown on screen
c.Cannot be stored in RAM
d.Use the same space no matter what the character
e.Are Serif fonts only

Everything a computer does, from helping you to edit a photograph to displaying a


web page, involves ____.
a) A database
b) Spreadsheet functions
c) Creating input streams
d) Manipulating numbers
e) Internal calculations

The plot.ly graph high school exit examination scores in Poland showed:
a. Heaping at the 100% level
b. A sharp decline in the number of students
c. No student scores of 29
d. An odd distribution around the cut-off score of 30
e. All of the above

According to Katz, dis-information is:


a. Unintentionally misleading
b. Not potentially damaging
c. Deliberately not true
d. The same as misinformation
e. Non-critical

Which is the correct sequence followed in Design Thinking?


a. empathise, define, ideate, prototype, test, implement
b. empathise, define, ideate, prototype, implement, test
c. define, empathise, ideate, prototype, test, implement
d. empathise, define, prototype, ideate, test, implement
e. prototype, empathise, define, ideate, test, implement

Design Thinking has ____?


a) 2 overarching constructs
b) 6 overarching constructs with 6 phrases each
c) No place in the modern systems design infrastructure
d) 6 phases
e) This is the correct answer

Gestalt explains grouping of objects using:


a. proximity and size
b. size and colour
c. colour and proximity
d. proximity, size and colour
e. none of these answers is correct

The phrase 'The quick brown fox jumps over the lazy dog' is seen in connection with fonts
because _____.
a. it's long enough to get a good look at the font
b. no animals were harmed in the making of that phrase
c. it contains all 26 letters of the alphabet
d. it shows both UPPER and lowercase characters
e. this is the only correct answer

'Affordance' is defined as _____.


a. the cost of systems development
b. a synonym of effectiveness
c. A visual clue to the function of an object
d. the ease of use on an interface
e. user acceptance testing

Font ‘decoration’ such as bold and italic _____.


a. Use the same font set
b. Are only marginally different from other fonts
c. Are mainly used in graphic design
d. Require an entirely different set of fonts
e. Are not easily designed

Laser printing, the computer mouse, windows, Ethernet and object-oriented


programming were all developed at _____.
a. Microsoft
b. Apple
c. Google
d. Amazon
e. Xerox PARC

Microsoft Access objects include:


a. Forms
b. Tables
c. All of these answers are correct
d. Reports
e. Queries

A necessary ingredient of an Entity-Relationship Diagram is a(n) ____.


a) Report structure
b) User interface
c) Local key
d) Primary Key
e) Query language

Interface design is a form of ___. Much like sign painting


a) Design thinking
b) Processing
c) Signal Processing
d) Communication
e) User Interaction

A system fronted is:


a) A mirror image of the backend
b) Always connected to a database
c) Used for processing
d) Always stored in the cloud
e) Different than a backend.

Design Thinking is?


a. focussed on processing speed.
b. focussed on system efficiency.
c. not focussed on system quality.
d. not used in system design unless the SDLC is the chosen development
method.
e. focussed on the user.

In object-oriented programming, which of the following are considered objects?


a. file folders
b. all of these answers are correct
c. command buttons
d. printer icons
e. a single cell in a spreadsheet

An eight bit byte can store ____ numbers.


a. 255
b. 8
c. 256
d. 64
e. Real

Every table in a database requires a(n) _____.


a. foreign key (FK)
b. one:many relationship
c. many:many relationship
d. CRUD
e. primary key (PK)

In object-oriented programming, the characteristics of objects are referred to as:


a. processors
b. entities
c. properties
d. objects
e. Commands

A large part of Miniaturisation of computing has been driven by:


a) Icons
b) Interfaces
c) Databases
d) Frontends
e) backends

In a database, a 'record' represents a(n) _____.


a. a collection of entities
b. collection of fields describing the entity
c. user interface
d. arbitrary selection of properties
e. thing

In database speak, ACID stands for:


a. Atomicity, Consistency, Isolation, Durability
b. Attention, Creativity, Insulation, Decision
c. Artistry, Creativity, Industry, Drama
d. Assistance, Credibility, Information, Data
e. Absolute, Credible, Information, Data

SDLC might be falling from favour, but ___ organization find comfort in its predicatitly.
a) Bureaucratic
b) Agile development
c) Outsourcing
d) Prototyping
e) User

From where did the ASCII coding scheme used by computers descend?
a. Shannon's entropy
b. RGB colour coding
c. American English alpha codes
d. telegraph codes
e. George Boole's numbering system

The 'magic' behind Tap-and-Go debit and credit cards is provided by:
a. Bluetooth
b. WiFi
c. RFID
d. P2P
e. Near field communication (NFC)

Humans use a "base 10" numbering system modelled after _____.


a. our 10 fingers and toes
b. the metric system
c. the British system of weights and measures
d. the number of planets
e. no other answer is correct

An 'intuitive' interface _____.


a. suggests to the user how to use the system
b. all of these answers are correct
c. makes users feel smart
d. is like a work of art
e. provides visual cues to the function of the system

Chapter 3
An advantage of Software-as-a-Service is _____.
b. no data lock-in[1]

A firm should buy rather than build a system if _______


a. there is sufficient core competence
b. the system is not strategically important
c. the need is for a small, simple ad hoc system
d. they can better manage IP
e. The need is for a large, complex system

The sum of all _____ can be thought of as a collection of possible scenarios related to a
particular goal.
a. database schemas
b. scope documents
c. product backlogs
d. tester protocols
e. use cases

Which of the following is a “ceremony” in scrum?


a) Retrospective
b) Story time
c) All the answers are correct
d) Daily scrum
e) Sprint Planning

User Requirements (URs), Functional Requirements (FRs) and Business Requirements


(BRs) are all facets of?
a) SDLC
b) Product Specifications
c) Databases
d) Scrum
e) Testing

A firm should Build rather than Buy a system if ____.


a) The system has little strategic and/or operational impact
b) Lifespan is short
c) The system is large and complex
d) The firm has limited in-house system expertise
e) Industry, market, competition and business practices are volatile

Which of the following are system conversion methods?


a)pilot
b) verification
c) maintenance
d) design
e) inception

Which system conversion method is the least risky?


a) Parallel
b) Phased
c) Plunge
d) Pilot
e) Design

Self sourcing refers to systems created by______


a. A dedicated in house development function or team
b. A software vendor who work inside proprietary software
c. In house workers in a functional area which will benefit from the system
d. An outside agency that is brought into the firm
e. Software as a service provided over the internet

Which of the following are benefits of prototyping?


a. design acceptance
b. delivery speed
c. none of these answers is correct
d. user testing
e. cost

Which of the following are benefits of prototyping?


a. resource allocation
b. cost certainty
c. valuable user feedback early and often
d. time to value
e. feature creep

FOMO stands for?


a. faster output more output
b. none of these answers is correct
c. first outputs moderate objections
d. fear of missing out
e. friend of my significant other

Which of the following is a phase of the Rational Unified Process (RUP or UP)?
a. Elaboration
b. Inception
c. Transition
d. all of these answers are correct
e. Construction

Which of the following is a responsibility of the Scrum role "Team Member"?


a. Self-organising to get all of the necessary work done
b. completing user stories to incrementally increase the value of the product
c. Owns the "how to do the work" decisions
d. All of these answers are correct
e. Avoids siloed "not my job" thinking

A disadvantage of self-sourcing is _____.


Select one:
a. lack of documentation
b. privacy
c. security
d. cost
e. all of these answers are correct

A disadvantage of customised off the shelf software is


a) Delivery time
b) Wasted time on protecting IP
c) Vendor viability risk
d) Time to value
e) Cost
A disadvantage of insourcing is____
a. Data lock-in
b. Scalability
c. cost
d. Data confidentiality
e. Risk is transferred to the owner

Which of the following are weaknesses of prototyping?


a) Cost certainty
b) Developer attachment to the prototype
c) Design lock in
d) Pilot Phases
e) Repeated user feedback

An advantage of Custom Developed Software is


a) A low cost
b) No wasted time on protecting IP
c) Quality of the end product
d) Quick time to value
e) Quick delivery time

A disadvantage of Custom Developed Software is _____.


a. quick delivery time
b. low cost
c. difficult requirements process
d. low quality of the end product
e. long time to value

Disadvantage to Software as a Service is __.


a) Risk is assumed by the renter
b) IP protection
c) Scalability
d) Quality
e) Data lock-in

e. cost certainty

How many paths are there to a new system?


b) 11

A useful tool to understand the context of the "Buy vs. Build" question is the _____.
Select one:
a. ROI Optimisation Model
b. Outsourcing Decision Matrix
c. Insourcing Risk Matrix
d. None of these answers is correct
e. Risk Avoidance Schedule (RAS)

THERE SEEM TO BE TWO ANSWERS


A useful tool to understand the context of the "Buy vs. Build" question is the _____.
a. None of these answers is correct
b. Outsourcing Decision Matrix
c. Insourcing Risk Matrix
d. ROI Optimisation Model
e. Risk Avoidance Schedule (RAS)

A _____ is simply a story.


a. use case
b. product backlog
c. sprint review
d. test scenario
e. scrum sprint

There are ___ types of prototyping.


a. Several
b. Two
c. Parallel
d. Eight
e. Four

In-sourcing refers to systems created by _____.


a. A software vendor (such as Microsoft who work inside proprietary software
b. An outside agency that is brought into the firm
c. In-house workers in a functional area which will benefit from the system
d. Software as a service provided over the internet
e. A dedicated in-house development function or team

An advantage of in-sourcing is _____.


a. cost
b. not necessary to train staff
c. time to value
d. risk avoidance
e. IP protection

System quality metrics include ____.


a. Out-sourcing
b. ROI
c. Reliability
d. Stability
e. Strategic alignment

Building-out software forked from the open-source community by firms outside the
organization is a form of:
a.Out-sourcing
b.Self-sources
c.In-sources
d.OSS and SaaS
e.Custom Designed Software

System quality metrics include ____.


a) Sourcing
b) None of these answers is correct
c) SaaS
d) OSS
e) COTS

The Project Management Triangle illustrates that _____.


a. A system that attempts to balance speed, economy and quality will satisfy
none
b. If speed and economy are emphasised, quality will suffer
c. If quality and economy are emphasised, speed will suffer
d. All of these answers are correct
e. If speed and quality are emphasised, economy will suffer

Which of the following is a step in the “risk mitigation” process?


a. Identify ways to reduce risks
b. All of these answers are correct
c. Assess the vulnerability of critical assets to specific threats
d. Identify, characterise and assess threats
e. Determine the risk (the specifics of impact and likelihood)

Which of the following is a Scrum "role"?


a. Developer
b. Database Architect
c. Product Owner
d. Tester
e. Prototyper

Scrum is a(n) _____.


a. none of the other answers is correct
b. type of prototyping
c. like yoga only less stressful
d. specific set of rules to follow when practising agile software
development
e. flavour of SDLC

In the SDLC the cost of finding and fixing errors _____.


a) Remains stable with each phase
b) Spikes during the testing phase
c) Is reduced to zero once the design phase is complete
d) Rises with each phase
e) Falls with each phase

In the SDLC the ____ phase comes ___ the ___ phase.
a) Design/before/testing and verification
b) Inception and feasibility/before/requirements analysis
c) Maintenance and evaluation/after/implementation and integration
d) All of these answers are correct
e) Coding and development/after/requirements

A firm should Buy rather than build a system if ___


a. There is plenty of time to get it right
b. They can better manage IP
c. The system has little or no strategic or operational impact
d. The need is small, ad hoc system
e. The need is for a small, simple ad hoc system

According to a McKinsey/Oxford University study, on average, large systems


development projects deliver __
a. No tangible value to the organisation
b. 75% more value than projected
c. 56% less value than projected
d. Enough value to pay for themselves
e. All the value projected, and then some

The “Composite Risk Index” tool multiplies the ___ of risk by the ___ of risk, yielding
a composite score. Select one:
a. assessment/factor
b. potential/product
c. mitigation/outcome
d. probability/impact

An advantage of self-sourcing is ___


a. Focus on core competence
b. Low risk
c. IP protection
d. It meets user requirements
e. Data confidentiality

Which of the following is a Scrum artefact?


a) Product Owner
b) Prototyper
c) Developer
d) Tester
e) Product Backlog

The Business Requirements (BRs) are a _____.


a. list of "feature creep" warnings
b. list of "scope creep" warnings
c. roughly sequential set of top-level things that a system should accomplish
d. list of functional requirements
e. wish list from customers

Feature creep occurs when _____.


a. developers include functionality in software that is outside the original broad mandate of
the system
b. users demand feedback loops in systems
c. prototyping resumes following testing
d. developers add small incremental features to systems beyond what was included in
the initial specifications
e. the SDLC risk falls below the prototyping risk

Which of the following is part of the scrum role of “scrum master”?


a) Coach
b) Impediment Bulldozer
c) Facilitator
d) Expert and Adviser
e) All of these answers are correct

Out-sourcing refers to systems created by _____.


Select one:
a. a software vendor (such as Microsoft) who work inside proprietary software
b. an outside agency that is brought into the firm
c. a dedicated in-house development function or team
d. in-house workers in a functional area which will benefit from the system
e. software as a service provided over the internet

Which of the following are principles of Agile?


a) Individuals and interactions over professes and tools
b) Customer collaboration over contract negations
c) All of these answers are correct
d) Working software over comprehensive documentation
e) Responding to change over following a plan

"Includes" and "Extends" are elements of?


a. SDLC
b. Agile
c. Scrum
d. Product Owner
e. Prototyping

The Project Management Triangle in the textbook has a(n) _____ in the centre.
a. overlap of two elements
b. Jolly Roger
c. risk strategy
d. economy, quality and speed metric
e. quality metric

A firm should buy rather than build a system if_


a. The system has little or no strategic or operational impact
b. There is plenty of time to get it right
c. the need is for a small, simple and hoc system
d. the need is for a small, ad hoc system

A firm should build rather than buy a system if _____.


a) The system has little or no strategic or operational impact
b) There is plenty of time to get it right
c) Lifespan is long
d) There is a tight delivery timeline
e) The firm has limited in-house systems expertise

Components of a UML diagram include?


a) System boundary
b) Actor(s)
c) All of these answers are correct
d) Includes and extends
e) Associations

In Scrum, the “task board” has how many columns?


a. beer is a good dietary source of iron
b. None
c. as many as required
d. Get over it man. Column is just a “concept”.
e. Three
In Scrum, there can be confusion about ____ unless there is agreement beforehand:
a) Doneness
b) Ownership
c) Testing
d) Roles
e) Sprints

In Scrum, the “burn chart” is an artefact that can be seen as a___.


a. Progress chart
b. Turnover music
c. speed of execution of algorithms
d. Database metric

Scope creep occurs when___.


a. Develops include functionality in software that is outside the original broad
mandate of the system
b. the SDLC fails to get sign-off
c. develops add small incremental features to systems
d. Developers include user feedback loops in systems
e. Prototyping falls in an infinite loop

An advantage of Customised Off-the-Shelf Software is _____.


a. time to value
b. cost
c. in-house expertise
d. ability to protect IP
e. quality

The broad "buy" category in system acquisition includes _____.


Select one:
a. using in-house resources to develop a system
b. creating a system from the ground up
c. the answers beginning with an 'x' are correct
d. x - buying from outside the organisation
e. x - renting from outside the organisation

An advantage of Software-as-a-Service is _____.


Select one:
a. risk is transferred to the vendor
b. no data lock-in
c. lack of scalability
d. IP protection
e. data confidentiality

Lean might be described as _____.


a. Agile on steroids
b. a developer's nightmare
c. being identical to the SDLC except for the cost of fixing errors
d. prototyping meets the SDLC
e. knowing "what" to build without knowing what to build

Transparency, Availability and Recoverability are _____.


a. SDLC stages
b. Scrum artefacts
c. system quality metrics
d. Agile principles
e. ROI metrics

UML stands for?


a. Understood Mission Language
b. Unified Modelling Language
c. Undiscovered Murphy's Laws
d. Unidentified Metric List
e. None of these answers is correct

Prototyping is a ____method
a) Plunge
b) Agile
c) Adaptive
d) Prescriptive
e) Not quite waterfall and not quite agile

An advantage of outsourcing is:


a) Allows firm to focus on its core competence
b) Scalability
c) Data lock0in
d) Lack of data confidentiality
e) IP Protection

The SDLC is a ____ method


a. Agile
b. In house
c. scrum
d. Waterfall
e. Prototype

In comparing the SDLC and prototyping, prototyping is _____ than the SDLC _____.
a. worse / when developers are using unfamiliar technology
b. worse / when audit trails and multi-level sign-off are critical
c. worse / when user requirements are poorly understood
d. better / when continuous management buy-in is critical
e. better / when projects are complex

In comparing the SDLC and prototyping, the SDLC is _____ than prototyping _____.
a. worse / when scope creep and feature creep need to be managed
b. worse / when developers are using familiar technology
c. better / when delivery timelines are tight
d. better / when user requirements are poorly understood
e. better / when audit trails and multi-level sign-off are critical

The "sprint backlog" is a Scrum artefact that serves as _____.


a. none of these answers is correct
b. the team's "to do" list
c. the product backlog
d. a burn chart
e. an impediment bulldozer

Agile and SDLC are _____.


a. identical in their underlying structure
b. system conversion methods
c. in competition at the next summer games
d. polar opposites
e. quite similar to prototyping

When Deloitte wrote in 2014 that "The applications and the staff that build them can
become valuable competitive assets and valuable intellectual property that are best
protected in-house." they were referring to what? Select one:
a. the difference between COTS and CDS
b. the struggle between risk acceptance and risk avoidance
c. the importance of respecting IP
d. the value of building systems in-house (in-sourcing)
e. the necessity of strategic alliances in the digital age

Which of the following is a phase of the Rational Unified Process (RUP or UP)?
Select one:
a. Construction
b. Inception
c. Transition
d. all of these answers are correct
e. Elaboration

Transparency, Availability and Recoverability are _____.


a. Scrum artefacts
b. ROI metrics
c. Agile principles
d. system quality metric
e. SDLC stage

Chapter 4
Strategic alignment is critical in an organisation as otherwise _____ is/are wasted.
a. onions
b. resources
c. buyer power
d. supplier power
e. competitive advantage

A superiority gained by an organization when it can provide the same value as its
competitors but at a lower price, or can change higher prices by providing greater
value through differentiation. ____ results from matching ____ to the opportunities.
a) None of these answers are correct
b) Competitive advantage / Core competencies
c) Sales / Revenue
d) Revenue / Sales
e) Value / Competition

Which type of system supports primary and secondary activities in the firm’s value
chain?
a) Coca-Cola machine
b) Decision Support System
c) Executive Information System
d) Management Information System
e) Transaction Processing System

The biggest challenge to fixing the siloed organisation is _____.


Select one:
a. a general lack of resources
b. the lack of an enterprise-wide data store
c. the lack of a transaction processing system
d. difficulty getting senior management buy-in
e. latency in top-level decision making

In an average organisation, action is carried out predominantly by?


a) People
b) Technical staff
c) Operational staff
d) Executive information systems
e) Machines

In the average organisation, ___ is the domain of senior management.


a) Decision
b) Context creation
c) Measurement
d) Information
e) Knowledge

ICT can provide competitive advantage to a firm, but such advantage is _____.
a. not sustainable
b. tiny
c. complicated
d. negative
e. annoying

According to Porter, Supplier and Buyer Power are ____.


a) Nonsense
b) Competitive advantages
c) Opposites
d) Strategic imperatives
e) Equal

According to Porter, ___ is/are not the same as ____.


a) The threat of substituion/competition
b) Strategy/tactics
c) The value chain/the supply chain
d) Competition / Strategy
e) The threat of new entrants/competition

Which type of system supports primary and secondary activities in the firm's value
chain?
a. Decision Support System
b. Management Information System
c. Coca-Cola machine
d. Executive Information System
e. Transaction Processing System

Which of the following participate in corporate governance?


a. BoD (Board of Directors)
b. all of these answers are correct
c. Creditors, auditors and regulators
d. Shareholders
e. Managers and other employees who make decisions affecting the corporation
Which of the following are governance types?
a. Triopoly
b. IT Monarchy
c. Federal System
d. IT Anarchy
e. all of these answers are correct

The Alignment Trap shows that most firms are in the _____ quadrant.
a. IT-enable Growth
b. Competitive Advantage
c. Broccoli
d. Well-oiled IT
e. Maintenance Zone

Cost, complexity and granularity of data are ___ as we move ___ the organisational
ladder in an average organisation
a) Decrease/up
b) Remain static/up
c) Increase/down
d) Increase/up
e) Remain static/down

In an organisation, _____ is/are pushed down and _____ is/are pushed up.
a. tactics / strategy
b. competition / buyer power
c. good people / incompetent idiots
d. supplier power / buyer power
e. strategy / outcomes

In terms of business intelligence in an average organisation, which domain is


concerned with synthesis of information?
a. executives
b. middle management
c. technical staff
d. tactical staff
e. kitchen staff

____ shoulder much of the load in the measurement activity for the average
organization
A. Humans
B. Decision Support systems (DSS)
C. Sensors
D. Senior management
E. Tactical staff
Porter’s ____ forces
A. Sustainable
B. Corporate
C. Five
D. Financial
E. Competitive

Decision Support Systems are used by?


A. All employees in modern organizations
B. Lower to middle management
C. Senior management
D. Strategists
E. Board of directors

If a supplier can arbitrarily set a price for the goods and/or services it provides, the
supplier is said to have _____.
a) Competitive advantage
b) Supplier power
c) A good value proposition
d) Differentiation
e) Buyer power

A set of articulated goals for a person, an organisation or a firm, along with a plan
specifying how to get there, is _____.
A. Competitive advantage
B. Non-sense
C. Unattainable
D. Strategy
E. Tactics

If you locate your steel mill in close proximity to raw materials you are likely to have a
___?
A. Optimal supply chain
B. Efficient value chain
C. Lower market share
D. Competitive advantage
E. First mover advantage

Senior managers in the average firm make _____ decisions than do middle
managers
a. More unstructured
b. Less complicated
c. Fewer unstructured
d. More structured
e. More mixed

American Airlines was able to sustain a competitive advantage by introducing _____


in the 1960s.
a. Yield management systems
b. Variable rate fares
c. Outsourced systems
d. Hot-in-flight meals
e. Y2K fixes

If a customer can negotiate the price of admission to a movie, the customer is said to
have ____.
a. Plenty of resources
b. Competitive advantages
c. Buyer power
d. Competition
e. Supplier power

VRIO stands for:


a. Vulgar, reprehensible, ignorant, objective
b. Versatile, reusable, independent, objective
c. Valuable, resourceful, independent, operation
d. valuable , rare, inimitable, organisationally available
e. Value, retail, immutable, ordinary

Organisations need to remain internally compliant with their own ICT standards and
practices in addition to those imposed upon it by the law or local regulations,
including:
a. All of the above
b. EU Data protection directive
c. Sarbanes Oxley-Act
d. PIPEDA
e. Bill 198

BYOD (Bring Your Own Device) is often credited with _____.


a. Causing trouble in the workplace
b. Not being enterprise friendly
c. Consuming a lot of resources
d. Being the start of the shadow IT phenomenon
e. Blocking resource allocation decisions

Enterprise systems take care of much of the complexity of matching people with
functions in an organisation by using _____.
a. What if analysis
b. Strategic analysis systems
c. Role-based access to pertinent data
d. Chocolate as a reward
e. Decision support systems

______ drives the Productivity Frontier outwards


a. Threat of new entrants
b. Competition
c. Knowledge and accumulated technology (best practices)
d. Supplier power
e. Buyer power

_____ is the decision-rights and policy-making for corporate data, while ____ is the
tactical execution of those policies
a. Data governance / data management
b. Sarbanes-Oxley / PIPEDA
c. Donald Trump / Hilary Clinton
d. BoD / shareholders
e. Competitive advantage / renewable resource

In an average organisation, action is carried out predominantly by?


a. Operational staff
b. Executive information systems
c. People
d. Technical staff
e. Machines

The most popular governance type for input Decisions is ___


a. Federal
b. Feudal
c. Burger king
d. Anarchy
e. Duopoly

In the average organisation, __ decisions are most often made by ____


a. structured/ senior managers
b. bad/smart people
c. Mixed/operational staff
d. unstructured/senior managers
e. structured/middle managers

___ refers to what you or your firm or organisation is particularly and specifically
really good at.
a. Competitive advantage
b. Sales optimisation
c. First mover advantage
d. Core competency
e. Value chain

In the business intelligence domain of the average organisation, the acquisition


phase correlates with ___ and ___
a. Context creation and decision
b. Data collection/storage and information
c. Data acquisition and data collection
d. Buying a round for the team and being late for dinner
e. Measurement and data acquisition

Decision Support Systems are used by?


a. strategists
b. all employees in modern organisations
c. lower to middle management
d. senior management
e. Boards of Directors

Big Data is often described as having which three characteristics?


a. velvet, vital, voucher
b. vacuum, Viking, vacancy
c. no three characteristics could possible do it justice it's so awesome
d. valve, vivid, verify
e. volume, variety, velocity

Strategy and tactics _____.


a. all of these answers are correct
b. are necessary in an organisation
c. are both English words
d. affect different employee groups
e. are related

ICT can provide competitive advantage to a firm, but such advantage is _____.
a. not sustainable
b. annoying
c. complicated
d. negative
e. tiny

Enterprise Systems take care of much of the complexity of matching people with
functions in an organisation by using _____.
a. strategic analysis systems
b. decision support systems
c. What if analysis
d. role-based access to pertinent data
e. chocolate as a reward

Organisations need to remain internally compliant with their own ICT standards and
practices in addition to those imposed upon it by the law or local regulations,
including:
a. PIPEDA
b. Sarbanes-Oxley Act
c. EU Data Protection Directive
d. Bill 198
e. all of these answers are correct

In the average organisation, _____ decisions are most often made by _____.
a. structured / senior managers
b. structured / middle managers
c. mixed / operational staff
d. bad / smart people
e. unstructured / senior managers

Aligning firm with ICT strategy is considered to be _____.


a. improbable
b. impossible
c. optimal
d. nonsensical
e. simple

Which type of system operates at the very bottom of the organisation?


a. Executive Information System
b. all these answers are correct
c. Decision Support System
d. Management Information System
e. Transaction Processing System

Chapter 5
1.Using life table analysis, the author of your textbook estimated that by the time you are 18
years of age, you will have spent _____ on social media.
a. nearly 1/4 of your waking hours
b. over $5,000 (CDN) on internet usage fees
c. the equivalent of time spent to earn a master's degree
d. 228 full, 24-hour days
e. the equivalent of one year in school
2.A _____ is a function that is used to map (create a path) from digital input data of arbitrary
(random) size to digital output data of a fixed (known and predictable) size.
Select one:
a. blockchain
b. algorithm
c. PKI
d. hash
e. Bitcoin

3. _____ is synchronous and _____ is asynchronous.


Select one:
a. email / Twitter
b. live radio / email
c. car radio / transistor radio
d. Facebook / Snapchat
e. broadcasting / narrowcasting

4.Of the main reasons people use social media, the one not mentioned in research is:
a. data seeking and sharing
b. diversion
c. creating meaning from our experiences
d. social interaction
e. marketing one's personal brand

5.According to Canadian law, consumers have _____ in terms of data gathering.


a. no protection from survey organisations
b. the right to sue organisations which do not offer BOGO promotions
c. all of these answers are correct
d. the same rights as business
e. the right to privacy with respect to data gathered by commercial enterprises

6. "Computer-mediated technologies that allow the creating and sharing of information,


ideas, career interests and other forms of expression via virtual communities and networks."
is one definition of?:
a. the introduction of email in 1994
b. None of these answers is correct.
c. the internet
d. the Productivity Paradox
e. social media

7.According to the infographic in the text, social networking accounts for _____ of all media
time spent online.
a. a tiny minority
b. the vast majority
c. none
d. 28%
e. all
8.The phrase "A process or set of rules to be followed in calculations or other problem-
solving operations, especially by a computer." defines?
a. an algorithm
b. database
c. programming
d. combinatorial mathematics
e. blockchain

9. According to Sondergaard, "_____ is not where the value is. _____ is where the real
value lies."
a. big data / algorithm
b. algorithm / blockchain
c. social media / big data
d. blockchain / big data
e. this is the only correct answer coz none of the others is anywhere near correct

10._____ is the time it takes for an electronic signal to move from point A to point B.
a. lag
b. stream speed
c. latency
d. algorithm
e. Big Mac Integer

11. Which of the following sources of data are covered by Canada's privacy legislation?

a. age, height, weight, medical records, blood type

b. income, purchases, spending habits

c. email addresses and messages; IP addresses

d. Social Insurance Number (SIN)

e. all of these answers are correct

12.Between _____ % and _____ % of the time people spend on the Internet while at work has
nothing to do with work.

a. 10 / 20

b. 60 / 80

c. 50 / 60

d. 30 / 40

e. 5 / 10
13.According to research, _____ use social media more often than _____, but the _____ gap is
closing.

a. females / males/ gender

b. males / females / gender

c. students / workers / employment

d. immigrants / domestic / gender

e. the elderly / youth / age

14.PIPEDA stands for:

a. Protected Internet Principles for Environmental and Digital Activity

b. Personal Internet Privacy Entertainment and Digital Access

c. Perpetual Interconnected Pipeline for Education Direction and Action

d. This is the best answer

e. Personal Information Protection and Electronic Documents Act

16.According to some, the Productivity Paradox will be resolved:

a. when productivity indicators are standardised

b. blockchain technology becomes more mainstream

c. when spending matches output

d. with the passage of time

e. when pigs fly

17. The Productivity Paradox refers to

a. This is the only correct answer.

b. Flattening of productivity increases as ICT capital expenses were increasing

c. No change in productivity when computing became affordable

d. Increasing productivity with more careful ICT spending

e. Increasing productivity with increasing ICT spend


19.Social media operate in a _____ fashion.

a. dialogic (many sources to many sources)

b. bipartisan (both parties equally)

c. asynchronous (not same time)

d. blockchain (distributed ownership of content)

e. monologic (one source to many consumers)

20. The Digital Divide can occur:

a. at the macro level only

b. only in underserviced areas

c. in fewer than 10 minutes

d. at any aggregation from neighbourhood to nation

e. within any industry

22.Did the advent of email improve productivity?

a. Not one bit.

b. Yes. We do more communicating now than ever before.

c. Yes.

d. Email, no. Twitter, yes.

e. Maybe, if junk mail is deleted.

23. Dunbar's Number refers to:

a. the size of the human subcortex

b. this is the only correct answer coz none of the others is anywhere near correct

c. the amount of time people spend on social media

d. the maximum number of nodes in a blockchain

e. the optimal size of human personal groups

25.Blockchain can be used to effect transactions in:

Select one:

a. gold
b. automobiles

c. real estate

d. art works

e. all of these answers are correct

26. British anthroplogist Robin Dunbar determined that the optimal size of human social groups
is around _____ persons.

a. 30

b. 1000

c. 600

d. there is not optimal group size

e. 150

28. The very first "roaming" experiences were provided by _____ and _____.

a. broadcasting / narrowcasting

b. car radio / transistor radio

c. Twitter / Periscope

d. National Hockey League / Ontario Hockey League

e. television / radio

29.Tethering in the ICT sense means?

a. bandwidth restrictions on upload/download

b. there is no relationship between tethering and ICT

c. the existence of a digital divide

d. the requirement that the support be physically connected to something in order to


exchange content

e. that it is necessary to provide a place to hitch your horse in front of the saloon and/or hotel

33.The Digital Divide refers to the gap between _____ and _____ in terms of access to the internet
and modern computing.

a. firm / industry

b. haves / have nots


c. WiFi / wired

d. none of these answers is correct

e. supply / demand

34.Digital signatures use _____ and _____.

a. an algorithm / a blockchain

b. a private key / a public key

c. big data / internet of things

d. a blockchain / big data

e. social media / big data

38.In the world of Finance, _____ has/have replaced the day trader on the stock exchange floor.

a. blockchain

b. social media

c. algorithms

d. all of these answers (including this one) are correct

e. big data

39.Complete the following phrase: "_____ changes the way individuals and large organizations
communicate. These changes are the focus of the emerging field of technoself studies."

a. The selfie

b. Asynchronous communication

c. Social media

d. Vitamin C

e. Narrowcasting

40.Which team beat the Oshawa generals for the Memorial Cup in 1965-66?

a. Edmonton Oil Kings

b. St. Catherine's Black Hawks


c. Shawinigan Bruins

d. Nobody beat them! The Generals won the whole thing.

42. According to the infographic in the text, _____ of people rely on Twitter or Facebook for their
morning

a. 70% of Facebook users

b. a small minority

c. 80% of Twitter users

d. a majority

e. 16%

46.Of the main reasons people use social media, the one not mentioned in research is:

a. diversion

b. social interaction

c. data seeking and sharing

d. creating meaning from our experiences

e. marketing one's personal brand

48. The single biggest impact of ICT in the near future will be provided by:

a. big data

b. asynchronous communication

c. social media

d. blockchains

e. algorithms

49.The Canadian statute which, in part, requires that data be collected "by fair and lawful means" is

a. PIPEDA

b. The Fair Use Doctrine

c. The Fair and Lawful Means Act of 1994


d. The Canada Privacy Act

e. There is no such law

50. Blockchains hide the identity of participants behind _____.

a. social media

b. digital signatures

c. firewalls

d. algorithms Incorrect

e. Databases

51. Robert Solow's 1987 quip, 'You can see the computer age everywhere but in the productivity
statistics.' refers to:

Select one:

a. None of these answers is correct. Incorrect

b. The introduction of email in 1994

c. The Productivity Paradox

d. The advent of the wireless internet

e. The slowdown in ICT spend in post-1980s North America

52.Younger people, in making marketing or strategic decisions, tend to assume that:

a. everyone has access to the Internet

b. all of these answers are correct

c. people don't take security and privacy seriously

d. everyone knows how to use the Internet

e. wants to use modern computing tools

53.In or around 1999, _____ in developed countries used the internet whereas _____ in developing
countries did so.

a. Individuals / firms

b. Almost all / almost none

c. 24% / 1%

d. The young / the elderly


e. None of these answers (except this one) is even remotely correct

56.In the context of a live sporting event a “support might be”:


a. All of these are correct (twitter feed, periscope, television, radio)

57. The privacy interests of employees of federally- regulated organisations are_____:


a. protected only if their municipality has privacy legislation
b. not protected by PIPEDA
c. covered by various provincial legislative acts
d. protected by PIPEDA
e. not considered important under federal privacy Acts

58. According to the infographic in the text, users between the ages of 15-19 spend _____
hours/day on social media.
a. 15
b. .5
c. 3
d. 1
e. 9

60. Did the advent of email improve productivity?


a. Yes. We do more communicating now than ever before. Incorrect
b. Yes.
c. Maybe, if junk mail is deleted.
d. Email, no. Twitter, yes.
e. Not one bit.

65. The Digital Divide can occur:


a. only in underserviced areas Incorrect
b. in fewer than 10 minutes
c. within any industry
d. at the macro level only
e. at any aggregation from neighbourhood to nation

69.
Younger people, in making marketing or strategic decisions, tend to assume that:
a. everyone has access to the internet
b. all of these answers are correct
c. people don't take security and privacy seriously
d. everyone knows how to use the internet
e. wants to use modern computing tools

Crew Challenge Reports (Long Answers on Exam)


Week 2-Chapter 1:

Privacy and Security


● What data should OHIP collect from Ontarians?
● What Value will OHIP derive from collecting the data you propose? Why would they
want this data?
● What value will Ontario residents derive from allowing OHIP to collect their data?
Why might they say no?

6 Areas of Data

1.Administrative - Who, what, when & where


•Birth certificate; driver’s licence; SIN card; CU Card; Bus pass; Health card…
2. Commercial, personal & government surveillance - Who, when & where
•Traffic cameras; video in stores, casinos, government offices; satellite; police
scanners; GPS on phone (crosses boundary into personal comm below)…
3. Personal communication - Where, when, who & how
•GPS on phone; text messaging; cell phone calls; wi-fi connection; Bluetooth;
NFC; email
4. Commercial transactions - Where, who, how & what
•Trip booking online (Via; Porter; taxi…) purchases using Interac or credit
card; funds e-transfer; using reward cards (Air Miles; Shoppers; etc…)
5. Social media - Where, when, who & what
•LinkedIn; FB; Twitter; Pinterest – you know them all!
6. Personal browsing - Where, when, who, how & what
•URLs of site to which you browse hoping that it’s private but it’s not… ever…

➔ Who owns personal data


➔ Does increasing privacy really mean less utility from data?
➔ Should you be paid for granting access to your data?

❖ Data Brokers
❖ What does this data communicate? - who, what, when, where, why, how?

Week 3-Chapter 2:
Sensors and Beacons
● What data do you recommend our client collect with their sensor’s and or beacons?
● What actions will be taken based on data collection?
● How will our client achieve their goals using your recommendations
Sensors listen and watch for things to happen, then they store, transmit or act upon the data
received. Their context is fixed thus they can create the information required for action from
the data they gather

Beacons announce their presence and look for a response. They are continuously yakking
either “I’m here!” or “Here I am!”. They can take actions such as opening an app on a
smartphone. They can store and transmit “hit data”

➢ Business intelligence (BI) designers: The ability to turn all of that [big data]
information into stuff the executive suite, marketing, and other non-technical business
units can actually understand and use. (PowerPoint achieved popularity for a reason,
people.) Enter BI designers.
Data comes in various forms:
1. Digital (numbers only; including binary, decimal and others)
2. Textual (letters and numbers – alphanumeric)
3. Visual
4. Aural
5. Other sensory (touch, smell)
***All can be represented, with varying degrees of accuracy and fidelity, in digital form = as
numbers

➢ Big data is data that is so voluminous and (often) so unstructured that it can’t be
stored in traditional ways or analysed using traditional database technology…
Big data is often described using the Three Vs
1. Volume – the sheer amount of big data is almost unfathomable – the total collected
amount from big bang to 2003 is now created every two days

2. Variety – the sources of big data are broad and growing every day – and so is data
exhaust, which we’ll explain in a subsequent slide

3. Velocity – the speed with which it is generated, and thus must be consumed, is
phenomenal. Big data can quickly go stale

4. •IBM suggests adding Viability (the inherent ability of the data to provide the
information we seek – feasible to obtain and to sustain) and Value (does the analysis
of the data actually lead to “needle-moving” information? Correlation <> causation).
***I suggest adding Veracity to the definition (and more than just precision – do the data
also reliably and validly give insight into some underlying dimension of interest).
Big data represents, or is releasing, a nervous system for the planet
•Massively redundant perspectives and layers and views and observations
•Consider that sight, sound, smell, taste and touch each provide a redundant perspective, in
varying degrees, of the same phenomenon – elements of the same experience-Same thing
is happening with big data
**Context is the last remaining dimension separating us from the machines
•The ability to understand a situation through analysing and synthesising input from various
sources and from it, creating a sense of the situation and what action can and should be
taken. (Think of a fire situation… the redundant clues..)(Think of a car, parking itself-What’s
the context of that? What things need to be captured and understood in order for that to
happen?)
•Now think of a vehicle driving itself… and of a system that would stay out of your way until
you need it, and then would offer the help you need in the context in which you find yourself

Benefits of Big Data:


● Small data is expensive – it needs to be managed – data like your credit card
statement or your phone bill
● Big data is almost free is you consider the volume
● Sometimes if you can’t get good small data, tons of big data will do instead (For
example if your bank tells you that you have “Approximately $4,000 in your
account…” that’s not good enough small data information. This is transaction data
and must be accurate.) But if a GPS tells you that at your current rate of speed in the
current traffic conditions “You will arrive at your destination in approximately 40
minutes…” that’s a good enough big data approximation – to know exactly would be
nearly impossible (predicting the future) but in this case, an approximation is
adequate

Correlation vs Causation
•Big data can tell you THAT but not WHY
•Big data provides correlation with no guarantee of causation – but often that’s good enough
•Walmart puts Pop Tarts next to the cash when a hurricane is predicted in USA – people
stock up on Pop Tarts before a natural disaster
•Big data can tell you that… and it tells Walmart and other retailers how to alter their
purchasing and supply chain to take advantage
•Who knows why and, for retailers, who cares? It’s just a fact THAT people behave this
way…

Prediction:Predict an impending riot based on real-time analysis of changes in the


behaviour and patterns of crowds •Field of Computational Social Science

Week 4- Chapter 3:
Autonomous Vehicles…. Question was about how they can break into the market, or
something….
Buy or Build?
Our client needs a new system to address the new challenge/opportunity they face.
● The system requirements are:
➔ Large and complex
➔ Strategically important
➔ Not required immediately
➔ Proprietary and secret
➔ impacts a large number of functions
➔ Long life span
➔ No need for external compliance
➔ In a fast paced industry
● Should they buy or build?
● If buy, which type of buy? Rent or own. If they build, what type of build? (are there
many?)
● What are the risks and benefits of your choice?

What sparks the need for a new (to the firm) system?
1.Either an opportunity or a challenge
▪Something new presents itself as an opportunity for the firm
▪Something existing changes and requires a response
2.The ROI on an existing system is declining (as measured at the margins of the system)

Week 5:

NFC Automation
● Create a minimum 4 step sequence that would execute as you walk into the room
● Explain why this sequence would save time and effort for students
● What additional things could you do with NFC to enhance the classroom experience?

Database
● Using schema notation, create a four table database design (including FACULTY and
DEPARTMENT) to support the aforementioned requirements. Make sure that
relationships are implemented through the appropriate existence of foreign keys
● List 5 potential reports that could be created using your proposed database design
from above.

NFC

❖ Near field communication (NFC) is a short-range wireless connectivity technology


standard for communication between electronic devices. It descended from RFID.

❖ NFC is possible when two NFC-enabled devices or a read-capable device and an


NFC tag come to within a few centimetres of each other.

❖ Electronic wallets and tap-enabled cards

•Near Field Communication (NFC) is a wireless technology that allows the transfer of data
such as a web address, text or numbers between two NFC devices. An NFC Tag is one
such device and is essentially a small microchip containing a small amount of memory
attached to an antenna/aerial and which is capable of transferring that data to another NFC
device.
•Usually, this information is stored in a specific data format (NDEF - NFC data exchange
format) so that it can be reliably read by most devices and mobile phones.
•Smartphones equipped with NFC can be paired with NFC tags or stickers which can be
programmed by NFC apps to automate tasks such as changing phone settings, text creation
and sending, app launching, or any number of commands to be executed, limited only by the
NFC app and other apps on the smartphone. For example, you may choose to store a URL
(web address) or a telephone number or an instruction to pass to an app on a smartphone.
Of all major brands, currently only iPhone is not NFC-enabled except for Apple Pay.
Database Schema Notation:

❖ We could document these two tables as:


❖ CREW(CrewID, CrewName)

❖ EMPLOYEE(EmpID, CrewID, EmpFName, EmpLName, EmpSalary)

❖ Note the addition of the PK from the ‘1 side’ as an FK to the ‘Many Side’

❖ With this structure we could generate reports:

❖ List all crews and all their associated employees

❖ For a specified crew list all employees

❖ For a specified employee list which crew they are in

Week 6:

Requirements
● Assess the likelihood of the requirements not being implemented (with rationale)
● Assess the impact on the system if the requirements were not implemented (with
rationale)
● Provide a recommendation to the client on the feasibility of creating a successful
system.

Risk

User Stories

➢ Typically follow the format:

➢ As <type of user>, I want <some goal> so that <some reason>

➢ Can be written at many levels of detail

➢ As a user I want to back-up my entire hard drive so that I won’t lose important data

➢ As a power user, I want to specify files or folders to backup based on file size, date
created and date modified so that I can streamline my backup management

➢ Anyone can write user stories and they can be written throughout the project
➢ User stories get fleshed out through discussion among team members

➢ User stories have emerged as the best and most popular form of Product Backlog
items in Scrum

Business Requirements

❖ Through discussion of the user story, business requirements emerge. Still high level
but map to a story

❖ Business Requirements (BR) are a sequential list of high-level requirements that a


system must fulfil. BR are the top-level things that the system must allow and
accomplish.

❖ We can list BR with a # associated, the # representing a rough sequence of activities


in using the system
Example of BR (Business Requirements) from the text:
1. BR1: Professors must be able to log into the system
2. BR2: Students must be able to log into the system
3. BR3: Students must be able to buy products
4. BR4: Sales of products must be recorded along with other contextual variables
5. BR5: The system must be able to decide who gets bonus marks and who doesn't
6. BRn ...

Week 7-Chapter 4:

Porters 5 Forces
● Use Porter's 5 forces to assess the viability of opening one or many stores in ottawa
● Discuss ways in which ICT be used to create a competitive advantage in the tech
industry. Can a competitive advantage be sustainable? Why or Why not

Sharing Economy
● Choose up to two models for our client to participate in the sharing economy
● Describe the way in which they participate
● Detail the benefits of your choice

Competitive Advantage

➔ Michael Porter is perhaps the best known of all the business strategy gurus
➔ You will most likely come across his work again in your academic and professional
career

➔ Porter has identified five competitive forces that shape every for-profit industry and
market

➔ The 5 Forces (P5F) are a strategy tool for use by a firm in an industry to assess and
position itself in terms of the dynamics of an industry
➔ It can be used to a) identify appealing (and profitable) industries in which to enter, b)
identify opportunities to manipulate and alter the forces within an existing industry to
be more favorable.

Threat of New Entrants

❖ From economics we know that profitable industries attract competition until there is
not profit left.

❖ But, in reality, barriers to entry often keep this from happening, and thus protect
incumbent profits
➢ Economies of scale can make it difficult for new companies to achieve
sufficient profit in order to justify entry
➢ Consumer switching costs – brand loyalty, or other forms of lock-in can
make it difficult for consumers to switch to a new competitor's product
➢ Regulatory barriers can protect incumbents by making entry more difficult

➢ Access to distribution or supplier channels can be difficult for new


entrants

The Bargaining Power of Buyers

➢ Relative to the seller, the more powerful the buyer, the more influence the buyer has.
➢ Large buyers in small markets can mean the seller has only a small number of
buyers to purchase product/service. Those buyers have power and can set price, etc.
➢ If the buyer is very large, they could backward integrate and become a competitor.

Threat of Substitutes

● Substitutes are other products that offer similar function or satisfy similar needs.
Substitutes can therefore draw buyers away from:
○ Price – lower priced substitutes
○ Quality – substitutes of greater or even lesser quality
○ Ease of switching – buyers can easily replace current product with the
substitute
● Substitutes are not competitors. Substitutes are different products/services from
different industries that can satisfy the same needs.

Bargaining Power of Suppliers

➔ Relative to a buyer, the more influence the seller has, the more power the supplier
will have.
◆ Concentrated or limited supply (few suppliers)
◆ Switching costs can lock in buyers to the firm
◆ Powerful supplier can forward integrate and become a producer

Competitive Rivalry Among Existing Firms


❖ The structure of the current rivalry among firms can impact the profit potential of a
market
➢ Number of companies in the market (not a great predictor since sometimes
there can be two bitter rivals or many smaller players or any mix)
➢ Historical and potential industry growth potential

➢ Exit barriers (switching costs for firms) can keep competitors locked in, even
if they become less profitable

VRIO: Valuable, Rare, Inimitable and Organisationally available

Productivity Frontier:
- What’s important about the frontier is that it’s constantly moving outwards and
technology is driving that movement
- Previously impossible value/price pairs are now commonplace (witness the evolution
of smartphones over the past 10 years)
- Thus the judicious use of ICT can lead to short-lived competitive advantage in most
industries

Governance-Making Decisions
- Alignment assumes that all players understand each other’s needs and that
resources are appropriately apportioned
- Governance does not make decisions, rather it sets rules for making decisions

➔ What decisions need to be made?

➔ Who makes each decision (decision right?)

➔ Who has input to each decision (input right)?

➔ How are being going to be held accountable for the decisions they
make?

IT resource allocation decision models


1 .Business monarchy: A group of, or individual, business executives (i.e., CxOs).
May include CIO.
2 .IT monarchy: Individuals or groups of IT executives.
3. Feudal: Business unit leaders, key process owners or their delegates.
4. Federal: C-level executives and at least one other business group (CxO or
business unit leaders). ICT execs may or may not be included.
5. IT Duopoly: ICT execs and one other group (CxOs or business unit leaders)
6. Anarchy: Each individual user.

Sharing Economies
● Growth in sharing systems has particularly been fueled by the Internet, with its rise of
social media systems, which facilitate connections between peers eager to share
their possessions. The central pride of collaborative consumption is simple: Obtain
value from untapped potential residing in goods that are not entirely exploited by their
owners.

● The speed of growth with which sharing systems have spread suggests that the
sharing economy might represent a serious threat to established industries, due to
fewer purchases and consequent distress in conventional markets.

● The Internet has made sharing enormously simpler. And for consumers, it seems to
hold the potential to unite cost reduction, benefit augmentation, convenience and
environmental consciousness in one mode of consumption. Companies therefore
should understand and manage this emergent system in order to adapt current and
future business models to provide new sources of revenues within this growing area
of the economy.

● In a broad sense, sharing can be anything to which access is enabled through


pooling of resources, products or services.
Botsman and Rogers (What’s Mine Is Yours: The Rise of Collaborative Consumption) have
divided sharing into three main types.
1. Product service systems, which allow members to share multiple products that are
owned by companies or by private persons. Examples of product-service systems
are car-sharing services like Zipcar and peer-to-peer sharing platforms such as the
website us.Zilok.com. And clothes rental is coming! (http://ohrentme.co.nz/)
2. Redistribution markets, peer-to-peer matching or social networks allow the re-
ownership of a product. Examples of redistribution markets include the online
platform thredUP.com (not in Canada).
3. Collaborative lifestyles in which people share similar interests and help each other
with less tangible assets such as money, space or time; mostly enabled through
digital technology. Examples range from garden sharing (https://sharedearth.com/) to
skill-sharing systems like Taskrabbit (taskrabbit.com – quite alive!).

● There is an environmental argument for the sharing economy: The more we share,
the fewer of Earth’s resources will be consumed, creating a more efficient and
sustainable mode of consumption.

● However, evidence suggests that the proliferation of sharing — also known as


collaborative consumption — does not entirely stem from ecological awareness or
ideological motivations. In fact, research suggests that the major consumer
motivation is self-oriented. Specifically, consumers prefer the lower costs that the
leading companies in the sharing economy tend to provide.

● That’s good news for companies looking for novel opportunities within the sharing
economy. It means that managers can promote products and services in the realm of
collaborative consumption in much the same way that they promote traditional
products: by persuading consumers about the merits of the overall value proposition.
Models

1. Sell the use, not the product


➔ Maybe even give the product away and sell the service or the parts or ingredients

➔ inkjet printers are a good example; almost free printer but the ink costs big

➔ Lease sets of tools with built in maintenance

2. Support customers in attempts to resell your products


❖ Create a platform to bring buyers and sellers together

❖ Take a cut as a brokerage fee

❖ Use expertise in the marketplace to add value to the transactions

❖ Examples:
➢ Ikea (2010 in Sweden) – portal for used Ikea furniture

➢ Patagonia Common Threads partnership with eBay

➔ Immediate branding win for the companies

➔ What could be better for a company trying to brand itself as sustainably minded than
to foster an initiative that is so clearly at odds with the sale of new products?

➔ A second benefit for Patagonia was similar to the one Ikea found with its used
furniture marketplace. Customers, easily able to sell their old apparel for cash, now
had both liquidity and closet space to buy and accommodate new items from
Patagonia

3. Take advantage of unused resources and capacities

➔ Share existing assets and capacities. This is an especially promising strategy when
particular assets cannot be acquired by everyone due to the large amount of capital
associated with owning them – such as big expensive machinery used in farming,
mining and manufacturing or for short-term projects.

4. Provide repair and maintenance services

➔ Companies that have expertise in repair and maintenance can participate in the
sharing economy by renting that expertise to consumers. What’s more, the more
people share a product, the more that product is used, which increases the need for
repair and maintenance services.

➔ Examples:
◆ FedEx TechConnect (repair tech stuff from expertise maintaining their own
tech stuff)
◆ Best Buy’s Geek Squad – also synergy in selling new products

5. Align with peer-to-peer sharing as a platform to promote products and services to


potential customers.

➔ Ex. Swap parties to exchange high-fashion clothes


◆ Originated in New York and London. People who preferred swapping clothes
to constantly buying new things.
◆ People trade in their used clothes, shoes or accessories for chips to buy
items from their peers.

➔ Such exchanges are typically managed by peers or other institutions. But companies
can benefit by sponsoring such parties.
◆ Connect with their target audience and at the same time promote their
products and services.

6. Find entirely new business models based on the sharing economy

➔ The previous five how to adapt to collaborative consumption. What else is possible?
◆ Kuhleasing.ch, a cow-leasing website. Decreasing milk prices and the end of
a cheese export union challenged Swiss farmers. A farmer started leasing
his cows instead of solely selling the cheese.
● Pay a fee to sponsor a cow for a season. Get a photo of the cow and
a certificate, plus the option to visit the farm to help out as a volunteer
or to watch the daily farm work. Guarantees a special price for a
minimum purchase of cheese from that cow.
◆ The Wine Foundry enables anyone to make their own wine by providing
tools and assistance.
● Offers a full range of services, from fruit sourcing to label design.

➔ Customers pay to access assets that they can’t own or manage for themselves.
◆ Attract customers oriented toward collaborative consumption.

Week 8- Chapter
Facial Recognition Software:

1. How could our client (McDonald’s) make use of Facial Recognition


Technology in their business model?

2. Outline the benefits.

3. Specify the risks and possible downside to using such technology.


Core lists and selective
lists for each chapter

Possible Lists for Questions


Week 1- Chapter 1
Six Sigma methods among others, and to specifically embrace the following functionality:

1) Visualize - functions and processes

2) Measure - determine the appropriate measure to determine success

3) Analyze - compare the various simulations to determine an optimal improvement

4) Improve - select and implement the improvement

5) Control - deploy this implementation and by use of user-defineddashboards monitor


the improvement in real time and feed the performance information back into the
simulation model in preparation for the next improvement iteration

6) Re-engineer - revamp the processes from scratch for better results

Week 2- Chapter 2
The 6 Ts of Context

Component Short description Comments

Time When in time a context occurs.


Time is implied in every context and
makes every context unique.
Terroir Place of occurrence, broadly
Geographic terroir is implied in
defined. every context. While context must
happen somewhere, the notion of
terroir also includes environmental
factors attendant upon the location,
such as temperature, light
conditions, humidity, wind speed,
noise, etc.

Team What agent(s) (interpretersThere must obviously be at least


and/or decision makers), one agent present to constitute a
whether human, natural or context. The notion of validation is
mechanical, are present at also
this important. Actors' identities
place and time. must be verifiable.

Trail The historical trail leading up


Necessary
to as all contexts depend
the context. on previous contexts to provide
Teams, Tools and Tasks.

Task The target or trajectory of the


Not always necessary to have a
context. task at hand, other than simply
survival.

The technology present at the


Tools are necessary to interpret the
time and place of occurrence.
context. Tools are broadly defined
as everything from a single dendrite
Tools in our nervous system which
propogates a minute change in
temperature all the way up to the
Large Hadron Collider. Tools such
as our senses are necessary in
order to establish context.
Something must be measured.

Week 3- Chapter 3 (buy, build, plunge, waterfall)

Week 4- Chapter 7 (nfc list-selective)

Week 7- Chapter 4

Decision-making Structures
The most common decision-making structures in large organisations are:
1. IT-only committees composed of senior IT leaders from different areas such
as infrastructure and application development

2. process teams made up of IT members and business/IT relationship


managers - those with a stake in the outcome

3. IT councils composed of business and IT executives

4. executive or senior management committees which provide ongoing


business leadership and involvement in IT — often referred to as a steering
committee - the ICT function needs to have a seat on this committee

5. architecture committees - to decide on what the firm's infrastructure will look


dlike, which will determine the direction ICT takes

6. capital approval committees - a more generic and not ICT-specific model

&&&
the six different models of how decisions about ICT are made:
1. Business monarchy: A group of, or individual, business executives (i.e.,
CxOs). May include CIO.
2. IT monarchy: Individuals or groups of IT executives.
3. Feudal: Business unit leaders, key process owners or their delegates.
4. Federal: C-level executives and at least one other business group (CxO or
business unit leaders). ICT execs may or may not be included.
5. IT Duopoly: ICT execs and one other group (CxOs or business unit leaders)
6. Anarchy: Each individual user.

was someone not done writing theirs out?


Role-based visibility of resources is _____.
Select one:

a. easily effected in enterprise software


b. an issue for senior managers
c. not possible in large organisations
d. too complex to manage
e. not as tasty as a nice garden salad
Cost, complexity and granularity of data all _____ as we move _____ the organisational ladder in
an average organisation.
Select one:

a. increase / up
b. remain static / down
c. increase / down
d. remain static / up
e. decrease / up

Management Information Systems (MIS) can provide important _____ as they contain rolled-up
data.
Select one:
a. links

b. insights
c. context
d. data
e. decisions

You might also like