Professional Documents
Culture Documents
Info Systems Test Notes
Info Systems Test Notes
Chapter 1
Which of the following is a pillar among the three pillars of ICT?
a. Tangible vs. ethereal
b. Data, Information & knowledge
c. Communications technology platform
d. Return on IT investment
e. Service-based economies
For a business to be viable, the ____ must eventually be greater than the ____.
a) Cost of output/value of output
b) Value of output/cost of output
c) Value of input/cost of output
d) Value of output/cost of inputc
e) Cost of input/value of output
The shift from a goods economy to a knowledge economy has increased the
importance of
a) Intangibles
b) Education
c) Manufacturing
d) Tangibles
e) Financial analysis
Industrialized countries have seen _____ as a proportion of all jobs since at least the
1930’s:
a) A decline in service jobs
b) An increase in manufacturing jobs
c) A steady rise in both manufacturing and service jobs
d) A decline in manufacturing jobs
e) A steady decline in both manufacturing and service jobs.
A variable such thing as Chevrolet, Ford, Ferrari, or Male or Female is at what level
of measurement?
a) Ordinal
b) Interval
c) Nominal
d) Location
e) Alphabetic
Effectiveness is:
a) doing the thing right
b) doing the right thing
c) the opposite of efficiency
d) the same as efficiency
e) not possible to measure
A doctor, a lawyer and a statistician are on a hunting trip. What does the statistician
say?
a) Got him!
b) Darn, we missed.
c) Take another shot!
d) Where did he go?
e) I am a mean deviate.
Which of the products below has the highest price per pound?
a) Mercedes Benz E-class
b) Pentium III chip
c) Gold
d) Hot rolled steel
e) Viagra
The service sector in Canada represents a(n) ______ part of GDP compared with
manufacturing:
a) Smaller
b) Larger
c) Shrinking
d) Equal
e) integral
Data is ____ ____ in a context(whats the difference between a,b and e?):
a. Useful if
b. Useless except
c. Always located
d. Never located
e. Both a and b are correct
"The economic landscape of the present and future is no longer shaped by physical
flows of material goods and products but by ethereal streams of data, images and
symbols." This quote refers to what is called the:
a. Knowledge Economy
b. Digital Economy
c. Information Society
d. Experience Economy
e. All of the above are correct
The two potential impacts ICT can have on value creation are:
a. Input augmenter and output reducer
b. Input enhancer and value enhancer
c. Output reducer and input enhancer
d. Output reducer and input enhancer
e. Input reducer and output enhancer
a) Scientists
b) Engineers
c) Media workers
d) Designers
Communication is:
a. Unrelated to information
b. Post-information
d. What humans do
e. Secondary to measurement
The shift to a services-based economy has been fuelled and facilitated by:
b. ICT
The degree to which repeated measurements under unchanged conditions show the
same results is:
a. Accuracy
b. Precision
c. Trueness
d. Accuracy and precision
e. Precision and trueness
b. Always required
c. Not necessary
Data is:
a. Pre-information
b. Post-information
c. Unrelated to measurement
d. The same as information
e. Never in context
Which of the products below has the lowest price per pound?
a. Mercedes Benz E-class
b. Pentium III chip
c. Gold
d. Hot rolled steel
e. Viagra
If Sir John A. Macdonald were transported to today, he would suffer from a lack of_____?
a) Common language
b) Common decency
c) Exformation
d) Blended whiskey
e) Culture
Artificial Intelligence researchers have given up trying to create rules for machines to
teach them to recognize objects. Instead, they are now _____.
a) Using the “tabula rasa” approach
b) Teaching the machines through code-based algorithms
c) Allowing machines to discover objects in the wild
d) Hiding the context of discovery and allowing machines to create their own
e) Showing machines large quantities of pictures of an object with a label
and allowing the machines to make their own rules
Author Victor Hugo and his publisher exchanged messages consisting of which of
the two characters below?
a) ? and !
b) ? and $
c) $ and Y
d) ? and N
e) Y and N
The sentence “models, policies, rules or standards that govern which data is collected and
how it is stored, arranged, and put into use in a database system and or organization”
describes
a. Data architecture
b. Systems development
c. Information
d. Exformation
e. Latency
In the physical sciences the ____ associated with a situation is the measure of the degree of
randomness
a. Latency
b. Entropy
c. variation
d. Exformation
e. Excelleration
a) 2 years
b) 2 days
c) 10 years
d) 2 minutes
e) 5 days
b) Alert
c) Filter
d) Reject
e) Retransmit
a) Interpretation/structure
b) Organization/understanding
d) Messaging/understanding
a) Circumstance
b) Setting
d) Network
a. Information
b. Non-information
c. un-information
d. Disinformation
e. exformation
The hardware cost (in 2013 USD) to compute at the rate of 1 GFLO has dropped
from ____ to ____ between 1961 and 2015.
a) 6 million
b) 8.3 million
c) 83 trillion
a. a problem of latency
b. Exformation
c. information
d. not numerical
e. Good enough
a. Environment
b. legacy system
c. informational matrix
d. context
e. frame of reference
b) The Matrix
c) Marketing studies
e) Geo-fencing
a. Re-information
b. b. Information
c. c. Disinformation
d. d. Un-information
e. e. Non-information
a) Cheaper
b) Lighters
c) Less functional
e) More independent
a. Task
b. Time
c. Terrior
d. Trail
e. Tools
a. Content
b. Tool
c. Vacuum
d. Task
e. Terrior
The operating system (iOS, Windows, Android) function to assemble and package
data for transport is referred to as _____.
a. packaging
b. assembly
c. marshalling
d. concatenation Incorrect
e. email
The feedback loop in the knowledge creation process can also be thought of as?
a. exformation
b. experience
c. new information
d. context
e. wisdom
Nescience is _____:
a) Context
b) Content
c) The scientific method
d) The utter absence of knowledge
e) The step before learning
Because we care both that messaging is occurring and what is being massaged
a.Shannon is our man
b.Neither Weiner nor Shannon were right about information
c.Both Weiner and Shannon were wrong about entropy
d.Weiner is our man
e. Business needs a new model of information flows
Sustainable competitive advantage differs from simple competitive advantage in that it is _____.
a. Full of holes
b. Valuable
c. Indestructible
d. Regular
e. Persistent
Broadly speaking, _____ represents the highest level of decision making, involving basic
questions of status, financial viability, strategy, and compliance within an organisation.
a. Strategic imperatives
b. Corporate governance
c. Competitive advantage
d. The board of directors
e. Tactics
A superiority gained by an organization when it can provide the same value as its competitors but
at a lower price, or can charge higher prices by providing greater value through differentiation.
_____ results from matching _____ to the opportunities.
a. None of these answers is correct
b. Competitive advantage / core competencies
c. Sales / revenue
d. Value / competition
e. Revenue / sales
Kianu Reeves and Lawrence Fishburn starred in what iconic 1999 thriller?
a. The Matrix
b. Integers Gone Wild!
c. Latency be damned
d. Whose bits are they anyways?
e. Seinfeld
Facts are?
a. information
b. measurement
c. metrics
d. knowledge
e. data
ICT impacts or is impacted by how many of the 11 discrete areas of the knowledge creation
process?
a. all 11
b. each of the 11 except for the contexts
c. only the 4 between the inner contexts
d. none - ICT cannot directly impact knowledge creation
e. what knowledge creation process?
Chapter 7
A system ‘backend’ provides:
a) Processing power
b) Permanent storage
c) Database management
d) RAM
e) Local storage
The primary key from one table, when included in another table becomes _____
a.One:one relationship
b.Loose key
c.Foreign key
d.Native key
e.Liability
When area codes (ACs) were being assigned in North America, the rule was?
A. No area code could start with 1
B. No area code could start with 0
C. All of these answers are correct
D. States/provinces with only one AC within their boundary were assigned an AC with a
0 as the middle number
E. Numbers were assigned based on population
An interface is a(n):
a) A system concept
b) Process system
c) Meeting place
d) Analog construct
e) Database entity
b. Dictionary
c. building directory
d. contact list
e. TV schedule listing
a. attribute
b. Entity
c. relationship
d. foreign key
e. primary key
The correct order of Network Communication Layers from top to bottom is:
b. is not represented
d. cannot be changed
e. is easily changed
The plot.ly graph high school exit examination scores in Poland showed:
a. Heaping at the 100% level
b. A sharp decline in the number of students
c. No student scores of 29
d. An odd distribution around the cut-off score of 30
e. All of the above
The phrase 'The quick brown fox jumps over the lazy dog' is seen in connection with fonts
because _____.
a. it's long enough to get a good look at the font
b. no animals were harmed in the making of that phrase
c. it contains all 26 letters of the alphabet
d. it shows both UPPER and lowercase characters
e. this is the only correct answer
SDLC might be falling from favour, but ___ organization find comfort in its predicatitly.
a) Bureaucratic
b) Agile development
c) Outsourcing
d) Prototyping
e) User
From where did the ASCII coding scheme used by computers descend?
a. Shannon's entropy
b. RGB colour coding
c. American English alpha codes
d. telegraph codes
e. George Boole's numbering system
The 'magic' behind Tap-and-Go debit and credit cards is provided by:
a. Bluetooth
b. WiFi
c. RFID
d. P2P
e. Near field communication (NFC)
Chapter 3
An advantage of Software-as-a-Service is _____.
b. no data lock-in[1]
The sum of all _____ can be thought of as a collection of possible scenarios related to a
particular goal.
a. database schemas
b. scope documents
c. product backlogs
d. tester protocols
e. use cases
Which of the following is a phase of the Rational Unified Process (RUP or UP)?
a. Elaboration
b. Inception
c. Transition
d. all of these answers are correct
e. Construction
e. cost certainty
A useful tool to understand the context of the "Buy vs. Build" question is the _____.
Select one:
a. ROI Optimisation Model
b. Outsourcing Decision Matrix
c. Insourcing Risk Matrix
d. None of these answers is correct
e. Risk Avoidance Schedule (RAS)
Building-out software forked from the open-source community by firms outside the
organization is a form of:
a.Out-sourcing
b.Self-sources
c.In-sources
d.OSS and SaaS
e.Custom Designed Software
In the SDLC the ____ phase comes ___ the ___ phase.
a) Design/before/testing and verification
b) Inception and feasibility/before/requirements analysis
c) Maintenance and evaluation/after/implementation and integration
d) All of these answers are correct
e) Coding and development/after/requirements
The “Composite Risk Index” tool multiplies the ___ of risk by the ___ of risk, yielding
a composite score. Select one:
a. assessment/factor
b. potential/product
c. mitigation/outcome
d. probability/impact
The Project Management Triangle in the textbook has a(n) _____ in the centre.
a. overlap of two elements
b. Jolly Roger
c. risk strategy
d. economy, quality and speed metric
e. quality metric
Prototyping is a ____method
a) Plunge
b) Agile
c) Adaptive
d) Prescriptive
e) Not quite waterfall and not quite agile
In comparing the SDLC and prototyping, prototyping is _____ than the SDLC _____.
a. worse / when developers are using unfamiliar technology
b. worse / when audit trails and multi-level sign-off are critical
c. worse / when user requirements are poorly understood
d. better / when continuous management buy-in is critical
e. better / when projects are complex
In comparing the SDLC and prototyping, the SDLC is _____ than prototyping _____.
a. worse / when scope creep and feature creep need to be managed
b. worse / when developers are using familiar technology
c. better / when delivery timelines are tight
d. better / when user requirements are poorly understood
e. better / when audit trails and multi-level sign-off are critical
When Deloitte wrote in 2014 that "The applications and the staff that build them can
become valuable competitive assets and valuable intellectual property that are best
protected in-house." they were referring to what? Select one:
a. the difference between COTS and CDS
b. the struggle between risk acceptance and risk avoidance
c. the importance of respecting IP
d. the value of building systems in-house (in-sourcing)
e. the necessity of strategic alliances in the digital age
Which of the following is a phase of the Rational Unified Process (RUP or UP)?
Select one:
a. Construction
b. Inception
c. Transition
d. all of these answers are correct
e. Elaboration
Chapter 4
Strategic alignment is critical in an organisation as otherwise _____ is/are wasted.
a. onions
b. resources
c. buyer power
d. supplier power
e. competitive advantage
A superiority gained by an organization when it can provide the same value as its
competitors but at a lower price, or can change higher prices by providing greater
value through differentiation. ____ results from matching ____ to the opportunities.
a) None of these answers are correct
b) Competitive advantage / Core competencies
c) Sales / Revenue
d) Revenue / Sales
e) Value / Competition
Which type of system supports primary and secondary activities in the firm’s value
chain?
a) Coca-Cola machine
b) Decision Support System
c) Executive Information System
d) Management Information System
e) Transaction Processing System
ICT can provide competitive advantage to a firm, but such advantage is _____.
a. not sustainable
b. tiny
c. complicated
d. negative
e. annoying
Which type of system supports primary and secondary activities in the firm's value
chain?
a. Decision Support System
b. Management Information System
c. Coca-Cola machine
d. Executive Information System
e. Transaction Processing System
The Alignment Trap shows that most firms are in the _____ quadrant.
a. IT-enable Growth
b. Competitive Advantage
c. Broccoli
d. Well-oiled IT
e. Maintenance Zone
Cost, complexity and granularity of data are ___ as we move ___ the organisational
ladder in an average organisation
a) Decrease/up
b) Remain static/up
c) Increase/down
d) Increase/up
e) Remain static/down
In an organisation, _____ is/are pushed down and _____ is/are pushed up.
a. tactics / strategy
b. competition / buyer power
c. good people / incompetent idiots
d. supplier power / buyer power
e. strategy / outcomes
____ shoulder much of the load in the measurement activity for the average
organization
A. Humans
B. Decision Support systems (DSS)
C. Sensors
D. Senior management
E. Tactical staff
Porter’s ____ forces
A. Sustainable
B. Corporate
C. Five
D. Financial
E. Competitive
If a supplier can arbitrarily set a price for the goods and/or services it provides, the
supplier is said to have _____.
a) Competitive advantage
b) Supplier power
c) A good value proposition
d) Differentiation
e) Buyer power
A set of articulated goals for a person, an organisation or a firm, along with a plan
specifying how to get there, is _____.
A. Competitive advantage
B. Non-sense
C. Unattainable
D. Strategy
E. Tactics
If you locate your steel mill in close proximity to raw materials you are likely to have a
___?
A. Optimal supply chain
B. Efficient value chain
C. Lower market share
D. Competitive advantage
E. First mover advantage
Senior managers in the average firm make _____ decisions than do middle
managers
a. More unstructured
b. Less complicated
c. Fewer unstructured
d. More structured
e. More mixed
If a customer can negotiate the price of admission to a movie, the customer is said to
have ____.
a. Plenty of resources
b. Competitive advantages
c. Buyer power
d. Competition
e. Supplier power
Organisations need to remain internally compliant with their own ICT standards and
practices in addition to those imposed upon it by the law or local regulations,
including:
a. All of the above
b. EU Data protection directive
c. Sarbanes Oxley-Act
d. PIPEDA
e. Bill 198
Enterprise systems take care of much of the complexity of matching people with
functions in an organisation by using _____.
a. What if analysis
b. Strategic analysis systems
c. Role-based access to pertinent data
d. Chocolate as a reward
e. Decision support systems
_____ is the decision-rights and policy-making for corporate data, while ____ is the
tactical execution of those policies
a. Data governance / data management
b. Sarbanes-Oxley / PIPEDA
c. Donald Trump / Hilary Clinton
d. BoD / shareholders
e. Competitive advantage / renewable resource
___ refers to what you or your firm or organisation is particularly and specifically
really good at.
a. Competitive advantage
b. Sales optimisation
c. First mover advantage
d. Core competency
e. Value chain
ICT can provide competitive advantage to a firm, but such advantage is _____.
a. not sustainable
b. annoying
c. complicated
d. negative
e. tiny
Enterprise Systems take care of much of the complexity of matching people with
functions in an organisation by using _____.
a. strategic analysis systems
b. decision support systems
c. What if analysis
d. role-based access to pertinent data
e. chocolate as a reward
Organisations need to remain internally compliant with their own ICT standards and
practices in addition to those imposed upon it by the law or local regulations,
including:
a. PIPEDA
b. Sarbanes-Oxley Act
c. EU Data Protection Directive
d. Bill 198
e. all of these answers are correct
In the average organisation, _____ decisions are most often made by _____.
a. structured / senior managers
b. structured / middle managers
c. mixed / operational staff
d. bad / smart people
e. unstructured / senior managers
Chapter 5
1.Using life table analysis, the author of your textbook estimated that by the time you are 18
years of age, you will have spent _____ on social media.
a. nearly 1/4 of your waking hours
b. over $5,000 (CDN) on internet usage fees
c. the equivalent of time spent to earn a master's degree
d. 228 full, 24-hour days
e. the equivalent of one year in school
2.A _____ is a function that is used to map (create a path) from digital input data of arbitrary
(random) size to digital output data of a fixed (known and predictable) size.
Select one:
a. blockchain
b. algorithm
c. PKI
d. hash
e. Bitcoin
4.Of the main reasons people use social media, the one not mentioned in research is:
a. data seeking and sharing
b. diversion
c. creating meaning from our experiences
d. social interaction
e. marketing one's personal brand
7.According to the infographic in the text, social networking accounts for _____ of all media
time spent online.
a. a tiny minority
b. the vast majority
c. none
d. 28%
e. all
8.The phrase "A process or set of rules to be followed in calculations or other problem-
solving operations, especially by a computer." defines?
a. an algorithm
b. database
c. programming
d. combinatorial mathematics
e. blockchain
9. According to Sondergaard, "_____ is not where the value is. _____ is where the real
value lies."
a. big data / algorithm
b. algorithm / blockchain
c. social media / big data
d. blockchain / big data
e. this is the only correct answer coz none of the others is anywhere near correct
10._____ is the time it takes for an electronic signal to move from point A to point B.
a. lag
b. stream speed
c. latency
d. algorithm
e. Big Mac Integer
11. Which of the following sources of data are covered by Canada's privacy legislation?
12.Between _____ % and _____ % of the time people spend on the Internet while at work has
nothing to do with work.
a. 10 / 20
b. 60 / 80
c. 50 / 60
d. 30 / 40
e. 5 / 10
13.According to research, _____ use social media more often than _____, but the _____ gap is
closing.
c. Yes.
b. this is the only correct answer coz none of the others is anywhere near correct
Select one:
a. gold
b. automobiles
c. real estate
d. art works
26. British anthroplogist Robin Dunbar determined that the optimal size of human social groups
is around _____ persons.
a. 30
b. 1000
c. 600
e. 150
28. The very first "roaming" experiences were provided by _____ and _____.
a. broadcasting / narrowcasting
c. Twitter / Periscope
e. television / radio
e. that it is necessary to provide a place to hitch your horse in front of the saloon and/or hotel
33.The Digital Divide refers to the gap between _____ and _____ in terms of access to the internet
and modern computing.
a. firm / industry
e. supply / demand
a. an algorithm / a blockchain
38.In the world of Finance, _____ has/have replaced the day trader on the stock exchange floor.
a. blockchain
b. social media
c. algorithms
e. big data
39.Complete the following phrase: "_____ changes the way individuals and large organizations
communicate. These changes are the focus of the emerging field of technoself studies."
a. The selfie
b. Asynchronous communication
c. Social media
d. Vitamin C
e. Narrowcasting
40.Which team beat the Oshawa generals for the Memorial Cup in 1965-66?
42. According to the infographic in the text, _____ of people rely on Twitter or Facebook for their
morning
b. a small minority
d. a majority
e. 16%
46.Of the main reasons people use social media, the one not mentioned in research is:
a. diversion
b. social interaction
48. The single biggest impact of ICT in the near future will be provided by:
a. big data
b. asynchronous communication
c. social media
d. blockchains
e. algorithms
49.The Canadian statute which, in part, requires that data be collected "by fair and lawful means" is
a. PIPEDA
a. social media
b. digital signatures
c. firewalls
d. algorithms Incorrect
e. Databases
51. Robert Solow's 1987 quip, 'You can see the computer age everywhere but in the productivity
statistics.' refers to:
Select one:
53.In or around 1999, _____ in developed countries used the internet whereas _____ in developing
countries did so.
a. Individuals / firms
c. 24% / 1%
58. According to the infographic in the text, users between the ages of 15-19 spend _____
hours/day on social media.
a. 15
b. .5
c. 3
d. 1
e. 9
69.
Younger people, in making marketing or strategic decisions, tend to assume that:
a. everyone has access to the internet
b. all of these answers are correct
c. people don't take security and privacy seriously
d. everyone knows how to use the internet
e. wants to use modern computing tools
6 Areas of Data
❖ Data Brokers
❖ What does this data communicate? - who, what, when, where, why, how?
Week 3-Chapter 2:
Sensors and Beacons
● What data do you recommend our client collect with their sensor’s and or beacons?
● What actions will be taken based on data collection?
● How will our client achieve their goals using your recommendations
Sensors listen and watch for things to happen, then they store, transmit or act upon the data
received. Their context is fixed thus they can create the information required for action from
the data they gather
Beacons announce their presence and look for a response. They are continuously yakking
either “I’m here!” or “Here I am!”. They can take actions such as opening an app on a
smartphone. They can store and transmit “hit data”
➢ Business intelligence (BI) designers: The ability to turn all of that [big data]
information into stuff the executive suite, marketing, and other non-technical business
units can actually understand and use. (PowerPoint achieved popularity for a reason,
people.) Enter BI designers.
Data comes in various forms:
1. Digital (numbers only; including binary, decimal and others)
2. Textual (letters and numbers – alphanumeric)
3. Visual
4. Aural
5. Other sensory (touch, smell)
***All can be represented, with varying degrees of accuracy and fidelity, in digital form = as
numbers
➢ Big data is data that is so voluminous and (often) so unstructured that it can’t be
stored in traditional ways or analysed using traditional database technology…
Big data is often described using the Three Vs
1. Volume – the sheer amount of big data is almost unfathomable – the total collected
amount from big bang to 2003 is now created every two days
2. Variety – the sources of big data are broad and growing every day – and so is data
exhaust, which we’ll explain in a subsequent slide
3. Velocity – the speed with which it is generated, and thus must be consumed, is
phenomenal. Big data can quickly go stale
4. •IBM suggests adding Viability (the inherent ability of the data to provide the
information we seek – feasible to obtain and to sustain) and Value (does the analysis
of the data actually lead to “needle-moving” information? Correlation <> causation).
***I suggest adding Veracity to the definition (and more than just precision – do the data
also reliably and validly give insight into some underlying dimension of interest).
Big data represents, or is releasing, a nervous system for the planet
•Massively redundant perspectives and layers and views and observations
•Consider that sight, sound, smell, taste and touch each provide a redundant perspective, in
varying degrees, of the same phenomenon – elements of the same experience-Same thing
is happening with big data
**Context is the last remaining dimension separating us from the machines
•The ability to understand a situation through analysing and synthesising input from various
sources and from it, creating a sense of the situation and what action can and should be
taken. (Think of a fire situation… the redundant clues..)(Think of a car, parking itself-What’s
the context of that? What things need to be captured and understood in order for that to
happen?)
•Now think of a vehicle driving itself… and of a system that would stay out of your way until
you need it, and then would offer the help you need in the context in which you find yourself
Correlation vs Causation
•Big data can tell you THAT but not WHY
•Big data provides correlation with no guarantee of causation – but often that’s good enough
•Walmart puts Pop Tarts next to the cash when a hurricane is predicted in USA – people
stock up on Pop Tarts before a natural disaster
•Big data can tell you that… and it tells Walmart and other retailers how to alter their
purchasing and supply chain to take advantage
•Who knows why and, for retailers, who cares? It’s just a fact THAT people behave this
way…
Week 4- Chapter 3:
Autonomous Vehicles…. Question was about how they can break into the market, or
something….
Buy or Build?
Our client needs a new system to address the new challenge/opportunity they face.
● The system requirements are:
➔ Large and complex
➔ Strategically important
➔ Not required immediately
➔ Proprietary and secret
➔ impacts a large number of functions
➔ Long life span
➔ No need for external compliance
➔ In a fast paced industry
● Should they buy or build?
● If buy, which type of buy? Rent or own. If they build, what type of build? (are there
many?)
● What are the risks and benefits of your choice?
What sparks the need for a new (to the firm) system?
1.Either an opportunity or a challenge
▪Something new presents itself as an opportunity for the firm
▪Something existing changes and requires a response
2.The ROI on an existing system is declining (as measured at the margins of the system)
Week 5:
NFC Automation
● Create a minimum 4 step sequence that would execute as you walk into the room
● Explain why this sequence would save time and effort for students
● What additional things could you do with NFC to enhance the classroom experience?
Database
● Using schema notation, create a four table database design (including FACULTY and
DEPARTMENT) to support the aforementioned requirements. Make sure that
relationships are implemented through the appropriate existence of foreign keys
● List 5 potential reports that could be created using your proposed database design
from above.
NFC
•Near Field Communication (NFC) is a wireless technology that allows the transfer of data
such as a web address, text or numbers between two NFC devices. An NFC Tag is one
such device and is essentially a small microchip containing a small amount of memory
attached to an antenna/aerial and which is capable of transferring that data to another NFC
device.
•Usually, this information is stored in a specific data format (NDEF - NFC data exchange
format) so that it can be reliably read by most devices and mobile phones.
•Smartphones equipped with NFC can be paired with NFC tags or stickers which can be
programmed by NFC apps to automate tasks such as changing phone settings, text creation
and sending, app launching, or any number of commands to be executed, limited only by the
NFC app and other apps on the smartphone. For example, you may choose to store a URL
(web address) or a telephone number or an instruction to pass to an app on a smartphone.
Of all major brands, currently only iPhone is not NFC-enabled except for Apple Pay.
Database Schema Notation:
❖ Note the addition of the PK from the ‘1 side’ as an FK to the ‘Many Side’
Week 6:
Requirements
● Assess the likelihood of the requirements not being implemented (with rationale)
● Assess the impact on the system if the requirements were not implemented (with
rationale)
● Provide a recommendation to the client on the feasibility of creating a successful
system.
Risk
User Stories
➢ As a user I want to back-up my entire hard drive so that I won’t lose important data
➢ As a power user, I want to specify files or folders to backup based on file size, date
created and date modified so that I can streamline my backup management
➢ Anyone can write user stories and they can be written throughout the project
➢ User stories get fleshed out through discussion among team members
➢ User stories have emerged as the best and most popular form of Product Backlog
items in Scrum
Business Requirements
❖ Through discussion of the user story, business requirements emerge. Still high level
but map to a story
Week 7-Chapter 4:
Porters 5 Forces
● Use Porter's 5 forces to assess the viability of opening one or many stores in ottawa
● Discuss ways in which ICT be used to create a competitive advantage in the tech
industry. Can a competitive advantage be sustainable? Why or Why not
Sharing Economy
● Choose up to two models for our client to participate in the sharing economy
● Describe the way in which they participate
● Detail the benefits of your choice
Competitive Advantage
➔ Michael Porter is perhaps the best known of all the business strategy gurus
➔ You will most likely come across his work again in your academic and professional
career
➔ Porter has identified five competitive forces that shape every for-profit industry and
market
➔ The 5 Forces (P5F) are a strategy tool for use by a firm in an industry to assess and
position itself in terms of the dynamics of an industry
➔ It can be used to a) identify appealing (and profitable) industries in which to enter, b)
identify opportunities to manipulate and alter the forces within an existing industry to
be more favorable.
❖ From economics we know that profitable industries attract competition until there is
not profit left.
❖ But, in reality, barriers to entry often keep this from happening, and thus protect
incumbent profits
➢ Economies of scale can make it difficult for new companies to achieve
sufficient profit in order to justify entry
➢ Consumer switching costs – brand loyalty, or other forms of lock-in can
make it difficult for consumers to switch to a new competitor's product
➢ Regulatory barriers can protect incumbents by making entry more difficult
➢ Relative to the seller, the more powerful the buyer, the more influence the buyer has.
➢ Large buyers in small markets can mean the seller has only a small number of
buyers to purchase product/service. Those buyers have power and can set price, etc.
➢ If the buyer is very large, they could backward integrate and become a competitor.
Threat of Substitutes
● Substitutes are other products that offer similar function or satisfy similar needs.
Substitutes can therefore draw buyers away from:
○ Price – lower priced substitutes
○ Quality – substitutes of greater or even lesser quality
○ Ease of switching – buyers can easily replace current product with the
substitute
● Substitutes are not competitors. Substitutes are different products/services from
different industries that can satisfy the same needs.
➔ Relative to a buyer, the more influence the seller has, the more power the supplier
will have.
◆ Concentrated or limited supply (few suppliers)
◆ Switching costs can lock in buyers to the firm
◆ Powerful supplier can forward integrate and become a producer
➢ Exit barriers (switching costs for firms) can keep competitors locked in, even
if they become less profitable
Productivity Frontier:
- What’s important about the frontier is that it’s constantly moving outwards and
technology is driving that movement
- Previously impossible value/price pairs are now commonplace (witness the evolution
of smartphones over the past 10 years)
- Thus the judicious use of ICT can lead to short-lived competitive advantage in most
industries
Governance-Making Decisions
- Alignment assumes that all players understand each other’s needs and that
resources are appropriately apportioned
- Governance does not make decisions, rather it sets rules for making decisions
➔ How are being going to be held accountable for the decisions they
make?
Sharing Economies
● Growth in sharing systems has particularly been fueled by the Internet, with its rise of
social media systems, which facilitate connections between peers eager to share
their possessions. The central pride of collaborative consumption is simple: Obtain
value from untapped potential residing in goods that are not entirely exploited by their
owners.
● The speed of growth with which sharing systems have spread suggests that the
sharing economy might represent a serious threat to established industries, due to
fewer purchases and consequent distress in conventional markets.
● The Internet has made sharing enormously simpler. And for consumers, it seems to
hold the potential to unite cost reduction, benefit augmentation, convenience and
environmental consciousness in one mode of consumption. Companies therefore
should understand and manage this emergent system in order to adapt current and
future business models to provide new sources of revenues within this growing area
of the economy.
● There is an environmental argument for the sharing economy: The more we share,
the fewer of Earth’s resources will be consumed, creating a more efficient and
sustainable mode of consumption.
● That’s good news for companies looking for novel opportunities within the sharing
economy. It means that managers can promote products and services in the realm of
collaborative consumption in much the same way that they promote traditional
products: by persuading consumers about the merits of the overall value proposition.
Models
➔ inkjet printers are a good example; almost free printer but the ink costs big
❖ Examples:
➢ Ikea (2010 in Sweden) – portal for used Ikea furniture
➔ What could be better for a company trying to brand itself as sustainably minded than
to foster an initiative that is so clearly at odds with the sale of new products?
➔ A second benefit for Patagonia was similar to the one Ikea found with its used
furniture marketplace. Customers, easily able to sell their old apparel for cash, now
had both liquidity and closet space to buy and accommodate new items from
Patagonia
➔ Share existing assets and capacities. This is an especially promising strategy when
particular assets cannot be acquired by everyone due to the large amount of capital
associated with owning them – such as big expensive machinery used in farming,
mining and manufacturing or for short-term projects.
➔ Companies that have expertise in repair and maintenance can participate in the
sharing economy by renting that expertise to consumers. What’s more, the more
people share a product, the more that product is used, which increases the need for
repair and maintenance services.
➔ Examples:
◆ FedEx TechConnect (repair tech stuff from expertise maintaining their own
tech stuff)
◆ Best Buy’s Geek Squad – also synergy in selling new products
➔ Such exchanges are typically managed by peers or other institutions. But companies
can benefit by sponsoring such parties.
◆ Connect with their target audience and at the same time promote their
products and services.
➔ The previous five how to adapt to collaborative consumption. What else is possible?
◆ Kuhleasing.ch, a cow-leasing website. Decreasing milk prices and the end of
a cheese export union challenged Swiss farmers. A farmer started leasing
his cows instead of solely selling the cheese.
● Pay a fee to sponsor a cow for a season. Get a photo of the cow and
a certificate, plus the option to visit the farm to help out as a volunteer
or to watch the daily farm work. Guarantees a special price for a
minimum purchase of cheese from that cow.
◆ The Wine Foundry enables anyone to make their own wine by providing
tools and assistance.
● Offers a full range of services, from fruit sourcing to label design.
➔ Customers pay to access assets that they can’t own or manage for themselves.
◆ Attract customers oriented toward collaborative consumption.
Week 8- Chapter
Facial Recognition Software:
Week 2- Chapter 2
The 6 Ts of Context
Week 7- Chapter 4
Decision-making Structures
The most common decision-making structures in large organisations are:
1. IT-only committees composed of senior IT leaders from different areas such
as infrastructure and application development
&&&
the six different models of how decisions about ICT are made:
1. Business monarchy: A group of, or individual, business executives (i.e.,
CxOs). May include CIO.
2. IT monarchy: Individuals or groups of IT executives.
3. Feudal: Business unit leaders, key process owners or their delegates.
4. Federal: C-level executives and at least one other business group (CxO or
business unit leaders). ICT execs may or may not be included.
5. IT Duopoly: ICT execs and one other group (CxOs or business unit leaders)
6. Anarchy: Each individual user.
a. increase / up
b. remain static / down
c. increase / down
d. remain static / up
e. decrease / up
Management Information Systems (MIS) can provide important _____ as they contain rolled-up
data.
Select one:
a. links
b. insights
c. context
d. data
e. decisions