SlideShare a Scribd company logo
1 of 18
1/9
Question 1 4 / 4 points
LO5: What is a packet?
Question 2 4 / 4 points
LO6: What technology is typically used to prevent unwanted
traffic from entering or exiting an
organizations network?
The correct answer is not displayed for Written Response type
questions.
Attempt 1
Attempt Feedback
You did well on most of the essays but there were a number of
the multiple choice questions that
trip you up. Please review and prepare for posttest 2. You got
this, you're almost there.
8 bytes of data
The fundamental unit of data transmitted over the Internet
A network device that connects multiple devices together and
filters packets based on
their destination within the connected devices.
Binary information that can be converted to computational
instructions
Firewall is the technology that is commonly used to prevent
unauthorized traffic from entering
or exiting an organization's network. Firewalls often establish a
barrier between a trusted
internal network and untrusted external network, such as the
internet. Firewalls often work
through monitoring and logging to record events that occur on
or across a network. Firewall
logging ensures that the defined filters or rules are adequate and
functioning as expected. By
monitoring traffic stream through a firewall's filtering scheme,
it is possible to identify the
types of traffic that the firewall should block.
2/4/2020
2/9
View Feedback
Question 3 4 / 4 points
LO7: What does it mean or look like for an organization to
implement a competitive advantage?
The correct answer is not displayed for Written Response type
questions.
Question 4 4 / 4 points
LO10: When developing software, there is a tension known as
the quality triangle. What are the
three components of the quality triangle.
Question 5 4 / 4 points
LO12: A trademark protect all of the following, except:
Question 6 4 / 4 points
LO8: Your current employer, ACME Brick wants to distinguish
themselves from other brick
suppliers by becoming ISO 9001 certified. To do so, your
employer will need to do all of the
When organizations implement competitive advantage, they
establish conditions and
environments that give them an edge over their rivals in the
industry. According to Potter,
there are two major ways in which organizations can attain
competitive advantage: cost
leadership and differentiation strategies. Firms can implement
information systems to
actualize these competitive approaches.
Programming, Time and Quality
Skill, Opportunity and Quality
Time, Quality and Cost
Function, Repeatability and Quality
product
logo
phrase
shape
javascript://
2/4/2020
3/9
following except:
Question 7 4 / 4 points
LO4: A&M-Commerce is developing a relational database with
tables for the following
information.
Student courses
Housing preferences
Affiliation to student organizations
In order to relate this data, what must be present in each of
these tables?
Question 8 4 / 4 points
___Text___
Question 9 4 / 4 points
LO6: The process of logging into an information system using a
user ID and password, followed
by a finger print or eye scan is known as:
Show me where it says that (reference the process
documentation).
Prove that this is what happened (exhibit evidence in
documented records)
Tell me what you do (describe the business process).
Regulate and report (display all federal regulations have been
met and reported)
A foreign key like Social Security Number
A primary key like Student ID
A current address
A student's full name
When designing a database, you have been asked to create a
data type to store first
names. is the datatype you would choose.
Multi-Factor Authentication
Information Security Access Test
Encryption
2/4/2020
4/9
Question 10 3 / 4 points
LO10: As a faculty member for the Lone Star Education
Services (private education organization
with less than 100 employees that focuses on online learning),
you've been placed on a
committee tasked with evaluating Learning Management
Systems. Each system presented has
similar features that encompass the majority of the stated needs
of your organization, with the
turnkey solution checking the most boxes, however the price for
the turnkey Learning
Management System software is upwards of $100,000 per year.
Two additional options are
presented to the committee. An open-source software that does
not cost to license but has a
more limited feature set or you could develop the software in-
house. In general, what would be
the best recommendation based on the information provided?
Option 1 - Turnkey solution,
Option 2 - Open Source with modifications, Option 3 - Develop
In-house. Explain your answer.
The correct answer is not displayed for Written Response type
questions.
View Feedback
Question 11 4 / 4 points
LO11: A company residing in South Korea has recently
partnered with the gaming development
company where you are employed. This partnership provides
many new advantages, from new
talent to a larger workgroup. What potential challenges should
each company consider?
The correct answer is not displayed for Written Response type
questions.
Question 12 0 / 4 points
Access Control
Option 2 (open source with modifications) would be more
prudent than developing an in-
house or opting for a Turnkey solution, which is costly for a
small organization with only 100
employees. By embracing the outsourced with modifications,
the organization can
concentrate, the organization can concentrate its resources on
its core business competencies
while capitalizing on the expertise of other firms that are more
effective and efficient, or more
knowledgeable on the specialized tasks. Further, the open
source with modification options
can provide the organization with access to current technologies
at low costs without the risks
of obsolescence. In so doing, the organization can cut costs by
gaining capabilities without
incurring overhead costs.
There are various potential challenges that each business is
likely to encounter when engaging
in partnerships with foreign firms. For instance, the task of
monitoring and regulating
businesses may be challenging. Such challenges may include
concerns over intellectual
property violations, taxation systems, security concerns, as well
as privacy of each business
entity. Such problems are often rampant in global business
contexts in which laws and ethics
that govern businesses often conflict rather than compliment
each other.
javascript://
2/4/2020
5/9
LO6: When protecting information we want to limit exposure to
the information by restricting
access. This practice is know as:
Question 13 4 / 4 points
Select each stage relevant to the digital divide according to
Jakob Nielsen
Question 14 2 / 4 points
LO12: Facebook is able to harvest a great deal of personal data,
preferences, demographics and
interests from their users for marketing purposes. What are
some ethical concerns with their
data harvesting and how does this impact an organization like
Facebook?
The correct answer is not displayed for Written Response type
questions.
View Feedback
Integrity
Confidentiality
Limited Data
Abailability
empowerment
ethnic
usability
economic
There are various potential ethical concerns related to
Facebook's data harvesting practices.
One such ethical concern is confidentiality. The harvesting of
personal data may spark
confidentiality issues, especially when they are disclosed to
unauthorized parties. Additionally,
data harvesting may spark privacy concerns, especially when
such data are used to track and
monitor the private activities of individuals and groups.
Furthermore, issues such as espionage
and wrong use of data may arise. For instance, some malicious
people may use such data to
commit fraud and crimes, such as impersonating individuals
after gaining access to their
financial and personal information.
javascript://
2/4/2020
6/9
Question 15 0 / 4 points
LO2: Your coworker, Fred, describes an issue he is facing with
his computer. He states that the
computer will start but as soon as he plugs in an external drive
it crashes. He notes that he
installed a new internet browser after he performed a Windows
system update the week before.
Fred blames the crashes on the new internet browsing
application. Select the most accurate
statement below.
Question 16 0 / 4 points
LO2: Which of the following is not a feature of enterprise
resource planning (ERP)?
Question 17 0 / 4 points
LO8: Business process reengineering employs the following
idea;
The application is most likely not the cause of the problem
because the operating
system is responsible for managing the external device and the
application described
does not directly interface with the drive when the crash occurs.
The internet browser application is most likely the problem
because of the timing of the
install and nature of the crashes.
Neither the application or the Windows update installed are
likely to have anything to
do with the crash.
Operating Systems such as Windows provide no direct
communication with external
drives, therefore the application is most likely the culprit of
Fred's recent crashes.
There is only one data source
ERP systems are well suited for small businesses, enabling them
to see immediate cost
savings.
ERP systems are typically costly to implement for large
organizations and may take
multiple years to implement
ERP systems include functionality that covers all of the
essential components of a
business
current processes must be performed on a slimmer scale,
utilizing fewer employees and
reducing overhead
2/4/2020
7/9
Question 18 4 / 4 points
LO9: Who is primarily responsible for keeping information
system projects on time and on
budget?
Question 19 4 / 4 points
Identify which of the following are operating systems and which
would be considered software.
__2__
__2__
__2__
__1__
__1__
1.
2.
Question 20 0 / 4 points
LO9: Explain the role of a database administrator or DBA in an
organization?
technology must be integrated in each business process to fully
leverage the value of an
information system
organizations should blow up their existing processes and
develop new processes that
take advantage of new technology concepts
business tasks should be evaluated and modified slightly for
increased efficiency
Chief Information Officer (CIO)
Database Administrator (DBA)
Project Manager
ERP Manager
Microsoft Word
Clash of Clans
Photoshop
Apple OS X
Microsoft Windows
Operating System
Software
The primary role of the database administrator is to ensure that
organizational data is
available, protected from loss and corruption, and easily
accessible as needed. The key roles
2/4/2020
8/9
The correct answer is not displayed for Written Response type
questions.
View Feedback
Question 21 0 / 4 points
LO 7: A decision support system (DSS) works best with helping
make what sort of decisions?
Question 22 4 / 4 points
LO1: Applying Moore's Law to the following situation, what
assumption can we make. (Moore's
law has been dissipating in recent years but for the sake of this
question, assume that it fully
applies.)
Our IT department has determined that they will need an
additional 5 servers with max
processing power at current technology capabilities. At current
prices the IT department
determines the cost will be about $100,000. We only have
$50,000 in our budget but we are
not in a rush. When are we likely to be able to purchase these
machines and why?
The correct answer is not displayed for Written Response type
questions.
Question 23 4 / 4 points
LO5: What event lead to the first implementation of an
Internet?
may include database system installation and maintenance, data
backup and recovery, data
development and testing, securing database system, as well as
authentication.
Very quick and repetitive decisions (Decisions that need to be
made immediately based
on a known set of inputs)
None of the above
Semi-structured decisions (Most of the factors are known but
human interaction is still
needed)
Complex decisions (Decisions in which machine learning is
necessary to reduce human
error)
Moore's law operates in the assumption that the number of
transistors on a microchip doubles
every two years, although the cost of computers is halved.
According to Moore's law, the
speed and capability of computers is projected to increase every
two years, and people will
pay less for them. This growth is exponential. Currently, the
servers cost $100,000. However,
the price, based on Moore's law is projected to half after two
years. As such, the organization
is likely to afford to buy it at $50,000 after two years, which
will be in 2022.
javascript://
2/4/2020
9/9
Question 24 4 / 4 points
LO1: Which of the following is a role that people play in an
information system?
Question 25 2 / 4 points
LO3: How can data be transformed into something useful like
actionable information? Provide
an example.
The correct answer is not displayed for Written Response type
questions.
Attempt Score:71 / 100 - 71 %
Overall Grade (highest attempt):71 / 100 - 71 %
Done
IBM's mainframe logic center produced more data than they
were capable of storing in
one physical location.
Bill Gates invents an operating system that makes personal
computing a reality.
Apple produces an affordable personal computer known as
Macintosh.
The need to share research by the US governments Advanced
Research Projects Agency
after Russia's surprise launch of Sputnik.
CIO
Database Manager
Programmer
All of the above
The process of converting raw data into actionable information
begins by recognizing different
forms of analytics and gathering the data. Thereafter, the
organization should measure what
matters, put data into context, and determine its benefits to
business.

More Related Content

Similar to Organizational challenges of international partnerships

Focused agile audit planning using analytics
Focused agile audit planning using analyticsFocused agile audit planning using analytics
Focused agile audit planning using analyticsJim Kaplan CIA CFE
 
As an IT analyst for a company providing voting.docx
As an IT analyst for a company providing voting.docxAs an IT analyst for a company providing voting.docx
As an IT analyst for a company providing voting.docx4934bk
 
As an IT analyst for Ballot a company providing.docx
As an IT analyst for Ballot a company providing.docxAs an IT analyst for Ballot a company providing.docx
As an IT analyst for Ballot a company providing.docx4934bk
 
Quality Assurance, Testing, And Implementation
Quality Assurance, Testing, And ImplementationQuality Assurance, Testing, And Implementation
Quality Assurance, Testing, And ImplementationKristen Wilson
 
Using Information Technology to Engage in Electronic Commerce
Using Information Technology to Engage in Electronic CommerceUsing Information Technology to Engage in Electronic Commerce
Using Information Technology to Engage in Electronic CommerceElla Mae Ayen
 
Electronic Commerce
Electronic CommerceElectronic Commerce
Electronic Commerceellamee27
 
Please answer the following questions in essay fashion giving as m.docx
Please answer the following questions in essay fashion giving as m.docxPlease answer the following questions in essay fashion giving as m.docx
Please answer the following questions in essay fashion giving as m.docxmattjtoni51554
 
Introduction to Information Governance and eDiscovery in the Cloud
Introduction to Information Governance and eDiscovery in the CloudIntroduction to Information Governance and eDiscovery in the Cloud
Introduction to Information Governance and eDiscovery in the CloudeDiscoveryConsultant
 
Week 14 Discussion Ethics and Information Management (Click to Read
Week 14 Discussion Ethics and Information Management (Click to ReadWeek 14 Discussion Ethics and Information Management (Click to Read
Week 14 Discussion Ethics and Information Management (Click to Readnicolleszkyj
 
Securing Citizen Facing Applications
Securing Citizen Facing ApplicationsSecuring Citizen Facing Applications
Securing Citizen Facing Applicationsedwinlorenzana
 
Lessons Learned from ELN & LIMS Implementations
Lessons Learned from ELN & LIMS ImplementationsLessons Learned from ELN & LIMS Implementations
Lessons Learned from ELN & LIMS ImplementationsMark Fortner
 
Module 02 Performance Risk-based Analytics With all the advancem
Module 02 Performance Risk-based Analytics With all the advancemModule 02 Performance Risk-based Analytics With all the advancem
Module 02 Performance Risk-based Analytics With all the advancemIlonaThornburg83
 
Posting 1 Reply required for belowBusiness costs or risks of p.docx
Posting 1  Reply required for belowBusiness costs or risks of p.docxPosting 1  Reply required for belowBusiness costs or risks of p.docx
Posting 1 Reply required for belowBusiness costs or risks of p.docxharrisonhoward80223
 
As an IT analyst for Ballot Online, a company providing voting s.docx
As an IT analyst for Ballot Online, a company providing voting s.docxAs an IT analyst for Ballot Online, a company providing voting s.docx
As an IT analyst for Ballot Online, a company providing voting s.docxalisondakintxt
 
Running head PROJECT PLAN INCEPTION1PROJECT PLAN INCEPTION .docx
Running head PROJECT PLAN INCEPTION1PROJECT PLAN INCEPTION .docxRunning head PROJECT PLAN INCEPTION1PROJECT PLAN INCEPTION .docx
Running head PROJECT PLAN INCEPTION1PROJECT PLAN INCEPTION .docxjeanettehully
 
Implementing and Auditing General Data Protection Regulation
Implementing and Auditing General Data Protection RegulationImplementing and Auditing General Data Protection Regulation
Implementing and Auditing General Data Protection RegulationJim Kaplan CIA CFE
 
Semantic Applications for Financial Services
Semantic Applications for Financial ServicesSemantic Applications for Financial Services
Semantic Applications for Financial ServicesDavidSNewman
 
Week Four JournalObjectiveYou will identify key ethical proble.docx
Week Four JournalObjectiveYou will identify key ethical proble.docxWeek Four JournalObjectiveYou will identify key ethical proble.docx
Week Four JournalObjectiveYou will identify key ethical proble.docxalanfhall8953
 
Getting your Strategy Right – in a SMAC World!
Getting your Strategy Right – in a SMAC World!Getting your Strategy Right – in a SMAC World!
Getting your Strategy Right – in a SMAC World!Continuity and Resilience
 

Similar to Organizational challenges of international partnerships (20)

Focused agile audit planning using analytics
Focused agile audit planning using analyticsFocused agile audit planning using analytics
Focused agile audit planning using analytics
 
As an IT analyst for a company providing voting.docx
As an IT analyst for a company providing voting.docxAs an IT analyst for a company providing voting.docx
As an IT analyst for a company providing voting.docx
 
As an IT analyst for Ballot a company providing.docx
As an IT analyst for Ballot a company providing.docxAs an IT analyst for Ballot a company providing.docx
As an IT analyst for Ballot a company providing.docx
 
Quality Assurance, Testing, And Implementation
Quality Assurance, Testing, And ImplementationQuality Assurance, Testing, And Implementation
Quality Assurance, Testing, And Implementation
 
Using Information Technology to Engage in Electronic Commerce
Using Information Technology to Engage in Electronic CommerceUsing Information Technology to Engage in Electronic Commerce
Using Information Technology to Engage in Electronic Commerce
 
Electronic Commerce
Electronic CommerceElectronic Commerce
Electronic Commerce
 
Please answer the following questions in essay fashion giving as m.docx
Please answer the following questions in essay fashion giving as m.docxPlease answer the following questions in essay fashion giving as m.docx
Please answer the following questions in essay fashion giving as m.docx
 
Introduction to Information Governance and eDiscovery in the Cloud
Introduction to Information Governance and eDiscovery in the CloudIntroduction to Information Governance and eDiscovery in the Cloud
Introduction to Information Governance and eDiscovery in the Cloud
 
Week 14 Discussion Ethics and Information Management (Click to Read
Week 14 Discussion Ethics and Information Management (Click to ReadWeek 14 Discussion Ethics and Information Management (Click to Read
Week 14 Discussion Ethics and Information Management (Click to Read
 
Securing Citizen Facing Applications
Securing Citizen Facing ApplicationsSecuring Citizen Facing Applications
Securing Citizen Facing Applications
 
Dell case study
Dell case studyDell case study
Dell case study
 
Lessons Learned from ELN & LIMS Implementations
Lessons Learned from ELN & LIMS ImplementationsLessons Learned from ELN & LIMS Implementations
Lessons Learned from ELN & LIMS Implementations
 
Module 02 Performance Risk-based Analytics With all the advancem
Module 02 Performance Risk-based Analytics With all the advancemModule 02 Performance Risk-based Analytics With all the advancem
Module 02 Performance Risk-based Analytics With all the advancem
 
Posting 1 Reply required for belowBusiness costs or risks of p.docx
Posting 1  Reply required for belowBusiness costs or risks of p.docxPosting 1  Reply required for belowBusiness costs or risks of p.docx
Posting 1 Reply required for belowBusiness costs or risks of p.docx
 
As an IT analyst for Ballot Online, a company providing voting s.docx
As an IT analyst for Ballot Online, a company providing voting s.docxAs an IT analyst for Ballot Online, a company providing voting s.docx
As an IT analyst for Ballot Online, a company providing voting s.docx
 
Running head PROJECT PLAN INCEPTION1PROJECT PLAN INCEPTION .docx
Running head PROJECT PLAN INCEPTION1PROJECT PLAN INCEPTION .docxRunning head PROJECT PLAN INCEPTION1PROJECT PLAN INCEPTION .docx
Running head PROJECT PLAN INCEPTION1PROJECT PLAN INCEPTION .docx
 
Implementing and Auditing General Data Protection Regulation
Implementing and Auditing General Data Protection RegulationImplementing and Auditing General Data Protection Regulation
Implementing and Auditing General Data Protection Regulation
 
Semantic Applications for Financial Services
Semantic Applications for Financial ServicesSemantic Applications for Financial Services
Semantic Applications for Financial Services
 
Week Four JournalObjectiveYou will identify key ethical proble.docx
Week Four JournalObjectiveYou will identify key ethical proble.docxWeek Four JournalObjectiveYou will identify key ethical proble.docx
Week Four JournalObjectiveYou will identify key ethical proble.docx
 
Getting your Strategy Right – in a SMAC World!
Getting your Strategy Right – in a SMAC World!Getting your Strategy Right – in a SMAC World!
Getting your Strategy Right – in a SMAC World!
 

More from aulasnilda

1. Analyze the case and determine the factors that have made KFC a s.docx
1. Analyze the case and determine the factors that have made KFC a s.docx1. Analyze the case and determine the factors that have made KFC a s.docx
1. Analyze the case and determine the factors that have made KFC a s.docxaulasnilda
 
1. A.Discuss how the concept of health has changed over time. B.Di.docx
1. A.Discuss how the concept of health has changed over time. B.Di.docx1. A.Discuss how the concept of health has changed over time. B.Di.docx
1. A.Discuss how the concept of health has changed over time. B.Di.docxaulasnilda
 
1. Abstract2. Introduction to Bitcoin and Ethereum3..docx
1. Abstract2. Introduction to Bitcoin and Ethereum3..docx1. Abstract2. Introduction to Bitcoin and Ethereum3..docx
1. Abstract2. Introduction to Bitcoin and Ethereum3..docxaulasnilda
 
1. A. Compare vulnerable populations. B. Describe an example of one .docx
1. A. Compare vulnerable populations. B. Describe an example of one .docx1. A. Compare vulnerable populations. B. Describe an example of one .docx
1. A. Compare vulnerable populations. B. Describe an example of one .docxaulasnilda
 
1. A highly capable brick and mortar electronics retailer with a l.docx
1. A highly capable brick and mortar electronics retailer with a l.docx1. A highly capable brick and mortar electronics retailer with a l.docx
1. A highly capable brick and mortar electronics retailer with a l.docxaulasnilda
 
1. A. Research the delivery, finance, management, and sustainabili.docx
1. A. Research the delivery, finance, management, and sustainabili.docx1. A. Research the delivery, finance, management, and sustainabili.docx
1. A. Research the delivery, finance, management, and sustainabili.docxaulasnilda
 
1. All of the following artists except for ONE used nudity as part.docx
1. All of the following artists except for ONE used nudity as part.docx1. All of the following artists except for ONE used nudity as part.docx
1. All of the following artists except for ONE used nudity as part.docxaulasnilda
 
1. According to the article, what is myth and how does it functi.docx
1. According to the article, what is myth and how does it functi.docx1. According to the article, what is myth and how does it functi.docx
1. According to the article, what is myth and how does it functi.docxaulasnilda
 
1. 6 Paragraph OverviewReflection on Reading Assigbnment Due Before.docx
1. 6 Paragraph OverviewReflection on Reading Assigbnment Due Before.docx1. 6 Paragraph OverviewReflection on Reading Assigbnment Due Before.docx
1. 6 Paragraph OverviewReflection on Reading Assigbnment Due Before.docxaulasnilda
 
1. A.Compare independent variables, B.dependent variables, and C.ext.docx
1. A.Compare independent variables, B.dependent variables, and C.ext.docx1. A.Compare independent variables, B.dependent variables, and C.ext.docx
1. A.Compare independent variables, B.dependent variables, and C.ext.docxaulasnilda
 
1. According to the Court, why is death a proportionate penalty for .docx
1. According to the Court, why is death a proportionate penalty for .docx1. According to the Court, why is death a proportionate penalty for .docx
1. According to the Court, why is death a proportionate penalty for .docxaulasnilda
 
1- Prisonization  What if  . . . you were sentenced to prison .docx
1- Prisonization  What if  . . . you were sentenced to prison .docx1- Prisonization  What if  . . . you were sentenced to prison .docx
1- Prisonization  What if  . . . you were sentenced to prison .docxaulasnilda
 
1. 250+ word count What is cultural and linguistic competence H.docx
1. 250+ word count What is cultural and linguistic competence H.docx1. 250+ word count What is cultural and linguistic competence H.docx
1. 250+ word count What is cultural and linguistic competence H.docxaulasnilda
 
1. 200 words How valuable is a having a LinkedIn profile Provid.docx
1. 200 words How valuable is a having a LinkedIn profile Provid.docx1. 200 words How valuable is a having a LinkedIn profile Provid.docx
1. 200 words How valuable is a having a LinkedIn profile Provid.docxaulasnilda
 
1. According to recent surveys, China, India, and the Philippines ar.docx
1. According to recent surveys, China, India, and the Philippines ar.docx1. According to recent surveys, China, India, and the Philippines ar.docx
1. According to recent surveys, China, India, and the Philippines ar.docxaulasnilda
 
1. Addressing inflation using Fiscal and Monetary Policy tools.S.docx
1. Addressing inflation using Fiscal and Monetary Policy tools.S.docx1. Addressing inflation using Fiscal and Monetary Policy tools.S.docx
1. Addressing inflation using Fiscal and Monetary Policy tools.S.docxaulasnilda
 
1. A vulnerability refers to a known weakness of an asset (resou.docx
1. A vulnerability refers to a known weakness of an asset (resou.docx1. A vulnerability refers to a known weakness of an asset (resou.docx
1. A vulnerability refers to a known weakness of an asset (resou.docxaulasnilda
 
1. According to the readings, philosophy began in ancient Egypt an.docx
1. According to the readings, philosophy began in ancient Egypt an.docx1. According to the readings, philosophy began in ancient Egypt an.docx
1. According to the readings, philosophy began in ancient Egypt an.docxaulasnilda
 
1-Explain what you understood from the paper with (one paragraph).docx
1-Explain what you understood from the paper with (one paragraph).docx1-Explain what you understood from the paper with (one paragraph).docx
1-Explain what you understood from the paper with (one paragraph).docxaulasnilda
 
1-Explanation of how healthcare policy can impact the advanced p.docx
1-Explanation of how healthcare policy can impact the advanced p.docx1-Explanation of how healthcare policy can impact the advanced p.docx
1-Explanation of how healthcare policy can impact the advanced p.docxaulasnilda
 

More from aulasnilda (20)

1. Analyze the case and determine the factors that have made KFC a s.docx
1. Analyze the case and determine the factors that have made KFC a s.docx1. Analyze the case and determine the factors that have made KFC a s.docx
1. Analyze the case and determine the factors that have made KFC a s.docx
 
1. A.Discuss how the concept of health has changed over time. B.Di.docx
1. A.Discuss how the concept of health has changed over time. B.Di.docx1. A.Discuss how the concept of health has changed over time. B.Di.docx
1. A.Discuss how the concept of health has changed over time. B.Di.docx
 
1. Abstract2. Introduction to Bitcoin and Ethereum3..docx
1. Abstract2. Introduction to Bitcoin and Ethereum3..docx1. Abstract2. Introduction to Bitcoin and Ethereum3..docx
1. Abstract2. Introduction to Bitcoin and Ethereum3..docx
 
1. A. Compare vulnerable populations. B. Describe an example of one .docx
1. A. Compare vulnerable populations. B. Describe an example of one .docx1. A. Compare vulnerable populations. B. Describe an example of one .docx
1. A. Compare vulnerable populations. B. Describe an example of one .docx
 
1. A highly capable brick and mortar electronics retailer with a l.docx
1. A highly capable brick and mortar electronics retailer with a l.docx1. A highly capable brick and mortar electronics retailer with a l.docx
1. A highly capable brick and mortar electronics retailer with a l.docx
 
1. A. Research the delivery, finance, management, and sustainabili.docx
1. A. Research the delivery, finance, management, and sustainabili.docx1. A. Research the delivery, finance, management, and sustainabili.docx
1. A. Research the delivery, finance, management, and sustainabili.docx
 
1. All of the following artists except for ONE used nudity as part.docx
1. All of the following artists except for ONE used nudity as part.docx1. All of the following artists except for ONE used nudity as part.docx
1. All of the following artists except for ONE used nudity as part.docx
 
1. According to the article, what is myth and how does it functi.docx
1. According to the article, what is myth and how does it functi.docx1. According to the article, what is myth and how does it functi.docx
1. According to the article, what is myth and how does it functi.docx
 
1. 6 Paragraph OverviewReflection on Reading Assigbnment Due Before.docx
1. 6 Paragraph OverviewReflection on Reading Assigbnment Due Before.docx1. 6 Paragraph OverviewReflection on Reading Assigbnment Due Before.docx
1. 6 Paragraph OverviewReflection on Reading Assigbnment Due Before.docx
 
1. A.Compare independent variables, B.dependent variables, and C.ext.docx
1. A.Compare independent variables, B.dependent variables, and C.ext.docx1. A.Compare independent variables, B.dependent variables, and C.ext.docx
1. A.Compare independent variables, B.dependent variables, and C.ext.docx
 
1. According to the Court, why is death a proportionate penalty for .docx
1. According to the Court, why is death a proportionate penalty for .docx1. According to the Court, why is death a proportionate penalty for .docx
1. According to the Court, why is death a proportionate penalty for .docx
 
1- Prisonization  What if  . . . you were sentenced to prison .docx
1- Prisonization  What if  . . . you were sentenced to prison .docx1- Prisonization  What if  . . . you were sentenced to prison .docx
1- Prisonization  What if  . . . you were sentenced to prison .docx
 
1. 250+ word count What is cultural and linguistic competence H.docx
1. 250+ word count What is cultural and linguistic competence H.docx1. 250+ word count What is cultural and linguistic competence H.docx
1. 250+ word count What is cultural and linguistic competence H.docx
 
1. 200 words How valuable is a having a LinkedIn profile Provid.docx
1. 200 words How valuable is a having a LinkedIn profile Provid.docx1. 200 words How valuable is a having a LinkedIn profile Provid.docx
1. 200 words How valuable is a having a LinkedIn profile Provid.docx
 
1. According to recent surveys, China, India, and the Philippines ar.docx
1. According to recent surveys, China, India, and the Philippines ar.docx1. According to recent surveys, China, India, and the Philippines ar.docx
1. According to recent surveys, China, India, and the Philippines ar.docx
 
1. Addressing inflation using Fiscal and Monetary Policy tools.S.docx
1. Addressing inflation using Fiscal and Monetary Policy tools.S.docx1. Addressing inflation using Fiscal and Monetary Policy tools.S.docx
1. Addressing inflation using Fiscal and Monetary Policy tools.S.docx
 
1. A vulnerability refers to a known weakness of an asset (resou.docx
1. A vulnerability refers to a known weakness of an asset (resou.docx1. A vulnerability refers to a known weakness of an asset (resou.docx
1. A vulnerability refers to a known weakness of an asset (resou.docx
 
1. According to the readings, philosophy began in ancient Egypt an.docx
1. According to the readings, philosophy began in ancient Egypt an.docx1. According to the readings, philosophy began in ancient Egypt an.docx
1. According to the readings, philosophy began in ancient Egypt an.docx
 
1-Explain what you understood from the paper with (one paragraph).docx
1-Explain what you understood from the paper with (one paragraph).docx1-Explain what you understood from the paper with (one paragraph).docx
1-Explain what you understood from the paper with (one paragraph).docx
 
1-Explanation of how healthcare policy can impact the advanced p.docx
1-Explanation of how healthcare policy can impact the advanced p.docx1-Explanation of how healthcare policy can impact the advanced p.docx
1-Explanation of how healthcare policy can impact the advanced p.docx
 

Recently uploaded

Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
MICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxMICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxabhijeetpadhi001
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.arsicmarija21
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 

Recently uploaded (20)

Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
MICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxMICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptx
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 

Organizational challenges of international partnerships

  • 1. 1/9 Question 1 4 / 4 points LO5: What is a packet? Question 2 4 / 4 points LO6: What technology is typically used to prevent unwanted traffic from entering or exiting an organizations network? The correct answer is not displayed for Written Response type questions. Attempt 1 Attempt Feedback You did well on most of the essays but there were a number of the multiple choice questions that trip you up. Please review and prepare for posttest 2. You got this, you're almost there. 8 bytes of data The fundamental unit of data transmitted over the Internet A network device that connects multiple devices together and filters packets based on their destination within the connected devices.
  • 2. Binary information that can be converted to computational instructions Firewall is the technology that is commonly used to prevent unauthorized traffic from entering or exiting an organization's network. Firewalls often establish a barrier between a trusted internal network and untrusted external network, such as the internet. Firewalls often work through monitoring and logging to record events that occur on or across a network. Firewall logging ensures that the defined filters or rules are adequate and functioning as expected. By monitoring traffic stream through a firewall's filtering scheme, it is possible to identify the types of traffic that the firewall should block. 2/4/2020 2/9 View Feedback Question 3 4 / 4 points LO7: What does it mean or look like for an organization to implement a competitive advantage?
  • 3. The correct answer is not displayed for Written Response type questions. Question 4 4 / 4 points LO10: When developing software, there is a tension known as the quality triangle. What are the three components of the quality triangle. Question 5 4 / 4 points LO12: A trademark protect all of the following, except: Question 6 4 / 4 points LO8: Your current employer, ACME Brick wants to distinguish themselves from other brick suppliers by becoming ISO 9001 certified. To do so, your employer will need to do all of the When organizations implement competitive advantage, they establish conditions and environments that give them an edge over their rivals in the industry. According to Potter, there are two major ways in which organizations can attain competitive advantage: cost leadership and differentiation strategies. Firms can implement information systems to actualize these competitive approaches. Programming, Time and Quality
  • 4. Skill, Opportunity and Quality Time, Quality and Cost Function, Repeatability and Quality product logo phrase shape javascript:// 2/4/2020 3/9 following except: Question 7 4 / 4 points LO4: A&M-Commerce is developing a relational database with tables for the following information. Student courses Housing preferences Affiliation to student organizations In order to relate this data, what must be present in each of these tables?
  • 5. Question 8 4 / 4 points ___Text___ Question 9 4 / 4 points LO6: The process of logging into an information system using a user ID and password, followed by a finger print or eye scan is known as: Show me where it says that (reference the process documentation). Prove that this is what happened (exhibit evidence in documented records) Tell me what you do (describe the business process). Regulate and report (display all federal regulations have been met and reported) A foreign key like Social Security Number A primary key like Student ID A current address A student's full name When designing a database, you have been asked to create a data type to store first names. is the datatype you would choose. Multi-Factor Authentication
  • 6. Information Security Access Test Encryption 2/4/2020 4/9 Question 10 3 / 4 points LO10: As a faculty member for the Lone Star Education Services (private education organization with less than 100 employees that focuses on online learning), you've been placed on a committee tasked with evaluating Learning Management Systems. Each system presented has similar features that encompass the majority of the stated needs of your organization, with the turnkey solution checking the most boxes, however the price for the turnkey Learning Management System software is upwards of $100,000 per year. Two additional options are presented to the committee. An open-source software that does not cost to license but has a more limited feature set or you could develop the software in- house. In general, what would be the best recommendation based on the information provided? Option 1 - Turnkey solution, Option 2 - Open Source with modifications, Option 3 - Develop In-house. Explain your answer. The correct answer is not displayed for Written Response type questions.
  • 7. View Feedback Question 11 4 / 4 points LO11: A company residing in South Korea has recently partnered with the gaming development company where you are employed. This partnership provides many new advantages, from new talent to a larger workgroup. What potential challenges should each company consider? The correct answer is not displayed for Written Response type questions. Question 12 0 / 4 points Access Control Option 2 (open source with modifications) would be more prudent than developing an in- house or opting for a Turnkey solution, which is costly for a small organization with only 100 employees. By embracing the outsourced with modifications, the organization can concentrate, the organization can concentrate its resources on its core business competencies while capitalizing on the expertise of other firms that are more effective and efficient, or more knowledgeable on the specialized tasks. Further, the open source with modification options
  • 8. can provide the organization with access to current technologies at low costs without the risks of obsolescence. In so doing, the organization can cut costs by gaining capabilities without incurring overhead costs. There are various potential challenges that each business is likely to encounter when engaging in partnerships with foreign firms. For instance, the task of monitoring and regulating businesses may be challenging. Such challenges may include concerns over intellectual property violations, taxation systems, security concerns, as well as privacy of each business entity. Such problems are often rampant in global business contexts in which laws and ethics that govern businesses often conflict rather than compliment each other. javascript:// 2/4/2020 5/9 LO6: When protecting information we want to limit exposure to the information by restricting
  • 9. access. This practice is know as: Question 13 4 / 4 points Select each stage relevant to the digital divide according to Jakob Nielsen Question 14 2 / 4 points LO12: Facebook is able to harvest a great deal of personal data, preferences, demographics and interests from their users for marketing purposes. What are some ethical concerns with their data harvesting and how does this impact an organization like Facebook? The correct answer is not displayed for Written Response type questions. View Feedback Integrity Confidentiality Limited Data Abailability empowerment ethnic usability economic
  • 10. There are various potential ethical concerns related to Facebook's data harvesting practices. One such ethical concern is confidentiality. The harvesting of personal data may spark confidentiality issues, especially when they are disclosed to unauthorized parties. Additionally, data harvesting may spark privacy concerns, especially when such data are used to track and monitor the private activities of individuals and groups. Furthermore, issues such as espionage and wrong use of data may arise. For instance, some malicious people may use such data to commit fraud and crimes, such as impersonating individuals after gaining access to their financial and personal information. javascript:// 2/4/2020 6/9 Question 15 0 / 4 points LO2: Your coworker, Fred, describes an issue he is facing with his computer. He states that the computer will start but as soon as he plugs in an external drive
  • 11. it crashes. He notes that he installed a new internet browser after he performed a Windows system update the week before. Fred blames the crashes on the new internet browsing application. Select the most accurate statement below. Question 16 0 / 4 points LO2: Which of the following is not a feature of enterprise resource planning (ERP)? Question 17 0 / 4 points LO8: Business process reengineering employs the following idea; The application is most likely not the cause of the problem because the operating system is responsible for managing the external device and the application described does not directly interface with the drive when the crash occurs. The internet browser application is most likely the problem because of the timing of the install and nature of the crashes. Neither the application or the Windows update installed are likely to have anything to do with the crash. Operating Systems such as Windows provide no direct communication with external drives, therefore the application is most likely the culprit of Fred's recent crashes.
  • 12. There is only one data source ERP systems are well suited for small businesses, enabling them to see immediate cost savings. ERP systems are typically costly to implement for large organizations and may take multiple years to implement ERP systems include functionality that covers all of the essential components of a business current processes must be performed on a slimmer scale, utilizing fewer employees and reducing overhead 2/4/2020 7/9 Question 18 4 / 4 points LO9: Who is primarily responsible for keeping information system projects on time and on budget? Question 19 4 / 4 points Identify which of the following are operating systems and which would be considered software. __2__
  • 13. __2__ __2__ __1__ __1__ 1. 2. Question 20 0 / 4 points LO9: Explain the role of a database administrator or DBA in an organization? technology must be integrated in each business process to fully leverage the value of an information system organizations should blow up their existing processes and develop new processes that take advantage of new technology concepts business tasks should be evaluated and modified slightly for increased efficiency Chief Information Officer (CIO) Database Administrator (DBA) Project Manager ERP Manager
  • 14. Microsoft Word Clash of Clans Photoshop Apple OS X Microsoft Windows Operating System Software The primary role of the database administrator is to ensure that organizational data is available, protected from loss and corruption, and easily accessible as needed. The key roles 2/4/2020 8/9 The correct answer is not displayed for Written Response type questions. View Feedback Question 21 0 / 4 points LO 7: A decision support system (DSS) works best with helping make what sort of decisions?
  • 15. Question 22 4 / 4 points LO1: Applying Moore's Law to the following situation, what assumption can we make. (Moore's law has been dissipating in recent years but for the sake of this question, assume that it fully applies.) Our IT department has determined that they will need an additional 5 servers with max processing power at current technology capabilities. At current prices the IT department determines the cost will be about $100,000. We only have $50,000 in our budget but we are not in a rush. When are we likely to be able to purchase these machines and why? The correct answer is not displayed for Written Response type questions. Question 23 4 / 4 points LO5: What event lead to the first implementation of an Internet? may include database system installation and maintenance, data backup and recovery, data development and testing, securing database system, as well as authentication. Very quick and repetitive decisions (Decisions that need to be made immediately based on a known set of inputs)
  • 16. None of the above Semi-structured decisions (Most of the factors are known but human interaction is still needed) Complex decisions (Decisions in which machine learning is necessary to reduce human error) Moore's law operates in the assumption that the number of transistors on a microchip doubles every two years, although the cost of computers is halved. According to Moore's law, the speed and capability of computers is projected to increase every two years, and people will pay less for them. This growth is exponential. Currently, the servers cost $100,000. However, the price, based on Moore's law is projected to half after two years. As such, the organization is likely to afford to buy it at $50,000 after two years, which will be in 2022. javascript:// 2/4/2020 9/9 Question 24 4 / 4 points
  • 17. LO1: Which of the following is a role that people play in an information system? Question 25 2 / 4 points LO3: How can data be transformed into something useful like actionable information? Provide an example. The correct answer is not displayed for Written Response type questions. Attempt Score:71 / 100 - 71 % Overall Grade (highest attempt):71 / 100 - 71 % Done IBM's mainframe logic center produced more data than they were capable of storing in one physical location. Bill Gates invents an operating system that makes personal computing a reality. Apple produces an affordable personal computer known as Macintosh. The need to share research by the US governments Advanced Research Projects Agency after Russia's surprise launch of Sputnik. CIO Database Manager
  • 18. Programmer All of the above The process of converting raw data into actionable information begins by recognizing different forms of analytics and gathering the data. Thereafter, the organization should measure what matters, put data into context, and determine its benefits to business.