Which of the following describes how the Simon framework of decision-making works in high-velocity decision environments?
A) Only the initial step is performed by the software; the final three steps are handled by humans.
B) The first two steps of Simon's framework are eliminated and the final two steps are handled by software algorithms.
C) The first three steps of the process are handled by software algorithms and the final step is handled by experienced managers.
D) All four steps are performed by humans with the support of high-speed, high-volume DSS and ESS.
E) All four steps of the process are handled by software algorithms; humans are eliminated from the decisions because they are too slow.
Q. 2The Internet enables ________ marketing, by leveraging the fact that there is always some demand, however small, for a product.
A) long-tail
B) behavioral
C) crowdsource
D) prediction
E) lead generation
Q. 3ROPMs (real options pricing models) value information systems similar to stock options, in that
A) ROPMs can be bought and sold like stocks.
B) a company's worth can be evaluated by the worth of their ROPMs.
C) initial expenditures on IT projects are seen as creating the right to pursue and obtain benefits from the system at a later date.
D) expenditures and benefits from IT projects are seen as inflows and outflows of cash that can be treated themselves like options.
E) the price paid today for information systems reflects their future cash flows.
Q. 4What are shared workspaces? How do they enhance teamwork?
What will be an ideal response?
Q. 5A(n) ________ is a collection of independent firms that use information technology to coordinate their value chains to collectively produce a product or service for a market.
A) value chain
B) support web
C) value web
D) consortium
E) firm network
Q. 6Which of the following functions does a firewall perform?
A) It ensures security by using multiple authentication strategies for employees.
B) It attracts malicious attacks to study their properties and origins.
C) It defines which IP addresses or domain names should be blocked.
D) It encodes sensitive data to ensure safe transmission across unsecured networks.
Q. 7Discuss web conferencing and the features offered by browser-based conferencing software.
What will be an ideal response?
Q. 8In working with ROPMs (real option pricing models) and options valuation, a call option is a(n)
A) obligation to purchase an asset at a later date at a fixed price.
B) obligation to either purchase or sell an asset at a later date at a strike price.
C) right to purchase an asset at a later date at a strike price.
D) right to purchase or sell an asset at a later date at a fixed price.
E) an obligation to sell an asset at a later date at a fixed price.