× Didn't find what you were looking for? Ask a question
Top Posters
Since Sunday
New Topic  
Goose7701 Goose7701
wrote...
Posts: 499
Rep: 0 0
6 years ago
Define and describe a business ecosystem. Give an example of a business ecosystem.
 
  What will be an ideal response?

 Q. 2

What is the purpose of using surveillance technologies in organizations? How do they help in protecting information and monitoring productivity?
 
  What will be an ideal response?

 Q. 3

Exchanges have become one of the most popular types of Net marketplace because they encourage competitive bidding that drives prices down.
 
  Indicate whether the statement is true or false

 Q. 4

________ takes place when a firm contracts custom software development or maintenance of existing legacy programs to outside firms.
 
  A) Cloud computing
  B) Utility computing
  C) On-demand computing
  D) Outsourcing
  E) Consumerization of IT

 Q. 5

Which of the following tools is not one you would use to control risk factors in an information systems project?
 
  A) internal integration tools
  B) external integration tools
  C) formal planning tools and formal control tools
  D) real options pricing models
  E) Gantt charts

 Q. 6

What is a proxy server? What function does it serve?
 
  What will be an ideal response?

 Q. 7

Which of the following is not a responsibility of effective change management?
 
  A) integrating legacy systems
  B) dealing with fear and anxiety about new systems
  C) training users of the new system
  D) enforcing user participation at all stages of system development
  E) ensuring users are properly trained

 Q. 8

A(n) ________ signal is a discrete, binary waveform that transmits data coded into two discrete states such as 1-bits and 0-bits.
 
  A) modulated
  B) broadband
  C) T1
  D) analog
  E) digital
Read 52 times
3 Replies

Related Topics

Replies
wrote...
6 years ago
Ans. to #1

A business ecosystem is a collection of loosely coupled but interdependent industries (suppliers, distributors, technology manufacturers, etc.) that provides related services and products. It is similar to a value web, except that cooperation takes place across many industries rather than many firms.
Business ecosystems can be characterized as having one or a few keystone firms that dominate the ecosystem and create the platforms used by other niche firms. Keystone firms in the Microsoft ecosystem include Microsoft and technology producers such as Intel and IBM. Niche firms include thousands of software application firms, software developers, service firms, networking firms, and consulting firms that both support and rely on the Microsoft products.
Another example of a business ecosystem is the mobile Internet platform. In this ecosystem there are four industries: device makers (Apple iPhone, RIM BlackBerry, Motorola, LG, and others), wireless telecommunication firms (AT&T, Verizon, T-Mobile, Sprint, and others), independent software applications providers (generally small firms selling games, applications, and ring tones), and Internet service providers (who participate as providers of Internet service to the mobile platform).

Ans. to #2

Surveillance technologies to monitor email, web surfing, and other online communications are readily available to all organizations. These techniques are used for a range of purposes like employer liability for allowing harassment or hostile work environments, the need to protect security and confidentiality, employee productivity, and concerns about bogging down corporate email systems with personal email. Security concerns about trade secrets also prompt employers to keep tabs on communications. Employers sometimes step up surveillance on employees who will soon be departing and who might decide to take confidential customer lists or other proprietary information with them.

Ans. to #3

FALSE

Ans. to #4

D

Ans. to #5

D

Ans. to #6

A proxy is an intermediary server that receives and analyzes requests from clients and then directs them to their destinations. Any network connection requires a handshake between the device and the server, so that the device's IP address, along with its location, is exposed. Hiding that information usually requires handing off the transmission to a proxy. The transmission then appears to come from the proxy, not the actual sender. A drawback to using the proxy server to ensure anonymity is the need to rely on the company that operates the proxy and its promise to protect its customers' identities. Another approach depends instead on a distributed network of servers. The encrypted transmission is relayed from one server to the next, and no single server has access to all the addresses that relayed any particular message.

Ans. to #7

A

Ans. to #8

E
Goose7701 Author
wrote...
6 years ago
Mind blown, I've bookmarked this site on told my friends
wrote...
6 years ago
Really appreciate that
New Topic      
Explore
Post your homework questions and get free online help from our incredible volunteers
  1299 People Browsing
Related Images
  
 161
  
 1604
  
 1570