Deck 3: Strategic Uses of Information Technology
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/50
Play
Full screen (f)
Deck 3: Strategic Uses of Information Technology
1
Since the 1990's, strategic use of information systems has emphasized linking companies to suppliers, customers, and other parties in one's value chain.
True
2
One disadvantage to demand-pull, business-to-business e-business is the infrastructure.
True
3
The Internet has allowed increased focus on CRM.
True
4
The strategic use of IT has transitioned from an outward focus to its current state, an inward focus.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
5
According to Porter, the only way to sustain advantage through the Internet is to create a distinct value chain that offers unique value.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
6
End-user computing is an example of strategic information systems use that works inward.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
7
The Internet has eliminated the problem of manufacturers and suppliers needing the same infrastructure.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
8
Corporate portals are difficult to implement because of the additional desktop software required for access.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
9
The Internet can no longer be viewed as a strategic use of Information Technology because of the demise of the dot coms.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
10
The importance of the Internet is its support for a sale to a customer - not the servicing of the product.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
11
It is possible to use an intranet to foster a sense of community within an organization.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
12
Electronic tenders are an extension of the computational capabilities of a computer.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
13
Close integration is when one party provides another party with ad hoc access to its internal information.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
14
A demand-pull business model is a customer-centric model that initiates activities after a customer's order has been placed.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
15
An electronic tender is an electronic communication capability in a product or service that allows that product or service to be paid for by another computer.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
16
An intranet is a closed system that utilizes Internet technologies to service employees and customers of an organization.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
17
In a private exchanges, information passes through the chain in a burst and is available to
all parties at the same time, rather than sequentially over time.
all parties at the same time, rather than sequentially over time.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
18
Reengineering business processes is an outward focused strategy.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
19
In tight business-to-business e-business integration, two parties exchange information in a formal manner.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
20
In tight integration, two parties share at least one business process.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
21
According to Carr, which of the following is a reason why IT has reached the end of its buildout?
A) IT prices have dropped.
B) The capacity of the Internet has caught up with demand.
C) There are many computer vendors.
D) All of the above
A) IT prices have dropped.
B) The capacity of the Internet has caught up with demand.
C) There are many computer vendors.
D) All of the above
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
22
According to Carr, IT management should focus on which of the following?
A) managing risks
B) keeping costs down
C) staying ahead of the technology curve
D) Both A and B
A) managing risks
B) keeping costs down
C) staying ahead of the technology curve
D) Both A and B
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
23
Decentralizing control over a company intranet:
A) encourages more timely and relevant content.
B) discourages development of sites with company information.
C) minimizes problems with data redundancy and security.
D) Both A and C
A) encourages more timely and relevant content.
B) discourages development of sites with company information.
C) minimizes problems with data redundancy and security.
D) Both A and C
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
24
Which of the following is not a potential B2C problem?
A) The information systems are not always reliable.
B) global competition
C) capability for personalized customer attention
D) must deal with multiple legal systems
A) The information systems are not always reliable.
B) global competition
C) capability for personalized customer attention
D) must deal with multiple legal systems
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
25
IT's economic impact comes from:
A) incremental improvements.
B) wholesale improvements.
C) "big bang" IT projects.
D) None of the.above
A) incremental improvements.
B) wholesale improvements.
C) "big bang" IT projects.
D) None of the.above
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
26
A challenge associated with implementing a company intranet is:
A) implementing proprietary Internet technology.
B) difficulty integrating the intranet with existing legacy systems.
C) encouraging people to put information on the intranet.
D) All of the above
A) implementing proprietary Internet technology.
B) difficulty integrating the intranet with existing legacy systems.
C) encouraging people to put information on the intranet.
D) All of the above
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
27
In the 1990s, strategic use of IT in most businesses turned inward to:
A) intranets.
B) reengineering business processes.
C) ERP systems.
D) Both B and C
E) Both A and C
A) intranets.
B) reengineering business processes.
C) ERP systems.
D) Both B and C
E) Both A and C
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
28
A(n) ________ is an electronic communication capability in a product or service that allows that product or service to be tended.
A) electronic transmission
B) EDI
C) electronic tender
D) None of the above
A) electronic transmission
B) EDI
C) electronic tender
D) None of the above
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
29
A unique aspect of a company intranet is:
A) fostering a sense of alienation by employees.
B) promoting company culture.
C) creating a sense of belonging for employees.
D) Both B and C
A) fostering a sense of alienation by employees.
B) promoting company culture.
C) creating a sense of belonging for employees.
D) Both B and C
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
30
Which of the following is not considered a strategic uses of IT in business?
A) business-to-employee
B) business-to-government
C) business-to-customer
D) business-to-business
A) business-to-employee
B) business-to-government
C) business-to-customer
D) business-to-business
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
31
In ________ business-to-business e-business integration, two parties exchange information in a formal manner.
A) loose
B) merged
C) close
D) tight
A) loose
B) merged
C) close
D) tight
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
32
Which strategic use of the Internet is no longer in use?
A) business-to-employee
B) business-to-consumer
C) business-to-business
D) All of the above are still in use.
A) business-to-employee
B) business-to-consumer
C) business-to-business
D) All of the above are still in use.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
33
Which of the following is an advantage of B2C e-business?
A) elimination of geographic boundaries
B) automated order processing
C) Manufacturers can bypass retailers.
D) All of the above
A) elimination of geographic boundaries
B) automated order processing
C) Manufacturers can bypass retailers.
D) All of the above
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
34
An example of B2B e-business is:
A) collaborating with competitors to set prices.
B) collaborating with non-competitors to achieve efficiencies.
C) acquiring suppliers.
D) Both A and C
A) collaborating with competitors to set prices.
B) collaborating with non-competitors to achieve efficiencies.
C) acquiring suppliers.
D) Both A and C
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
35
According to Michael Porter, the way to sustain advantage through the Internet is to:
A) create a distinct value chain.
B) create a distinct demand chain.
C) create a distinct knowledge chain.
D) None of the above
A) create a distinct value chain.
B) create a distinct demand chain.
C) create a distinct knowledge chain.
D) None of the above
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
36
Which of the following is not true of intranets?
A) They utilize standard protocols.
B) They result in open systems using nonproprietary technologies.
C) They result in wider access to company information.
D) All of the above
A) They utilize standard protocols.
B) They result in open systems using nonproprietary technologies.
C) They result in wider access to company information.
D) All of the above
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
37
In ________ business-to-business e-business integration, two parties share at least one business process as partners.
A) loose
B) merged
C) close
D) tight
A) loose
B) merged
C) close
D) tight
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
38
Which of the following is part of a company's value chain?
A) the upstream supply chain
B) the downstream demand chain
C) retailers
D) All of the above
A) the upstream supply chain
B) the downstream demand chain
C) retailers
D) All of the above
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
39
When e-business applications run over a public network:
A) access costs are drastically reduced.
B) communications costs are drastically reduced.
C) application costs are drastically reduced.
D) training costs are drastically reduced.
E) All of the above
A) access costs are drastically reduced.
B) communications costs are drastically reduced.
C) application costs are drastically reduced.
D) training costs are drastically reduced.
E) All of the above
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
40
Strategic Uses of Information Systems include:
A) Working Outward, Working Inward, and Working Across.
B) Working Outward, Working Inward, and Working Between.
C) Working Outward, Working Inward, and Working Around.
D) Working Between, Working Across and Working Around.
A) Working Outward, Working Inward, and Working Across.
B) Working Outward, Working Inward, and Working Between.
C) Working Outward, Working Inward, and Working Around.
D) Working Between, Working Across and Working Around.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
41
List the advantages of B2B e-business.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
42
Distinguish between e-enablement, e-business, and e-commerce.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
43
Distinguish between three types of strategic uses of IT in business.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
44
Distinguish between loose, close and tight integration of B2B e-business.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
45
List and describe three key components provided by the Internet that has allowed companies to accelerate online business activity.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
46
Briefly describe the three lessons that the past has taught about how to use IT strategically, according to Brown and Hagel.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
47
How do companies use the technology of the internet for competitive advantage?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
48
According to Porter, how can the Internet be used to sustain a competitive advantage?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
49
What is an Intranet? Identify several key benefits of intranets.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
50
According to Carr, long term successful IT management hinges on defense, not offense. Carr further indicates that the Management of IT should focus on which three areas?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck