Jon Frankel's blog

Weblogs for students, faculty and staff.

Quiz 1 Study Guide

| 0 comments

The quiz will take place on Tuesday March 11th in regular classroom.  It will consist of 15 multiple choice questions, 10 fill in the blanks and 3 of 4 short answer questions.  The short answer questions will come from this list, and if you can answer all these questions and know the words for the fill-in, you will do fine on the multiple choice as well.  Check connect (recharge the adaptive learning) for sample multiple choice questions.

– Describe the information age and the differences among data, information, and knowledge.
– Describe Porter’s Five Forces Model, and explain each of the five forces.
– Compare Porter’s three generic strategies.
– Describe and differentiate the higher level categories of information systems
– Describe artificial intelligence, and identify three examples of how it is being used.
– Compare disruptive and sustaining technologies, and explain how the Internet and WWW caused business disruption.
– Describe Web 1.0 along with ebusiness and its associated advantages.
– Describe some of the ebusiness tools for connecting and communicating.
– Compare the categories of ebusiness models.
– Identify challenges associated with ebusiness.
– Explain Web 2.0, and identify its key characteristics.
– Describe the three Business 2.0 tools for collaborating.
– Explain some of the ethical issues in the use of information technology.
– Describe the relationships and differences between hackers and viruses.
– Describe and differentiate authentication and authorization
– Describe the purpose and basic operation of public key encryption
– Describe the major categories of hardware, and provide an example of each.
– Explain Moore’s Law, and its effect on the price/performance of computers
– Explain the difference between primary and secondary storage.
– Identify the different categories of computer software, and explain their potential business uses.

Word List for Fill In the Blanks:
 Antivirus,  Artificial,  Asynchronous,  Authentication,  Authorization,  Clickstream,  Communication, Cookie,  Decision,  Disruptive,  Downtime,  Email,  Encryption,  Ethics,  Expert, Firewall, Gigahertz, Hackers, Hoaxes, Human, Information, Intellectual, Knowledge, Managerial, Multitasking, Niche, Open, Operational, People, Pirated, Privacy, Profitability, Property, Random, Security, Social, Software, Spam, Spyware,  Strategic, Supply, Transaction, Virus, Viruses, Worm

Leave a Reply

Skip to toolbar