The quiz will take place on Tuesday March 11th in regular classroom. It will consist of 15 multiple choice questions, 10 fill in the blanks and 3 of 4 short answer questions. The short answer questions will come from this list, and if you can answer all these questions and know the words for the fill-in, you will do fine on the multiple choice as well. Check connect (recharge the adaptive learning) for sample multiple choice questions.
– Describe the information age and the differences among data, information, and knowledge.
– Describe Porter’s Five Forces Model, and explain each of the five forces.
– Compare Porter’s three generic strategies.
– Describe and differentiate the higher level categories of information systems
– Describe artificial intelligence, and identify three examples of how it is being used.
– Compare disruptive and sustaining technologies, and explain how the Internet and WWW caused business disruption.
– Describe Web 1.0 along with ebusiness and its associated advantages.
– Describe some of the ebusiness tools for connecting and communicating.
– Compare the categories of ebusiness models.
– Identify challenges associated with ebusiness.
– Explain Web 2.0, and identify its key characteristics.
– Describe the three Business 2.0 tools for collaborating.
– Explain some of the ethical issues in the use of information technology.
– Describe the relationships and differences between hackers and viruses.
– Describe and differentiate authentication and authorization
– Describe the purpose and basic operation of public key encryption
– Describe the major categories of hardware, and provide an example of each.
– Explain Moore’s Law, and its effect on the price/performance of computers
– Explain the difference between primary and secondary storage.
– Identify the different categories of computer software, and explain their potential business uses.
Word List for Fill In the Blanks:
Antivirus, Artificial, Asynchronous, Authentication, Authorization, Clickstream, Communication, Cookie, Decision, Disruptive, Downtime, Email, Encryption, Ethics, Expert, Firewall, Gigahertz, Hackers, Hoaxes, Human, Information, Intellectual, Knowledge, Managerial, Multitasking, Niche, Open, Operational, People, Pirated, Privacy, Profitability, Property, Random, Security, Social, Software, Spam, Spyware, Strategic, Supply, Transaction, Virus, Viruses, Worm