Chapter 13 - Innovative Organizations
Chapter 14 - Ebusiness
Chapter 15 - Creating Collaborative Partnerships
Chapter 16 - Wireless Technology in Business
Chapter 17 - Developing Software
100
Intermediaries bring buyers and sellers together. The introduction of ebusiness brought more or less of this?
less
100
eBay falls into this category of ebusiness:
consumer-to-consumer
100
Content sharing, collaboration inside the organization, and user-contributed content are common characteristics of:
business 2.0
100
The G in GIS stands for what?
geographic
100
How many phases are in the SDLC?
7
200
DARPA stands for Defense Advanced __________ Project Agency.
research
200
Ebusinesses often create a physical separation between buyer and seller. So a challenge of ebusiness is managing consumer ________.
trust
200
An open ________ consists of non-proprietary hardware and software, and allows third party add-ons.
system
200
__________ area networks usually cover a range of 10 meters or less.
personal
200
The last phase of the SDLC is:
maintenance
300
The ability to tailor products to customers' specifications is called mass __________.
customization
300
Search engine ________ determines where a URL appears in search results.
ranking
300
RSS stands for:
real simple syndication
300
Of 802.11b and 802.11n which has the greater bandwidth?
802.11n
300
Which phase of the SDLC is considered the most critical?
planning
400
Which of the 2 types of technologies do existing companies usually give priority to?
sustaining
400
80% of online businesses fall into this category:
business-to-business
400
Tapping into the core knowledge of all employees or customers is called:
collective intelligence
400
WiMAX uses what to transmit data?
microwaves
400
The 2 types of maintenance outlined in chapter 17 are corrective and __________.
preventive
500
Which of the 2 types of technologies usually means a new way to doing things?
disruptive
500
Information __________ often create Web site taxonomies.
architects
500
Which type of knowledge is harder to document and manage?
tacit
500
The security protocol WPA stands for wi-fi __________ access.
protected
500
One way to gather requirements is with JAD, which stands for:
joint application development
M
e
n
u