logo

Management Information Systems for Competitive Advantage

   

Added on  2023-05-30

12 Pages2554 Words429 Views
Running head: MANAGEMENT INFORMATION SYSTEMS
MANAGEMENT INFORMATION SYSTEMS
Name of the student:
Name of the university:
Student number:
Date of submission:
Author note:
Management Information Systems for Competitive Advantage_1
1MANAGEMENT INFORMATION SYSTEMS
Table of Contents
Part I : True or False...................................................................................................................2
Justification for the question:.......................................................................................................2
Part II Multiple Choice:...................................................................................................................3
Part III Short Answer Questions:.....................................................................................................4
Business solution that provides competitive advantage and necessity:.......................................4
Functions of CRM and its integration with RGT framework:.....................................................5
Online transaction processing (OLTP) and online analytical processing (OLAP):....................5
Difference between OLTP and OLAP:........................................................................................6
Web generations:.............................................................................................................................6
Porter’s five forces analysis of Elite Education Institute (EEI):......................................................7
Competitive rivalry:.....................................................................................................................7
Supplier power:............................................................................................................................7
Buyer power:...............................................................................................................................8
Threat of substitution:..................................................................................................................8
Threat of new entry:.....................................................................................................................9
References:....................................................................................................................................10
Management Information Systems for Competitive Advantage_2
2MANAGEMENT INFORMATION SYSTEMS
Part I: True or False
No. 1 2 3 4 5 6 7 8 9 10
Answer True False False True True True False False True True
Justification for the question:
1. Inaccessible information is useless information since the importance of information lies
in the actions needed to implement or understand them. The importance of any given
information depends on the outcome or the results expected out of its analysis, which is
only possible if the information itself is accessible.
2. Business intelligence also referees to the strategic analysis of the business operations
needed in order to overcome the market issues as well as issues with the implementing
innovative ideas within the system.
3. Management Information Systems mainly deals with the people, organizations and the
technology and the relationships among people and the organizations are most important
in MIS.
4. All modern computers only understand 0 and 1.
5. Fuzzy logic is based on "values of truth" instead of the usual "true or false"/ (1 or 0).
6. Search engine optimization increases the website visibility using keywords as well as tags
that are found in the website.
7. Customers/clients can also often use PaaS as well as IaaS, which has the flexibility of
using an operating system can install and use whatever operating systems. Major IaaS
providers include Amazon Web Services, Google Compute Engine as well as Microsoft
Azure.
Management Information Systems for Competitive Advantage_3
3MANAGEMENT INFORMATION SYSTEMS
8. Consumer to Business (C2B) business occurs when an end user or customer sells
products as well as services to a particular business. It is an inversion of the B2C model
of e-commerce business.
9. In a recent research, it has been found that a malware known as badBIOS can infect the
BIOS firmware of a computer.
10. In computing technologies, a denial-of-service attack or (DoS attack) is a form of cyber-
crime wherein the hackers makes the workstations or the systems unavailable for its
intended users for a prolonged period of time by interrupting the connection of the system
to the internet.
Part II Multiple Choice:
No. 1 2 3 4 5 6 7 8 9 10
Answer D B B D C C A B D A
Answer 1. D. the extent of detail within the information.
Answer 2. B. Fine
Answer 3. B. RAM
Answer 4. D. Voice over internet protocol (VOIP).
Answer 5. C. 280 million calculations per second.
Answer 6. C. OLTP
Answer 7. A. Recovery
Answer 8. B. Expert systems
Answer 9. D. Knowledge management system.
Management Information Systems for Competitive Advantage_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Data Handling Assignment | Statistics Assignment
|5
|1178
|152

MIS101 Management Information System Assignment
|12
|2834
|425

MIS101 Management Information System Assignment
|9
|1399
|298

Security Management and Migration Report
|11
|2567
|372

Statistics Assignment (STAT 101)
|9
|766
|62

Significant Unsupervised Learning
|11
|2602
|313