Preview (12 of 40 pages)

This Document Contains Chapters 1 to 4 Chapter 1 Information Systems: An Overview End of Chapter Solutions Reviews and Discussions What are two applications of computers and information systems at Domino’s Pizza? Answer: • Domino’s allows customers to order pizza using a voice app called “Dom,” powered by Nuance Communications. • Domino’s customers can order pizza by tweeting a pizza emoji. 1. Is the knowledge of Office such as world processing and Excel computer literacy or information literacy? Discuss Answer: Computer literacy. It is skill in using productivity software, such as word processors, spreadsheets, database management systems, and presentation software, as well as having a basic knowledge of hardware and software, the Internet, and collaboration tools and technologies. 2. What are the four main components of an information system? Answer: Data, a database, a process, and information. 3. What are two applications of computers and information systems at the Home Depot? Answer: • A high-speed network connecting its stores throughout the United States and Canada. • It uses a data warehousing application to analyze variables affecting its success—customers, competitors, products, and so forth. 4. What are three features or capabilities of a modern ATM? Answer: • Cash withdraw simply by tapping smartphones to the ATM, same technology similar to Apple Pay. • Withdrawals of up to $3,000 on some ATMs • Allowing customers to make their credit card and mortgage payments at the ATM. 5. What are Michael Porter's three strategies for successfully competing in the marketplace? Answer:• Overall cost leadership • Differentiation • Focus 6. What are two responsibilities of a data scientist? Answer: • Identifying the problem that an organization is facing. • Identifying and collecting data sets and variables. 7. What are three examples of computing trends that are already underway? Answer: • Ubiquitous computing: Computing devices everywhere with different sizes and power and accessed through multiple formats such as voice, touch, and gesture (discussed in Chapter 2). • The Internet of things (IoT) and the Internet of everything (IoE): Connected devices through the Web that will be used by businesses and individuals for increasing productivity and cost savings (discussed in Chapter 7). Projects 1. Identify three applications of information systems at the college or the university that you are attending. Write a one-page paper that describes these three applications, and provide an example of the type of decisions that are being improved by each application. Answer: Answers will vary. Online registration, online learning systems, and transcript preparations are just a few examples. 1. Student Information System (SIS): Manages student records, including enrollment, grades, and transcripts. Improves decision-making in academic advising by providing up-to-date performance data. 2. Learning Management System (LMS): Supports online courses, assignments, and communication between students and faculty. Enhances decisions on course design and student engagement strategies based on participation analytics. 3. Library Management System: Facilitates the cataloging, lending, and tracking of library resources. Aids decisions on resource allocation and acquisition by analyzing usage patterns and student needs 2. Grocery chains have been using information technologies for several decades. After reading the information presented in this chapter and other sources, write a one-page paper that describes three such technologies. Answer: Answers will vary. Point-of-sale (POS) systems, radio-frequency-identification (RFID) tags, and automated inventory systems are just a few examples.. 1. Point of Sale (POS) Systems: These systems streamline checkout processes and collect sales data, helping grocery chains track inventory and analyze sales trends for better demand forecasting. 2. Inventory Management Systems: Using barcode scanning and RFID technology, these systems automate inventory tracking, reduce waste, and optimize stock levels to meet customer demand effectively. 3. Customer Loyalty Programs: Implemented through mobile apps and databases, these programs gather customer purchasing data, enabling personalized marketing and promotions to enhance customer retention. 3. RFID tags are being increasingly used by companies such as Macy's, Walmart, and Home Depot. Identify an additional company that uses RFIDs and write a one-page paper that describes the company’s specific application of RFIDs. Answer: Answers will vary. Amazon uses RFID tags in its warehouses to streamline inventory management and improve order fulfillment. The technology enables real-time tracking of products, reducing errors in stock counts and ensuring quick location of items, thus enhancing the efficiency of their supply chain and minimizing delivery times. 4. After reading the information presented in this chapter and other sources, write a one-page paper that describes the ways two different companies use Michael Porter’s three strategies. How are information systems assisting these companies in implementing each strategy? Answer: Answers will vary. 1. Walmart - Cost Leadership Strategy: Walmart uses information systems like its Retail Link, a data-sharing platform, to analyze sales data and manage inventory efficiently. This helps reduce costs and maintain low prices, aligning with Michael Porter’s cost leadership strategy. 2. Apple - Differentiation Strategy: Apple leverages information systems for innovation in product design and seamless integration across its ecosystem (e.g., iOS and macOS). This unique user experience and ecosystem differentiation set Apple apart from competitors, embodying Porter’s differentiation strategy. 5. After reading the information presented in this chapter and other sources, write a one-page paper that supports the claim that, in the future, computer criminals will become more sophisticated and that protecting personal information will become more difficult. Answer: Answers will vary. In the future, computer criminals are expected to become more sophisticated due to advancements in technology such as AI and machine learning, which can be exploited to develop new hacking techniques. The rise of deepfakes, advanced phishing, and AI-generated malware will increase the difficulty of detecting cyber threats. Additionally, the proliferation of connected devices (IoT) and the increasing amount of personal data shared online will provide more entry points for cybercriminals, making it harder to safeguard personal information effectively. Enhanced encryption, multi-factor authentication, and continuous security monitoring will be essential but may still struggle to keep pace with evolving cyber threats. 6. Banks are promoting online banking to a broad range of customers. After reading the information presented in this chapter and other sources, write a one-page paper that lists three advantages and three disadvantages of online banking. Why are some customers reluctant to use online banking? Answer: Answers will vary. Three advantages • Accessing customer service by e-mail around the clock • Viewing current and old transactions • Online mortgage applications Three disadvantages • Security issues • Privacy issues • Access issues Are You Ready to Move On? 1. A point-of-sale (POS) system slows down service by reading the universal product codes (UPCs) on items in your shopping cart. True or False? Answer: False 2. Organizations use social networking sites to give customers up-to-date information and how-to support via videos. True or False? Answer: True 3. A logistics information system (LIS) is designed to reduce the cost of transporting materials while maintaining safe and reliable delivery. True or False? Answer: True 4. One of the following components of an information system is responsible for converting data to information? a. Data b. Information c. Process d. Database Answer: C 5. All of the following are among decisions supported by a PIS/HRIS except: a. Choosing the best job candidate b. Scheduling and assigning employees c. Ordering decisions d. Predicting the organization’s future personnel needs Answer: C 6. All of the following information technology tools are being used in the marketing filed except: a. Logistic optimization b. Business analytics c. E-mail marketing d. Search engine marketing Answer: A Case Study 1-1 1. Is technology alone enough to ensure high-quality customer service? Answer: Answers will vary. A brief answer is no. No, technology alone is not enough. High-quality customer service also requires effective communication, empathy, and well-trained staff to complement technological tools. 2. What are Federal Express’s estimated annual savings from using information technology? Answer: Answers will vary. Federal Express (FedEx) estimates annual savings of over $1.5 billion from using information technology. This includes improvements in logistics, tracking, and route optimization, which enhance efficiency and reduce costs. 3. What are a couple of examples of information technologies used by Federal Express? Answer: Answers will vary. The following are few examples: • A comprehensive Web site, www.FedEx.com, where it assists customers and reduces costs • Ship Manager • Uses customer relationship management software called Clarify for improving customer service Case Study 1-2 1. According to this case study, what is an upcoming key technology that will be used in retail stores to improve customer service? Answer: Mobile technology. 2. What is the name of the device used by Ahold USA’s Stop & Shop retail stores? Answer: Scan It. 3. What will be the role of smartphones in the future of shopping? Answer: Answers will vary. Most experts believe that smartphones will be used as a device for paying for products and services among other things. Smartphones will play a central role in the future of shopping by enabling features like mobile payment, personalized shopping experiences, augmented reality (AR) for virtual try-ons, and seamless integration with online and in-store purchases. They will make shopping more convenient, efficient, and interactive for consumers. Chapter 2 Computers: The Machines behind Computing Reviews and Discussions 1. What are two main components of a CPU? Answer: The central processing unit (CPU) is the heart of a computer. It is divided into two components: the arithmetic logic unit (ALU) and the control unit. 2. What are five generation of computer hardware? What is one characteristic of each generation? Answer: • First- Vacuum tube • Second- Transistors • Third- Integrated circuits • Fourth- Miniaturization • Fifth- Parallel processing 3. What are two applications of IBM Watson? Answer: • Can serve as personal shopping assistant and help brick-and-motor companies to increase their cross-sell and up-sell opportunities. • Watson has also been used as a trip-planning service providing travelers with relevant information in order to better plan their trips. 4. As of 2016, how many apps were available for Android and iOs devices? Answer: There were more than 2.2 million apps for Android devices and more than 2 million apps for iOS devices. 5. Which type of memory is volatile? What does volatile mean? Answer: Volatile memory is called random access memory (RAM), although you could think of it as “read-write memory.” In other words, data can be read from and written to RAM. Some examples of the type of information stored in RAM include open files, the Clipboard’s contents, running programs, and so forth. If there is a power outage the content of this memory is lost. 6. What are the three waves in computing? Answer: The first wave was identified by mainframe computers, the second wave by personal computers, and the third wave by small computers embedded into many devices used daily—cellphones, cameras, watches, and so forth. 7. What are two advantages of Office 365 compared to the traditional Office? Answer: • Fixed monthly fee instead of one time purchase of the package • Anytime and anywhere access to both Office applications and data 8. Define an operating system. What are two examples of operating systems for PCs and two examples of operating systems for mainframe computers. Answer: An operating system (OS) is a set of programs for controlling and managing computer hardware and software. It provides an interface between a computer and the user and increases computer efficiency by helping users share computer resources and by performing repetitive tasks for users. Two examples of operating systems for PCs include Windows and Mac OS. Two examples of operating systems for mainframe computers include UNIX and OpenVMS. Projects 1. A local law firm needs your advice. It currently has 20 PCs being used by its attorneys and staff, and it is debating whether to use Google Apps for Work or Office 365 as its productivity tools. Write a two-page paper that summarizes your recommendation. What are two advantages and two disadvantages of each choice? Which alternative is more suitable for a law firm with 20 PCs? Which alternative is less expensive? Answer: Answers will vary. Recommendation Summary: For a local law firm with 20 PCs, both Google Workspace (formerly Google Apps for Work) and Microsoft 365 (formerly Office 365) offer robust productivity tools. However, the choice depends on factors like cost, ease of use, and specific needs such as legal document handling and client confidentiality. Google Workspace and Microsoft 365 provide cloud-based solutions that include email, document editing, collaboration tools, and secure storage. Below are the advantages and disadvantages of each option to help decide which is more suitable: Google Workspace: Advantages: 1. Real-Time Collaboration: Google Workspace offers seamless real-time collaboration features, making it easier for attorneys and staff to work together on legal documents and share feedback instantly. 2. Ease of Use and Integration: It is user-friendly, with a simple interface that integrates well with other Google services like Gmail and Google Drive, which can be beneficial for a law firm seeking straightforward tools. Disadvantages: 1. Limited Offline Functionality: While Google Workspace does offer some offline capabilities, they are more limited compared to Microsoft 365’s robust desktop applications, which could be a drawback when internet access is unreliable. 2. Less Powerful Desktop Applications: Google’s document editing tools (Docs, Sheets, Slides) are generally less feature-rich than Microsoft’s desktop applications, which might be a disadvantage for legal professionals who need advanced formatting and editing features. Microsoft 365: Advantages: 1. Familiarity and Advanced Features: Microsoft 365 provides access to traditional desktop software like Word, Excel, and PowerPoint, which are industry standards with advanced features necessary for complex legal documentation. 2. Enhanced Security and Compliance: Microsoft 365 offers robust security features, including advanced data protection and compliance tools (e.g., GDPR and HIPAA compliance), which are essential for handling sensitive legal information. Disadvantages: 1. Higher Cost: Microsoft 365 can be more expensive than Google Workspace, especially if the law firm opts for plans that include desktop applications and additional compliance features. 2. Complex Setup and Maintenance: Setting up and maintaining Microsoft 365, particularly the desktop applications and integration, may require more IT support, which could be challenging for a smaller firm without dedicated IT staff. Suitability for the Law Firm: Given the legal profession's needs for advanced document handling, security, and compliance, Microsoft 365 would be more suitable for the law firm. The advanced features in Word and Excel are particularly beneficial for creating complex legal documents, contracts, and detailed financial analysis. Additionally, the strong security and compliance options provide peace of mind when handling confidential client information. Cost Comparison: When considering the cost, Google Workspace tends to be less expensive, especially when factoring in the basic plans. For instance, Google Workspace's Business Standard plan costs around $12 per user per month, while Microsoft 365 Business Standard costs about $12.50 per user per month. However, if the law firm requires desktop versions of Office apps and enhanced compliance tools, the costs for Microsoft 365 could increase, making Google Workspace the less expensive option initially. Final Recommendation: While Google Workspace offers a cost-effective and collaborative solution, Microsoft 365 is recommended due to its robust desktop applications, advanced features, and comprehensive security options that cater specifically to the needs of a legal environment. Despite a slightly higher cost, the investment in Microsoft 365 would provide better tools for handling legal documentation and maintaining compliance with industry regulations. 2. After reading the information presented in this chapter and other sources, write a one-page paper that describes two advantages and two disadvantages of SAN and NAS. Name two vendors of each technology. Which one is less expensive? Answer: Answers will vary. Storage Area Network (SAN) vs. Network Attached Storage (NAS) Both SAN (Storage Area Network) and NAS (Network Attached Storage) are popular data storage solutions for businesses. However, they differ in architecture, use cases, and cost. Here are the advantages, disadvantages, and leading vendors for each technology. Advantages of SAN: 1. High Performance: SAN provides high-speed data access using block-level storage, making it ideal for applications requiring low latency, such as databases and enterprise resource planning (ERP) systems. 2. Scalability and Flexibility: SANs are highly scalable and can easily expand to accommodate large amounts of data, offering a centralized storage solution for enterprise environments. Disadvantages of SAN: 1. Complex Setup and Management: SANs are complex to set up and require specialized knowledge for installation and maintenance, which can be a barrier for smaller businesses. 2. High Cost: Due to the need for specialized hardware like Fibre Channel switches and host bus adapters (HBAs), SANs are more expensive than NAS solutions, making them less accessible for small and medium-sized enterprises. Vendors of SAN: • Dell EMC: Offers high-performance SAN solutions like the PowerMax and VMAX series. • Hewlett Packard Enterprise (HPE): Provides SAN solutions such as HPE 3PAR and HPE Primera, known for their scalability and performance. Advantages of NAS: 1. Ease of Use and Deployment: NAS devices are simple to set up and manage, providing a user-friendly interface for file sharing and storage, making them accessible for businesses of all sizes. 2. Cost-Effective: NAS is generally less expensive than SAN because it uses standard Ethernet connections and does not require specialized hardware, making it a budget-friendly option for small to medium-sized businesses. Disadvantages of NAS: 1. Lower Performance: Since NAS operates over standard Ethernet and uses file-level storage, it may not deliver the same performance as a SAN, especially in environments with high data traffic or demanding applications. 2. Limited Scalability: While NAS devices can scale, they may not handle large-scale, enterprise-level workloads as effectively as SAN solutions, limiting their use in high-demand scenarios. Vendors of NAS: • Synology: Offers user-friendly NAS devices like the Synology DiskStation series, popular for small to medium-sized businesses. • QNAP: Provides versatile NAS solutions such as the QNAP Turbo NAS, known for their reliability and wide range of features. Cost Comparison: NAS is generally the less expensive option compared to SAN. NAS uses standard Ethernet networks and common hardware, reducing costs associated with installation and maintenance. In contrast, SAN requires dedicated hardware, such as Fibre Channel switches, making it more suitable for larger enterprises with higher budgets. Conclusion: For businesses prioritizing high performance and scalability, especially those with critical applications requiring fast data access, SAN is the better choice despite its higher cost. However, for small to medium-sized businesses looking for an affordable, easy-to-manage solution, NAS is more suitable due to its lower cost and simpler deployment. 3. A classmate of yours is not sure whether to buy a PC or a tablet. He needs the device for schoolwork (mostly Microsoft Office), for Web access, and as an e-reader. After reading the information presented in this chapter and other sources, write a one-page paper that summarizes your recommendation to this fellow student. Also mention two choices that you consider as top of the line for each alternative. Answer: Answers will vary. Recommendation: PC vs. Tablet for Schoolwork When deciding between a PC and a tablet for schoolwork, web access, and as an e-reader, it’s essential to consider factors like productivity, portability, and usage needs. Here’s a summary of which option might be better suited for your classmate. PC (Laptop) Advantages: 1. Enhanced Productivity: PCs, particularly laptops, offer a full keyboard and larger screens, making them more efficient for typing extensive documents, presentations, and spreadsheets in Microsoft Office. 2. Multitasking Capability: PCs typically have more powerful processors and RAM, allowing for smoother multitasking with multiple applications open simultaneously. Disadvantages: 1. Less Portability: While laptops are portable, they can be bulkier and heavier compared to tablets, making them less convenient for quick or on-the-go tasks. 2. Shorter Battery Life: Many PCs have shorter battery lives than tablets, requiring more frequent charging during long study sessions. Top Choices for PCs: • Dell XPS 13: Known for its powerful performance, high-resolution display, and lightweight design, making it a top choice for students who need a reliable laptop. • Apple MacBook Air (M2): Offers excellent performance, a long battery life, and a sleek design, ideal for students who prefer macOS and want a premium experience. Tablet Advantages: 1. Portability and Versatility: Tablets are lightweight and easy to carry, making them ideal for quick notes, web browsing, and e-reading. Many tablets also support stylus input, which is great for note-taking. 2. Longer Battery Life: Tablets generally offer longer battery life compared to laptops, making them suitable for extended use throughout the day without frequent recharging. Disadvantages: 1. Limited Productivity: Although tablets can run Microsoft Office apps, typing on a virtual keyboard or a small detachable keyboard may be less comfortable for long writing tasks. 2. Reduced Multitasking Ability: Tablets typically have less processing power than laptops, which can limit performance when running multiple or resource-intensive applications. Top Choices for Tablets: • Apple iPad Pro: Offers powerful performance with the M2 chip, excellent display quality, and support for Apple Pencil, making it great for students who value versatility and high-quality hardware. • Samsung Galaxy Tab S9: Features a high-resolution AMOLED display, strong performance, and an included S Pen, making it a top choice for Android users who need a tablet for schoolwork and entertainment. Final Recommendation: If your classmate prioritizes productivity (especially extensive Microsoft Office use), multitasking, and does not mind a slightly bulkier device, a PC (laptop) is the better choice. The Dell XPS 13 and MacBook Air offer the best balance of performance, portability, and battery life for students. On the other hand, if portability and versatility as an e-reader are the main priorities, and the schoolwork primarily involves light document editing or note-taking, a tablet like the iPad Pro or Samsung Galaxy Tab S9 would be a more convenient option. For more intensive typing tasks, adding a keyboard accessory is recommended. Overall, for most schoolwork scenarios, a laptop would be the more reliable and flexible option due to its superior productivity features. However, a tablet may be suitable if portability and using the device as an e-reader are top priorities. 4. IBM Watson has created a lot of excitement in the computing field. After reading the information presented in this chapter and other sources, write a one-page paper that summarizes three commercial applications of this platform. What are two advantages of using Watson compared to using humans in the medical field? What are two disadvantages? Answer: Answers will vary. IBM Watson is an AI platform known for its ability to analyze vast amounts of data quickly and provide insights across various industries. Here are three commercial applications of IBM Watson: 1. Healthcare Diagnosis and Treatment: Watson assists in analyzing patient data, medical history, and scientific literature to suggest potential diagnoses and personalized treatment plans, improving decision-making in complex cases. 2. Financial Services: In finance, Watson is used for risk assessment and fraud detection by analyzing patterns in transaction data, predicting potential fraudulent activities, and helping in compliance monitoring. 3. Customer Service (Chatbots): Watson powers AI chatbots for customer service, enabling businesses to provide 24/7 support, answer queries, and resolve issues, enhancing customer experience and reducing wait times. Advantages of Using Watson in the Medical Field: 1. Speed and Data Analysis: Watson can process and analyze vast amounts of medical data quickly, providing insights from the latest research and treatment options faster than humans can. 2. Consistency in Recommendations: It offers consistent, unbiased analysis without fatigue, reducing the likelihood of errors in diagnosis and treatment planning. Disadvantages of Using Watson in the Medical Field: 1. Lack of Human Judgment: Watson lacks the human intuition and empathy needed for patient care, which are crucial for interpreting nuanced symptoms or patient concerns. 2. Dependence on Data Quality: Watson's recommendations heavily rely on the quality and accuracy of the data it is trained on, making it vulnerable to providing incorrect insights if the data is flawed or biased. 5. Android and iOS are two major operating systems for smartphones and other mobile devices. After reading the information presented in this chapter and other sources, write a two-page paper that summarizes the key features of each OS. What are two advantages and two disadvantages of each? Answer: Answers will vary. Android vs. iOS: Key Features, Advantages, and Disadvantages Both Android and iOS are dominant mobile operating systems, each offering distinct features, advantages, and drawbacks. Android (Google) Key Features: • Open Source: Android is an open-source operating system, allowing manufacturers to customize it for various devices, offering a wide range of hardware options. • Customization: Android offers extensive customization options for home screens, settings, and app interactions. • Google Services Integration: Seamlessly integrates with Google’s suite of services (e.g., Google Maps, Gmail, Google Drive). • App Store: Android apps are primarily available through the Google Play Store, with options for sideloading from other sources. Advantages of Android: 1. Wide Range of Devices: Android powers a wide variety of smartphones and tablets, from budget to premium devices, offering choices for different price points. 2. Greater Customization: Users can extensively customize their device interface, install third-party apps, and modify settings to suit personal preferences. Disadvantages of Android: 1. Fragmentation: Due to its open-source nature, Android faces fragmentation, with devices running different versions of the OS, leading to inconsistent performance and security updates. 2. Security Risks: Android’s openness allows for greater flexibility, but it also opens the door to security vulnerabilities, especially with sideloaded apps and inconsistent updates. iOS (Apple) Key Features: • Closed Ecosystem: iOS is a closed, proprietary system, meaning only Apple controls the hardware and software, offering a seamless integration between devices (iPhone, iPad, Mac). • App Store Control: Apple’s App Store has strict guidelines, ensuring high-quality apps and better security. • Software Updates: iOS devices receive regular, consistent updates directly from Apple, ensuring all compatible devices have the latest features and security patches. • Optimized Performance: iOS is optimized for Apple hardware, offering smooth performance and longevity in device updates. Advantages of iOS: 1. Consistency and Integration: iOS provides a consistent user experience across devices, with excellent integration between Apple’s hardware and software (e.g., iMessage, AirDrop, Handoff). 2. Security: iOS offers strong security features, including controlled app permissions, frequent updates, and encrypted data storage. Disadvantages of iOS: 1. Limited Customization: iOS is more restrictive in terms of customization, limiting user control over the interface and functionality of the device compared to Android. 2. Higher Cost: iOS devices, primarily Apple’s iPhones, tend to be more expensive than many Android devices, limiting affordability for some users. Conclusion: Both Android and iOS have distinct advantages and disadvantages. Android offers more device options, greater flexibility, and customization but can suffer from fragmentation and security issues. iOS, while more secure and consistent, limits customization and comes with higher device costs. The choice depends on user preferences for flexibility, security, and device options. 6. Dragon NaturallySpeaking Solutions is an example of an NLP. After reading the information presented in this chapter and other sources, write a two-page paper that describes five commercial applications for this platform. Which businesses will benefit the most from this platform? What are two other products that compete with this software? Answer: Answers will vary. Dragon NaturallySpeaking Applications and Competitors Applications: 1. Healthcare: Doctors use Dragon for dictating patient records into EHRs, saving time and improving accuracy. 2. Legal Industry: Lawyers dictate legal documents and case notes, improving productivity and reducing administrative tasks. 3. Customer Service: Call center agents use Dragon to transcribe calls and input data via voice, enhancing efficiency. 4. Education: Students and teachers use Dragon for note-taking, essay dictation, and improving accessibility for students with disabilities. 5. Business Documentation: Corporate employees dictate emails, reports, and meeting notes, increasing productivity and reducing manual entry. Businesses That Benefit: • Healthcare Providers: Helps medical professionals streamline documentation. • Law Firms: Improves efficiency in legal document creation. • Customer Service Centers: Enhances productivity by automating transcription. • Educational Institutions: Assists with note-taking and aids students with disabilities. Competitors: 1. Google Speech-to-Text: Offers accurate transcription and integrates well with Google Cloud services. 2. Microsoft Azure Speech Service: Provides cloud-based speech recognition, ideal for businesses using Microsoft tools. Dragon is ideal for industries requiring high-volume documentation, while Google and Microsoft offer alternatives with strong cloud integration. Are You Ready to Move On? 1. A bus is a link between devices connected to the computer. It can be parallel or serial, internal (local) or external. True or False? Answer: True. 2. Second generation of computers are identified by vacuum tube. True or False? Answer: False. 3. A storage area network (SAN) is a dedicated high-speed network consisting of both hardware and software used to connect and manage shared storage devices, such as disk arrays, tape libraries, and optical storage devices. True or False? Answer: True. 4. One of the following is one of the characteristics of the second generation of computer languages? a. Assembly language b. Machine language c. Fourth-generation language d. Natural language processing Answer: A 5. All of the following are examples of application software except: a. Apple iOS b. Microsoft Excel c. Microsoft PowerPoint d. Adobe InDesign Answer: A 6. Which of the following secondary memory device has the largest capacity? a. Memory stick b. DVD-ROM c. SD Card d. Hard disk Answer: D Case Study 2-1 1. Using your smartphone and a financial app, how do you deposit a check into your checking account? Answer: To deposit a check into your checking account, you can simply take a photograph of the front and back of the check, after which the app will ask you for the amount you want to deposit. Then you type the account number and then press “OK” to complete the deposit. 2. Name some financial apps introduced in this case. Answer: Mint (mint.com) from Intuit, HelloWallet from HelloWallet.com, and QuickShot. 3. What are some examples of analytics that can be done using financial apps? Answer: For example, you can establish a budget and keep track of the expenses in various categories, such as food, gas, and groceries. 4. What are some other examples of financial apps? What are their applications? Answer: Answers will vary. Moneywiz (Silverwiz), iBank (IGG Software), and Money (Jumsoft) are three examples. Here are some financial apps and their applications: 1. Mint: Personal finance management, tracks spending, sets budgets, and monitors investments. 2. Venmo: Peer-to-peer payments, sends money instantly between friends or businesses. 3. PayPal: Online payments and money transfers, for secure transactions and international payments. 4. Robinhood: Stock trading and investing with no commission fees. 5. Yolt: Personal finance and budgeting, helps track spending and manage finances. 6. Zelle: Instant money transfer between U.S. bank accounts. 7. Acorns: Investment and savings, rounds up purchases and invests the change. These apps simplify budgeting, payments, and investing for individuals and businesses. Case Study 2-2 1. According to this case study, how were outages reported to the utilities department manager in the past? Answer: In the past when there was an outage related to power, water, or steam (used for heating), the utility manager was contacted by phone to look into the problem and come up with a course of action to fix the problem. 2. What are the two apps that are being used by the utilities department? Answer: The equipment used by Cornell University’s utilities department comes from GE and has an iOS app for drilling down into the utility management system and analyzing the available data. The utility personnel have access to a Web app for those analyses that are not suitable for the iOS app. 3. What are two advantages of using iPad at the utilities department? Answer: According to the university, the iPad provides easy access to key information anywhere and at any time. The utility personnel can use the Web app to remotely control the utility management system from their browsers. Chapter 3 Database Systems, Data Warehouses, and Data Marts Reviews and Discussions 1. Define data hierarchy. Answer: A data hierarchy is the structure and organization of data, which involves fields, records, and files. 2. Define database management system (DBMS). Give an example of a DBMS for PCs and one for mainframe computers. Answer: A database management system (DBMS) is software for creating, storing, maintaining, and accessing database files. A DBMS makes using databases more efficient. Microsoft Access is an example of a DBMS for PCs and Oracle Database 12c is an example of a DBMS for mainframe computers. 3. What are three examples of data models? Which one is the most popular type? Answer: The network model, hierarchical model, and the relational model. The relational model is most popular type. 4. What are five major components of a DBMS? Answer: • Database engine • Data definition • Data manipulation • Application generation • Data administration 5. What are three major outputs from a data warehouse for decision-making? Answer: • OLAP analysis • Data-mining analysis • Decision-making reports 6. What are three popular types of business analytics? Answer: Descriptive, predictive, and prescriptive analytics. 7. What are 3 Vs in big data analytics? Answer: Volume, variety, and velocity. 8. What is recency, frequency, and monetary analysis (RFM) in database marketing? Answer: This model predicts and generates an estimate that tells a business how valuable a customer is based on the recentness of purchases, frequency of purchases, and how much the customer spends. The theory behind this technique is that 80 percent of a business revenue comes from 20 percent of its customers. This means the business should pay more attention to those in the 20 percent group. Projects 1. After reading the information presented in this chapter and other sources, write a two-page paper that explains BI. Identify three companies (in addition to those mentioned in this chapter) that have been using BI, and explain the applications of BI in these companies. What are two differences between BI and information or data? Answer: Answers will vary. Business intelligence (BI) is more than just information. It provides historical, current, and predictive views of business operations and environments and gives organizations a competitive advantage in the marketplace. 2. After reading the information presented in this chapter and other sources, write a one-page paper that identifies three companies (in addition to those mentioned in this chapter) that are using data mining tools. Explain how data mining has helped these companies with their bottom lines. Are data-mining tools beneficial to service companies or manufacturing or both? Answer: Answers will vary. Data Mining Applications in Companies In addition to well-known examples such as Walmart and Amazon, several other companies have successfully leveraged data mining tools to improve their operations and bottom lines. Three such companies are Target, Netflix, and Capital One. 1. Target uses data mining tools to analyze customer purchasing patterns and predict future buying behavior. By examining purchasing history, Target can identify trends and provide personalized offers to customers, increasing sales and customer loyalty. For example, Target's data mining system helped the company identify when customers were likely to purchase baby products, enabling them to send timely coupons and promotions, significantly improving sales in targeted categories. 2. Netflix utilizes data mining to analyze viewer preferences, watching habits, and ratings to recommend personalized content. This tailored approach enhances the user experience and drives engagement, leading to increased subscriber retention. Netflix's ability to predict what shows users are likely to enjoy based on historical data has been a key factor in reducing churn rates and boosting customer satisfaction. 3. Capital One employs data mining tools to analyze credit card transactions and customer profiles to identify spending patterns and potential fraud. It helps the company create targeted marketing campaigns, optimize customer offers, and detect fraud more effectively. By predicting customers’ needs, such as offering personalized credit card promotions, Capital One has improved profitability and customer retention. Benefits for Service and Manufacturing Companies: Data mining tools are beneficial for both service companies and manufacturing firms. Service companies, like Netflix and Capital One, use data mining to personalize services and improve customer engagement. In contrast, manufacturing companies can use data mining to optimize production, reduce costs, and improve supply chain management. Overall, data mining helps companies in both sectors make more informed decisions, enhance customer satisfaction, and drive profitability. 3. After reading the information presented in this chapter and other sources, write a one-page paper that identifies two companies that use a mobile analytics. How has mobile analytics helped these companies achieve its goals? What are two differences between mobile analytics and traditional analytics? Answer: Answers will vary. Mobile Analytics in Business Two companies that have effectively utilized mobile analytics to enhance their business operations are Starbucks and Uber. 1. Starbucks uses mobile analytics through its mobile app to track customer behavior, preferences, and spending habits. The data collected allows Starbucks to personalize promotions and offer tailored loyalty rewards, improving customer engagement and retention. By analyzing app usage, purchase history, and location, Starbucks optimizes store operations, product offerings, and marketing strategies. This mobile analytics approach has helped the company increase sales and strengthen customer loyalty, contributing to its success in the competitive coffeehouse industry. 2. Uber leverages mobile analytics to monitor ride patterns, customer preferences, and driver availability. By collecting data from its mobile app, Uber can predict demand surges, optimize pricing strategies (e.g., surge pricing), and improve the matching of drivers with passengers. This helps Uber improve service efficiency, reduce wait times, and optimize resource allocation, directly contributing to higher customer satisfaction and revenue growth. Differences Between Mobile and Traditional Analytics: 1. Data Collection Sources: Mobile analytics focuses on data from mobile devices, such as apps, GPS, and real-time user interactions, whereas traditional analytics relies more on data from desktop websites, enterprise databases, and offline transactions. 2. Real-Time Capabilities: Mobile analytics often provides real-time insights, allowing businesses to quickly adjust their strategies based on immediate customer behavior. In contrast, traditional analytics typically analyzes historical data, leading to insights that are not as timely for on-the-spot decision-making. Overall, mobile analytics allows companies to adapt quickly to user behavior and improve customer interactions on the go, which is a significant advantage over traditional methods. 4. After reading the information presented in this chapter and other sources, write a two-page paper that explains database marketing. Identify two companies that have been using database marketing. What are three challenges in using database marketing? What are three advantages of using database marketing? Answer: Answers will vary Database Marketing Overview Database marketing involves using customer data to create targeted, personalized marketing strategies. By analyzing customer behavior, businesses can enhance customer relationships, increase loyalty, and drive sales. Companies Using Database Marketing 1. Amazon uses database marketing to recommend products based on browsing and purchase history, driving higher conversion rates and customer retention. 2. Target leverages customer data from loyalty programs to send personalized offers, increasing sales and customer loyalty. Challenges of Database Marketing 1. Data Privacy and Security: Protecting sensitive customer information to avoid breaches. 2. Data Quality and Accuracy: Ensuring data is accurate, updated, and relevant for targeting. 3. Overwhelming Customers: Avoiding excessive marketing that could annoy customers. Advantages of Database Marketing 1. Increased Customer Retention: Personalized interactions foster loyalty. 2. Improved Targeting: Segmentation allows for more relevant marketing. 3. Higher ROI: Targeted campaigns yield better returns than broad approaches. In summary, database marketing helps companies like Amazon and Target enhance marketing effectiveness, but challenges like data security and customer fatigue must be managed. 5. After reading the information presented in this chapter and other sources, write a two-page paper that identifies three companies that have been using big data. Explain how big data is helping these companies improve the efficiency of their operations. How could big data privacy risks be eliminated or minimized? Answer: Answers will vary. Big Data in Business 1. Netflix: Uses big data to personalize recommendations, optimize content delivery, and predict successful shows, enhancing customer engagement and reducing churn. 2. Walmart: Leverages big data for demand forecasting, inventory management, and dynamic pricing, improving supply chain efficiency and customer satisfaction. 3. General Electric (GE): Uses big data for predictive maintenance and real-time equipment monitoring, reducing downtime and improving operational efficiency. Minimizing Privacy Risks: 1. Anonymization: Strips personal identifiers to protect user privacy. 2. Encryption: Secures data during transmission and storage. 3. Access Controls: Limits data access to authorized personnel only. 4. Compliance: Follows privacy laws like GDPR and CCPA. 5. Data Minimization: Collects only necessary data to reduce exposure risk. 6. The sample table below shows 11 of the students enrolled in an MIS course. Organize the data in a relational format, and use Microsoft Access to list all ACC majors, all ACC majors with a GPA higher than 3.7, all students who are MIS or ACC majors, and all students who aren’t ACC majors. Repeat this assignment, this time using Excel, and generate the same results. Sample Table
Fname Lname ID Major GPA Age Status
Mary Jones 111-1 MIS 2.79 19 Freshman
Tom Smith 222-7 ACC 3.60 22 Senior
Alan Bidgoli 333-9 ACC 3.86 21 Junior
Brian Stark 444-6 MKT 3.45 20 Sophomore
Steve Kline 555-6 MGT 3.75 24 Junior
Susan Brown 666-1 MIS 3.90 21 Junior
Moury Bidgoli 777-2 MIS 3.90 22 Junior
Janet Jeffrey 888-0 MGT 4.00 20 Junior
Andy Thomas 999-2 MKT 3.65 29 Senior
Jack Tucker 234-1 ACC 3.92 23 Senior
Answer: Hands-on. In MS Access, create the table first and then by using Query Design View generate the results. In Excel you should use Data Filter command in order to generate the same results. Appendix C, available online explains Excel Data Filter in detail. Are You Ready to Move On? 1. Random access file structure method is very effective when a large number of records need to be processed daily or weekly. True or False? Answer: False 2. Data dictionary is one of the major components of a DBMS. True or False? Answer: False 3. A data-driven Web site acts as an interface to a database, retrieving data for users and allowing users to enter data in the database. True or False? Answer: True 4. One of the following is not among the approaches to setting up a DDBMS? a. Duplication b. Fragmentation c. Replication d. Allocation Answer: A 5. All of the following are among the possible risks associated with big data except: a. Privacy breaches and embarrassments b. Loss of anonymity c. Discrimination d. They all are Answer: D 6. All of the following tasks are usually performed by a successful database marketing campaign except: a. Calculating customer lifetime value (CLTV) b. Recency, frequency, and monetary analysis (RFM) c. Data warehouse analysis d. Customer communications Answer: C Case Study 3-1 1. Which other companies are using approaches similar to the one used by Austin Peay State? Answer: Netflix, eHarmony, and Amazon. 2. Based on which data does the system makes a course recommendation to a student? Answer: It compares a student’s transcripts with those of past students who had similar grades and SAT scores. 3. How many courses are recommended to a student for possible selection? Answer: The program offers 10 course suggestions. 4. According to the case study, are any other Tennessee schools using this approach? Answer: Three other Tennessee colleges now use this software. Case Study 3-2 1. How does Pandora Radio recommend music to its listeners? Answer: It applies data-mining tools to the Music Genome Project, which is a vast database of songs that a team of experts has broken down into their various components: melody, rhythm, vocals, lyrics, and so on. 2. How are listeners able to create their own customized stations? Answer: Listeners begin by entering their favorite songs, artists, or genres, creating customized “stations.” Then, Pandora Radio mines its database to find songs that are similar. 3. What are some variables that Pandora Radio uses to recommend a song? Answer: Based on the listener past and current favorites. Chapter 4 Personal, Legal, Ethical, and Organizational Issues of Information Systems Reviews and Discussions 1. In the context of Web and network privacy, what is nonrepudiation? Answer: Nonrepudiation is a method for binding all the parties to a contract. 2. What is the goal of Health Insurance Portability and Accountability Act (HIPAA)? Answer: The goal is to protect the confidentiality of a patient’s medical information and establish safeguards to protect the privacy of health information. This includes medical providers’ notes and records, health insurers’ computer records, patients’ billing information, as well as conversations between medical personnel concerning patient care and treatment. 3. What are three examples of code of ethics outlined by the Association for Computing Machinery (ACM)? Answer: • Contribute to society and human well-being. • Avoid harm to others. • Be honest and trustworthy. 4. What are two types of information available on the Web? Which type can be censored? Answer: Two types of information are available on the Web: public and private. Public information, posted by an organization or public agency, can be censored for public policy reasons—such as not allowing military secrets to be published, lest the information fall into enemy hands. Public information can also be censored if the content is deemed offensive to a political, religious, or cultural group. However, private information—what is posted by a person—is not subject to censorship because of your constitutional freedom of expression. 5. What is intellectual property? What are three examples of intellectual properties? Answer: Intellectual property is a legal umbrella covering protections that involve copyrights, trademarks, trade secrets, and patents for “creations of the mind” developed by people or businesses. Three examples of intellectual properties include: copyrights, trademarks, trade secrets, and patents. 6. What is cybersquatting? Answer: Cybersquatting is registering, selling, or using a domain name to profit from someone else’s trademark. 7. What are three advantages of telecommuting? Answer: • Can care for small children or elderly parents and spend more time with family. • Have fewer restrictions on clothing for work, thereby saving the expense of work wear. • No commute, so distance and time factors are reduced as well as the effects of car emissions on air quality. 8. What is text neck? How is it caused? Answer: Text neck is a relatively new terminology that describes neck pain and damage caused from looking down frequently at smartphones, tablets, or other handheld devices. It is impacting millions of people all over the world in particular teenagers and young adults. Projects 1. After reading the information presented in this chapter and other sources, write a one-page paper that outlines five recommendations for improving the privacy of e-mail in an organization. Your recommendations should also highlight ways that minimize or eliminate corporate data leakage. Answer: Answers will vary. Recommendations for Improving Email Privacy and Minimizing Data Leakage 1. Use Encryption: Encrypt sensitive email communications to prevent unauthorized access during transmission, ensuring that confidential data remains secure. 2. Implement Strong Authentication: Require multi-factor authentication (MFA) for email accounts to add an additional layer of security against unauthorized access. 3. Set Access Controls: Restrict access to emails containing sensitive information by defining roles and permissions, ensuring only authorized personnel can view or send certain emails. 4. Email Filtering and Monitoring: Deploy email filtering tools to detect and block potential threats like phishing and malware, and continuously monitor outgoing emails to prevent accidental data leakage. 5. Educate Employees: Provide regular training on email security best practices, such as identifying phishing attempts and understanding the risks of sharing sensitive information over email, to reduce human errors that could lead to data leaks. 2. After reading the information presented in this chapter and other sources, write a one-page paper that describes net neutrality. Describe how a non-neutral network will impact all businesses. Answer: Answers will vary. Internet neutrality (also known as “net neutrality”) must be practiced in all cases. According to this principle, Internet service providers (ISPs) and government agencies should treat all data on the Internet equally—that is, they should not block traffic, charge different rates, or discriminate in any way based on user, content, Web site, types of equipment in use, telecommunication provider, platform, or application. 3. The admissions office of Southern State University needs a simple and easy-to-follow Web policy document to send to its incoming freshmen. The document should tell students how to behave while on the Web. After reading the information presented in this chapter and other sources, create a document that includes a 10-item bulleted list highlighting the key issues of which incoming students should be aware. Answer: Answers will vary. Southern State University Web Policy for Incoming Freshmen • Respect privacy; don't share personal info without consent. • Use secure connections (https://) for university sites. • Maintain professionalism in emails and social media. • Avoid plagiarism and always cite sources. • Follow copyright laws for digital content. • Do not engage in cyberbullying; report harassment. • Use strong, unique passwords for accounts. • Report suspicious emails or activity. • Be mindful of personal sharing online. • Follow university's acceptable use policy for online resources. 4. An oil company in central Texas with more than 2,000 employees needs a document regarding green computing to send to all its key employees. After reading the information presented in this chapter and other sources, create a one-page document that includes an eight-item bulleted list highlighting the key issues of which all division managers should be aware. Give three examples of information technologies that can play a role in this green computing implementation. Answer: Answers will vary. Green Computing Policy for Division Managers • Energy Efficiency: Use energy-efficient equipment to reduce power consumption. • Proper Disposal: Recycle or responsibly dispose of old tech. • Paper Reduction: Promote digital over paper-based processes. • Virtualization: Reduce hardware needs through server and storage virtualization. • Cloud Computing: Use cloud services to minimize on-site infrastructure. • Telecommuting: Encourage remote work to cut commuting energy use. • Energy Monitoring: Track energy usage to identify savings opportunities. • Employee Education: Educate staff on energy-saving practices. Technologies for Green Computing: 1. Virtualization Software (e.g., VMware) 2. Energy-Efficient Hardware (e.g., Energy Star devices) 3. Cloud Storage Solutions (e.g., AWS, Azure) 5. Southern Tech, a major distributor of electronic devices, needs your advice. With more than 1,500 employees who use tablets and smartphones to perform their jobs, the company needs a document highlighting key heath-related issues, which it will distribute to its employees to improve efficiency and reduce work-related injuries. After reading the information presented in this chapter and other sources, create a one-page document that includes a five-item bulleted list highlighting key health-related issues of which employees need to be aware. Why could tablets and smartphones potentially create more work-related injuries than desktop computers? Answer: Answers will vary. Health and Safety Guidelines for Tablet and Smartphone Use At Southern Tech, we care about your health and well-being. As you use tablets and smartphones to perform your tasks, please be aware of the following health-related issues to improve efficiency and reduce work-related injuries: • Posture: Maintain good posture when using devices. Avoid slouching or bending over for extended periods to prevent back and neck strain. • Ergonomics: Use proper ergonomics by positioning devices at eye level and keeping your wrists in a neutral position to reduce the risk of repetitive stress injuries. • Frequent Breaks: Take regular breaks every 20-30 minutes to rest your eyes and stretch your hands, wrists, and neck to avoid eye strain and musculoskeletal discomfort. • Screen Time: Limit prolonged screen time to prevent digital eye strain. Practice the 20-20-20 rule: every 20 minutes, look at something 20 feet away for 20 seconds. • Device Handling: Hold devices comfortably to reduce strain on your hands and wrists. Avoid gripping devices too tightly or using them for long durations without proper support. Why Tablets and Smartphones Can Create More Work-Related Injuries Than Desktop Computers: Tablets and smartphones are often used in less ergonomic settings and require users to hunch over, bend their necks, or hold the devices for long periods, which can lead to strain on the neck, back, and hands. Unlike desktop computers, which are typically used with adjustable seating and proper desk setups, mobile devices do not offer the same level of ergonomic support, increasing the risk of repetitive stress injuries and discomfort. 6. An Internet company in Northern California is receiving frequent requests from employees who want to telecommute. The company’s CTO wants to be flexible and accommodate as many employees as possible. At the same time, the CTO wants to achieve productivity goals and keep to a minimum any legal issues that may arise from this new work alternative. After reading the information presented in this chapter and other sources, create a one-page document that includes three guidelines that telecommuters need to follow and three guidelines that the company needs to follow to achieve both personal and organizational objectives. What are three examples of information technologies that could help this company monitor these telecommuters? Answer: Answers will vary. Telecommuting Guidelines for Employees and the Company To ensure a successful and productive telecommuting arrangement, the following guidelines must be adhered to by both employees and the company: Employee Guidelines: • Maintain Regular Work Hours: Telecommuters should stick to a set work schedule that aligns with team needs and company expectations to ensure consistent communication and productivity. • Secure Work Environment: Employees must ensure their home office complies with company security standards, including using secure networks and protecting sensitive information from unauthorized access. • Clear Communication: Employees must maintain open communication with their managers, participating in scheduled virtual meetings and updating progress regularly to ensure alignment with organizational goals. Company Guidelines: • Provide Necessary Tools and Support: The company should provide telecommuters with the appropriate technology (e.g., laptops, software) and support to work efficiently and securely from home. • Monitor Productivity: The company should set clear performance metrics and monitor progress to ensure telecommuting does not impact productivity and that goals are met. • Ensure Legal Compliance: The company must ensure that telecommuting arrangements comply with labor laws, including those related to working hours, overtime, and employee benefits. Information Technologies to Monitor Telecommuters: 1. Time-Tracking Software (e.g., Toggl, Harvest) – Helps employees log hours worked and track task completion. 2. Collaboration Tools (e.g., Slack, Microsoft Teams) – Facilitates communication, file sharing, and virtual meetings to maintain team connectivity. 3. Employee Monitoring Software (e.g., Hubstaff, ActivTrak) – Tracks work activity, including computer usage and productivity, to ensure employees are staying on task. Are You Ready to Move On? 1. An acceptable use policy is a set of rules specifying the legal and ethical use of a system and the consequences of noncompliance. True or False? Answer: True 2. According to Brookings Institution for every 1 percent increase in high-speed penetration, employment expands by nearly 300,000 jobs. True or False? Answer: True 3. Generally, copyright laws protect intangible material. True or False? Answer: False 4. One of the following is not among the Ten Commandments of Computer Ethics: a. Thou shalt not use a computer to harm other people b. Thou shalt not use a computer to steal c. Thou shalt use or copy software for which you have not paid d. Thou shalt not use a computer to bear false witness Answer: C 5. All of the following are among federal data protection laws except: a. COPPA b. NAFTA c. FACTA d. HIPAA Answer: B 6. All of the following is a part of a successful green computing program except: a. Green design b. Green manufacturing c. Green warehousing d. Green disposal Answer: C Case Study 4-1 1. According to GlobalWorkplaceAnalytics.com, what percent of the workforce is at least half-time telecommuters? Answer: According to GlobalWorkplaceAnalytics.com published in January, 2016 there were 3.7 million employees (2.8% of the workforce) that are at least half-time telecommuters. 2. What are some methods that employers use to monitor their employees? Answer: To make telecommuting more productive, some employers set targets for each employee to accomplish in a given period. Other employers review summaries of different Web sites that employees have visited and the amount of time that they have spent on various Web sites. Some other employers track projects and schedule meetings on shared calendars in order to monitor their employees. Still other employers require "virtual face time" via e-mail, instant messaging, video chat, or calls. 3. What is an example of a software tool that is used for employee monitoring? Answer: InterGuard (Awareness Technologies) is one example. 4. According to the case study what percent of the U.S. workforce has jobs that are compatible with telecommuting arrangements? Answer: Half of the U.S. workforce has jobs that are compatible with telecommuting arrangements. Case Study 4-2 1. What are some business applications of Google Maps’ Street View? Answer: Answers will vary. Briefly with Google Maps’ Street View, you can view the world at street level. You could view popular landmarks, check out places you want to visit in your hometown or anywhere else, and take a virtual trip around the world. 2. How has Google Maps’ Street View created privacy and other legal issues? Answer: Google had been unknowingly collecting private data from unencrypted Wi-Fi networks. The collected material included a list of people with certain medical conditions, e-mail addresses, video files, and lists of visited Web pages. According to Google, the data collection was an accident due to a programming error. 3. What is Google Books, and how has it created copyright protections and other legal issues? Answer: By searching the full text of books, the service attempts to provide an online catalog of all the books contained in its vast database, but some people have claimed that the application has violated copyright protections. Solution Manual for MIS-2 Hossein Bidgoli 9781337406925

Document Details

Related Documents

Close

Send listing report

highlight_off

You already reported this listing

The report is private and won't be shared with the owner

rotate_right
Close
rotate_right
Close

Send Message

image
Close

My favorites

image
Close

Application Form

image
Notifications visibility rotate_right Clear all Close close
image
image
arrow_left
arrow_right