Tuesday, December 24, 2019

Major and Career Research Project - 1352 Words

Major | Career Research Project | | | James Paullin | 11/16/2012 | | Biology Biology is under the college of Arts and Sciences and is categorized in the Biological Sciences department. The main chair/director is Dr. Sam Atkinson with an assistant, Kendra Donahue. The Biological Science department is located in the Biology Building 210. There are numerous courses that have to be taken in order to major in Biology; while also minoring in Chemistry as well. There are introductory classes that need to be taken like: â€Å"Introductory Biology: Comparative Physiology† or â€Å"Introductory Biology: Cell and Development Biology.† Also â€Å"General Chemistry† for two semesters with â€Å"Organic Chemistry.† One semester of calculus is†¦show more content†¦Neuroscientist A neuroscientist is trained in researching the structure and function of the brain and nervous system. They have to specialize in cell chemistry and biology, brain anatomy, cognition, genetics, or experimental psychology. Many neuroscientists use number of tools in order to learn about the brain, nervous system, and behavioral patterns. They mainly use computers in order to interpret results from studies they find. Neuroscientists collaborate with one another in order to conduct sensitive, complicated studies. They wor k together to design materials, apply for grants ,acquire new materials, and even recruit volunteer test subject. I think this type of work would interest me and I would be able to accomplish these things. I find interest in the brain and how it functions; therefore researching the brain and its functions would interest me the most. In order to become a neuroscientist an individual is required to obtain a PhD and complete up to two years of postdoctoral training. Most scientists complete a four-year bachelor’s degree in biology, chemistry, or psychology, along with four- or five-year doctoral programs in cognitive, biological, or molecular neuroscience. Graduates usually obtain postdoctoral fellowships at universities, private research institutions or pharmaceutical companies, where they work alongside experienceShow MoreRelatedChapter 3 : An Purpose For Reading1324 Words   |  6 Pagesspeech. Chapter 10, I found it refreshing by the tips of choosing a major such as considering my abilities and values, make a trail choice of my top three majors, then evaluate the trail choice by enrolling in related classes from the top three, and repeat again with different major. These trail choices opened my eyes figuring out what major I would want to do and what are my interests that correspond to a particular major. Part 2 of Final The two best class activities were mind mapping videoRead MoreA Career in Project Management1577 Words   |  7 Pagesproposal on pursuing a career as a Project Manager is designed to provide research and criteria concerning elements for entering into the field of Project Management. The research will provide the essential skills and a job description of a Project manager. As background information, I have provided researched information based on the interest of being a Project Manager. The Survey results provide an insight to how some individuals pursued their careers and their educational backgroundsRead MoreA Research Study On Social Justice Work864 Words   |  4 Pagesranges and varies a little. As a Criminology major I will be seeking to locate subjects within the field I would like to go in (Lawyers, Judges, and Detectives†¦ etc.) But also I would like to learn more about social justice work (shelter for youth, being involved in civic engagement work and how it feel to be labeled as a â€Å"troubled youth.† With the following I will be able to get a better understanding on how I would like to develop my potential career field aspect along with changing the world forRead MoreThe Field Of Higher Education1508 Words   |  7 Pagesstudents the skills needed for their careers and the real world, the new university will not offer students a major, but rather, they will form their own undergraduate dissertation and project focus. As a result, every student will graduate with their own unique set of skills and experience, allowing them to pursue an array of careers rather than only one specific area. The curriculum will consist of the following components: 12 general education courses from every research available at the university (mathRead MoreMy Career Goals Of Becoming An Applied Social Psychologist982 Words   |  4 PagesPersonal Statement A few years ago, my future and my goals were clear: I would graduate in 2017 with a Bachelor’s of Science in Psychology and pursue a career in therapeutic counseling. However, my plans were altered after I was exposed to the research side of psychology. I was drawn in by the psychological insight shed on tragedies like the holocaust, why no witnesses helped Kitty Genovese after she had been stabbed, how a rape victim can misremember his or her assailant, and possible solutionsRead MoreFirst Innovative Leadership Academy For Young Women Leaders1280 Words   |  6 PagesI started doing most of my career research early on in my middle school and high school years. I was lucky enough to be selected among the hundreds of fifth graders and sixth graders that applied to go to the first innovative leadership academy for young women leaders. A middle school in the early 2000’s which was previously Porter Middle School to most austinites, was renovated in summer of 2007 founded and named after the late great female governor of texas Ann Richards. In a summer camp leadingRead MoreGoal Statement1263 Words   |  6 PagesStatement Walden University Ph.D. in Human Services, specialization; Human Services Administration My primary goal in applying to Walden University for Ph.D. program is to prepare myself for a future career in forensic human services administration. Interested in furthering the current body of research and in improving techniques used on the study of the theoretical foundations of organizational behavior and the practice of management and planning. I am very committed to pursuing human services administrationRead MoreMy Path to Choosing a Career741 Words   |  3 Pagesfilled teaching the fundamentals of tennis to young players as I hope to transition towards a career in law. How did I arrive at this juncture? What motivated me to leave the lab and embark on this new path? To answer these questions, let me first explain what motivated me initially to pursue a career in research. With an interest in science well before college, I entered Emory University as a chemistry major. In my introductory courses I became fascinated with learning how genes function at the molecularRead MoreThe Hot Zone By Richard Preston Essay1498 Words   |  6 Pagesmy interest in public health in college as a biology major. During my Spelman College trajectory, I explored various careers. The summer after my freshman year at Spelman, I participated in the Continuing Umbrella of Research Experiences Program (CURE) at Northwestern University and conducted cancer research under Dr. Erwin Goldberg centered around enzyme inhibition as a cancer treatment option. I subsequently conducted ovarian cancer research the following academic year centered on serum withdrawalRead MoreResume [Utp Template]1448 Words   |  6 Pages(Hons) Mechanical Engineering [Majoring in Material] Universiti Teknologi PETRONAS (UTP) 7th August 2010 Dear Sir/Madam, APPLICATION FOR CAREER OPPORTUNITY Your company’s milestone and achievement in the industry really impresses me, and your philosophy of encouraging career professional development is something I value. Thus, I am writing to apply for a career opportunity in your reputable company. I am currently in my final semester and will be graduating on December 2010. 2. On my previous work

Sunday, December 15, 2019

Analysis on Personal Philosophy Free Essays

As defined by Webster†s Dictionary, a teacher is â€Å"one who instructs, directs, and disciplines other individuals.† This definition is correct, however, teaching encompasses much more. A teacher is an integral part of the learning process of a child. We will write a custom essay sample on Analysis on Personal Philosophy or any similar topic only for you Order Now A teacher also aids the child in personal growth and life development. Teaching has always been my lifetime desire. I look forward with great anticipation to the day when I teach my own class. This will give me the opportunity to instill in the children a thirst for knowledge. This is also a chance for me to make the children realize their unique potential for greatness and open their eyes to the beautiful world around them. Before getting involved in my formal education classes and field experiences in Elementary Education at Pennsylvania State University, I thought being an educator involved teaching the students basic skills, assigning homework, and testing their knowledge. I soon found out that this monotonous routine does not maximize student interest and learning. Through my valuable student teaching experience, I have come to identify with a teaching paradigm known as Inquiry learning. In this particular paradigm, knowledge is viewed as functional and pleasurable. Children learn from the questions they pose. Key skills are learned in context and focus on child interest rather than artificial and made-up. This type of education concentrates on student interest. Children are focused and on-task because they are directly involved in their own learning. The Inquiry Paradigm also allows for numerous hands-on learning experiences. Another aspect of Inquiry learning is that the teacher is viewed as a â€Å"partner along the journey† instead of â€Å"Supreme Being†. I firmly believe that a teacher should treat her students as partners on a journey. This allows students to feel independent and responsible for their own learning. How to cite Analysis on Personal Philosophy, Papers

Saturday, December 7, 2019

Free Sample Assignment on Marketing Plan of Michael Kors

Question: Describe about the Marketing Plan of Michael Kors. Answer: Introduction to the Company Michael Kors is a well-known manufacturer of readymade mens and womens accessories, watches, and fragrance products. It is a global brand and running its operations from more than 35 years. The company operates in all levels of the supply chain and has primarily three distribution modes, namely, retail format, wholesale format and licensing format (Michael Kors, 2016). It produces budget-friendly yet stylish products. The primary markets of the company are Europe and the USA. Recently, the company is focusing on expanding its business in other emerging markets such as China, Iran and India. The following report conducts a thorough analysis of the potential markets for the company to expand. In this regard, the macro and micro factors impacting the fashion industry are explored, the internal business factor of Michael Kors are discussed, the potential markets are evaluated on the basis of 12 Cs international market strategy, and recommendations are provided so that the company can ent er the market successfully. Analysis of Macro and Micro Factors impacting on the Fashion Industry The global fashion industry is influence by several factors on which the business owner has little control. It is important that a company adapt itself to these factors to succeed. In this report, the macro environment of the fashion industry is analysed through PEST analysis (Applegate Johnsen, 2007). Political factors: The fashion industry is influenced by the labour laws and political environment of a country. The trade laws and the export laws also influence the fashion companies. Economic factors: In the times of economic boom, the customers have more disposable income in their hands. Therefore, the customers are more inclined to buy fashion products. In contrast to it, recessions have a negative impact on the sales of the fashion industry. Social Factors: It includes factors such as culture, lifestyle, and demographics. The fashion companies have to create items that appeal the targeted market segment. In addition to it, demographics also influence the consumer behaviour, for example, in places where the birth rate is low, demand for baby clothes will be low (Duff, 2016). Technological Factors: In fashion industry, technology plays a critical role in marketing and operations. Analysis of Micro Factors influencing the Fashion Industry The micro environment includes those factors that can be controlled by the management of the organisation. The most important factors are competition, supplier and consumers. The micro environment of the fashion industry is analysed by the porters five force model. The porters five force analysis examines the competitiveness in a given market on the basis of five forces, namely, buyer power, supplier power, competitive rivalry, the threat of new entrants and the threat of substitution (Porter, 2008). Buyer Power: In fashion industry, a consumer has multiple options for a single product. There are numerous international and national competitors and the consumers can easily switch companies without any switching cost. Therefore, the bargaining power of the consumers is high. Supplier power: In the fashion industry, the products are outsourced from cheap labour companies such as China and Bangladesh. Thus, the suppliers share significantly amount of the net profit. Moreover, they can be easily replaced. Therefore, the bargaining power of the suppliers is low. Industry Rivalry: In the fashion industry, there are a large number of retailers who sell similar products. Therefore, there is intense competition among the companies. There is very small innovation in the industry and most of the companies are at price wars. However, there are also several luxurious brands sell products at a high cost, but the market share for these companies is very low. As a result, the industry rivalry in this industry is high. Threat of New Entrants: Fashion industry is considered as a saturated industry due to the number of retailers in the business. There is little innovation in the industry, which makes it difficult for the new organisations to distinguish themselves from the older ones. However, the companies can utilize extensive marketing strategies to distinguish themselves. The operational costs of the companies are also medium. Therefore, the threat of new entrants in neither low nor high in fashion industry. Threat of substitution: There is no substitution to the fashion apparels and the fashion products. Therefore, all the substitution to the fashion products is between different companies and brands. The threat of substitution in the fashion industry is low. Micheal Kors Internal Business Factors Porters Value Chain Framework The value chain framework provides an analysis of the activities that allows a firm to obtain competitive advantage and gain shareholder value. It is a generic model that examines the range of activities which are differentiated as primary activities and secondary activities (Wiedemann, 2013). The value chain analysis of Michel Kor is conducted below: Inbound logistics: Most of the products of Michael Kor are manufactured in the Asian countries and stored in British Virgin Islands. It results in cost and tax saving for the company. Furthermore, storing manufactured in British Virgin Islands result in easy accessibility of the products to the major markets. Operations: It is the process of transforming inputs into finished products. The company has robust operations. It has skilled workforce and technically advanced machinery to transform input into finished products and services. Outbound logistics: Michal Kor has a technically primarily three channels for product distribution, namely, retail outlets, wholesale outlets and licensing format. It has not participated in other distribution channels such as franchising and joint ventures to enter in international markets. It has a limited market mainly in Europe and the USA; therefore, the company has limited market. Marketing and Sales: In the recent year, Michael Kor has gained substantial market in Europe and the USA due to extensive and attractive marketing method (Lutz, 2012). It has targeted its marketing strategy on these higher middle-class and growing affluent class. Service: The staff of the company is focussed on providing good services to the customers and be available to their every requirements to achieve customer satisfaction. In the value chain framework, the primary activities of the organisation are supported by: Infrastructure of the firm: Michael Kor is a leading organization in the fashion industry. The infrastructure and the control system of the company is well-establishes and state-of-the-art. Technology: The Company has embraced technology in all its operations to achieve efficiency and support all the value-creating activities. Human Resource management: Michael Kor tries to gain competitive advantage over other competitors by recruiting and training the best talent in the industry. It put special emphasis in employee retention, development and training to enhance productivity of the organization. Procurement: Over the years, the company has established a robust supply chain that includes the purchase of materials, supplies and equipment at low cost and high quality. SWOT Analysis The SWOT analysis is a framework that analyses the internal strengths and weaknesses and external opportunities and threats (Pahl, Richter, 2009). It assists an organisation in strategic management by identifying opportunities and strengths. Strengths The brand is very popular among the ladies. The company has used the strategy of celebrity endorsement wherein a number of Hollywood celebrities have worn the brand on red carpet and endorsed it. It has carved itself a niche market segment and is hugely popular among the young generation. All the designs are developed by the renowned global designers Weaknesses It serves a limited marketing segment in the US and Europe. It is lesser known globally. As per the recent strategy of the company, the brand has lowered its cost which has made the consumer perception of low quality and mass company. Opportunities Emerging markets in developing countries in China, India and Israel. Trust-worthy brand, popular among the consumers as a reliable brand. Rapidly growing luxury lifestyle market due to increase in higher middle class in the global population. Nowadays, many companies are trading through internet and e-commerce platforms. It is an opportunity for Michael Kors to increase market penetration and customer base. Threats It provided limited options or choice of products. Other emerging companies which are trying to obtain the market segment held by Michael Kor. There are a number of competitors in the luxury penalty. Market Attractiveness Evaluation using 12 Cs Framework A company can analyse international markets opportunities using the 12 Cs framework. According to this framework, the 12 Cs are country, culture customer behaviour, concentration, communication, channels of distribution, capacity to pay, currency, control and coordination, commitment, choices, contractual obligations, caveats. With this framework, a business organisation can examine the viability of the business venture. China Country: China is the most populated country across the globe. In the recent years, the economy of the country has substantially grown and as a result the affluent middle-class section of the society is growing. It also has a relatively better infrastructure than other Asian countries and cheap-labour. Culture Customer Behaviour: Majority of the Chinese population follow Buddhism religion. The young generation are attracted towards brands and luxury goods. The growing middle-class has increased the disposable income in the hands of the customers and expanded the luxury apparel market of the country (McKay, 2012). Concentration: The country has high population and industrial concentration in Shanghai, Beijing, Ghuangzhou and Hong Kong. In the recent years, the Chinese government has implemented various measures to increase the urbanization of the country. Communication: In term of telecommunication, China has the maximum users of mobile phones and internet. However, there is substantial restriction over foreign media. China has its own internet and social media services (McKay, 2012). Channels of distribution: As Michael Kors imports manufactured products from China, Bangladesh and other Asian countries, it can avail local distribution channel. The net cost associated with distribution will also be significantly less. Capacity to pay: A large number of customers will be capable of paying (McKay, 2012). Currency: Chinese currency is stable. Control and coordination: There is significant control of the Chinese government on the local markets but they are becoming more flexible to expand its economy. Commitment: The Company has commitment to provide quality products at reasonable cost. Choices: The competition between the luxurious apparels is evident in China. Recently, several companies have entered the country to exploit its expanding market. Contractual obligations: In the recent years, the country has transitioned from planned economy to mixed economy to open market. The government has loosened control over international companies and market to attract more foreign companies to the market. The contractual terms such as warranty, guarantees and penalties are similar to other countries (McKay, 2012). Caveats: The Chinese citizens prefer to buy luxury clothes from foreign countries. Recently, Michael Kor has also lost its status of celebrity brand and become more a mass product. India Country: It is second most populous country of the world and fastest growing economy after the economic reforms in 1991 (EY, 2016). Culture Customer Behaviour: It is a traditional country and recognized as multi-ethical and multi-lingual society. A significant section of the society comes in middle-class; however, they prefer traditional and ethnic wear. Recently, this trend has changed. Concentration: The country has high population and industrial concentration in cities like Delhi, Mumbai, and Bangalore (EY, 2016). Communication: It has a fast growing communication sector with more and more customers using internet and smartphones every day. Channels of distribution: The products can be outsourced from the nearby countries which are already producing the finished goods for the company. Other than that, it can adopt the indirect or direct distribution strategy wherein the goods can travel through an intermediary to customers or directly to the customers respectively. Capacity to pay: Growing affluent class has high disposable income in their hands. Currency: Indian currency is stable. Control and coordination: It is a mixed economy but the government has strong hold of the market and there are strict legislations and taxation structure. Commitment: The Company commits to provide quality products at reasonable cost. Choices: Several international brands have entered into the Indian markets to exploit the opportunities of the growing market. Contractual obligations: It has strict legislation and taxation structure; therefore, the companies are required to maintain certain contractual obligations while doing business in India. Caveats: The Indian market has issues like complex taxation structure as well as duplication market. Copies of the products of high brand are available at very low cost and people prefer to buy them. Recently, Michael Kor has also lost its status of celebrity brand and become more a mass product. Russia Country: The country is politically stable and developed economy. Culture Customer Behaviour: The country is rich in culture, arts and performance. The people are inclined towards aesthetically beautiful things, designs and clothing. Concentration: It has a relatively high population, but the concentration is relatively low. Communication: It is a developed country with a strong infrastructure for telecommunication. Channels of distribution: The infrastructure of the country is ageing and inadequate. It has a well-developed system of railways and inland waterways. The company can use indirect or direct distribution methods for goods distribution (Dellloite, 2016). Capacity to pay: As Russia is a developed country; the customers have a high capacity to pay. Currency: Russian Rubble is strong and stable. Control and coordination: Russia is a federal republic with semi-presidential system. It has a mixed economy with government control over certain domains. It is relatively free for fashion industry. Commitment: The Company is committed to consumer experience which can be observed in its experience. Choices: High competition due to large number of foreign and local merchandisers. Contractual obligations: The companies are required to maintain certain contractual obligations while doing business in Russia (Dellloite, 2016). Caveats: Recently, Michael Kor has also lost its status of celebrity brand and become more a mass product. Iran Country: The country is a strong middle-eastern and regional power. It is a democratic country with Islamic theocracy. It is a multicultural and multi-ethnic country. Culture Customer Behaviour: It has a relatively old culture which is influenced by several countries like Greece, Italy and India. It has a traditional culture influenced by Islam, and people wear traditional dresses and women wear hijab (Spivack, 2016). Concentration: It has a relatively high urbanization rate. Majority of the population is saturated around Tehran, Mashhad and Isfahan. Communication: It has serious limitations in telecommunications as all the media channels are government owned and all the outlets must be approved by government before releasing them to public. Channels of distribution: The infrastructure of the company has serious imitations because of technological lags. It is advised to follow the business to business distribution model as Iranian business men have a very different style of conducting business. Capacity to pay: It is home to a market of 60 million as well as it is strategically located so that the company can access the whole central Asian market (Spivack, 2016). Currency: Iranian currency has a strong value. Control and coordination: The taxation structure in Iran is highly complicated (Spivack, 2016). Commitment: The Company is committed to good consumer experience. Choices: A significant number of foreign companies have entered Iran which provides customers numerous choices in fashion apparels. Contractual obligations: The labour laws in Iran are very employee friendly and they have a peculiar style of following all the business dealings. Caveats: It has an unstable government and rules and regulations. Market Entry Strategy In the present situation, partnering is the most appropriate strategy for Michael Kors to enter in the foreign markets. It is the particularly beneficial strategy when the company is planning to enter a foreign market in which the both social and cultural differences are highly prominent. On the basis of 12 Cs framework, China is selected as the most suitable country for market expansion due to its infrastructure, suitable distribution channel, large market and capacity of the consumers to pay. However, the company has to make changes in its market mix to appeal to the local customers. Product: As Chinese society is conservative and traditional, it is important to integrate the ethnic taste and culture while developing the clothes and apparels for the traditional customers (Wenderoth, 2009). Price: As discussed, there is a large segment in the Chinese society who is willing to pay higher for valued products. However, inexpensive products lost their appeal to large section of society. It is important to determine the price of the products according to a specific strategy. Promotion: The Chinese customers are different from their Western counterparts. Therefore, various advertisements popular in the USA and Europe might be perceived as confusing in China. It is important to develop a promotional strategy inspired by local culture. Conclusion Michael Kors has carved itself a distinct place in the fashion industry. Following the intent of expanding into international markets, the report has examined the current position of the company and potential markets, namely, China, India, Iran and Russia for future expansion. It has been evaluated in the report that China is the best market for the company, if changes are made in its marketing mix. References Applegate, E., Johnsen, A. (2007). Cases in Advertising and Marketing Management: Real Situations for Tomorrow's Managers. Rowman Littlefield. Dellloite. (2016). Doing business in Russia 2016. Retrieved December 9 2016 https://www2.deloitte.com/ru/en/pages/tax/articles/2016/doing-business-in-russia-2016.html Dilys. (2014). Fashion and Politics. Centre for Sustanable Fashion. Retrieved December 9 2016 https://sustainable-fashion.com/blog/fashion-and-politics-a-multidimensional-relationship/ Duff, V. (2016). Important factors of competition in the Clothing Market. Retrieved December 9 2016 https://smallbusiness.chron.com/important-factors-competition-clothing-market-81643.html (2016). Doing business in India. Retrieved December 9 2016 https://www.ey.com/in/en/services/tax/ey-doing-business-in-india-2013-14 Lutz, A. 2012. hy Michael Kors Is Having A Blockbuster Year. Business Insider. Retrieved December 9 2016 https://www.businessinsider.com/why-michael-kors-is-successful-2012-9?IR=T Martin, M.J. (2016). What Contributes to the Fashion Industry's Being So Competitive? Retrieved December 9 2016 https://smallbusiness.chron.com/contributes-fashion-industrys-being-competitive-23840.html McKay, Z. (2012). The Ten Principles For Doing Business In China. Retrieved December 9 2016 https://www.forbes.com/sites/insead/2012/03/06/the-ten-principles-for-doing-business-in-china/#2118fa1a1176 Michael Kors. (2016). Michael Kors. Retrieved December 9 2016 https://www.michaelkors.com/ Michael Kors. 2016. Investors. Retrieved December 9 2016 https://investors.michaelkors.com/resources/supply-chain-disclosure/ Pahl, N., Richter, A. (2009). Swot Analysis - Idea, Methodology and a Practical Approach. GRIN Verlag. Porter, M.E. (2008). Competitive Strategy: Techniques for Analyzing Industries and Competitors. Simon and Schuster. Spivack, M. (2016). What to Know About Doing Business in Iran. Retrieved December 9 2016 https://hbr.org/2016/05/what-to-know-about-doing-business-in-iran Wenderoth, M. (2009). Particularities in the Marketing Mix for Service Operations. GRIN Verlag. Wiedemann, L. (2013). Business Strategies and Value Chain Management. Author House.

Saturday, November 30, 2019

Unified Themes free essay sample

Any person can tell that Edgar Allen Poe does a great Job drawing in the reader by using specific themes to add effect his short stories, The Cask of the Amontillado, Hop Frog, and the Tell-Tale Heart. The use of theme in his short stories makes the reader want more. His use of revenge in his short stories makes the reader more curious and raises the level of suspense. Poe does well in using revenge to keep the reader engaged. The narrators view in each of the story gives you the main characters view f the story, which creates a bias towards that character. In some stories the reader will feel the murder was Justified. First, Hop-Frog is the story of a crippled Jester who was pushed to the point to murder. His fool, or professional Jester, was not only a fool, however. His value was trebled in the eyes of the king, by the fact of his being also a dwarf and a cripple. We will write a custom essay sample on Unified Themes or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page Hop Frog is a professional Jester whose Job is to humor the king by being a fool. One evening the King had decided to have a masquerade and have Hop-Frog and his dwarf friend, Trippetta, organize the characters and ostumes for the party. After he summons both of them the king makes Hop Frog drink a goblet of wine. After they are all intoxicated, Hop Frog planned to get revenge on the king and seven other cabinet members. He tricks them into chaining themselves for the people attending the masquerade, and make them look like great beasts. Hop Frog chains them up and covers them completely in tar and flax. Once the party starts, Hop Frog raises the Eight Chained Ourang-outangs thirty feet in the air and proceeds to set them on fire. He then climbs back up the chains and scapes out a window and disappeared with Trippetta. The theme of revenge in Hop- Frog plays a big role in how the story plays out. The use of revenge as a theme in this story does a great Job at keeping the reader engaged into the story. It makes the reader really want to know and think what is going to happen next. When Hop-Frog chains the King and his members up, it makes the reader curious about what he plans to do to them. In less than half a minute the whole eight ourang-outangs were blazing fiercely, amid the shrieks of the multitude who gazed at them from below, orror-stricken, and without the power to render them the slightest assistance. In this story the revenge is not thought out but more in the moment and under the influence of alcohol. Hop-Frog plans out this revenge because of all the times he was picked on by the king. He was sick of it all, so he planned to murder the king and under the influence of alcohol gave him the confidence to pull it off. The narrator as a witness to the events of the story also plays a big rol e in the story Hop-Frog. The narrators view throughout the story is on the negative things that happen to Hop- Frog. This creates a big personal bias and makes the reader favor the actions of Hop- Frog. It makes the reader feel bad for the main character and decide that the murder is Justified. The narrator is also a witness of all the actions that take place throughout threw the contents of the brimming goblet in her face. In this scene the narrator witnesses Tripetta trying to stop the king from making Hop-Frog drink alcohol, and the King ends up throwing his drink in Tripettas face. The narrator sees this and makes the reader feel bad for the two and wants to help them. Later, the narrator lso witnesses Hop-Frog setting the king and his cabinet members burned alive from the chandelier. The use of the theme setting creates a must-need image of the main character and his reason for the murder. The main character uses the fire as a dramatic element not only as a part of the setting but also part of the murder. The narrator uses the chandelier as a huge part in the setting as the place where the murder occurs. He uses the chandelier to present the eight members, then set them on fire and kill them all. And now, while the whole assembly (the apes included) were onvulsed with laughter, the Jester suddenly uttered a shrill whistle; when the chain flew violently up for about thirty feet-dragging with it the dismayed and struggling ourang-outangs, and leaving them suspended in midair betweenthe skylight and the floor. After he brings them to the chandelier he lights them on fire, giving the setting a dramatic element to draw the reader deeper into the story . Next, the Tell-Tale Heart is story of a madman who murders the old man he lives with because of his eye. The narrator opens the story and explains why he had to take the life of the old an. Whenever it fell upon me, my blood ran cold; and so by degrees-very gradually-I made up my mind to take the life of the old man, and thus rid myself of the eye forever. For seven straight nights he would stick his head in the room where the old man sleeps and would beam a light from a lantern at the eye. On the eighth night the old man woke up as the narrator stuck his head in the room. The narrator beamed the light later at the eye and the man was awake. This angered the narrator and scared the old man to the point where the narrator could hear it. The narrator hen burst in the room and smothered the old man with his mattress until it killed him. He dismembered the body and proceeded to put the parts underneath the floor boards of the house. When the police came to investigate the disappearance, he heard the beating of his own heart and the guilt caused him to confess to the murder. Another thing is that the use of revenge in the Tell-Tale Heart is kind of different than the other two stories. In this story, the form of murder is more premeditated and planned out than Just at the right time. The narrator had planned o take the life of the old man a week before killing him. And this I did for seven long nights-every night Just after midnight-but I found the eye always closed. He watched him for seven straight nights until killing him on the eighth. The use of revenge as a theme in this story keeps the reader wondering when he will kill the old man and how he plans to kill him. It keeps the reader wanting to read more and gets the reader more curious about what will happen. Another reason why the narrator killed the old man was out of self-guilt. After the murder was complete, the narrator heard he beating of his heart and felt so guilty for killing the old man he confessed. The narrator couldnt handle hearing the beating of his heart because it sounded Just like the old mans when the narrator killed him. The narrators view in the Tell-Tale Heart was also the same as the others. It created a personal bias that made you think that that the murder wasnt as Justified as the others. In this story he murders this poor old man because he was bothered by one of his eyes. One of his eyes resembled that of a vulture-a pale blue eye, with a film over it. The theme of the narrators view n this story makes you want to believe that the killing of the old man is for the better. It tries to make you feel that its fine and its no big deal. Another thing on the narrators view is he watched the old man every night. He stood by the door in the floor and had it cracked Ju st enough to see him. The use of setting is a theme that plays a big part in Poes the Tell-Tale Heart. In the Tell-Tale Heart the narrator uses the darkness to murder the old man. It gives the main character a more secretive nature when he is using his setting to scare the old man. The setting is also a big art after the murder has taken place. The old man sleeps in a large room that only has an opening in the floor to enter and leave. This gives the narrator an easy way to murder the old man. After the main character kills the old man and dismembers him he proceeds to bury him in the floor boards. l then replaced the boards so cleverly, so cunningly, that no human eye-not even his-could have detected anything wrong. The place where he hides the dismembered parts is very significant. When people come around to ask about the old man it ends up that they are standing right above im. The writer uses the setting to reflect the details throughout the killing. Also, the Cask of the Amontillado, the story of a man wanting revenge on another man, who supposedly ridiculed him thousands of times. The evening starts at dusk during the madness of a carnival where the narrators victim had already been drinking too much. There he decides to enact his revenge on the intoxicated Fortunato by using Amontillado. He draws his victim in saying he Just received a large cask of wine called Amontillado. As you are engaged, I am on my way to Luchesi. If anyone has a critical urn, it is he. The narrator says this to get Fortunato to come with him and he ends up agreeing. He follows the narrator down deep into the catacombs underneath Paris. The narrator gets Fortunato to go into a room far at the end of the vaults and chains his victim to the wall covered in skulls and bones. He then pr oceeds to brick up the room so no one can enter and find the chained Fortunato. The story ends with the narrator putting the final brick in place, closing the room for half of a century of nothing disturbing it.

Tuesday, November 26, 2019

politics and the media essays

politics and the media essays Politics and the media have always been involved with each other, with media strongly setting the standard for what politics are important. Our perspective of the real world is based on the issues the media makes aware to us. It is not known which influences more, but there are definitely two sides to the story. Many studies have been done to decide but each comes out with different answers. I think that the media has more of an impact on politics than does politics on the media. The two have always gone hand and hand. Conflicting each other in newspaper and television, but generally enjoying each other's company. It is the role of the mass media to keep the general public informed and up to date with current news and events in their community, state, country, and around the world. In politics, the media can either help or damage a politician by changing the public's opinion. Many people depend heavily on television as their source of information where they see or hear about political issues and events, because television is the single most powerful source of world communication and nightly newscasts are the most frequently watched source of information for the public. The mass media is everywhere we turn, from television sets, to radio, to newspapers, and now the Internet. In their role, are they actually giving us the right message or is it all false, like in tabloids, which are created just to sell? Most of the public believes that the top priority of the media is to find and report important information to the public. Few believe that it is to give readers and viewers what they ask for. The media sets the standard, and many believe that this creates an unfair society. They determine what people believe to be important issues. When the media focuses on a problem, the public's opinions on that problem then become influenced and this is also true for the president. The president reacts b ...

Friday, November 22, 2019

Buyer Behaviour

The purpose of this report is to describe the purchasing scenario of a consumer who is about to purchase a device to replace their broken or outdated laptop. The decision on what device to purchase is complex and depends on their individual needs. Consumer buying behaviour is defined by Kotler et al (2008:238) as â€Å"[t]he buying behaviour of final consumers-individuals and households who buy goods and services for personal consumption†. The world as we know it today has rapidly changed due to advancement in technology. Consumers preference are also changing due to the market changes that continue to occur . In order for a business to survive in the competitive markets today ,a company/firm has to be up to date with the latest consumer taste and trends. Consumer behaviour offers vital information and guidelines to marketers on the new upcoming technological changes that they will need to explore for example, Lap tops, PC, IPods, Phones and etc. Consumer behaviour is important in marketing, because it focuses on the customer’s views and what customer value at all times. Customers’ needs/wants are always deliberated by the company so as to provide the best service/product in return. 2. The characteristics that affect consumer behaviour Mr Dennis Nyanmichaba an accountant at NBC Bank has faults with his HP Laptop which keeps on heating up and randomly shutting down every time he places it on a hard surface, due the problems he can hardly use his laptop at home or work because it keeps shutting down, and sometimes when he is doing important work (e. g. Balance sheet, profit and loss account and etc) the computer shuts down so he sometimes loses the work and has to start all over again which is not a good thing. So he recently visited the store wanting to know if he can either repair the laptop or buy a brand new one, and if it’s the case of buying a brand new laptop, what brand is suitable?. Mr Dennis Naymichaba would want to have a laptop that not only works perfectly but also appeals in today’s business world (Social) for example a really known and sophisticated brand like Apple (Mac Book) which not only has basic things that a normal laptop has but also has the edge and advanced technology which makes it different from other laptops, Dennis would want a laptop with outstanding quality that works really fast and does not have any sort of complication what so ever, at the same time it should have a logo/brand that stands out among peers, Because nowadays you don’t see business people or firms still using old brands they all try to upgrade and stay up to date with technological advances. Another thing would be (Psychological Factors) that he would want to buy it because his co-workers are using the same type or much more advanced technology laptops, so he wouldn’t want to feel left out in the technology world and decide to also upgrade to something m ore advanced instead of the laptop he has at present. In other words Mr Dennis Nyamichaba would want to purchase the laptop not only for necessity, but also out of desire and psychological need, he would also not only want the laptop for office needs only but also personal needs for example on a weekend off work he would love to watch movies, listen to music and perhaps play games take his mind off work and entertain himself, So basically he would want something with some sort of entertainment that would help him relax, set his mind off work and do something different as mentioned above. The consumer purchase decision process diagram is very important for anyone making a decision in marketing. It alerts marketers to consider the buying process rather than just the purchase decision. The diagram indicates that customers pass through all stages in every purchase. However in more routine purchases, customers often skip or reverse some of the stages. An example would be Mr Dennis Nyamichaba buying his well-known laptop (Mac book) he would not consider anything else but buying the mac book, just because everyone else has the same kind of brand at that particular time/period and go right to the purchase decision, skipping all the other processes . However the diagram is very useful when it comes to understanding any purchase that requires some thought and deliberation. The consumer buying process start with need recognition. At this stage, the buyer recognises a problem or need (e. g. Mr Dennis needs to know if he can buy a brand new laptop or repair the old one) 3. The types of consumer buying decisions Then Mr Dennis Nyamichaba (Kotler et al (2008:266) Information search: Seeking value) will have to seek for information regarding which brand he should really go for and if that certain brand is perfect for his needs and wants and if it is not underrated in today’s business world and technology, he would also want information on how long this certain product lasts for, what period of time will that certain laptop really stay for without problems occurring (In other words it’s durability). Then (Kotler et al (2008:269) Evaluation and alternatives assessing value) he would compare between his broken laptop and advanced technology laptop that was recommended for him, what things does the old laptop have that the one with high technology does not have and check if the technology has really changed like how it’s been stated to him by the store workers. Mr Dennis (Kotler et al (2008:271)Purchase decision: Buying value) would look into the price, if it’s really e xpensive that he has to wait for prices to go down then buy it or just purchase it now that he desperately needs it. Then lastly (Kotler et al (2008:271) Post purchase behaviour: Value in consumption or use) after purchasing the laptop Mr Dennis will have to compare the performance of the laptop and see if he really likes it and if it suits his needs and wants and if he is really satisfied /dissatisfied with product, and if so, he can share his experience with other co-workers that have yet to buy the laptop. Mr Dennis Nyamichaba’s customer involvement (Variety seeking buying behaviour) into buying this product is low because he has no Idea what to get after his old laptop broke down, there will be significant difference among brands (An example would be CHOCKLET, someone would not know the taste hence after eating only he can tell whether to still go for the brand or change to another one next time he is buying the cake. The companies try so hard to change the nature of habitual buying behaviour. ) so he would not know which among the brands is by far much better for him and that he is assured that he won’t face the same problems that he faced with his old laptop. 5. CONCLUSION This report has explained on how marketers should understand consumer behaviour and how they should go about it . And also has identified the characteristics (Cultural, social, personal and psychological characteristics) that would affect the consumer behaviour when making a purchase relating to an incident or a customer replacing a broken laptop. Also it has looked into the buying decision behaviour (Variety seeking buying behaviour) that is associated with the purchase. Also the significance of consumer involvement is it high or low for the type of buying decision behaviour. It is now clearer that there is not a particular theory that is entirely faultless in the attempt to unravel the mystery of buyer behaviour as the debates have proven to be never ending. Each theory holds some degree of relevance. However, some tend to be stronger than others in terms of substantiation and certainty. The literature available reveals that there is an on-going tendency of rejecting ideas regarding the genesis of buyer behaviour. When we omit ideas and ration down the nature of buyer behaviour, danger is that we block out useful knowledge which bounds our scope of appreciation. The original premise therefore stands to be true that the nature of the buyer is indeed in need of investigation, rather that presupposition.

Wednesday, November 20, 2019

Final Exam Essay Example | Topics and Well Written Essays - 500 words - 7

Final Exam - Essay Example Affluent individuals can now also engage in a new relationship with strangers across the world that involves a larger community and stronger connections. Via new technologies at the work place, increased mobility, and international trade, people are now more interconnected than before. In addition to this economic interconnection, there is also environmental interconnection. We partake of the same natural resources; water and air, with people from less affluent countries. Because of this environmental and economic interconnection, the actions that we take are directly impactful on people in less affluent countries (Winfried & Pogge 34). Consumption on our side, as a global consumer of resources, affects the environment of those far and near. The actions we take have a consequence for others living in countries far from ours and we are responsible, causally, for the consequences, without regard of the place that they take place. Because our actions can bring environmental and economic harm to those living in less affluent countries and we remain unmoved by the suffering and pain inflicted on them, therefore; this is a brutish behavior (Winfried & Pogge 34). To act in a virtuous manner, however, would be showing compassion for them in a manner in which our close neighbors are not harmed. As people from affluent countries possess the capacity to be of aid, are members of a globalized community where actions affect those in less affluent countries and th e fact that failure to act would be an act of moral viciousness, we must act in order to alleviate severe poverty. While terrorism is an old practice, the war on the same is a new concept. The war on terror challenges prior conceptions on conflict, especially the theory of a just-war (Smit 23). While the question regarding whether the war on terror is just still remains unanswerable,

Tuesday, November 19, 2019

Movie Review Example | Topics and Well Written Essays - 500 words - 2

Movie Review Example Anderson bizarrely presents this against the framework of an abrupt and histrionically fluctuating realm in Zubrowka. The film presents intriguing tales that entreats history under the main story, which guarantee that the audience is obstinately entertained. The main character, Ralph Fiennes, presents an incandescent authenticity to a character who can abruptly change from charming to somewhat despicable at an instance. The mythological caretaker at the Budapest, Monsieur Gustave, is a master in obsequiousness and seduction. This is especially evident in his elderly female guests who find his charisma outright tantalizing. Gustave and Zero Mustafa’s (Tony Revolori) journey to pay tribute a guest’s commemoration introduce the mysteries in the movie, including the jailbreak and a dizzying ski-and-sled pursuit from a hilltop cloister. Such antique creations highlight the specialism of Anderson’s work in terms of inventiveness. The narration spans three divergent areas in a succession of recollections. Remarkably, the film has a colour-set for all these separate scenes that characterize Anderson’s now-inimitable mark of custom-made, impenitent dedication to underhandedly ordered attractiveness. Most of the characters have an appealing personality that makes the film nerve-wracking and watchable. The step sequence of these characters is that of a specialist. It magnificently creates a courteous, pleasing travesty of Nazi-era concerns. Perceptibly, the ‘The Grand Budapest Hotel’ was inspired by Stefan Zweig, an Austrian playwright who abandoned Germany during Hitler’s term. However, this film confirms that attention to detail can be both valuable and detrimental. While the elaborate production scheme in the film such as cut-away sets portray a well turned-out film, it may lose its characterization, feeling and plot owing to the crowded

Saturday, November 16, 2019

Information Systems Today Essay Example for Free

Information Systems Today Essay It is limited to transactions between businesses and consumers. C) Electronic commerce between businesses and their employees is not possible. D) All forms of electronic commerce involve business firms. E) Consumer-to-consumer electronic commerce is a complete reversal of the traditional business-to-consumer electronic commerce. 3) Which of the following is an example of business-to-consumer electronic commerce? A) Brenda files her income tax online. B) A manufacturer conducts business over the Web with its retailers. C) Juan buys Kevins guitar on eBay. com. D) Reuben buys a shoe on Yebhi. om. E) Sandra, an employee, uses the Web to make a change her health benefits. 4) Which of the following is an example of consumer-to-consumer electronic commerce? A) Niobi makes an online deposit of $5,000 into her friend Carlas account because she needs financial help. B) Heath buys a gift for Vannessa from Amazon. com. C) Blanco, a manufacturer, conducts business over the Web with its retailers. D) Ted files his income tax online. E) Marty buys Lobsangs mountaineering equipment from eBay. com 5) Ben buys an Olympus E-PL2 from Sony which starts malfunctioning. When he opts for an exchange, the customer representative says that an exchange or repair is not possible because the damage was of a physical nature and not covered under warranty. Which of the following consequences, if true, would be an example of consumer-to-consumer electronic commerce? A) Ben sells the Olympus E-PL2 to Balvinder Singh in India through eBay. com. B) Ben files an online suit against Sony. C) Ben files a complaint on Sonys Web site asking for an escalation. D) Ben buys a Canon G 12. E) Ben sells the Olympus E-PL2 to the worlds largest used camera dealer KEH. om. 6) Which of the following is a result of global information dissemination? A) Firms link Web sites to corporate databases to provide real-time access to personalized information. B) Firms tailor their products and services to meet a customers particular needs on a large scale. C) Firms market their products and services over vast distances. D) Firms provide immediate communication and feedback to and from customers. E) Firms provide ways for clients and firms to conduct business online without human assistance. 7) Which of the following actions explains mass customization? A) Firms tailor their products and services to meet a customers particular needs on a large scale. B) Firms provide immediate communication and feedback to and from customers. C) Firms provide ways for clients and firms to conduct business online without human assistance. D) Firms market their products and services over vast distances. E) Firms link Web sites to corporate databases to provide real-time access to personalized information. 8) Which of the following is an advantage of using interactive communication via the Web? A) reduced transaction costs B) increased customer loyalty C) enhanced operational efficiency D) reduced brand dilution E) decreased cannibalization 9) The phenomenon of cutting out the middleman and reaching customers more directly and efficiently is known as ________. A) gentrification B) demutualization C) reintermediation D) mutualization E) disintermediation 10) Which of the following is an example disintermediation? A) Land Rover markets most of its four-wheel drives in high altitude regions where vehicles require more power. B) Dunkin Donuts expanded its menu beyond breakfasts by adding hearty snacks that substitute for meals, which consists of items like Dunkin Dawgs, hot dogs wrapped in dough. C) Gatorade Thirst Quencher is a market leader in sports drinks. It is now planning to market its drinks to working women in urban areas. D) OakTeak, a furniture manufacturing firm, started selling directly to its customers after it experienced a dip in sales due to channel conflicts between retailers. E) A luxury car company creates a hybrid line of automobiles for consumers who are concerned about the environment. 11) ________ refers to the design of business models that reintroduce middlemen in order to reduce the challenges brought on by dealing directly with customers. A) Reintermediation B) Demutualization C) Gentrification D) Disintermediation E) Mutualization 12) Which of the following is an example of reintermediation? A) The black Centurian card is issued by invitation only to customers who spend more than $250,000 a year on other American Express cards. B) P;G acquires the list of parents-to-be and showers them with samples of Pampers and other baby products to capture a share of their future purchases. C) Kambo, a fashion apparel company that deals directly with customers to sell its products, added retailers to its supply chain to cater to its target audience in remote geographic locations. D) OakTeak, a furniture manufacturing firm, started selling directly to its customers after it experienced a dip in sales due to channel conflicts between retailers. E) Dunkin Donuts expanded its menu beyond breakfasts by adding hearty snacks that substitute for meals, which consists of items like Dunkin Dawgs, hot dogs wrapped in dough. D) These firms only conduct business electronically in cyberspace. E) These firms do not have physical store locations. 17) Which of the following firms would most likely pursue the brick-and-mortar strategy? A) KEH. com is a used camera dealer that buys and sells cameras across the globe. B) Castros is a watch manufacturing firm known for its effective mass customization. C) SmartInv is a brokerage firm that allows its customers to personalize their portfolios. D) BestBaker is a local bakery store in Bantam, Connecticut and caters exclusively to its residents. E) Nebo, a computer manufacturer, has pursued disintermediation and sells directly to customers. 18) Which of the following statements is true about firms pursuing a click-and-mortar business strategy? A) These firms learn how to fully maximize commercial opportunities in both domains. B) These firms can often compete more effectively on price. C) These firms tend to be highly adept with technology and can innovate very rapidly as new technologies become available. D) Customers of these firms find it difficult to return a product in case of damages. E) These firms can reduce prices to rock-bottom levels, although a relatively small firm may not sell enough products. 19) EZBiz, the brainchild of three college friends, is a startup venture which plans to produce and market sports gear. They are currently trying to decide between a brick-and-click strategy and a click-only strategy. Which of the following, if true, would most undermine the decision to adopt a click-only strategy? A) The company has limited access to funds and is looking to keep its costs low. B) The public is wary of sharing confidential information after a recent spate of credit card scandals. C) A competitor is facing severe backlash after inadvertently releasing sensitive data into the public domain. D) Several companies who have switched from brick-and-mortar strategy to a click-only are experiencing severe channel conflicts. E) Some click-only companies have been unable to achieve economies of scale and subsequently are unable to offer lower prices. 20) EZBiz, the brainchild of three college friends, is a startup venture which plans to produce sports gear. They are currently trying to decide between a brick-and-click strategy and a click-only strategy. Which of the following, if true, would most support the decision to adopt a click-only strategy? A) E-commerce places firms on a global platform, in direct competition with the best in the business. B) Retailers have a preference for established brands that can pay good margins. C) Research suggests that some customers prefer online shopping because of the convenience it offers. D) Product trials and demonstrations are an essential part of the consumer buying process. E) Cyber laws are yet to reach the level of sophistication required to facilitate safe online transactions. 1) Which of the following statements is true about the revenue model? A) It emphasizes the utility that the product/service has to offer to customers. B) It analyzes the existing players in the market and the nature of the competition. C) It describes the promotion plan of the product/service. D) It describes how the firm will produce a superior return on invested capital. E) It analyzes the background and experie nce of the company leadership. 22) Which of the following questions should a manager consider while analyzing the value proposition component of the business model? A) How much are you selling the product for? B) How fierce is the competition? C) How do you plan to let your potential customers know about your product/service? D) Can the leaders of the organization get the job done? E) Why do customers need your product/service? 23) While preparing a business model, a manager considers the question, How do you plan to let your potential customers know about your product/service? Which of the following components of the businessing model is he/she considering? A) Revenue model B) Management team C) Marketing strategy D) Value proposition E) Competitive environment 24) Paying businesses that bring or refer customers to another business is known as ________. A) affiliate marketing B) subscription marketing C) viral marketing D) stealth marketing E) buzz marketing 25) A collection of companies and processes are involved in moving a product from the suppliers of raw materials, to the suppliers of intermediate components, to final production, and ultimately, to the customer; these companies are collectively referred to as ________. A) customer management B) product lifecycle C) enterprise resource management D) supply chain E) market entry 26) Prior to the introduction of the Internet and Web, the secure communication of proprietary information in business-to-business electronic commerce was facilitated using ________. A) enterprise resource planning B) electronic data interchange C) cloud computing D) supply chain management E) executive information system 27) Which of the following statements is true about the extranet? A) It restricts the companys information from going on the Web. B) It can be accessed only by employees within an organization. C) It contains company related information which all the employees of an organization can access. D) It enables two or more firms to use the Internet to do business together. E) It requires large expenditures to train users on the technologies. 28) Web-based technologies are cross platform, meaning that disparate computing systems can communicate with each other provided that ________. A) the computing systems have been manufactured by the same company B) the computing system manufacturing companies are business partners C) they are located in the same country D) standard Web protocols have been implemented E) the computing system manufacturing companies allow it 29) Companies use ________ to secure proprietary information stored within the corporate local area network and/or wide area network so that the information can be viewed only by authorized users. A) firewalls B) phishing C) rootkits D) bots E) pharming 30) Organizations primarily use extranets to ________. A) conduct market research B) manage their supply chains C) identify their target market D) control brand dilution E) manage public relations 1) In the context of B2B supply chain management, ________ can be defined as access points through which a business partner accesses secured, proprietary information from an organization. A) bots B) forums C) portals D) rootkits E) hosts 32) ________ can provide substantial productivity gains and cost savings by creating a single point of access where the company can conduct business with any number of business partners. A) Rootkits B) Ph arming C) Bots D) Phishing E) Portals 33) ________ automate the business processes involved in selling products from a single supplier to multiple buyers. A) Supplier portals B) Reference portals C) Customer portals D) Procurement portals E) Sourcing portals 34) ________ are designed to automate the business processes that occur before, during, and after sales have been transacted between a supplier and multiple customers. A) Sourcing portals B) Reference portals C) Supplier portals D) Customer portals E) Procurement portals 35) ________ are set up as B2B Web sites that provide custom-tailored offers or specific deals based on sales volume. A) Sourcing portals B) Customer portals C) Procurement portals D) Reference portals E) Supplier portals 6) What is the difference between customer and supplier portals and business-to-business (B2B) marketplaces? A) Unlike customer and supplier portals, B2B marketplaces cannot be classified as extranets. B) Unlike customer and supplier portals, B2B marketplaces are secured by firewalls. C) Unlike customer and supplier portals, B2B marketplaces only serve vertical markets. D) Unlike customer and supp lier portals, B2B marketplaces are associated with a particular buyer or supplier who deals with multiple business partners. E) Unlike customer and supplier portals, B2B marketplaces allow many buyers and many sellers to come together. 7) Markets comprised of firms operating within a certain industry sector are known as ________ markets. A) vertical B) parallel C) horizontal D) stipulated E) focused 38) Which of the following statements is true about B2B and B2C payments? A) Most B2B payments are made through credit cards. B) Most B2C payments are made by checks. C) Most B2B payments are made through electronic payment services. D) Most B2B payments are made by cash. E) Most B2B payments are made by checks. 39) Credit cards and electronic payment services are not used for large B2B transactions because of ________. A) the risks associated with these services B) the complications arising out of these transactions C) preset spending limits D) the resulting decrease in working capital E) the expenses associated with these services 40) Organizations implement intranets to support ________ electronic commerce. A) business-to-business B) business-to-consumer C) business-to-government D) business-to-employee E) consumer-to-business 41) Intranets mostly affect the ________ of an organization. A) suppliers B) employees C) customers D) retailers E) advertisers 2) ________ is used to facilitate the secured transmission of proprietary information within an organization. A) Intranet B) Transnet C) Ethernet D) Extranet E) Telnet 43) Which of the following distinguishes an intranet from an extranet? A) An intranet looks and acts just like a publicly accessible Web site. B) An intranet uses the same hardware as a publicly accessible Web site. C) Users access their companys intranet using their Web browser. D) An intranet uses the same networking technologies as a publicly accessible Web site. E) In its simplest form, intranet communications do not travel across the Internet. 44) ________ are temporary work groups with a finite task and life cycle. A) Intensive forces B) Cross functional teams C) Task forces D) Staff committees E) Self directed work teams 45) The term ________ refers to a class of software that enables people to work together more effectively. A) malware B) groupware C) freeware D) webware E) pestware 46) Which of the following is an asynchronous groupware tool? A) shared whiteboard B) online chat C) intranet D) electronic meeting support system E) video communication system 47) One of the benefits of groupware is its parallelism. Which of the following statements best explains this sentence? A) It keeps the group on track and helps avoid costly diversions. B) It can easily incorporate external electronic data and files. C) It enables members to collaborate from different places at different times. D) It automatically records member ideas, comments, and votes. E) It enables many people to speak and listen at the same time. 48) Which of the following is a synchronous groupware tool? A) e-mail B) intranet C) group calendar D) online chat E) automation system 49) Which of the following provides customers with the ability to obtain personalized information by querying corporate databases and other information sources? A) e-filing B) e-integration C) e-information D) e-transaction E) e-tailing 50) The online sales of goods and services is known as ________. A) e-information B) e-integration C) e-tailing D) e-collaboration E) e-filing 51) Which of the following occurs in a reverse pricing system? A) Customers specify the product they are looking for and how much they are willing to pay for it. B) Customers are provided with the product and its price. C) Customers are provided with a product and can decide how much they are willing to pay for it. D) Customers specify the product they are looking for and the company provides the product with a price. E) Customers cannot decide the product but they can decide the price of the products available. 2) How do comparison shopping sites generate revenue? A) by charging a commission on transactions B) by selling their products C) by charging a virtual shelf-space fee to manufacturers D) by increasing the click-count on their site E) by charging distribution fees to consumers 53) The concept of the Long Tail refers to a focus on ________. A) mainstream products B) broad markets C) generic brands D) brand dilution E) niche markets 54) Which of the following is a disadvantage of e-tailing? A) It is limited by physical store and shelf space restrictions. B) It requires additional time for products to be delivered. C) It complicates the process of comparison shopping. D) It restricts companies to effectively compete on price. E) It reduces a companys inventory turnover time. 55) Which of the following explains Web analytics? A) conducting online marketing research to improve product quality B) analyzing Web sites in order to find the best one in its category C) tracking all online purchasers to try and increase their frequency of visit to a particular Web site D) analyzing Web surfers behavior in order to improve Web site performance E) analyzing Web sites in order to find the best online business practices 6) Which of the following is a mechanism for consumer-to-consumer transactions? A) e-tailing B) e-integration C) e-filing D) e-tendering E) e-auctions 57) ________ is a form of e-auction in which the highest bidder wins. A) Reverse auction B) Bartering C) Exchange D) Forward auction E) Request for quote 58) ________ is a form of e-auction where buyers post a request for quote. A) A reverse a uction B) Bartering C) An exchange D) A forward auction E) A request for proposal 59) Which of the following forms of e-auction typically takes place on a business-to-business level? A) reverse auctions B) bartering C) exchanges D) forward auctions E) request for quotes 60) Doug is a frequent visitor of online auction sites. He uses two different accounts to place a low followed by a very high bid on the desired item. This leads other bidders to drop out of the auction. He then retracts the high bid and wins the item at the low bid. This form of e-auction fraud is known as ________. A) shill bidding B) bid luring C) payment fraud D) nonshipment E) bid skimming 61) Which of the following types of e-auction fraud is associated with the sellers failure to ship an item after the payment has been received? A) bid luring B) bid shielding C) nonshipment D) shipping fraud E) payment failure 62) If a companys Web site is listed in the sponsored list of a search engine, the search engine receives revenue on a ________ basis. A) pay-per-click B) pay-per-sale C) click-through D) pay-per-conversion E) click-per-visit 63) Under the ________ pricing model, the firm running the advertisement pays only when a Web surfer actually clicks on the advertisement. A) pay-per-refresh B) pay-per-sale C) pay-per-click D) pay-per-conversion E) click-per-visit 64) Click-through rate reflects ________. A) the ratio of surfers who visited the Web site divided by the number of surfers who clicked on the ad B) the ratio of surfers who click on an ad divided by the number of times it was displayed C) the percentage of visitors who actually perform the marketers desired action D) the ratio of surfers who clicked on the ad divided by the number of people who made the purchase E) the ratio of surfers who visited the Web site divided by the number of people who made a purchase 65) ________ allows individual Web site owners to post companies ads on their pages. A) Bum marketing B) Stealth marketing C) Viral marketing D) Buzz marketing E) Affiliate marketing 66) In a ________, a site hosting an advertisement creates fake clicks in order to get money from the advertiser. A) competitive click fraud B) irate click fraud C) network click fraud D) shill click fraud E) dedicated click fraud 67) MakeYourClick is an online ad agency that is known for its ability to create ads which lure customers to purchase. Brenda, an ex-employee of the firm, was fired from the agency on baseless grounds. An angry Brenda inflates MakeYourClicks online advertising cost by repeatedly clicking on the advertisers link. Brenda has committed ________. A) competitive click fraud B) irate click fraud C) network click fraud D) shill click fraud E) dedicated click fraud 68) ________ is used in order to have small, well-defined tasks performed by a scalable ad hoc workforce of everyday people. A) Nearshoring B) Insourcing C) Offshoring D) Crowdsourcing E) Homesourcing 69) ________ is an example of m-commerce. A) e-auctions B) e-tailing C) e911 D) e-filing E) e-integrating 70) Which of the following is an argument against digital rights management? A) It encourages unauthorized duplication. B) It enables publishers to infringe on existing consumer rights. C) It discourages publishers to control their digital media. D) It inhibits online transactions in the industry. E) It restricts copyright holders to minimize sales losses. 71) E-filing is an example of a ________ tool. A) government-to-citizen B) consumer-to-consumer C) government-to-government D) consumer-to-business E) business-to-business Chapter 5: Enhancing Collaboration Using Web 2. 0 1) Which of the following is a basic concept associated with Web 2. 0? A) shift in users preference from online sites to encyclopedias as sources of unbiased information B) shift in users role from the passive consumer of content to its creator C) shift in users interest from sharing information o finding information D) shift in users lifestyle due to increased purchasing power E) shift in users preference to environment-oriented products 2) Which of the following is a consequence of the use of social software? A) People are using encyclopedias as sources of unbiased information. B) People are using environmentally-friendly products. C) People have increas ed purchasing power. D) People are sharing more personal information. E) People have become passive consumers of content. 3) The use of ________ within a companys boundaries or between a company and its customers or stakeholders is referred to as Enterprise 2. . A) Web 1. 0 techniques and intranet B) extranet and intranet C) Web 2. 0 techniques and social software D) extranet and Web 1. 0 techniques E) social software and extranet 4) Which of the following statements is true about Web 1. 0? A) It helps users share information. B) It helps users find information. C) Users rule these applications. D) Users receive and give recommendations to friends. E) It helps connect ideas and people. 5) A major benefit of social software is the ability to harness the wisdom of crowds, which is also referred to as ________. A) collaborative filtering B) preference elicitation C) creative commons D) consensus democracy E) collective intelligence 6) The concept of ________ is based on the notion that distributed groups of people with a divergent range of information and expertise will be able to outperform the capabilities of individual experts. A) cognitive dissonance B) creative commons C) collective intelligence D) consensus democracy E) preference elicitation 7) Which of the following statements is true about a discussion forum? A) It started out as a novices way of expressing themselves using very simple Web pages. B) It is the process of creating an online text diary made up of chronological entries that comment on everything. C) Rather than trying to produce physical books to sell or use as gifts, users merely want to share stories about their lives or voice their opinions. D) It is dedicated to a specific topic, and users can start new threads. E) It enables a person to voice his/her thoughts through short status updates. 8) Which of the following statements is true about blogs? A) They emulate traditional bulletin boards and allow for threaded discussions between participants. B) They allow individuals to express their thoughts in a one-to-many fashion. C) They are dedicated to specific topics, and users can start new threads. D) They are moderated so that new postings appear only after they have been vetted by a moderator. E) They enable people to voice their thoughts through short status updates. 9) Which of the following Web 2. 0 applications has been classified as the amateurization of journalism? A) blogs B) discussion forums C) social presence tools D) instant messaging E) online chats 10) Keith Norat, the Chief Technology Officer of Kender Internationals, relies on blogs while making decisions. In his words, Blogs are an important part of our purchase decisions. In todays environment, blogs provide diverse information that help us to make good decisions. Which of the following is an underlying assumption? A) Information in blogs is accurate. B) Some of the blogs are not written well. C) Blogs are company sponsored. D) Professional bloggers rely heavily on advertisements to sustain their operations. E) Blogs lead to the amateurization of journalism. 11) Which of the following explains the term blogosphere? A) the movement against blogs B) the amateurization of blogs C) the revolution against microblogging D) the community of all blogs E) the movement against discussion forums 12) Social presence tools are also known as ________ tools. A) social bookmarking B) instant chatting C) microblogging D) videoconferencing E) geotagging 13) Which of the following facilitates real-time written conversations? A) instant messaging B) discussion forums C) status updates D) blogs E) tagging 14) ________ take the concept of real-time communication a step further by allowing people to communicate using avatars. A) Blogging B) Microblogging C) Instant messaging D) Discussion forums E) Virtual worlds 15) Which of the following statements is true about virtual worlds? A) It allows people to communicate using avatars. B) Small firms have not been successful in consumer-oriented virtual worlds. C) It is designed for short status updates. D) It is the process of creating an online text diary made up of chronological entries that comment on everything. E) Large companies have been able to realize the potential of consumer-oriented virtual worlds. 16) The network effect refers to the notion that the value of a network is dependent on ________. A) the speed of the network B) the number of other users C) the knowledge of the users D) the commitment of the users E) the technical expertise of the moderators 17) ________ is a cooperative Web 2. 0 application making use of the network effect. A) Media sharing B) RSS C) Tagging D) Instant messaging E) A discussion forum 18) ________ is the distribution of digital media, such as audio or video files via syndication feeds for playback on digital media players. A) Narrowcasting B) Crowdsourcing C) Blogging D) Netcasting E) Phishing 19) Podcasting is a misnomer because podcasts ________. A) are concerned with the dissemination of information to a narrow audience B) cannot be played on Apples iPods C) are not related to distribution of digital media for digital devices D) are concerned with outsourcing tasks to a large group of people or community E) can be played on a variety of devices in addition to Apples iPods 20) Social bookmarking allows users to share Internet bookmarks and to create categorization systems. These categorization systems are referred to as ________. A) tag clouds B) podcasts C) folksonomies D) geospatial metadata E) microblogs 21) Which of the following statements is true about social bookmarking? A) It is the distribution of digital media. B) It allows netcasters to publish and push current shows to the watchers/listeners. C) It allows people to communicate using avatars. D) It allows users to create folksonomies. E) It allows users to post short status updates. 22) ________ is the creation of a categorization system by users. A) Social cataloging B) Podcasting C) Social blogging D) Netcasting E) Crowdsourcing 23) ________ refers to manually adding metadata to media or other content. A) Phishing B) Tagging C) Crowdsourcing D) Podcasting E) Netcasting 24) Which of the following statements is true about tagging? A) It is the rocess of creating a categorization systems by users. B) It is the process of distributing digital media for playback on digital media players. C) It is the process of adding metadata to pieces of information. D) It is the process of of creating avatars and syndication feeds. E) It is the process of creating an online text diary. 25) ________ refer(s) to a way of visualizing user generated tags or c ontent on a site. A) Crowdsourcing B) Tag clouds C) Phishing D) Podcasting E) Pharming 26) Which of the following is one of the uses of geotagging? A) to use avatars while chatting online B) to create categorization systems for social cataloging C) to know the location of a person sending out a breaking news update D) to create folksonomies for social bookmarking E) to use syndicate feeds while sharing media 27) Which of the following is an example of synchronous communication? A) online reviews B) work flow automation systems C) intranets D) videoconferencing E) collaborative writing tools 28) Which of the following is an example of asynchronous communication? A) group calendars B) videoconferencing C) online chatting D) shared whiteboards E) electronic meeting support system 29) Which of following factors differentiates asynchronous communication from ynchronous communication? A) language B) network speed C) coordination in time D) expertise E) distance 30) In todays business environment, project teams comprise highly specialized members, many of whom are not colocated. ________ are comprised of members from different geographic areas. A) Work groups B) Virtual teams C) Work teams D) Task forces E) Command groups 31) Which of the following is an electronic communication tool that allows users to files, documents, and pictures to each other and share information? A) e-mail B) instant messaging C) application sharing D) electronic calendars E) knowledge management systems 2) Which of the following is an electronic conferencing tool that facilitates information sharing and rich interactions between users? A) e-mail B) wikis C) blogs D) instant messaging E) online document systems 33) Which of the following is a collaboration management tool that is used to facilitate virtual or colocated meetings ? A) Internet forums B) videoconferencing C) wikis D) fax E) intranets 34) Web-based collaboration tools ________. A) allow for easy transferability from one person to another B) have well-documented procedures for system complexities C) reduce the risk of exposing sensitive corporate data D) require users to frequently upgrade their software E) are complex and time-consuming to learn 35) Which of the following statements is true about Gmail? A) It is an enterprise-level collaboration tool that allows users to create group Web sites and share team information. B) It allows users to select a custom domain name for an additional fee. C) It allows users to share events and subscribe to public calendars for new events. D) It is an instant messaging client. E) It is an online office suite comprised of a spreadsheet application, a word processor, and a presentation application. 6) Which of the following Google Apps is an instant messaging client? A) Gmail B) Google Calendar C) Google Talk D) Google Sites E) Google Docs 37) ________ is an online office suite comprised of a spreadsheet application, a word processor, and a presentation application. A) Gmail B) Google Talk C) Google Sites D) Google Calendar E) Google Docs 38) Which of the following statements is true about Googl e Sites? A) It is an enterprise-level collaboration tool that allows users to create group Web sites and share team information. B) It allows users to select a custom domain name for an additional fee. C) It allows users to share events and subscribe to public calendars for new events. D) It is an instant messaging client. E) It is an online office suite comprised of a spreadsheet application, a word processor, and a presentation application. 39) A(n) ________ system allows users to publish, edit, version track, and retrieve digital information. A) social presence B) collective intelligence C) application sharing D) content management E) peer production 40) Which of the following statements is true about content management systems? A) It is the creation of goods or services by self-organizing communities. B) The creation of the goods or services is dependent on the incremental contributions of the participants. C) It allows the assignment of different roles for different users. D) Anyone can help in producing or improving the final outcome. E) It is a family of syndication feeds used to publish the most current blogs, podcasts, videos, and news stories. 41) Which of the following is the responsibility of an administrator in a content management system? A) editing the content into a final form B) managing account access levels to the digital information C) sharing team information D) publishing new information E) creating database applications 42) ________ is the creation of goods or services by self-organizing communities. A) Peer production B) A folksonomy C) Creative commons D) Groupware E) Social software 43) Which of the following statements is true about peer production? A) The creator is responsible for publishing new information. B) Only editors have the right to develop new content. C) It is also known as enterprise content systems. D) Anyone can help in producing or improving the final outcome. E) The guest is a person who can only view the digital information. 44) Which of the following occurs during wiki wars? A) editors do not agree with the creators of the content B) participants debate on a particular topic before creation C) administrators refuse to publish a creators content D) guests edit the creators content without permission E) contributors continuously edit or delete each others posts 45) ________ is a phenomenon where companies use everyday people as a cheap labor force. A) Nearshoring B) Phishing C) Crowdsourcing D) Narrowcasting E) Pharming 46) ________ enables people to work in more flexible ways on a variety of Internet-related projects. A) E-filing B) E-auction C) E-tailing D) E-lancing E) E-timing 47) ________ sites create social online communities where individuals with a broad and diverse set of interests meet and collaborate. A) Crowdsourcing B) Social cataloging C) Social networking D) Social bookmarking E) Media sharing 48) Which of the following statements is true about viral marketing? A) It uses the network effect to increase brand awareness. B) It uses everyday people as a cheap labor force. C) It is the dissemination of information to a narrow audience. D) It enables people to work in more flexible ways on a variety of Internet-related projects. E) It is used to market a product without the audience realizing it. 49) Which of the following is a critical factor in the success of a viral marketing campaign? A) restricting access to viral content B) doing what the audience expects C) making sequels D) restricting easy distribution E) distributing products for free 50) ________ attempts to provide relevant search results by including content from blogs and microblogging services. A) Social search B) OpenSearch C) Enterprise search D) Metasearch E) Netsearch 51) Which of the following statements is true about Real Simple Syndication (RSS)? A) It is used to increase brand awareness through the network effect. B) It is used to disseminate information to a narrow audience. C) It is used to market the product without the audience realizing it. D) It is used to enable people to work in more flexible ways on a variety of Internet-related projects. E) It is used to publish the most current blogs, podcasts, videos, and news stories. 52) For companies operating in the digital world, online collaboration with suppliers, business partners, and customers is crucial to being successful. ________ allow(s) data to be accessed without intimate knowledge of other rganizations systems, enabling machine-to-machine interaction over the Internet. A) Web services B) Widgets C) RSS feeds D) Social search E) Peer production 53) Android is a Web service hosted by Google to ________. A) create customized search features B) build mobile phone applications C) manage personal calendars D) integrate Googles mapping system into Web sites E) allow us ers to build applications that work with multiple social communities 54) Which of the following statements is true about widgets? A) They can be placed on a desktop, but cannot be integrated into a Web page. B) They can integrate two or more Web services. C) They are created by the integration of Web services and mashups. D) They are small interactive tools used for a single purpose. E) They can be integrated into a Web page, but cannot be placed on a desktop. 55) Together, Web services and widgets enable the creation of ________. A) protocols B) mashups C) codecs D) folksonomies E) tag clouds 56) Which of the following statements is true about a mashup? A) It is a small interactive tool used for a single purpose. B) It is used to increase brand awareness through the network effect. C) It is the process of allowing companies to use everyday people as a cheap labor force. D) It is used to disseminate information to a narrow audience. E) It is an application or a Web site that integrates one or more Web services. 57) Which of the following is a reason for the development of semantic Web? A) Web pages can be understood by people but not by computers. B) Users should be able to use any device in any network for any service. C) Users give a lot of unnecessary personal information to social networking sites. D) Widgets cannot be integrated into Web pages. E) Users are skeptical while making purchases online due to the fear of getting cheated. 58) Which of the followings is NOT true about an Enterprise 2. strategy? A) Web 2. 0 sites base their success on user-driven self-expression. B) Enterprise 2. 0 applications are not suited to traditional top-down organizational structures. C) Enterprise 2. 0 applications should be driven by a specific usage context. D) Organization-wide Enterprise 2. 0 implementations typically need changes in terms of organizational culture. E) Within organizations, the critical mass needed for an Enterprise 2. 0 application is often easily achieved. 59) Enterprise 2. 0 is likely to fail if ________. A) an organizations workforce is dominated by baby boomers B) an organization has a flat organizational hierarchy C) an organization emphasizes open communication D) an organizations workforce is dominated by millennials E) it is integrated well with an organizations existing information systems infrastructure Technology Briefing: Foundations of Information Systems Infrastructure Networks, the Internet, and Databases 68) ________ is a computer networking model in which multiple types of computers are networked together to share data and services. A) Centralized computing B) Mainframe computing C) Task computing D) Distributed computing E) Serial computing 9) A(n) ________ is a computer network that spans a relatively small area, allowing all computer users to connect with each other to share data and peripheral devices, such as printers. A) enterprise network B) wide area network C) campus area network D) local area network E) value-added network 70) A(n) ________ is a wide area network connecting disparate networks of a single organization into a single network. A) value-added network B) global network C) enterprise network D) local area network E) personal area network 71) ________ are private, third-party-managed medium-speed WANs that are shared by multiple organizations. A) Value-added networks B) Enterprise networks C) Global networks D) Local area networks E) Personal area networks 72) A(n) ________ is an emerging technology that uses wireless communication to exchange data between computing devices using short-range radio communication, typically within an area of 10 meters. A) value-added network B) local area network C) personal area network D) enterprise network E) campus area network 73) ________ are network services that include the storing, accessing, and delivering of text, binary, graphic, and digitized video and audio data across a network. A) Print services B) File services C) Message services D) Application services E) Software services 74) The high-speed central networks to which many smaller networks can be connected are known as ________. A) last-mile networks B) ISPs C) Internet exchange points D) private branch exchanges E) backbones 75) Which of the following wireless communication technologies uses high-frequency light waves to transmit data on an unobstructed path between nodes—computers or some other device such as a printer—on a network at a distance of up to 24. 4 meters? A) Bluetooth B) wireless LAN C) high-frequency radio D) infrared line of sight E) microwaves WLANs based on a family of standards called 802. 11 are also referred to as ________. A) Bluetooth B) wireless fidelity C) ethernet D) personal area networks E) infrared line of sight 77) Which of the following is a characteristic of terrestrial microwave communication? A) high attenuation B) speeds up to 16 Mbps C) low expense D) high susceptibility to eavesdropping E) low electromagnetic interference 78) ________ is the set of rules that governs how a given node or workstation gains access to the network to send or receive data. A) Media access control B) Logical link control C) Hypertext transfer protocol D) File transfer protocol E) Internet control message protocol 79) ________ is a commonly used method of random access control, in which each workstation listens to traffic on the transmission medium (either wired or wireless) to determine whether a message is being transmitted. A) Code division multiple access B) Carrier sense multiple access C) Hybrid coordination function D) Group packet radio service E) Point coordination function 80) In a(n) ________ network all nodes or workstations are connected to a central hub, or concentrator, through which all messages pass. A) ring B) bus C) star D) mesh E) tree 81) Which of the following network topologies is capable of covering the largest distance? A) star network B) bus network C) ring network D) mesh network E) tree network 82) Which of the following statements is true of a bus network topology? A) A bus network has the most complex wiring layout. B) Extending a bus network is more difficult to achieve than it is for other topologies. C) A bus network topology enables all network nodes to receive the same message through the network cable at the same time. D) The configuration of bus networks facilitates easy diagnosis and isolation of network faults. E) In a bus network, every computer and device is connected to every other computer and device. 83) As per the Open Systems Interconnection (OSI) model, which of the following layers defines the way data is formatted, converted, and encoded? A) application layer B) transport layer C) presentation layer D) data link layer E) session layer 84) According to the OSI model, the ________ layer defines the protocols for structuring messages. A) physical B) session C) transport D) data link E) network 5) According tot he OSI model, the physical layer defines ________. A) the protocols for data routing to ensure that data arrives at the correct destination B) the way data is formatted, converted, and encoded C) the mechanism for communicating with the transmission media and interface hardware D) the way that application programs such as electronic mail interact with the network E) the protocols fo r structuring messages 86) A ________ is a device that converts digital signals from a computer into analog signals so that telephone lines may be used as a transmission medium to send and receive electronic data. A) modem B) LAN card C) network adapter D) PCI connector E) USB port 87) A ________ is a PC expansion board that plugs into a computer so that it can be connected to a network. A) transceiver B) multiport repeater C) cable router D) network interface card E) modular connector 88) A(n) ________ is a piece of networking hardware that manages multiple access points and can be used to manage transmission power and channel allocation to establish desired coverage throughout a building and minimize interference between individual access points. A) router B) wireless controller C) network switch D) modem E) network interface card 89) Which of the following entities is responsible for managing global and country code top-level domains, as well as global IP number space assignments? A) American Registry for Internet Numbers (ARIN) B) World Wide Web Consortium (W3C) C) Internet Assigned Numbers Authority (IANA) D) Internet Governance Forum (IGF) E) European Organization for Nuclear Research (CERN) 90) Which of the following Internet connectivity technologies enables data to be sent over existing copper telephone lines by sending digital pulses in the high-frequency area of telephone wires? A) integrated services digital network technology B) digital subscriber line technology C) dial-up service technology D) cable modem technology E) fiber to the home technology 91) Computers working as servers on the Internet are known as ________. A) network adapters B) modems C) network switches D) Ethernet hubs E) Internet hosts 92) A(n) ________ is a unique identifier that should be created and used when designing a database for each type of entity, in order to store and retrieve data accurately. A) foreign key B) surrogate key C) primary key D) superkey E) candidate key 93) In which of the following database models does the DBMS view and present entities as two-dimensional tables, with records as rows, and attributes as columns? A) relational database model B) hierarchical database model C) network database model D) object-oriented database model E) semantic database model 94) ________ is a technique to make complex databases more efficient and more easily handled by the DBMS. A) Assertion B) Exception handling C) Normalization D) Model elimination E) Structural induction