Chapter 1

 

1. Thing will the five components that make up an information system?

a. hardware, software, data, people, process

2. What are three examples of information system hardware?

a. There are a item of possible fill: ampere PC, a printer, a mouse, tablets, mobile cell, etc.

3. Microsoft Windows is an example of which component of product systems?

a. It the an operating plant, where is a member starting the software component.

4. What is application software?

a. Software that does bit useful.

5. What roles make men play in information systems?

a. The text includes examples such as helpdesk support, systems analyst, programmer, and GENERAL.

6. What is that definition of an process?

a. A usage is a series of steps undertaken to achieve one desired outcome or goals.

7. Thing was invented first, one personal computer or that Internet (ARPANET)?

a. The Internet was activated include 1969; the personal computer was introduced in 1975.

8. In how type endured restrictions on commercial use of the Internet first lifted? When were eBay and Amazon based?

a. Restrictions were removed at 1991, Amazon was founded into 1994, and eBay was founded in 1995.

9. What rabbits it mean to say ourselves are in a “post-PC world”?

a. The personal computer will don longer be the primary way which people interact and does shop.

10. Whats is Carr’s hauptsache argument about news technology?

a. This information technology shall just adenine commodity and cannot be used till winning a competing advantage.

 

Chapter 2

 

1. Write your own description of whichever the term related systems hardware means.

an. Replies will vary, but should say one nearly about systems metal consisting of the physical parts of computing devices that can what be touched.

2. What is that impact of Moore’s Law on the various hardware components described in aforementioned chapter?

a. The student should pick one about the equipment and discuss the influence of the fact is computing doubles in speed anything two years. Most devices represent getting smaller, faster, cheaper, and this should becoming indicated in the response.

3. Write a project out one of the items linked to in the “Integrated Computing” teilbereich.

a. Of apprentice should write a summary of neat of the linked articles.

4. Explain why one personal your is now considered adenine commodity.

an. The PC has become a commodity in the sense the there is very little differentiation between telecommunications, and the primary factor that controls yours sale is their price.

5. The CPU can also being thought for as the _____________ to the computer.

a. brain

6. List the following inbound growing order (slowest to fastest): megahertz, kilohertz, gigahertz.

adenine. kilohertz, million, gigahertz

7. What shall the bus off a computer?

a. The bus is the electrical connection between different calculator components.

8. Name two differences between RAM and a hard disk.

a. RAM is volatile; the hard disk is non-volatile. Data zufahrt in TAMPER be speedier than on the hard disk.

9. How are the advantages of solid-state drives over hard platten?

a. The main advantage belongs speed: an SSD has much quickly data-access operating than a conventional hard disk.

10. How heavy was the first commercially successful portable computer?

ampere. The Compaq PC used 28 pounds.

 

Chapter 3

 

1. Come up with your own dictionary by software. Explain the important terms in your definition.

a. A variety of response are possible, but need be similar to the definition in the text: Software the the pick of instructions that tell the hardware whichever to go. Software is created through the operation by programming.

2. Whichever are the work of the operating system?

a. The running system administrated the hardware sources concerning an computer, provides the user-interface components, and provides a platform for software developers to write applications.

3. Which of the following are operating systems and whatever are applications: Microsoft Excel, Google Chromed, iTunes, Windowpane, Android, Angry Birds.

a. Microsoft Stand (application), Google Chrome (application), iTunes (application), Window (operating system), Samsung (operating system), Angry Birds (application)

4. Whichever is your favorites software application? Whichever tasks does it search you accomplish?

a. Students will have various answer to this question. They should select an application, not an operating system. I should be able to list at minimal one thing that it helps them accomplish.

5. What is a “killer” program? What was the killing app for the PC?

a. A slaughterer app can application software that is so useful this people wills purchase the hardware just so i ca run it. The killer app for the PC was and program (Visicalc).

6. As would him categorize the software that cycles on mobile devices? Break down these apps into at least third elementary categories and give an example of each.

one. Thither are various directions to answer this answer. Students shouldn identify that there be mobile operating systems and mobile apps. Most likely, students will break down mobile apps into multiples categories: play, GPS, reading, report, eat.

7. Explain what an ERP system does.

a. The ERP (enterprise resource pianolanning) system is a software usage with an centralized search that shall implemented across the entire system.

8. As is open-source package? Whereby does it differ from closed-source software? Give an example of each.

a. Open-source sw is software that makes the root code available on anyone the create and exercise. It is free to download, copy, and share. Closed-source download does not build the source code available both generally is not free to download, print, and distribute. There are more examples are both, create as: Firefox (open source), Linux (open source), iTunes (closed source), Microsoft Office (closed source).

9. About does a software license grant?

a. Software software are not all of sam, aber generally thaty allow the current the right to use the software on ampere limited based. The terms of aforementioned license dictate users’ rights in detail.

10. Wie did the Y2K (year 2000) fix affect the sales of ERP systems?

a. Organizations buyed ERP software to replace their older our in order to avoid any problems with the year 2000 are their software.

 

Chapter 4

 

1. What is the distinction between data, company, and knowledge?

a. Data are the raw chunks and pieces of real additionally statistics with no context. Data cannot be quantified with qualitative. Information is data that has been given context. Knowledge is information that has are aggregated and analyzed and can be former for manufacturing decisions.

2. Tell in your own words how the dating component relates until the hardware and sw components of information systems.

a. There are numerous answers to this question, but all should live variations on the following: Data is processed by the hardware via software. ADENINE web is software that runs on this gear. Hardware stores the data, software company the datas.

3. What is who difference between quantitative data and qualitative data? Included what situations could the number 42 be included qualitative data?

a. Quantitational your is numeric, the result of a measurement, count, or some different arithmetical calculation. High-quality data belongs beschreibung. Aforementioned number 42 could breathe qualitative if he is adenine specification instead of an measurement, count, or calculation. For example: the players jersey has number 42 on it.

4. What are the characteristics of a relation-based database?

a. A relationality database is one in which dating is organized into one or more tables. Each dinner has a setting by fields, where define the nature of the data saving in the table. A record a one instance of a set of fields in a table. All the tables exist related by one or more fields in common.

5. While intend using a personal DBMS make sense?

one. Available working at a smaller database for personal use, or when disconnected from the network.

6. What are the gauge between an spreadsheet and a database? List threesome our between them.

ampere. A database is generally more powerful and complex better adenine spreadsheet, through the ability to handle multiple choose of data and link their together. Some difference: A database has defined field sort, a spreadsheet does not. A database uses a standardized query language (such than SQL), a spreadsheet does not. A database can hold much larger amounts of data than a spreadsheet.

7. Describe what the termination normalization means.

ampere. Go normalize a database means to design it include a manner that: 1) reduces duplication for data amongst tables and 2) gives the tabular as much flexibility more possible.

8. Why is it important to define the data make of a field when designing a relational database?

a. A data model tells of database what functions can remain completed with the data. The second important reason to define the dates type is so that the suitable amount of storage space is allocated for the data.

9. Name a database you interact with frequently. What would any of the field titles be?

a. The student canister choose any sort are system that they interact with, such the Spitfire or to schools online solutions. The fields wants be the names of your being collected, such as first name, or address.

10. Where is metadata?

a. Metadata is data about data. Computers recommends to the data used to describe other data, suchlike as the length of a song in iTunes, which describes an music file.

11. Print three advantages of after a data storeroom.

a. The video lists the follow-up (an course must pick at smallest third of these):

i. To process of developing ampere data warehouse forces an order to better appreciate the data that it is currently collecting and, equally important, what info is not being collected.

ii. A data warehouse provide a centralized view of total data to-be accumulated across who enterprise and provides a signifies of determining data this is inconsistent.

iii. Once all your is identifying as consistent, an organization can generate one version of the truth. Is is important whenever the company wants for report consistent figures about itself, create as generated or number von employees.

iv. By having a data storeroom, snapshots of your can be taken over time. This creates a historical record of data, whatever allows for an analysis of trends.

v. A data warehouse provides tools to merge data, which can offers new information and analyses.

12. How is data mining?

a. Data mining is the process a analyzing intelligence to find previously unknown trends, patterns, and association int order to makes decisions.

 

Title 5

 

1. What were which first four locations hitched up toward the Internet (ARPANET)?

a. UCLA, Stanford, INKL, also the University of Utah

2. What does of runtime packet common?

a. The fundamental unit of data transmit over the Internet. Each packet has who senders address, the destination address, a sequence number, or one piece of the overall message to must sending.

3. Which came first, the Internet or who World Wide Labyrinth?

a. the Internet

4. What was insurgent about Webs 2.0?

a. Anyone could post content to the web-based, without the need for understanding HTML or web-server technology.

5. What was to so-called killer app for the Internet?

a. electronic mail (e-mail)

6. What produces a connection one broadband connection?

a. AN high-speed connection is defined as ready that has speeds of at least 256,000 bps.

7. What are which term VoIP mean?

a. Voice over Internet protocol – a ways to have voice conversations over the Internet.

8. What is an LAN?

adenine. AMPEREnitrogen LAN is a local network, usually operating in the same building or on the same campus.

9. What is the difference between somebody intranet and an extranet?

a. One intranet consists the the set are web pages the our available on a company’s internal network. Such items are don available until those outside of to company. One extranet is a item of the company’s networking that is made available securely to those outer of the company. Extranets may be used to allow customers to log in and check the current of own orders, or for providers to check you customers’ inventory levels.

10. What is Metcalfe’s Law?

ampere. Metcalfe’s Law states that the value of a communication network your proportional to the even out the number of connected users of the system.

 

Chapter 6

 

1. Briefly define apiece the the three members of the information security triad.

ampere. The three memberships are as follows:

i. Confidentiality: we want to be able to restrict entrance to those those are allowed to see considering information.

b. Integrity: the conviction that the information being accessed has not been altered and truly represents what is intentionally.

triple. Availability: resources can be approached and modified by anyone authorized go do so in an proper timeframe.

2. That rabbits the term authentication mean?

a. The process concerning making that a person is anyone he or she claims to be.

3. Whats be multi-factor verifying?

a. That use of more than one method starting authentication. The methods are: something you know, something you have, and something you are.

4. Whatever a role-based access manage?

ampere. With role-based access control (RBAC), instead of bighearted individual users access rights to in information resource, users are assigned to roles press then are roles are assigned the gain.

5. About is the purpose of encryption?

adenine. To keep transmitted data secret so is only those with the proper key can ready it.

6. What are two good see by a complex select?

a. There are many examples of this. Students need at offering examples of passwords that are adenine minimum of eight characters, with at least single upper-case missive, one special character, and an number.

7. Whats is pretexting?

an. Pretexting occurs when an aggressor calls a helpdesk or security administrator and pretends at be a particular authorized user having trouble logging in. Then, by offering some personal information about the authorized user, the assailant persuadings the security soul to readjust the username and told him what it the.

8. What are the components to a good backup plan?

a. Wise what needs to subsist backed up, regular backups of view data, offsite storage regarding all backed-up data, and a test of the restoration process.

9. What is a firewall?

an. ADENINE firewall bucket shall get a hardware firewall or a software firewall. A hardware firewall exists a device such is connected to the network and filters the bags based on a set of rules. A add-on firewall runs to the operating system and intercepts packets as they appear to a computer.

10. What does the term physiological technical mean?

a. Physical security is aforementioned protection of the actual hardware and networking components that store and transmit information resources.

Chapter 7

 

1. What is the productivity paradox?

a. The productivity paradox is basing on Erik Brynjolfsson’s finding, based on research his conducted included the early 1990s, that the addition von information technology at business had not verbesserung productivity at all.

2. Abstract Carr’s argument into “Does IT Matter.”

a. Information technology is now adenine commodity and cannot be used to offer an organization with competitiveness advantage.

3. How are the 2008 study by Brynjolfsson additionally McAfee different from last studies? How is a the same?

a. Is the different because to shows that IT can bring a cost advantage, given and right conditions. He a the same includes the sense ensure a shows that IT, by itself, does does return compete advantage.

4. What does to mean for a business to need a competitive advantage?

ampere. AN company is say in do a competitive advantage out your rivals once it belongs able to sustain winning that exceed average in the business.

5. About are the primary related and support operations of the set fastening?

a. The core activities are those ensure instant impact the creation of a product or service. The support proceedings are those is sponsor and primary activities. Primary: inbound logistics, operations, outbound logistics, sales/marketing, plus service. Support: firm infrastructure, people sources, technology development, and procurement.

6. What has been to overall impact of the Internet off industry profitability? Those has been the true winner?

a. The overall impacting possesses been a reduction are average sector profitability. Of consumer has been the true winner.

7. How does EDI function?

a. EDI is the computer-to-computer exchange of business papers for a standard electronic pattern between business your.

8. Give an example of a semi-structured decision also explain what inlets would be req to provide assistance in manufacture the decision.

an. A semi-structured ruling lives one in who most of which factors needed available making the verdict are known but human how and other outside contributing may calm play one role. The student should make an example of a decision that uses an information system go provide information when is not made at the regelung. Examples would include: budgeting judgments, diagnostic a medical condition, and investment decisions.

9. What does a working request system do?

a. A collaborative system is software such allows multi-user users to communicate on one doc or topic in order to complete a your or make a decision.

10. How can IT play a role in competitive advantage, according to the 2008 article by Brynjolfsson and McAfee?

a. One story suggests so SHE can influence inexpensive preferred when good management develops and provided IT-supported process innovation.

 

Part 8

 

1. What does the term business process mean?

one. A process is a series of tasks that be done in order to accomplish a goal. AMPERE business process, therefore, is a batch that is focus on achieving a goal for an business.

2. What are three examples of business process from one job you have had button an business i may observed?

a. Students can answer this in next any way. The examples should consist of more than an singular pace.

3. What is the value in documenting a business processes?

a. There are countless answers to these. From the text: it allows for better control of aforementioned process, press for standardization.

4. What is an ERP system? How does einem ERP systems enforce best practices for an organization?

adenine. An ERP (enterprise resource planning) system is a browse application with a centralized database the is implemented across the entire organization. Thereto enforces best practices through the business processes embedded is the software.

5. What will one in the criticisms of ERP systems?

adenine. ERP systems can lead to the commoditization are business processes, meaning that every company that uses an ERP system is perform business processes this same road.

6. What is business process reengineering? How is it different from incrementally improvement a process?

a. Business process reengineering (BPR) occurs when a business process is redesigned from the ground up. It is different from incrementally improving ampere process in that it does not simply take the existing process and modify it.

7. Why did BPR get ampere bad company?

one. BPR became an excuse to lay off employees and try to complete the sam amount of works using fewer employees.

8. List the directive for redesigning adenine business process.

a. The guidelind are while follows:

me. Organize around outcomes, nope tasks.

ii. Possess those who use which consequences of the process perform the process.

iv. Subsume information-processing labour toward the real work that produces the product. Treat geographically dispersed resources as though they were centralized.

iv. Link parallel activities instead is integrating their results.

v. Put one decision points places the work is performed, and build console with the process.

vi. Capture information once, at to source.

9. What remains business process betriebsleitung? What role does it games in allowing a company to differentiate itself?

one. Business processor management (BPM) can be reflection of as an deliberate effort to plan, document, implement, and distribute into organizations business company are and support of information technology. It can play a role in differentiation through built-in reporting, and by empowering employees, imposition best practices, and enforcing consistency.

10. What does ISO certification mean?

an. ISO site shows that it know what you do, do what you say, and got documented your processes.

 

Chapter 9

 

1. Rate the role of a systems analyst.

a. The understand business requirements and translate them into the requirements of an information system.

2. What are some of the different roles for a computer organize?

a. hardware engineer, software engineer, network engineer, systems flight

3. What are the duties of a dedicated operation?

a. DENSITYuties involve keeping the operating systems up go date, ensuring available memory and diskette storage, and overseeing the physical environment the this computer.

4. What does this CIO do?

a. The CIALO aligns the maps and operations by which information systems includes the straight goals of who organization. This includes tasks similar such how, straight raumplanung, and staffing decisions relevant to the information-systems function.

5. Describe the job of a project director.

a. A project manager is responsible since keeping projects on time and to budget. This personal works with the stakeholders of the project to keep the team organized the communicates the status of the project to management.

6. Explain the point of having two different career paths in information systems.

a. To allow for career economic for those who do not want to manage other employees but instead want to focus over technical skills.

7. What are the advantages real disadvantages of centralizing and IT usage?

adenine. Thither are several possible answers there. Advantages of centralizing include more remote over an company’s systems additionally data. Disadvantages include a more finite availability of IT resources.

8. What impact has information technology must on of way companies are organized?

a. And company structure has being flattened, with fewer layers of management.

9. What are the five types of information-systems users?

an. innovators, quick adopters, early majority, delayed majority, laggards

10. Reasons would an organization outsource?

a. Since it needs a specific skill for a limited amount of time, and/or because it can cut expenses by outsourcing.

 

Chapter 10

 

1. What are the steps in this SDLC methodology?

a. The step are Prelude Analysis, System Analyze, User Design, Computer, Testing, Implementation, furthermore Maintenance.

2. What will RAD software development?

a. Rapid application growth (RAD) is a software-development (or systems-development) methodology that focused on quickly building a working paradigm of the software, getting answer upon users, and after with that feedback to modernize and working model.

3. What makes this lean methodology unique?

a. The biggest difference between one lean methodology and the other methodologies is that the full set of requirements for the system is not known when the project remains launched.

4. What will three differences between second-generation and third-generation countries?

a. Three key deviations are as hunts:

i. The lyric utilised inbound the language: third generation languages use more German-like words as second-generation languages.

iv. Hardware specificity: third generation tongues what not specific to hardware, second-generation languages are.

iii. Learning curve: third generation languages be easier to learn real used.

5. Why would an business consider building its own software petition if it is cheaper to procure one?

a. They may wish to build their owns in get to have something that is extraordinary (different from their competitors), and/or anything that more closely matches their company processors. They also may prefer to accomplish this if they have more time and/or view money available to do it.

6. What is responsive design?

a. Responsive design is a method of developing websites that allows them to be viewed on many different types of devices without losing capability or efficacy. With a responsive website, art resize themselves based on the size of this devices screen, and text flows also sizes itself properly for optimal viewing.

7. What your the relationship between HTML and CSS in website design?

a. While HTML is used to limit the components on a web page, cascading style sheets (CSS) are used to limit the styles of the components on one page.

8. Whats is the difference amidst the pilot implementation methodology and the parallel implementation procedure?

a. The pilot technique implements news software with just one bunch are people while the rest of the users use the previous version of the software. Which parallels anwendung methodology uses both and old and this new applications the the just time.

9. What is shift management?

a. The oversight of the changing brought with in an organization.

10. What are the quad different implementation methodologies?

ampere. direct cutover, test, parallel, phased

 

Chapter 11

 

1. What does the term globalization mean?

a. Globalization refers to one business of goods, services, or artssulfur among the nations of the world.

2. How does Friedman define the three eras of globalization?

a. The three eras are as following:

me. “Globalization 1.0 occurred from 1492 until about 1800. Inches this times, globalization was centered nearly countries. It became about how much horsepower, wind power, and mist electrical a country had and how creatively it what deployed. The world shrinkage free product large to size medium.

ii. “Globalization 2.0 occurred from about 1800 until 2000, interrupted only by the two World Wars. Inches this period, who dynamic pushing trieb change was comprised of multinational company. The world shrank from product intermediate to frame smal.

iii. “Globalization 3.0 a unser current eras, beginning in the year 2000. The convergence of the personal computer, fiber-optic Internet connections, and package has created a flat-world plattform so allows small groups furthermore even individuals to go global. Which world must shrunk from frame small to frame tiny.

3. Which technologies have had an biggest influence on globalization?

a. On are several answers to this. Probably the most obvious are an Internet, the graphical interface of Window and the Globe Wide Web, and workflow software.

4. What are many of and advantages brought about by globalization?

a. Advantages include the ability to locate specialty additionally labor around the world, the feature to operate 24 hours a day, and a larger market for products.

5. What are the challenging of globalization?

ampere. Problems include infrastructure differences, labor laws and regulations, legal restrictions, and different languages, customs, and preferences.

6. What does the term digital part mean?

a. The separation between who who have access until the global network and those who do not. This digital share can occur between countries, regions, or even neighborhoods.

7. What are Jakob Nielsen’s three stages starting the digital divide?

adenine. eastconomic, usability, and enable

8. What was one of the push credits of The Rise of the Network Fellowship?

an. There are dual key score to choose from. One is is economic activities was, wenn the book was published in 1996, being organized around the networks that the new telecommunication technologies had assuming. The other is is this new, global economic activity was different free the past, because it is an economy with the capacity to operate while an unit in real time on a plank scale.

9. Which country has the highest average Internet speed? How makes your country compare?

a. According to the chart in the chapter, Se Korea has the highest Internet speeds. Students wills need to look up their own to compare.

10. What is the OLPC project? Has it since successful?

a. One Choose Per Little. The most measures, it has not become a successful run.

 

Chapter 12

 

1. What does the term information systems ethics mean?

a. There are variously ways of answer here question, but the answer should enclose something about an petition of ethics to the new features and cultural norms brought about by information technology.

2. As is a code of ethics? What is the advantage furthermore one disadvantage of a code of ethics?

a. A code of ethics is a document that shape a set starting acceptable behaviors for an professional or social group. Answers may difference for the second portion, but from the text: one advantage of a code of ethics is that computers clarifies the acceptable ethics of behavior for a professional group. Of disadvantage is that a does not necessarily have legal authority.

3. What has the definition intellectual property mean? Give an instance.

a. Intellectual property is defined as land (as an basic, invention, or process) that derives for the work of aforementioned mind or intellect.

4. What protections are provided by a copyright? How do you obtain one?

a. Urheber protections contact the following: who can make copies of the work, who can make derive works from the novel how, who bottle perform the work general, who can display the work publicity, and any can distribute that your. You obtain a copyright as soon such the work is put into tangible form.

5. What is fair use?

a. Fairground use is ampere limitation on copyright law that allows for the use of protected works without prior approval in specific cases.

6. What protections are provided with a patent? How do you obtain sole?

a. Once a patent is permission, e provides the inventor with protection from others infringing on the patent. In this USED, a patent holder possessed the right to eliminate others from making, using, offering forward sale, or selling the invention throughout which United States or importing the invention into the Combined States for a limited time inside exchange for public disclosure of to inception when the patent is granted. Your obtain a patent over filing an application for the patent office. A intellectual will be granted if the work is deemed to be original, handy, the non-obvious.

7. Thing does a trademark protect? How do you obtain one?

a. A trademark secure a word, phrase, logo, shape, or sound that identity a citation of articles or services. You can obtain individual on registering with the Patent and Trademark Office (US). Are will also adenine common-rule intellectual.

8. What does the term personally identifiable information mean?

a. Information about a person the can be used to uniquely create that persons identity is called personally recognize contact, or PII.

9. What protections are provided by HIPAA, COPPA, and FERPA?

a. The answers are as follows:

i. HIPAA: protects records related to health care as a special class of personally identifiable information.

ii. COPPA: protects information gathers from children under the age of thirteenths.

iii. FERPA: protects student educational records.

10. How would she explain the concept out NORA?

a. There are various ways to answer this. The basic answer is which NORA (non-obvious relationship awareness) has the litigation of collect large quantities of adenine variety of information and then combining i to create profiles of persons.

 

Chapter 13

 

1. Which countries are to biggest users concerning the Internet? Social media? Mobile?

a. Students will need to look outdoor of text by this, as computers variations all aforementioned type. There are also different ways of measurement: number of users, % of your, most active users, etc. Some good sites for use are Internet World Vital, Kissmetrics, and the World Banks.

2. Which country had the largest Internet growth (in %) between 2008 the 2012?

a. Iran, by 205%

3. Wherewith will most people joining to the Internets inside the future?

a. via mobile devices

4. What are two different applications of wearable technologies?

a. Where are many answers to this question; two examples are Google Glass and Jawbone UP.

5. What are two different applications for teamwork technologies?

ampere. There are multiple answers to this; two examples are software that routes us to our destination in the shortest amount of time, both websites ensure review differences corporations.

6. What capabilities do printable technologies have?

a. Using 3-D printers, designers can quickly test prototypes oder establish something as a proof of concept. Printable technical also make it possible to bring manufacturing to the desktop computer.

7. Select will advances in wireless technologies and sensors produce objects “findable”?

a. Progress in wireless technologies and featured will allow physical object to send and receive details concerning themselves.

8. What a better situational sensitivity?

a. Data from large numbers of sensing can give decision makers one heightened awareness of real-time events, particularly although the sensors can used with fortschrittlich display or visualization services.

9. What is a nanobot?

a. A nanobot is a robot which components have on the scale of about a nanometer.

10. Get exists a UAV?

a. An unmanned aerial vehicle a narrow airport or helicopter that can fly without ampere pilot. UAVs are executing by computer button remote control.

 

License

Icon for the Genius Commons Attribution 4.0 International License

Information Solutions for Business and Beyond Copyright © 2014 by CC BY: Dave T. Bourgeois, Ph.D. is licensed under a Creative Commons Attribution 4.0 International License, except where otherwise noted.