Premium Essay

Chapter 2 Questions

In: Business and Management

Submitted By lexxixs
Words 268
Pages 2
Karen Gaskill
LID: 00498315
Chapter 02: Describing Data: Frequency Tables, Frequency Distributions, and Graphic Presentation
Essay

I read an article from abc News found at this website: http://abcnews.go.com/blogs/politics/2014/01/this-chart-explains-why-politicians-arent-like-the-rest-of-us/. The article was published January 10, 2014 and is called “This Chart Explains Why Politicians Aren’t Like The Rest of Us”. The article begins with a bar graph showing the median net worth of the members of Congress compared to the median net worth of the U.S. population. The bar graph illustrates that the median net worth of the Congress is about 10 times more than the median net worth of the U.S. population. About half of the Congress members are millionaires. This has been such a recent focus as the rich vs. poor has become such a common theme in American politics and there has been quite a debate about income inequality. As a result, the Senate has been recently debating how to renew extended unemployment benefits for 1.4 million Americans.
The graph included in this article definitely added to the report. The author was obviously trying to show the income inequality of the Congress members and the U.S. population. The graph illustrated the drastic difference in median net worth between these two by comparing the two population’s net worth. It was quite apparent by looking at the graph that the Congress median net worth was about 10 times more than the U.S. population. The graph gave a great illustration that could not be…...

Similar Documents

Free Essay

Chapter 2 Petrie's Electronics Case Questions

...Chapter 2 – Case Questions: Petrie’s Electronics 1) Information systems projects arise out of need. In the case of Petrie’s Electronics, Jim has been assigned the task of managing a project that will improve the company’s relationships with its customers. Petrie’s has a need to not only stay viable but to flourish and be a major competitor in today’s global technological marketplace. Upper management at an organization realizes at some point that in order to stay competitive they cannot stand still. They must grow and prosper. In this case, Ella the CFO along with other top management figures saw an area for improvement and Jim has been bestowed this opportunity to help the company. In this particular case, the organization’s information system needs may have resulted from issues associated with poor customer relations possibly having a history of high turnover rates for customers. Furthermore, key decision makers at Petrie’s most likely realized they could further capitalize on their current customer base through improvements in their current information technology system. 2) Organizational information systems should not only reinforce and support a company’s strategy they should aim to improve and complement it as well. Similar to a company’s strategy, information systems need to encompass a strategic vision that establishes an Information system’s main purpose and direction, sets core principals as guidelines, identifies clear objectives for monitoring the......

Words: 414 - Pages: 2

Premium Essay

Chapter 2 Review Questions Solutions

...Chapter 2 Review Questions Solutions 1. Describe and compare the six sources of software. The six sources of software identified in the textbook are: (1) information technology services firms, (2) packaged software providers, (3) vendors of enterprise solution software, (4) application service providers and managed service providers, (5) open-source software, and (6) in-house development. IT services firms help companies develop custom information systems for internal use; they develop, host, and run applications for customers; or they provide other services. An IT services firm may be chosen if the system can’t be developed internally or requires customer support. Packaged software providers are companies that produce software exclusively, like Microsoft or Intuit, and are preferable if the task needing the system is generic. Vendors of enterprise solution software create a system that is composed of a series of integrated modules. Each module supports a business function, such as accounting, or human resources. ERP systems may be appropriate if a complete system is required that can cross functional boundaries. A more intense option for larger, more customizable solutions are Managed service providers who can provide more services than application service providers. ASPs and MSPs may be appropriate when instant access to an application is desired, and in the case of ASPs, when the task is generic. Open-source software is a type of software that is developed......

Words: 897 - Pages: 4

Premium Essay

Chapter 2 Review Question

...chapter 2 1. Why is information security a management problem? What can management do that Technology cannot? Management is an information problem due to the fact that policymaking and training of securing systems from users fall into the responsibility of their role. These responsibilities can include limiting access as well as disabling certain functions that are not related to the organizations’ function. Management can set policies that may arise due to improper uses or manipulations of systems and asses the threats that are unknown due to the introduction of new hardware and software. 2. Why is data the most important asset an organization possesses? What other assets in the organization require protection? The integrity of the data is most important because it relates to the overall company operations. Securing the data from people not authorized to see or change it ensures that the correct information about the company is being generated without interference or manipulations of data. Other important assets that requires protection are the computer terminals, networking infrastructure, which need to be protected from misuse from internal and external threats whether intentional or not. 3. Which management groups are responsible for implementing information security to protect the organization’s ability to function? The responsibility relies on several management groups such as CIO, who is responsible for the overall protection of system, but the......

Words: 1762 - Pages: 8

Premium Essay

Chapter 2 Review Questions

...1. Both general management and IT management are responsible for implementing information security that protects the organization's ability to function. Management is responsible for implementing information security to protect the ability of the organization to function. They must set policy and operate the organization in a manner that complies with the laws that govern the use of technology. Technology alone cannot solve information security issues. Management must make policy choices and enforce those policies to protect the value of the organizations data. 2. Data is important to an organization because without it an organization will lose its record of transactions and/or its ability to furnish valuable deliverables to its customers. Other assets that require protection include the ability of the organization to function, the safe operation of applications, and technology assets. 3. Both general management and IT management are responsible for implementing information security. 4. The implementation of networking technology has created more risk for businesses that use information technology because business networks are now connected to the internet and other networks external to the organization. This has made it easier for people to gain unauthorized access to the organization’s networks. 5. Information extortion occurs when an attacker steals information from a computer system and demands compensation for its return or for an agreement not to......

Words: 1114 - Pages: 5

Free Essay

Religions of the World Chapter 2 Questions

...Chapter 1 1. Why do we speak of “basic” rather than “primitive” religions? We speak of “basic” religions because the term is applied to many religions of contemporary people whose religious ideas are not found in written forms and to those of prehistoric people. In fact, it embraces a large variety of beliefs and practices. The word “primitive” means representative of the earliest stages of human development, which no religions can actually be considered primitive. Most religions are not the exact same and do not believe the same things, as they did thousands of years ago. Over time, religions have evolved, developed, or adopted new or different beliefs, in response to ecological and social environments, and continue to build on the wisdom of previous generations. 4. Define animism, and give several examples of surviving animism in modern life. Animism is the belief that all nature is alive and filled with unseen spirits and souls that have feelings and can be communicated with. Animists see a soul or a self, existing in animals, trees, stones, rivers, mountains, heavenly bodies, seas, and the Earth. These spirits can be flattered or offended, and can either help or hurt humans. Some examples in modern life of animism are historic stones, fireplaces, evergreen trees for Christmas, the sacred black stone for Muslims, the sacred river Ganges for Hindus, sandalwood for burning in the sacred fire temple for Parsis, and pilgrimages to the graves of presidents and famous......

Words: 512 - Pages: 3

Premium Essay

Chapter 2 Question

...Stacy Edelman Chapter 2 Questions 1. In what ways do Different ideologies and political systems influence the environment in which MNCs operate? In each country has there are own government controls and laws that have to be followed. You have to take the countries religious views into consideration. Whether the company is domestic, national, international, large or small political factors of the country it is located in will have an impact on it. A government could restrict a company's activity by intimidating and banning activities. 2. How do the following legal principles impact MNC operations. 1. The principle of sovereignty: An international principle of law which holds that governments have the right to rule themselves as they see fit. Implies that one countries court system cannot be used to determine wrongful conduct or impose penalties in another unless that country agrees. Each country has it's own rules and if that person was a U.S. citizen working in a different country and was providing equal opportunity, the employee has no right to sue the employer. 2. Nationality Principle: Recognizes a nations interest in maintaining some degree of control over it's citizen residing in different countries. Managers who violate American foreign corrupt practices when traveling could be found guilty in the U.S. 3. The territoriality Principle: accepted in the united states but not in all countries. each country has the right to it's own jurisdiction within...

Words: 318 - Pages: 2

Free Essay

Chapter 2 Questions & Answers

...Linsey Cessor EDUC 2253 Dr. Shahan January 28, 2015 Professional Practice Chapter 2: Question for Discussion 2. Why is membership in an ethnic group more important to some individuals than to others? What characteristics might an educator look for to determine a student’s ethnic background and its importance in that student’s life? * Individuals may have multiples reasons of being more in tuned to their ethnicity than others. Most are drawn to their ethnic group because that is what is familiar to them. When the elderly generation is a dominate part of their raising then the younger generation has more information about their heritage. * Others are not so luck to grow up with the elderly generation influence and have are disconnected with their ethnic groups. Some people are a merge of two different ethnic groups and this causes confusion for the individual. With the merging of different ethnic groups, some people tend to loners. Not ever finding that “prefect” ethnic group that they belong in. As an educator there are many characteristics that will reveal the ethnicity of a student such as a student’s gender, race and religion. However, with all of this being said I do not think that the ethnicity of a student is completely important for an effective teacher. An effective teacher teaches on the level of their students, and then begins helping the student’s excel. An effective teacher is able to teacher all the curriculum to the students without biases...

Words: 344 - Pages: 2

Premium Essay

Far 600 – Chapter 2 – Past Years Questions

...FAR 600 – CHAPTER 2 – PAST YEARS QUESTIONS 1. Oct 2010 QUESTION 1 a) Hameed (2000) suggested that Islamic accountability can be regarded as the primary objective of Islamic accounting. Required: Discuss the differences in the concept of accountability from both Islamic and conventional accounting perspectives. Answer: The differences in the concept of accountability from both Islamic and conventional accounting perspectives are as follows: | Conventional Accounting | Islamic Accounting | Definition | Accountability is the duty to provide an account or reckoning of those actions which one is held responsible. Accountability is seen as a form of principal-agent relationship. | Accountability in Islamic accounting extends into 2 parts: 1. The responsibility to undertake certain actions 2. To provide an account of these actions | Concept of relationship | Accountee as principal enters into a contractual relationship with an Accountor as agent. | Contractual obligation to the real owner; Allah SWT (Amanah) | Characteristics | 1. Profit-oriented. * Net profit is used as a basis of performance measurement. 2. Non-shariah compliant * Practice interest in business transactions 3. Distribution of wealth among shareholders. * Shareholders are the owner of the company. | 1. Zakat-oriented. * Payment of Zakat is used as a basis of performance measurement. 2. Shariah compliant * Riba’-free system and according to Qur’an and......

Words: 552 - Pages: 3

Premium Essay

Chapter 2 Quick Answer Question

...by believing that one’s own culture is superior to the culture of others, tending to make people to neglect important cultural differences. 2. Q: What is cultural literacy? Why should businesspeople understand other cultures? ANSWER: Cultural literacy is the detailed knowledge about a culture that allows a person to work effectively within it. Businesspeople should understand other cultures because it would improve their ability to manage employees, market products, and conduct negotiations in other countries. It also helps managers to attend local needs and desires, improving the company’s competitiveness as globalization continues. 3. Q: How do nation-states and subcultures influence a people’s overall cultural image? ANSWER: When it comes to culture, we tend to invoke the concept of the nation-states that support and promote the concept of national culture by building museums and monuments to preserve the legacies of important events and people, and that also intervene in business to preserve national culture. While the subculture that is a group of people that share a unique way of life within a larger culture (including language, race, lifestyle, attitudes, or other characteristics) tends to be neglected, even that subcultures are very important when considering to expand business abroad. Quick Study 2 1. Q: What is meant by a culture’s aesthetics? Give several examples. ANSWER: A culture’s aesthetics are what it considers “good......

Words: 2352 - Pages: 10

Premium Essay

Chapter 2 Essay Questions Strategic Management

...Chapter 2 Application Questions 1. Imagine yourself as the CEO of a large firm in an industry in which you are interested. Please (1) identify major trends in the general environment, (2) analyze their impact on the firm, and (3) identify major sources of information to monitor these trends. (Use Internet and library resources.)As I am striving to work in the Funeral or Death Industry as a Funeral Director, I am observing the change in our industry from traditional burial to cremation. This shift in the industry which reduces the price of a funeral by three or four thousand dollars depending on the demographic area, these trends can be followed in Funeral Industry standards such as the NAFD, a Funeral Directors Organization 2. Analyze movements across the strategic groups in the U.S. retail industry. How do these movements within this industry change the nature of competition?The retail industry is driven by young consumers. These consumers make decisions for their group by purchasing the goods and services that they want. Making the decisions changing competiton for everyone. 3. What are the major trends in the general environment that have impacted the U.S. pharmaceutical industry?More easily accessible drug information. Help with drug costs through programs from the pharmacy and the drug companies. Rewards programs. 4. Go to the Internet and look up www.kroger.com. What are some of the five forces driving industry competition that are affecting the......

Words: 321 - Pages: 2

Premium Essay

Week 2 Chapter 3 & 4 Review Questions

...Week 2 Problems/Exercises: Chapters 3 & 4 Michael LaBarge DeVry University Chapter 3 2. List and describe the common skills and activities of a project manager. Which skill do you think is most important? Why? Common skills of a project manager include: interpersonal skills, leadership skills and technical skills. Interpersonal skills include the skills needed to effectively communicate with others what needs to be done and the process that should be taken to get it done. Leadership skills are important because as the project manager is in charge of the project, they must be able to successfully lead their team from initiation to completion of the project as efficiently as possible. Technical skills are the skills needed to understand all aspects of the system that is to be created or modified and what it takes to make that happen. Common activities of a project manager include: leadership, management, customer relations, technical problem solving, conflict management, team management and risk and change management. I believe that the most important skill that a project manager must possess is leadership. I think that with the right team, the PM can get assistance on the interpersonal and technical aspects of the project. However without the proper leadership, even the best team will ultimately fail, or at least have many difficulties. Also, many of the activities that a project manager must do are leader/management based. 4. Describe the activities performed......

Words: 766 - Pages: 4

Premium Essay

Chapter 2 Review Question

...Gunther Documet 9/14/2015 Applications in Info Security Chapter 4 Review Questions: 1)It might depend on the risk, although all risks should be addressed. The conditions that an organization might have is if they don't have a risk management plan or if they don't have the money to identify and mitigate the risk 2) 3)Alignment is important because it can align organizational goals with ICT works. The benefits to an organization as a whole is that it can align security processes with business goals. 4)Evaluation is important because it can determine if your team is achieving the objectives and this is usually done through gathering data and then analyzing it. Organizations benefit by collecting quantitative data because it can be used to evaluate the options and implications of a decision. 5)A contract is an agreement between a customer and a supplier, while the RFP is technically a bid solicitation. 6)Typically a subcontractor role is to perform specific tasks given by a general contractor. They can be controlled by the supplier to follow the right procedures that are given in the contract. 7)The problem resolution is important because it involves two parties in agreeing that all problems are identified, analyzed, managed, and controlled to resolution. 8)There are two types of reviews: Formal Reviews Informal Reviews In a formal review, the ICT is presented to a team or to an individual before the actual review. In the other hand the informal......

Words: 334 - Pages: 2

Premium Essay

Accounting Chapter 2 Questions

...What is a conceptual framework? Why is a conceptual framework necessary in financial accounting? .A conceptual framework establishes the concepts that underlie financial reporting. A conceptual framework is a coherent system of interrelated objectives and fundamentals that are expect to lead to consistent standards'. A coherent system of concepts that flow from an objective. The objective identifies the purpose of financial reporting. The other concepts provide guidance on (1) identifying the boundaries of financial reporting; (2) selecting the transactions, other events, and circumstances to be represented; (3) how they should be recognized and measured; and (4) how they should be summarized and reported. What is the primary objective of financial reporting? The objective of general-purpose financial reporting is to provide financial information about the reporting entity that is useful to present and potential equity investors, lenders, and other creditors in making decisions about providing resources to the entity. Those decisions involve buying, selling, or holding equity and debt instruments, and providing or settling loans and other forms of credit. Information that is decision-useful to capital providers may also be useful to other users of financial reporting, who are not capital providers What is meant by the term “qualitative characteristics of accounting information”? Qualitative characteristics of accounting information that distinguish better or (more......

Words: 662 - Pages: 3

Free Essay

Chapter 2 Review Questions

...Chapter 2 Review Questions 1. Why is information security a management problem? What can management do that technology cannot? Managing information security has more to do with policy and enforcement rather than technology. Management must address information security in terms of business impact and the cost. 2. Why is data the most important asset an organization possesses? What other assets in the organization require protect? Data in an organization represents its transaction records and its ability to deliver to its customer. Without this the organization would not be able to carry out day to day work. 3. Which management groups are responsible for implementing information security to protect the organization’s ability to function? Both management and IT management are responsible for implementing security to protect an organizations ability to function. 4. Has the implementation of networking technology created more or less risk for businesses that use information technology? Why? Networking is usually considered to have created more risk for businesses that use information security. The reason is that potential attackers have reader access to the information system. 5. What is information extortion? Describe how such an attack can cause losses, using an example not found in the text Information extortion is the act of an attacker or trusted insider who steals information from a computer system and demand compensation for its return or for an......

Words: 1152 - Pages: 5

Premium Essay

Chapter 2 Review Questions

...Chapter 1 PLD Review questions Multiple choice 1. A program is a set of instructions that a computer follows to perform a task. 2. The physical devices that a computer is made of are referred to as Hardware. 3. The part of a computer that runs programs is called the CPU. 4. Today, CPUS are small chips known as Microprocessors. 5. The computer stores a program while the program is running, as well as the data that the program is working with, in Main memory. 6. This is a volatile type of memory that is used only for temporary storage while a program is running. A. RAM 7. A type of memory that can hold data for long periods of time—even when there is no power to the computer—is called Secondary storage. 8. A component that collects data from people or other devices and sends it to the computer is called an input device. 9. A video display is a(n)output device. 10. A byte is enough memory to store a letter of the alphabet or a small number. 11. A byte is made up of eight bits. 12. In a binary numbering system, all numeric values are written as sequences of 0s and 1s. 13. A bit that is turned off represents the following value: 0 14. A set of 128 numeric codes that represent the English letters, various punctuation marks, and other characters is ASCII. 15. An extensive encoding scheme that can represent the characters of many of the languages in the world is Unicode. 16. Negative......

Words: 727 - Pages: 3