1. What software capabilities did Pei Wei need to launch its marketing campaign?
Ans) Now a days technology take a vital role in bringing the new era for marketing. Pei Wei
realized that just doing business is not enough, they should need some media which
Case Study 8
Case 9.2 in Business case: HSBC combats fraud in split-second decisions
Q2) Review the two outcomes of the fraud scenario. Assess the business implications of
each of the following two goals. Explain why these go
Case Study 4
IT at Work 4.1 (Net Neutrality Debate Intensifies)
Q1) What is Net neutrality?
Ans) Net neutrality, the word itself says that providing internet in equal amounts. It is the
principle that Internet Service Provide
Case Study 7
Case 8.2 Business Case : Cheggs Mobile Strategy
1) Evaluate the mobile features of Cheggs textbook program. Does it offer services
that are truly helpful to college students or are they just a gimmick?
Case Study 5
Case 4.2 Google Maps API for Business
Q2) Why do you think Google provides free non-commercial use of its Maps API?
Ans) Google Map API is very much useful for business purposes. It provides customer to
skip to main content
TEC-5333-600 93075.201590 - Mgt of Comp Tech
Select a course.
Quiz Submissions - F
Case Study 3
Case 3.2 (page 108) Business case: Financial intelligence Fights Fraud
Q2) What data and IT problem were limiting FinCENs ability to fight financial crime?
Ans) The data coming from the financial institutions is
Case Study 2
Q1) What might happen when each line of business, division and department develops
its own IT apps?
Ans) In general, any organization possess a lot of data regarding their different departments.
If there is
Case Study 9
1) What mistakes did AstraZeneca make?
Ans) AstraZeneca is one of the worlds leading pharmaceutical company. In July 2007, it
signed a $1.4 billion contract with IBM. This agreement is about seven year global
Case Study 6
Case 5.2 Business Case: Lax Security at LinkedIn Exposed
Q1) LinkedIn does not collect the credit card or other financial account information of
its members. Why then would profit-motivated hackers be interested