EXAM 2 BUS 311- Information Systems for the Global Business Environment Andrea Rivera

0.0(0)
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/48

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

49 Terms

1
New cards

________ are information systems that allow companies to integrate information and support operations on a company-wide basis.

Enterprise systems

3 multiple choice options

2
New cards

Which of the following is a core activity according to the value chain model?

Customer Service

3 multiple choice options

3
New cards

According to the value chain model, which of the following is a support activity?

Technology development

3 multiple choice options

4
New cards

All of the following are true about legacy systems except ________.

They are ERP systems

3 multiple choice options

5
New cards

The processes associated with obtaining goods from external vendors are referred to as ________.

Procure-to-pay processes

3 multiple choice options

6
New cards

The processes associated with selling a product or service are referred to as ________.

Order To Cash Process

3 multiple choice options

7
New cards

Which processes are most often associated with pull-based manufacturing of products?

Make-to-order processes

3 multiple choice options

8
New cards

Information systems that focus on supporting functional areas, business processes, and decision making within an organization are referred to as ________.

Internally focused systems

3 multiple choice options

9
New cards

An enterprise system that has not been customized is commonly referred to as ________.

A vanilla version

3 multiple choice options

10
New cards

________ is a systematic, structured improvement approach by all or part of an organization that critically examines, rethinks, and redesigns processes in order to achieve dramatic improvements in one or more performance measures, such as quality, cycle, time, or cost.

Business process management

3 multiple choice options

11
New cards

Which of the following is commonly used to refer to the producers of supplies that a company uses?

Supply network

3 multiple choice options

12
New cards

Under a VMI model, ________

The suppliers to a manufacturer manage the manufacturer's inventory levels based on negotiated service levels.

3 multiple choice options

13
New cards

The bullwhip effect refers to ________.

Small forecasting errors at the end of the supply chain causing massive forecasting errors farther up the supply chain.

3 multiple choice options

14
New cards

Which type of flow does supply chain execution not focus on?

Procurement flow

3 multiple choice options

15
New cards

During supply chain planning, which four plans are created?

Demand forecast, transportation plan, production plan, sourcing plan

3 multiple choice options

16
New cards

6.A comprehensive CRM system includes all but which of the following components?

Cooperative CRM

3 multiple choice options

17
New cards

SFA is most closely associated with what?

Operational CRM

3 multiple choice options

18
New cards

________ enables companies to engage with their customers using a variety of social media channels.

Social CRM

3 multiple choice options

19
New cards

A metric for being able to quickly resolve customers' issues is called ________.

First Call Resolution

3 multiple choice options

20
New cards

Categorizing customers based on statistical analysis of past behavior is ________.

Ethical and a common business practice

3 multiple choice options

21
New cards

Which of the following is not one of the four phases of the systems development life cycle?

Systems acquisition

3 multiple choice options

22
New cards

________ is the process of gathering and organizing information from users, managers, business processes, and documents to understand how a proposed information system should function.

Requirements collection

3 multiple choice options

23
New cards

Which of the following is the correct order of phases in the systems development life cycle?

Planning, analysis, design, implementation

24
New cards

In the systems design phase, the elements that must be designed when building an information system include all of the following except ________.

Questionnaires

3 multiple choice options

25
New cards

________ maintenance involves making enhancements to improve processing performance or interface usability or adding desired system features (bells and whistles).

Perfective

3 multiple choice options

26
New cards

Which of the following is not one of the three types of arguments commonly made in the business case for an information system?

Fiction

3 multiple choice options

27
New cards

A ________ is a document that an organization uses to tell vendors what its requirements are and to invite them to provide information about how they might be able to meet those requirements.

Request for proposal

3 multiple choice options

28
New cards

A user of proprietary software has the right to ________ the software.

Run

3 multiple choice options

29
New cards

Which of the following factors is a good reason to outsource?

All of the above

3 multiple choice options

30
New cards

Most competitive external acquisition processes have at lease five general steps. Which of the following is not one of those steps?

Implementation

3 multiple choice options

31
New cards

What is the common rule for deciding if an information system faces a security risk?

All systems connected to networks are vulnerable to security violations

3 multiple choice options

32
New cards

Those individuals who break into computer systems with the intention of doing damage or committing a crime are usually called ________.

Crackers

3 multiple choice options

33
New cards

Which of the following does not pose a threat to electronic data?

All of the above can compromise data

3 multiple choice options

34
New cards

Unauthorized data modification includes ________.

Someone who is not authorized to do so changing electronic data

3 multiple choice options

35
New cards

Technological controls used to protect information include ________.

Firewalls and physical access restrictions

3 multiple choice options

36
New cards

Limiting access to electronic data can involve ________.

All of the above

3 multiple choice options

37
New cards

Which of the following is the process of determining the true, accurate identity of a user of an information system?

Authentication

3 multiple choice options

38
New cards

The use of computer and networking technologies by individuals and organized groups against persons or property to intimidate or coerce governments, civilians, or any segment of society in order to attain political, religious, or ideological goals is known as ________.

Cyberterrorism

3 multiple choice options

39
New cards

A(n) ________ is a system composed of hardware, software, or both that is designed to detect intrusion and prevent unauthorized access to or from a private network.

Firewall

3 multiple choice options

40
New cards

________ is the process of encoding messages before they enter the network or airwaves, then decoding them at the receiving end of the transmission so that recipients can read or hear them.

Encryption

3 multiple choice options

41
New cards

In RDBMS, an entity is represented as a(n) ________.

Table

3 multiple choice options

42
New cards

A(n) ________ report provides a summary of critical metrics on a recurring schedule.

Key Indicator

3 multiple choice options

43
New cards

In order to swiftly respond to a highly competitive and rapidly changing environment, organizations utilize a ________.

Continuous planning process

3 multiple choice options

44
New cards

To determine the likelihood of new customers to default on a loan, a manager in a bank would typically use ________.

Classification

3 multiple choice options

45
New cards

Web usage mining entails analyzing ________.

Clickstream data

3 multiple choice options

46
New cards

A(n) ________ is a special-purpose information system designed to support organizational decision-making.

Decision Support System

3 multiple choice options

47
New cards

Big Data is characterized by all of the following except ________.

Verifiability

3 multiple choice options

48
New cards

________ agents keep track of key information such as inventory levels, notifying the users when conditions change.

Monitoring and Sensing

3 multiple choice options

49
New cards

What is true about knowledge management?

All of the above are true.

3 multiple choice options