1/48
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
________ are information systems that allow companies to integrate information and support operations on a company-wide basis.
Enterprise systems
3 multiple choice options
Which of the following is a core activity according to the value chain model?
Customer Service
3 multiple choice options
According to the value chain model, which of the following is a support activity?
Technology development
3 multiple choice options
All of the following are true about legacy systems except ________.
They are ERP systems
3 multiple choice options
The processes associated with obtaining goods from external vendors are referred to as ________.
Procure-to-pay processes
3 multiple choice options
The processes associated with selling a product or service are referred to as ________.
Order To Cash Process
3 multiple choice options
Which processes are most often associated with pull-based manufacturing of products?
Make-to-order processes
3 multiple choice options
Information systems that focus on supporting functional areas, business processes, and decision making within an organization are referred to as ________.
Internally focused systems
3 multiple choice options
An enterprise system that has not been customized is commonly referred to as ________.
A vanilla version
3 multiple choice options
________ is a systematic, structured improvement approach by all or part of an organization that critically examines, rethinks, and redesigns processes in order to achieve dramatic improvements in one or more performance measures, such as quality, cycle, time, or cost.
Business process management
3 multiple choice options
Which of the following is commonly used to refer to the producers of supplies that a company uses?
Supply network
3 multiple choice options
Under a VMI model, ________
The suppliers to a manufacturer manage the manufacturer's inventory levels based on negotiated service levels.
3 multiple choice options
The bullwhip effect refers to ________.
Small forecasting errors at the end of the supply chain causing massive forecasting errors farther up the supply chain.
3 multiple choice options
Which type of flow does supply chain execution not focus on?
Procurement flow
3 multiple choice options
During supply chain planning, which four plans are created?
Demand forecast, transportation plan, production plan, sourcing plan
3 multiple choice options
6.A comprehensive CRM system includes all but which of the following components?
Cooperative CRM
3 multiple choice options
SFA is most closely associated with what?
Operational CRM
3 multiple choice options
________ enables companies to engage with their customers using a variety of social media channels.
Social CRM
3 multiple choice options
A metric for being able to quickly resolve customers' issues is called ________.
First Call Resolution
3 multiple choice options
Categorizing customers based on statistical analysis of past behavior is ________.
Ethical and a common business practice
3 multiple choice options
Which of the following is not one of the four phases of the systems development life cycle?
Systems acquisition
3 multiple choice options
________ is the process of gathering and organizing information from users, managers, business processes, and documents to understand how a proposed information system should function.
Requirements collection
3 multiple choice options
Which of the following is the correct order of phases in the systems development life cycle?
Planning, analysis, design, implementation
In the systems design phase, the elements that must be designed when building an information system include all of the following except ________.
Questionnaires
3 multiple choice options
________ maintenance involves making enhancements to improve processing performance or interface usability or adding desired system features (bells and whistles).
Perfective
3 multiple choice options
Which of the following is not one of the three types of arguments commonly made in the business case for an information system?
Fiction
3 multiple choice options
A ________ is a document that an organization uses to tell vendors what its requirements are and to invite them to provide information about how they might be able to meet those requirements.
Request for proposal
3 multiple choice options
A user of proprietary software has the right to ________ the software.
Run
3 multiple choice options
Which of the following factors is a good reason to outsource?
All of the above
3 multiple choice options
Most competitive external acquisition processes have at lease five general steps. Which of the following is not one of those steps?
Implementation
3 multiple choice options
What is the common rule for deciding if an information system faces a security risk?
All systems connected to networks are vulnerable to security violations
3 multiple choice options
Those individuals who break into computer systems with the intention of doing damage or committing a crime are usually called ________.
Crackers
3 multiple choice options
Which of the following does not pose a threat to electronic data?
All of the above can compromise data
3 multiple choice options
Unauthorized data modification includes ________.
Someone who is not authorized to do so changing electronic data
3 multiple choice options
Technological controls used to protect information include ________.
Firewalls and physical access restrictions
3 multiple choice options
Limiting access to electronic data can involve ________.
All of the above
3 multiple choice options
Which of the following is the process of determining the true, accurate identity of a user of an information system?
Authentication
3 multiple choice options
The use of computer and networking technologies by individuals and organized groups against persons or property to intimidate or coerce governments, civilians, or any segment of society in order to attain political, religious, or ideological goals is known as ________.
Cyberterrorism
3 multiple choice options
A(n) ________ is a system composed of hardware, software, or both that is designed to detect intrusion and prevent unauthorized access to or from a private network.
Firewall
3 multiple choice options
________ is the process of encoding messages before they enter the network or airwaves, then decoding them at the receiving end of the transmission so that recipients can read or hear them.
Encryption
3 multiple choice options
In RDBMS, an entity is represented as a(n) ________.
Table
3 multiple choice options
A(n) ________ report provides a summary of critical metrics on a recurring schedule.
Key Indicator
3 multiple choice options
In order to swiftly respond to a highly competitive and rapidly changing environment, organizations utilize a ________.
Continuous planning process
3 multiple choice options
To determine the likelihood of new customers to default on a loan, a manager in a bank would typically use ________.
Classification
3 multiple choice options
Web usage mining entails analyzing ________.
Clickstream data
3 multiple choice options
A(n) ________ is a special-purpose information system designed to support organizational decision-making.
Decision Support System
3 multiple choice options
Big Data is characterized by all of the following except ________.
Verifiability
3 multiple choice options
________ agents keep track of key information such as inventory levels, notifying the users when conditions change.
Monitoring and Sensing
3 multiple choice options
What is true about knowledge management?
All of the above are true.
3 multiple choice options