1/55
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
E-commerce
the buying and selling of products over the internet
Cyber Monday
the Monday after Thanksgiving in which companies offer great deals to persuade consumers to purchase products
Cookies
small data files that are written and stored on the user’s hard drive by a website when that user visits the site with a browser
Information Privacy
the right to determine when and to what extent information about oneself can be communicated to others
Globalization
the increasing movement of goods, services, and capital across national borders
Outsourcing
taking a workplace activity once performed inside the organization and moving it outside of the organization
Job Design
the process of defining how work will be performed and what tasks will be required to fulfill the position
Downsizing
having to reduce the number of employees that work for an organization
a company wouldn’t need as many people, and has to let some long-time employees go
Which technology involves processes that don't involve humans?
Business Intelligence Systems
Cyber Monday
Outsourcing
Automation
Automation
All of the following are ways information technology has changed and reshaped job design EXCEPT:
Increased productivity
Decreased efficiency
Faster turnaround time
Enables people to focus on complex responsibilities
Decreased efficiency
Which of the following is a barrier for e-commerce?
Time constraints
Security
Geography
Language
Security
Businesses use targeted marketing for all of the following reasons EXCEPT?
Predict consumer preferences and behavior
Hiring employees
Send advertisements customized to the customer's likes
Target customers based on preferences
Hiring employees
Which of the following is NOT a benefit of globalization?
Price reductions for consumers
Job security
Transfer of technological innovation
Improved communication between employees, partners, and suppliers
Job security
Processes
the way tasks, or jobs, are completed
Process Re-engineering
the redesign of workflows and processes
Business Process Modeling
analysts and managers will review a business’ systems, or processes, in an attempt to improve it
Management
the governance of a system
Operational Activities
departments that must exist to keep the business going, such as sales, purchasing, and manufacturing
Support Activities
required activities so the operational activities can continue
accounting, human resources, and information technology departments
Total Quality Management (or just Quality Management)
security customer satisfaction by the entire company working towards the goal of continuous improvement
Competitive Advantage
something about a company that sets it apart from its competitors
Electronic Data Interchange
the use of networks and the Internet to place orders, invoice customers, and receive payments
How would a dog-grooming service gain a competitive advantage?
By organizational restructuring
By using the same grooming tools as competitors
By being open during business hours
By specializing in certain types of dogs, like large breeds
By matching competitor's service times
By specializing in certain types of dogs, like large breeds
Employees working three different shifts at one manufacturing position follow the exact same steps to complete their part of the production process. What is this an example of?
Competitive advantage.
Organizational restructuring.
Process re-engineering.
Total quality management.
Business process modeling.
Total quality management.
Why would a company want to implement Total Quality Management or TQM?
To maximize its revenues
To re engineer all processes within the company
To determine the lowest cost method of producing its products
To improve customer satisfaction
To be better corporate citizens of the community
To improve customer satisfaction
Which of these is a process re-engineering that an auto manufacturer might undertake?
Determining the most efficient order for attaching doors, trunk, and hood to the frame
Supervisors strictly enforcing the TQM steps on the assembly line
Organizing workers into teams
Giving each supervisor authority over more employees and tasks
Restructuring senior management roles and responsibilities
Determining the most efficient order for attaching doors, trunk, and hood to the frame
Business process modeling reviews and analyzes _____ activities.
total quality, worker productivity, and technological
management, operational, and support
sales, production, and quality control
accounting, human resources, and information technology
worker, legal, and reporting
management, operational, and support
Privacy
the right to be left alone and free from surveillance and unreasonable personal intrusions
Information Privacy
the right to determine when and to what extent information about oneself can be communicated to others
Electronic surveillance
monitoring people with technology, often without their knowledge
video recordings
photography
audio recordings
Identify theft
the stealing of another person’s social security number, credit card number, or other personal information for the purpose of borrowing money, making purchases, and running up debts
Cookies
small data files that are written and stored on the user’s hard drive by a website when that user visits the site with a browser
Spyware
a small computer program, stored on the user’s hard drive, that collects user’s habits and transmits that information to a third party, all without the user’s consent
Employee Internet Management (EIM) software
filters and monitors employees’ Internet usage
Which of the following is NOT a program used by employers to monitor employees' computer usage?
Refog Employee Monitor
WebWatcher
WorkTime
Norton Internet Security
Norton Internet Security
Which of the following refers to the right to determine when, and to what extent, information about oneself can be communicated to others?
Ethical implication
Empowerment
Privacy
Information privacy
Information privacy
A small computer program gets stored on a user's hard drive. The program then collects the user's habits and transmits that information to a third party, all without the user's consent. From this description, the small program is _____.
a webcam
a system utility
spyware
employee Internet management (EIM) software
spyware
Which of the following BEST describes the monitoring of people with technology, often without their knowledge?
Eavesdropping
Electronic surveillance
Monitoring
Web search
Electronic surveillance
_____ is a small data file stored on a computer hard drive by a website when the user visits the site.
A cookie
Spyware
JavaScript
A startup file
A cookie
Electronic commerce (e-commerce)
the buying and selling of products over the Internet
Mobile commerce (m-Commerce)
e-commerce conducted in a wireless environment over the Internet
Privacy
the right to be left alone and free from surveillance and unreasonable personal intrusions
Information privacy
the right to determine when and to what extent information about oneself can be communicated to others
Database
an organized collection of information that can be accessed, managed, and updated
Privacy policy
statement detailing the ways in which a party collects, uses, and maintains consumer data
Cookies
small data files that are written and stored on the user’s hard drive by a website when that user visits the site with a browser
Third-party cookies
are placed across a network of related websites so that a user’s movements can be tracked at any site within the network
Spyware
a small computer program, stored on the user’s hard drive, that collects users’ habits and transmits that information to a third party, all without the user’s consent
Fraud
deliberate misrepresentation that causes others to suffer loss or damages
Hacker
a term used to describe someone who intentionally breaches security to break into someone else’s computer or network for a malicious purpose
Identify theft
the stealing of another person’s social security number, credit card number, or other personal information for the purpose of borrowing money, making purchases, and running up debts
If you are a victim of identity theft, which of the following is not an action you should take?
Alert the major credit reporting agencies.
Track down the criminal and confront him or her.
Keep records of all transactions.
Hire a lawyer.
File a police report.
Track down the criminal and confront him or her.
When an online retailer collects and stores personal data on customers in exchange for giving the customers discounts through a loyalty program, the customers are surrendering their _____.
legal protections
awareness
privacy
right to shop in physical stores
right to choose online stores
privacy
The best way a business can protect its customers from fraud is to _____.
have a secure checkout process
Which of the following is not considered a form of fraud?
Stealing credit card numbers.
Tricking someone into providing their social security number.
Running up debt in someone else's name.
Merchants collecting private data on customers for marketing use.
Making purchases charged to someone else without their knowledge or approval.
Merchants collecting private data on customers for marketing use.
Jonas spends his time intentionally breaching security to break into personal or e-commerce retailers computers for malicious purposes. Jonas is _____.
not a criminal
a slacker
a hacker
violating privacy
a hacker