Computer Science 102: Fundamentals of Information Technology Ch 9. Impact of Information Technology

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/55

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

56 Terms

1
New cards

E-commerce

the buying and selling of products over the internet

2
New cards

Cyber Monday

the Monday after Thanksgiving in which companies offer great deals to persuade consumers to purchase products

3
New cards

Cookies

small data files that are written and stored on the user’s hard drive by a website when that user visits the site with a browser

4
New cards

Information Privacy

the right to determine when and to what extent information about oneself can be communicated to others

5
New cards

Globalization

the increasing movement of goods, services, and capital across national borders

6
New cards

Outsourcing

taking a workplace activity once performed inside the organization and moving it outside of the organization

7
New cards

Job Design

the process of defining how work will be performed and what tasks will be required to fulfill the position

8
New cards

Downsizing

  • having to reduce the number of employees that work for an organization

  • a company wouldn’t need as many people, and has to let some long-time employees go

9
New cards

Which technology involves processes that don't involve humans?

  1. Business Intelligence Systems

  2. Cyber Monday

  3. Outsourcing

  4. Automation

Automation

10
New cards

All of the following are ways information technology has changed and reshaped job design EXCEPT:

  1. Increased productivity

  2. Decreased efficiency

  3. Faster turnaround time

  4. Enables people to focus on complex responsibilities

Decreased efficiency

11
New cards

Which of the following is a barrier for e-commerce?

  1. Time constraints

  2. Security

  3. Geography

  4. Language

Security

12
New cards

Businesses use targeted marketing for all of the following reasons EXCEPT?

  1. Predict consumer preferences and behavior

  2. Hiring employees

  3. Send advertisements customized to the customer's likes

  4. Target customers based on preferences

Hiring employees

13
New cards

Which of the following is NOT a benefit of globalization?

  1. Price reductions for consumers

  2. Job security

  3. Transfer of technological innovation

  4. Improved communication between employees, partners, and suppliers

Job security

14
New cards

Processes

the way tasks, or jobs, are completed

15
New cards

Process Re-engineering

the redesign of workflows and processes

16
New cards

Business Process Modeling

analysts and managers will review a business’ systems, or processes, in an attempt to improve it

17
New cards

Management

the governance of a system

18
New cards

Operational Activities

departments that must exist to keep the business going, such as sales, purchasing, and manufacturing

19
New cards

Support Activities

  • required activities so the operational activities can continue

  • accounting, human resources, and information technology departments

20
New cards

Total Quality Management (or just Quality Management)

security customer satisfaction by the entire company working towards the goal of continuous improvement

21
New cards

Competitive Advantage

something about a company that sets it apart from its competitors

22
New cards

Electronic Data Interchange

the use of networks and the Internet to place orders, invoice customers, and receive payments

23
New cards

How would a dog-grooming service gain a competitive advantage?

  1. By organizational restructuring

  2. By using the same grooming tools as competitors

  3. By being open during business hours

  4. By specializing in certain types of dogs, like large breeds

  5. By matching competitor's service times

By specializing in certain types of dogs, like large breeds

24
New cards

Employees working three different shifts at one manufacturing position follow the exact same steps to complete their part of the production process. What is this an example of?

  1. Competitive advantage.

  2. Organizational restructuring.

  3. Process re-engineering.

  4. Total quality management.

  5. Business process modeling.

Total quality management.

25
New cards

Why would a company want to implement Total Quality Management or TQM?

  1. To maximize its revenues

  2. To re engineer all processes within the company

  3. To determine the lowest cost method of producing its products

  4. To improve customer satisfaction

  5. To be better corporate citizens of the community

To improve customer satisfaction

26
New cards

Which of these is a process re-engineering that an auto manufacturer might undertake?

  1. Determining the most efficient order for attaching doors, trunk, and hood to the frame

  2. Supervisors strictly enforcing the TQM steps on the assembly line

  3. Organizing workers into teams

  4. Giving each supervisor authority over more employees and tasks

  5. Restructuring senior management roles and responsibilities

Determining the most efficient order for attaching doors, trunk, and hood to the frame

27
New cards

Business process modeling reviews and analyzes _____ activities.

  1. total quality, worker productivity, and technological

  2. management, operational, and support

  3. sales, production, and quality control

  4. accounting, human resources, and information technology

  5. worker, legal, and reporting

management, operational, and support

28
New cards

Privacy

the right to be left alone and free from surveillance and unreasonable personal intrusions

29
New cards

Information Privacy

the right to determine when and to what extent information about oneself can be communicated to others

30
New cards

Electronic surveillance

  • monitoring people with technology, often without their knowledge

  • video recordings

  • photography

  • audio recordings

31
New cards

Identify theft

the stealing of another person’s social security number, credit card number, or other personal information for the purpose of borrowing money, making purchases, and running up debts

32
New cards

Cookies

small data files that are written and stored on the user’s hard drive by a website when that user visits the site with a browser

33
New cards

Spyware

a small computer program, stored on the user’s hard drive, that collects user’s habits and transmits that information to a third party, all without the user’s consent

34
New cards

Employee Internet Management (EIM) software

filters and monitors employees’ Internet usage

35
New cards

Which of the following is NOT a program used by employers to monitor employees' computer usage?

  1. Refog Employee Monitor

  2. WebWatcher

  3. WorkTime

  4. Norton Internet Security

Norton Internet Security

36
New cards

Which of the following refers to the right to determine when, and to what extent, information about oneself can be communicated to others?

  1. Ethical implication

  2. Empowerment

  3. Privacy

  4. Information privacy

Information privacy

37
New cards

A small computer program gets stored on a user's hard drive. The program then collects the user's habits and transmits that information to a third party, all without the user's consent. From this description, the small program is _____.

  1. a webcam

  2. a system utility

  3. spyware

  4. employee Internet management (EIM) software

spyware

38
New cards

Which of the following BEST describes the monitoring of people with technology, often without their knowledge?

  1. Eavesdropping

  2. Electronic surveillance

  3. Monitoring

  4. Web search

Electronic surveillance

39
New cards

_____ is a small data file stored on a computer hard drive by a website when the user visits the site.

  1. A cookie

  2. Spyware

  3. JavaScript

  4. A startup file

A cookie

40
New cards

Electronic commerce (e-commerce)

the buying and selling of products over the Internet

41
New cards

Mobile commerce (m-Commerce)

e-commerce conducted in a wireless environment over the Internet

42
New cards

Privacy

the right to be left alone and free from surveillance and unreasonable personal intrusions

43
New cards

Information privacy

the right to determine when and to what extent information about oneself can be communicated to others

44
New cards

Database

an organized collection of information that can be accessed, managed, and updated

45
New cards

Privacy policy

statement detailing the ways in which a party collects, uses, and maintains consumer data

46
New cards

Cookies

small data files that are written and stored on the user’s hard drive by a website when that user visits the site with a browser

47
New cards

Third-party cookies

are placed across a network of related websites so that a user’s movements can be tracked at any site within the network

48
New cards

Spyware

a small computer program, stored on the user’s hard drive, that collects users’ habits and transmits that information to a third party, all without the user’s consent

49
New cards

Fraud

deliberate misrepresentation that causes others to suffer loss or damages

50
New cards

Hacker

a term used to describe someone who intentionally breaches security to break into someone else’s computer or network for a malicious purpose

51
New cards

Identify theft

the stealing of another person’s social security number, credit card number, or other personal information for the purpose of borrowing money, making purchases, and running up debts

52
New cards

If you are a victim of identity theft, which of the following is not an action you should take?

  1. Alert the major credit reporting agencies.

  2. Track down the criminal and confront him or her.

  3. Keep records of all transactions.

  4. Hire a lawyer.

  5. File a police report.

Track down the criminal and confront him or her.

53
New cards

When an online retailer collects and stores personal data on customers in exchange for giving the customers discounts through a loyalty program, the customers are surrendering their _____.

  1. legal protections

  2. awareness

  3. privacy

  4. right to shop in physical stores

  5. right to choose online stores

privacy

54
New cards

The best way a business can protect its customers from fraud is to _____.

have a secure checkout process

55
New cards

Which of the following is not considered a form of fraud?

  1. Stealing credit card numbers.

  2. Tricking someone into providing their social security number.

  3. Running up debt in someone else's name.

  4. Merchants collecting private data on customers for marketing use.

  5. Making purchases charged to someone else without their knowledge or approval.

Merchants collecting private data on customers for marketing use.

56
New cards

Jonas spends his time intentionally breaching security to break into personal or e-commerce retailers computers for malicious purposes. Jonas is _____.

  1. not a criminal

  2. a slacker

  3. a hacker

  4. violating privacy

a hacker