1/149
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No study sessions yet.
_____ is the raw material in the production of information.
Data
A large collection of electronic records is called a(n) _____.
database
The term _____ refers to the sequence of activities involved in producing a product or service.
supply chain
The main goals of _____ systems are to increase the quality of customer service, reduce the amount of labor involved in serving customers, and learn as much as possible about the service preferences of individual customers.
customer relationship management
______ refers to the buying and selling goods and services via a telecommunications network.
E-commerce
_____ are normally responsible for developing cost analyses, design considerations, implementation timelines, and feasibility studies of a computer system before making recommendations to senior management.
The _____ is responsible for all aspects of an organization's ISs and is often a corporate vice president.
chief information officer
_____ provide customers with cheaper combined service and the convenience of one-stop shopping.
alliances
_____ use physical characteristics of people, such as fingerprints and retina scans, for authentication and access to physical places and online information systems.
Biometrics
_____ includes cookies and other, more sophisticated applications that are installed on your computer unbeknownst to you and transmit information about you while you are online.
Spyware
In the context of B2B trading, online advertising is done mainly in two ways: through _____ and through banners.
search engines
_____, which is any form of advertising through an online search site, is regarded by businesses as highly effective.
Search advertising
Businesses such as Amazon.com and Buy.com that transact business only through an online environment are called _____ retailers.
pure play
On the Web, _____ includes identifying the sites your audience frequently visits.
targeting
_____ has fewer restrictions on storage space and transactions, and since only one site resides on the disks, no other site can affect its functionality.
Dedicated hosting
_____ is determined by the relationship between resources expended and the benefits gained in achieving a goal.
The combination of customer relationship management (CRM) and supply chain management (SCM) systems is referred to as _____.
enterprise resource planning (ERP) systems
When a radio frequency identification tag is attached to a product, it contains a(n) _____.
A ____ is the general logical structure in which records are stored within a database and the method used to establish relationships among the records.
A(n) _____ is the field by which records in a table are uniquely identified.
primary key
Many organizations have found that if they accumulate _____, they can use it for important management decisions, such as researching market trends or tracking down fraud.
transaction data
_____ involves high volumes of data compiled from traditional, ordinary business activities, as well as newer, nontraditional sources.
Big Data
In the _____ phase of transferring data from a transactional database to a data warehouse, specialists "cleanse" the data and modify it into a form that allows insertion into the data warehouse.
The process of _____ enables organizations to plan and carefully design their global sites to cater to local needs and preferences.
glocalization
As computers convert to operating systems that support _____, displaying different character sets should be less of a problem.
Unicode
_____ are the main reasons behind the slow adoption of new forms of electronic payments.
Security concerns
According to the _____ , all legal matters are confined to the country from which a site operates.
country-of-origin principle
The _____ enforces a privacy law called the Directive on Data Privacy.
European Union (EU)
The country-of-origin and country-of-destination principles deal with the issue of _____
e-commerce jurisdiction
Businesses use _____ to analyze data.
models
Determining which stock will yield the highest return by the end of the year is an example of a(n) _____ problem.
A(n) _____ is a computer-based information system designed to help knowledge workers select one of many alternative solutions to a problem.
decision support system (DSS)
A _____ model is one that is automatically adjusted based on changing relationships among variables.
dynamically modified
Among the general statistical models, a(n) _____ model is the best-fit straight-line relationship between two variables, such as sales and the money spent on marketing.
linear regression
_____ are excellent tools for building both the data and the models that decision support systems need.
Spreadsheets
_____ is a methodology of solving a new problem established on the solutions of similar problems.
Case-based reasoning
Some companies offer _____ specifically designed to analyze shoppers' behavior at their sites based on captured data such as pages viewed, options clicked, and the sequence of pages shoppers viewed.
decision support systems (DSSs)
In banking, _____ is employed to find profitable customers and patterns of fraud.
data mining
The meaningful information gleaned from data warehouses using software tools is referred to as _____.
business intelligence
Since OLAP applications are designed to process large amounts of records and produce summaries, they are usually significantly faster than relational applications such as those using _____.
SQL queries
Large ISs that address structured problems are usually conceived, planned, developed, and maintained within a framework called the _____.
systems development life cycle (SDLC)
To find the _____, the net present value of the system is calculated by combining the net present value of the costs of the system with the net present value of the benefits of the system.
return on investment (ROI)
Several diagramming sets were developed by the 1970s, but in the late-1990s, a de facto standard emerged: _____.
unified modeling language
_____ make extensive use of iterative programming, involving users often, and keeping programmers open to modifications while the development is still under way.
Agile methods
_____ is meant to guarantee that the experts have passed tests that ensure their skills.
Certification
A con artist telephones an employee, pretends to be from his own organization's IT unit, and says he must have the employee's password to fix a problem. This is an example of _____.
social engineering
Sometimes a(n) _____ is automatically created using data, such as the date and time of a transaction or the name or password of the user updating the file.
audit trail
Coding a message into a form unreadable to an interceptor is called _____.
encryption
_____ records sums owed to the organization and by whom.
Accounts receivable
A _____ is an array of components that work together to achieve a common goal, or multiple goals, by accepting input, processing it, and producing output in an organized manner.
system
A(n) _____ is a business event such as a sale, a purchase, the hiring of a new employee, and the like.
transaction
Business intelligence applications access large pools of data, usually transactional records stored in large databases called _____.
data warehouses
_____ have been used to provide service via the Web, such as helping residents find locations of different services on a city map or plan travel routes.
Geographic information systems
A _____ is responsible for the databases and data warehouses of an organization—a very sensitive and powerful position.
database administrator
One way to increase market share is to lower prices, and the best way to lower prices is to _____.
reduce costs
Which of the following patents does Priceline.com hold that prevents competitors from entering its business space?
Online reverse auctioning
_____ are expenses incurred when a customer stops buying a product or service from one business and starts buying it from another.
Switching costs
_____ refers to the competitive advantage that a company can achieve by persuading customers that its product or service is better than its competitors'.
Product differentiation
_____ provide customers with cheaper combined service and the convenience of one-stop shopping.
Alliances
On the web, an example of alliances is a(n) _____.
affiliate program
Which of the following is a result of forming strategic alliances?
The same technology is used.
_____ involves adoption of new machinery and elimination of management layers.
Reengineering
_____ use physical characteristics of people, such as fingerprints and retina scans, for authentication and access to physical places and online information systems.
Biometrics
JetBlue obtained the strategic advantage of the _____ by implementing the latest available technologies of fast databases, VoIP, and a slick website.
While blogging is publishing text and other visual material, _____ is publishing sound and video.
podcasting
_____ might be thought of as "real-time e-mail," because, unlike e-mail, it is synchronous in exchanging information.
Instant messaging
A(n) _____ is a network used only by the employees of an organization.
intranet
_____ is the term for any unsolicited commercial email.
Spam
Some hosting companies charge extra fees for shared hosting if the site experiences activity above a predetermined amount of data that is transferred, or number of visits from Web surfers, known as _____.
hits
_____ defines the degree to which a goal is achieved.
Effectiveness
The first phase in the supply chain is _____.
procuring raw materials
When a pattern of defects is discovered in a product, _____ helps pinpoint the plant at which it was produced and the particular lot from which it came.
radio frequency identification (RFID)
The smallest piece of data is called a _____
character
Online databases that are used with web browsers _____.
The emergence of the web as a global medium for information exchange has made it an important vehicle for both business-to-business (B2B) and _____.
business-to-consumer (B2C) commerce
_____ is a tool used to translate MS-Word documents to multiple languages.
Wordfast
The recent trend in less rich countries is to adopt _____ to avoid high costs.
free open source software
Differences in _____ must be considered when integrating information systems internationally, even within the same company.
standards
The three major components of a DSS are a data management module, a model management module, and a(n) _____ module.
Rather than containing a set of IF-THEN rules, more sophisticated ESs use _____, which are designed to mimic the way a human brain learns.
neural networks
The American Stock Exchange (AMEX) has a special department to prevent _____ of the securities under its supervision.
insider trading
_____ are applications that combine features of two or more online applications.
Mashups
One objective of data mining is _____, the discovering of patterns in data that can lead to reasonable predictions.
forecasting
The data-mining application that identifies which prospective clients should be included in a mailing or email list to obtain the highest response rate is known as _____.
The part of the BI software application that parses the questions entered by employees is known as the _____.
semantic layer
BI software has become so popular in large companies that Microsoft decided to integrate such software into its popular database management system, _____.
To make the use of BI tools convenient for executives, companies that develop BI tools create _____ that help the executives to quickly grasp business situations.
interfaces
The popular name of an interface for business intelligence tools is _____.
dashboard
Information that can be gleaned from stored data is _____.
A _____ is a paragraph that communicates the most important overarching goal of the organization for the next few years.
mission statement
After the planning phase, the SDLC includes four major phases: analysis, design, implementation, and _____.
support
A carefully drawn _____ can provide a useful representation of a system, whether existing or planned.
data flow diagram
The implementation of a new IS, also called _____, consists of two steps: conversion and training.
Although _____, part of the support phase of a system's lifecycle, is viewed by IS professionals as lacking in glamour, it should not be taken lightly or left to less-experienced professionals.
maintenance
The concept of extracting business intelligence from large data warehouses often involves _____ of several information systems.
_____ is a set of processes and methods used by project managers to determine which projects will meet the organization's operational and financial goals in relation to its strategic objectives as well as the needs of its customers.
Project portfolio management
In _____, the voltage of the power decreases, or there are very short interruptions in the flow of power.
brownouts
In _____, criminals use personal information to attack organizational systems.
spear phishing
A _____ is a type of malware that spreads in a network without human intervention.
worm
_____ occurs when a website receives an overwhelming number of information requests, such as merely logging on to a site.
Denial of service (DoS)