Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
112 Cards in this Set
- Front
- Back
Networked enterprises view cross-functional enterprise systems as a strategic way to use IT to decentralize information resources and improve the efficiency and effectiveness of business processes, and develop strategic relationships with customers, suppliers, and business partners. T/F?
|
True
|
|
_______ is defined as the use of the internet and other networks and information technologies to support electric commerce, enterprise communication and collaboration, and web-enabled business processes both within a networked enterprise and with its customers and business partners.
|
Electronic business
|
|
What is defined as the buying and selling, and marketing and servicing of products, services, and information over the internet and other networks?
|
e-commerce
|
|
Your text describes several electronic business system applications. Which of the following applications focuses on acquiring and retaining profitable customers via marketing, sales, and service processes?
|
Customer relationship management
|
|
________ serves as a cross-functional enterprise backbone that integrates and automates many internal business processes and information systems within the manufacturing, logistics, distribution, accounting, finance, and human resource functions of a company.
|
Enterprise resource planning
|
|
When ERP systems can help break down departmental and functional walls of business processes, this results in a more flexible organizational structure, managerial responsibilities, and work roles. This describes which key business benefit of ERP?
|
Enterprise agility
|
|
Though the benefits of ERP are many, the costs and risks are also considerable. Which of the following make up the bulk of implementing a new ERP system?
|
Reengineering processes and training.
|
|
Fundamentally, ______ helps a company get the right products to the right place at the right time, in the proper quantity and at an acceptable cost.
|
Supply chain management
|
|
____________ involves the electronic exchange of business transaction documents over the internet and other networks between supply chain trading partners (organizations and their customers and suppliers).
|
Electronic data interchange
|
|
Which of the systems listed below are the oldest and most widely used information systems in business?
|
Accounting information systems
|
|
Electronic commerce is changing the shape of competition, the speed of action, and the streamlining of interactions, products, and payments from customers to companies and from companies to suppliers. T/F?
|
True
|
|
Your text outlines nine key components of the e-commerce process architecture. One of these components is access control and security, which deals with establishing mutual trust and secure access between the parties in the e-commerce transaction. T/F?
|
True
|
|
What is the entire online process of developing, marketing, selling, delivering, servicing, and paying for products and services called?
|
e-commerce
|
|
Your text outlines three basic categories of electronic commerce applications. Which of the following characteristics best describes business-to-consumer (B2C) applications?
|
Involve businesses developing attractive electronic marketplaces to entice customers and sell products and services to consumers.
|
|
Your text outlines three basic categories of electronic commerce applications. Which of the following characteristics bests describes business-to-business (B2B) applications?
|
Involve both electronic business marketplaces and direct market links between businesses.
|
|
Which describes consumer-to-consumer (C2C) applications?
|
Involve consumers buying and selling whith each other in an auction process at an auction website, as well as personal advertising of products or services to buy or sell at electronic newspaper sites, or personal websites.
|
|
____________ helps employees electronically collaborate to accomplish structured work tasks within knowledge-based business processes using predefined sets of business rules, roles of stakeholders, authorization requirements, routing alternatives, databases used, and sequence of tasks required for each e-commerce process.
|
Workflow management software
|
|
Apply one of the key e-commerce success factors of retailing on the web to the following statement: "People want to feel that they are dealing with a trustworthy business, whose products and other website information can be trusted to be as advertised."
|
Security and reliability
|
|
Your text describes current e-commerce trends in applications and associated strategies taking place in the business-to-consumer market and the business-to-business market. Using figure 1, a long term strategy for the business-to-consumer market would be:
|
Business-to-consumer portals
|
|
a long-term strategy for the business-to-business market would be:
|
Procurement automation
|
|
A __________ strategy is the strategy business enterprises employ when integrating virtual business operations with traditional business operations
|
Click and Bricks
|
|
Information systems and technologies have become so integrated into business and organizations that it is necessary to study information systems and information technology like the other major business functions.
|
True
|
|
All computers are systems of input, processing, output, storage, and control components. However, as technology changes, the need for input and processing become less important
|
False
|
|
Microsoft is expanding beyond software such as operating systems and general application productivity suites. Microsoft is assessing business processes of specific industries and writing software products to support them.
|
True
|
|
Your text gives a conceptual overview of computer software and illustrates it as either application or system software. System software are programs that manage and support operations of computer systems and networks.
|
True
|
|
Experts predict the merging or disappearance of several computer categories. For example, many midrange and mainframe systems have been made obsolete by the power and versatility of client/server networks composed of microcomputers and servers.
|
True
|
|
In any information system, data resources must be organized and structured in some logical manner so that they can be managed effectively, retrieved quickly, and processed effectively.
|
True
|
|
Through the process of database planning and development, end users must identify the key data elements that are needed to perform their specific business activities. this frequently involves developing entity relationship diagrams that model the relationships among the many entities involved in business processes.
|
True
|
|
Telecommunications is rapidly moving from analog network technologies to digital transmission systems that are designed to transmit information in the form of discrete pulses as computers do, which will enable movement of larger amounts of information at higher transmission speeds.
|
True
|
|
A major trend in telecommunications technology is the change from reliance on copper wire-based media and land-based microwave relay systems to fiber-optic lines and other wireless technologies.
|
True
|
|
When employees in a project team use email to send and receive messages and use videoconferences to hold electronic meetings and coordinate their activities, they are using which of the following?
|
Enterprise collaboration systems
|
|
E-business uses internet technologies to work and empower:
|
All of the above
|
|
Business process reengineering is best defined as:
|
A radical redesign of business processes to achieve improvements in cost, quality, speed, or service.
|
|
Which of the following statements is false?
|
Virtual companies typically form virtual workgroups and alliances with customers, organized into clusters of process and cross-functional teams linked by intranets
|
|
A bit, the smallest element of data, can have value(s) of:
|
0 or 1
|
|
Success in today's dynamic business environment depends heavily on maximizing the use of internet-based technologies and web-enabled information systems to meet the competitive requirements of :
|
all of the above
|
|
a network that covers a large geographic distance, such as a state or country, is a
|
wide area network
|
|
a virtual private network
|
all of the above
|
|
The internet's protocol suite is known as:
|
transmission control protocol/internet protocol (TCP/IP)
|
|
As competitive strategy, when a company develops a corporate intranet or an extranet, it is often able to do which of the following as it uses its existing internet browsers, pcs, servers, and client/server networks?
|
leverage its investment in IT
|
|
How do information systems and information technologies differ?
|
Information technology can contain simple hardware components such as pencil-and-paper while information systems rely on computer-based technologies
|
|
A ______ strategy is a competitive strategy by which a firm seeks to establish new business linkages with customers, suppliers, competitors, and other companies
|
alliance
|
|
a ________ strategy is a competitive strategy by which a firm seeks to become a low-cost producer of products and services in the industry
|
cost leadership
|
|
a firm and survive and succeed in the long run if it successfully develops strategies to confront the five ________ forces that shape the structure of competition in its industry
|
competitive
|
|
A ________ strategy is a competitive strategy by which a firm seeks to significantly expand its capacity in order to produce goods and services, expand into global markets, and diversify into new products and services
|
growth
|
|
a computer is a system of hardware devices organized according to the functions of input, processing, output, storage, and control. the function of an output device is to:
|
convert electronic information produced by the computer system into human-intelligible form for presentation to end-users
|
|
Which one of the following would NOT fit the typical classification of a computer peripheral?
|
Central processing unit
|
|
radio frequency identification:
|
all of the above
|
|
which of the following is true about commercial off the shelf software?
|
all of the above
|
|
the function of an input device
|
convert data into electronic machine-readable form for direct entry or though telecommuications links into a computer system
|
|
an operating system includes which one of the following characteristics/
|
it is utilized by computer users and operators to communicate with the computer
|
|
which of the following is a type of application specific program?
|
science and engineering program
|
|
system software:
|
manages and supports the resources and operations of a computer as it performs various information processing tasks
|
|
a disadvantage of software suites is that:
|
all of the above
|
|
according moore's law:
|
computing power doubles every 18 to 24 months
|
|
which of the following is correct concerning the replication process and the duplication process for updating distributed databases?
|
replication is more complicated, because it involves using specialized software that finds changes in each distributed database and makes appropriate changes to each to make all look the same
|
|
a central source of data that have been cleaned, transformed, and cataloged so they can be used by managers and other business professionals for business analysis, market research, and decision support is called a:
|
data warehouse
|
|
which of the following is an example of a use of data mining
|
data in data warehouse are analyzed to reveal hidden patterns and trends
|
|
a DBMS is a set of computer programs that control the creation, maintenance, and use of the databases of an organization and its end users. as such, dbms stands for:
|
database management system
|
|
Which of the following statements best defines a network?
|
an interrelated or interconnected chain, group, or system
|
|
based on the conceptual frame work of levels of data, the most basic and smallest lobical unit of information is a:
|
character
|
|
metcalfe's law states that
|
the usefulness, or utility, of a network equals the square of the number of users
|
|
which of the following is correct concerning internet services providers?
|
they provide access to the internet to individuals and organizations for a fee
|
|
which off the following best fits the definition of a local area network?
|
network that serves a company that is located on one floor or in one building
|
|
a nuclear power plant uses electronic sensors linked to computer to continually monitor processes and make instant adjustments that control the power generation process. this is an example of
|
a process control system
|
|
a database of customer purchases that provides end-user managers interactive and ad hoc support for decision making is referred to as a
|
decision support system
|
|
the major thrust of knowledge management systems is to:
|
develop computer systems in order to help knowledge workers creat, organize, and share important business knowledge wherever and whenever needed
|
|
linux is a low cost, powerful UNIX-like operating system that was developed as ______, thus allowing programmers the freedom to modify its source code
|
open source software
|
|
which one of the following places the common data elements in order from largest to smallest?
|
database, file, record, field, character
|
|
what three components make up a basic information system?
|
input, processing, output
|
|
which one of the following statements would most accurately describe the level of operational management?
|
typically composed of self directed teams or supervisory managers that develop short range plans such as weekly production schedules and direct the use of resources and the performance of tasks according to procedures and within budgets and schedules they establish for the teams and other workgroups of the organization
|
|
which one of the following statements would most accurately describe the tactical level of management?
|
typically composed of self directed teams as well as middle managers that develop short and medium range plans, schedules, and budgets and specifies the policies, procedures, and business objectives for their subunits of the organization
|
|
decisions made at the tactical management level tend to be more
|
semistructured
|
|
decisions made at the strategic management level tend to be more
|
unstructured
|
|
decisions support systems differ from management information systems in which of the following ways?
|
DSS provides interactive inquiries and responses; MIS relies on presenting info in a prespecified fixed format
|
|
which one of the following should be used to answer the question: "what if we cut advertising by 25 percent? what would happen to sales?"
|
what-if analysis
|
|
_______________ osftware analyzes vast stores of historical business data that have been prepared for analysis in corporate data warehouses and tries to discover patterns, trends, and correlations hidden in the data
|
data mining
|
|
an __________ is a web-based interface and integration of MIS, DSS, EIS, and other technologies that gives all intranet users and selected extranet users access to a variety of internal and external business applications and services
|
enterprise information portal
|
|
enterprise information portals are typically tailored or personalized to the needs of individual business users or groups of users, giving them a personalized __________ of information sources and applications
|
digital dashboard
|
|
systems that use massively parallel processor whose architecture is based on the human brain's mesh like neuron structure are called
|
neural networks
|
|
the overall process by which information systems are designed and implemented within organizations is referred to as
|
systems analysis and design
|
|
the stages of the system development life cycle include which of the following?
|
investigation, analysis, design, implementation, and maintenance
|
|
which one of the following is an example of an intangible cost?
|
loss of customer goodwill
|
|
why are business end users frequently added to systems development teams?
|
they know a lot about the company and the types of business activities that affect the company's business processes
|
|
prototyping involves:
|
an iterative and interactive development process with extensive end user involvement
|
|
according to your text, when managing a product, each project:
|
has a set of goals, objectives, and tasks, and must deal with a set of limitations or constraints
|
|
which choice most correctly identifies the order of the modern project management approach discussed in your text?
|
defining, planning, executing, controlling, and closing
|
|
when a company wants vendors to bid on hardware and/or software needed for a system, minimum acceptable physical and performance characteristics are typically listed in a document called a:
|
request for quotation
|
|
what system implementation activity may involve tasks such as correcting incorrect data, filtering out unwanted data, consolidating data from several databases, and organizing data into new data subsets
|
data conversion
|
|
the four major forms of system conversion include
|
parallel, phased, pilot, and direct
|
|
which one of the following is a major software evaluation factor?
|
flexibility
|
|
when managers apply the ________ theory of ethical decision making, they view their only ethical responsibility is to increase the profits of the business without violating the law or engaging in fraudulent practices
|
stockholder theory
|
|
the ________ theory of ethical decision making states that companies have ethical responsibilities to all members of society.
|
social contract theory
|
|
as a business professional, you have a responsibility to promote ethical uses of information technology in the workplace. This responsibility includes:
|
property performing your role as a vital human resources in the business systems you help develop and use in your organization
|
|
which of the following best describes business ethics?
|
it is concerned with the numerous ethical questions that managers must confront as part of their daily business decision making
|
|
many computer crimes involve the theft of money. in the majority of cases, they are:
|
"inside jobs" that involve unauthorized network entry and fraudulent alteration of computer databases to cover the tracts of the employees involved
|
|
faking an email address of web page to trick users into passing along critical information such as passwords or credit card numbers is a description of which of the following hacking tactics used to assault companies through the internet and other networks?
|
spoofing
|
|
one of the ethical issues of computers concerns the unauthorized use of computer systems at work. According to your text, what percentage of US workers admit to surfing recreational sites during office hours?
|
90%
|
|
software that employs users' internet connections in the background without their knowledge or explicit permission to collect specific information about you, ranging from general demographics such as name, address, credit card numbers, passwords, and other personal information is
|
spyware
|
|
indiscriminate sending of unsolicited email message to many internet users is which of the following?
|
spamming
|
|
people who sit at pc workstations or visual display terminals in fast paced, repetitive keystroke jobs can suffer a variety of health problems known collectively as
|
cumulative trauma disorders
|
|
the business/IT planning process has three major components. developing strategic plans for managing or outsourcing a company's IT resources, including IS personnel, hardware, software, data, and network resources best describes which of the components?
|
resource management
|
|
the IT architecture that is created by the business/ IT planning process is a conceptual design, or bluepring, that includes several components. Which component includes the internet, intranets, extranets, and other networks, computer systems, system software, and integrated enterprise application software that provide a computing and communications infrastructure, or platform, that supports the strategic use of information technology for ebusiness, ecommerce, and other business/IT applications
|
technology platform
|
|
according to your text, the business/IT planning process has three major components. Developing business strategies that support a company's business vision is the component known as :
|
strategy development
|
|
Many types of operational and specialized databases, including data warehouses and internet/intranet databases, store and provide data nad information for business processes and decision support. this best describes which component of the IT architecture that is created by the strategic business/IT planning process
|
data resources
|
|
Business applications of information technology are designed as an integrated architecture or portfolio of enterprise systems that support strategic business initiatives, as well as cross functional business processes. This statement describes which of the components of the IT architecture?
|
Application architecture
|
|
the decentralization of information services within an organization was prompted by which of the following?
|
The development of microcomputers and distributed processing networks of computers at the corporate, department and workgroup level
|
|
The development of minicomputers and microcomputers accelerated which of the following trends?
|
downsizing
|
|
According to your text, how do outsourcing and offshoring differ?
|
Offshoring relocates an organization's actual business processes to a lower cost location, usually overseas; outsourcing does not always relocate overseas or to a lower cost location
|
|
The trend in global business and IT strategies is towards a:
|
Transnational strategy
|
|
Internet access is an important availability in managing global IT. According to the paris-based organization reporters without borders, there are 45 countries that restrict their citizens' access to the internet. What are they?
|
North Korea, Libya, Cuba, Burma, and Vietnam
|
|
The form of the IT organization structure within a company depends on which of the following?
|
The managerial philosophy and business/IT strategies formulated during the strategic planning process
|