• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/117

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

117 Cards in this Set

  • Front
  • Back
VALUE CHAIN
series of activities, each of which adds values/supports the addition of value to firms G+S
each action an org. takes, from securing the necessary raw mat. (input)-> making goods or serv. (process) -> completing transact. w/ customer (output) is either a ___ or ____ activity.
1. primary
2. support
Activities directly related to prod. +dist. of org. prod +serv. that create bus. value for the org. and customers.
primary act.
Obtaining raw mat, creating prod, shipping it , selling are examples of what type of act.
primary act.
5 components of value chain
1. inbound logistics
2. operations
3. outbound logistics
4. mark.&sales
5. service
Receiving, warehousing, inventory control of raw mat are part of which component in value chain
inbound logistics
value- creating/proprietary activ. that transform raw inputs into to final prod. are part of which component of value chain?
operations
activities that require to get te finished prod to customer(packaging, warehousing, order fulfillment) are part of which component of value chain?
outbound logistics
activities to get buyers to purchase prod & working w/ distributors, retailers, online channels...are part of which component of value chain?
Marketing &sales
Activities that maintain and enhance prod.'s value, (customer support, repair service, warranty, recall) are part of which component of value chain?
Service
Value chain act. that an org. conducts to support creation of bus. value including
1. firm infrastructure
2. tech. devel.
3. HR manag
4. procurement
Support activities
8 types of IS (MOST common)
1. functional (FIS)
2 workflow manag. sys (WMS)
3. TPS
4. manag. info and document man.syst
5. knowledge manag sys
6. DSS
7. Supply chain man.
8. ERP (enterprise resource planning)
type of IS divided along lines that corresponds to functional dep't.
Functional IS. (FIS)
acco IS, mark. IS, HR IS, Financial IS are examples of what type of IS
FIS
Type of IS that supports activities that several dep'ts of org may carry out and focuses on bus. process from beginning to end.
WMS (workflow man. syst)
Represents steps, resources, input and output data and tools needed to complete bus. process
Workflow
statement that defines/constrains some aspect of business
Business rule
Type of IS that controls flow of both activ. and data involved in transaction.
TPS
This IS must incorporate
- logic of controlling and enabling transactions
- bus. rules of org.
-necessary error- handling logic
TPS
A transactions has the following 4 characteristics:
(ACID)
Atomicity (completed)
Consistency (preserved)
Isolation (independent)
Durability (permanent)
Type of IS that uses captured +stored data to create info for decision making.
MIS
3 types of reports generated by MIS
1. periodic
2. exception
3. demand
Report updated/generated after specific time period has passed
periodic
report to monitor when/why exceptions occur of key values, critical to operation
exception
report generated based on user request (ex. based on querying)
demand
IS to provide summary info about bus. performance to those making higher- level strat. decisions
Executive info. syst (EIS)
IS that enters, tracks, routes, processes many documents used in org.( including all 3 reports as well)
Document man. syst. (DMS)
DMS can create doc. electronically and convert them to elect. form using ____ technology
imaging
Type of IS that involves, recognizes, manages, generates, shares knowledge
Knowledge man. syst (KMS)
form of knowledge manag. that tries to capture and store knowledge of human expert
expert syst. (tacit knowledge)
Knowledge man. syst are a form of ______that tries to provide computer applications that mimic human intelligence.
Artifcial intellignece
To support tacit knowledge manag, this software is used fir comm. tools, to form shared workspaces to store common files, conferencing tools..:
collaborative software (groupware)
Type of IS that help businesses use comm. techno., knowledge, models to orrganize/access date to perform decision-making act.
DSS
5 types of DSS
1. comm. driven
2. data-driven
3. document driven
4. knowledge driven
5. model driven
conferencing tools, email chat are ex. of this type of DSS
comm. driven
Exec. IS, geog. IS, OLAP-enabled data warehouses are ex. of this type of DSS
Data driven
DMS, search services are ex. of this type of DSS
document- driven
expert syst., data mining are ex. of this type of DSS
knowledge-driven
financial, statistics, optimization and stimulation models are ex. of this type of DSS
model-driven
true/false
more value is created by keeping each component of value chain separate, focusing only on its contribution to bus. value
false
a ____ allows the data from transact. to be processed and passed on immediately to org. data storage
a. DSS
b. FIS
c. WMS
d. TPS
d. TPS
___ are computer syst. that support teamwork, comm, and collaboration.
a. DSS
b. groupware
c. TPS
d. WMS
b.
this type of IS is manages materials, info and finances as they move from supplier to manuf. to wholesaler, to retailer to consumer.
Supply chain manag. (SCM)
a system involved in moving prod or serv. from supplier to customer
Supply chain
typical modules in any supply chain manag. include (4)
-material man.
- inventory man.
- order man.
- logistics man.
This IS is the cornerstone and starting pt. of ERP syst. implementations
SCM
Software that integrates the dep'ts and functions across an org. , streamlines bus. processes and can support all areas of supply chain
ERP
Disadvantage of ERP
- can become highly complex and difficult to manage when it grows (requires customization)
large scale applications that support bus. units or functions (+another way that an org. might apply IT to its value chain)
Enterprise syst.
Enterprise syst that provides tools to service customers
CRM
enterprise syst that aims at automating and optimizing admin. processes to reduce costs and ensure efficiency
Admin. + finan. syst
enterprise syst that support recruiting, hiring, training and compensation
HR
enterprise syst that supports value-creating act. of the org. (Intranet for eg)
techno. develop.
raw materials necessary for prod/serv are acquired thru ____syst
procurement
Ways for IT to create bus. value
1. integrating techno (reduce costs)
2. develop specific IT strat. to eneable bus to implement strat.
enterprise software that is essentially done by renting
Software as a Service (SaaS)
services that provide on-demand software, hosted on servers, which can be accessed from anywhere
utility computing serv.
software can be provided to organ. thru a ____
Application service provider (ASP)
An online techno company that develops and delivers software tools on Internet
ASP
true/false
metrics are not necessary when implementing an enterprise syst. because enterprise syst. always improve efficiency of value chain
false
which of the following is not a source of enterprise syst
a. asp
b. ide
c. custom develop.
d. saas
b
operations and the IT syst. that support it tend to be ___as it is here that proprietary practives are used to gain comp. adv.
unique
4 views of how bus. can derive benefits by applying IT(strategically fitting IT to org.)
(SAInT)
Support of value chain
Automating
Informating
Transforming
process
-effected by an entity's stakeholders
-applied strat. across enterprise
- designed to identify potential events that may affect entity +manage risk to be within risk appetite
ERM (enterprise risk management)
Adhering to the laws is refered to
Compliance
___reduces risk thru policies and processes that ensure proper financ. and acco procedures
compliance
5 risk reduction methods
1- risk transfer
2- risk deferral
3- risk reduction
4- risk acceptance
5- risk avoidance
risk-reduction method that moves the risk to someonw who's more able to deal w/ it
risk transfer
risk reduction method that postpones exposure risk until it can be dealt w/ effectively
risk deferral
risk reduct. method that either reduces probab. of risk or lessen impact
risk reduction
risk -reduct. method that realize that some risks are unavoidable
risk acceptance
risk reduct. method that eliminate the possibility of risk occurring
risk avoidance
3 steps to applying risk framework
1. identify and categorize potential risks
2. assess risks and threats (impact and likelihood)
3. determine likelihood of doS attack using data from surveys for eg.
the strengthening of internal controls and compliance thru application of IT based controls to bus processes, policies, and procedures
control advantage
process that runs throughout the org. influencing how people behave at work
control
specific actions, (policies+procedures) designed to ensure achievement of bus objectives
controls
preocess designed to provide reasonable assurance regarding:
- effectiveness and efficiency of operations
- reliability of financ. reporting
- compliance w/ applicable laws and regulations
- could be preventive, detective, corrective
internal control
7 internal control processes
1. segregation of duties
2. authorization
3. security
4. ID codes
5. verification
6. control totals
7. supervisory review
internal control process that ensures that there are no conflicts of interest
segreg. of duties
internal control process defining scope of work
authorization
internal control process definining access rights
security
internal control process that create an audit trail that org. can follow to ensure proper controls
id codes
internal control process that can confirm that application is being accomplished
verification
internal control process that can help detect fraudulent actions
control totals
internal control process that allows for supervisors to periodically audit and review processes and transactions
supervisory review
which one of the following is not an organiz. response to risk
a. risk avoidance
b. risk acceptance
c. risk behaviour
d. risk reduction
c
true / false
corrective controls reduce risk by discovering when preventive controls have failed and providing notification that action must be taken
false
1. A supply chain is a system of organizations, people, technology, activities, information, and resources involved in moving a product or service from supplier to customer.
A. True
B. False
a
The type of decision support system that focuses on retrieval and management of unstructured documents is:
A. communications-driven DSS
B. data-driven DSS
C. knowledge-driven DSS
D. none of the above
d
In order to streamline a business, software that works across the functions in an organization, using a single database, is called a:
A. supply chain management system
B. enterprise resource planning system
C. decision support system
D. inventory management system
b
Buying insurance is an example of:
A. risk deferral
B. risk reduction
C. risk acceptance
D. risk transfer
d
The strengthening of internal controls and compliance through the application of IT-based controls to business processes, policies and procedures is called:
A. control advantage
B. control implementation
C. business continuity plan
D. strategy
a
1. In the early days, management information systems (MIS) were used specifically to meet the need of storing processed transaction data as reports for managers.
A. True
B. False
a
Risk is an essential element of business.
A. True
B. False
b
The core components of a typical value chain include:
A. inbound and outbound logistics
B. marketing and sales
C. operations and service
D. all of the above
d
_______________ IS includes internal input items such as financial objectives and project needs, and external input items such as competitor and environmental data.
A. Marketing
B. Human resources
C. Financial
D. Manufacturing
c
A transaction is a unit of work that has the following characteristics:
A. isolation, durability
B. processes, atomicity
C. repeated, simplicity
D. replicable, scheduled
a
6. A characteristic of a periodic report is:
A. that it is created on demand
B. that it monitors when exceptions occur
C. it is created on a schedule (e.g., monthly)
D. that it incorporates data into a mathematical model of a situation
c
Which of the following is NOT a disadvantage of ERP systems?
A. They are incredibly complex.
B. They force streamlining of business processes.
C. They can be difficult to manage as they grow.
D. They must be customized for the business processes they support.

b
Which of the following activities are NOT considered part of “operations”?
A. Administrative processes
B. Creation of product or service
C. Manufacturing
D. Design of new products
a
Realizing that some risks are unavoidable and making sure that contingency plans are in place is an action associated with which risk response?
A. risk transfer
B. risk acceptance
C. risk reduction
D. risk avoidance
b
When compared to application service providers (ASP) , software as a service (SaaS) has the following characteristic:
A. client has some control over the system
B. pricing model is either monthly, flat fee, or subscription
C. for a price, can implement major deviations from the core product.
D. none of the above
d
________ are the value-creating and often proprietary activities that transform the raw inputs into the final product.
A. Inbound logistics
B. Operations
C. Outbound logistics
D. Service activities
b
__________ are those activities that maintain and enhance a product's value.
A. Inbound logistics
B. Operations
C. Outbound logistics
D. Service activities
d
An example of a functional information system (FIS) is:
A. accounting IS
B. ERP
C. TPS
D. MIS
a
Executive information systems are designed to:
A. store processed transaction data as reports
B. provide summary information about business performance to those making higher level strategic decisions
C. enter, track, route, and processes the many documents used in an organization
D. generate reports such as periodic and exception reports
b
Communications-driven decision support systems (DSS):
A. emphasize access to and manipulation of internal company data
B. focus on retrieval and management of unstructured documents
C. provide special problem-solving tools that help decision making by recommending actions to users
D. focus on collaboration and shared decision making
d
An example of knowledge-driven DSS is:
A. expert systems (es)
B. financial and statistical models
C. optimization and simulation models
D. conferencing tools
a
Supply chain management does the following:
A. manages materials, information, and finances as they move from supplier to manufacturer
B. manages materials, information, and finances as they move from manufacturer to wholesaler
C. manages materials, information, and finances as they move from wholesaler to retailer or customer
D. all of the above
d
Customer relationship management (CRM) systems support:
A. outbound logistics
B. marketing and sales
C. service
D. operations
c
Point of sale (POS) systems support which value chain component?
A. inbound logistics
B. operations
C. outbound logistics
D. marketing and sales
c
Software as a service (SaaS) has which of the following characteristics?
A. some ability to customize at a price but major deviations from the core product are discouraged
B. provides clients with some control over the system in the form of administrator tools
C. operates on a flat fee or subscription pricing model
D. offers the option to connect to the system over a dedicated connection
a
High-level goals, aligned with and supporting its mission, is what type of business objective?
A. reporting
B. strategic
C. operations
D. compliance
b
In response to risk, organizations may decide to use a strategy of “risk deferral” to:
A. move the risk to someone who is more able to deal with it
B. postpone exposure to the risk until circumstances are more favourable
C. reduce the probability of the risk
D. lessen the impact of the risk
b
Controls are specific actions, including policies and procedures, designed to ensure the achievement of business objectives. Corrective controls:
A. reduce risk by discovering when preventive controls have failed
B. aim to remedy the situation and try to keep it from recurring
C. are designed to prevent increased exposure to risk by stopping an action or process before it occurs
D. provide notification when action must be taken
b
An example of a preventative control is:
A. creating a corporate network rule requiring employees to change their passwords every 25 days.
B. notifying an employee that their password has not been changed in 25 days
C. sending an email to an employee asking them to change their password
D. locking an employee out of the system if the password is not changed
a
A business continuity plan does which of the following?
A. allows an organization to resume operations after a major disruptive event
B. allows an organization to reverse every action that took place to return to its original state
C. addresses problem prevention, response to crises, resumption of business
D. strengthens internal controls and compliance through the application of IT based controls
c