• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/70

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

70 Cards in this Set

  • Front
  • Back
1. To achieve competitive advantage, a company might use IT to ________ .
create product differentiation and secure a premium price
2. The four dimensions of competitive scope listed by Porter and Millar are ________ .
segment, vertical, geographic, and industry
3. Broad scope competitors are not well equipped to serve a target segment that ________ .
has unusual needs
4. For most of industrial history, ________ affected the physical component of what businesses did.
technological progress
5. What is an industry that has high information content in their product and high information intensity in their value chain?
insurance
6. When companies in an industry have invested heavily in IT in order to remain competitive, ________ .
barriers to entry are strengthened
7. An increasingly powerful way to distinguish physical goods from ones competition is to ________ .
embed information technology in the product itself
8. Which of the following is NOT a step that senior executives can take to capitalize on IT-based opportunities?
Demand that IT executives implement all the same technology that competitors implement
9. In order to create competitive advantage by managing linkages, which of the following may be required?
trade-offs
10. The value chain for an individual company in a particular industry is embedded in a larger system of activities called a ________ .
value system
11. In order to plan the procurement of the sub-assemblies, components, and raw materials, a ________ needs to be fed into the MRP process.
MPS
12. In the pre-computer era, materials requirements planning was mostly performed using ________ .
reorder point systems (RPS)
13. One disadvantage of early MRP systems is that they did not perform ________ .
capacity requirements planning
14. The primary difference between MRP and MRPII systems was the latter's integration with ________ .
. financial accounting
15. Call center or help desk automation is a typical function of ________ systems.
. CRM
16. Initially, ________ manufacturers found little use for MRP
flow
17. Company-wide,integrated systems supported by a central database are called ________ systems.
ERP
18. Which of the following is NOT a function typically found in a CRM system?
warehouse management
19. Constraint-based optimization solutions and specialized warehouse management software are the backbone of ________ .
SCM
20. While relational databases designed to support ERP systems are good at online transaction processing (OLTP), they are not optimized for ________ processing.
analytical
21. The time between posting a transaction and propagating the data across the enterprise, up the supply chain, and onto the balance sheet is referred to as "time to ________ ."
transparency
22. There are two primary challenges corporations face when trying to automate new processes. The first is speed. The second is ________ .
flexibility
23. Freeing data and functionality from siloed processes is the promise of ________ .
enterprise services architecture (ESA)
24. Standards, compliance, interfaces, and documentation for data exchange between two processes is referred to as ________ .
business semantics
25. Geoffrey Moore describes any corporate activity that increases shareholder value as core. What word does he use to describe all other activities?
context
26. Anything that a company is good at or known for is a ________ .
core competency
27. Moore refers to contextual activities, those that do not guarantee a competitive advantage, as _________ .
hygiene
28. Anything that differentiates one company from its competitors is ________ .
core
29. In order to fund innovation, resources saved from ________ can be reallocated to core activities.
consolidation
30. Activities that should take place in a first round of ESA-enabled consolidation include all of the following except ________ .
mapping of core systems
31. In what year was the first item purchased via a Web site using commercially available data encryption technology
1994
32. At one time, commercial activity on the Internet was forbidden by the National Science Foundation (NSF).
True
33. An early barrier to eCommerce was ________ .
a standard encryption mechanisms
34. The most recognizable sign of SSL at work is a Web addresses that begin with ________ .
https://
35. The company that arguably ushered in the dot-com gold rush within the retail sector was ________ .
amazon.com
36. in 2003, e-commerce retail sales represented nearly ________ percent of the $63 billion in retail sales at catalog and mail-order businesses (excluding the auto, drugs, health and beauty aid category).
65%
37. According to the BOC report that breaks down U.S. e-commerce retail sales into 15 broad merchandise categories, which category (excluding motor vehicles and parts) had the highest sales in 2003?
Computer hardware
38. According the 2005 online retail report, continuing double-digit growth rates in online sales may have to come from _______ .
high touch factor" products
39. A recent Gartner study reports that one-third of online shoppers are purchasing less due to concern over ________ .
online fraud
40. A hardware/software configuration that sits at the perimeter between a company's network and the Internet and which controlls access into and out of the network is called a ________ .
firewall
41. How many months does the typical software project take?
12 to 24 months
42. To be considered a large system, how many lines of code must a system contain?
50,000
43. What percentage of the $92 billion software market does commercial "shrink-wrap" personal computer products comprise (i.e. Microsoft Office, Adobe Photoshop)?
10%
44. For a medium-sized software system, how many lines of executable code are typically produced per day per person (averaged over the entire development period)?
< 10 lines
45. Most software bugs that are found by users are the result of ________ .
difficulty understanding the problem statement
46. How does the cost of owning and maintaining software compare to the cost of developing the software?
maintenance is twice the cost of development
47. Until the early 1980s, the only widely accepted model of software development was the _______ model .
waterfall
48. Which of the following is not one of the six most important software quality characteristics?
installability
49. Two types of software prototypes are ________ .
Throwaway and Evolutionary
50. A software development process model that tries to combine the benefits of both prototyping and the waterfall model is the ________ model.
Iterative Enhancement
51. is characterized by fully considering the risks and consequences of making and implementing decisions, and then to proceed mindfully.
Courage
52. is characterized by jumping in heedlessly, without adequately considering the risks and consequences that will result from your actions or decisions.
Bravery
53. The term that Hayward uses to refer to a trusted advisor is a(n) ________ .
foil
54. Extraordinary overconfidence is a positive force for advancement when ________ .
it is grounded in the best available data
55. Which of the following is NOT a characteristic of executive hubris?
overconfidence
56. During a ________, hackers run programs that repeatedly request information from a victim's web site or network in order to lock out legitimate uses.
denial of service attack
57. A devices which allow the user to intercept and interpret "packets" of information traversing a network is called a ________ .
packet sniffer
58. Manipulating unwitting people into giving out information about a network or how to access is called ________ .
. social engineering
59. The famous Trojan program Back Orifice, was developed by the hacker group known as ________ .
cult of the dead cow
60. The ILOVEYOU bug, which infected an estimated 45 million computers, replicated itself by _______
emailing itself to every address stored in a victim's Outlook address book
61. An in-house model for localization is most appropriate where there is ________ .
high volume and stable demand
62. Which of the following is primarily a technical or engineering exercise?
Internationalization
63. The cost of localization is usually ________ the original cost of developing a product.
far less than
64. Using software to programmatically convert one language into another is called ________ .
machine translation
65. is a technology that provides the ability to reuse a previous translation of the same text.
Translation memory
66. Globalization Management Systems are used to manage the localization process as a ________ rather than as a discrete project.
workflow stream
67. Language translation typically amounts to ________ percent of a localization effort.
50%
68. A typical professional translator can translate ________ words (2-4 pages of text) per day.
2000
69. A translation agency that also provides a range of engineering, content layout, and testing services is called a ________ .
localization service provider (LSP)
70. Which of the following is NOT a recommended step to help companies get started in localization?
Start by buying inexpensive tools for small in-house projects