Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
70 Cards in this Set
- Front
- Back
1. To achieve competitive advantage, a company might use IT to ________ .
|
create product differentiation and secure a premium price
|
|
2. The four dimensions of competitive scope listed by Porter and Millar are ________ .
|
segment, vertical, geographic, and industry
|
|
3. Broad scope competitors are not well equipped to serve a target segment that ________ .
|
has unusual needs
|
|
4. For most of industrial history, ________ affected the physical component of what businesses did.
|
technological progress
|
|
5. What is an industry that has high information content in their product and high information intensity in their value chain?
|
insurance
|
|
6. When companies in an industry have invested heavily in IT in order to remain competitive, ________ .
|
barriers to entry are strengthened
|
|
7. An increasingly powerful way to distinguish physical goods from ones competition is to ________ .
|
embed information technology in the product itself
|
|
8. Which of the following is NOT a step that senior executives can take to capitalize on IT-based opportunities?
|
Demand that IT executives implement all the same technology that competitors implement
|
|
9. In order to create competitive advantage by managing linkages, which of the following may be required?
|
trade-offs
|
|
10. The value chain for an individual company in a particular industry is embedded in a larger system of activities called a ________ .
|
value system
|
|
11. In order to plan the procurement of the sub-assemblies, components, and raw materials, a ________ needs to be fed into the MRP process.
|
MPS
|
|
12. In the pre-computer era, materials requirements planning was mostly performed using ________ .
|
reorder point systems (RPS)
|
|
13. One disadvantage of early MRP systems is that they did not perform ________ .
|
capacity requirements planning
|
|
14. The primary difference between MRP and MRPII systems was the latter's integration with ________ .
|
. financial accounting
|
|
15. Call center or help desk automation is a typical function of ________ systems.
|
. CRM
|
|
16. Initially, ________ manufacturers found little use for MRP
|
flow
|
|
17. Company-wide,integrated systems supported by a central database are called ________ systems.
|
ERP
|
|
18. Which of the following is NOT a function typically found in a CRM system?
|
warehouse management
|
|
19. Constraint-based optimization solutions and specialized warehouse management software are the backbone of ________ .
|
SCM
|
|
20. While relational databases designed to support ERP systems are good at online transaction processing (OLTP), they are not optimized for ________ processing.
|
analytical
|
|
21. The time between posting a transaction and propagating the data across the enterprise, up the supply chain, and onto the balance sheet is referred to as "time to ________ ."
|
transparency
|
|
22. There are two primary challenges corporations face when trying to automate new processes. The first is speed. The second is ________ .
|
flexibility
|
|
23. Freeing data and functionality from siloed processes is the promise of ________ .
|
enterprise services architecture (ESA)
|
|
24. Standards, compliance, interfaces, and documentation for data exchange between two processes is referred to as ________ .
|
business semantics
|
|
25. Geoffrey Moore describes any corporate activity that increases shareholder value as core. What word does he use to describe all other activities?
|
context
|
|
26. Anything that a company is good at or known for is a ________ .
|
core competency
|
|
27. Moore refers to contextual activities, those that do not guarantee a competitive advantage, as _________ .
|
hygiene
|
|
28. Anything that differentiates one company from its competitors is ________ .
|
core
|
|
29. In order to fund innovation, resources saved from ________ can be reallocated to core activities.
|
consolidation
|
|
30. Activities that should take place in a first round of ESA-enabled consolidation include all of the following except ________ .
|
mapping of core systems
|
|
31. In what year was the first item purchased via a Web site using commercially available data encryption technology
|
1994
|
|
32. At one time, commercial activity on the Internet was forbidden by the National Science Foundation (NSF).
|
True
|
|
33. An early barrier to eCommerce was ________ .
|
a standard encryption mechanisms
|
|
34. The most recognizable sign of SSL at work is a Web addresses that begin with ________ .
|
https://
|
|
35. The company that arguably ushered in the dot-com gold rush within the retail sector was ________ .
|
amazon.com
|
|
36. in 2003, e-commerce retail sales represented nearly ________ percent of the $63 billion in retail sales at catalog and mail-order businesses (excluding the auto, drugs, health and beauty aid category).
|
65%
|
|
37. According to the BOC report that breaks down U.S. e-commerce retail sales into 15 broad merchandise categories, which category (excluding motor vehicles and parts) had the highest sales in 2003?
|
Computer hardware
|
|
38. According the 2005 online retail report, continuing double-digit growth rates in online sales may have to come from _______ .
|
high touch factor" products
|
|
39. A recent Gartner study reports that one-third of online shoppers are purchasing less due to concern over ________ .
|
online fraud
|
|
40. A hardware/software configuration that sits at the perimeter between a company's network and the Internet and which controlls access into and out of the network is called a ________ .
|
firewall
|
|
41. How many months does the typical software project take?
|
12 to 24 months
|
|
42. To be considered a large system, how many lines of code must a system contain?
|
50,000
|
|
43. What percentage of the $92 billion software market does commercial "shrink-wrap" personal computer products comprise (i.e. Microsoft Office, Adobe Photoshop)?
|
10%
|
|
44. For a medium-sized software system, how many lines of executable code are typically produced per day per person (averaged over the entire development period)?
|
< 10 lines
|
|
45. Most software bugs that are found by users are the result of ________ .
|
difficulty understanding the problem statement
|
|
46. How does the cost of owning and maintaining software compare to the cost of developing the software?
|
maintenance is twice the cost of development
|
|
47. Until the early 1980s, the only widely accepted model of software development was the _______ model .
|
waterfall
|
|
48. Which of the following is not one of the six most important software quality characteristics?
|
installability
|
|
49. Two types of software prototypes are ________ .
|
Throwaway and Evolutionary
|
|
50. A software development process model that tries to combine the benefits of both prototyping and the waterfall model is the ________ model.
|
Iterative Enhancement
|
|
51. is characterized by fully considering the risks and consequences of making and implementing decisions, and then to proceed mindfully.
|
Courage
|
|
52. is characterized by jumping in heedlessly, without adequately considering the risks and consequences that will result from your actions or decisions.
|
Bravery
|
|
53. The term that Hayward uses to refer to a trusted advisor is a(n) ________ .
|
foil
|
|
54. Extraordinary overconfidence is a positive force for advancement when ________ .
|
it is grounded in the best available data
|
|
55. Which of the following is NOT a characteristic of executive hubris?
|
overconfidence
|
|
56. During a ________, hackers run programs that repeatedly request information from a victim's web site or network in order to lock out legitimate uses.
|
denial of service attack
|
|
57. A devices which allow the user to intercept and interpret "packets" of information traversing a network is called a ________ .
|
packet sniffer
|
|
58. Manipulating unwitting people into giving out information about a network or how to access is called ________ .
|
. social engineering
|
|
59. The famous Trojan program Back Orifice, was developed by the hacker group known as ________ .
|
cult of the dead cow
|
|
60. The ILOVEYOU bug, which infected an estimated 45 million computers, replicated itself by _______
|
emailing itself to every address stored in a victim's Outlook address book
|
|
61. An in-house model for localization is most appropriate where there is ________ .
|
high volume and stable demand
|
|
62. Which of the following is primarily a technical or engineering exercise?
|
Internationalization
|
|
63. The cost of localization is usually ________ the original cost of developing a product.
|
far less than
|
|
64. Using software to programmatically convert one language into another is called ________ .
|
machine translation
|
|
65. is a technology that provides the ability to reuse a previous translation of the same text.
|
Translation memory
|
|
66. Globalization Management Systems are used to manage the localization process as a ________ rather than as a discrete project.
|
workflow stream
|
|
67. Language translation typically amounts to ________ percent of a localization effort.
|
50%
|
|
68. A typical professional translator can translate ________ words (2-4 pages of text) per day.
|
2000
|
|
69. A translation agency that also provides a range of engineering, content layout, and testing services is called a ________ .
|
localization service provider (LSP)
|
|
70. Which of the following is NOT a recommended step to help companies get started in localization?
|
Start by buying inexpensive tools for small in-house projects
|