Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
66 Cards in this Set
- Front
- Back
Successful implementation of e-business processes requires _________ and _________.
a) changes to existing business processes; substantial investment in IS technology b) Conversion to XML software standards; Java programming scripts c) Implementations of tight security standards; Web site personlaization d) market segmentation; Web site globalization |
a) changes to existing business processes/ substantial investment in IS Technology
|
|
The use of electronic exchanges continues to grow rapidly. T or F.
|
False
|
|
_________ management software combines different product data formats into a standard format for uniform viewing, aggregating and integrating catalog data into a central depository.
|
catalog
|
|
data gathered based on the Web sites you visit and what items you click on is called_____.
|
clickstream data
|
|
Which of the following is not one of the basic components of a TPS? a) databases b) networks c) procedures d) analytical models
|
analytical models
|
|
A form of TPS where business transactions are accumulated over a period of time and prepared for processing as a single unit is called
|
Batch processing
|
|
__________ is the process of capturing and gathering all data necessary to complete transactions
|
data collection
|
|
The ______ _____ system captures the basic data needed to process a customer order.
|
order entry
|
|
inventory control, purchase order processing, receiving, and accounts payable systems make up a set of systems called the __________ systems
|
purchasing
|
|
the _______ transaction processing system automates many of the tasks required to amass budget data, distribute it to users, and consolidate the prepared budgets
|
budget
|
|
a computerized _________ system is designed to allow automated financial reporting and data entry and produces a detailed list of all business transactions and activities.
|
general ledger
|
|
the individual application modules included in an ERP system are designed to support the ________ ________, the most efficient and effective ways to complete a business process
|
best practices
|
|
The final stage of problem solving is ________
|
monitoring
|
|
A decision that inventory should be ordered when inventory levels drop to 500 units is an example of
|
programmed decision
|
|
A __________ model will find the best solution, usually the one that will best help the organization meet its goals
|
optimization
|
|
What summarizes the previous day's critical activities and is typically available at the beginning of each workday?
|
key-indicator report
|
|
The uses and management of the funds is a subsystem of
|
The financial MIS
|
|
The process of determining the problem data required for a given result is called _______analysis
|
goal seeking
|
|
what component of a desicion support system allows decision makers to easily access and manipulate the DSS and to use common business terms and phrases
|
the dialogue
|
|
In a GSS, what approach or technique uses voting to make the final decision in a group setting?
|
nominial group technique
|
|
A(n) _____________ supports the actions of members of the board directors, who are responsible to stockholders.
|
executive information system (EIS)
|
|
___________ are the rules of thumb arising from experience or even guesses.
|
Heuristics
|
|
____________ involves mechanical or computer devices that can paint cars, make recise welds, and perform other tasks that require a high degree of precision or are tedious or hazardous for human beings.
|
robotics
|
|
What branch of artificial intelligence involves a computer system that can simulte the functiong of a human brain
|
neural networks
|
|
A(n) __________ is a combination of software and hardware that allows the computer to change how it functions or reats to situation based on feedback it recieves
|
learning system
|
|
What is a disadvantage of an expert system?
|
limitations to relaively narrow problems
|
|
A(n) _____________ is a collections of software packages and toos used to develop expert systems that can be implemented on most popular PC platforms to reduce development time and costs.
|
expert system shell
|
|
What stores all relevant information, data, rules, cases, and relationships used by the expert system?
|
the knowledge base
|
|
What is NOT used int the development and use of expert systems
|
the use of natural language
|
|
An important part of an expert system is the ____________, which allows a user or decision maker to understand how the expert system arrived at certain conclusions or results.
|
explaanation facility
|
|
A(n)_________________ enables one or more uses to move and react ina computer-simulated environment.
|
virtual reality system
|
|
What type of virtual reality is used to make hunam beings feel as though they are in tree-dimensional setting, such as a building, an archaeological excavation site, the human anatomy, a sculpture or a crime scene reconstruction?
|
immersive
|
|
___________ combines traditional disciplines, such as science and medicine, with computer science.
|
Informatics
|
|
_________________ is the activity of creating or modifying existing business systems. It refers to all aspects of the process - from identifing problems to be solved or opportunities to be exploited to the implementation and refinement of the chosen solution.
|
Systems development
|
|
Which of the following individuals ultimately benefit from a systems development project?
|
stakeholders
|
|
The quality or usefulness of the output is an example of a(n) ________________
|
performance objective
|
|
The term ____________________ refers to the translation of strategic and organizational goals into systems development initiatives.
|
information systems planning
|
|
What factors are essential to the success of certain functional areas of an organization?
|
Critical success factors
|
|
What is the third level in the capability maturity model (CMM)?
|
Defined
|
|
_________________ takes an iterative approach to the systems development process. During each iteration, requirement and alternative solutions to the problem are identified and analyzed, new solutions are designed, and a portion of the system is implemented.
|
Prototyping
|
|
_____________ consists of all activities that, if delayed, would delay the entire project?
|
the critical path
|
|
Feasibility analysis is typically done during which systems development stage?
|
investigation
|
|
Data modeling is most often accomplished through the use of _______________________, while activity modelling is often accomplished through the use of _________________.
|
entity relationship diagrams, data-flow diagrams
|
|
The ___________ often results in a formal bid that is used to determine who gets a contract for designing new or modifying existing systems.
|
request for proposal (RFP)
|
|
Software can be purchased from external developers or developed in house. This decision is often called the __________ decision.
|
make-or-buy
|
|
A(n)_________________ enables one or more uses to move and react ina computer-simulated environment.
|
virtual reality system
|
|
What type of virtual reality is used to make hunam beings feel as though they are in tree-dimensional setting, such as a building, an archaeological excavation site, the human anatomy, a sculpture or a crime scene reconstruction?
|
immersive
|
|
___________ combines traditional disciplines, such as science and medicine, with computer science.
|
Informatics
|
|
_________________ is the activity of creating or modifying existing business systems. It refers to all aspects of the process - from identifing problems to be solved or opportunities to be exploited to the implementation and refinement of the chosen solution.
|
Systems development
|
|
Which of the following individuals ultimately benefit from a systems development project?
|
stakeholders
|
|
The quality or usefulness of the output is an example of a(n) ________________
|
performance objective
|
|
The term ____________________ refers to the translation of strategic and organizational goals into systems development initiatives.
|
information systems planning
|
|
What factors are essential to the success of certain functional areas of an organization?
|
Critical success factors
|
|
What is the third level in the capability maturity model (CMM)?
|
Defined
|
|
_________________ takes an iterative approach to the systems development process. During each iteration, requirement and alternative solutions to the problem are identified and analyzed, new solutions are designed, and a portion of the system is implemented.
|
Prototyping
|
|
_____________ consists of all activities that, if delayed, would delay the entire project?
|
the critical path
|
|
Feasibility analysis is typically done during which systems development stage?
|
investigation
|
|
Data modeling is most often accomplished through the use of _______________________, while activity modelling is often accomplished through the use of _________________.
|
entity relationship diagrams, data-flow diagrams
|
|
The ___________ often results in a formal bid that is used to determine who gets a contract for designing new or modifying existing systems.
|
request for proposal (RFP)
|
|
Software can be purchased from external developers or developed in house. This decision is often called the __________ decision.
|
make-or-buy
|
|
A systems review that is caused by a problem with an existing system is called ___________.
|
event-driven review
|
|
Java, Visual Basic, and C++ are examples of ____________ programming languages.
|
flexible (not structured)
|
|
______________ is the fastest and most pervasive worm attack on record, with damages esitmated at $40 billion.
|
Mydoom
|
|
A ______________ is a type of Trojan horse that executes when specific conditions occur.
|
logic bomb
|
|
A program capable of attaching to disks or other files and replicating itself repeatedly, typically without user knowledge or permission, is called a __________.
|
worm
|
|
A ___________ is a modified version of a virus that is produced by the virus's author or another person amending the original virus code.
|
variant
|