• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/112

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

112 Cards in this Set

  • Front
  • Back
Networked enterprises view cross-functional enterprise systems as a strategic way to use IT to decentralize information resources and improve the efficiency and effectiveness of business processes, and develop strategic relationships with customers, suppliers, and business partners. T/F?
True
_______ is defined as the use of the internet and other networks and information technologies to support electric commerce, enterprise communication and collaboration, and web-enabled business processes both within a networked enterprise and with its customers and business partners.
Electronic business
What is defined as the buying and selling, and marketing and servicing of products, services, and information over the internet and other networks?
e-commerce
Your text describes several electronic business system applications. Which of the following applications focuses on acquiring and retaining profitable customers via marketing, sales, and service processes?
Customer relationship management
________ serves as a cross-functional enterprise backbone that integrates and automates many internal business processes and information systems within the manufacturing, logistics, distribution, accounting, finance, and human resource functions of a company.
Enterprise resource planning
When ERP systems can help break down departmental and functional walls of business processes, this results in a more flexible organizational structure, managerial responsibilities, and work roles. This describes which key business benefit of ERP?
Enterprise agility
Though the benefits of ERP are many, the costs and risks are also considerable. Which of the following make up the bulk of implementing a new ERP system?
Reengineering processes and training.
Fundamentally, ______ helps a company get the right products to the right place at the right time, in the proper quantity and at an acceptable cost.
Supply chain management
____________ involves the electronic exchange of business transaction documents over the internet and other networks between supply chain trading partners (organizations and their customers and suppliers).
Electronic data interchange
Which of the systems listed below are the oldest and most widely used information systems in business?
Accounting information systems
Electronic commerce is changing the shape of competition, the speed of action, and the streamlining of interactions, products, and payments from customers to companies and from companies to suppliers. T/F?
True
Your text outlines nine key components of the e-commerce process architecture. One of these components is access control and security, which deals with establishing mutual trust and secure access between the parties in the e-commerce transaction. T/F?
True
What is the entire online process of developing, marketing, selling, delivering, servicing, and paying for products and services called?
e-commerce
Your text outlines three basic categories of electronic commerce applications. Which of the following characteristics best describes business-to-consumer (B2C) applications?
Involve businesses developing attractive electronic marketplaces to entice customers and sell products and services to consumers.
Your text outlines three basic categories of electronic commerce applications. Which of the following characteristics bests describes business-to-business (B2B) applications?
Involve both electronic business marketplaces and direct market links between businesses.
Which describes consumer-to-consumer (C2C) applications?
Involve consumers buying and selling whith each other in an auction process at an auction website, as well as personal advertising of products or services to buy or sell at electronic newspaper sites, or personal websites.
____________ helps employees electronically collaborate to accomplish structured work tasks within knowledge-based business processes using predefined sets of business rules, roles of stakeholders, authorization requirements, routing alternatives, databases used, and sequence of tasks required for each e-commerce process.
Workflow management software
Apply one of the key e-commerce success factors of retailing on the web to the following statement: "People want to feel that they are dealing with a trustworthy business, whose products and other website information can be trusted to be as advertised."
Security and reliability
Your text describes current e-commerce trends in applications and associated strategies taking place in the business-to-consumer market and the business-to-business market. Using figure 1, a long term strategy for the business-to-consumer market would be:
Business-to-consumer portals
a long-term strategy for the business-to-business market would be:
Procurement automation
A __________ strategy is the strategy business enterprises employ when integrating virtual business operations with traditional business operations
Click and Bricks
Information systems and technologies have become so integrated into business and organizations that it is necessary to study information systems and information technology like the other major business functions.
True
All computers are systems of input, processing, output, storage, and control components. However, as technology changes, the need for input and processing become less important
False
Microsoft is expanding beyond software such as operating systems and general application productivity suites. Microsoft is assessing business processes of specific industries and writing software products to support them.
True
Your text gives a conceptual overview of computer software and illustrates it as either application or system software. System software are programs that manage and support operations of computer systems and networks.
True
Experts predict the merging or disappearance of several computer categories. For example, many midrange and mainframe systems have been made obsolete by the power and versatility of client/server networks composed of microcomputers and servers.
True
In any information system, data resources must be organized and structured in some logical manner so that they can be managed effectively, retrieved quickly, and processed effectively.
True
Through the process of database planning and development, end users must identify the key data elements that are needed to perform their specific business activities. this frequently involves developing entity relationship diagrams that model the relationships among the many entities involved in business processes.
True
Telecommunications is rapidly moving from analog network technologies to digital transmission systems that are designed to transmit information in the form of discrete pulses as computers do, which will enable movement of larger amounts of information at higher transmission speeds.
True
A major trend in telecommunications technology is the change from reliance on copper wire-based media and land-based microwave relay systems to fiber-optic lines and other wireless technologies.
True
When employees in a project team use email to send and receive messages and use videoconferences to hold electronic meetings and coordinate their activities, they are using which of the following?
Enterprise collaboration systems
E-business uses internet technologies to work and empower:
All of the above
Business process reengineering is best defined as:
A radical redesign of business processes to achieve improvements in cost, quality, speed, or service.
Which of the following statements is false?
Virtual companies typically form virtual workgroups and alliances with customers, organized into clusters of process and cross-functional teams linked by intranets
A bit, the smallest element of data, can have value(s) of:
0 or 1
Success in today's dynamic business environment depends heavily on maximizing the use of internet-based technologies and web-enabled information systems to meet the competitive requirements of :
all of the above
a network that covers a large geographic distance, such as a state or country, is a
wide area network
a virtual private network
all of the above
The internet's protocol suite is known as:
transmission control protocol/internet protocol (TCP/IP)
As competitive strategy, when a company develops a corporate intranet or an extranet, it is often able to do which of the following as it uses its existing internet browsers, pcs, servers, and client/server networks?
leverage its investment in IT
How do information systems and information technologies differ?
Information technology can contain simple hardware components such as pencil-and-paper while information systems rely on computer-based technologies
A ______ strategy is a competitive strategy by which a firm seeks to establish new business linkages with customers, suppliers, competitors, and other companies
alliance
a ________ strategy is a competitive strategy by which a firm seeks to become a low-cost producer of products and services in the industry
cost leadership
a firm and survive and succeed in the long run if it successfully develops strategies to confront the five ________ forces that shape the structure of competition in its industry
competitive
A ________ strategy is a competitive strategy by which a firm seeks to significantly expand its capacity in order to produce goods and services, expand into global markets, and diversify into new products and services
growth
a computer is a system of hardware devices organized according to the functions of input, processing, output, storage, and control. the function of an output device is to:
convert electronic information produced by the computer system into human-intelligible form for presentation to end-users
Which one of the following would NOT fit the typical classification of a computer peripheral?
Central processing unit
radio frequency identification:
all of the above
which of the following is true about commercial off the shelf software?
all of the above
the function of an input device
convert data into electronic machine-readable form for direct entry or though telecommuications links into a computer system
an operating system includes which one of the following characteristics/
it is utilized by computer users and operators to communicate with the computer
which of the following is a type of application specific program?
science and engineering program
system software:
manages and supports the resources and operations of a computer as it performs various information processing tasks
a disadvantage of software suites is that:
all of the above
according moore's law:
computing power doubles every 18 to 24 months
which of the following is correct concerning the replication process and the duplication process for updating distributed databases?
replication is more complicated, because it involves using specialized software that finds changes in each distributed database and makes appropriate changes to each to make all look the same
a central source of data that have been cleaned, transformed, and cataloged so they can be used by managers and other business professionals for business analysis, market research, and decision support is called a:
data warehouse
which of the following is an example of a use of data mining
data in data warehouse are analyzed to reveal hidden patterns and trends
a DBMS is a set of computer programs that control the creation, maintenance, and use of the databases of an organization and its end users. as such, dbms stands for:
database management system
Which of the following statements best defines a network?
an interrelated or interconnected chain, group, or system
based on the conceptual frame work of levels of data, the most basic and smallest lobical unit of information is a:
character
metcalfe's law states that
the usefulness, or utility, of a network equals the square of the number of users
which of the following is correct concerning internet services providers?
they provide access to the internet to individuals and organizations for a fee
which off the following best fits the definition of a local area network?
network that serves a company that is located on one floor or in one building
a nuclear power plant uses electronic sensors linked to computer to continually monitor processes and make instant adjustments that control the power generation process. this is an example of
a process control system
a database of customer purchases that provides end-user managers interactive and ad hoc support for decision making is referred to as a
decision support system
the major thrust of knowledge management systems is to:
develop computer systems in order to help knowledge workers creat, organize, and share important business knowledge wherever and whenever needed
linux is a low cost, powerful UNIX-like operating system that was developed as ______, thus allowing programmers the freedom to modify its source code
open source software
which one of the following places the common data elements in order from largest to smallest?
database, file, record, field, character
what three components make up a basic information system?
input, processing, output
which one of the following statements would most accurately describe the level of operational management?
typically composed of self directed teams or supervisory managers that develop short range plans such as weekly production schedules and direct the use of resources and the performance of tasks according to procedures and within budgets and schedules they establish for the teams and other workgroups of the organization
which one of the following statements would most accurately describe the tactical level of management?
typically composed of self directed teams as well as middle managers that develop short and medium range plans, schedules, and budgets and specifies the policies, procedures, and business objectives for their subunits of the organization
decisions made at the tactical management level tend to be more
semistructured
decisions made at the strategic management level tend to be more
unstructured
decisions support systems differ from management information systems in which of the following ways?
DSS provides interactive inquiries and responses; MIS relies on presenting info in a prespecified fixed format
which one of the following should be used to answer the question: "what if we cut advertising by 25 percent? what would happen to sales?"
what-if analysis
_______________ osftware analyzes vast stores of historical business data that have been prepared for analysis in corporate data warehouses and tries to discover patterns, trends, and correlations hidden in the data
data mining
an __________ is a web-based interface and integration of MIS, DSS, EIS, and other technologies that gives all intranet users and selected extranet users access to a variety of internal and external business applications and services
enterprise information portal
enterprise information portals are typically tailored or personalized to the needs of individual business users or groups of users, giving them a personalized __________ of information sources and applications
digital dashboard
systems that use massively parallel processor whose architecture is based on the human brain's mesh like neuron structure are called
neural networks
the overall process by which information systems are designed and implemented within organizations is referred to as
systems analysis and design
the stages of the system development life cycle include which of the following?
investigation, analysis, design, implementation, and maintenance
which one of the following is an example of an intangible cost?
loss of customer goodwill
why are business end users frequently added to systems development teams?
they know a lot about the company and the types of business activities that affect the company's business processes
prototyping involves:
an iterative and interactive development process with extensive end user involvement
according to your text, when managing a product, each project:
has a set of goals, objectives, and tasks, and must deal with a set of limitations or constraints
which choice most correctly identifies the order of the modern project management approach discussed in your text?
defining, planning, executing, controlling, and closing
when a company wants vendors to bid on hardware and/or software needed for a system, minimum acceptable physical and performance characteristics are typically listed in a document called a:
request for quotation
what system implementation activity may involve tasks such as correcting incorrect data, filtering out unwanted data, consolidating data from several databases, and organizing data into new data subsets
data conversion
the four major forms of system conversion include
parallel, phased, pilot, and direct
which one of the following is a major software evaluation factor?
flexibility
when managers apply the ________ theory of ethical decision making, they view their only ethical responsibility is to increase the profits of the business without violating the law or engaging in fraudulent practices
stockholder theory
the ________ theory of ethical decision making states that companies have ethical responsibilities to all members of society.
social contract theory
as a business professional, you have a responsibility to promote ethical uses of information technology in the workplace. This responsibility includes:
property performing your role as a vital human resources in the business systems you help develop and use in your organization
which of the following best describes business ethics?
it is concerned with the numerous ethical questions that managers must confront as part of their daily business decision making
many computer crimes involve the theft of money. in the majority of cases, they are:
"inside jobs" that involve unauthorized network entry and fraudulent alteration of computer databases to cover the tracts of the employees involved
faking an email address of web page to trick users into passing along critical information such as passwords or credit card numbers is a description of which of the following hacking tactics used to assault companies through the internet and other networks?
spoofing
one of the ethical issues of computers concerns the unauthorized use of computer systems at work. According to your text, what percentage of US workers admit to surfing recreational sites during office hours?
90%
software that employs users' internet connections in the background without their knowledge or explicit permission to collect specific information about you, ranging from general demographics such as name, address, credit card numbers, passwords, and other personal information is
spyware
indiscriminate sending of unsolicited email message to many internet users is which of the following?
spamming
people who sit at pc workstations or visual display terminals in fast paced, repetitive keystroke jobs can suffer a variety of health problems known collectively as
cumulative trauma disorders
the business/IT planning process has three major components. developing strategic plans for managing or outsourcing a company's IT resources, including IS personnel, hardware, software, data, and network resources best describes which of the components?
resource management
the IT architecture that is created by the business/ IT planning process is a conceptual design, or bluepring, that includes several components. Which component includes the internet, intranets, extranets, and other networks, computer systems, system software, and integrated enterprise application software that provide a computing and communications infrastructure, or platform, that supports the strategic use of information technology for ebusiness, ecommerce, and other business/IT applications
technology platform
according to your text, the business/IT planning process has three major components. Developing business strategies that support a company's business vision is the component known as :
strategy development
Many types of operational and specialized databases, including data warehouses and internet/intranet databases, store and provide data nad information for business processes and decision support. this best describes which component of the IT architecture that is created by the strategic business/IT planning process
data resources
Business applications of information technology are designed as an integrated architecture or portfolio of enterprise systems that support strategic business initiatives, as well as cross functional business processes. This statement describes which of the components of the IT architecture?
Application architecture
the decentralization of information services within an organization was prompted by which of the following?
The development of microcomputers and distributed processing networks of computers at the corporate, department and workgroup level
The development of minicomputers and microcomputers accelerated which of the following trends?
downsizing
According to your text, how do outsourcing and offshoring differ?
Offshoring relocates an organization's actual business processes to a lower cost location, usually overseas; outsourcing does not always relocate overseas or to a lower cost location
The trend in global business and IT strategies is towards a:
Transnational strategy
Internet access is an important availability in managing global IT. According to the paris-based organization reporters without borders, there are 45 countries that restrict their citizens' access to the internet. What are they?
North Korea, Libya, Cuba, Burma, and Vietnam
The form of the IT organization structure within a company depends on which of the following?
The managerial philosophy and business/IT strategies formulated during the strategic planning process