Bus 340 Ch.1 Vocab
5.1: An IT professional working to make a new system work with an existing system is focusing on which of the following? A.) Data accuracy B.) Data mining C.) Systems integration D.) Volatility E.) System costs
C.) Systems integration
Global System Configurations
- Centralized systems: All development and operation at domestic home base - Duplicated systems: Development at home base but operations managed by autonomous units in foreign locations - Decentralized systems: Each foreign unit designs own solutions and systems - Networked systems: Development and operations occur in integrated and coordinated fashion across all units
World Wide Web
A system with universally accepted standards for storing, retrieving, formatting, and displaying information in a networked environment.
5.2: ____________ computing is currently the fastest-growing form of computing. A.) Smartphone B.) Supercomputing C.) Cloud D.) Mainframe E.) Client-server
C.) Cloud
Information Technology (IT) Infrastructure
Computer hardware, software, data, storage technology, and networks providing a portfolio of shared IT resources for the organization.
Information
Data that have has shaped into a form that is meaningful and useful to human beings
computer literacy
Knowledge about information technology, focusing on understanding of how computer-based technologies work.
Porter's Competitive Forces Model
1. Threat of Entry of New Competitors 2. Bargaining Power of Suppliers 3. Bargaining Power of Customers/Buyers 4. Threat of Substitute Products or Services 5. Rivalry Among Existing Firms within the Industry
Business Process Management
1.) Identify processes for change 2.) Analyze existing processes 3.) Design new process 4.) Implement new process 5.) Continuous measurement
The 6 Important Business Objectives of information technology (IT)
1.) Operational excellence 2.) New products, services, and business models 3.) Customer and supplier intimacy 4.) Improved decision making 5.) Competitive advantage 6.) Survival
Problem Solving as a 4-step process
1.) Problem Identification 2.) Solution design 3.) Solution evaluation and choice 4.) Implementation 5.) Feedback (optional but great ig, idk)
Organization hierarchy
A business firm is organized as a hierarchy, or a pyramid structure, of rising authority and responsibility. The upper levels of the hierarchy consist of managerial, professional, and technical employees, whereas the lower levels consist of operational personnel
People
A business is only as good as the people who work there and run it. Likewise with information systems, they are useless without skilled people to build and maintain them or people who can understand how to use the information in a system to achieve business objectives.
The Value Chain
A set of activities through which a product or service is created and delivered to customers 5 Key components: - Inbound logistics - Operations - Outbound logistics - Marketing and sales - Support Additional components: Firm's infrastructure, human resource management, technology, R&D and procurement
2.2: Which of the following is an interorganizational system that provides a seamless flow of information to both suppliers of raw materials and to customers? A.) Supply chain management system B.) Executive support system C.) Business intelligence system D.) Customer relationship management system E.) Knowledge management system
A.) Supply chain management system
2.3: Virtually anyone can set up a(n) ________________, an application of social business which allows for publishing opinions and experiences about a variety of topics. A.) Blog B.) Social network C.) Internet D.) Training program E.) File sharing site
A.) Blog
2.4: The senior leadership position responsible for the organization's data is called the ____________ officer. A.) Chief data officer B.) Chief privacy officer C.) Systems analyst D.) Chief security E.) Chief information
A.) Chief data officer
2.4: _____ are the people or groups, both internal and external to the organization, for whom applications are developed. A.) End users B.) Senior managers C.) Knowledge workers D.) Managers E.) Clients
A.) End users
2.1: _______________________ is the functional business process responsible for managing cash accounts. A.) Finance and accounting B.) Sales and marketing C.) Manufacturing and production D.) Human resources E.) Instructional technology
A.) Finance and accounting
1.3: The problem-solving model consists of problem identification, solution design, solution evaluation and choice, and ___________. A.) Implementation B.) Problem rejection C.) Analysis D.) Evaluation E.) Solution renovation
A.) Implementation
1.4: _________________ has been impacted by information systems as things like traditional guest comment cards are transformed into online guest comment cards. A.) Marketing B.) Finance C.) Instructional technology D.) Management E.) Accounting
A.) Marketing
3.1: Which force in Porter's competitive forces model is concerned with entry barriers? A.) New market entrants B.) Substitute products and services C.) Suppliers D.) Customers E.) Traditional competitors
A.) New market entrants Correct. In a free economy with mobile labor and financial resources, new companies are always entering the marketplace. In some industries, there are very low barriers to entry, whereas in other industries, entry is very difficult.
3.3: Quality described as adhering to specific specifications with minimal variations would be through the lens of a ________. A.) Producer B.) Store C.) Customer D.) Salesperson E.) Franchiser
A.) Producer
1.1: Which business objective is illustrated when one online coin shop offers a free app to detect fake coins, and all other online stores adopt the same strategy to avoid going out of business? A.) Survival B.) Training C.) Decision making D.) Customer and supplier intimacy E.) Competitive advantage
A.) Survival
5.4: Companies use a _______ model to analyze the costs of obtaining and maintaining an IT system to determine if it is feasible to have an internal or outsourced information system. A.) TCO B.) feasibility study C.) budget planning D.) TRP E.) ITIL
A.) TCO Correct. A TCO (total cost of ownership) model analyzes direct and indirect costs to help determine the actual costs of owning specific technology.
2.3: A restaurant chef makes a recipe from memory and doesn't share or write down the recipe. This is an example of ____________. A.) Tacit knowledge B.) Factual knowledge C.) Semistructured knowledge D.) Knowledge acquisition E.) Structured knowledge
A.) Tacit knowledge
2.3: Collaboration is essential to ______, who have a specific mission and need to work together to complete specific tasks to achieve their mission. A.) Teams B.) Groups C.) Committees D.) Panels E.) Agencies
A.) Teams
5.2: _____ is the process of presenting computing resources that are accessed in ways that appear to not be restricted by physical configuration or geographic location. A.) Virtualization B.) Optimization C.) Network infrastructure D.) Cloud computing E.) Nanotechnology
A.) Virtualization
Call center
An organizational department responsible for handling customer service issues by telephone and other channels.
5.3: ZipRealty, which uses both Zillow and Google Maps, is an example of which of the following? A.) LMS B.) A mashup C.) A mushup D.) Zip drive E.) Microsoft cloud platform
B.) A mashup
1.4: Because so many business transactions occur over the Internet today, ______________ has been impacted by information systems, particularly regarding online transactions and reporting systems. A.) Instructional technology B.) Accounting C.) Finance D.) Marketing E.) Management
B.) Accounting
5.3: Which of the following is an open source operating system for mobile devices? A.) Linux B.) Android C.) Moodle D.) UNIX E.) Windows Mobile
B.) Android
3.2: A domestic exporter strategy is characterized by which of the following? A.) Decentralization B.) Centralization C.) Regionalization D.) Transnationalism E.) Virtual organization
B.) Centralization
2.4: When a leading discount store's database was breached, a lot of attention was on the company's ________________, who is specifically responsible for training employees about security. A.) Systems analyst B.) Chief security officer (CSO) C.) Chief information officer (CIO) D.) Chief privacy officer (CPO) E.) Chief financial officer (CFO)
B.) Chief security officer
3.1: Michael Porter developed the ________________ model, which emerged as a leading model for better understanding the important concept of competitive advantage. A.) Information systems B.) Competitive forces C.) Competitive advantage D.) Information technology E.) Big data
B.) Competitive forces
2.3: An important word associated with social business is ___________, which include customers, suppliers, employees, managers, and oversight committees. A.) Business intelligence B.) Conversations C.) Databases D.) Customer attention E.) Digital dashboards
B.) Conversations
1.1: After you purchase a product through a retailer's website, you receive a customer satisfaction survey. The retailer's survey primarily relates to which businessobjective? A.) Decision making B.) Customer and supplier intimacy C.) Competitive advantage D.) Training E.) Survival
B.) Customer and supplier intimacy
2.1: The role of accounting in the order fulfillment process includes checking and approving customer credit, and ____________. A.) Assembling the product B.) Generating an invoice C.) Shipping the product D.) Submitting the product order E. Generating an order
B.) Generating an invoice
3.4: The business process management (BPM) step that addresses the question of which processes need to be addressed is ___________________________. A.) Analyzing existing processes B.) Identifying processes for change C.) Process analysis D.) Continuous measurement E.) The needs analysis
B.) Identifying processes for change
2.2: Which of the following focuses on providing reports on current business performance to middle managers to help them make sound business decisions? A.) Transaction processing systems B.) Management information systems C.) Decision-support systems D.) Business intelligence E.) Executive support systems
B.) Management information systems
2.1: _______________________ are the functional business processes responsible for quality assurance. A.) Finance and accounting B.) Manufacturing and production C.) Sales and marketing D.) Human resources E.) Instructional technology
B.) Manufacturing and production
3.4: According to executive reports, the most significant barrier to both successful business process reengineering (BPR) and business process modelling (BPM) is____________. A.) A lack of training B.) Organizational culture C.) Implementation of the new process D.) Continuous measurement E.) Organizational leadership
B.) Organizational culture Correct. Employees are often resistant to change and do not like unfamiliar routines. As such, good change management is key to successful business process reengineering and business process management.
3.2: Which of the following has helped level the playing field for companies wanting to do business globally? A.) Systems analysts B.) Relational database management system C.) The Internet D.) Transnational firms E.) Local area networks
C.) The Internet
Information systems literacy
Broad-based understanding of information systems that includes behavioral knowledge about organizations and individuals using information systems as well as technical knowledge about computers.
3.2: Which of the following is a characteristic of a multinational strategy? A.) Uses networks to link people, assets, and ideas, enabling it to ally with other companies to create and distribute products and services without being limited by traditional organizational boundaries or physical locations B.) Product created, designed, financed, and initially produced in the home country but relies heavily on foreign personnel for further production, marketing, and human resources C.) Concentrates financial management and control out of a central home base while decentralizing production, sales, and marketing operations to units in other countries D.) Heavy centralization of corporate activities in the home country of origin E.) All the value-adding activities are managed from a global perspective
C.) Concentrates financial management and control out of a central home base while decentralizing production, sales, and marketing operations to units in other countries
1.2: Which statement about information systems is FALSE? A.) Management of information systems brings in behavioral issues in addition to technical issues. B.) Computers are like hammers—they are not information systems but are used to create information systems. C.) Customers and suppliers are considered important elements of the information system as they provide key data. D.) An information system is really information technology plus people and organizations. E.) Information is created through the input, processing, and output activities of an information system.
C.) Customers and suppliers are considered important elements of the information system as they provide key data.
2.2: Which of the following provides charts and graphs to assist senior management make non-routine decisions? A.) Business intelligence. B.) Transaction processing system. C.) Executive support systems. D.) Decision support systems. E.) Management information systems.
C.) Executive support systems.
1.2: _____ is output from an information system that is returned to key people to help them evaluate or refine inputs for the system. A.) Knowledge B.) Data C.) Feedback D.) Business intelligence E.) A finalized report
C.) Feedback
3.2: A popular business organization that has a product or service created in the home country (i.e., McDonald's and Chem Dry), and distributes the same products worldwide is known as a __________. A.) Multinational B.) Corporation C.) Franchiser D.) Transnational E.) Partnership
C.) Franchiser
1.2: Which term refers to all of the hardware and software that a firm needs to use to achieve its business objectives? A.) Input-processing-output B.) Data C.) Information technology D.) Information systems E.) Management information systems
C.) Information technology
1.3: All of the following are examples of the technology dimension of business problems EXCEPT ________. A.) Insufficient network capacity B.) Outdated software C.) Outdated business processes D.) Aging hardware E.) Inadequate database capacity
C.) Outdated business processes
1.3: The problem-solving model phase where you determine a performance discrepancy that might be caused by an outdated system is the ________ phase. A.) Solution design B.) Analysis C.) Problem identification D.) Evaluation E.) Implementation
C.) Problem identification
5.2: Companies (e.g., Salesforce.com) that lease their software over the Internet are engaged in __________, which represents a type of cloud computing. A.) Platform as a service (PaaS) B.) Azure as a service (AaaS) C.) Software as a service (SaaS) D.) Simple Storage Service (S3) E.) Infrastructure as a service (IaaS)
C.) Software as a service (SaaS)
5.2: The popular USB "thumb" drive uses a storage technology very similar to ________. A.) CD-ROMs B.) Digital video disks (DVDs) C.) Solid state drives (SSD) D.) 3-D printers E.) Magnetic disks
C.) Solid state drives (SSD)
5.1: Which IT infrastructure component utilizes people to run and manage the infrastructure components and to train employees in how to use these technologies for theirwork? A.) Hardware B.) Data management C.) Technology services D.) Networking and telecommunications E.) Software
C.) Technology services
5.4: Mobile device management software is used for which of the following purposes? A.) To limit business smartphone usage to a single platform B.) To determine the cost of cloud services C.) To remove software and data from smartphones that are lost D.) To determine the extent of software localization E.) To assess conformity with service level agreement parameters
C.) To remove software and data from smartphones that are lost Correct. Mobile device management (MDM) software, which monitors, manages, and secures mobile devices that are deployed across multiple mobile service providers and across multiple mobile operating systems, includes tools that enable the IT department to monitor mobile usage, install or update mobile software, backup and restore mobile devices, and remove software and data from devices that are stolen or lost.
3.3: The philosophy that quality should be the responsibility of everyone that works in a firm and every business unit is best known as which of the following? A.) Business process improvement B.) Quality control C.) Total quality management D.) Six sigma E.) Lean business
C.) Total quality management
3.1: As a future business leader, it's important to remember the basic principle of IT strategy that the ____________ serves the ____________. A.) Business, technology B.) Firm, business C.) Technology, business D.) IT, technology E.) Organization, business
C.) Technology, business Correct. The basic principle of IT strategy for a business is to ensure that the technology serves the business and not the other way around. The research on IT and business performance has found that the more successfully a firm can align its IT with its business goals, the more profitable it will be.
Information Technology (IT)
Consists of all the hardware and software that a firm needs to use to achieve its business objectives. This includes not only computers, storage technology, and mobile handheld devices but also software, such as the Windows or Linux operating systems, the Microsoft Office desktop productivity suite, and the many thousands of computer programs that can be found in a typical large firm.
1.1: If you include information systems hardware, software, and telecommunications, this amounts to about ________ percent of all capital investment in the United States in 2018. A.) 10 B.) 25 C.) 50 D.) 33 E.) 90
D.) 33
2.1: Which term refers to the strategized steps and activities that are coordinated within an organization? A.) Business intelligence B.) Business analysis C.) Business acumen D.) Business processes E.) Business knowledge
D.) Business processes
5.4: Which of the following involves attempting to determine when a computer hardware system will be maxed out? A.) Business intelligence B.) CPU speed analysis C.) Referential integrity D.) Capacity planning E.) XML
D.) Capacity planning
2.2: A single screen of graphs or charts of key performance indicators is known as a(n) ________________________. A.) ESS B.) Aggregator C.) DSS D.) Digital dashboard E.) Portal
D.) Digital dashboard
5.4: Which IT total cost of ownership (TCO) component relates to frustrated customers who are angry about a site not working? A.) Fault tolerance B.) Infrastructure C.) Mashup D.) Downtime E.) Space and energy
D.) Downtime
3.1: Which statement about Porter's model and the Internet is FALSE? A.) With new ways to meet needs, the threat of substitute products increases. B.) The more suppliers a firm has, the more control a firm has over those suppliers. C.) Due to global information, customer bargaining power increases. D.) Due to technology requirements, the threat of new entrants decreases. E.) With readily available pricing information, customer bargaining power increases.
D.) Due to technology requirements, the threat of new entrants decreases.
3.3: The popular quality control model, six sigma, specifically calls for 3.4 defects per ____________ as a measure of quality. A.) Billion B.) Hundred thousand C.) Hundred D.) Million E.) Thousand
D.) Million
1.3: Regarding dimensions of business problems, a lack of properly trained employees is considered a ______________ dimension. A.) Training B.) Technology C.) Networking D.) People E.) Organizational
D.) People
3.4: Which statement about business process management (BPM) is FALSE? A.) Measurement may be needed during the design of a process in addition to after implementation. B.) If a process needs major, quick revisions, business process reengineering may be required. C.) It is important to document the sequence of a current system, then create diagrams of the new, improved system. D.) The BPM process concludes once metrics are established and the system is implemented. E.) It is important to prioritize projects for improvement.
D.) The BPM process concludes once metrics are established and the system is implemented. Correct. The BPM never concludes as it has a continual improvement philosophy.
5.3: Which Microsoft operating system specifically supports mobile features such as multitouch and mobile devices? A.) Microsoft SQL Server 2019 B.) Mac OS C.) Windows 15 D.) Windows 10 E.) Microsoft Azure
D.) Windows 10
5.3: Taking application components from various resources, ________ mixes and matches to create a new, customized Internet experience. A.) SaaS B.) Open source software C.) Cloud computing D.) XML E.) A mashup
E.) A mashup
Computer Software
Detailed, preprogrammed instructions that control and coordinate the work of computer hardware components in an information system.
1.1: __________ is a key management challenge and opportunity in MIS related to collecting and using huge volumes of data to identify insights that can be used to improve business strategy. A.) Online collaboration and social networking B.) Artificial intelligence C.) Cloud computing D.) The mobile platform E.) Big Data
E.) Big Data
1.2: All of the following are information technology tools that managers use to cope with change and complexity EXCEPT ________. A.) The World Wide Web B.) Computer software C.) Networking technology D.) Data management technology E.) Business processes
E.) Business processes
2.4: The senior leadership position responsible for the organization's internal knowledge (i.e. tacit knowledge) is called the ____________. A.) Chief privacy officer B.) Chief training officer C.) Knowledge management officer D.) Systems analyst E.) Chief knowledge officer
E.) Chief knowledge officer
5.1: Collectively, the coordination of computer hardware, software, data management, networking, and technology services is known as ________. A.) Distributed processing B.) Mainframe computing C.) Business intelligence D.) IT compliance E.) IT infrastructure
E.) IT infrastructure Correct. Today's IT infrastructure is composed of five major components: computerhardware, computer software, data management technology, networking and telecommunications technology, and technology services.
3.4: Business process management (BPM) is concluded ____________. A.) After the analysis has been completed B.) After customer complaints have been resolved C.) After the new system has been properly tested D.) After senior management has signed off on the project E.) Never
E.) Never
1:4: Expansion to global markets requires more coordination of resources for a firm to create their goods. This has transformed the need for information systems for the field of ________________. A.) Finance B.) Marketing C.) Human resources D.) Accounting E.) Operations management
E.) Operations management
1:4: Outsourcing of _________ can reduce IS development costs for U.S. organizations. A.) Network design B.) User interface design C.) Supply chain management D.) Business process design E.) Production programming
E.) Production programming
3.3: Which of the following is used in industry to create solid objects, layer by layer, from specifications in a digital file? A.) Dot matrix printing B.) Computer-aided design system C.) Cycle time system D.) Color printing E.) 3-D printing
E.) 3-D printing
5.1: The IT infrastructure computer software component includes both ____________ and __________ software categories. A.) Oracle 19c; SQL Server 2019 B.) Database; spreadsheet C.) Programming; system D.) Windows; MacOS E.) System; application
E.) System; application Correct. Computer software includes both system software and application software. System software manages the resources and activities of the computer. Application software applies the computer to a specific task for an end user, such as processing an order or generating a mailing list.
Culture
Fundamental set of assumptions, values, and ways of doing things that has been accepted by most members of an organization.
Change Management
Giving proper consideration to the impact of organizational change associated with a new system or alteration of an existing system.
Internet
Global network of networks using universal standards to connect millions of networks.
Intranets
Internal networks based on Internet and World Wide Web technology and standards.
Feedback
Output that is returned to the appropriate members of the organization to help them evaluate or correct input.
Networking and telecommunications technology
Physical devices and software that link various computer hardware components and transfer data from one physical location to another.
Computer hardware
Physical equipment used for input, processing, and output activities in an information system.
Data Management Technology
Software governing the organization of data on physical storage media
Management Information Systems (MIS)
Specific category of information system providing reports on organizational performance to help middle management monitor and control the business.
Data
Streams of raw facts representing events occurring in organizations or the physical environment before they have been organized and arranged into a form that people can understand and use.
Input
The capture or collection of raw data from within the organization or from its external environment for processing in an information system.
Processing
The conversion, manipulation, and analysis of raw input into a form that is more meaningful to humans.
Output
The distribution of processed information to the people who will use it or to the activities for which it will be used.
Network
The linking of two or more computers to share data or resources such as a printer.
Business Process
The unique ways in which organizations coordinate and organize work activities, information, and knowledge to produce a product or service.
Business Problems (Organizations, technology, and/or people)
Typical organizational problems include poor business processes (usually inherited from the past), unsupportive culture, political infighting, and changes in the organization's surrounding environment. Typical technology problems include insufficient or aging hardware, outdated software, inadequate database capacity, insufficient network capacity, and the incompatibility of old systems with new technology. Typical people problems include employee training, difficulties of evaluating performance, legal and regulatory compliance, ergonomics, poor or indecisive management, and employee support and participation.
Information System (IS)
can be defined technically as a set of interrelated components that collect (or retrieve), process, store, and distribute information to support decision making, coordinating, and control in an organization. In addition, information systems may also help managers and workers analyze problems, visualize complex subjects, and create new products.
Extranets
private intranets that are accessible to authorized outsiders