Business Information Systems Final

¡Supera tus tareas y exámenes ahora con Quizwiz!

Report

A ____________ is a business document containing only predefined data for inline viewing or printing.

False

Just-in-time is a business model in which the suppliers manage the manufacturer's inventory based on pre-established service levels.

Pulling

The organization waits for an order, allowing the organization to initiate a ___________ sequence to move the order through the production process.

False

The primary use of online transaction processing (OLTP) systems is to define a set of reachable and exploitable vulnerabilities present in a database.

Put key business information into the hands of more decision makers

The purpose of a data warehouse is to ___________.

Justin works on the system to make the user interface more user-friendly.

A company has a five-member team in charge of the development and maintenance of its information systems. An information system is in place, and the team performs routine maintenance to keep it running smoothly. Which of the following scenarios is an example of perfective maintenance?

Systems benchmarking

A company has submitted a request for proposals to a number of vendors. It must now evaluate the proposals it has received. Which of the following methods can it use to compare the different systems?

The company's requirements for the new system are very specialized

A company needs a new information system to manage increasing customer orders and changing demands. The company's five-member informations system (IS) team is competent and capable of developing a new system, but decides against developing a system in-house. Which of the following, if true, would most weaken the company's decision?

True

A firewall is a part of a computer system designed to detect intrusion and prevent unauthorized access to or from a private network.

False

A honeypot is a computer, data, or network site that is used to penetrate other networks and computer systems to snoop or to cause damage.

False

A hot backup site is an empty warehouse with all necessary connections for power communication.

True

Analysts interview people informed about the operation and issues of the current proposed system.

True

A system that communicates across organizational boundaries is sometimes referred to as an inter organizational system (IOS).

Virtual private network

A(n) __________ is a network connection that is constructed dynamically within an existing network in order to connecting users or nodes

Decision support

A(n)_____________ system is a special purpose information system designed to provide assistance to organizational decision making related to a particular recurring problem.

False

Ad hoc queries are always saved because they need to be executed on a regular basis.

Procure-to-pay

An effective ____________ process can help obtain favorable conditions, reduce transaction costs, and, ultimately, create customer goodwill as it helps to efficiently fulfill customer orders.

True

An intelligent agent is also referred to as a bot.

Check customer's creditworthiness

An online retailer has finished creating a customer record. Identify the retailer's next step in an order-to-cash process.

True

Analytical customer relationship management (CRM) analyzes customer behavior and this provides the business intelligence necessary to identify new opportunities and to provide superior customer service.

Custom

Applications that are designed and developed exclusively for a specific organization are known as _____________ software.

True

Business analytics augments business intelligence by using predictive analysis to help identify trends or predict business outcomes.

Facts

Business case arguments based on data, quantitative analysis, and/or indisputable factors are known as arguments based on ___________.

The notion that if the system is not implemented, the firm will lose out to the competition or go out of business

Business case arguments based on fear are dependent on _____________.

True

By combining human intelligence and reasoning capabilities with technology's retrieval and analysis capabilities, visual analytics can help in decision making.

True

Collaborative customer relationship management enchanted communication by understanding customer history and current needs.

True

Companies that have successfully installed enterprise systems are found to follow a basic set of recommendations related to enterprise system implementations.

Human resource

Components which support employee recruitment, assignment tracking, performance reviews, payroll, and regulatory requirements are called ____________.

True

Control objectives for information and related technology (COBIT) is a set of best practices that helps organizations to maximize the benefits from their IS infrastructure and establish appropriate controls.

True

Customer relationship management systems collect data that can be mined to discover the next product line extension that consumers covet.

True

Data flows represent the movement of data through an organization or within an information system.

True

Data mining algorithms search for patterns, trends, or rules that are hidden in the data.

False

Destructive agents are malicious agents deigned by users to attack harmful viruses when they appear on an organization's system.

True

Electronic Data Interchange (EDI) refers to computer-computer communication without any human intervention.

False

Enterprise resource planning (ERP) core components support the primary external activities of the organization that deals with suppliers and customers.

Customer relationship management and supply chain management

Enterprise resource planning (ERP) extended components focus primarily on ____________.

False

Enterprise resource planning extended components support internal operations such as financial management, operation management, and human resource management.

They are intended to be cross-functional approaches to improve an organization.

How is business process management similar to quality improvement approaches such as total quality management?

Drive-by hacking

In __________, an attacker accesses the network, intercepts data from it, and even uses network services and/or sends attack instructions to it without having to enter the home, office, or organization that owns the network.

False

In a basic relationship, the buyer and the supplier set preferences and prices to benefit each other.

False

In an entity-relationship diagram, each data entity can have only one attribute that describes it.

False

In the make-to-stock process, raw materials, sub components, and accessories are procured based on forecasts, but actual manufacturing does not start until sales orders are received.

Issuing the purchase order

In the procure-to-pay process, the negotiation of price and terms is followed by ___________.

Receiving and stocking raw materials, parts, and products

Inbound logistics involves business activities associated with _________.

False

One of the traditional functional areas that companies are organized around is information systems management.

False

Information dissemination refers to the use of the Web duties to provide information for recruiting new members as well as utilizing more interactive internet technologies.

False

Insuring all the systems and information processing tasks is an essential part of risk acceptance strategy.

Easier to evolve and alter software to changing business needs when data and progress are independent

One of the advantages of a database approach is program-data independence. This means that it is ___________.

False

Operational customer relationship management system refers to the systems used for providing effective and efficient communication with the customer from the entire organization.

False

Patents generally refer to creations of the mind such as music, literature, or software.

True

Processing logic represents the way in which data are transformed.

False

Production scheduling leads to the development of a sourcing plan.

True

Purchasing an existing system from an outside vendor is referred to as an external acquisition.

False

Ransomware is a type of adware.

True

Requirements collection is the process of gathering and organizations information to understand how a proposed information system should function.

False

Salaries paid to employees are non-recurring costs.

Machine learning allows systems to learn by imitating humans.

Select the correct statement below.

False

Sequence discovery is used to list procedures to follow when handling a security breach.

True

Social media applications enable customers to quickly share both positive and negative information.

False

Spyware is electronic junk mail or junk newsgroup postings usually posted for the purpose of advertising some product and/or service.

True

Supply chain management improves the coordination of suppliers, product or service production, and distribution.

True

Systems designed to support decision making based on stable point-in-time or historical data are called information systems.

Control objectives for information and related technology (COBIT)

The ___________ is a set of best practices that helps organizations to maximize the benefits form their IS infrastructure and to establish appropriate controls.

Order-to-cash

The ___________ process entails the process related to selling goods or services.

Visual analytics

The combination of various analysis techniques and interactive visualization to solve complex problems is known as ____________.

True

The core business processes common to most business organizations are order-to-cash, procure-to-pay, and make-to-stock.

Vanilla

The features and modules that an enterprise system comes with out of the box are referred to as the ____________ version.

False

The first phase of the systems development lifecycle is systems design.

True

The make-to-order process uses the pull-based approach.

False

The only drawback of Extensible Markup Language (XML) is that it is not customizable.

False

The order-to-cash process entails subprocesses such as price and terms negotiations, issuing of the purchase order, receiving the goods, and receiving and paying the invoice.

True

The structure of data is typically captured in a data model.

False

The term dumpster diving refers to the task of modifying the operating system to remove manufacture of carrier restrictions in order to run applications other than those from the official store.

True

The total cost of ownership is focused on understanding not only the total cost of acquisition, but also all costs associated with ongoing use of maintenance of a system.

True

There are two major categories of enterprise resource planning (ERP) components - ERP core components and ERP extended components.

The Computer Fraud and Abuse Act

Violating data belonging to banks or other financial institutions is a crime in the United States. Which of the following legislations prohibits such violations?

A Trojan horse

When Shelly downloaded an arcade game from an unknown internet web site, an unauthorized connection unknown to Shelly was established with her computer. The arcade game is most likely to be __________.

Biometrics

When a company uses a fingerprint recognition system instead of access cards, it helps the company prevent unauthorized physical access. Which of the following technologies is used to authentication here?

Order-to-cash

Whenever an order is placed with online retailers, the retailers put together the order, ship it, and charge the payment to the customer's credit card. This process of selling a product or service is known as the ___________ process.

The development firsts of custom software are much higher than for packaged software because of the time, money, and resources that are required to design, develop, and support them.

Which do the following statements is true of packages and custom software? (Not true: packaged software are applications that are designed and developed exclusively for a specific organization, customer software is cost effective since the vendor that builds the application can spread out development costs through selling to a large number of users, packaged software is well suited for tasks that are unique to a particular business, custom software is highly useful for standardized repetitive tasks, such as writing a report or preparing a presentation)

Commercial aircrafts

Which of the following goods are produced using the make-to-order approach? (Not: home appliances, televisions, air conditioners, or refrigerators)

Very expensive low-volume goods

Which of the following goods are typically produced under a make-to-order approach?

Business report

Which of the following is NOT a type of report generated by businesses? (Key-indicator report, drill-down report, exception report, scheduled report, business report)

Operations and manufacturing

Which of the following is a core activity according to the value chain model?

Make-to-stock

Which of the following is a core business process?

Firewall

Which of the following is a part of a computer system designed to detect intrusion and to prevent unauthorized access to it from a private network?

BelAir buys a system from the vendor who offers the cheapest prices.

Which of the following is an example of a basic relationship between an outsourcing vendor and client?

Problem specificity

Which of the following is the main advantage of customizable software over off-the-shelf software?

Enterprise systems implementations should include personnel from different departments.

Which of the following is true regarding the formulas for success of an enterprise system?

Sarbanes-Oxley Act

Which of the following laws makes it mandatory for organizations to demonstrate that there are controls in image to prevent misuse and detect any potential problems?

They are garners that automatically perform a task for a user.

Which of the following statements is true about user agents?

The development costs of custom software are much higher than for packaged software because of the time, money, and resources that are required to design, develop, and support them.

Which of the following statements is true of packaged and custom software? (Not true: custom software is highly useful for standardized repetitive tasks such as writing a report or preparing a presentation, packaged software is well suited for tasks that ere unique to a particular business, custom software is cost effective since the vendor that builds the application can spread out development costs through selling to a large number of users, packaged software are applications that are designed and developed exclusively for a specific organization)

Tacit knowledge assets reflect the processes and procedures that are located in a person's mind on how to effectively perform a particular task.

Which of the following statements is true? (Not true: a knowledge management systems is based on a single technology to codify a database, knowledge management systems are extremely hard to use especially when entering and retrieving data, the successful deployment of a knowledge management systems should be linked to numerous business objectives, explicit knowledge assets reflect knowledge cannot be documented)

Development of a request for proposal

Which of the following steps distinguishes external acquisition process from in-house development?

Warez peddling

__________ refers to offering stolen proprietary software for free over the internet.

Core

___________ activities are performed by the functional areas that process inputs and produce outputs.

Data reduction

___________ can be achieved by rolling up a data cube to the smallest level of aggregation needed, reducing the dimensionality, or diving continuous measures into discrete intervals.

Clustering

___________ is the process of grouping related records together based on having similar values for attributes.

Information systems security

___________ refers to precautions taken to keep all aspects of information systems safe from destruction, manipulation, or unauthorized use or access.

Proxy variables

____________ are alternative measures of outcome led that help clarify the impact a change will have on the firm.


Conjuntos de estudio relacionados

computing final exam study guide

View Set

Chapter 2 (North America--US and Canada)

View Set

Chapter 2: Highway Transportation System

View Set

CPA Regulation: Ethics and Responsibilities Part 2

View Set