cis 2200 final
According to Panorama Consulting Solutions, in 2018, the average time to implement an ERP project is approximately ________
17.4 months
________ is the online marketing and advertising format that includes pop-ups.
A display ad
________ are currently the most successful (revenue) online marketing and advertising format.
Display ads
Which of the following is NOT a challenge to the implementation of an ERP?
Dramatic reductions in inventory costs and order to delivery time
________ enables the computer-to-computer exchange between two organizations of standard transactions such as invoices, shipment schedules, or purchase orders.
EDI
What tools enable a business to connect customer conversations and relationships from certain types of Web sites to CRM processes?
Social CRM
which of the following statements is true regarding enterprise resource planning systems?
They integrate data with a centralized database.
Enterprise systems include ________ tools for analyzing overall organizational performance.
analytical
Enterprise applications have drawbacks mainly because they ________.
are very expensive to purchase and implement
advertisers use _____ in order to display more relevant ads based on a user's search and browsing history.
behavioral tracking
The most common type of repetitive stress injury is ________.
carpal tunnel syndrome
organizations have options for responding to problematic user-generated social media content that include all of the follow EXCEPT _____.
changing the content
The Internet has made intellectual property ________.
difficult to protect
Downloading a movie from the Internet is an example of ________.
digital good
Nike's distributors are ________ in the supply chain.
downstream
The principles of right and wrong that guide an individual are called ________.
ethics
According to your reading, Coca-Cola implemented an SAP enterprise system to overcome a ________.
lack of standard, companywide business processes
The global positioning system (GPS) enables ________ -based services for consumers via their smartphones.
location
A(n) ________ is an Internet business model that provides an initial point of entry to the web along with specialized content and other services.
portal
Related to social e-commerce, small world theory suggests you are only ________ link(s) from every other person on earth.
six
Regarding moral dimensions of the information age, ________ include(s) the issue of what standards should we demand to protect the safety of society.
system quality
In the United States, the claim to privacy is protected primarily by ________.
the First Amendment
________ is an Apple technology that allows users to charge items to their credit card using their phone.
Apple Pay
Which of the following is NOT part of the analysis of a situation that presents an ethical issue?
Avoid actions with extremely low failure costs.
________ targeting techniques increase the effectiveness of banners, rich media, and video ads.
Behavioral
How do information systems support the activities in a supply chain?
By reducing inventory levels
_______ businesses gather and sell personal information to government agencies.
Data broker
What are the two most important management challenges in building a successful e-commerce presence?
Developing a clear understanding of your business objectives and knowing how to choose the right technology to achieve those objectives
Kevin describes _____ as a set of integrated software modules that support nearly all of their organization's business processes.
ERP
________ avoid the problem of having databases in areas such as finance, human resources, sales and marketing, and manufacturing that are not capable of sharing information.
Enterprise resource planning (ERP) systems
________ is the world's largest search engine.
The act that aims at protecting medical records is the ________.
HIPAA
Mary's company is implementing an ERP system to achieve which main business objective?
Improved decision making
Which answer contains the correct list of moral dimensions of the Information Age?
Information rights and obligations, property rights and obligations, accountability and control, system quality, quality of life
________ is the market leader in cloud-based CRM systems.
Salesforce.com
Tiny software programs that keep track of where a user visited on the Internet and report this back to a server are called ________.
Web beacons
Viruses differ from worms because worms ________.
can operate on their own without attaching to other computer program files
Determining the revenue produced by a customer and comparing the revenue to the expenses of acquiring and taking care of the customer is called ________.
customer lifetime value
The acronym CRM stands for ________.
customer relationship management
Some say that a firm's most valuable asset is its ________.
customer relationships
The most common source of business system failure is (are) ________.
data quality
behavioral tracking and targeted ads can be seen as a double-edged sword because _____.
increases in targeted ads may result in higher sales but users may perceive them as a loss of privacy
FIP is a set of principles governing the collection and use of ________.
information about individuals
Regarding moral dimensions of the information age, ________ include(s) the issue of determining the data that individuals and organizations can protect.
information rights and obligations
In Europe, before data is gathered, ________ must be given by customers with knowledge of all the facts needed to make a rational decision.
informed consent
The Children's Online Privacy Protection Act (COPPA) focuses on ________.
parental permissions
Early supply chain management systems were based on a(n) ________ in which production master schedules were based on forecasts of demand for products.
push -based model
Customer relationship management applications that track Web sales and retail store sales are related to the ________ aspect of customer relationships
sales
In an enterprise system, the integrated software modules that focus on return requests are related to ________.
sales and marketing
Social e-commerce is commerce based on the idea of the digital ________ graph.
social
Incorporating applications that allow customers to chat with one another about company products is an example of ________.
social CRM
A ________ chain is a network of organizations for obtaining raw materials.
supply
Ethical issues in information systems have become more of an urgent topic because of the rise of ________.
the Internet and e-commerce
The fastest growing form of retail trade in the United States, Europe, and Asia is ________.
e-commerce
A supply chain management system using a(n) ________ model bases production schedules on forecasts.
push-based
What is a social graph?
A mapping of all significant online social relationships
________ refers to the principles of right and wrong that individuals use to make choices.
Ethics
________ is another name for e-hubs.
Net marketplaces
Facebook, Twitter, and blogs represent the typical platforms for the ________ e-commerce presence map.
social media
________ percent of online retailers have m-commerce Web sites.
Fifty-five
A supply chain management system using a(n) ________ model bases production schedules on actual customer orders.
pull-based
In 2018, mobile marketing constitutes ________ percent of all online marketing.
70
What is a touch point?
A method of interaction with a customer
Kevin describes which component of an ERP system that consolidates data from sales, marketing, and service departments?
Customer relationship management (CRM)
What is computer vision syndrome?
Eyestrain related to display screen use in various computing devices
which of the following is a significant risk of using social media?
Loss of privacy
which of the following describes the identify guideline of social media behavior?
Make sure you clarify if views are personal or if they represent a company.
________ includes computer viruses, worms, and Trojan horses.
Malware
E-commerce emerged in 1995 with the first Internet portal, ________.
Netscape
Which of the following options is NOT a unique feature of e-commerce technology?
Our geographic boundaries now determine our network experience.
The ________ is the most important U.S. federal statute regarding conditions for handling information regarding credit reporting and financial records.
Privacy Act of 1974
One recurring problem in supply chain management is when information about the demand for a product gets distorted as it passes from one entity to the next across the supply chain. What is this called?
The bullwhip effect
Which list below contains the correct four kinds of e-commerce presence?
Web sites, email, social media, and offline media
Valerie describes organizational guidelines for all of the following social media behaviors EXCEPT
abstain
A social commerce feature that provides consumers the ability to share their shopping experiences with others is called _________.
collaborative shopping
A(n) ________ is an Internet business model that provides an online meeting place where people with similar interests can communicate and share information.
community provider
A(n) ________ is an Internet business model in which information content is sold and distributed.
content provider
Shopkick is a mobile application that enables retailers to offer customers ________.
coupons
iTunes has dramatically ________ illegal music downloads.
decreased
The two most important management challenges when building an e-commerce site include knowing how to choose the right technology and ________.
developing a clear understanding of your business objectives
ERM software and CRM software ________.
differ as ERM software focuses on employee issues
If a Web site changes its prices based on the demand characteristics (e.g., concert tickets), this would be an example of ________.
dynamic pricing
A broad term to describe extending a marketplace beyond traditional boundaries is called ________.
marketspace
The fastest growing type of B2C e-commerce is ________.
mobile
According to the E-Commerce Presence Map, activities such as education and branding are considered a(n) ________ type of presence.
offline media
The primary benefit of disintermediation to the consumer is ________.
removing layers and reducing costs
The ________ of the web makes it possible to deliver messages with text, audio, and video simultaneously to large numbers of people.
richness
According to the E-Commerce Presence Map, activities such as conversation and engagement are considered a(n) ________ type of presence.
social media
According to the e-commerce presence map, activities including conversation are a(n) ________ type or presence.
social media
In information systems, SaaS stands for ________.
software as a service
which of the following describes the refrain guideline of social media behavior?
Don't use company resources such as logos, photos, company email, and so on, unless you have permission to use them. Your answer is correct.
E-commerce refers to the use of the ________ and ________ to transact business.
Internet; Web
According to your text, Elemica's Web site for buying and selling chemicals is an example of ________ electronic commerce.
business-to-business (B2B)
BarnesandNoble.com is an example of ________ electronic commerce.
business-to-consumer (B2C)
Buying a silver coin from an individual on eBay is an example of ________ electronic commerce.
consumer-to-consumer (C2C)
An example of ________ includes someone taking out a loan and then being sold a checking account as well.
cross-selling
According to the E-Commerce Presence Map, activities including newsletters are a(n) ________ type of presence.
Newsletters, updates, and sales are activities related to the ________ e-commerce presence map.
A(n) ________ is an Internet business model that sells products directly to consumers or to individual businesses.
e-tailer
The ________ strategy focuses on having components arriving exactly at the time they are needed.
just-in-time
Seventy-four percent of smartphone owners use ________, which depends on a global positioning system.
location-based services
E-commerce has become more ________.
social, mobile, and local
Which statement below best describes an enterprise system?
Large scale software that encompasses a whole company across many departments and business functions.
The doubling of computing power every 18 months has raised questions about the ________
accuracy and reliability of information systems
All of the following are steps that should be taken when confronted with a new ethical situation EXCEPT ________.
analyze the organizational structure
all of the activities listed here describe behavioral tracking except _____
collecting credit card data from online purchases
A set of principles governing the collection and use of information about users is called ________.
fair information practices
A(n) ________ grants the owner an exclusive monopoly on an invention for 20 years.
patent
The "patent trial of the century" in 2011 was between ________ and ________ for violating patents for iPhones.
Apple; Samsung
Who are the leading enterprise software vendors?
SAP, Oracle, IBM, Infor Global Solutions, and Microsoft
A comprehensive CRM package contains modules for ________ and _______ relationship management.
partner; employee
If a company produces a custom-made automobile only after a customer has placed an order, it is an example of a(n) ________ production model.
pull-based
Unfortunately, enterprise applications fail to meet expectations ________ percent of the time.
44
Copyright protects creators (individuals) of intellectual property for ________.
70 years after the author's death
Copyright protects creators (corporate-owned) of intellectual property for ________.
95 years after the initial creation
Which of the following correctly defines the concept of accountability?
A feature of systems and social institutions exists in which mechanisms are in place to determine who acted and who is responsible.
_______ means that mechanisms are in place to determine who in an organization took responsible action.
Accountability
________ are small text files loaded on a computer when a user visits Web sites.
Cookies
Which of the following ethical principles states: "Take the action that produces the least harm or the least potential cost"?
Risk aversion principle
What is a Web beacon?
Small software programs that keep a record of users' online clickstream
Privacy protection for medical records is covered under ________.
The Health Insurance Portability and Accountability Act of 1996 (HIPAA)
One of the characters in this video asks the question: "Are there any laws to keep companies from installing trackers on my computer?" According to his colleague's reply, which of the following statements describes current U.S. law regarding the information Websites can collect and how that information is used?
The Children's Online Privacy Protection Act regulates the collection of personal information on children and bans behavioral advertising to children younger than 13 years of age without parental consent.
The most common cause of repetitive stress injury (RSI) is ________.
a computer keyboard
Regarding moral dimensions of the information age, ________ include(s) the issue of who can and will be held liable for harm done to property rights.
accountability and control
the business benefits of behavioral tracking include _____.
all of the answers: delivering ads based on geo-location data, identifying prospective customers for products or services, delivering ads based on social media activity, delivering ads based on demographic data).
Analytical CRM includes applications that ________.
analyze customer data for improving business performance
When demand for a product mistakenly gets distorted as it passes across the supply chain, it is called a ________.
bullwhip effect
Some ERP vendors include in-memory-computing technology that provides ________ tools for ad hoc analysis, what-if scenario analysis, and machine learning that analyzes very large data sets.
business intelligence
Customer relationship management primarily includes ________.
capturing and integrating customer data
Promises by professions to regulate themselves in the general interest of society are called ________
codes of conduct
The commission of illegal acts against a computer or using a computer is called ________.
computer crime
An example of ________ includes a company being sold infrastructure as a service (IaaS) at the same time they purchased software as a service (SaaS).
cross-selling
Although software bugs and facility catastrophes are likely to be widely reported in the press, by far the most common source of business system failure is ________.
data quality
U.S. schools are experiencing a(n) ________, which means that students in poorer schools have less access to technology.
digital divide
All of the following are technology trends that raise ethical issues EXCEPT ________.
disruptive technologies
_____ processes support activities in multiple departments and span an organization.
enterprise
A(n) ________ makes values from a central database available for applications that support all of an organization's internal business activities.
enterprise resource planning (ERP) system
SAP is the best-selling ________.
enterprise software
In an enterprise system, the integrated software modules that focus on cash management and forecasting are related to ________.
finance and accounting
In an enterprise system, the integrated software modules that focus on labor costs and job skills are related to ________.
human resources
Immanuel Kant's Categorical Imperative states ________.
if an action is not right for everyone to take, it is not right for anyone
Advances in data storage techniques and the rapidly declining costs of data storage threaten ________.
individual privacy
A supply chain ________.
links suppliers, manufacturing plants, distribution centers, retail outlets, and customers
The most common type of computer security incident is ________.
malware infection
In an enterprise system, the integrated software modules that focus on production capacity are related to ________.
manufacturing and production
Customer relationship management applications that track campaign data are related to the ________ aspect of customer relationships.
marketing
Combining data from multiple sources to create digital dossiers of detailed information on individuals is called ________.
profiling
Regarding moral dimensions of the information age, ________ include(s) the issue addressing intellectual property rights in a digital society.
property rights and obligations
Regarding moral dimensions of the information age, ________ is the standard by which cultural values are evaluated and supported in a digital society.
quality of life
Managers often maintain a(n) ________ as a buffer during unforeseen events
safety stock
Customer relationship management applications that track social networking data are related to the ________ aspect of customer relationships.
service
Enterprise applications introduce _________ that describe how once a company adopts an enterprise application from a single vendor, it is very costly to change vendors, and the firm becomes dependent on the vendor.
switching costs