Information systems Today
According to the information presented in this video, all of the following activities are likely to occur in the information requirements determination phase of systems except
--beta testing
Based on the information provided in this video, which of the following usually happens in a denial-of-service attack
A hacker floods a Web server with so many requests that the server becomes unavailable to intended users
_________is a unique hacktivist because it doesn't have any formal leadership structure
Anonymous
According to this video, which of the following statements about enterprise resource planning systems (ERPs) is true
ERPs integrate data with a centralized database
Which of the following is commonly used by computer criminals to exploit human weaknesses by misrepresenting oneself to trick others into revealing information
Social engineering
___________is NOT considered a phase of the systems development life cycle
System conversion
The primary factor that contributes to enterprise system implementation failure is
a lack of top management level support
As Julie explains to Trey, she needs information obtained from high quality data to help her make good decisions. Which of the following four documents would not be a good source of information for Julie?
A social media report that shows the total number of "likes" for each cookie
Which of the following is NOT a key component of information systems security
Implementing social engineering
Mary's company is implementing an ERP system to achieve which main business objective?
Improved decision making
Which system development methodology does Worker 2 describe to worker 1
Prototyping
As worker 2 begins to test the new travel reimbursement system, he describes the___________as a five-phase systems development process: planning, analysis, design, implementation, and maintenance
SDLC
According to the information presented in this video, an early version of software with real functionality to be tested by system users is called a _______version
beta
Individuals who break into computer systems with the intention of doing damage are called
black hats
The ___________refers to identifying and presenting the value provided by a system
business case
Small-to medium-sized businesses can participate in B@B transactions with other firms through third-party
business-to-business marketplaces
Based on the information in this video, high quality data is best described as_____________-
correct, current, and complete
In this video dramatization, Julie and Trey discuss the need to document any changes they make to a cookie and don't change the list of ingredients they use for the procurement of inputs, this is an example of the failure of data to be__________-
current
An organization that desires and enterprise system that is exactly tailored to its needs will use a________system
custom
An organized attempt by a nation's military to disrupt or destroy another nation's information and communication systems is known as___________
cyberwar
In this video, Special Agent Macey state that the single largest threat to the internet is
denial of service attacks
As Kevin explains, _____ processes support activities in multiple departments and span an organization.
enterprise
In this video, Kevin describes___________as a set of integrated software modules that support nearly all of their organization's business processes
enterprise resource planning
Today, most enterprise wide information systems come in the form of______________systems
enterprise resource planning
An__________is a suite of business applications that allow companies to integrate information across operations on a company wide basis
enterprise wide information system
When Julie describes calculating the average number of cookies sold in February, she is describing an example of obtaining_______ from ________
information; data
According to the DHS agent portrayed in this video, the Secret Service has responded to network intrusions at businesses throughout the United States that have been impacted by _____ through their point-of-sale systems.
malware
The benefits of a customer relationship management system include all of the following EXCEPT
minimizing investments in inventory
The processes associated with selling a product or service are referred to as__________processes
order to chash
When a company decides to___________some or all of its information systems development, it hires another organization to develop information systems on its behalf
outsource
In the value chain model, all of the following are considered core activities EXCEPT
procurement
As Julie explains to Trey, she needs sales data in order to plan future cookie production. Based on her explanation, data is defined as _____.
recorded facts and figures
A key component of acquiring an information system externally is the
request for proposal
To achieve success with enterprise systems, all of the following are important recommendations EXCEPT
restricting the involvement of system users
In this video, Agen Macey explains how a __________pretends to a legitimate company by sending emails that request users to update their confidential information such as passwords or account numbers
spoofer
In this video, Agent Macey explains how a ___________pretends to be a legitimate company by sending emails that request users to update their confidential information such as passwords or account numbers
spoofer
Development of the travel reimbursement system required the participation of a diverse group of persons including business managers, business analysts, systems analysts, programmers, and end-users. Worker 2 called the development team a _________group
stakeholder
The various interrelated parties involved in moving raw materials, intermediate components, and end products within the production is termed the______
supply network
The life of an information system from conception to retirement is often called the ________________
systems development life cycle
The total cost of ownership of an information system refers to
the cost of acquiring, usin, and maintaining an information system
Advantages of ERP systems include all of the following EXCEPT
the organization must change its business processes to match the software
According to Kevin, which component of an ERP system consolidates data from sales, marketing, and service departments
Customer relationship management
According to the information provided in this video any business that has an online presence is at risk of
all these answers
___________is a technology and a corporate strategy to create and maintain lasting relationships with customers by enhancing downstream information flows
Customer relationship management
_________refers to the use of computer and networking technologies against persons or property to intimidate or coerce government, civilians, or any segment of society in order to attain political, religious, or ideological goals
Cyberterrorism