IS Midterm Review
What business management system seeks to streamline an organization's activities to prevent backlogs and inefficiencies? Customer Relationship Management (CRM) Human Resources Management (HRM) Employee Benefits Management (EBM) Business Process Management (BPM)
Business Process Management (BPM)
Popular applications used by today's organizations in web mining include Google Analytics, Data Miner, and ________. Tanalytics Tab Miner Tablet Tableau
Tableau
Why is the meeting between all project stakeholders and key players scheduled as the final step in the planning phase? to make sure that everyone has availability on their calendar the budgets and timelines need to be finalized before stakeholders and key players can understand the scope of the projects and their role within the project so there is time to fine-tune the statement of work to give the client time to finalize their requirements for the project
the budgets and timelines need to be finalized before stakeholders and key players can understand the scope of the projects and their role within the project
The concept of "share of customer" focuses on getting the most business from the fewest customers. the biggest share of the market. the most business from the most customers. the business of the newest customers.
the most business from the fewest customers.
In the Five Whys, why is it important to continue to ask why after asking why the problem occurred? this will help you understand the root cause of the problem, not just a surface issue that may have arose so that you are able to provide a description of the problem to figure out why the problem occurred in order to ensure that you have heard all sides of the problem, from all of the people who were involved
this will help you understand the root cause of the problem, not just a surface issue that may have arose
When a large number of buyers seek to purchase a firm's products even when prices increase, Porter's force of customers can be said to have strengthened. accelerated. increased. weakened.
weakened
Which is the best description of the relationship between "green computing" and management information systems (MIS)? Advances in MIS technology will help make "green computing" easier and more widespread. Today's MIS must be specially designed and built to enable "green computing" to take place. Additional studies are needed to determine how MIS can support "green computing" practices. An organization can claim to employ "green computing" only if their MIS has been certified.
Advances in MIS technology will help make "green computing" easier and more widespread.
The infection of a digital device by a computer virus happens in stages. What is the second step in this process? The virus arrives via email attachment, file download, or by visiting a website that has been infected. The payload or the component of a virus that executes the malicious activity hits the computer and other infected devices. The infection spreads to other computers via infected email, files, or contact with infected websites. An action such as running or opening a file activates the virus.
An action such as running or opening a file activates the virus.
A gene editing technique called ________ may one day provide a cure for cancer. CRISPR biometrics Splicology Genetrophy
CRISPR
One of Google's companies that is investigating AI and Machine Learning is called MachineDeep. MindSweep. MindDeep. DeepMind.
DeepMind.
During the first stage of the project management (PM) process, the manager outlines the requirements of the project, documents these requirements, and analyzes the costs of the project. This is called the identification (ID) phase. True or False
False
In the second step in business process management, analysts use flowcharts and other tools to depict the workflow, the sequence of operations, and the decision points. This is called the process monitoring step. True or False
False
One noted disadvantage of cloud computing is the issue of overcollaboration between users. True or False
False
Which of the following is a popular Microsoft data analytics program that offers business intelligence as well as data visualization? LinkedIn Tableau Power BI PowerPoint
Power BI
Which step of business process management allows managers to create a continually improving process? Step 3: process execution Step 1: process design Step 4: process monitoring Step 5: process optimization
Step 5: process optimization
Which system is able to create purchase orders, manage inventory, and forecast future inventory needs? Supply chain management system Decision support system Mobile POS system Marketing information system
Supply chain management system
What occurs in the process execution step of business process management? The business process execution language engine is run. Activities are examined and divided into their individual components. Analysts use flowcharts and other tools to depict workflow. Managers track the individual components of the process as well as the process as a whole.
The business process execution language engine is run.
A project manager needs to assess how much progress her team has made on the project, to provide executives with a weekly update. Which collaboration software program will be most useful for assessing the project's status? Slack Ethereum Smartsheet Trello
Trello
Software that uses artificial intelligence to analyze millions of clinical and imaging records to create high-performance algorithms that automatically detect conditions is being developed by Google. Astra Zeneca. Pfizer. Zebra-Med.
Zebra-Med.
Protecting private or sensitive information by eliminating or encrypting information is the goal of data _____.
anonymization
Bitcoin, Ethereum, and LiteCoin all use blockchain algorithms to control quantity and verify the validity of transactions. They are referred to as digicoins. cryptocurrency. computer money. virtual currency.
cryptocurrency.
A form of spyware that records all actions typed on a keyboard is called a keystroke logger. recorder. capture. hacker.
logger
One version of this type of malware encrypts a victim's data until a payment is made. Another version threatens to make public a 'victim's personal data unless a payment is made. This type of malware is called ransomware. bitware. spyware. payware.
ransomware.
Collections of related fields in a database are referred to as tables. records. spreadsheets. characters.
records
What is the difference between a DDoS attack and a DoS attack? A DoS attack is carried out with many source devices and a DDoS is carried out with one source device. A DoS attack starts with a hacker and a DDoS attack comes from an organization. A DoS attack uses one powerful computer to infect a network and a DDoS creates zombie computers. A DoS is carried out with one source device and a DDoS attack is carried out with many source devices.
A DoS is carried out with one source device and a DDoS attack is carried out with many source devices.
What idea or concept does Adam Smith propose in his Invisible Hand theory? A nation will naturally accumulate wealth over time if it divides and assigns essential labor to its citizens and taxes individual wealth. A free, unregulated market operates better than one in which the government controls the business activities of individuals and companies. Some people are better suited to certain types of labor than others, and they should be guided toward those positions by others. A nation's wealth depends on its acquisition of colonies that are rich in natural resources and enable increased trade with other nations.
A free, unregulated market operates better than one in which the government controls the business activities of individuals and companies.
What was Weber's view on the use of physical force? A school where teachers were allowed to use physical force to keep students in line A police force overseen by a local government enforces laws within a community At an auto parts manufacturer, a foreman is allowed to use force to speed up workers so quotas are met. A utopian society where no use of force is necessary
A police force overseen by a local government enforces laws within a community
What is conducted in the process design step of business process management? The business process execution language engine is run. Activities are examined and divided into their individual components. Managers track the individual components of the process as well as the process as a whole. Analysts use flowcharts and other tools to depict workflow.
Activities are examined and divided into their individual components.
What is conducted in the process modeling step of business process management? Analysts use flowcharts and other tools to depict workflow. The business process execution language engine is run. Activities are examined and divided into their individual components. Managers track the individual components of the process as well as the process as a whole.
Analysts use flowcharts and other tools to depict workflow.
Which stage of the project management process involves constantly monitoring the progress of the project and the project's resources? Closure Stage Execution Stage Optimization Stage Implementation Stage
Execution Stage
Named for the man in Greek mythology who flew too close to the sun, the ________ drone can deliver urgent medical supplies to remote areas. AENEAS ACHILLES ICARUS ODYSSEUS
ICARUS
________ is software with processing capabilities outside of what the operating system of the consumer provides. Eveningwear Processing wear Middlewear Computer wear
Middlewear
Software that businesses use to manage activities in both the internal and external operational environment is known as Enterprise Resource Planning. Packet. Production. Processing.
Planning
Professor Michael E. Porter published "How Competitive Forces Shape Strategy" in the Harvard Business Review. In this paper, he described how all organizations must develop plans to deal with certain factors if they wish to succeed, or even continue to exist. These became known as the red/blue ocean strategy. the disruptive innovation model. Porter's generic business strategies. Porter's 5 Forces.
Porter's 5 Forces.
What is the difference between production reports and forecasting reports about production? Production reports also fully track current levels of production. Only production reports show if production goals will be met. Forecasting reports also fully detail current production conditions. Only forecasting reports show if future expectations will be met.
Production reports also fully track current levels of production.
Cloud-based ERP solutions are usually offered as RFID. CMOS. SaaS. APP.
SaaS.
Which PESTEL factor can managers monitor by improving communications throughout the organization and gaining better perceptions of consumers' opinions using CRM software? Environmental Sociocultural Shareholder Economic
Sociocultural
Cloud-based ERP systems are a form of Software as a Sequence (SaaS). Software as a System (SaaS). Software as a Strategy (SaaS). Software as a Service (SaaS).
Software as a Service (SaaS).
Which of the following is the term for CRM analytics that provides information about where data erosion occurs and how the erosion can be minimized? Standardized Data Collection Processes End User Needs Demonstrated CRM Value Streamlined Data Collection
Standardized Data Collection Processes
During which step of business process management are bottlenecks and excesses in the engine identified? Step 1: process design Step 3: process execution Step 4: process monitoring Step 2: process modeling
Step 4: process monitoring
In the fifth and final step in business process management, managers adapt the process to enhance process performance. This is called the process optimization step. True or False
True
Allowing people to share a digital ledger across a network of computers, ________ uses computer code to create concatenated (linked together) blocks of transactions. MEM blockchain pulsar linkchain
blockchain
Using technology to transform a market or to create an entirely new market is called creating a(n) ________ innovation. inventive imaginative disruptive significant
disruptive
Have you ever misplaced your purse or wallet? This may be a thing of the past since some companies are developing personal identification purchasing capability using ________ software. retinal scan password facial recognition fingerprint recognition
facial recognition
Computing is considered "green" or environmentally responsible when it employs information technology (IT) specialists and technicians in developing countries. it lowers the immediate and long-term costs of operations, making them more sustainable. it reduces the consumption of natural resources and the associated environmental impact. it relies on smaller, less energy-intensive devices such as smartphones and smartwatches.
it reduces the consumption of natural resources and the associated environmental impact.
The amount of time it takes data to travel from devices to a data center and back is called latency. bandwidth. continuum. throughput.
latency.
What did Henri Fayol consider to be the main roles or responsibilities of a manager? planning, organizing, staffing, directing, and controlling processes developing principles of administration and directing their application analyzing requirements and making necessary changes to operations hiring, training, leading, disciplining, and firing staff as needed
planning, organizing, staffing, directing, and controlling processes
Remote desktop software uses the same technology as an Internet filter. is as susceptible to abuse as employee monitoring software. provides access to all networked devices from a separate computer. is a market leader in surveillance technology.
provides access to all networked devices from a separate computer.
A ________ is also known as a question. A request for information from a database. query form report table
query
The purpose of information policies in a database is to indicate the ________ used in the design. relationship data integrity rules
rules
What is Frederick Taylor's four principles of scientific management? task measurement, employee development, worker-manager collaboration, and management training task specialization, clear lines of authority, value of communication, and management training division of labor, strong organizational communication, employee retention, and team unity ethical productivity, task measurement, lean manufacturing, and division of labor
task measurement, employee development, worker-manager collaboration, and management training
What is the main purpose of content delivery networks (CDNs)? to house and allow access to an organization's internal data to automate content uploads to an organization's website to minimize the distance between website users and website servers to deliver updates to systems and individual computers
to minimize the distance between website users and website servers
The process of converting the format of data from one form to another is called data ______.
transformation
A program that appears to be legitimate but executes an unwanted activity when activated is called a DoS. trojan. sniffer. worm.
trojan.
In order to make understanding and interpretation of SQL queries easier, users have the ability to add comments. The symbol(s) that will tell SQL that an entry is a comment and should not be used in the query is(are) question mark: "?. "two dashes: "- -." the forward slash: "/. "asterisk: "*."
"two dashes: "- -."
Researchers at IBM are on the verge of using machine learning and artificial intelligence technologies to identify patterns in human speech that may be predictive of an eventual diagnosis of Alzheimer's disease. The system can produce data and conclusions within only a couple of minutes with an accuracy rate of ________, which is far better than the test currently used today. 71% 62% 50% 82%
71%
Which of the following is an example of the Hawthorne effect? A supervisor does not praise employees and frequently berates them, figuring they will be more productive if they fear him. An employer changes the office lighting so that it is bright and fluorescent and notices that employees' productivity increases. An employer reorganizes the office set up so that it has an open floor plan and replaces overhead fluorescent lights with dimmer desk lamps in order for the employees to have a more homey, collaborative environment to work in, which she believes will result in higher productivity. A supervisor who frequently gives feedback to the employees who report to her—both to praise them and to let them know areas where they can improve—notices that employee productivity rises.
A supervisor who frequently gives feedback to the employees who report to her—both to praise them and to let them know areas where they can improve—notices that employee productivity rises.
Which of the following are examples of spear phishing? A message containing a pornographic image is sent via Facebook Messenger app to female Facebook users. An email is sent to employees at a specific company, instructing them to click on a link. That link deploys malware to their device. Someone creates a fake Instagram profile using your name and photos and attempts to get all of your contacts to add the fake account as a friend. An email is sent to everyone with a Gmail email address providing a link to click on to update their PayPal account details.
An email is sent to employees at a specific company, instructing them to click on a link. That link deploys malware to their device.
The essential RDBMS functions; create, read, update, and delete data is collectively referred to as which acronym? CRDD CURD CRUD CRUDE
CRUD
________ involves identifying errors in data sets and removing/correcting these errors to ensure the data is accurate. Data governance Data scrubbing Data audits Data organization
Data scrubbing
In terms of information quality, define "relevance" as a factor. Data to be collected should be useful to the organization. Data should be well-structured and include all elements that were intended to be collected. Data should describe and associate with the real-world conditions that it is trying to describe. Data should be in the correct format and collected using legitimate techniques.
Data to be collected should be useful to the organization.
What occurs during the process optimization step of business process management? Managers adapt (modify) the process to enhance process performance. Analysts use flowcharts and other tools to depict workflow. Managers track the individual components of the process as well as the process as a whole. The business process execution language engine is run.
Managers adapt (modify) the process to enhance process performance.
What occurs during the process monitoring step of business process management? The business process execution language engine is run. Activities are examined and divided into their individual components. Managers track the individual components of the process as well as the process as a whole so that the performance of the engine can be measured. Analysts use flowcharts and other tools to depict workflow.
Managers track the individual components of the process as well as the process as a whole so that the performance of the engine can be measured.
How are managers' jobs expected to change as management information system (MIS) technology and tools improve? Managers will be freed from tasks performed by online services or staff using collaboration tools. New MIS tools and applications will make full-time managers less necessary to the organization. Many managers will want to move to small businesses, since they will adopt these technologies first. Managers will have to work harder to supervise and discipline increasingly tech-savvy employees
Managers will be freed from tasks performed by online services or staff using collaboration tools.
In terms of information quality, define "consistency" as a factor. Multiple versions of a single item of data should be the same. Legitimate techniques and formats should be used to collect data. Data should be available when needed. Data should describe real-world conditions.
Multiple versions of a single item of data should be the same.
When creating a field in a database, the field type specifies the type of ________ in the field. field integrity data input mask
data
A new app was released providing consumers with digital coupons for products the consumer indicates they frequently purchase. The app gives different users coupons with different values and shares purchasing as well as demographic information with the product manufacturer. Under what circumstances would the information sharing with product manufacturers be ethical? if the app ensured that their targeting was not discriminatory based on race, ethnicity, gender, age, or disability if the app's terms of service indicated who they would be sharing information with and what information would be shared if the app's terms of service indicated that different users would receive different discount values This scenario is never ethical.
if the app's terms of service indicated who they would be sharing information with and what information would be shared
Calculating reordering points and order quantity levels are key advantages of modern inventory management systems. project management systems. compensation management systems. recruitment and hiring management systems.
inventory management systems.
With a product differentiation strategy, a company charges more for its product than its competitors charge for theirs because: its product is unique in a way that justifies the higher price. it is marketed primarily to less-educated consumers. it is more expensive to manufacture, produce, and/or deliver. it is sold only in physical stores and thus considered exclusive.
its product is unique in a way that justifies the higher price.
Manufacturing practices that emphasize developing efficient and smooth supply lines and minimizing excess inventory, delays, and waste are lean techniques Taylor techniques. optimal techniques. excellent techniques.
lean techniques
Tesla's autonomous driving system has raised some concerns from industry experts. They fear the technology used in Tesla's vehicles lacks the use of ________, a critical component in most autonomous vehicles. robots cameras radar lidar
lidar
Relational databases use ________ called relationships between tables. links objects columns tables
links
What is a key advanced technology behind CRM analytics? online customer management database processing online analytical processing information aggregation
online analytical processing
Data that offers free access, distribution, and usage is known as _____ data.
open
Which element of the belief action outcome (BAO) framework explains the methods used to measure and monitor the belief and action steps of the framework? online sustainability outcome terminology action formation belief formation
outcome terminology
What type of firewall would filter messages coming from a specific, predefined IP address to a spam filter? Network Address Translation (NAT) packet filter Virtual Private Networks (VPNs) cloud-based firewall
packet filter
During the optimization process step of business process management, what are two key things manager look for in the process? bottlenecks and excesses labor excesses and supply shortages individual process performance and whole process performance potential slowdowns and savings opportunities
potential slowdowns and savings opportunities
What typically happens during Step 3 of business process management just before the execution process is fully automated? Processes are divided into individual components. Analysts examine the process using flowcharts and other tools. Decision makers compare engine output to previous business activity. The process is written using software called business processes execution language (BPEL).
Decision makers compare engine output to previous business activity.
What is the most likely reason that unstructured decisions are typically made by higher-level management? They are based on the organization's data. They influence the organization's success. They may involve individual judgment. They require strategic, long-term thinking.
They require strategic, long-term thinking.
Sales managers must identify the customer leads that best fit the company's goals. CRM assists in this aspect of a company's sales process, which is known as marketing reach-out. customer segmentation. customer qualification. customer retention.
customer qualification.
Over 50 percent of all innovative products fail in the market, while over 80 percent of the successors to the products succeed. This is a key tenet of ________ strategy. fast-follower first-mover differentiation rapid competition
fast-follower
In a database, data is organized in complex and meaningful collections specified by the database administrator. These collections are referred to as _____.
fields
What function allows managers the ability to search data sets for information that is needed for a given decision? data managing filtering sorting analyzing
filtering
What must be integrated into an organization's enterprise resource management solution to allow it to create and maintain regulatory and compliance information from a centralized location? financial management systems software customer resource management systems software supply chain management systems software program management systems software
financial management systems software
One important ________ is that the firm's employees will learn to use technologies to develop the new product, providing a competitive boost. fast-follower strategy blue ocean strategy first-mover advantage generic business strategy
first-mover advantage
Lieberman and Montgomery examined the advantages and disadvantages of being the first firm to enter a product into the market. They coined this phenomenon Multiple Choice creating market barriers. technological disadvantage. competitive head start. first-mover advantage.
first-mover advantage.
Data transformation is the process of converting the _____ of data. source format privacy scope
format
While ERP systems offer many competitive advantages to users, particularly those in upper management, a significant disadvantage is their difficulty in accessing data. high costs. inability to be customized. lack of a centralized database.
high costs.
Which level of share of wallet means that existing customers are spending more to purchase products or services from one organization than they are from direct or indirect competitors? medium share of wallet high share of wallet small share of wallet low share of wallet
high share of wallet
A PaaS vendor offers its clients the ability to quickly build a customer loyalty app that allows customers to earn points for every purchase. The client chooses what features they'd like the app to have from a predetermined list of choices. What is this an example of? software hosting mobile software development kit data analytics social and mobile capabilities
mobile software development kit
According to Professor Porter, a business must differentiate itself from its competitors. One method is to encourage customers to believe that an organization provides higher quality goods or better service, then the organization can charge a premium, or gain market share, or (ideally) both. For example, by placing a swoop icon on a sweatshirt, Nike is able to charge a higher price. This methodology is called oligarchy competition. monopolistic competition. pure competition. a monopoly.
monopolistic competition.
The first step in business process management, in which analysts often "storyboard" the processes in an attempt to view the entire system prior to investigating each component is called process design. process execution. process monitoring. process optimization.
process design.
The third step in business process management provides managers the ability to play the "what-if" game by changing input variables (abstract) decision making. This step is called process optimization. process execution. process monitoring. process design.
process execution.
In the fourth step in business process management, managers track the individual components of the process as well as the process as a whole so engine performance can be measured. This step is called process optimization. process monitoring. process execution. process design.
process monitoring.
What aspect of today's business environment is central to the need for robust transaction management processing systems? need to replace manual drafting and design proliferation of e-commerce-based organizations desire to track the stages of project fulfillment need to handle financial calculations to monitor performance
proliferation of e-commerce-based organizations
A qubit is a basic unit of information that is similar to the 0s and 1s (bits) that represent transistors in today's computers. Using qubits in processors and memory is called ________ computing. nuclear atomic quantum plasma
quantum
In the financial world, some Nigerian banks have used a fast-follower strategy. To reap benefits, they have quickly developed and marketed products introduced by Western banks. reorganized corporate structure to take advantage of a lean business process. modeled information systems practices after Chinese and American systems. debunked studies that found over 50 percent of new products fail in the market.
quickly developed and marketed products introduced by Western banks.
Structured Query Language (SQL)-specific queries use specific SQL ________ to execute the query. questions examinations requests statements
statements
Coca-Cola and PepsiCo dominate the soft drink market. However, during the 2000s, many customers switched from soft drinks to water, causing Coca-Cola and PepsiCo to develop Dasani and Aquafina. The ability of customers to switch from one product to an alternate product illustrates what Porter called the force of substitutes. competitors. customers. suppliers.
substitutes.
Collaboration software is designed to increase collaboration and productivity primarily by enabling team members to hold virtual meetings online via teleconferencing or video-conferencing features. be given access to each other's workspaces and files, for micro-management. view, edit, and add shared information in real time, from anywhere. complete their work using personal devices such as smartphones or tablets.
view, edit, and add shared information in real time, from anywhere.
5G cellular technology offers the promise of download speeds as high as 20 Gbps. This will likely require more antenna arrays with each antenna sending out ________ microwave signals. weaker longer shorter stronger
weaker
A software as a service (SaaS) system is designed to meet most organizations' needs for a business management system, with minimal startup costs. True or False
True
According to the National Institute of Standards and Technology (NIST) there are four cloud computing deployment models. Community cloud is a cloud deployment model where cloud infrastructure is provided to multiple business units within an organization. True or False
True
One of the technologies on which web services are based is XML. XML stands for Extensible Markup Language. True or False
True
Karl Benz invented the internal combustion automobile in 1885. More than a century before, Adam Smith had described how division of labor creates efficiencies. When Henry Ford set up Model T production on an assembly line in 1908, he combined technology and efficiency to produce an inexpensive automobile. Ford transformed the personal transportation market. Christensen called this process economies of scale. red ocean strategy. disruptive innovation. blue ocean strategy.
disruptive innovation.
A manager is using the organization's ERP software to generate a report that links its human resources data to its overall financial performance. What is one type of HR data that the ERP accounting module could factor into this report? employees' payroll and benefits employees' time-off requests employees' relationships with clients employees' reasons for leaving
employees' payroll and benefits
Gartner IT Services company predicts that by 2021, customer relationship management systems will be the single largest revenue area of spending in inventory control systems. corporate social media. enterprise software. market segmentation.
enterprise software.
One of the benefits of using a CRM system is that data can be analyzed and provided to assist in measuring the value that the future lifetime revenue an organization's customers will generate minus customer acquisition costs and customer retention costs. This value is referred to as customer revenue. equity. expenditures. enterprise.
equity.
The value that the future lifetime revenue an organization's customers will generate minus customer acquisition costs and customer retention costs is called customer gain. value. equity. investment.
equity.
What type of decision-making software can identify issues and find and implement solutions at transactional speed? expression high-velocity executive-speed momentum
high-velocity
What is the third step when applying multiple-criteria decision analysis (MCDA)? identify and select objectives and criteria identify available options describe the context calculate the values
identify and select objectives and criteria
What is an important step in integrating cloud computing into a business's IT structure? secure a dependable, high-speed Internet service train users in Internet security install appropriate software programs connect all individual computers to the client-server network
secure a dependable, high-speed Internet service
One of the first computer aided design programs ever developed was also among the first to be integrated into ERP systems. This popular program is MotoCAD. AutoCAD. Corel Draw. CADdie.
AutoCAD
Headquartered in Toronto, ________ has developed a software application that serves as an early warning system for identifying pandemics. Pfizer BlueDot Novartis Johnson & Johnson
BlueDot
IBM estimates the U.S. economy loses over $3.1 trillion per year as a result of white-collar crime. outdated business software. outdated computer hardware. bad data.
bad data.
The information technology (IT) architecture and infrastructure, software applications, programming languages, and storage technologies used for the collection, storage, analysis, and interpretation of meaningful data is referred to as the __ ecosystem.
data
What business management system seeks to streamline an organization's activities to prevent backlogs and inefficiencies? Human Resources Management (HRM) Customer Relationship Management (CRM) Business Process Management (BPM) Employee Benefits Management (EBM)
Business Process Management (BPM)
Of the following software packages integrated into an enterprise resource planning system, which one is used by engineers in the design process? CAD software HRM software CRM software SCM software
CAD software
What type of system is used to assist with processes that rely on a large number of inputs that frequently change? Mainframe client support servers Decision support system CorrectSupply chain management system Employee scheduling software
Decision support system
Which is the best explanation of why technology is highlighted in a PESTEL analysis? Training employees to use cutting-edge technologies is standard practice in modern organizations. An organization can increase its opportunities for success by developing new technologies. Failing to keep up with advances in technology can harm an organization's competitiveness. Technology has become the dominant sector of the economy in most countries worldwide.
Failing to keep up with advances in technology can harm an organization's competitiveness.
A virtual private network includes policies, procedures, controls, and hardware that work together to ensure cloud-based systems are secure, including data protection, regulatory compliance, customer privacy protection, and authentication rules for users and devices. True or False
False
Collaboration software leads to better collaboration by enabling people from across the organization and in the same time zone to share content in real time. True or False
False
The first step in business process management examines business activities and breaks them down into their individual components. This is called the process decomposition step. True or False
False
The third step in business process management provides managers with real-time (executable) decision making as well as the ability to play the "what-if" game by changing input variables (abstract) decision making. This is called the process modeling step. True or False
False
Trello is a collaboration hub that is composed of channels where teams and members of the organization can communicate, thus replacing email and making communication seamless. True or False
False
ERP software integrates several software packages into a single platform. Which of the following software packages stores employee compensation and performance information? HRM software CRM software PM software SCM software
HRM software
What is the goal of the process design step of business process management (BPM)? Design a plan for reducing staff. Design scenarios for changing input variables to processes. Identify redundancies and inefficiencies in existing processes. Breaks an organization into separate business units.
Identify redundancies and inefficiencies in existing processes.
How does a firewall work? It connects secure devices together on a network. It determines what Internet traffic can leave or enter a network or computer. It determines what Internet traffic can enter a network or computer. It forwards secure data packets from a computer to the network.
It determines what Internet traffic can leave or enter a network or computer.
What is the goal of the modeling step of business process management? Track both individual components of the process and the process as a whole. Identify redundancies in existing processes. Provide recommendations on handling labor and supply imbalances. Divide activities into individual components.
Provide recommendations on handling labor and supply imbalances.
What does the acronym RDBMS stand for? Records of Database Management Systems Redundant Database Management Systems Relational Database Management Systems Referential Database Management Systems
Relational Database Management Systems
In a data warehouse, data is analyzed using business intelligence (BI) tools, ________ clients, and a variety of analytics applications designed to interpret the data. MS Access SQL Window analytical applications
SQL
Data-driven decision making (DDDM) can be facilitated through a six-step processes of Ask, Prepare, Process, Analysis, Share, and Act. Which of these steps refers to creating visualizations and presentations for key stakeholders? Share Ask Act Analysis
Share
The first two steps in business process management (BPM) are examining the design of the process and modeling the process. What are the third and fourth steps of the process? Step 3: running the process; Step 4: monitoring the process Step 3: running the process; Step 4: initiating process improvements Step 3: monitoring the process; Step 4: initiating process improvements Step 3: initiating the process; Step 4: monitoring process improvements
Step 3: running the process; Step 4: monitoring the process
Which statement best describes how managers use management information systems to develop SWOT analyses? They use one of the many off-the-shelf SWOT management information systems that are designed to examine the key factors to success in their industry. They use multiple management information systems to examine the key factors that influence the internal strengths and weaknesses of any business. They use one or two management information systems to examine the key factors that shape the marketplace and identify any opportunities and/or threats. They use a custom SWOT management information system that is designed to evaluate the strengths and weaknesses of their internal processes and resources.
They use multiple management information systems to examine the key factors that influence the internal strengths and weaknesses of any business.
When designing a solution, why is it important to consider all outcomes? This will inform you of all of the resources you have available to you. This will help you determine the root of the problem by working backward from the best solution. This will allow you to create multiple plans in order to visualize all possible solutions. This will give you an understanding of what you know and what you don't know.
This will allow you to create multiple plans in order to visualize all possible solutions.
In the fourth step of business process management, managers measure the performance of the engine. This is called the process monitoring step. True or False
True
Recruiting and hiring management software is designed to help human resources managers accurately estimate an organization's recruiting, hiring, and training requirements. True or False
True
How does VPN software ensure that people accessing a network are authorized to do so? VPN software uses encryption to protect the users' credentials. VPN software links blocks of transactions connected to the user. VPN software authenticates users. VPN software establishes secure connections.
VPN software authenticates users.
Which component of a business management system can help a manager check and report on the company's current inventory? a predictive information system a database management system (DBMS) a decision-making information system a cloud-based software as a service (SaaS) system
a database management system (DBMS)
What type of software can be integrated with ERP software to record ledger journaling and billing in the same platform as other, related data? human resources customer relationship management accounting program management
accounting
Which type of business management system would best enable executives to quickly adapt to dynamic business environments by implementing their own changes? a software as a service (SaaS) system an on-premises system a custom, off-the-shelf option a custom, cloud-based solution
an on-premises system
When should an organization answer the question "Is this the highest priority security risk?" after hiring IT personnel before a cybersecurity risk assessment is conducted after data security strategies are created before data security strategies are created
before data security strategies are created
The role of a DBA is to ________ and maintain tables in a relational database. build partition assist block
build
Who are the users of an executive support systems (ESS)? professionals with extensive skills in computer and data technology owners of small- to medium-size businesses needing an overview of their business environments business leaders in charge of several functions or separate enterprises managers who need data analysis services for a specific function
business leaders in charge of several functions or separate enterprises
A key component, and major advantage, of an ERP is its low start-up costs. centralized database. ease of initial learning. low maintenance costs.
centralized database
What is the last step in the Five Whys? consult with members of the organization continue to ask why identify the current problem ask why the problem happened
consult with members of the organization
The key goals of data governance include rules for data use, requirement compliance, high-quality data, and _________. database objects cost reduction server space data scrubbing
cost reduction
The 3-step data visualization process consists of exploring the data sets for pattern, then planning for visuals, and finally analyzing your findings. getting feedback. filtering your data. creating your visuals.
creating your visuals
A cloud database infrastructure integrates computer hardware and operating system in an internet-based ________. taped center materials center report center datacenter
datacenter
A company has an excess of puffer jackets at the end of the season that it wants to sell quickly. In order to quickly sell this excess inventory, they send out emails to customers currently in their database. However, they want to determine what type of sale their customers find most motivating, so they send out three different emails with different discounts (BOGO free, 50% a purchase over $100, or free expedited shipping). The information gained during this campaign will be tracked, and customers who made purchases will receive similar email offers in the future. What type of CRM strategy is the company using? demonstrating the value of CRM standardized data collection processes end user needs maximizing customer value
demonstrating the value of CRM
With the increasing presence of Internet e-commerce sites, the force of customers has increased. decreased. disappeared. leveled off.
increased
According to Mintzberg, managers take part in what organizational role when they disseminate information and strategic objectives to their subordinates? decisional interpersonal relational informational
informational
A branch manager for a national car rental company is in the process of conducting a SWOT analysis for her location. Which of the 5 Ps can she examine using the company's inventory management system for its rental fleet? processes (activities that create value) plant (physical attributes or resources) purse (finances) past experiences (reputation)
plant (physical attributes or resources)
Data administrators are responsible for the ________ and procedures used to handle the information of an organization. Large companies use/implement the data management policies and procedures most often. strength policies development creation
policies
Currently, apps that run on the Cloud are ________ as compared to apps that run on local machines. Edge computing is a method of optimizing cloud computing systems by performing data processing at the edge of the network, near the source of the data and it is possible that cloud computing may take a back seat to edge computing. faster slower about the same much faster
slower