ISDS 351 Final exam studyguide

¡Supera tus tareas y exámenes ahora con Quizwiz!

Open source software

--an alternative to contracting w/ service organizations to customize an ERP system, many organizations elect to implement __________ systems from vendors such as Compiere. --W/ this software, organizations can see & modify source code to customize - to meet their needs. --Such systems are much less costly to acquire & are relatively easy to modify to meet changing business needs.

Sourcing

-choosing suppliers and est contract terms to provide raw material needed to create products

Demand planning

-determining demand for company's products by taking into account all factors that can affect demand (ex: pricing, promotions, advertising activities; general economic conditions; actions by competitors & regulatory agencies; holidays; weather, etc) -Some organizations --implemented collaborative forecasting, planning, & replenishment process

supply chain management processes (5)

1. Demand planning 2. Sourcing 3. Manufacturing 4. Logistics 5. Customer service

Benefits of ERP systems

1. Improved access to Quality data for operational decision making 2. Improvement of work processes. 3. Elimination of Costly, Inflexible Legacy Systems 4. Opportunity to Upgrade and Standardize Technology Infrastructure 5. Simplified Consolidation of Financial Data

ERP databases (3):

1. production and supply chain management 2. customer relationship management & sales ordering 3. financial and managerial accounting

key features of CRM system (8)

Contact management Sales management Customer support Marketing automation Analysis Social networking Access by smartphones Import contact data

Logistics

Est network of warehouses for storing products; choosing carriers to deliver products to customers; & scheduling carrier pickups so that product is delivered to customers/warehouses on timely basis

Customer service

Improving customer experience & increasing customer satisfaction (ex: dealing w/ problems caused by over-shipments (customer receives more of a particular item than expected), short-shipments (customer receives less of a particular item than expected), & products damaged during transit

Manufacturing

Producing, testing, packaging, & preparing products for delivery; may involve use of contract manufacturers

best practices

They gather requirements of leading companies w/in same industry & combine them w/ findings from research institutions & consultants to develop set of _________—most efficient & effective ways to complete a business process

2. Which of the following limits network access based on an organization's access policy? a. A firewall b. A browser c. An antivirus software d. The concept of Reasonable assurance

a. A firewall

5. Which of the following enables rapid consolidation of financial data across multiple organizational units and countries? a. A well-implemented enterprise resource planning system b. A well-designed disaster management system c. A life cycle management system d. A risk management system

a. A well-implemented enterprise resource planning system

6. Which of the following statements defines an intrusion detection system (IDS)? a. An IDS is software and/or hardware that monitors system and network resources for breaches. b. An IDS indicates the presence of a specific virus. c. An IDS is a discipline that combines elements of law and computer science to identify, collect, examine, and preserve data from computer systems, networks, and storage devices. d. An IDS evaluates an organization's security policy.

a. An IDS is software and/or hardware that monitors system and network resources for breaches.

7. Which of the following best describes a cybercriminal? a. An individual who attacks a computer system or network for financial gain b. An individual who attempts to destroy the infrastructure components of governments and financial institutions c. An individual who is hired by an organization to test the security of its information systems d. An individual who hacks computers or Web sites in an attempt to promote a political ideology

a. An individual who attacks a computer system or network for financial gain

7. Which of the following data mining techniques uses a specialized set of algorithms that sorts through data and forms statistical rules about relationships among the items? a. Association analysis b. Drill-down analysis c. Case-based reasoning d. Neural computing

a. Association analysis

14. Which of the following business intelligence tools will help an organization to make business predictions? a. Data mining tools b. Online analytical processing tools c. Spreadsheet tools d. Drill-down analysis tools

a. Data mining tools

5. Identify the attack in which a malicious hacker floods a target site with demands for data and other small tasks. a. Distributed denial-of-service b. Phishing c. Logic bomb d. Smishing

a. Distributed denial-of-service

4. Identify the factor that has forced employers to monitor workers to ensure compliance with the corporate information technology usage policy. a. Increased legal liabilities b. Increased productivity c. Decreased leisure hours d. Increased peer discussion

a. Increased legal liabilities

12. Which of the following is true of a cookie? a. It captures browsing history for Web site customization and personalization purposes. b. It helps users to browse incognito by hiding their browsing data. c. It passes the session identification number to a web server every time a browser makes a hypertext transfer protocol request. d. It saves shortcuts to Web sites and navigates to them within a few seconds.

a. It captures browsing history for Web site customization and personalization purposes.

8. Which of the following defines law? a. It is a system of rules enforced by a set of institutions that states what a person can and cannot do. b. It is a set of principles and core values that are essential to ethical work and governs a practitioner's behavior. c. It is an individual's beliefs about right and wrong. d. It is a set of beliefs about right and wrong behavior that are universally accepted.

a. It is a system of rules enforced by a set of institutions that states what a person can and cannot do.

11. _____ is the principle that requires Internet Service providers to treat all Internet traffic from various sources in an unbiased manner. a. Net neutrality b. Internet of Things c. Cryptography d. Cloud computing

a. Net neutrality

20. Which of the following exploits when downloaded onto a smartphone takes control of the device and its data until the owner agrees to pay a sum of money to the attacker? a. Ransomware b. Scareware c. Camware d. Spyware

a. Ransomware

15. Identify the framework developed by the U.S. Department of Commerce and the European Commission to ensure that U.S. companies don't experience interruptions in their dealings with countries in the European Union. a. Safe harbor b. Net neutrality c. Terms of Use d. Struts

a. Safe harbor

15. In the context of computer crimes, those who attempt to destroy the infrastructure components of governments and financial institutions are known as _____. a. cyberterrorists b. hacktivists c. white hat hackers d. black hat hackers

a. cyberterrorists

19. Conducting a thorough assessment to document what sensitive information an organization is collecting, where it is stored, how long it is kept, who has access to it, and how the organization is using this data is one of the critical tasks in establishing an effective _____ program. a. data privacy b. data structuring c. data recovery d. data piracy

a. data privacy

6. A(n) _____ operates via an integrated database, using one set of data to support all business functions. a. enterprise resource system b. equipment management system c. customer relationship management system d. threat detection system

a. enterprise resource system

7. Social networking users are prone to _____. a. identity theft b. advanced persistent threat c. cyberterrorism d. cyberethics

a. identity theft

15. Metrics that consist of a direction, measure, target, and time frame are known as _____. a. key performance indicators b. drill-down analysis indicators c. online analytical processors d. key association indicators

a. key performance indicators

14. A thorough _____ should test system safeguards to ensure that they are operating as intended. a. security audit b. software audit c. internet audit d. cost audit

a. security audit

1. Data that does not fit nicely into relational databases is known as _____. a. unstructured data b. structured data c. ultra-structured data d. highlighter data

a. unstructured data

Contact management

ability to track data on individ customers & sales leads & access that data from any part of organization

how is goal of ERP system achieved

achieved by building one single database that is accessed by multiple software modules ----provide support for key business functions for diff areas of an organization

6. The _____ represent the international consensus regarding the collection and management of personal information. a. European Union Data Protection Directives b. 1980 Organization for Economic Cooperation and Development (OECD) privacy guidelines c. 1965 Organization for Data Brokering and Doxing (ODBD) privacy guidelines d. Code of Fair Information Practices

b. 1980 Organization for Economic Cooperation and Development (OECD) privacy guidelines

1. Who is appointed by an organization to define, implement, and oversee a set of data privacy policies? a. A Data warehouse Officer (DWO) b. A Chief Privacy Officer (CPO) c. A Database Privacy Officer (DPO) d. A Chief Operations Officer (COO)

b. A Chief Privacy Officer (CPO)

19. _____ is a program in which malicious code is hidden inside a seemingly harmless program. a. A spam b. A Trojan horse c. A smish d. A distributed denial-of-service attack

b. A Trojan horse

1. Which of the following is created and issued by software engineers to remove a system vulnerability? a. A constraint b. A patch c. A license d. A key

b. A patch

16. How does an enterprise resource planning (ERP) system achieve its goal of enabling easy access to business data & creating efficient, streamlined work processes? a. By conducting collaborative live meetings or presentations over the Internet b. By building a single database that is accessed by multiple software modules c. By broadcasting video and audio using streaming media and Webcasts d. By building several databases that are accessed by a single software module

b. By building a single database that is accessed by multiple software modules

20. Which of the following can increase the productivity of a designer, improve the quality of design, and create a database that describes a product? a. Web site hosting b. Computer-aided design c. An electronic bulletin board d. Tacit-aided design

b. Computer-aided design

16. Identify the system implemented by organizations to collect and store key data from every interaction they have with a customer. a. Enterprise resource management b. Customer relationship management c. Business intelligence management d. Access information management

b. Customer relationship management

10. _____ involves the deployment of malware that secretly steals data in the computer systems of organizations. a. Smishing b. Cyberespionage c. Vishing d. Cyberterrorism

b. Cyberespionage

8. _____ is a business intelligence (BI) tool used to explore large amounts of data for hidden patterns to predict future trends and behaviors for use in decision making. a. Drill-down analysis b. Data mining c. Data governance d. Online analytical processing (OLAP)

b. Data mining

10. Identify the tactic through which an individual obtains information about an individual from data brokers and threatens to expose the victim's personal details unless a ransom is paid. a. Hacking b. Doxing c. Spamming d. Cracking

b. Doxing

18. The _____ prohibits the transfer of personal data to non-European Union nations that do not meet the European adequacy standard for privacy protection. a. Code of Fair Information Practices b. European Union Data Protection Directive c. Organization for Economic Cooperation and Development privacy guideline d. European Data Transfer Act

b. European Union Data Protection Directive

9. Identify a true statement about the bring your own device (BYOD) business policy. a. It can provide data security. b. It can improve employee productivity. c. It creates a bug-free environment. d. It enhances employee interaction.

b. It can improve employee productivity.

16. Which of the following best describes the relational database model? a. It helps organize unstructured data into collections of three-dimensional tables. b. It helps organize structured data into collections of two-dimensional tables. c. It helps organize unstructured data into collections of two-dimensional tables. d. It helps organize structured data into collections of three-dimensional tables.

b. It helps organize structured data into collections of two-dimensional tables.

12. Identify a true statement about drill-down analysis. a. It is used to explore large amounts of data for hidden patterns to predict future trends and behaviors for use in decision making. b. It involves the interactive examination of high-level summary data in increasing detail to gain insight into certain elements. c. It involves pre-aggregation of detailed data into useful data summaries in anticipation of questions that might be raised. d. It performs operation on data based on user-defined formulas.

b. It involves the interactive examination of high-level summary data in increasing detail to gain insight into certain elements.

13. Which of the following defines computer forensics? a. It is the software and/or hardware that monitors system and network resources and notifies network security personnel when it detects network traffic that attempts to circumvent the security measures of a networked computer environment. b. It is a discipline that combines elements of law and computer science to identify, collect, examine, and preserve data from computer systems, networks, and storage devices. c. It evaluates an organization's security policy. d. It detects viruses in a computer system and quarantines them.

b. It is a discipline that combines elements of law and computer science to identify, collect, examine, and preserve data from computer systems, networks, and storage devices.

13. Which of the following is true of the First Amendment to the U.S. Constitution? a. It was adopted to protect Americans from unreasonable searches and seizures of properties. b. It was adopted to guarantee Americans' rights to freedom of religion, freedom of expression, and freedom to assemble. c. It was adopted to guarantee fair trial and other rights of the accused. d. It was adopted to prohibit people from excessive bail as well as cruel and unusual punishment.

b. It was adopted to guarantee Americans' rights to freedom of religion, freedom of expression, and freedom to assemble.

15. _____ is an enterprise business strategy that creates a common repository of product info & processes to support the collaborative creation, management, dissemination, & use of product & packaging definition info. a. Risk management b. Product life cycle management c. Supply chain management d. Accounting management

b. Product life cycle management

3. Which of the following is a process of supply chain management that chooses suppliers and establishes contract terms to provide the raw material needed to create a product? a. Advertising b. Sourcing c. Marketing d. Stocktaking

b. Sourcing

5. Which of the following policies should be agreed by a user before joining a social networking page? a. Profile update policy b. Terms of Use policy c. Privacy policy d. Information technology usage policy

b. Terms of Use policy

14. _____ enterprise resource planning system solutions are highly complex. a. Tier III b. Tier I c. Tier II d. Tier IV

b. Tier I

18. A(n) _____ is used to pull data from disparate data sources to populate and maintain a data warehouse. a. drill-down process b. extract-transform-load (ETL) process c. online analytical process d. hadoop process

b. extract-transform-load (ETL) process

20. A(n) _____ is a database management system that stores an entire database in random access memory (RAM). a. iSQL database b. in-memory database (IMDB) c. Hadoop memory system (HMS) d. Hadoop Distributed File System layer (HDFS)

b. in-memory database (IMDB)

3. A _____ organization can defeat a privacy claim simply by proving that an employee had been given explicit notice that email, Internet, and phone usage were not private and that their use might be monitored. a. public b. private c. voluntary d. nonprofit

b. private

16. Jack was shocked to witness the sudden drop in performance of his laptop. He also found that the screen saver constant changed and that the taskbar had disappeared. The given problems are symptoms of _____ infections. a. smishing b. rootkit c. bootkit d. phishing

b. rootkit

7. A large multinational firm with facilities in the United States and Mexico City has an annual revenue of $3 billion. This firm will be targeted by _____ enterprise resource planning (ERP) vendors. a. tier II b. tier I c. tier IV d. tier III

b. tier I

17. Which perpetrator violates computer or Internet security maliciously for illegal personal gain? a. A red hat hacker b. A gray hat hacker c. A black hat hacker d. A white hat hacker

c. A black hat hacker

12. Which of the following key features of a customer relationship management (CRM) system has the ability to evaluate customer data to identify ways to increase revenue and decrease costs and identify the firm's "best customers"? a. Sales management b. Automation c. Analysis d. Contact management

c. Analysis

3. Which of the following terms is used to describe a large group of computers controlled from one or more remote locations by hackers without the knowledge of their owners? a. Smishing b. Cyberespionage c. Botnet d. Spear-phishing

c. Botnet

1. _____ is the use of software to assist in the creation, analysis, and modification of the design of a component or product. a. Computer-aided engineering b. Computer-aided evaluation c. Computer-aided design d. Computer-aided manufacturing

c. Computer-aided design

3. Identify the technique through which an SQL database ensures that other transactions do not modify a database until the first transaction succeeds or fails. a. Redundancy control b. Access control c. Concurrency control d. Integrity control

c. Concurrency control

10. _____ present a set of key performance indicators about the state of a process at a specific point in time. a. Worksheets b. Timesheets c. Dashboards d. Spreadsheets

c. Dashboards

9. _____ involves the overall management of the availability, usability, integrity, and security of the data used in an organization. a. Data authentication b. Data authorization c. Data governance d. Data endorsement

c. Data governance

17. Dove, a famous book publisher has decided to publish a new book in the international market. He needs to determine the interest readers may have in his new book, & he needs to determine the pricing & advertising strategies accordingly. Which process of supply chain management can help the publisher determine the # of books to print? a. Customer service b. Logistics c. Demand planning d. Sourcing

c. Demand planning

11. _____ is a powerful tool that enables decision makers to gain insight into the details of business data to better understand why something happened. a. Stingray b. Online analytical processing (OLAP) c. Drill-down analysis d. Data mining

c. Drill-down analysis

17. The Supreme Court has ruled that American citizens are protected by the _____ when there is a "reasonable expectation of privacy." a. Third Amendment b. Second Amendment c. Fourth Amendment d. First Amendment

c. Fourth Amendment

2. Which of the following is true about an enterprise system? a. It provides users with a computing platform, including an operating system, a programming language execution environment, and a Web server. b. It integrates data, text, voice, and video into a single solution that includes instant messaging, calendaring, presence information, and video conferencing. c. It employs a database of key operational and planning data that can be shared with authorized users across the organization. d. It employs a dynamic method of solving different parts of a problem and then combining the solutions of the sub problems to reach an overall solution.

c. It employs a database of key operational and planning data that can be shared with authorized users across the organization.

18. In the context of general security risk assessment, which of the following is true of the concept of reasonable assurance? a. It recognizes the loss events or the risks or threats that could occur, such as a distributed denial-of-service attack or insider fraud. b. It determines the impact of each threat occurrence. c. It recognizes that managers must use their judgment to ensure that the cost of control does not exceed a system's benefits. d. It decides whether or not to implement a particular countermeasure against attacks.

c. It recognizes that managers must use their judgment to ensure that the cost of control does not exceed a system's benefits.

10. _____, a supply chain process, establishes a network of warehouses for storing products, chooses carriers to deliver products to customers, and schedules carrier pickups so that products are delivered to the customers or warehouses on a timely basis. a. Channeling b. Retail c. Logistics d. Schedule

c. Logistics

19. How are small & medium-sized enterprises (SMEs) benefited by the hosted software model? a. SMEs can create & edit Web page content freely using any Web browser. b. SMEs can create a digital media file and distribute it over the Internet using syndication feeds. c. SMEs can experiment w/ powerful software capabilities w/out making a major financial investment. d. SMEs can give away their core products for free to a large group of customers.

c. SMEs can experiment with powerful software capabilities without making a major financial investment.

6. Which of the following business intelligence tools performs operations on data based on formulas created by the end user? a. Data mining b. Drill-down analysis c. Spreadsheet d. Online analytical processing

c. Spreadsheet

11. _____ includes the planning, execution, and control of all activities involved in raw material sourcing and procurement, conversion of raw materials to finished products, and the warehousing and delivery of finished products to customers. a. Risk factor management b. Customer relationship management c. Supply chain management d. Operations management

c. Supply chain management

2. _____ is a network of physical objects embedded with sensors, processors, software, and network connectivity capability to enable them to exchange data with the manufacturer, operator, and other connected devices. a. The Internet of Regulations b. The Internet of Digital divide c. The Internet of Things d. The Internet of Data

c. The Internet of Things

14. Identify the term that is used to describe the gulf between those who do and those who don't have access to modern information and communications technology. a. Internet traffic b. Net neutrality c. The digital divide d. The change management continuum model

c. The digital divide

8. Which of the following enterprise resource planning system solutions is the most expensive to implement and support? a. Tier III b. Tier II c. Tier I d. Tier IV

c. Tier I

4. The ACID (atomicity, consistency, isolation, and durability) properties of SQL databases ensure _____. a. data security b. data severance c. data integrity d. data cogency

c. data integrity

13. In-memory databases (IMDBs) have become feasible because of the increase in _____ capacities. a. read-only memory (ROM) b. read-only memory (ROM) c. random access memory (RAM) d. random access memory (RAM)

c. random access memory (RAM)

20. Which of the following systems is used by law enforcement agencies to snap photos and document the location of vehicles? a. Dashboard recognizer b. Stingray c. Secure flight program d. Automatic license plate reader

d. Automatic license plate reader

2. _____ tools frequently operate on data stored in a data warehouse or data mart. a. Hadoop b. Prescriptive analytic c. Ransomware d. Business intelligence

d. Business intelligence

18. _____ is a key feature of a customer relationship management (CRM) system that provides the ability to track data on individual customers and sales leads & then access that data from any part of the organization. a. Desktop sharing b. Unified communication c. Asset management d. Contact management

d. Contact management

4. _____, a key feature of a customer relationship management system, is the ability to aid customer service representatives so that they can quickly, thoroughly, and appropriately address customer requests and resolve customer issues while collecting and storing data about those interactions. a. Customer analysis b. Marketing automation c. Contact management d. Customer support

d. Customer support

13. Which of the following is an advantage of the hosted software model? a. Highly customizable nature of the source code b. Increased efforts to manage the vendor c. Free usage of vendor's software d. Decreased total cost of ownership

d. Decreased total cost of ownership

8. _____ occurs when the personal information of an individual is stolen and used. a. Cyberespionage b. Cyberterrorism c. Trustworthy computing d. Identity theft

d. Identity theft

17. Identify the industry that implements data governance. a. Automobile industry b. Construction industry c. Agricultural industry d. Insurance industry

d. Insurance industry

12. _____ is the act of fraudulently using email to try to get the recipient to reveal personal data. a. Vishing b. Spoofing c. Smishing d. Phishing

d. Phishing

9. Mapua Corp., a multinational corporation based in Germany, has decided to relocate its business to Japan. It faces difficulties in transferring the personal data of its employees from Germany to Japan. Which of the following is causing this difficulty? a. The 1980 Organization for Economic Cooperation and Development (OECD) privacy guidelines b. The Code of Fair Information Practices c. The Code of Fair Transportation Security d. The European Union Data Protection Directive

d. The European Union Data Protection Directive

9. Which of the following is the goal of supply chain management? a. To acquire accurate, consistent, detailed, and up-to-date financial data at the end of an accounting period b. To introduce emergency preparedness and response in development programs for disaster-prone regions c. To reduce the risk of disasters caused by human error, deliberate destruction, and building or equipment failures d. To reduce the overall investment in inventory, decrease costs, and improve customer service

d. To reduce the overall investment in inventory, decrease costs, and improve customer service

19. Databases built to support online analytical processing (OLAP) consist of _____. a. data hubs b. data cards c. data marts d. data cubes

d. data cubes

5. A _____ is a database that stores large amounts of historical data in a form that readily supports analysis and management decision making in an organization. a. data profile b. data guard c. data structure d. data warehouse

d. data warehouse

11. In computing, a(n) _____ is an attack on an information system that takes advantage of a particular system vulnerability. a. bot b. exit door c. glitch d. exploit

d. exploit

4. The additional security option, used for credit card transactions, that keeps track of a customer's historical shopping patterns and notes deviations from the norm is _____. a. transaction-spam control software b. transaction incognito mode c. transaction identification code d. transaction-risk scoring software

d. transaction-risk scoring software

supply chain management goal

decrease costs and improve customer service, while at the same time reducing the overall investment in inventory in the supply chain.

goal of ERP system

goal is to enable easy access to business data & create efficient, streamlined work processes

Customer relationship management

helps a company manage all aspects of customer encounters (marketing, sales, distribution, accounting, customer service)

Supply chain Management

planning, execution, & control of all activities involved in raw material sourcing & procurement, conversion of raw materials to finished products, warehousing & delivery of finished products to customers.

Tier 1 vendors

→ target large multinational firms w/ multiple locations --annual revenue in excess of 1 bill → solutions: highly complex & expensive to implement & support; implementation - multiple locations -take yrs → primary vendors are Oracle & SAP

Tier II vendors

→ target medium-sized firms w/ annual revenue ($50 mill to $1 bill) - operating out of 1 or more locations --solutions: much less complex & less expensive to implement & support --two dozen or more vendors (Oracle, SAP, Microsoft, Infor, Epicor, & Lawson)

Tier III vendors

→ target smaller firms w/ annual revenue ($10 mill to $50 mill) -typically operate out of a single location --solutions: comparatively easy & inexpensive to implement & support --dozens of vendors (ABAS, Bluebee Software, Cincom Systems, Compiere, ESP Technologies, Frontier Software, GCS Software, Microsoft, Netsuite, PDS, Plex, & Syspro) *****Many of the tier I and tier II vendors also offer solutions for smaller firms***


Conjuntos de estudio relacionados

Chapter 63: Coordinating Care for Patients With Urinary Disorders

View Set

Chapter 16: Environmental Ethics

View Set

Lesson 9; Chapter 16:Health Care Choices

View Set

Med Surg. Chapter 47 Management of Patients With Gastric and Duodenal Disorders

View Set

Wk 4 – Practice: Topic 12: Posting Journal Entries and Preparing a Trial Balance Quick Check

View Set

chapter 25 sections 25.6 and 25.7 - Chemical Digestion & Absorption, The Large Intestine

View Set

Texas Pre-License - Principles Of Real Estate I- Fair Housing Laws

View Set