ist 305 final
The complete data set on a customer is called a:
360-degree view
________ is an unauthorized access point into a wireless network.
A rogue access point
_________ is a software development methodology that delivers functionality in rapid iterations which are usually measured in weeks.
Agile development
The characteristics of ERP systems include which of the following?
All of the these
Which of the following is not a function of functional area information systems?
Providing data from business events to the corporate database
The leading ERP software vendor is _________.
SAP
________ transmission systems can have a large coverage area but are expensive.
Satellite
_________ is a system in which any object, natural or manmade, has a unique identity and is able to send and receive information over a network without human interaction.
The IoT
Business analytics applications include:
all of these
Key features of transaction processing systems include:
all of these
A _________ is a set of related steps or procedures designed to produce a specific outcome.
business process
A _________ allows programmers to develop an application that includes its own environment and can run as it was developed regardless of the operating system on which it was deployed.
container
A(n) ___________ is software that helps companies acquire and retain customers.
customer relationship management system
__________ can perform two basic operations: 1) identifying previously unknown patters and 2) predicting trends and behaviors.
data mining
________ refers to efforts by unauthorized users to access data that are traveling over wireless networks.
eavesdropping
Examination and answering the question "what is the problem" occur in the ______ phase of the IDC.
intelligence
_________ reports summarize the performance of critical activities.
key indicator
In the case of ________, organizations obtain a license to implement a version of the software product and are then able to further customize it to suit their needs.
open source
________ refers to erratic shifts in orders up and down the supply chain.
the bullwhip effect
Methods that organizations use to interact with their customers are called:
touch point
A ________ is any business event that generates data worthy of being captured and stored in the organization's database.
transaction
A filter bubble is a result of a search in which a website algorithm guesses what a user would like to see based on information about the user.
true
Analytics in the National Basketball Association is a mapping and data visualization challenge.
true
Data mining is a statistical tool for descriptive and predictive analytics.
true
__________ decisions deal with "fuzzy", complex problems.
unstructured
The entire business analytics process starts with
a business problem
The major problem with RFID has been:
expense
Only IT people are involved in the SDLC.
false
Almost ________ of consumers are more likely to purchase from a site that offers ratings and reviews.
2/3
LTE is ________ cellular technology.
4G
Approximately ________ percent of consumers consult reviews before making an online purchase.
50
Analytical CRM systems provide ________ by analyzing customer behavior and perceptions.
BI
________ is a short-range wireless network.
Bluetooth
_________ systems support the front-office business processes, which directly interact with customers.
Operational CRM
_________ is a method of delivering software in which a vendor hosts the applications and provides them as a service to customers over a network, typically the internet.
SaaS
________ are an example of harnessing collective intelligence.
Wikis
A wiki is _________.
a Web site on which anyone can post material and make changes to already posted material
Evaluating the benefits of IT projects is more complex than evaluating their costs for which of the following reasons?
all of these
__________ analytics answers the question "what has happened".
descriptive
The ________ has to be managed to ensure sustainable business practices in the teak wood furniture industry.
entire supply chain
Human Resource departments only use social computing applications for recruiting purposes.
false
________ flows involve money transfers, payments, credit card information and authorization, payment schedules, e-payments, and credit-related data.
financial
Social ________ is the monitoring, collection, and analysis of socially generated data to make strategic decisions.
intelligence
________ flows are the physical products, raw materials, supplies, and so forth that flow along the chain.
material
________ CRM systems have source code that is available to developers and users.
open-source
If a company acquires IT applications from outside contractors or external organizations, it is called ________.
outsourcing
Netcasting is __________.
the distribution of audio files and video files
Your actual download speed is determined by ________.
throughput
The ___________ is comprised of a company's suppliers, suppliers' suppliers, and the processes for managing them.
upstream segment of the supply chain
_____ refers to applications and technologies for consolidating, analyzing, and providing access to vast amounts of data to help users make better business and strategic decisions.
Business analytics
________ integrate the planning, management, and use of all of an organization's resources and are designed to tightly integrate the functional areas of the organization.
Enterprise resource planning systems
Organizations are using social computing in which of the following functions?
Marketing Customer relationship management Human resource management ALL OF THESE!!!!
The reasons why so many IS software development projects do not deliver their potential value include all of the following except:
Poor definition of user requirements
Which of the following is true of prescriptive analytics?
Prescriptive analytics recommend one or more courses of action and show the likely outcome of each decision.
IT applications can be developed in which of the following ways?
all of these
To effectively manage by exception (i.e., use exception reports), the company must first create:
performance standards
In April 2015, Google announced its new wireless service, ________.
Project Fi
_________ feasibility determines whether the project is an acceptable financial risk and, if so, whether the organization has the necessary time and money to successfully complete the project.
economic
HR managers are using social tools to build relationships with __________.
employees
________ transmission systems have signals that pass through walls but they are susceptible to snooping unless encrypted.
radio