Business Information Systems Final
Report
A ____________ is a business document containing only predefined data for inline viewing or printing.
False
Just-in-time is a business model in which the suppliers manage the manufacturer's inventory based on pre-established service levels.
Pulling
The organization waits for an order, allowing the organization to initiate a ___________ sequence to move the order through the production process.
False
The primary use of online transaction processing (OLTP) systems is to define a set of reachable and exploitable vulnerabilities present in a database.
Put key business information into the hands of more decision makers
The purpose of a data warehouse is to ___________.
Justin works on the system to make the user interface more user-friendly.
A company has a five-member team in charge of the development and maintenance of its information systems. An information system is in place, and the team performs routine maintenance to keep it running smoothly. Which of the following scenarios is an example of perfective maintenance?
Systems benchmarking
A company has submitted a request for proposals to a number of vendors. It must now evaluate the proposals it has received. Which of the following methods can it use to compare the different systems?
The company's requirements for the new system are very specialized
A company needs a new information system to manage increasing customer orders and changing demands. The company's five-member informations system (IS) team is competent and capable of developing a new system, but decides against developing a system in-house. Which of the following, if true, would most weaken the company's decision?
True
A firewall is a part of a computer system designed to detect intrusion and prevent unauthorized access to or from a private network.
False
A honeypot is a computer, data, or network site that is used to penetrate other networks and computer systems to snoop or to cause damage.
False
A hot backup site is an empty warehouse with all necessary connections for power communication.
True
Analysts interview people informed about the operation and issues of the current proposed system.
True
A system that communicates across organizational boundaries is sometimes referred to as an inter organizational system (IOS).
Virtual private network
A(n) __________ is a network connection that is constructed dynamically within an existing network in order to connecting users or nodes
Decision support
A(n)_____________ system is a special purpose information system designed to provide assistance to organizational decision making related to a particular recurring problem.
False
Ad hoc queries are always saved because they need to be executed on a regular basis.
Procure-to-pay
An effective ____________ process can help obtain favorable conditions, reduce transaction costs, and, ultimately, create customer goodwill as it helps to efficiently fulfill customer orders.
True
An intelligent agent is also referred to as a bot.
Check customer's creditworthiness
An online retailer has finished creating a customer record. Identify the retailer's next step in an order-to-cash process.
True
Analytical customer relationship management (CRM) analyzes customer behavior and this provides the business intelligence necessary to identify new opportunities and to provide superior customer service.
Custom
Applications that are designed and developed exclusively for a specific organization are known as _____________ software.
True
Business analytics augments business intelligence by using predictive analysis to help identify trends or predict business outcomes.
Facts
Business case arguments based on data, quantitative analysis, and/or indisputable factors are known as arguments based on ___________.
The notion that if the system is not implemented, the firm will lose out to the competition or go out of business
Business case arguments based on fear are dependent on _____________.
True
By combining human intelligence and reasoning capabilities with technology's retrieval and analysis capabilities, visual analytics can help in decision making.
True
Collaborative customer relationship management enchanted communication by understanding customer history and current needs.
True
Companies that have successfully installed enterprise systems are found to follow a basic set of recommendations related to enterprise system implementations.
Human resource
Components which support employee recruitment, assignment tracking, performance reviews, payroll, and regulatory requirements are called ____________.
True
Control objectives for information and related technology (COBIT) is a set of best practices that helps organizations to maximize the benefits from their IS infrastructure and establish appropriate controls.
True
Customer relationship management systems collect data that can be mined to discover the next product line extension that consumers covet.
True
Data flows represent the movement of data through an organization or within an information system.
True
Data mining algorithms search for patterns, trends, or rules that are hidden in the data.
False
Destructive agents are malicious agents deigned by users to attack harmful viruses when they appear on an organization's system.
True
Electronic Data Interchange (EDI) refers to computer-computer communication without any human intervention.
False
Enterprise resource planning (ERP) core components support the primary external activities of the organization that deals with suppliers and customers.
Customer relationship management and supply chain management
Enterprise resource planning (ERP) extended components focus primarily on ____________.
False
Enterprise resource planning extended components support internal operations such as financial management, operation management, and human resource management.
They are intended to be cross-functional approaches to improve an organization.
How is business process management similar to quality improvement approaches such as total quality management?
Drive-by hacking
In __________, an attacker accesses the network, intercepts data from it, and even uses network services and/or sends attack instructions to it without having to enter the home, office, or organization that owns the network.
False
In a basic relationship, the buyer and the supplier set preferences and prices to benefit each other.
False
In an entity-relationship diagram, each data entity can have only one attribute that describes it.
False
In the make-to-stock process, raw materials, sub components, and accessories are procured based on forecasts, but actual manufacturing does not start until sales orders are received.
Issuing the purchase order
In the procure-to-pay process, the negotiation of price and terms is followed by ___________.
Receiving and stocking raw materials, parts, and products
Inbound logistics involves business activities associated with _________.
False
One of the traditional functional areas that companies are organized around is information systems management.
False
Information dissemination refers to the use of the Web duties to provide information for recruiting new members as well as utilizing more interactive internet technologies.
False
Insuring all the systems and information processing tasks is an essential part of risk acceptance strategy.
Easier to evolve and alter software to changing business needs when data and progress are independent
One of the advantages of a database approach is program-data independence. This means that it is ___________.
False
Operational customer relationship management system refers to the systems used for providing effective and efficient communication with the customer from the entire organization.
False
Patents generally refer to creations of the mind such as music, literature, or software.
True
Processing logic represents the way in which data are transformed.
False
Production scheduling leads to the development of a sourcing plan.
True
Purchasing an existing system from an outside vendor is referred to as an external acquisition.
False
Ransomware is a type of adware.
True
Requirements collection is the process of gathering and organizations information to understand how a proposed information system should function.
False
Salaries paid to employees are non-recurring costs.
Machine learning allows systems to learn by imitating humans.
Select the correct statement below.
False
Sequence discovery is used to list procedures to follow when handling a security breach.
True
Social media applications enable customers to quickly share both positive and negative information.
False
Spyware is electronic junk mail or junk newsgroup postings usually posted for the purpose of advertising some product and/or service.
True
Supply chain management improves the coordination of suppliers, product or service production, and distribution.
True
Systems designed to support decision making based on stable point-in-time or historical data are called information systems.
Control objectives for information and related technology (COBIT)
The ___________ is a set of best practices that helps organizations to maximize the benefits form their IS infrastructure and to establish appropriate controls.
Order-to-cash
The ___________ process entails the process related to selling goods or services.
Visual analytics
The combination of various analysis techniques and interactive visualization to solve complex problems is known as ____________.
True
The core business processes common to most business organizations are order-to-cash, procure-to-pay, and make-to-stock.
Vanilla
The features and modules that an enterprise system comes with out of the box are referred to as the ____________ version.
False
The first phase of the systems development lifecycle is systems design.
True
The make-to-order process uses the pull-based approach.
False
The only drawback of Extensible Markup Language (XML) is that it is not customizable.
False
The order-to-cash process entails subprocesses such as price and terms negotiations, issuing of the purchase order, receiving the goods, and receiving and paying the invoice.
True
The structure of data is typically captured in a data model.
False
The term dumpster diving refers to the task of modifying the operating system to remove manufacture of carrier restrictions in order to run applications other than those from the official store.
True
The total cost of ownership is focused on understanding not only the total cost of acquisition, but also all costs associated with ongoing use of maintenance of a system.
True
There are two major categories of enterprise resource planning (ERP) components - ERP core components and ERP extended components.
The Computer Fraud and Abuse Act
Violating data belonging to banks or other financial institutions is a crime in the United States. Which of the following legislations prohibits such violations?
A Trojan horse
When Shelly downloaded an arcade game from an unknown internet web site, an unauthorized connection unknown to Shelly was established with her computer. The arcade game is most likely to be __________.
Biometrics
When a company uses a fingerprint recognition system instead of access cards, it helps the company prevent unauthorized physical access. Which of the following technologies is used to authentication here?
Order-to-cash
Whenever an order is placed with online retailers, the retailers put together the order, ship it, and charge the payment to the customer's credit card. This process of selling a product or service is known as the ___________ process.
The development firsts of custom software are much higher than for packaged software because of the time, money, and resources that are required to design, develop, and support them.
Which do the following statements is true of packages and custom software? (Not true: packaged software are applications that are designed and developed exclusively for a specific organization, customer software is cost effective since the vendor that builds the application can spread out development costs through selling to a large number of users, packaged software is well suited for tasks that are unique to a particular business, custom software is highly useful for standardized repetitive tasks, such as writing a report or preparing a presentation)
Commercial aircrafts
Which of the following goods are produced using the make-to-order approach? (Not: home appliances, televisions, air conditioners, or refrigerators)
Very expensive low-volume goods
Which of the following goods are typically produced under a make-to-order approach?
Business report
Which of the following is NOT a type of report generated by businesses? (Key-indicator report, drill-down report, exception report, scheduled report, business report)
Operations and manufacturing
Which of the following is a core activity according to the value chain model?
Make-to-stock
Which of the following is a core business process?
Firewall
Which of the following is a part of a computer system designed to detect intrusion and to prevent unauthorized access to it from a private network?
BelAir buys a system from the vendor who offers the cheapest prices.
Which of the following is an example of a basic relationship between an outsourcing vendor and client?
Problem specificity
Which of the following is the main advantage of customizable software over off-the-shelf software?
Enterprise systems implementations should include personnel from different departments.
Which of the following is true regarding the formulas for success of an enterprise system?
Sarbanes-Oxley Act
Which of the following laws makes it mandatory for organizations to demonstrate that there are controls in image to prevent misuse and detect any potential problems?
They are garners that automatically perform a task for a user.
Which of the following statements is true about user agents?
The development costs of custom software are much higher than for packaged software because of the time, money, and resources that are required to design, develop, and support them.
Which of the following statements is true of packaged and custom software? (Not true: custom software is highly useful for standardized repetitive tasks such as writing a report or preparing a presentation, packaged software is well suited for tasks that ere unique to a particular business, custom software is cost effective since the vendor that builds the application can spread out development costs through selling to a large number of users, packaged software are applications that are designed and developed exclusively for a specific organization)
Tacit knowledge assets reflect the processes and procedures that are located in a person's mind on how to effectively perform a particular task.
Which of the following statements is true? (Not true: a knowledge management systems is based on a single technology to codify a database, knowledge management systems are extremely hard to use especially when entering and retrieving data, the successful deployment of a knowledge management systems should be linked to numerous business objectives, explicit knowledge assets reflect knowledge cannot be documented)
Development of a request for proposal
Which of the following steps distinguishes external acquisition process from in-house development?
Warez peddling
__________ refers to offering stolen proprietary software for free over the internet.
Core
___________ activities are performed by the functional areas that process inputs and produce outputs.
Data reduction
___________ can be achieved by rolling up a data cube to the smallest level of aggregation needed, reducing the dimensionality, or diving continuous measures into discrete intervals.
Clustering
___________ is the process of grouping related records together based on having similar values for attributes.
Information systems security
___________ refers to precautions taken to keep all aspects of information systems safe from destruction, manipulation, or unauthorized use or access.
Proxy variables
____________ are alternative measures of outcome led that help clarify the impact a change will have on the firm.