CIS 101 MOD 9
Which ecommerce classification encompasses online storefronts selling merchandise and services to consumers? a. B2B b. B2G c. B2C d. C2C
B2C
A major source of data for ___applications is gathered by loyalty programs. (Hint: Use the acronym.)
CRM (Customer Relationship Management)
______ applications provide optimal information when they encompass customer support, marketing, and sales. a. SCM b. CRM c. Supply chain d. All of the above
CRM (Customer Relationship Management)
___ has been described as "the central nervous system of an enterprise." (Hint: Use the acronym.)
ERP (Enterprise Resource Planning)
Data for SCM does not necessarily take into account customer demand for products. a. True b. False
False
Online auction sites such as eBay and FedBid are examples of B2G ecommerce. a. True b. False
False
The acronym ERP stands for enterprise real-time payment. a. True b. False
False (Enterprise Resource Planning)
As the design phase of an SDLC begins, programming languages, development tools, and application software needed for the new information system are purchased, installed, and tested to ensure that they work correctly. a. True b. False
False (Implementation Phase)
In DFD terminology, a data store is a process that changes data by performing a calculation, updating information, or sorting a list. a. True b. False
False (that is a "process", data store is a container that stores data)
A(n) ____ rating of 150,000 hours means that, on average, a device could function for 150,000 hours before failing.
MTBF (mean times between failings)
A(n) diagram shows the time needed to complete each project task and the critical path for the entire project. (Hint: Use the acronym.)
PERT (Program Evaluation & Review Technique)
An information system progresses through several phases as it is developed, used, and finally retired. These phases are usually referred to as the ____.
SDLC (System Development Life Cycle)
A(n) ____ provides a way to collect, process, store, display, modify, or cancel transactions.
TPS (transaction processing system)
Acceptance testing is designed to verify that the new information system works as required. a. True b. False
True
Technically, a supply chain stretches from raw materials and parts all the way to customer delivery. a. True b. False
True
The current standard for object-oriented documentation is referred to as ______. a. HTML b. UML c. XML d. DSS
UML (Universal Modeling Language)
At the end of the implementation phase of the SDLC, users verify that the entire system works as specified during a process called ___ testing.
acceptance
Iterative SDLCs are often referred to as "___ methods" because they allow flexibility as development progresses
agile
ERP modules support business activities such as sales, CRM, SCM, and _____________. a. product planning b. manufacturing and purchasing c. inventory control and distribution d. all of the above
all of the above
The scope of an information system includes which of the following? a. Computers, communications networks, and data b. People and products c. Policies and procedures d. All of the above
all of the above
The project team fulfills the main objective of the ____ phase by producing a system requirements report for a new or revised information system.
analysis
A(n) ___ development tool is essentially a software construction kit containing building blocks that can be assembled into the software for an information system.
application
During the design phase of an SDLC, if the project team selects a solution that requires custom programming, the team's systems analysts will create a set of ___ specifications
application
A data ___ is an incident in which personal data is viewed, accessed, or retrieved without authorization.
breach
The maintenance phase of an SDLC includes all of the following except _________. a. make backups b. revise as necessary to meet business needs c. optimize for speed and security d. convert data
convert data
An ecommerce shopping cart typically stores ____ on customer devices, making it possible to save cart data between sessions.
cookies
___ procedures, such as data backups, can reduce the effect of a virus that spreads throughout corporate computers.
corrective
Which type of security measure reduces the effect of an attack by using data backups, disaster recovery plans, and the availability of redundant hardware devices? a. Detection activities b. Corrective procedures c. Preventive countermeasures d. Deterrents
corrective procedures
System development can get sidetracked by feature ___.
creep
Some of the most secure ___ centers are located in old military bunkers.
data
A(n) ____ is a specialized facility designed to hold and protect computer systems and data.
data center
Using a(n) ___ support worksheet, the project team can assign scores to each criterion, weigh them, and compare totals for all solutions.
decision
In the ___ phase of the SDLC, a project team identifies several potential solutions and then selects the one that offers the most benefits at the lowest cost.
design
Which of the following is not part of the analysis phase of an SDLC? a. Develop a project schedule. b. Determine system requirements. c. Write requirements report. d. Study the current system.
develop a project schedule
A(n) ____ report contains information that is outside of normal or acceptable ranges.
exception
Data ___ diagrams are used with structured methodology, whereas object-oriented methodology uses tools such as use cases, classes, and sequence diagrams.
flow (DFD)
When a data breach occurs, affected consumers can initiate a(n) ___ alert.
fraud
___ is the fraudulent use of someone's personal information to carry out transactions.
identity theft
During the ____ phase of the SDLC, the project team supervises the tasks necessary to construct the new information system.
implementation
A(n) _____ system collects, stores, and processes data to provide useful, accurate, and timely information, typically within the context of an organization.
information
The facts and rules for an expert system are stored in a(n) ___ base.
knowledge
The process of designing, entering, and testing the rules in an expert system is referred to as __________. a. DSS b. decision modeling c. predicate attribution d. knowledge engineering
knowledge engineering
Dark data centers are an extension of ___________, which allows system administrators to monitor and manage servers using remote control software. a. colocation b. fuzzy logic c. lights-out management d. none of the above
lights-out management
Effective information systems are designed to support goals that help an organization carry out its ___ statement.
mission
Batch processing was replaced by ___ transaction processing systems in which each transaction is processed when it is entered.
online
Most modern transaction processing systems use ________ processing—a real-time method in which each transaction is processed as it is entered.
online
An ecommerce system collects a customer's credit card number, which is handed off to a(n) ___ gateway.
payment
The goal of the planning phase for an information system project is to create a(n) ____________. a. system development life cycle b. project development plan c. iterative SDLC d. systems analysis and design
project development plan
Which of the following is not a step that a data breach victim should take? a. Get informed about the breach b. Change passwords c. Activate a fraud alert d. Purchase a new computer or device
purchase a new computer or device
During the maintenance phase, three key concepts ensure good ___ of service: reliability, availability, and serviceability.
quality of service
A disaster ____ plan describes methods for securing data against disasters and sets guidelines for reconstructing lost data.
recovery
System ____ are the criteria for successfully solving problems identified in an information system.
requirements
In Wetherbe's PIECES framework, the S represents a(n) ____ problem that means the system is too difficult or inconvenient to use.
service
An expert system ___ is a software tool containing an inference engine and a user interface that developers use to enter facts and rules for a knowledge base.
shell
One type of decision support system, called an executive information system, is designed to provide senior managers with information relevant to ___ management activities such as setting policies, planning, and preparing budgets.
strategic
A(n) ___________ is the sequence of organizations, people, activities, information, and resources involved in moving a product or service from supplier to customer. a. payment gateway b. ecommerce application c. supply chain d. payment processing routine
supply chain
The application used by an information system to handle cross-docking logistics would be classified as ___ management.
supply chain
An executive information system is a type of decision ___ system.
support
Mid-level managers typically engage in ___ planning.
tactical
A(n) ___ system consists of hardware and application software designed to offer a complete information system solution.
turnkey
The design phase of an SDLC includes all of the following except _________. a. develop application specifications b. identify potential solutions c. write requirements report d. select hardware and software
write requirements report (analysis phase)
The planning phase of an SDLC includes all of the following except _________. a. producing a project development plan b. justifying the project c. writing a requirements report d. assembling the project team
writing a requirements report (analysis phase)