MGSC 300 Final

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which of the following is most likely to make use of an enterprise information system?

Hospitals

28) ________ feasibility concerns whether a new information system fits within a company's customs, culture, charter, or legal requirements.

Organizational

8) Which of the following statements is true of systems development for bigger systems and longer projects?

The changes in requirements are increased.

6) Customer relationship management (CRM), as an application that must be included in a true enterprise resource planning (ERP) product, includes ________.

sales prospecting

8) ________ take computers with wireless connections through an area and search for unprotected wireless networks.

wardrivers

________ is the worldwide leader of enterprise resource planning (ERP) vendors.

SAP

5) Social media (SM) ________ utilize SM sites to build social relationships.

users

10) Which of the following statements is true of an enterprise resource planning (ERP) database?

An ERP solution includes initial configuration data.

55) ________ testing is the process of allowing future system users to try out a new system on their own.

Beta

________ is the activity of altering the existing business processes and designing new ones to take advantage of new information systems.

Business process reengineering

10) ________ is data about relationships.

Connection data

Personal information systems are most likely to be used by ________.

Drug Salespersons

31) Which of the following statements is true of the types of organizations that use enterprise resource planning (ERP)?

ERP vendors started selling ERP solutions to distributors after their success with the manufacturing industry.

42) Which of the following statements is true of social customer relationship management (CRM)?

Each customer crafts his or her own relationship with a company.

________ is a suite of software applications that consolidates existing systems by providing layers of software that connect applications together.

Enterprise application integration (EAI)

________ is a suite of applications, a database, and a set of inherent processes for consolidating business operations into a single, consistent computing platform.

Enterprise resource planning

Profitability of a supply chain increases if all the organizations in the supply chain operate at their maximum profitability. (T/F)

FALSE

7) ________ activities include payroll, time and attendance, and benefits administration that must be integrated into applications in order to form a true enterprise resource planning (ERP) product.

Human resource

14) Which of the following factors influences supply chain performance by affecting the ways that organizations in the supply chain request, respond, and update one another?

Information

Which of the following statements is true of inherent processes?

Inherent processes provide an alternative to business process reengineering.

________ are systems that are shared by two or more independent organizations.

Inter-enterprise information systems

Which of the following statements is true of the bullwhip effect?

It is a natural dynamic that occurs because of the multistage nature of the supply chain.

Which of the following statements is true of business process reengineering?

It is a very expensive process

1) Which of the following statements is true of an inter-enterprise system?

It is shared by two or more independent organizations.

46) Which of the following is a use of social media (SM) in human resources?

It is used for recruiting candidates.

3) Which of the following statements is true of systems development?

It requires business knowledge and an understanding of group dynamics.

13) Which of the following statements is true of inventory?

Managing an inventory requires balancing between availability and cost.

Which of the following statements is a characteristic of social media (SM) user communities?

Most users of SM belong to several different user communities.

57) In a ________ installation, an organization implements an entire system on a limited portion of the business.

Pilot

________ is the use of information technology to support the sharing of content among networks of users.

Social media

22) ________ is the difference between the sum of the revenue generated by the supply chain and the sum of the costs that all organizations in the supply chain incur to obtain that revenue.

Supply chain profitability

10) According to Brooks' Law, which of the following is a consequence of adding more people to late projects?

The costs of training new people can overwhelm the benefits of their contribution.

Information silos arise as a result of ________.

There is a lack of integrated enterprise information.

Which of the following is a problem posed by information silos?

There is a lack of integrated enterprise information.

67) Which of the following statements is true of social capital?

The value of social capital is determined by the number of relationships in a social network.

13) In the context of the five components of social media information systems (SMIS), which of the following statements is true of social media (SM) procedures?

They are informal, evolving, and socially oriented.

12) In the context of the five components of social media information systems (SMIS), which of the following statements is true of social media (SM) providers?

They store and retrieve SM data on behalf of users.

Which of the following is a characteristic of enterprise information systems?

They typically have hundreds to thousands of users

Which of the following statements is true of customer relationship management (CRM) systems?

They vary in the degree of functionality they provide.

2) The primary purpose of an enterprise resource planning (ERP) system is integration. (T/F)

True

2) ________ occurs when a threat obtains data that is supposed to be protected.

Unauthorized data disclosure

11) ________ occurs when computer criminals invade a computer system and replace legitimate programs with their own unauthorized ones.

Usurpation

Which of the following statements is true of workgroup information systems?

Workgroup information systems that support a particular department are sometimes called departmental information systems.

8) The process of maintaining a general ledger, which must be integrated into applications in order to form a true enterprise resource planning (ERP) product, is a(n) ________ activity.

accounting

68) A person gains social capital by ________.

adding more friends

28) Which of the following aspects that impact enterprise resource planning (ERP) differs among companies of different sizes?

availability of skilled IT staff

2) When compared to program development, systems development is ________.

broader in scope

The phenomenon in which the variability in the size and timing of orders increases at each stage up the supply chain is referred to as the ________.

bullwhip effect

44) Since its inception, social media (SM) has been widely used to market products to end users in ________.

business-to-consumer (B2C) relationships

5) Which of the following is a manufacturing activity that must be included in a true enterprise resource planning (ERP) product?

capacity planning

Juicebox Inc., a fruit juice processing company, has been facing irregular demand patterns for the last two years. These large fluctuations have created a bullwhip effect for the company. Which of the following steps will Juicebox Inc. most likely take to cope with this effect?

carry larger inventories

6) Social media (SM) ________ are formed based on mutual interests and transcend familial, geographic, and organizational boundaries.

communities

Enterprise resource planning (ERP) helps in ________.

consolidating business operations into a single, consistent computing platform

9) ________ refers to data and responses to data that are contributed by users and SM sponsors.

content data

56) System ________ refers to the process of changing business activity from an old information system to a new system.

conversion

43) ________ is a dynamic social media process of employing users to participate in product design or product redesign.

crowdsourcing

40) If a new system involves a new database or substantial changes to an existing database, then the development team will have to create a(n) ________.

data model

36) Backup and recovery against computer security threats are ________.

data safeguards

75) Thomas is responsible for creating backup copies of information in a system. He also works along with IT personnel to ensure that the backups are valid and that effective recovery procedures exist. Thomas is involved in establishing ________.

data safeguards

10) Which of the following occurs when millions of bogus service requests flood a Web server and prevent it from servicing legitimate requests?

denial of service

39) Which of the following is the most important phase in the SDLC?

determine the system's requirements

Which of the following is used as the measure of supply chain speed?

dollar value of goods exchanged in a given period of time

40) Social media's flow cannot be designed or diagrammed as it is very ________.

dynamic

48) ________ is the process of transforming clear text into coded, unintelligible text for secure storage or communication.

encryption

45) A(n) ________ social networking service like Yammer can be used to provide managers with real-time feedback about how to resolve internal operational inefficiencies.

enterprise

34) Which of the following is a technical safeguard against security threats?

firewall

9) Breaking into computers, servers, or networks to steal proprietary and confidential data is referred to as ________.

hacking

50) Most secure communications over the Internet use a protocol called ________.

https

9) In ________, many enterprise resource planning customers will be able to store most of their data on cloud servers managed by cloud vendors and store sensitive data on servers that they manage themselves.

hybrid models

52) During the ________ phase of the systems development life cycle process, developers construct, install, and test the components of the information system.

implementation

A(n) ________ exists when data are isolated in separated information systems.

information silo

1) A(n) ________ is a measure that individuals or organizations take to block a threat from obtaining an asset.

safeguard

9) According to Brooks' Law, adding more people to a late project ________.

makes the project later

4) Platforms that enable the creation of social networks, or social relationships among people with common interests, are offered by social media ________.

providers

6) In a traditional supply chain, distributors order products from ________.

manufacturers

Enterprise resource planning (ERP) was originally used in the ________ domain.

manufacturing

61) Which of the following styles of system conversion shuts off the old system and starts a new system?

plunge installation

33) Which of the following is a human safeguard against security threats?

procedure design

58) In a ________ installation, a new system runs alongside the old one until the new one has been tested and is fully operational.

parallel

59) Olive Inc., a chain of retail outlets, is converting its existing billing systems to a more robust online tool. In this process, the organization runs both the old and the new systems to compare their performances. In this case, the company is implementing the new system using ________ installation.

parallel

60) Which of the following is the most expensive style of system conversion?

parallel installation

4) A ________ pretends to be a legitimate company and sends emails requesting confidential data.

phisher

5) Mark receives an email from his bank asking him to update and verify his credit card details. He replies to the email with all the requested details. Mark later learns that the email was not actually sent by his bank and that the information he had shared has been misused. Mark is a victim of ________.

phishing

35) Which of the following is a data safeguard against security threats?

physical security

Inherent processes are ________.

predesigned procedures for using software products

3) A person calls the Stark residence and pretends to represent a credit card company. He asks Mrs. Stark to confirm her credit card number. This is an example of ________.

pretexting

36) Zim-ware, a kitchenware brand, recently started selling its products online. It plans to increase the sale of its products using e-commerce. Which of the following is Zim-ware most likely to experience as a result of this system change?

reduced costs of buying and selling

41) The easiest and cheapest time to alter an information system is in the ________ phase of the systems development life cycle.

requirements analysis

82) Which of the following are the three independent factors that constitute the enforcement of security procedures and policies?

responsibility, accountability, and compliance

The first phase in the customer life cycle involves ________.

sending messages to target audiences to attract customer prospects

7) ________ is a technique for intercepting computer communications.

sniffing

81) A ________ is a statement that delineates employees' rights and responsibilities in an organization.

social media policy

41) Value chains determine ________.

structured business processes

5) Which of the following refers to a network of organizations and facilities that transforms raw materials into products delivered to customers?

supply chain

47) Which of the following uses an individual's personal physical characteristics such as fingerprints, facial features, and retinal scans for verification purposes?

symmetric encryption

20) In the ________ phase of the systems development life cycle, developers use management's statement of the system needs in order to develop a new information system.

system definition

18) The ________ is the traditional process used to develop information systems.

systems development life cycle (SDLC)

Social media (SM) communities differ from regular communities because ________.

they are based on mutual interests of users

Physician partnerships most likely use ________.

workgroup information systems


Ensembles d'études connexes

BIO Chapter 2 Practice Questions

View Set

Statistics Chapter 8, stats ch 9, Stats Chapter 10

View Set

Chapter 4: The Spanish-American War

View Set

RE174 Ch 3 Duties & Responsibilities of Licensees

View Set

Homeowners: Section II Liability Coverage

View Set