COB 204 Final
How can you use collaboration tools to improve team communication? Future reference. It's important because I'll be able to get a job and become marketable in my skill. Accountability, preservation, business analysis. Complete the work, on time, on budget; growth in team capability; meaningful and satisfying experience | communication; management; record lesson learned; documentation; intra-team support training; team building; reward accomplishment; create sense of importance
Complete the work, on time, on budget; growth in team capability; meaningful and satisfying experience | communication; management; record lesson learned; documentation; intra-team support training; team building; reward accomplishment; create sense of importance
Which of the following terms best describes the ability to use computing resources from the cloud that dynamically meet a customer's demand? elastic incremental programmatic portable pooled
Elastic
Who is CoB's Library Subject (Business) Liaison? Elizabeth Price Elizabeth Montgomery Elizabeth Taylor Elizabeth Newton
Elizabeth Price
A(n) __________ collects, processes, stores, analyzes, and disseminates information for a specific purpose. information network information technology information system business process database
Information System
Decisions are made at three levels (theoretically): What are decisions? Operational, managerial and strategic Managerial, strategically, open. Team building, doing, presentation.
Operational, managerial and strategic
If an employee chooses to dogfood their own product or idea, many believe that product or idea is likely to succeed. True False
True
The freemium revenue model offers users ______________. A basic service then charges for more features credit or points free service no adds
A basic service then charges for more features
A BYOD policy would most likely look like this: A BYOD policy would include specifications on what mobile device is permitted where and when. It would also include possible firewalls and restrictions on access to the wireless options within an organization A BYOD policy is written to meet the needs of the organization's business process and work flow BYOD means bring your own device and the policy requires that an individual bring their own device for their own personal use. A policy which provides a statement concerning employees' permission and responsibilities when they use their own device for organization business. This policy would include details on what is acceptable in use (when and where) as well as the advantage to the organization for choosing that respective policy
A policy which provides a statement concerning employees' permission and responsibilities when they use their own device for organization business. This policy would include details on what is acceptable in use (when and where) as well as the advantage to the organization for choosing that respective policy
What is a database management system (DBMS)? A program that incorporates databases to process information A software program that manages databases A program used to create, process, and administer a database. A management information system that creates their own database
A program used to create, process, and administer a database.
Why do we need a repository? Isn't there technology that makes raw data unnecessary? A repository is a collection of something: a database is a repository of data and a raw material repository is an inventory of raw materials. We will always need a repository to store our data, much like a library stores books, documents, media, etc. No, raw data is not unnecessary. Technology is the means by which we can create raw data repositories accessible and usable for future use. We need repositories to store information. Raw data is unnecessary. We need repositories to retrieve critical information that justifies competitive strategies, business process, hardware/software/mobile system solutions in order to generate value for research and development. A repository is a database of data and a raw material repository is an inventory of raw materials. No, raw data is not unnecessary.
A repository is a collection of something: a database is a repository of data and a raw material repository is an inventory of raw materials. We will always need a repository to store our data, much like a library stores books, documents, media, etc. No, raw data is not unnecessary. Technology is the means by which we can create raw data repositories accessible and usable for future use.
Why do we need a repository? Isn't there technology that makes raw data unnecessary? We need repositories to store information. Raw data is unnecessary. We need repositories to retrieve critical information that justifies competitive strategies, business process, hardware/software/mobile system solutions in order to generate value for research and development. A repository is a database of data and a raw material repository is an inventory of raw materials. No, raw data is not unnecessary. A repository is a collection of something: a database is a repository of data and a raw material repository is an inventory of raw materials. We will always need a repository to store our data, much like a library stores books, documents, media, etc. No, raw data is not unnecessary. Technology is the means by which we can create raw data repositories accessible and usable for future use.
A repository is a collection of something: a database is a repository of data and a raw material repository is an inventory of raw materials. We will always need a repository to store our data, much like a library stores books, documents, media, etc. No, raw data is not unnecessary. Technology is the means by which we can create raw data repositories accessible and usable for future use.
What is a database? An encrypted source of self-describing collections of integrated records A self-describing collection of integrated records. A byte is a character of data, which are grouped into columns, then fields, then rows and records, which represent a table or a file. A database is a platform for kids It's a product that everyone can access, not matter where they are. Global access and accessibility.
A self-describing collection of integrated records. A byte is a character of data, which are grouped into columns, then fields, then rows and records, which represent a table or a file.
What are examples of critical skills for nonroutine cognition? Systems thinking, collaboration Abstract reasoning; systems thinking; collaboration; ability to experiment Abstract reasoning, systems thinking, shuffling, collaboration Systems thinking, ability to experiment
Abstract reasoning; systems thinking; collaboration; ability to experiment
Which collaboration IS is right for your respective team? How do you know? How do you figure this out? My team only has one collaboration IS available Ask questions Accessibility, interoperability, pricing, ease of use, communicate! Ask questions. I already know and the company prescribed it.
Accessibility, interoperability, pricing, ease of use, communicate! Ask questions.
Why is content management and version control important during a project's life span? Accountability, preservation, business analysis. It's important because I'll be able to get a job and become marketable in my skill Accountability, documentation, iteration, feedback, reflection (lessons learned), time keeping (time management), responsibility Future reference.
Accountability, documentation, iteration, feedback, reflection (lessons learned), time keeping (time management), responsibility
Good project managers make sure that every team meeting ends with: Cake! An updated list of tasks, what's been done, what remains to be done, including who is responsible for getting each task done and the date by which he/she/they will get it done, and will schedule a next meeting, date/time A solid sense of accomplishment An updated list of tasks, what's been done, and will schedule a next meeting, date/time.
An updated list of tasks, what's been done, what remains to be done, including who is responsible for getting each task done and the date by which he/she/they will get it done, and will schedule a next meeting, date/time
What are the forces that make the Five Forces Model? Bargaining power of customers, threat of substitutions, bargaining power of suppliers, threat of new entrants, rivalry. Bargaining, threat, suppliers, customers, competitors Bargaining power of suppliers and customers, threat, competitors, new clients Bargaining power of competitors, threat of new entrants, comradery, suppliers
Bargaining power of customers, threat of substitutions, bargaining power of suppliers, threat of new entrants, rivalry.
What are the four primary purposes of collaboration? Learning, problem solving, team building Become informed; make decisions; solve problems; manage projects Making friends, outreach, decision making Team building
Become informed; make decisions; solve problems; manage projects
Web applications are typically limited by the capabilities of the ________.
Browser
Bridget was recently hired by a large consulting firm to advise clients on business process management and business strategies. Bridget's job title would most likely be: systems analyst CIO CMO Database administrator Business analyst
Business Analyst
What is the name of the software-industry standard of terms and graphical notations for documenting business processes? Systems Development Life Cycle (SDLC) Business Process Modeling Notation (BPMN) Object Management Group (OMG) Swim-lane layout
Business Process Modeling Notation (BPMN)
How do business processes generate value? Business processes generate value by developing a unique, one-of-a-kind product or service, and that has a high profit margin Business processes generate value based on the strategic selection of activities Business processes are a network of activities that generate value by transforming inputs into outputs. This includes strategically assessing the cost of both the input and output (or services, deliverables, raw materials), building a repository for the business, sales and marketing, customer service, and overall business process management.
Business processes are a network of activities that generate value by transforming inputs into outputs. This includes strategically assessing the cost of both the input and output (or services, deliverables, raw materials), building a repository for the business, sales and marketing, customer service, and overall business process management.
The Information Systems Audit and Control Association created a set of standard practices called _______ that are often used in the assessment stage of the BPM cycle. COBIV (control objects for variable and relational technology) COBIT (control objectives for information and related technology) COVIT (control objects for volatile and related technology) COVIB (control objectives for volatile and related technology)
COBIT (control objectives for information and related technology)
What are the components of an information system? (hint: the five-component framework) Data, information, things, knowledge. Framed by five-components, one is information/thing, a box, an electronic platform, an people. Computer hardware, software, data, procedures & people Hardware, software, data, information, security, risk
Computer hardware, software, data, procedures & people
What is firmware? Firmware is the outfit that Iron Man wears. Computer software that is installed into devices such as printers, print servers, and various types of communication devices; installed into special, read-only memory of such device Computer software firmly installed into communicated devices to perform a variety of tasks Firmware is computer software that is installed into devices such as hardware, software, and servers
Computer software that is installed into devices such as printers, print servers, and various types of communication devices; installed into special, read-only memory of such device
What are the problems of information silos? Limited information that leads to isolated decisions and a lot of money Money, time effort Information silos create problems with programming, marketing, design and reengineering Data duplication/inconsistency; disjointed processes; limited information and lack of integrated information; isolated decisions lead to organizational inefficiencies; increased expense
Data duplication/inconsistency; disjointed processes; limited information and lack of integrated information; isolated decisions lead to organizational inefficiencies; increased expense
Which of the following statements is TRUE about data marts? Data marts consist of metadata for data warehouses data marts are larger than data warehouses Data marts address the needs of a particular department or functional area of a business
Data marts address the needs of a particular department or functional area of a business
What is metadata? Data describes a database, it is always a part of a database Metadata is data and makes databases much more useful Data that describes data. Data about data. Data is meta. Meta Data.
Data that describes data. Data about data.
How is a data model transformed into a database design? Bargaining power of suppliers and customers, threat, competitors, new clients Design, conversion, relationships, and normalization Database design is the process of converting a data model into tables, relationships, and data constraints. It's complicated but includes: normalization and the representation of two kinds of relationships. A data model is transformed into a database design through normalization and analysis
Database design is the process of converting a data model into tables, relationships, and data constraints. It's complicated but includes: normalization and the representation of two kinds of relationships.
Creating an ERD would most likely take place in what phase of the SDLC? Maintenance Planning Design Implentation Analysis
Design
What are the characteristics of both Native and Web applications? Native applications use object-oriented languages, costly overhead, professional programmers, high skill levels and difficulty; Web applications use Web-based programs like html5, ccs3, etc; skill level is low to high; cost is usually low to high - depending on the application being developed. Native applications are high level, high cost, high end products; Web applications are low level, low-high cost, and a spectrum of end products Development languages, skill levels, user experience, cost, application distribution Development languages, developers, skill level required, difficulty, developer's degree, user experience, possible applications, dependency (interoperability), cost, application distribution
Development languages, developers, skill level required, difficulty, developer's degree, user experience, possible applications, dependency (interoperability), cost, application distribution
Susan is in charge of creating a Business Process Modeling Notation (BPMN) diagram for the procurement department. The diagram will represent the separate paths to be followed for an old supplier and a new supplier. Which of the following shapes should Melissa use to represent the question "old supplier?" which can be answered with a yesor no as applicable? diamonds squares rectangles circles
Diamonds
The Lexon Corporation has been growing rapidly over the last five years. Lexon manufactures, distributes and services specialty medical equipment such as MRI and CAT imaging and diagnostic machines. Lexon has been using cloud based software services for communications and office suite software and an in-house database and software package for manufacturing and inventory management. Customers are managed by another in-house database and software package that is separate from the manufacturing and inventory management IS. Lexon management has identified the need to replace the current system and integrate all of its business functions into onecohesive system with a central dataase. Lexon would need to adopt which information system to accomplish that goal? PAAS ERP SaaS EAI
ERP
If you were building a database and needed to present your client with an abstract model of the database's table structure, which data model would be easiest for the client to understand? Excel spreadsheet of potential tables in the database Entity-Relationship Diagram Five components model of an MIS Unified modeling language diagram
Entity-Relationship Diagram
Which of the following is a critical security function that should be addressed by the senior management of an organization? Establishing a security policy for the organization buying whatever IT needs for security purposes Monitoring employee use of the internet Creating a technical password policy
Establishing a security policy for the organization
Why is introduction to MIS the most important class in the College of Business? Skill Future business professionals need to be able to assess, evaluate, and apply emerging information technology to business; job security. You need the knowledge of this course to attain that skill. Professional growth, experience, advancement in the field. Because Prof. Brueckner teaches the course
Future business professionals need to be able to assess, evaluate, and apply emerging information technology to business; job security. You need the knowledge of this course to attain that skill.
Key points about procedures & people (re: collaboration, working in teams, team building, etc.): Group norms, workflow agreements, IS agreements, documentation needs/requirements, who is best at what task? Remember: you're not selecting just software, hardware, or an interface - your selecting your team, time, talent What are procedures? Hardware, software, data, procedures, people Project data and project metadata
Group norms, workflow agreements, IS agreements, documentation needs/requirements, who is best at what task? Remember: you're not selecting just software, hardware, or an interface - your selecting your team, time, talent
What should a secure and strong password include? chfr3nch4? Have at least 12 characters: 14 is event better; Not contain your username, real name, or company name, not contain a complete dictionary word in any language; Be different from previous passwords you have used; Contain both upper- and lowercase letters, numbers, and special characters fr3Nch42*! Be different from previous passwords you have used
Have at least 12 characters: 14 is event better; Not contain your username, real name, or company name, not contain a complete dictionary word in any language; Be different from previous passwords you have used; Contain both upper- and lowercase letters, numbers, and special characters
Which of the following operating systems is licensed by Apple?
IOS
Pat runs a small business in Harrisonburg. Pat has a database with about 500 client names and related information. Once a month, Pat sends out coupons and a newsletter to everyone in the database. Pat asks the clients' permission to be added to the database and promises not to share their personal information. Which ethical policy issue is best illustrated by this scenario? Information accuracy FERPA Information accountability Intellectual property protection Information privacy
Information Privacy
Which of these reflects the poorest definition of "information"? Information is data processed by summing, ordering, averaging, grouping, comparing, etc. Information is data presented in an organized, meaningful context Information is knowledge derived from data Information is data presented in a graph, chart, or table
Information is data presented in a graph, chart, or table
How Does the Internet Work? It works much like the U.S. postal system and includes these steps: packets, domain names, IP address, TCP, packets delivered It works much like the U.S. postal system and includes these steps: packets, domain names, IP address, IP address on packet, TCP, packets transported by carriers It works much like the U.S. postal system and includes these steps: pack it, address it, mail it, deliver it It works much like the U.S. postal system and includes these steps: Assemble packages, address the package, domain names, IP address, put address on packet, TCP, packets transported by carriers
It works much like the U.S. postal system and includes these steps: packets, domain names, IP address, IP address on packet, TCP, packets transported by carriers
Which of the following is a characteristic of an inter-enterprise information system? It decreases data duplication among departments It is flexible and easily adaptable to organizational changes Its systems affect multiple organizations It supports 10-100 users It translates between software programs within the same company
It's systems affect multiple organizations
Identify the three collaboration tool sets. Comprehensive, just sufficient, concise. Collaboration tool sets include three sets: 1) comprehension, 2) shared data, 3) contained metadata Clear, concise, comprehensive Minimal, good, and comprehensive
Minimal, good, and comprehensive
Thick-client v. thin-client applications: Thick-client applications generate much more value for an organization than thin-client applications. Thick-client is a term used for applications that are big; thin-client is a term used for applications that are much smaller. Native applications are thick-client applications; Web applications are also known as thin-client applications. Thick-client applications are native, very expensive and do not share common developer programming languages; thin-client applications are rather low cost - mid cost and will share common developer programming languages.
Native applications are thick-client applications; Web applications are also known as thin-client applications.
A(n)_____ is a collection of computing devices that transmit data to and receive it from each other over transmission lines or wirelessly. network operating systems application database processor
Network
Define Bell's Law The value of a network is equal to the square of the number of users connected to it The storage density on magnetic disks is increasing at an exponential rate. New class of computers establishes a new industry each decade. New platforms, programming environments, industries, networks, and information systems. The network connection speeds for high-end users will increase by 50 percent per year
New class of computers establishes a new industry each decade. New platforms, programming environments, industries, networks, and information systems.
How do organizations decide which competitive strategy is right for them? Organizations decide which competitive strategy is right for them by analyzing their competitors, cost analysis, value generation and preparing a document for review by the whole organization/departments/teams Organizations commonly use Porter's Four Competitive Strategies: cost, differentiation > industry-wide, focus; the organization can employ the cost or differentiation strategy across an industry, or it can focus its strategy on a particular industry segment Most organizations just guess, do not invest the time and just do it. An organization's competitive strategy is decided between corporate executives and board members, sometimes incorporating market and human resources for guidance
Organizations commonly use Porter's Four Competitive Strategies: cost, differentiation > industry-wide, focus; the organization can employ the cost or differentiation strategy across an industry, or it can focus its strategy on a particular industry segment
Which of these networks has the shortest physical range?
PAN (Personal Area Network)
Bluetooth is a common wireless protocol used to make _______ connections? DSL operative (distant, special, learning - operations) PAN (personal area network) A BYOD (bring your own device) policy to meet the needs of the organization's business process and work flow Network
PAN (personal area network)
Three fundamental cloud types: PaaS, IaaS, SaaS HTTP, HPPS, SQL Employers, Application developers, network architects Cloud Service, Users, Examples
PaaS, IaaS, SaaS
What are the basic processes for the Internet to work properly and successfully? Native applications are high level, high cost, high end products; Web applications are low level, low-high cost, and a spectrum of end products. Packet, IP, CP, TCP Pack it, stamp it, ship it, receive it Packets, domain names, IP address submission, then IP address authentication, TCP: Transmission Control Protocol review, shipment, carriers
Packets, domain names, IP address submission, then IP address authentication, TCP: Transmission Control Protocol review, shipment, carriers
What are the two types of data components for collaboration? People & software Information and background information Communication & leadership Project data & project metadata
Project data & project metadata
WeFlyFast, Inc. recently adopted a new cloud basedERP system for their aircraft maintenance division. As evidence found from a recent FAA audit, data deficiencies were found within the new system, specifically serial numbers of parts installed by mechanics are not recorded in the system. Current businessprocesses dictate that the part expediter should enter the serial number at the time when the part is issued to the work order, but the new system will not allow that process to occur. The differences between the organization's business process requirements and the application's capabilities are known as ________ employee resistance lack of collaborative management inability to adapt to new technology requirements gaps transition problems
Requirement Gaps
What are four server alternatives for BI publishing? Enterprise, BI server, Email or collaboration tool, databases AWS, Access, HANA, and Web server SharePoint, BI server, Email or collaboration tool, and Web server Dell, Cisco, Email or collaboration tool, BI server
SharePoint, BI server, Email or collaboration tool, and Web server
If the CPU is like the computer's "brain" what is RAM like? heart long term memory short term memory stomach
Short Term Memory
Define social networks: Social relationships among people with common interests Starbucks or libraries are social networks where people gather together to share information facebook, twitter, linkedIn, Pinterest, etc. A software that connects people
Social relationships among people with common interests
What are the four phases of project management? Meeting, communication, planning, deliverables. Identify the project, cost analysis, team building, production. Starting, planning, doing and finalizing. Enthusiasm, organization, fear, success.
Starting, planning, doing and finalizing.
A(n) ________ is a group of senior managers from the major business functions that works with the chief information officer(CIO) to set the information systems (IS) priorities and to decide among major IS projects and alternatives. Steering Committee IS department think tank inter-enterprise system discussion forum
Steering Committee
How does competitive strategy determine business processes and the structure of information systems? Business process and the structure of information systems are created based on competitive strategy. Competitive strategy is determined by the corporate executives or owners of a company which, in turn, determine the business processes and structure of information systems. Competitive strategy determines business process and the structure of information systems based on business analytics. Strategically identifying a business's respective value-generating activities and comparing those to various forms of return on investment (i.e., low-cost v. high-service). From there, one can determine the best business process and structure for their own information system infrastructure.
Strategically identifying a business's respective value-generating activities and comparing those to various forms of return on investment (i.e., low-cost v. high-service). From there, one can determine the best business process and structure for their own information system infrastructure.
What are three criteria for successful collaboration? Patience, communication, coordination. Successful outcome; growth in team capability; meaningful and satisfying experience Time management, getting the job done, relaxing. Meaningful and satisfying experience, growth in team capability
Successful outcome; growth in team capability; meaningful and satisfying experience
is the ability to model the components of a system and to connect the inputs and outputs among those components into a sensible whole that reflects the structure and dynamics of the phenomenon observed. Function modeling Systems Thinking Abstract reasoning Collaboration Experimentation
Systems Thinking
Place the following data concepts in order from largest to smallest. database, field, file file, database, field database, field, record table, record, field
Table, Record, Field
How can you use collaboration tools to manage shared content? Open the software package and use it in a way that meets my organization/group/team needs These tools can be used to: share content with no control; share content with version management; shared content with version control (user activity limited by permissions, document checkout, version histories, workflow control) The applications team use and means by which they share data depend on the type of content. But these tools can be used to: share content with no control; share content with version management; shared content with version control (user activity limited by permissions, document checkout, version histories, workflow control) Create restrictions, use, file version, accessibility, security
The applications team use and means by which they share data depend on the type of content. But these tools can be used to: share content with no control; share content with version management; shared content with version control (user activity limited by permissions, document checkout, version histories, workflow control)
Which of these is NOT an inherent risk for a company using social media? The company's business model may ultimately fail, because it's difficult to sustain from social media Loss of privacy when personal information is made public productivity may be reduced if employees spend too much time on it information may go rival and/or be misinterpreted, leading to embarrassment
The company's business model may ultimately fail, because it's difficult to sustain from social media
What is the Internet of Things (IoT)? It is the idea that objects are more and more becoming disconnected from the Internet and only accessible via mobile or virtual devices/machines. Internet of Things is when data are interconnected virtually. The idea that objects are becoming connected to the Internet so they can interact with other devices, applications, or services. The Internet of Things is a repository of data, products, services.
The idea that objects are becoming connected to the Internet so they can interact with other devices, applications, or services.
What is MIS? The management and use of information systems that help organizations achieve their strategies. MIS is not an IS nor is it IT Masters of Information Science Accountability, documentation, iteration, feedback, reflection (lessons learned), time keeping (time management), responsibility
The management and use of information systems that help organizations achieve their strategies.
Which of the following statements regarding operating systems is TRUE? The iOS operating system is best used for web servers and data warehouses Android is a mobile operating system licensed by apple Unix is a popular laptop operating system, because it's open source The most popular operating systems for personal desktops and laptops are Windows and Mac The operating system is the least important program that runs on a computer
The most popular operating systems for personal desktops and computers are Windows and Mac
Christy has just joined the IT department of Vericon. Vericon is in the process of evaluating the cost of software licenses for some of its operating systems and application software. Currently, Vericon licenses this software from two major software companies and pays around $10,000 per year for the licenses. One proposal is to adopt open source software such as Linux and other available application software that can replace the current, licensed software. The cost of the software will be negligible and it can be customized to better fit Vericon's needs. Christy is part of the team that is making this decision. What concern would Christy have regarding the adoption of open source software? The initial cost of the open source software will be higher than the yearly license of the current software The will be little or no outside technical support for the open source software The open source software will not be customizable to the degree that Vericon needs it to be The vendor for the current software may sue Vericon for switching to the open source software The current software lacks adequate internal support
The will be little or no outside technical support for the open source software
Which of the following statements is TRUE of business users who administer the development of information systems? They should refrain from specifying the system's requirement They should take an active role in the system's development They must have excellent project management skills They are usually skilled programers When the system falls, they must refrain from preforming tasks related to system recovery
They should take an active role in the system's development
A ________ is a person or an organization that seeks to obtain or alter data or other IS assets illegally, without the owner's permission and often without the owner's knowledge. threat key escrow cipher target vulnerability
Threat
How do web servers support the cloud? Thin Client & Hardware Three tier architecture: user tier, server tier, database tier Web servers are the foundation from which the cloud stores data that, in turn, create information to be used for business intelligence and marketing. I have no idea
Three tier architecture: user tier, server tier, database tier
What is a VPN? Is also an VPC, a virtual private cloud. A private cloud created to provide a private a secure virtual storage solution. A VPN uses the Internet to create the appearance of private, secure connections. Virtual private network that only YOU have access to.
Virtual private network that only YOU have access to.
What is the definition of the term application, as used in our textbook? a combination of hardware, software and collaboration that accomplishes a set of tasks a combination of hardware, software, and data components that accomplishes a set of requirements a solution applied to resolve risk assessment business processes, information systems, and applications
a combination of hardware, software, and data components that accomplishes a set of requirements
What is an intrusion detection system (IDS)? a computer network that burns fire wires and wireframes to protect data a computer program that detects data theft a system that detects intrusion a computer program that senses when another computer is attempting to scan or access a computer or network
a computer program that senses when another computer is attempting to scan or access a computer or network
What is a firewall? a computing device that prevents unauthorized network access artificial intelligence models a virtual wall that will put out fires a wall made out of fire
a computing device that prevents unauthorized network access
Define CRM a customer relationship management system is a package of applications and a full set of inherent processes for managing all the interactions with the customer, from lead generation to generation a customer relationship management system is a complex suite of applications, a database, and a set of incoherent processes for managing all the interactions with the customer a customer relationship management system is a set of application, databases, and a suite of inherent processes for managing all the interactions with the customer a customer relationship management system is a suite of applications, a database, and a set of inherent processes for managing all the interactions with the customer, from lead generation to customer service
a customer relationship management system is a suite of applications, a database, and a set of inherent processes for managing all the interactions with the customer, from lead generation to customer service
What is Online Analytical Processing (OLAP)? a reporting application that provides the ability to analyze online processes a reporting application that provides the ability to perform arithmetic operations a reporting application that provides the ability to calculate operations online a reporting application that provides the ability to sum, count, average, and perform other arithme-tic operations
a reporting application that provides the ability to sum, count, average, and perform other arithme-tic operations
What is an enterprise social network? a software platform that uses social media to facilitate collaboration/cooperation among people within an organization a folksonomy use of emergent software platforms within companies enterprise sport network
a software platform that uses social media to facilitate collaboration/cooperation among people within an organization
How do organizations plan the use of IS? they search the Internet collaborate in groups, strategize their purpose and implement based on internal needs align information systems with organizational strategy; maintain alignment as organization changes; communicate IS/IT issues to executive group; develop/enforce IS priorities within the IS department; sponsor steering committee meetings, planning sessions, working with upper management, buy-in from employees, write-off from investors
align information systems with organizational strategy; maintain alignment as organization changes; communicate IS/IT issues to executive group; develop/enforce IS priorities within the IS department; sponsor steering committee
What is cost feasibility? an assessment of the cost of an information system development project that compares estimated costs to the available budget a cost comparison for an organization to enhance revenue an assessment of cost to budget an assessment of an organization's cost
an assessment of the cost of an information system development project that compares estimated costs to the available budget
What is data administration? an organization-wide function that develops and enforces data policies and standards an organization wide function that redesign data policies and standards administering data performing administrative tasks with data
an organization-wide function that develops and enforces data policies and standards
What is a systems analyst? someone who is well versed in Porter's models and in the organization's strategies and who focuses primarily, on ensuring that sabine's processes and information systems meet the organization's competitive strategies someone who is analyzes information systems for organizations are IS professionals who understand both business and information technology someone who works for an organization
are IS professionals who understand both business and information technology
What does BPMN stand for? being purple manure networks business project management notations business process modeling notation (BPMN) big program management networks
business process modeling notation (BPMN)
Which of the following best describe "train the trainer"? businesses reduce expenses by having vendors sometimes train the organization's employees to become in-house trainers in training sessions businesses ha e vendors train the organization's employees to become in-house trainers in training sessions so they don't have to spend money in the future businesses train the organization's employees to become in-house trainers in training session via sending some employees to conferences and returning to train the rest of the staff businesses reduce expenses by having staff train each other via their strengths and weaknesses
businesses reduce expenses by having vendors sometimes train the organization's employees to become in-house trainers in training sessions
What does B2C stand for and what does it mean? business-to-client; means connecting users with a business business-to-consumer; a theory of selling mass products via social media to increase social capital businesses-to-consumer; is a theory of relationships to market products to end users business-to-consumer; is a theory of relationships to market ideas to internal users within an organization
businesses-to-consumer; is a theory of relationships to market products to end users
What are the basic types of business processes? Check inventory, check credit, approve terms Check inventory, approve special terms check inventory Check special terms, check credit, check inventory check inventory, check customer credit and approve special terms
check inventory, check customer credit and approve special terms
Walmart's automatic replenishment system, which enables the company to reduce inventory storage requirements, is an example of which competitive strategy? product differentiation innovation cost leadership focused differentiation operational efficiency
cost leadership
What are two critical security functions? creating security policy, risk management strong passwords and firewalls firewalls and strong security good business and ICT infrastructure
creating security policy, risk management
What are the three primary activities in the BI process? data acquisition, business intelligence analysis, publish results collecting data, analyzing the data, publishing findings data acquisition, business intelligence review, release findings retrieve data, business intelligence analysis, publications
data acquisition, business intelligence analysis, publish results
What are the phases in the systems development life cycle? system, requirements, management, implementation define system, determine requirements, design system components, implement system, maintain system design system, define system, implement and deploy system project management, team building, testing, security and sustainability
define system, determine requirements, design system components, implement system, maintain system
Possible problems with source data: fake data, missing values, consistent data, data not integrated, too much data fake data, false values, consistent data, unintegrated data, granular, dense dirty data, missing values, inconsistent data, wrong granularity and dense data dirty data, missing values, inconsistent data, data not integrated, wrong granularity, or too much data
dirty data, missing values, inconsistent data, data not integrated, wrong granularity, or too much data
Define ERP enterprise resources planning is a module of databases and a set of inherent processes for consolidating business operations into a single, consistent, computing platform ERP is enterprise resource planning enterprise resource planning is a suite of applications called modules a database and a set of inherent processes for consolidating business operations into a single, consistent, computing platform enterprise resource programs connect system "islands" via a new layer of software/system, enables existing applications to communicate and parse data, enables a gradual move to ERP
enterprise resource planning is a suite of applications called modules a database and a set of inherent processes for consolidating business operations into a single, consistent, computing platform
The five components of SMIS are... hardware, software, data, procedures, people hardware software, policies, people, data hardware, software, data, policies, people hardware, data people, policies, information
hardware, software, data, procedures, people
How should organizations respond to security threats? scream, shout, let it all out! have a written policy to include, at the minimum, what sensitive data the organization will store, how it will process that data, whether data will be shared with other origination, how employees and others can obtain copies of data stored about them, how employees and others can request changes to inaccurate data create an inventory of the data and hardware proactively, responsively, organizationally
have a written policy to include, at the minimum, what sensitive data the organization will store, how it will process that data, whether data will be shared with other origination, how employees and others can obtain copies of data stored about them, how employees and others can request changes to inaccurate data
Which is NOT a factor of security incident response? centralized reporting have an administrative management practice specific responses have a plan in place
have an administrative management practice
Which is not a factor of security incident response? centralized reporting specific responses have a plan in place have an administrative management practice
have an administrative management practice
The primary goal of enterprise social networks (ENS) is to _____________________. create a place for secured shared information improve communication, collaboration, knowledge sharing, problem solving, and decision making to ubiquitously watch sports networks better monitor the use of social media within the workplace
improve communication, collaboration, knowledge sharing, problem solving, and decision making
What causes incorrect data modification? obtaining unauthorized data that uses pretesting via email when computer criminals invade a computer system and replace legitimate programs with their own changing a key id from one database to another relational component incorrectly increasing a customer's discount or incorrectly modifying an employee's salary, earned days of vacation, or annual bonus
incorrectly increasing a customer's discount or incorrectly modifying an employee's salary, earned days of vacation, or annual bonus
What are content management systems (CMS)? information systems that manage content information systems that support the management and delivery of documents including reports, Web pages, and other expressions of employee knowledge information systems that manage our cultural systemics information systems that support the acquisition and delivery of documents including Web pages
information systems that support the management and delivery of documents including reports, Web pages, and other expressions of employee knowledge
Define hyper-social knowledge management: knowledge and content management at a hyper-level is the application of social media and related applications for the management and delivery of or-ganizational knowledge resources is the application of social media and related applications for the management of content management an application of social media and related applications that manage information
is the application of social media and related applications for the management and delivery of or-ganizational knowledge resources
What is a social media information system? a text messaging service. it's an IS that supports sharing of content among network of users IT use to support sharing of content among network of users SMIS
it's an IS that supports sharing of content among network of users
What does a chief security officer (CSO) do? manages security for all of the organization's assets: physical plant & equipment, employees, intellectual property and digital manages the internal and external security systems manages all the bouncers hired to protect a company's assets manages security
manages security for all of the organization's assets: physical plant & equipment, employees, intellectual property and digital
A student group that is working on a project is considered to be a collaboration if the ________. members work on different sections by themselves use outlook to send all communications by email turn in a single project document with all of the group members names on it members provide iterative feedback on each other's work
members provide iterative feedback on each other's work
The functions of a data warehouse are to: obtain data, cleanse data, organize data, parse data acquire data, clean it, store it, analyze it obtain data, cleanse data, organize and relate data, and catalog data acquire data, cleanse data, organize and relate data, publish it
obtain data, cleanse data, organize and relate data, and catalog data
What does a CTO do? they act like bouncers - they stand at the door and restrict entrance they manage security for your assets, personal needs and deliverables develop and program all the software and hardware needed for the success of a respective business often heads the technology group, evaluates new technologies, ideas and new capabilities and identifies those that are most relevant to the organization.
often heads the technology group, evaluates new technologies, ideas and new capabilities and identifies those that are most relevant to the organization.
What does EAI do? connect system "islands" via a new layer of software/system from a previous layer to enable existing applications to parse data n connect, view, analyze and interpret information collect an "island" of processes to leverage the capabilities of existing programs connect system "islands" via a new layer of software/system; enables existing applications to communicate and share data; provides integrated information; leverages existing systems; enables a gradual move to ERP
onnect system "islands" via a new layer of software/system; enables existing applications to communicate and share data; provides integrated information; leverages existing systems; enables a gradual move to ERP
How can information systems be used to improve process quality? performing an activity; augmenting a human who is performing an activity; controlling data quality and process flow change the process structure and resources changing both process structure and resources change the process resources
performing an activity; augmenting a human who is performing an activity; controlling data quality and process flow
What are the functions and organization of the IS department? plan, secure, acquire information plan use of IS to accomplish organizational goals and strategy; Manage outsourcing relationships; Protect information assets; Develop, operate, maintain computing infrastructure; Develop, operate, maintain applications. to plan, acquire, develop the information systems for an organization to secure the information of an organization from hacking
plan use of IS to accomplish organizational goals and strategy; Manage outsourcing relationships; Protect information assets; Develop, operate, maintain computing infrastructure; Develop, operate, maintain applications.
What are the two dimensions of process quality? process effectiveness and process evaluation process efficiency and process effectiveness process efficiency and process efficacy process efficiency and process evolution
process efficiency and process effectiveness
The purpose of data safeguards? No answer text provided. to protect against hacking protect databases and other organizational data databases protect organizational data
protect databases and other organizational data
A _____ is set of rules that applications on two communicating devices must follow to be able to exchange data. packet cloud protocol codec syntax
protocol
What does SLATES stand for? No answer text provided. search, links, authoring, tags, extensions, signals software, links, agile development, tags, extensions, symbols search, inks, agile development, timetables, engineering, signals
search, links, authoring, tags, extensions, signals
What does hardening refer to? adding an extra shell to a computer system server operating systems that have been modified to make it especially difficult for them to be infiltrated by malware hardening of a computer system to protect it from natural disasters making something more firm
server operating systems that have been modified to make it especially difficult for them to be infiltrated by malware
What are cookies? chocolate chip only a small disc that stores your data while you use the Web Cookie Monster's primary diet small files that your browser receives when you visit Web sites
small files that your browser receives when you visit Web sites
What are the basic reporting operations used by organizations? sorting, figuring, collecting, tallying, publishing sorting, filtering, grouping, calculating, formatting filtering, sorting, formatting, tallying sorting, filtering, project management, calculating, formatting
sorting, filtering, grouping, calculating, formatting
What is Brooks' Law? states that starting a project late requires adding more people states that adding more people to a late project makes it later a law that protects our streams and watersheds states that adding more people late in a project causes efficiencies
states that adding more people to a late project makes it later
What are the elements of an ERP system? supply chain, CRM, ERP, human resources supply chain, manufacturing, ERP, human resources, accounting supply chain, manufacturing, CRM, human resources, accounting supply chain, manufacturing, CRM, ERP, accounting
supply chain, manufacturing, CRM, human resources, accounting
What does SDLC stand for? sometimes dummies like cupcakes systems development life cycle (SDLC) sometimes I don't know systems developing living cycles
systems development life cycle (SDLC)
What is business process reengineering? a duplicative effort that may cost an organization time, management, resources (aka: $$$) the activity of redesigning a business process the activity of altering a business process and returning it to its original state the activity of altering existing and designing new business processes to take advantage of new information systems
the activity of redesigning a business process
What is crowdsourcing? usability testing quality control through the use of dynamic social media to generate a larger source of revenue. the dynamic social media process of employing users to participate in product design or product redesign.
the dynamic social media process of employing users to participate in product design or product redesign.
The traditional process for developing information systems is ________. product life cycle the systems development life cycle the rapid prototyping exercise the software testing life cycle systems designation likelihood conference
the systems development life cycle
What does a business analyst do? they analyze business strategies for an organization they are someone who is well versed in Porter's models and in the organization's strategies and who focuses, primarily, on ensuring that business processes and information systems meet the organization's competitive strategies they are well versed in all business models and protocols that align with their respective organization to ensure that business process and information systems meet the organization's competitive strategies collaborate with cross-functional teams on projects, analyze organizational data
they are someone who is well versed in Porter's models and in the organization's strategies and who focuses, primarily, on ensuring that business processes and information systems meet the organization's competitive strategies
What are human safeguards? they involve the people and procedure components of information systems these are the people we hire to kick your arse! they protect databases and other organizational data what do you mean? human safeguards? do they swim and sit on a high bench and, awkwardly, watch us swim?
they involve the people and procedure components of information systems
What is the role of knowledge management systems? to collect all the knowledge in the world so that we can go skateboarding FOREVER!!!! to prevent problems with sharing information/knowledge to enable employees to be able to use Knowledge possessed collectively by people in the organiza-tion; by doing so, both process quality and team capability improve to create value from intellectual capital and sharing that knowledge with employees, manag-ers, suppliers, customers, and others who need that capital.
to enable employees to be able to use Knowledge possessed collectively by people in the organiza-tion; by doing so, both process quality and team capability improve
How do organizations use business intelligence (BI) systems? to assess who else, in the same business sector, are doing the same thing or differently as you to help management problem solve and collaborate to help complete project management, problem solving and product descriptions to help complete project management, problem solving, deciding and informing in a collaborative way
to help complete project management, problem solving, deciding and informing in a collaborative way
What is the purpose of a social media policy? to ban freedom of speech to manage the risk of employee communication statement that charts employees' rights & responsibilities tells employees when and where they can use social media
to manage the risk of employee communication
What does UGC stand for and what is it? user-generated content is content on your SM site that is contributed by users, is the essence of social media relationships user-generated coffee is a cooperative agreement between the student body to brew and serve fresh grounds to others within the community user-generated components are the SM software used to build relationships user-generated content that is the sole essence of SM
user-generated content is content on your SM site that is contributed by users, is the essence of social media relationships
If you are an influencer in your social network, then ... you should have a bumper sticker that reads: INFLUENCER your opinion may force a change in others' behavior and beliefs you can change the world! you will bring in a lot of revenue for your company.
your opinion may force a change in others' behavior and beliefs