Information systems Today

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

According to the information presented in this video, all of the following activities are likely to occur in the information requirements determination phase of systems except

--beta testing

Based on the information provided in this video, which of the following usually happens in a denial-of-service attack

A hacker floods a Web server with so many requests that the server becomes unavailable to intended users

_________is a unique hacktivist because it doesn't have any formal leadership structure

Anonymous

According to this video, which of the following statements about enterprise resource planning systems (ERPs) is true

ERPs integrate data with a centralized database

Which of the following is commonly used by computer criminals to exploit human weaknesses by misrepresenting oneself to trick others into revealing information

Social engineering

___________is NOT considered a phase of the systems development life cycle

System conversion

The primary factor that contributes to enterprise system implementation failure is

a lack of top management level support

As Julie explains to Trey, she needs information obtained from high quality data to help her make good decisions. Which of the following four documents would not be a good source of information for Julie?

A social media report that shows the total number of "likes" for each cookie

Which of the following is NOT a key component of information systems security

Implementing social engineering

Mary's company is implementing an ERP system to achieve which main business​ objective?

Improved decision making

Which system development methodology does Worker 2 describe to worker 1

Prototyping

As worker 2 begins to test the new travel reimbursement system, he describes the___________as a five-phase systems development process: planning, analysis, design, implementation, and maintenance

SDLC

According to the information presented in this video, an early version of software with real functionality to be tested by system users is called a _______version

beta

Individuals who break into computer systems with the intention of doing damage are called

black hats

The ___________refers to identifying and presenting the value provided by a system

business case

Small-to medium-sized businesses can participate in B@B transactions with other firms through third-party

business-to-business marketplaces

Based on the information in this video, high quality data is best described as_____________-

correct, current, and complete

In this video dramatization, Julie and Trey discuss the need to document any changes they make to a cookie and don't change the list of ingredients they use for the procurement of inputs, this is an example of the failure of data to be__________-

current

An organization that desires and enterprise system that is exactly tailored to its needs will use a________system

custom

An organized attempt by a nation's military to disrupt or destroy another nation's information and communication systems is known as___________

cyberwar

In this video, Special Agent Macey state that the single largest threat to the internet is

denial of service attacks

As Kevin​ explains, _____ processes support activities in multiple departments and span an organization.

enterprise

In this video, Kevin describes___________as a set of integrated software modules that support nearly all of their organization's business processes

enterprise resource planning

Today, most enterprise wide information systems come in the form of______________systems

enterprise resource planning

An__________is a suite of business applications that allow companies to integrate information across operations on a company wide basis

enterprise wide information system

When Julie describes calculating the average number of cookies sold in February, she is describing an example of obtaining_______ from ________

information; data

According to the DHS agent portrayed in this​ video, the Secret Service has responded to network intrusions at businesses throughout the United States that have been impacted by​ _____ through their​ point-of-sale systems.

malware

The benefits of a customer relationship management system include all of the following EXCEPT

minimizing investments in inventory

The processes associated with selling a product or service are referred to as__________processes

order to chash

When a company decides to___________some or all of its information systems development, it hires another organization to develop information systems on its behalf

outsource

In the value chain model, all of the following are considered core activities EXCEPT

procurement

As Julie explains to​ Trey, she needs sales data in order to plan future cookie production. Based on her​ explanation, data is defined as​ _____.

recorded facts and figures

A key component of acquiring an information system externally is the

request for proposal

To achieve success with enterprise systems, all of the following are important recommendations EXCEPT

restricting the involvement of system users

In this video, Agen Macey explains how a __________pretends to a legitimate company by sending emails that request users to update their confidential information such as passwords or account numbers

spoofer

In this video, Agent Macey explains how a ___________pretends to be a legitimate company by sending emails that request users to update their confidential information such as passwords or account numbers

spoofer

Development of the travel reimbursement system required the participation of a diverse group of persons including business managers, business analysts, systems analysts, programmers, and end-users. Worker 2 called the development team a _________group

stakeholder

The various interrelated parties involved in moving raw materials, intermediate components, and end products within the production is termed the______

supply network

The life of an information system from conception to retirement is often called the ________________

systems development life cycle

The total cost of ownership of an information system refers to

the cost of acquiring, usin, and maintaining an information system

Advantages of ERP systems include all of the following EXCEPT

the organization must change its business processes to match the software

According to Kevin, which component of an ERP system consolidates data from sales, marketing, and service departments

Customer relationship management

According to the information provided in this video any business that has an online presence is at risk of

all these answers

___________is a technology and a corporate strategy to create and maintain lasting relationships with customers by enhancing downstream information flows

Customer relationship management

_________refers to the use of computer and networking technologies against persons or property to intimidate or coerce government, civilians, or any segment of society in order to attain political, religious, or ideological goals

Cyberterrorism


संबंधित स्टडी सेट्स

NU370 PrepU: Leadership & Management

View Set

Wordly Wise, Book 7, Lessons 1-10 - MIDTERM

View Set

Chapter 36: Urinary Elimination Supplement

View Set

Exam 3 questions (multiple choice and t/f)

View Set

Heart and Vessels Final Exam Review

View Set