1

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Broadband

A high speed internet connection that is always connected. Refers to anything greater than 2 mbps.

What is a project milestone?

A key date by which a certain group of activities must be performed.

Metropolitan Area Network (MAN)

A large computer network usually spanning a city. Most colleges universities and large companies that span a campus use an infrastructure supported by MAN

Wireless LAN (WLAN)

A local area network that uses radio signals to transmit and receive data over distances of a few hundred feet.

Wireless Fidelity (Wi-Fi)

A means by which portable devices can connect wirelessly to a local area network, using access points that send and receive data via radio waves.

What is trend analysis?

A trend is examined to identify its nature, causes, speed of development, and potential impacts

Wireless WAN (WWAN)

A wide area network that uses radio signals to transmit and receive data. Divided into 2 categories 1) Cellular communication systems and 2) Satellite Communication Systems

A(n) ____________ computer use policy contains general principles to guide computer user behavior

A(n) ____________ computer use policy contains general principles to guide computer user behavior

Which of the following includes a common reason why change occurs?

A. A misunderstanding of the initial scope B. Shifts in planned technology that force unexpected and significant changes to the business C. An omission in defining initial scope D. All of the above*

The banking industry has implemented several competitive advantages including ATMs, online bill pay services, and electronic statements. Of course, these competitive advantages were quickly duplicated by any competitor that wanted to remain in the banking industry. These were examples of...

Acquiring new technology products and services

5 common characteristics of high quality information

Accuracy, completeness, consistency, uniqueness, and timeliness

Which of the following does not draw a parallel between the challenges in business and the challenges of war?

Accurate and complete information

Inbound Logistics

Acquires raw materials and resources and distributes to manufacturing as required.

____________ maintenance makes changes to increase system functionality to meet new business requirements.

Adaptive

Which of the following is not a common type of test performed during system testing?

Adaptive testing

An organization processing personal data of a person living in the EU must comply with which of the following principles?

Adequate, relevant, and not excessive

Enterprise architects require ____access so they can perform such functions as resetting passwords or deleting accounts

Administrator

_______________ is software to generate ads that installs itself on a computer when a person downloads some other program from the Internet

Adware

What type of revenue generation model is Google using when it generates revenue by allowing advertisers to bid on common search terms?

Adwords

Intermediary

Agents, software or businesses that provide a trading infrastructure to bring buyers and sellers together

The _________ methodology aims for customer satisfaction through early and continuous delivery of useful software components developed by an iterative process with a design point that uses the bare minimum requirement.

Agile

Which methodology aims for customer satisfaction through early and continuous delivery of useful software components developed by an iterative process with a design point that uses the bare minimum requirements?

Agile methodology

Which of the following represents the bus topology?

All devices are connected to a central cable or backbone.

Broad Network Access

All devices can access data and applications

The structure of an organization is similar to a pyramid. The different levels require different types of info to assist with which of the following?

All of the above Decision making, problem solving, opportunity capturing

Online transaction processing (OLTP) is the capturing of transaction and event info using technology to ______

All of the above Update existing info to reflect new info Store the info Process the info according to defined business rules

What is the primary problem with redundant information?

All of the above: It is difficult to determine which values are the most current It is often inconsistent It is difficult to determine which values are the most accurate

Why do relational databases use primary keys and foreign keys?

All of the above: To create a database To create physical relationships To create logical relationships

Which of the following industries has technology changed the way business is performed?

All of the above: Travel Education Training

What is the ability to present the resources of a single computer as if it is a collection of separate computers, each with its own virtual CPUs, network interfaces, storage, and operating system?

All of the these: System virtualization Server virtualization Desktop virtualization

Which of the following is a type of backup/recovery media?

All of these DVD Disk Tape

Which of the following does a firewall perform?

All of these Detects computers communicating with the Internet without approval Blocks messages without the correct markings from entering the network Examines each message that wants entrance to the network

Both individuals and organizations have embraced ebusiness to do which of the following?

All of these Maximize convenience. Improve communications. Enhance productivity.

Which application are employees most likely to use?

All of these SCM CRM ERP

Why is the global economy becoming more integrated?

All of these The Internet International outsourcing Relaxed borders in the European Union

Which of the following is a reason for the growth of the World Wide Web?

All of these Web pages being easy to create and flexible. Advancements in networking hardware. The microcomputer revolution.

An organization must identify what it wants to do and how it is going to do it. What does the "how" part of this question focus on?

Analysis of project risks

What supports back-office operations and strategic analysis and includes all systems that do not deal directly with the customers?

Analytical CRM

What encompasses all organizational information and its primary purpose is to support the performance of managerial analysis tasks?

Analytical information

What encompasses all organizational information and its primary purpose is to support the performing of managerial analysis tasks?

Analytical information

Porter's Five Forces Model

Analyzes the competitive forces within the environment in which a company operates to assess the potential for profitability

List and provide a detailed description of all of the activities involved in one phase of the SDLC.

Answers to this question will vary depending on the phase the student chooses.

When building a scalable system that can support new company developments what are the key factors to consider?

Anticipating expected and unexpected growth

What are project deliverables?

Any measurable, tangible, verifiable outcome, result, or item that is produced to complete a project or part of a project

What is a project deliverable?

Any measurable, tangible, verifiable outcome, result, or item that is produced to complete a project or part of a project.

What is a program that runs within another application such as a website?

Applet

What does API stand for?

Application Programming Interface

The virtual assistant will be a small program stored on a PC or portable device that monitors all of the following, except:

Application processing

What verifies that all units of code work together and the total system satisfies all of its functional and operational requirements?

Application testing

Business Intelligence

Applications and technologies that are used to gather, provide access to, and analyze data and information to support decision-making efforts

Software

Applications such as email, payroll and instant messaging

Location Based Services (LBS)

Applications that use location info to provide a service. Designed to give mobile users instant access to personalized local content and range from 911 application to buddy finders complements GPS and GIS.

Technology Development

Applies MIS to processes to add value

Neutral Network

Artificial neutral network that attempts to emulate the human brain works. It analyzes large quantities of info. Example: Approved/denied applications

What is a schedule feasibility study?

Assesses the likelihood that all potential time frames and completion dates will be met

What reveals the degree to which variables are related and the nature and frequency of these relationships in the information?

Association detection

What is the difference between asynchronous and synchronous communication?

Asynchronous is communication that does not occur at the same time. Synchronous communication occurs at the same time.

Define the ultimate goal of AI and describe a few current examples of how AI is being used throughout industries.

At Manchester Airport in England the Hefner ASI Robot Cleaner alerts passengers to security and nonsmoking rules while it scrubs up to 65,600 square feet of floor per day. A SmartPump keeps drivers in their cars on cold, wet days. The SmartPump can service any automobile built after 1987 that has been fitted with a special gas cap and a windshield-mounted transponder that tells the robot where to insert the pump. The Miami Police Bomb squad's AI robot that is used to locate and deactivate bombs. Matsushita's courier robot navigates hospital hallways, delivering patient files, X-ray films, and medical supplies. FireFighter AI Robots can extinguish flames at chemical plants and nuclear reactors with water, foam, powder, or inert gas.

What is the continuous process improvement model?

Attempts to understand and measure the current process, and make performance improvements accordingly.

In the relational database model, what are characteristics or properties of an entity?

Attribute

In the relational database model, what is a characteristic or property of an entity?

Attribute

What is a method for confirming users' identities?

Authentication

Which of the following represents the three areas where technology can aid in the defense against attacks?

Authentication and authorization, prevention and resistance, detection and response

Selling Chain Management

Automates order processes from initial customer inquiry to final product delivery

Predictive Dialing

Automatically dials outbound calls and forwards answered calls to an available agent

Sales Force Automation

Automatically tracks all the steps in the sales process. Focuses on increasing customer satisfaction, building customer relationships and improving product sales

What is the top CRM business driver?

Automation/productivity/efficiency

What is the DARPA grand challenge?

Autonomous ground vehicle field test

What addresses the time frames when systems can be accessed by employees, customers, and partners?

Availability

Which of the following is not a key factor an organization should consider when contemplating the buy vs. build decision?

Availability of CASE tools

3 Common Supply Chain Management Metrics

1) Inventory turnover is the frequency of inventory replacement 2) Inventory cycle time is the time it takes to manufacture a product and deliver it to the retailer 3) Back order is a unified customer order for a product out of stock

Primary Enterprise Systems

1) Customer Relationship Management 2) Enterprise Resource Planning 3) Supply Chain Management

Business Continuity Planning

1) Disaster recovery plan 2) Technology recovery strategies 3) Business impact analysis 4) Emergency notification services

Benefits of Business Mobility

1) Enhance mobility 2) Provides immediate data access 3) Increases location and monitoring capability 4) Improves work flow 5) Provides mobile business opportunities 6) Provides alternatives to wiring

5 Categories of AI

1) Expert systems 2) Neutral networks 3) Genetic Algorithms 4) Intelligent agents 5) Virtual reality

What are the three common tools managers use to analyze competitive intelligence and develop competitive advantages.

1) Five Forces Model 2) The three generic strategies 3) Value chain analysis

2 ways an effective/efficient supply chain management system impacts Porter's 5 forces

1) Increase it's supplier power 2) Create entry barriers to reduce the threat of new entrants

3 Processes Driving Sustainable MIS Infrastructures

1) Increased electronic waste 2) Increased energy consumption 3) Increased carbon emissions

What are 3 value activities

1) Marketing and sales 2) Outbound logistics 3)Inbound logistics

3 Main Business Processes Achieved by SCM

1) Materials flow from suppliers and their upstream suppliers at all levels 2) Materials are transformed into semi-finished and finished products the organization's own production processes 3) Products are distributed to customers and their downstream customers at all levels

ERP, the heart

: ERP systems provide a foundation for collaboration between departments, enabling people in different business areas to communicate. The heart of an ERP system is a central database that collects info from and feeds info into all the ERP system's individual application components supporting diverse business functions such as accounting, manufacturing, marketing, and human resources. When info is updated in module, it is updated in all others throughout the entire system.

Product and materials management

: handle the various aspects of production planning and execution such as demand forecasting, production scheduling, job cost accounting, and quality control.

Accounting and finance

: manage accounting data and financial processes within the enterprise with functions such as general ledger, accounts payable, accounts receivable, budgeting, and asset management.

Human resources

: track employee information including payroll, benefits, compensation, and performance assessment, and assure compliance with the legal requirements of multiple jurisdictions and tax authorities.

Human resources is the most common outsourced function.

FALSE IT is the most common outsourced function.

A document management system works with binary rather than text files, such as multimedia file types.

FALSE A digital asset management system works with binary rather than text files, such as multimedia file types.

A foreign key is a field (or group of fields) that uniquely identifies a given entity in a table.

FALSE A primary key is a field (or group of fields) that uniquely identifies a given entity in a table.

Data latency is the time from which data are made available to the time when analysis is complete.

FALSE Analysis latency is the time from which data are made available to the time when analysis is complete.

Which of the below is not an example of a social bookmarking website?

Facebook

What are project assumptions?

Factors that are considered to be true, real, or certain without proof or demonstration

Operational BI

Form of Bi that helps with immediate actions and results in sales revenue

The _________ of information act allows any person to examine government records unless it would cause an invasion of privacy.

Freedom

hich act allows any person to examine government records unless it would cause an invasion of privacy?

Freedom of Information Act

What is the term that identifies how frequently a customer purchases items?

Frequency

Describe the future trend of outsourcing.

Future trends include (1) outsourcing becoming less of a cost-saving strategy and more an overall context for business, (2) outsourcing is approaching commodity status, (3) companies should look for value-based pricing rather than the lowest possible price. (4) Multisourcing is a combination of professional services, mission-critical support, remote management, and hosting services that are offered to customers in any combination needed.

__________ logic is a mathematical method of handling imprecise or subjective

Fuzzy

What is the ability to model the information system screens for an entire system using icons, buttons, menus, and submenus?

GUI screen design

Your boss, Ty Jacob, has asked you to analyze the music industry using Porter's Five Forces Model. Which of the following represents the threat of substitute products or services in the music industry?

Game systems like Wii and social networks like Facebook.

A(n) __________ chart is a simple bar chart that depicts project tasks against a calendar.

Gantt

What is a simple bar chart that depicts project tasks against a calendar?

Gantt chart

What is included in feedback for a car's system

Gas

Call Scripting Systems

Gathers product detail and issue resolution info that can be automatically generated into a script for the rep to read to the customer

Demand Planning Systems

Generates demand forecasts using statistical tools and forecasting techniques so that companies can respond faster and more effectively to consumer demands through supply chain enhancement

What is an artificial intelligence system that mimics the evolutionary, survival-of-the-fittest process to generate increasingly better solutions to a problem?

Genetic algorithm

What is the definition of geoeconomic?

Geographic and economic business challenges

_________ seeking analysis could answer the question "How many customers are required to purchase our new product line to increase gross profits to $5 million?"

Goal

What finds the inputs necessary to achieve a goal, such as a desired level of output?

Goal-seeking analysis

Executives of a company deal less with details of the operational activities and deal more with the higher meaningful aggregations of info or "courser" info. What refers to the level of detail in the model?

Granularity

Business Process Model

Graphic description of a process that shows the sequence of process tasks.

What enables organizations to optimize computing and data resources, pool them for large capacity workloads, share them across networks, and enable collaboration?

Grid Computing

What is an aggregation of geographically dispersed computing, storage, and network resources, coordinated to deliver improved performance, higher quality of service, better utilization, and easier access to data?

Grid Computing

Which of the following sustainable infrastructure components is a collection of computers, often geographically dispersed, that are coordinated to solve a common problem?

Grid computing

____________ supports team interaction and dynamics including calendaring, scheduling, and videoconferencing

Groupware

Explain how groupware can benefit a business.

Groupware is software programs that support team interaction and dynamics including calendaring, meeting scheduling, and videoconferencing. Organizations can use this technology to communicate, cooperate, coordinate, solve problems, compete, or negotiate.

What is software that supports team interaction and dynamics including calendaring, scheduling, and videoconferencing?

Groupware system

Campaign Management Systems

Guides through marketing campaigns by performing such tasks as campaign definition, planning, scheduling, segmentation and success analysis

WiFi Infrastructure

Includes inner workings of a WiFi service or utility including the signal transmitters, towers, or poles along with additional equipment required to send out a signal.

Middleware

Includes several types of software that sits between and provides connectivity for 2 or more software applications.

Firm Infrastructure

Includes the company format or departmental structures, environment and systems

Knowledge

Includes the skills, experience and expertise, coupled with info and intelligence, that creates a person's intellectual resources.

What reports operating results (revenues minus expenses) for a given time period ending at a specified date?

Income Statement

Which of the following is the top reason why organizations launch knowledge management systems?

Increase profits or revenues According to the key reasons why organizations launch knowledge management systems figure, increase profits or revenues.

Which of the following is a business-related consequence of successful software?

Increase revenues

____________ revenues are a business-related consequence of successful software.

Increased

All of the following are advantages of database-stored information except:

Increased information redundancy

All of the following are advantages of database-stored information, except:

Increased performance

Explain the business benefits of outsourcing.

Increased quality and efficiency , reduced operating expenses, outsourcing non-core processes allows businesses to focus on their core competencies, reduced exposure to risk, access to outsourcing service providers economies of scale and expertise and best-in-class practices, access to advanced technologies, increased flexibility, avoid costly outlay of capital funds, reduced headcount and associated overhead expense, reduced frustrations and expense related to hiring and retaining employees in an exceptionally tight job market, reduced time to market for products or services.

As a manager for your company some of your responsibilities include measuring metrics and overseeing company strategies. You observe some critical success factors and see large increases in productivity. What would you suspect would be the primary reason for the large increases in productivity?

Increases in effectiveness

What are the three pressures driving sustainable MIS infrastructures?

Increases in electronic waste, energy consumption, and carbon emissions

Supply Chain Event Management

Increases real-time info sharing among supply chain partners focusing on reducing response time to unexpected events.

Kevin Campbell is an incoming freshman at your college. Kevin is frustrated by the cost of books, tuition, and expenses and he also needs to purchase a rather expensive laptop. In an effort to save money, Kevin begins a Facebook group to find other college students who need to purchase laptops. Soon, Kevin's FB group has close to 100,000 students. Kevin decides to collectively approach different computer companies to see if his group qualifies for a special discount. What business strategy is Kevin using to purchase laptops?

Increasing buying power

Up-Selling

Increasing the value of the sale

All of the following are countries expected to have the largest increases in population between 2000 and 2050, except:

India

Cloud Fabric Controller

Individual who monitors and provisions cloud resources, similar to a server administrator

Which of the following represents the different information formats?

Individual, department, enterprise

Which of the following represents the different information levels?

Individual, department, enterprise

Which of the following is an example of acting ethically?

Individuals copy, use, and distribute software. B. Employees search organizational databases for sensitive corporate and personal information. C. Individuals hack into computer systems to steal proprietary information. D. None of the above.*

Knowledge Workers

Individuals valued for their ability to interpret and analyze info

What refers to the depth and breadth of details contained in a piece of textual, graphic, audio or video?

Info richness

A collaboration system is an IT-based set of tools that supports the work of teams by facilitating the sharing and flow of __________.

Information

A decision support system models __________ to support managers and business professionals during the decision-making process.

Information

What is a framework provided by the government of the United Kingdom and offers eight sets of management procedures?

Information Technology Infrastructure Library

What is the set of ideas about how all information in a given context should be organized?

Information architecture

Which of the following is incorrect in reference to a database?

Information is accessed by physical structure

A relational database contains information in a series of two-dimensional tables. How is data contained in a data warehouse and data mart?

Information is multidimensional, meaning it contains layers of columns and rows.

What is it called when two or more organizations cooperate by integrating their IT systems, thereby providing customers with the best of what each can offer?

Information partnership

Which of the following is true in regards to the United States?

Information privacy is not highly legislated nor regulated

Which policy contains general principles regarding information privacy?

Information privacy policy

What measures the number of people a firm can communicate with all over the world?

Information reach

What identifies the rules required to maintain information security?

Information security policies

What service delivers hardware networking capabilities, including the use of servers, networking, and storage over the cloud using a pay-per-use revenue model?

Infrastructure as a Service (IaaS)

What are the three cloud computing service delivery models?

Infrastructure as a Service, Software as a Service and Platform as a Service

Which four elements are included in systems thinking?

Input, process, output and feedback

DSS-Systems Thinking

Input-Process-Output Input: TPS Process: What if, sensitivity, goal seeking, optimization Output: Forecasts, simulations and Ad hoc reports

What is a common approach using the professional expertise within an organization to develop and maintain the organization's information technology systems?

Insourcing

____________ is a common approach using the professional expertise within an organization to develop and maintain the organization's information technology systems.

Insourcing

What is a type of communications service that enables someone to create a kind of private chat room with another individual in order to communicate in real-time over the Internet?

Instant messaging

Explain the current tools and trends used in a collaborative working environment.

Instant messaging (sometimes called IM or IMing) is a type of communications service that enables a kind of private chat room with another individual in order to communicate in real-time over the Internet. AOL, Microsoft's MSN, and Yahoo! have begun to sell enterprise versions of their instant messaging services that match the capabilities of business-oriented products like IBM's Lotus Sametime.

What types of BI decisions include forecasting claim amounts and medical coverage costs, classifying the most important elements that affect medical coverage; predicting which customers will buy new insurance policies?

Insurance BI decisions

Which type of BI benefits includes improved communication throughout the enterprise, improved job satisfaction of empowered users, and improved knowledge sharing?

Intangible benefits

Enterprise Resource Planning

Integrates all depts. and functions throughout an organization into a single IT system so that employees can make decisions by viewing enterprise information about business operations.

____________ testing exposes faults in the integration of software components or software units.

Integration

Data Integration

Integration of data from multiple sources which provides a unified view of all data

What are the rules that help ensure the quality of information?

Integrity constraints

What is intangible creative work that is embodied in physical form?

Intellectual property

A(n) _________ agent is a special-purpose knowledge-based information system that accomplishes specific tasks on behalf of its users.

Intelligent

_____________ systems are various commercial applications of artificial intelligence.

Intelligent

What is a special-purpose knowledge-based information system that accomplishes specific tasks on behalf of its users?

Intelligent agent

What are various commercial applications of artificial intelligence?

Intelligent system

Return on Investments

Internal KPI earning power of a project. It is measured by dividing the profitability of a project by the costs.

Which of the following began as an essential emergency military communications system operated by the U.S. Department of Defense Advanced Research Project Agency (DARPA)?

Internet

What is an ISP?

Internet service provider, a company that provides access to the Internet for a monthly fee.

Hypertext Transport Protocol (HTTP)

Internet standard that supports the exchange of information on the WWW

John Cleaver is the CEO of Tech World, which is a retail store that sells computers, monitors, cameras, TVs and many other electronic products. John and his executive team are meeting to brainstorm new ideas on how to grow the business. One idea is to mimic a competitor's product that is attempting to sell a new product in a different industry. After performing a Porter's Five Forces analysis, John determines that all the forces are high in this new industry. What should John do?

Not introduce the product because all 5 forces are strong and this would be a highly risky business strategy.

What is typically performed by the sales and marketing department?

Maintaining transactional data

Contact Management CRM System

Maintains customer contact info and identifies prospective customers for future sales, using tools such as organizational charts, detailed customer notes and supplemental sales info.

Human Resources

Maintains policies, plans, and procedures for the effective management of employees

An error found during the ___________ phase is the most expensive to fix.

Maintenance

The ___________ phase involves performing changes, corrections, additions, and upgrades to ensure the system continues to meet the business goals.

Maintenance

What is not considered a core driver of the information age?

Malware

Balanced Scorecared

Management system, as well as a measurement system that a firm uses to translate business strategies into executable tasks.

Project ____________ is an individual who is an expert in project planning and management, defines and develops the project plan, and tracks the plan to ensure the project is completed on time and on budget.

Manager

Jenny Welch works at a retail store selling sports equipment. Her daily tasks include opening the store, creating work schedules, processing payroll, overseeing sales and inventory, and training employees. At what level of the organizational pyramid would you categorize Jenny?

Managerial

Strategic Level

Managers develop overall business strategies, goals and objects as part of the company's overall plan. -Monitors strategic performance of the organization and its overall direction in the political, economic, and competitive business environment. -Unstructured decisions are made. There are no rules or procedures to guide decision makers toward the correct choice. Example: The decision to enter a new market or new industry.

Accounting and Finance ERP Components

Manages accounting data and financial processes within the enterprise with functions such as general ledger, accounts payable, accounts receivable, budgeting and asset management

Operations Management

Manages the process of converting or transforming or resources into goods or services

Which of the following is a challenge facing an ebusiness?

Managing Consumer Trust

Customer Relationship Management

Managing all aspects of a customer's relationship with an organization to increase customer loyalty and retention and an organization's profitability

Make

Manufacture products and provide production schedules

Which of the following is a type of decision support system?

Manufacturing

Evaluate the advantages of using a workflow management system.

Many workflow management systems allow the opportunity to measure and analyze the execution of a process. Workflow systems integrate with other organizational systems, such as document management systems, and database management systems.

Social Networking Analysis

Maps group contacts (personal and professional) identifying who knows each other and who works together.

Financial savings, increased technical abilities, and _________ agility are the benefits an organization can receive from outsourcing.

Market

Which of the following is the least common function outsourced?

Marketing/sales

M&M's offers people the opportunity to order the candy in special colors or with customized sayings. How would you classify M&M's ebusiness strategy?

Mass customization

Nike offers people the opportunity to visit its website to create running shoes in the style and color they choose. How would you classify Nike's ebusiness strategy?

Mass customization

What uses sales forecasts to make sure that needed parts and materials are available at the right time and place in a specific company?

Materials requirement planning system

Which company created several different website to respond to sensitive cultural differences?

McDonalds

Effectiveness MIS Metrics

Measure the impact MIS has on business processes and activities, including customer satisfaction and customer conversion rates. -Focuses on how well a firm is achieving its goals and objectives

Efficiency MIS Metrics

Measure the performance of MIS itself as throughput, transaction, speed and system availability -Focuses on resources in an optimal way

Metrics

Measurements that evaluate results to determine whether a project is meeting its goals.

What is information reach?

Measures the number of people a firm can communicate with all over the world.

What sends work assignments through an email system?

Messaging-based workflow system

What is a set of policies, procedures, standards, processes, practices, tools, techniques, and tasks that people apply to technical and management challenges?

Methodology

What are the measurements that evaluate test results to determine whether a project is meeting its goals?

Metrics

What is a large computer network usually spanning a city?

Metropolitan area network

Reasons for growth of the WWW

Microcomputer revolution, advancements in networking, easy browser software, speed convenience, and low cost of email, web pages easy to create and flexible.

What is one of the guidelines an organization can follow when creating an information privacy policy?

Notice and disclosure

Bit Rate

Number of bits transferred or received per unit of time

Clickstream Data can reveal...

Number of page views, pattern of websites visited, length of stay on websites, date and time visited, number of customers with shopping carts and number of abandoned shopping carts

Online Analytical Processing

OLAP

What do data warehouses support?

OLAP and analytical processing

. List and define the four different types of implementation methods.

Parallel implementation - using both the old and the new system until it is evident that the new system performs correctly. Plunge implementation - discarding the old system completely and immediately starting to use the new system. Pilot implementation - having only a small group of people use the new system unit it is evident that the new system performs correctly and then adding the remaining people. Phased implementation - implementing the new system in phases, and then implementing the remaining phases of the new system.

What is the outsourcing option that includes the closest location and direct customer control?

Onshore outsourcing

Identify the three primary outsourcing options.

Onshore outsourcing is engaging another company within the same country for services. Nearshore outsourcing is contracting an outsourcing arrangement with a company in a nearby country. Offshore outsourcing is using organizations from developing countries to write code and develop systems.

Which of the following demonstrates potential issues with Business 2.0 and information vandalism?

Open source allows anyone to be able to edit, damage, or destroy content.

Customer Service and Support

Part of an operational CRM that automates service requests, complaints, product returns and information requests.

Business Process Patent

Patent that protects a specific set of procedures for conducting a particular business activity.

Most companies are organized by departments or functional areas. Which of the following is not a common department found in a company?

Payroll

Most companies are typically organized by departments or functional areas. Which of the following is not a common department found in a company?

Payroll

What is the recommended way to implement information security lines of defense?

People first, technology second

Which of the following is not a reason for the growth of decision-making information systems?

People no longer have to worry about protecting the corporate asset of organizational information

____________ maintenance makes changes to enhance the system, which improves such things as processing performance and usability

Perfective

Which type of maintenance makes changes to enhance the system, which improves such things as processing performance and usability?

Perfective maintenance

What measures how quickly a system performs a certain process or transaction in terms of efficiency IT metrics of both speed and throughput?

Performance

Which of the following measures how quickly a system performs a certain process or transaction?

Performance

Sales

Performs the function of selling goods or services

Enterprise Architect

Person grounded in technology, fluent in business and able to provide the important bridge between MIS and the business.

Amazon creates a unique recommendation listing for each customer that revisits its website. How would you classify Amazon's ebusiness strategy?

Personalization

Netflix creates a unique recommendation listing for each customer that revisits its website. How would you classify Netflix's ebusiness strategy?

Personalization

Which company had an employee's spouse load file-sharing software onto a company laptop creating a security hole that appears to have compromised the names and Social Security numbers 17,000 current and former employees?

Pfizer

What is the difference between phishing and pharming?

Phishing is a technique to gain personal info for the purpose of identifying theft. Pharming reroutes requests for legitimate websites to false websites.

____________ implementation has only a small group of people use the new system until it is evident that the new system performs correctly and then adds the remaining people to the new system.

Pilot

Counterfeit software

Pirated software

What is the unauthorized use, duplication, distribution, or sale of copyrighted software?

Pirated software

Contact or Call Center

Place where customer service reps answer customer inquires and solve problems, usually by email, chat or phone

A project ____________ is a formal, approved document that manages and controls project execution.

Plan

Deliver

Plan for transportation of goods to customers

Which of the following represents the phases in the SDLC?

Plan, analysis, design, develop, test, implement, maintain

The ______________ phase involves establishing a high-level plan of the intended project and determining project goals.

Planning

What is the first step in the SDLC?

Planning

List and describe each phase in the systems development life cycle.

Planning phase - involves establishing a high-level plan of the intended project and determining project goals. Analysis phase - involves analyzing end-user business requirements and refining project goals into defined functions and operations of the intended system. Design phase - involves describing the desired features and operations of the system including screen layouts, business rules, process diagrams, pseudo code, and other documentation. Development phase - involves taking all of the detailed design documents from the design phase and transforming them into the actual system. Testing phase - involves bringing all the project pieces together into a special testing environment to test for errors, bugs, and interoperability, in order to verify that the system meets all the business requirements defined in the analysis phase. Implementation phase - involves placing the system into production so users can begin to perform actual business operations with the system. Maintenance phase - involves performing changes, corrections, additions, and upgrades to ensure the system continues to meet the business goals.

____________ implementation discards the old system completely and immediately starts to use the new system.

Plunge

What converts an audio broadcast for use by a digital music player?

Podcasting

Which of the following describes ePolicies?

Policies and procedures that address the ethical use of computers and Internet usage in the business environment.

A(n) ____________ is a temporary endeavor undertaken to create a unique product, service, or result.

Project

Failure to manage __________ scope is one of the primary reasons for project failure.

Project

_________ management is the application of knowledge, skills, tools, and techniques to project activities to meet project requirements

Project

_________ management is the application of knowledge, skills, tools, and techniques to project activities to meet project requirements.

Project

What is the application of knowledge, skills, tools, and techniques to project activities to meet project requirements?

Project management

Explain the triple constraints and its importance in project management.

Project management is the application of knowledge, skills, tools, and techniques to project activities in order to meet or exceed stakeholder needs and expectations from a project. The triple constraint includes three interdependent variables - time, scope, and resources. If one changes, they all must change.

What is an internal department that oversees all organizational projects?

Project management office

Which of the following is not one of the five characteristics common to high-quality information?

Quantity

Rapid Application Development (Rapid Prototyping) Methodology

RAD

what emphasizes extensive user involvement in the rapid and evolutionary construction of working prototypes of a system to accelerate the systems development process?

RAD methodology

Rational Unified Process Methodology

RUP

Which methodology is owned by IBM?

RUP

Which methodology provides a framework for breaking down the development of software into four gates?

RUP

What is a dynamic high-resolution electronic display that combines a paperlike reading experience with the ability to access information anytime, anywhere?

Radio Paper

What uses active or passive tags in the form of chips or smart labels?

Radio frequency identification

What occurs when a system updates information at the same rate it receives the information?

Real-time communication

What is immediate, up-to-date information?

Real-time information

What provides real-time information in response to query requests?

Real-time systems

What provides real-time information in response to requests?

Real-time systems

The R in the SMART criteria for successful objective creation stands for _________.

Realistic

RFM Formula

Recency, frequency and monetary value

Accounting

Records, measures, and reports monetary transactions

All of the following are challenges of outsourcing, except:

Reduced frustration and expense related to hiring and retaining employees in an exceptionally tight job market

All of the following are challenges of outsourcing except:

Reduced frustration and expense related to hiring and retaining employees in an exceptionally tight job market.

Collaborative Demand Planning

Reduces inventory investments while improving customer satisfaction

Callie Crystal owns and operates one of the most successful local coffee shops in Denver, called The Edgewater Café. Each time a customer their 100th cup of coffee they receive a pound of free coffee of their choice. What is Callie attempting to create with her unique "Free Pound of Coffee" marketing program?

Reducing buyer power with a loyalty program

Review the below list of key terms and determine which one typically occurs during managerial business process improvement.

Reeingineering

Open Source

Refers to any software whose source code is made available free for any 3rd party to review and modify

What is network topology?

Refers to the geometric arrangement of the actual physical organization of the computers (and other network devices) in a network

Granularity

Refers to the level of detail in the model or decision making process. The greater the granularity, the deeper the level of detail or fairness of data.

Long Tail

Refers to the tail of a typical sales curve

Accessibility

Refers to the varying levels that define what a user can access, view or perform when operating a system

When a company is the first to market with a competitive advantage, this is called a first-mover advantage. All of the following companies were first movers except

Microsoft - Bing Search Engine

What are several different types of software that sit in the middle of and provide connectivity between two or more software applications?

Middleware

Project ____________ represent key dates when a certain group of activities must be performed

Milestones

Project ____________ represent key dates when a certain group of activities must be performed.

Milestones

Which of the following is not an advantage of building a data-driven website?

Minimizes or reduces efficiency

What is the ability to purchase goods and services through a wireless Internet-enabled device?

Mobile commerce

A(n) ___________ is a simplified representation or abstraction of reality.

Model

___________ is the activity of drawing a graphical representation of a design.

Modeling

Which of the following is not one of the three key steps involved in business process improvement?

Monitor the performance of key individuals

Information technology _________ is tracking people's activities by such measures as number of keystrokes, error rate, and number of transactions processed.

Monitoring

Best Practices

Most successful

What in the cloud means that a single instance of a system serves multiple customers?

Multi-tenancy

What does network convergence provide?

Multiple services and one provider

Multiple-in/Multiple-out Technology

Multiple transmitters and receivers allowing them to send and receive greater amounts of data than traditional networking devices.

___________ is a combination of professional services, mission-critical support, remote management, and hosting services that are offered to customers in any combination needed.

Multisourcing

___________ outsourcing refers to contracting an outsourcing arrangement with a company in a nearby country.

Nearshore

What are the 5 different networking elements creating a connected world?

Network categories, network providers, network protocols, network convergence and network access technologies

Which of the following database structures offers a flexible way of representing objects and their relationships?

Network database

What describes how products in a network increase in value to users as the number of users increase?

Network effect

What is a category of AI that attempts to emulate the way the human brain works

Neural network

Which of the following countries is considered a rookie in the outsourcing industry?

New Zealand

Which of the following reflects Moore's Law?

New generations of chips deliver double the processing power as the previous generation

Which of the following is similar to focused strategy versus broad strategy?

Niche market versus large market.

Which handset-maker estimates at least 20 percent of its 68,000 employees use wiki pages to update schedules, project status, trade ideas, and edit files?

Nokia

Businesses typically outsource their ___________ business functions, such as payroll and IT.

Noncore

Which activity is performed during the implementation phase?

None of the above Write detailed user documentation, determine implementation method, and provide training for the system users are the activities performed during the implementation phase.

What is the policy that contains general principles to guide computer user behavior?

None of these

Which of the following authentication methods is 100 percent accurate?

None of these

Which act strengthened criminal laws governing identity theft?

None of these Bork Bill Sarbanes-Oxley Act Cable Communications Act

Which of the following is not considered a type of biometrics?

None of these voice face iris

Open System

Nonproprietary hardware and software based on publicly known standards that allows third parties to create add-on products to plug into or interoperate with the system Example: Ipods, drawing software and mice

What is a contractual stipulation that ensures that ebusiness participants do not deny their online actions?

Nonrepudiation

Which of the following is part of the acceptable use policy stipulations?

Not attempting to mail bomb a site

____________ testing is performed after making a functional improvement or repair to the system to determine if the change has affected (or impacted) the other functional aspects of the software.

Regression

A change control board is responsible for approving or ____________ all change requests.

Rejecting

What are the rules that enforce basic and fundamental information-based constraints?

Relational integrity constraint

What type of integrity constraint does not allow someone to create an order for a nonexistent customer?

Relational integrity constraint

Which of the following is the result of BI that implies that the data have been documented as the certified or approved data for the enterprise?

Reliable

What are the three phases in the evolution of CRM?

Reporting, analyzing, predicting

Latitude

Represents a north/south measurement of position

Longitude

Represents an east/west measurement of position

As is process models

Represents the current state of the operation that has been mapped w/o any specific improvements or changes.

Capacity

Reps the max throughout a system Example: Capacity of a hard drive

What contains the final set of business requirements, prioritized in order of business importance?

Requirements definition document

Which of the following is a performed by a CCB?

Responsible for approving or rejecting all change requests

Chief Authority Officer (SCO)

Responsible for ensuring the security of business systems and developing strategies and safeguards against attacks by hackers and viruses.

What types of BI decisions include predicting sales, determining correct inventory levels and distribution schedules among outlets, and loss prevention?

Retail and sales BI decisions

What is a system that consists of nonproprietary hardware and software based on publicly known standards that allows third parties to create add-on products to plug into or interoperate with the system?

Open system

What is the system that consists of nonproprietary hardware and software based on publicly known standards that allows third parties to create add-on products to plug into or interoperate with the system?

Open system

Which form of BI has managers and analysts as its primary users?

Operational BI

Which form of BI uses real-time metrics for its data?

Operational BI

Which type of BI manages daily operations and integrates BI with operational systems?

Operational BI

What types of BI decisions include predicting sales, determining correct inventory levels, and distribution schedules among outlets, and loss prevention?

Retail and sales BI decisions

Which company offers a strategic business information service using artificial intelligence that enables organizations to track the product offering, pricing policies, and promotions of online competitors?

RivalWatch

high; low

Rivalry among existing competitors is ____ when competition is fierce in a market and ____ when competition is more complacent

Automatic Call Distribution

Routes inbound calls to available agents

Supply chain management

SCM

Which application's primary business benefits include market demand, resource and capacity constraints, and real-time scheduling?

SCM

System Development LIfe Cycle

SDLC

Which of the following is not a primary form of agile methodology?

SDLC

Sales force automation

SFA

Social networking analysis

SNA

Service Oriented Architecture

SOA

Supplier relationship management

SRM

CRM

Sales, marketing and customer service

________________ achieved great success by managing information, while _________ was unsuccessful at managing information.

Samsung Electronics, Staples

At which level of an organization do employees develop, control, and maintain core business activities required to run the day-to-day operations?

Operational level

All of the following are reasons why operational systems are not appropriate for business analysis, except:

Operational systems are integrated

All of the following are reasons why operational systems are not appropriate for business analysis except:

Operational systems are integrated.

What refers to how well a system can adapt to increased demands of growth?

Scalability

What refers to how well a system can adapt to increased demands?

Scalability

Which of the following is not one of the four changes resulting from advances in information technology that are driving supply chains?

Scalability

What types of BI decisions include predicting machinery failures and finding key factors that control optimization of manufacturing capacity?

Operations management BI decisions

________ implies that contact will be made with only the people who had agreed to receive promotions and marketing materials

Opt-in

Which of the following is a type of transaction processing system?

Order processing

Which of the following is a customer-facing process?

Order shipping

Which of the following represents a business process you would find in the operations management department?

Ordering inventory

Boston Digital Bridge Foundation

Organization trying to bridge the technology divide

Dot-Com

Original term for a company operating on the internet

What is an arrangement by which one organization provides a service or services for another organization that chooses not to perform them in-house?

Outsourcing

_________ is an arrangement by which one organization provides a service or services for another organization that chooses not to perform them in-house.

Outsourcing

Describe why outsourcing is a critical business decision.

Outsourcing can give the right combination of people, processes, and technology to operate efficiently and effectively in the global marketplace without burdening time and budget.

A(n) _____ chart is a graphical network model that depicts a project's tasks and the relationships between those tasks.

PERT

What is a graphical network model that depicts a project's tasks and the relationships between those tasks?

PERT chart

What type of chart typically displays the critical path?

PERT chart

Partner relationship management

PRM

Standard Packet Format

Packet header, packet boy containing the original message and packet footer.

____________ implementation uses both the old and the new systems until it is evident that the new system performs correctly.

Parallel

Taxonomy

Scientific classification of organisms into groups based on similarities of structure or origin Example: A car is a subtype of vehicle

Project _________ defines the work that must be completed to deliver a product with the specified features and functions.

Scope

Time, cost, and ___________ are the three primary variables in any project.

Scope

____________ creep occurs when the scope of the project increases.

Scope

What is encryption?

Scrambles information into an alternative form that requires a key or password to decrypt the information

Who finds hacking code on the Internet and click-and-point their way into systems to cause damage or spread viruses?

Script kiddies

Which methodology ends each day or begins with a stand-up meeting to monitor and control the development effort?

Scrum

Which methodology uses small teams to produce small pieces of deliverable software using sprints, or 30-day intervals, to achieve an appointed goal?

Scrum

What evaluates variables that search engines use to determine where a URL appears on the list of search results?

Search engine ranking

Which of the following is not considered an ePolicy?

Security badge policy

Cross-Selling

Selling additional products/services to an existing customer

What is a component of Web 3.0 that describes things in a way that computers can understand?

Semantic web

Not attempting to mail bomb a site

Sending a massive amount of email to a specific person or system resulting in filling up the recipient's disk space

What is a mail bomb?

Sending a massive amount of email to a specific person or system that can cause that user's server to stop functioning.

Microblogging

Sending brief posts to a personal blog

. ___________ analysis occurs when users change the value of one variable repeatedly and observe the resulting changes in other variables.

Sensitivity

What is the study of the impact that changes in one (or more) parts of the model have on other parts of the model?

Sensitivity analysis

Hardware

Servers, computers and wireless devices

Private Cloud

Serves only 1 customer or organization and can be located on or off customer's premisis. Example: Bank sensitive info

What is a business-driven IT architectural approach that supports organizational computing needs with utility-based computing concepts?

Service oriented architecture

Which of the below is not a valid form of ebusiness revenue model?

Service provider

What are the key technical concepts of SOA?

Services, interoperability, loose coupling

Focused Strategy

Serving only one segment of the overall market and trying to be the most differentiated organization serving that segment.

Business Process Reengineering Model

Set project scope - study competition - create new processes - implement solution

With ___________, less experienced staff observe more experienced staff to learn how their more experienced counterparts approach their work.

Shadowing

What advantages do networks offer businesses?

Sharing resources, providing opportunities and reducing travel

A(n) _____________ bot is software that will search several retailer Web sites and provide a comparison of each retailer's offerings including price and availability.

Shopping

To be process models

Shows the results of applying change improvement opportunities to the current (as is model)

What is the system users' actual signatures indicating they approve all of the business requirements?

Sign-off

Folksonomy

Similar to taxonomy except that crowdsourcing determines the tags or key word based classification system.

Streamlining

Simplifies or eliminates unnecessary business steps

Bit (binary digit)

Smallest element of data and has the value of 0 or 1

What is a device that is around the same size as a credit card, containing embedded technologies that can store information and small amounts of software to perform some limited processing?

Smart card

Which of the following is a program or device that can monitor data traveling over a network?

Sniffer

Which of the following represents the classic example of unintentional information reuse?

Social Security number

Which of the following best describes Web 2.0?

Social media and user-generated web content

Which company policy implements online communication policy detailing brand communication, LinkedIn policy, and corporate YouTube policy?

Social media policy

What is an SNA?

Social networking analysis

What is a model of software deployment, where an application is licensed for use as a service, provided to customers on-demand?

Software as a Service

Cloud Fabric

Software that makes possible the benefits of cloud computing, such as multi-tenancy.

Proxy

Software that prevents direct communication between sending and receiving. Is used to monitor packets for security info.

Which of the below statements is accurate when considering the ebusiness challenge of adhering to taxation rules?

Some online companies have to charge sales tax.

What is the most costly and intrusive form of authentication?

Something that is part of the user such as a fingerprint or voice signature

. _________ is unsolicited email.

Spam

Wide Area Network (WAN)

Spans a large geographic area such as a state, province, or country

Executive Info System

Specialized DSS that supports senior level executives and infrastructure long term, non-routine decisions requiring judgment, evaluation and insight. -Only efficient/effective answers - no right or wrong

What are project constraints?

Specific factors that can limit options

Tags

Specific keywords or phrases incorporated into website content for means of classification or taxonomy

What do SMART criteria for successful objective creation include?

Specific, measurable, agreed upon, realistic, time framed

What is the forging of the return address on an email so that the email message appears to come from someone other than the actual sender?

Spoofing

__________ is software that comes hidden in free downloadable software and tracks online movements, mines the information stored on a computer, or uses a computer's CPU and storage for some task the user know nothing about.

Spyware

EDI

Standard format for the electronic exchange of info between supply chain participants

What type of website is best to build for a general informational website with static information?

Static website

__________ analysis performs such functions as information correlations, distributions, calculations, and variance analysis.

Statistical

Platform as a Service

Supports the deployment of entire systems including hardware, networking, and applications using a pay-per-use revenue model.

The ____MIS infrastructure identifies ways that a company can grow in terms of computing resources while simultaneously becoming less dependent on hardware and energy consumption

Sustainable

___________ make customers reluctant to switch to another product or service.

Switching costs

Availability

System is operational during different time frames

Sales Management CRM System

System that automates each phase of the sales process, helping the individual sales reps coordinate and organize their accounts.

All of the following are business-critical integrity constraints, except:

System will not allow returns of fresh produce after 15 days past delivery

What is the overall process for developing information systems from planning and analysis through implementation and maintenance?

Systems development life cycle

Transaction Processing System

TPS

. A shopping bot is one of the simplest examples of an intelligent agent.

TRUE

A genetic algorithm is an artificial intelligence system that mimics the evolutionary, survival-of-the-fittest process to generate increasingly better solutions to a problem

TRUE

Information technology monitoring tracks people's activities by such measures as number of keystrokes, error rate, and number of transactions processed.

TRUE

What types of BI decisions include forecasting levels of bad loans and fraudulent credit card use, credit card spending by new customers, and which kinds of customers will best respond to new loan offers?

Banking BI decisions

What is the name for a small ad on one website that advertises the products and services of another business, usually another dot-com business?

Banner Ad

Market __________ analysis analyzes such items as websites and checkout scanner information to detect customers' buying behavior and predicts future behavior by identifying affinities among customers' choices of products and services.

Basket

What are the four global IT business management areas critical to running multinational companies?

Business strategies, enterprise architectures, information issues, systems development

Which of the following is a valid type of integrity constraint?

Business-critical integrity constraint

Which of the following is the first CRM implementation strategy?

Clearly communicate the CRM strategy

What is the abuse of pay-per-click, pay-per-call, and pay-per-conversation revenue by models by repeatedly clicking on a link to increase charges or costs for the advertiser?

Click Fraud

Which type of ebusiness model is Barnes and Noble using?

Click-and-mortar

Measured Service

Clients can monitor and measure transactions and use of resources

What are three examples of goods?

Clothing, groceries and cars

What refers to resources and applications hosted remotely as a shared service over the Internet?

Cloud Computing

CRM allows an organization to accomplish all of the following, except:

Complicate marketing and sales processes

CRM allows an organization to accomplish all of the following except:

Complicate marketing and sales processes.

Virtual Reality

Computer based simulated environment that can be a simulation of a real or imaginary world. -Fast growing area of artificial intelligence Example: Virtual surgery

Moore's Law

Computer chip performance per dollar doubles every 18 months

Server

Computer dedicated to providing info in response to requests.

Access Point

Computer or network device that serves as an interface between devices and networks.

Contract length, competitive edge, ____________, and scope definition are the four primary challenges for outsourcing.

Confidentiality

What is the assurance that messages and information remain available only to those authorized to view them?

Confidentiality

Which of the following is one of the primary reasons for the increase in Internet use?

Connectivity technology

Local Area Network (LAN)

Connects a group of computers in close proximity, such as a building, office, home or school

Enterprise Application Integration

Connects the plans, methods and tools aimed at integrating separate enterprise systems.

Which of the following implies that aggregate or summary information is in agreement with detailed information?

Consistency

Which of the following is the result of BI that the processes that deliver the data to the business community are well documents and there are no surprises such as missing or inaccurate data?

Consistent

Supply Chain

Consists of all parties involved directly or indirectly in obtaining raw materials or a product.

Explicit Knowledge

Consists of anything that can be documented, achieved, and codified, often with the help of IT.

Geographic Info System (GIS)

Consists of hardware, software, and data that provide location info for display on a multidimensional map.

What is hardware?

Consists of the physical devices associated with a computer system

What refers to the creation of new kinds of intermediaries that simply could not have existed before the advent of ebusiness, including comparison-shopping sites such as Froogle and bank account aggregation services such as Citibank?

Cybermediation

Transaction processing systems are primarily used to automate business processes. Automation increases efficiency and effectiveness, while reducing head count which in turn reduces overall operational

Costs

What is the difference between pirated and counterfeit software?

Counterfeit is software that is manufactured to look like the real thing and is sold as such. Pirated is the authorized use, duplication, distribution, or sale of copyrighted software.

What is software that is manufactured to look like the real thing and sold as such?

Counterfeit software

Who are hackers with criminal intent?

Crackers

User-Contributed Content

Created and updated by many users for many users

Virtualization

Creates multiple virtual machines on a single computing device Example: computer printer

Which of the following is not a type of feasibility study?

Critical success factor feasibility study

Critical Success Factors (one type of metric)

Crucial steps to achieve goals and objectives to implement their strategies.

A dimension is a particular attribute of information. Each layer in a data warehouse or data mart represents information according to an additional dimension. What is the common term for the representation of multidimensional information?

Cube

What are the three primary challenges facing global businesses?

Cultural, political, geoeconomic

Reporting

Customer Identification: Asking what happened 1) What is the total revenue by customer 2) How many units did we make? 3) What were the total sales by product? 4)How many customers do we have?

Predicting

Customer Prediction: Asking what will happen 1) What customers are at a risk of leaving? 2) Which products will our customers buy? 3) Who are our best customers for a marketing campaign? 4) How do we reach our customers?

Analyzing

Customer Segmentation: Asking why it happened 1) Why did the sales not meet the forecasts? 2) Why was production so low? 3) Why did we not sell as many units as previous years? 4) Who are our customers?

What is another term that represents CRM reporting technologies that help organizations identify their customers across other applications?

Customer identification

What is measured by such benchmarks as satisfaction surveys, percentage of existing customers retained, and increases in revenue dollars per customer?

Customer satisfaction

What is another term that represents CRM analysis technologies that help organizations segment their customers into categories such as best and worst customers?

Customer segmentation

Which of the following is not a valid way that a CRM system can collect information?

Customer's personal computer.

SCM

Customers, resellers, partners, suppliers and distributers

Who are the primary users of SCM systems?

Customers, resellers, partners, suppliers, and distributors

Project ______________ are any measurable, tangible, verifiable outcome, result, or item that is produced to complete a project or part of a project.

Deliverables

Software as a Service

Delivers applications over the cloud using a pay-per-use revenue model.

Smart Grid

Delivers electricity using 2-way digital technology. It is meant to solve the problem of the world's outdated electrical grid, making it more efficient and reliable by adding the ability to remotely monitor, analyze and control the transmission of power.

Infrastructure as a Service (IAAS)

Delivers hardware networking capabilities, including the use of servers, networking and storage over the cloud using pay-per-view revenue model.

Which company is expected to gain the majority of its returns on new investments?

Dell

Which of the following generates demand forecasts using statistical tools and forecasting techniques?

Demand planning software

What floods a website with so many requests for service that it slows down or crashes the site?

Denial-of-service attack

A(n) _________ is a logical relationship that exists between the project tasks, or between a project task and a milestone.

Dependency

What is the logical relationship that exists between the project tasks, or between a project task and a milestone?

Dependency

Network Effect

Describes how products in a network increase in value to users as the # of users increases. The more users and content mangers on wiki, the greater the network effect because more users attract more contributers.

Sustainable or Green MIS

Describes the production, management, use and disposal of technology in a way that minimizes the damage to the environment.

Which phase describes the desired features and operations of the system including screen layouts, business rules, process diagrams, pseudo code, and other documentation?

Design phase

Hotspots

Designed locations where Wifi access points are publically available.

Which of the following represents the different information granularities?

Detail, summary, aggregate

Disaster Recovery Plan

Detailed process for recovering info or a system in the event of a catastrophic disaster.

Which of the following is not one of the three primary information security areas?

Detection and resistance

If there is a security breach on your organizational information systems, which information security area is best suited to handle the breach?

Detection and response

Capacity Planning

Determines future environmental infrastructure requirements to ensure high quality system performance.

What is a feasibility study?

Determines if the proposed solution is feasible and achievable from a financial, technical, and organizational standpoint

Which of the following is not a technique for choosing strategic projects?

Develop a project plan

Ebusiness tools for connecting and communicating

Email, instant messaging, podcasting, videoconference, web conferencing and content management system

Information-Discovery Culture

Employees across departments are open to new insights about crisis and radical changes and seek ways to create competitive advantages

Information-Inquiring Culture

Employees across departments serach for information to better understand the future and align themselves with current trends and new directions

Operational Decisions

Employees develop, control and maintain core business activities to run day to day operations. They make structured decisions.

Wireless Access Point

Enables devices to connect to a wireless network to communicate with each other.

What is drill-down capability?

Enables users to get details, and details of details, of information

Drill Down

Enables users to view details and details of information

Analytical Info

Encompasses all organizational information and it supports the performance of managerial analysis or semi-structured decisions Examples: trends, sales, product stats and future growth predictions

Emergency Preparedness

Ensures a company is ready to respond to an emergency in an organized, timely and effective manner.

Supply Chain Execution Systems

Ensures supply chain cohesion by automating the different activities of the supply chain

What breaks a project into tiny phases, and developers cannot continue on to the next phase until the first phase is complete?

Extreme programming

What are the three primary types of management info systems available to support decision making across the company levels

Transaction processing systems, decision support systems, executive information systems

What encompasses all of the information contained within a single business process or unit of work and its primary purpose is to support the performance of daily operational tasks?

Transactional information

What encompasses all of the information contained within a single business process or unit of work and its primary purpose is to support the performing of daily operational tasks?

Transactional information

Which of the following is not a type of operational planning?

Transformational planning

____________ testing tests each unit of code as soon as the unit is complete to expose faults in the unit regardless of its interaction with other units.

Unit

Many social media sites today allow you to customize your Web address, for example www.facebook.com/Womenwithdrive. What is an alternate name for a web address such as www.apple.com?

Universal Resource Locator

Incidents

Unplanned interruption of a service

Which type of BI benefits are the results of discoveries made by creative users?

Unpredictable benefits

_________ collaboration includes document exchange, shared whiteboards, discussion forums, and email.

Unstructured

What includes document exchange, shared whiteboards, discussion forums, and email?

Unstructured collaboration

Which of the following is a business benefit of BI?

Up-to-the minute information for everyone

Value Chain Analysis

Views a firm as a series of business processes that each add value to the product or service

What enables computers to run multiple operating systems and multiple software applications at the same time and creates multiple "virtual" machines on a single computing device?

Virtualization

Website Metrics (includes)

Visitor metrics, exposure metrics, visit metrics and hit metrics

Wireless Internet Service Provider

WISP

Which of the below would not be considered a company operating in the long tail of a typical sales curve?

Walmart

Your boss, Ty Jacob, has asked you to analyze the music industry using Porter's Five Forces Model. Which of the following represents buyer power in the music industry?

Walmart, Target, iTunes.

Many industries have been forced to change due to technology advances. Which of the below industries has felt the lowest amount of economic impact from ebusiness?

Waste or recycling industry

The ___________ methodology is a sequential, activity-based process in which each phase in the SDLC is performed sequentially from planning through implementation and maintenance.

Waterfall

Identify the different ways in which companies collaborate using technology.

Ways in which companies collaborate include document exchange, shared whiteboards, discussion forums, and email.

Internet Service Provider (ISP), Online Service Provider (OSP), & Application Service Provider (ASP)

What are the 3 common forms of service providers?

document, digit asset, and web content

What are the 3 common types of content management systems?

detail (fine), summary, aggregate (coarse)

What are the 3 information granularities?

individual, department, and enterprise

What are the 3 informational levels?

accounting & finance, production & materials management, and human resources

What are the 3 most common core ERP components focusing on internal operations?

reporting, analyzing, and predicting

What are the 3 phases in the evolution of CRM?

contact center, web-based self-service, & call scripting

What are the 3 primary operational CRM technologies a customer service department can implement to increase customer satisfaction

list generator, campaign management, and cross-selling & up-selling

What are the 3 primary operational CRM technologies a marketing department can implement to increase customer satisfaction?

sales management, contact management, and opportunity management CRM systems

What are the 3 primary operational CRM technologies a sales department can implement to increase customer satisfaction?

Intranet, Extranet, Portal, & Kiosk

What are the 4 common tools for accessing Internet information?

Inception, Elaboration, Construction, & Transition

What are the 4 gates of the Rational Unified Process (RUP) Methodology?

document, presentation, spreadsheet, database

What are the 4 information formats?

BI, CRM, supply chain management, & ebusiness

What are the 4 most common extend ERP components?

Planning, Designing, Coding, and Testing

What are the 4 parts of Extreme Programming (XP) methodology?

learning & growth, internal business process, customer, & financial

What are the 4 perspectives of the balanced socrecard?

knowledge management, content management, workflow management, & groupware

What are the 4 systems that integrate to strengthen the collaboration process?

Users, System Analysts, Programmers, Technical Specialists, & System Stakeholders

What are the 5 different system development teams?

Planning, Analysis, Design, Development, Testing, Implementation, & Maintenance

What are the 7 phases of SDLC?

single point of access to information for all users, BI across organizational departments, & up-to-the-minue information for everyone

What are the business benefits of BI?

quantifiable, indirectly quantifiable, unpredictable, and intangible

What are the categories of BI benefits?

sales forecasts, sales strategies, & marketing campaigns

What are the primary business benefits of CRM?

forecasting, planning, purchasing, material management, warehousing, inventory, & distribution

What are the primary business benefits of ERP?

Market demand, resource and capacity constraints, and real-time scheduling

What are the primary business benefits of SCM?

RAD, XP, RUP, & Scrum

What are the primary forms of agile methodology?

telecommuting, online meetings, deploying applications, and remote project and sales management

What are the specific business tasks that collaboration solves?

People, information, information technology

What are the three primary organizational key resources in order of priority?

Customer Service

What business function receives the greatest benefit from IT?

customer reporting (identification), customer analysis (segmentation), and customer prediction

What can both operational and analytical CRM technologies assist in?

Which of the following is not one of the questions asked during the analyzing phase?

What customers are at risk of leaving?

sales department

What department was the first to begin developing CRM systems?

real-time systems

What do many organizations use to exploit key corporate transactional information?

forecasting

What is a common form of statistical analysis?

Reverse Auction

What is an example of the way that information technology can reduce supplier power for an organization and create a competitive advantage?

Which of the following provides an example of info

What is my worst selling product?

market basket analysis

What is one of the most common forms of association detection analysis?

credit-management feature

What is one of the most useful features included in an ERP accounting/finance component?

Usability

What is the ease with which people perform transactions and/or find information?

data-driven web

What is the first step on the path toward the full semantic web?

to introduce greater efficiencies/ improved productivity

What is the key reason for Business Process Management (BPM)

Relational Model

What is the most commonly used model today?

direct interaction between the organization and its customers

What is the primary difference between operational and analytical CRM?

Which of the following is not one of the questions asked during the predicting phase?

What is the total revenue by customer?

What key questions should IT governance answer?

What key metrics management requires?

Jigsaw Puzzle (individually the pieces don't make since until they are combined)

What metaphor is used to explain Extreme Programming methodology?

Five Forces Model, 3 Generic Strategies, & Value Chain Analysis

What three common tools do organizations use to analyze and develop competitive advantage?

businesses and consumer

What two major entities do ebusiness transactions take place between?

Disintermediation

When a business sells directly to a customer online and cuts out the intermediary.

What is trend projection?

When numerical data are available, a trend can be plotted to display changes through time and into the future

Reputation System

Where buyers post feedback on sellers

in a database

Where is organizational information stored?

OM information systems can answer all of the following questions, except:

Where the funding will come to support the effort?

Plunge Implementation

Which implementation method discards the old system completely and immediately starts to use the new system?

Pilot Implementation

Which implementation method has only a small group of people use the new system until it is evident that the new system performs correctly and then adds the remaining people?

Parallel Implementation

Which implementation method uses both the old and new system until it is evident that the new system performs correctly?

Business-critical

Which integrity constraint often requires more insight and knowledge?

Agile Methodology

Which methodology is fast and efficient, small and nimble, lower cost, fewer features, and shorter projects?

Waterfall Methodology

Which methodology is inflexible, expensive, and requires rigid adherence to the sequentially based steps in the process?

Primary Value Activities

Which part of the value chain acquires raw materials and manufactures, delivers, markets, sells, and provides after-sales services?

Which company uses statistical analysis to automatically detect potential issues, provide quick and easy access to reports, and perform multidimensional analysis on all warranty information?

Whirlpool

Which of the following is not one of the questions asked during the reporting phase?

Who are our customers?

sales, marketing, & customer service

Who are the primary users of CRM?

accounting, finance, logistics, and production

Who are the primary users of ERP?

customers, resellers, partners, suppliers, & distributors

Who are the primary users of SCM?

Managers

Who deals with Decision Support Systems (DSS)?

Executives

Who deals with Executive Information Systems (EIS)?

Analysts

Who deals with Transaction Processing Systems (TPS)?

What do organizations using BI ask to find the root causes to problems and provide solutions?

Why

Because the Return on Investment (ROI) is hard to determine (Ex. firewall)

Why is IT success difficult to measure?

What technology enables wireless networks to extend as far as 30 miles and transfer information, voice, and video at faster speeds than cable?

WiMAX wireless broadband

What is a web-based tool that makes it easy for users to add, remove, and change online content?

Wiki

Which of the following is one of the largest wikis on the web and one of the 10 most popular web destinations?

Wikipedia

Which of the following is a potential business impact from teleliving?

Will take over routine tasks such as writing a letter, retrieving a file, and making a phone call

What refers to any type of electrical or electronic operation that is accomplished without the use of a "hard-wired" connection?

Wireless

Bluetooth

Wireless PAN technology that transmits signals over short distances between cell phones, computers, and other devices. Operates at speeds up to 1 mbps within a range of 33 ft or less. Up to 8 can be paired up simultaneously.

What technology uses radio waves rather than wires to transmit information across a local area network?

Wireless local area network

Networking

Wireless, LAN, fiber and cable

Digital Dashboard

a common feature of EIS that integrates information from multiple components

Information Technology (IT)

a field concerned with the use of technology in managing and processing information

Benchmarking

a process of continuously measuring system results, comparing results to optimal system performance, and identifying steps and procedures to improve system performance

Competitive Advantage

a product or service that an organization's customers place a grater value on than similar offerings from a competitor; typically temporary

Model

a simplified representation or abstraction of reality

Executive Information System (EIS)

a specialized DSS that supports senior level executives within the organization (consolidation, drill-down, slice-and-dice)

click-to-talk buttons

allow customers to click on a button and talk with a CSR via the internet

Web based self service systems

allow customers to use the web to find answers to their q's or solutions to their problems

classification

assign records to one of a predefined set of classes

Web-based self-service system

allow customers to use the web to find answers to their questions or solutions to their problems (ex. click-to-talk)

Integration

allows separate systems to communicate directly with each other

integration

allows separate systems to communicate directly with each other

Attributes

also called fields/columns, are characteristics or properties of an entity class

Throughput

amount of information that can travel through a system at any point in time

Wireless Internet Service Provider (WISP)

an ISP that allows subscribers to connect to a server at designated hotspots or access points using a wireless connection

Ebusiness Model

an approach to conducting electronic business on the Internet

core competency

an organization's key strength, a business function that it does better than any of its competitors

Business Process Reengineering (BPR)

analysis and redesign of workflow within and between enterprises (in the extreme it assumes the current process is irrelevant, doesn't work , or is broken)

Market basket analysis

analyzes such items as websites and checkout scanner information to detect customers' buying behavior and predict future behavior by identifying affinities among customers' choices of products and services; is frequently used to develop marketing campaigns for cross-selling products and services and for inventory control, shelf-product placement, and other retail and marketing applications

Explicit knowledge

anything that can be documented, archived, and codified, often with help of IT

Project management

application of knowledge, skills, tools, and techniques to project activities to meet project requirements

Business-to-Consumer (B2C)

applies to any business that sells its products or services to consumers over the Internet (eshop and emall)

Consumer-to-Business (C2B)

applies to any consumer that sells a prodcut or service to a business over the internet (ex. Priceline)

Business-to-Business (B2B)

applies to businesses buying from and selling to each other over the internet; gives online access to data

Business Process Improvement

attempts to understand and measure the current process and make performance improvements accordingly

Consumer-to-Consumer (C2C)

applies to sites primarily offering goods and services to assist consumers interacting with each other over the internet (ex. Ebay)

Outsourcing

arrangement by which one org provides services for another org that chooses not to perform them in house

Sales management CRM systems

automate each phase of the sales process, helping individual sales representatives coordinate and organize all of their accounts

Sales management CRM systems

automate each phase of the sales process, helping individual sales representatives coordinate and organize all of their accoutns

SC execution (SCE) systems

automate the different steps and stages of the supply chain

A collaboration system is an IT-based set of tools that supports the work of teams by facilitating the sharing and flow of information.

TRUE A collaboration system is an IT -based set of tools that supports the work of teams by facilitating the sharing and flow of information.

A content management system provides tools to manage the creation, storage, editing, and publication of information in a collaborative environment.

TRUE A content management system provides tools to manage the creation, storage, editing, and publication of information in a collaborative environment.

A dependency is a logical relationship that exists between the project tasks, or between a project task and a milestone.

TRUE A dependency is a logical relationship that exists between the project tasks, or between a project task and a milestone.

A kill switch is a trigger that enables a project manager to close the project prior to completion.

TRUE A kill switch is a trigger that enables a project manager to close the project prior to completion.

.A prototype is a smaller-scale representation or working model of the users' requirements or a proposed design for an information system.

TRUE A prototype is a smaller-scale representation or working model of the users' requirements or a proposed design for an information system.

Data is a strategic asset for a business and if the asset is not used the business is wasting resources.

TRUE Data is a strategic asset for a business and if the asset is not used the business is wasting resources.

Designing the IT infrastructure typically occurs during the design phase.

TRUE Designing the IT infrastructure typically occurs during the design phase.

Improving the quality of business decisions has a direct impact on costs and revenue.

TRUE Improving the quality of business decisions has a direct impact on costs and revenue.

In the past, outsourcing was often used tactically, as a quick-fix, short-term solution to a particular need or problem which did not form part of an overall business strategy.

TRUE In the past, outsourcing was often used tactically, as a quick-fix, short-term solution to a particular need or problem which did not form part of an overall business strategy.

Instant messaging is a type of communications service that enables someone to create a kind of private chat room with another individual in order to communicate in real-time over the Internet.

TRUE Instant messaging is a type of communications service that enables someone to create a kind of private chat room with another individual in order to communicate in real-time over the Internet.

What are the detailed steps the system must perform along with the expected results of each step?

Test conditions

In which phase is it most expensive to make a system change?

Testing

What is slice-and-dice capability?

The ability to look at information from different perspectives

Mobile Business

The ability to purchase goods and services through wireless internet enabled device

What statement below describes Web 3.0's feature that ensures the "integration of legacy devices"?

The ability to use current devices such as iPhones and laptops as credit cards or tickets.

Which of the below represents the definition of information compliance?

The act of conforming, acquiescing or yielding info

Business Process Modeling or Mapping

The activity of creating a detailed flow chart or process map of work processes that shows inputs, tasks and activities in a structured process.

What is a CPU?

The actual hardware that interprets and executes the program (software) instructions and coordinates how all the other hardware devices work together

Universal Resource Locator (URL)

The address of a file or resource on the web such a www.apple.com

What is business process reengineering?

The analysis and redesign of workflow within and between enterprises.

Which of the following describes confidentiality?

The assurance that messages and information are available only to those who are authorized to view them.

Identify the business benefits associated with successful software development.

The benefits associated with successful software development include increase in revenues, repair to brand reputation, prevent liabilities, and increase in productivity.

Online Transaction Processing (OTP)

The capture of an event using technology 1) Process the info according to defined business rules 2) Store the info 3) Update existing info to reflect the new info

Unified Communication (UC)

The integration of communication channels into a single service. Allows participants to communicate using the method that is convenient for them.

Service Oriented Architecture (SOA)

business-driven IT architectural approach that supports integrating a business as linked, repeatable tasks or services; collection of services that communicate with each other

eprocurement

business-to-business purchase and sale of supplies and services over the internet

Click to talk

buttons that allow customers to click on a button and talk w/ a CSR via the Net

Ecommerce

buying and selling of goods and services over the internet (refers only to online transactions)

CMMI

capability maturity model integration is a framework for best practices

Online Transaction Processing (OLTP)

capturing of transaction and event information using technology to 1. process the information according to defined business rules, 2. store the information, and 3. update existing information to reflect the new information

Neural Network (or Artificial Neural Network)

category of AI that attempts to emulate the way the human brain works

What-if Analysis

checks the impact of a change in an assumption on the proposed solution

Production

creation of goods and services using factors of production: land, labor, capital, entrepreneurship, and knowledge

CRM challenges

data collection & management, channel integration, chain-wide execution, customer ownership of the product, self-cannibalization vs. cannibalization, and customer privacy

Information

data converted into a meaningful and useful context

classification, estimation, affinity grouping, & clustering

data mining activities

Operational planning and control (OP&C)

deals with day to day procedures for performing work, including scheduling, inventory, and process management

Physical view

deals with the physical storage of info on a storage device, like hard disk

Service Level Agreements (SLAs)

define the specific responsibilities of the service provider and set the customer expectations (include availability, accessibility, performance, maintenance, backup/recovery, upgrades, equipment ownership, software ownership, security, and confidentiality)

Workflow

defines all steps or business rules, from beginning to end, required for a business process

workflow

defines all the steps or business rules, from beginning to end, required for a business process

Project scope

defines work that must be completed to deliver a product with the specified features and fuctions

Production management

describes all activities managers do to help companies create goods

Schema

describes the objects that are represented in the database and the relationships among them

Business Requirement

detailed set of business requests that the system must meet in order to be successful

Business requirements

detailed set of business requests that the system must meet in order to be successful

estimation

determine values for an unknown continuous variable behavior or estimated future value

affinity grouping

determine which things go together

Feasibility Study

determines if the proposed solution is possible and achievable from a financial, technical, and organizational standpoint

Computer-Assisted Software Engineering (CASE)

development approach that uses specialized tools to automate many of the tasks in the SDLC

data-driven website advantages

development, content management, future expandability, minimizing human error, cutting production and update costs, more efficient, & improved stability

Project charter

document issued by project initiator or sponsor that formally authorizes the existence of a project and provides project manager with the authority to apply org resources to project activities

Redundancy

duplication of info, or storing the same info in multiple places

redundancy

duplication of information, or storing the same information in multiple places

What are the policies and procedures that address the ethical use of computers and Internet usage in the business environment?

ePolicies

Rapid app development (RAD) methodology

emphasizes extensive user involvement in the rapid and evolutionary construction of working prototypes of a system to accelerate the systems development process

Information-Sharing Culture

employees across departments trust each other to use information (especially about problems and failures) to improve performance

Drill-down

enables users to view details, and details of details, of information. Viewing months, weekly, daily, or even hourly information

Transactional information

encompasses all information contained within a single business process or unit of work, and its primary purpose is to support performing daily operational tasks

primary key

field (or group of fields) that uniquely identifies a given entity in a table; provide a way of distinguishing each entity in a table

attributes

fields or columns, characteristics or properties of an entity class

Goal-seeking Analysis

finds the inputs necessary to achieve a goal such as a desired level of output. Sets a target value for a variable and then repeatedly changes other variables until the target value is achieved

network database model

flexible way of representing objects and their relationships; allows each record to have multiple parent and child records, forming a lattice structure

Logical view

focuses on how users logically access info to meet their particular business needs

Tactical planning

focuses on intermediate range decisions; focuses on producing goods and services as efficiently as possible within strategic plan

Supplier relationship management (SRM)

focuses on keeping suppliers satisfied by evaluating and categorizing suppliers for different projects, which optimizes supplier selection

Supplier relationship management (SRM)

focuses on keeping suppliers satisfied by evaluation and categorizing suppliers for different projects, which optimizes supplier selection

Partner relationship management (PRM)

focuses on keeping vendors satisfied by managing alliance partner and reseller relationship that provide customers with the optimal sales channel

Partner relationship management (PRM)

focuses on keeping vendors satisfied by managing alliance partner and reseller relationships that provide customers with the optimal sales channel

Strategic planning

focuses on long range planning such as plant size, location, etc.

Project plan

formal, document that manages and controls project execution (easy to read, understand, communicated to all key participants, appropriate, and prepared by team rather than individual)

Management Information Systems (MIS)

general name for the business function and academic discipline covering the application of people, technologies, and procedures to solve business problems

demand planning systems

generate demand forecasts using statistical tools and forecasting techniques

World Wide Web (WWW)

global hypertext system that uses the Internet as its transport mechanism

Internet

global public network of computer networks that pass information from one to another using common computer protocols

Six sigma

goal is to detect potential problems to prevent occurrence and achieve no more than 3.4 defects/million opportunities

PERT (Program Evaluation and Review Technique) chart

graphical network model that depicts project's tasks and relationships between those tasks

Campaign management systems

guide users through marketing campaigns performing such tasks as campaign definition, planning, scheduling, segmentation, and success analysis

Production and materials management ERP components

handle the various aspects of planning and execution such as demand forecasting, production scheduling, job cost accounting, and quality control

CRM reporting technologies

help organizations identify their customers across other applications

CRM predicting technologies

help organizations make predictions regarding customer behavior such as which customers are at risk of leaving

CRM analysis technologies

help organizations segment their customers into categories such as best and worst customers

CRM reporting technologies

help orgs identify their customers across other applications

CRM predicting technologies

help orgs make predictions regarding customer behavior such as which customers are at risk of leaving

CRM analysis technologies

help orgs segment their customers into categories such as best and worst customers

performance

how quickly a system performs a certain process or transaction

logical view

how users logically access information to meet their particular business needs

Real time information

immediate, up to date information

Real-time Information

immediate, up-to-date information

Digital Darwinism

implies that organizations which cannot adapt to the new demands placed on them for surviving in the information age are doomed to extinction

Entity

in relational database is a person, place, thing, transaction, or even about which information is stored

Foreign key

in relational database model is a primary key of one table that appears as an attribute in another table and acts to provide a logical relationship between the two

entity

in the relational database model, is a person, place, thing, transaction, or event about which information is store

Change management system

includes collection of procedures to document a change request and define steps necessary to consider the change based on expected impact of change

Unstructured collaboration (info collaboration)

includes document exchange, shared whiteboards, discussion forums, and email

top 4 reasons organization launch KMS

increase profits or revenues, retain key talent and expertise, improve customer retention and/or satisfaction, and defend market share against new entrants

advantages of database information

increased flexibility, increased scalability and performance, reduced information redundancy, increased information integrity (quality), and increased information security

up-selling

increasing the value of the sale

Project manager

ind who is an expert in project planning and management, defines and develops the project plan, and tracks the plan to ensure the project is completed on time and on budget

Project stakeholders

individuals and orgs actively involved in the project or whose interests might be affected as a result of project execution or project completion

Hierarchical database model

information is organized into a tree like structure that allows repeating information using parent/child relationships in way that can't have too many relationships

Hierarchical database model

information is organized into a tree-like structure that allows repeating information using parent/child relationships in such a way that it cannot have too many relationships

According to the ethical computer use policy, users should be ______________ of the rules and, by agreeing to use the system on that basis, _______________ to abide by the rules.

informed; consent

Enterprise resource planning (ERP):

integrates all departments and functions throughout an organization into a single IT system (or integrated set of IT systems) so that employees can make decisions by viewing enterprise wide information on all business operations.

Tacit knowledge

knowledge contained in people's head

tacit knowledge

knowledge contained in people's heads

data warehouse

logical collection of information--gathered from many different operational databases--that supports business analysis activities and decision-making tasks

Dependency

logical relationship that exists between the project tasks, or between a task and a milestone

Using the collective power of a community to identify and classify content significantly _________ content categorization costs.

lowers

Contact management CRM system

maintains customer contact info and identifies prospective customers for future sales

Contact management CRM system

maintains customer contact information and identifies prospective customers for future sales

Database

maintains information about various types of objects (inventory), events (transactions), people (employees, and places (warehouses)

Database

maintains information about various types of objects, events, people, and places

Accounting and finance ERP components

manage accounting data and financial processes within the enterprise with functions such as general ledger, A/P, A/R, budgeting and asset management

Accounting & Finance ERP components

manage data and processes within the enterprise with functions such as general ledger, accounts payable, accounts receivable, budgeting, and asset management

Operations management (OM)

management of systems or processes that convert or transform resources into goods and services

balanced scorecard

management system that enables orgs to clarify their vision and strategy and translate them into action

balanced scorecard

management system, in addition to a measurement system, that enables organizations to clarify their vision and strategy and translate them into action

elogistics

manages the transportation and storage of goods

Elogistics

manages transportation and storage of goods

Online Analytical Processing (OLAP)

manipulation of information to create business intelligence in support of strategic decision making

Fuzzy Logic

mathematical method of handling imprecise or subjective information (assign values between 0 and to vague or ambiguous information with the higher the value the closer to 1)

Information integrity

measure of the quality of information

information integrity

measure of the quality of information

Performance

measures how quickly a system performs a certain process or transaction

Key performance indicator (KPI)

measures that are tied to business drivers (metrics)

Effectiveness IT Metric

measures the impact IT has on business processes and activities including customer satisfaction, conversion rates, and sell-through increases; "doing the right things"; focuses on how well an organization is achieving its goals and objectives

Efficiency IT metric

measures the performance of the IT system itself including throughput, speed, and availability; "doing things right"; extent on which an organization is using its resources in an optimal way

Interactivity

measures the visitor interactions with the target ad on a website

Extreme Programming (XP) Methodology

methodology that breaks a project into tiny phases, and developers cannot continue on to the next phase until the first phase is complete

Rapid Application Development (RAD) (Rapid Prototyping) Methodology

methodology that emphasizes extensive user involvement in the rapid and evolutionary construction of working prototypes of a system to accelerate the systems development process

Rational Unified Process (RUP) Methodology

methodology that provides a framework for breaking down the development of software into four gates which each consist of executable iterations of the software in development

Issues with low quality information

missing information, incomplete information, probably duplication, potential wrong information, inaccuracy information, and incomplete information

Decision Support System (DSS)

models information to support managers and business professionals during the decision-making process (ex. sensitivity analysis, what-if analysis, and goal-seeking analysis)

ISO 900

name given to quality management and assurance standards. ISO est. in 1947 promotes development of world standards. Requires company determines customer needs and arrange how to handle issues

Maintenance, Repair, and Operations (MRO) Materials

necessary for running an organization but do not relate to the company's primary business activities (office supplies, equipment, furniture, computers, and replacement parts)

Disruptive Technology

new way of doing things that initially does not meet the needs of existing customers; tend to open new markets and destroy old ones

Databased models (data models)

number of different ways of organizing a schema/modeling the database structure

information partnership

occurs when 2 or more organizations cooperate by integrating their IT systems, thereby providing customers with the best of what each can offer

Personalization

occurs when a website can know enough about a person's likes and dislikes to fashion offers that are more likely to appeal to that person

personalization

occurs when a website can know enough about a person's likes and dislikes to fashion offers that are more likely to appeal to that person

First-mover Advantage

occurs when an organization can significantly impact its market share by being first to market with a competitive advantage

Feature creep

occurs when developers add extra features that were not part of initial requirements

bullwhip effect

occurs when distorted product demand info passes from one entity to the next throughout the SC

Scope creep

occurs when scope of project increases

Business Inteligence

offer powerful tools that measure and control organizational ops

Online Service Provider (OSP)

offers an extensive array of unique services such as its own version of a web browser; ISPs that offer Internet access and their own online content (ex. AOL)

Transform process

often referred to as technical core, is the actual conversion of inputs to outputs

Core competency strategy

one in which organization chooses to focus specifically on what it does best

core competency strategy

organization choose to focus specifically on what it does best and forms partnerships and alliances with other specialist organizations to handle nonstrategic business processes

Core competency

organization's key strengths, a business function it does better than any of its competitors

Systems development life cycle (SDLC)

overall process for developing info systems from planning and analysis through implementation and maintenance

System Development Life Cycle (SDLC)

overall process for developing information systems from planning and analysis through implementation and maintenances

Critical path

path from the start to the finish that passes through all tasks that are critical to completing the project in shortest amount of time

statistical analysis

performs such functions as information correlations, distributions, calculations, and variance analysis

Executive sponsor

person or group who provides the financial resources for the project

physical view

physical storage of information on a storage device such as a hard disk

forecasts

predictions made on the basis of time-series information

Electronic Catalog

presents customers with information about goods and services offered for sale, bid, or auction on the Internet

foreign key

primary key of one table that appears as an attribute in another table and acts to provide a logical relationship between the 2 tables

Materials requirement planning (MRP) systems

primary system for strategic planning. Uses sales forecasts to make sure that needed parts and materials are available at the right time and place in specific company

data mining

process of analyzing data to extract information not offered by the raw data alone

Social networking analysis (SNA)

process of mapping a group's contacts to identify who knows whom and who works with whom

information cleansing or scrubbing

process that weeds out and fixes or discards inconsistent, incorrect, or incomplete information

Sustaining Technology

produces an improved product customers are eager to buy (faster car, larger hard drive, etc.); better, faster, and cheaper products in established markets

Internet Engineering Task Force (IETF)

protocol engineering and development arm of the internet

Mashup Editors

provide a visual interface to build a mashup, often allowing the user to drag and drop data points into a web application; what you see is what you get

Global inventory management systems

provide ability to locate, track, and predict the movement of every component or material anywhere upstream or downstream in production process

CRM benefits

provide better customer service, improve call center efficiency, cross-sell products more effectively, help sales staff close deals faster, simplify marketing and sales processes, discover new customers, & increase customer revenue

Inventory and control systems

provide control and visibility to status of individual items maintained in inventory

Real time systems

provide real time information in response to query reports

Real-time Systems

provide real-time information in response to query requests; make faster and more effective decisions, keep smaller inventories, operate more efficiently, and track performance more carefully

Employee relationship management (ERM)

provides employees with a subset of CRM applications available through a web browser

Employee relationship management (ERM)

provides employees with subset of CRM apps available through a we browser

Rational unified process (RUP) methodology

provides framework for breaking down the development of software into four gates

Content management system

provides tools to manage the creation storage, editing, and publication of info in collaborative environment

content management system

provides tools to manage the creation, storage, editing, and publication of information in a collaborative environment

Kiosk

publicly accessible computer system that has been set up to allow interactive information browsing

Which of the following is an example of transactional information?

purchasing stock

Project objectives

quantifiable criteria that must be met for project to be considered a successo

Data

raw facts that describe the characteristic of an event

Data

raw facts that describe the characteristics of an event

Business intell (BI)

refers to applications and tech that are used to gather, provide access to, and analyze data and info to support decision making efforts

Business Intelligence (BI)

refers to applications and technologies that are used to gather, provide access to, and analyze data and information to support decision-making efforts

Informational granularity

refers to extent of detail within information (fine and detailed or coarse and abstract)

Scalability

refers to how well a system can adapt to increased demands

scalability

refers to how well a system can adapt to increased demands

As-Is Process Models

represent the current state of the operation that has been mapped, without any specific improvements or changes to existing processes; what the process problem is

Enterprise application integration (EAI) middleware

represents a new approach to middleware by packaging together commonly used functionality, such as providing prebuilt links to popular enterprise applications, which reduces the time necessary to develop solutions that integrate applications from multiple vendors

enterprise application integration (EAI) middleware

represents new approach to middleware by packaging together commonly used functionality which reduces time necessary to develop solutions that integrate apps from multiple vendors

eBay buyers voluntarily comment to other users and sellers on the quality of service, promptness of shipping, and their general satisfaction with the product. This is one of the most popular examples of user-generated content and is called a(n) ____________.

reputation system

Internet Engineering Steering Group (IESG)

responsbile for technical management of Internet Engineering Task Force (IETF) activities and the internet standards process

Chief Information Officer (CIO)

responsible for 1. overseeing all uses of information technology 2. ensuring the strategic alignment of IT with business goals and objectives; Often reports directly to the CEO; They are a manager, leader, and communicator.

Change control board (CCB)

responsible for approving or rejecting all change requests

Chief Knowledge Officer (CKO)

responsible for collecting, maintaining, and distributing the organization's understandings; designs programs and systems that make it easy for people to reuse knowledge

Internet Architecture Board (IAB)

responsible for defining the overall architecture of the internet, providing guidance and broad direction to the Internet Engineering Task Force (IETF)

Chief Privacy Officer (CPO)

responsible for ensuring the ethical and legal use of information within an organization; many are lawyers by training

Chief Security Officer (CSO)

responsible for ensuring the security of IT systems and developing strategies and IT safeguards against attacks from hackers and viruses; possess detailed knowledge of networks and telecommunications because hackers and viruses usually find their way into IT systems through networked computers

Prototype

smaller-scale representation or working model of the users' requirements or a proposed design for an information system

groupware

software that supports team interaction and dynamics including calendaring, scheduling, and video-conferencing

Groupware

software that supports team interaction and dynamics including calendaring, scheduling, and videoconferencing

Database management system (DBMS)

software through which users and application programs interact with a database

Database management system (DBMS)

software through which users and application programs interact with database

Intelligent Agent

special purpose knowledge based information system that accomplishes specific tasks on behalf of its users

Project constraints

specific factors that can limit options (budget, delivery dates, etc)

Business Process

standardized set of activities that accomplish a specific task (Ex. processing a customer's order)

Protocols

standards that specify the format of data as well as the rules to e followed during transmission

Database based workflow systems

store documents in a central location and automatically ask team members to access document when it is their turn to edit it

database-based workflow systems

store documents in a central location and automatically ask the team members to access the document when it is their turn to edit the document

Sensitivity Analysis

study of impact that changes in one (or more) parts of the model have on other parts of the model. Users change the value of one variable repeatedly and observe the resulting changes in other variables

Analytical CRM

supports back office operations and strategic analysis and includes all systems that don't deal directly with the customers

Analytical CRM

supports back-office operations and strategic analysis and includes all systems that do not deal directly with the customers

Knowledge management system (KMS)

supports capturing, organization, and dissemination of knowledge throughout org

knowledge management system (KMS)

supports the capturing, organization, and dissemination of knowledge throughout an organization

Operational CRM

supports traditional transactional processing for day to day front office operations or systems that deal directly with the customers

Operational CRM

supports traditional transactional processing for day-to-day front-office operations or systems that deal directly with the customers

Sales force automation (SFA)

system that automatically tracks all of the steps in the sales process

Backward integration

takes all info entered into given system and sends it upstream to all systems

Forward integration

takes info entered into one system and sends it automatically to all downstream systems and processes

forward integration

takes information entered into a given system and sends it automatically to all downstream systems and processes

backward integration

takes information entered into a given system and sends it automatically to all upstream systems and processes

Opportunity management CRM systems

target sales opportunities by finding new customer or companies for future sales

Opportunity management CRM systems

target sales opportunities by finding new customers or companies for future sales

cluster analysis

technique used to divide an information set into mutually exclusive groups such that the members of each group are as close together as possible to one another and the different groups are as far apart as possible

Project

temporary endeavor undertaken to create a unique product, service, or result

Value added

term used to describe difference between the cost of inputs and the value of price of outputs

Slice-and-Dice

the ability to look at information from different perspectives. One part of information could display all product sales during a given promotion, while another could display a single product's sales for all promotions

Graphical User Interface (GUI) Screen Design

the ability to model the information system screens using icons, buttons, menus, and submenus

Information Richness

the depth and breadth of information transferred between customers and businesses

Information Granularity

the extent of detail within the information (fine and detailed or coarse and abstract)

Extended ERP components

the extra components that meet the organizational needs not covered by the core components and primarily focus on external operations.

Information Reach

the number of people a business can communication with, on a global basis

Core ERP components

the traditional components in most ERP systems and they primarily focus on internal operations.

Switching Costs

things that make a customer reluctant to move to another product or service

low; high

threat of new entrants is ____when there are significant entry barriers to entering a market and ____ when it is easy for new competitors to enter a market

data latency

time duration to make data ready for analysis and loading the data in to the database

Data latency

time duration to make data ready for analysis and put into database. Takes shortest amount of time

Analysis latency

time from which data are made available to the time when analysis is complete

Analysis latency

time from which data are made available to time when analysis is complete.

decision latency

time it takes a human to comprehend the analytic result and determine an appropriate action

Decision latency

time it takes human to comprehend analytical result and determine and appropriate action. This form of latency is very difficult to reduce

time-series information

time-stamped information collected at a particular frequency

Transportation planning systems

track and analyze the movement of materials and products to ensure the delivery of materials and finished goods at the right time, place, and lowest cost

Human resources ERP components

track employee information including payroll, benefits, compensation, and performance assessment, and assure compliance with the legal requirements of multiple jurisdictions and tax authorities

Kill switch

trigger than enables a project manager to close the project prior to completion

Web Mashup

website or web applicaton that uses content from more than one source to create a competely new service

Portal

website that offers a broad array of resources and services (such as email, online discussion groups, search engines, and online shopping malls)

Digital Divide

when those with access to technology have great advantages over those without access

Contact center (or call center)

where customer service representatives (CSRs) answer customer inquiries and respond to problems through a number of different customer touchpoints

Contact center (call center)

where customer service reps (CSRs) answer customer inquiries and respond to problems through a number of different customer techs

Joint Application Development (JAD) Session

where employees meet to define or review the business requirements for the system

Which phase of the SDLC gathers business requirements?

Analysis

____________ maintenance makes changes to repair system defects.

Corrective

Tactical BI

Form of BI that helps with daily analysis and results in refined campaign

Strategic BI

Form of BI that helps with planning and results in marketing campaign

What do most companies measure to determine the success of their websites?

Traffic

Business-facing processes

"Back office processes" invisible to the customer but essential to the effective management of the business. Example: Goal setting, day to day planning, giving performance feedback and rewards and allocating resources

Customer-facing processes

"front office processes" product or service that is received by an organization's external customer Example: Fulfilling orders, communicating with customers, sending out bills and marketing info

List and define the four most common categories of AI.

(1) Expert systems are computerized advisory programs that imitate the reasoning processes of experts in solving difficult problems. (2) Neural Networks attempt to emulate the way the human brain works. (3) Genetic algorithm - system that mimics the evolutionary, survival-of-the-fittest process to generate increasingly better solutions to a problem. (4) Intelligent agents are special-purposed knowledge-based information system that accomplishes specific tasks on behalf of its users.

List and define the four primary reasons for the growth of decision-making information systems.

(1) People need to analyze large amounts of information. (2) People must make decisions quickly. (3) People must apply sophisticated analysis techniques, such as modeling and forecasting, to make good decisions. (4) People must protect the corporate asset of organizational information.

3 Operational CRM Technologies for a CS Dept

1) Contact Center 2) Web-based self-service 3) Call scripting

3 Sustainable MIS infrastructure Components

1) Cloud computing 2) Grid computing 3) Virtualization

Which of the below should be included in a company email privacy policy?

-Definition of legitimate email users and explanation of what happens to accounts after a person leaves the organization. -Statement discouraging sending junk email or spam to anyone who doesn't want to receive it. -Statement informing users that the organization has no control over email once it has been transmitted outside the organization

Describe the three capabilities commonly offered by an EIS.

1) Consolidation involves the aggregation of information and features simple roll-ups to complex groupings. (2) Drill-down enables users to get details, and details of details. (3) Slice-and-dice looks at information from different perspectives.

. Which of the following represents market basket analysis?

. Analyzes website information B. Analyzes checkout scanner information C. Detects customers' buying behavior D. All of the above*

Which of the following is an issue related to the waterfall methodology?

. Flaws in accurately defining and articulating the business problem B. Managing costs, resources, and time constraints C. Assumes users can specify all business requirements in advance D. All of the above*

What category of outsourcing countries includes Brazil, China, Malaysia, Mexico, Russia, and South Africa?

. The up-and-comers

Which of the following describes information technology monitoring?

. Tracking people's activities by such measures as number of keystrokes B. Tracking people's activities by such measures as error rate C. Tracking people's activities by such measures as number of transactions processed D. All of the above*

What is an activity-based process in which each phase in the SDLC is performed sequentially from planning through implementation and maintenance?

. Waterfall methodology

What is the success rate for a project using the waterfall methodology?

1 in 10 The waterfall methodology has a 10 percent success rate, or 1 in 10.

What 3 goals/objectives might a leadership plan include to achieve a solid business strategy?

1) Attracting new customers 2) Decreasing costs 3) Increasing sales

Three Primary Elements of MIS Infrasture

1) Back up and recovery plan 2) Disaster recovery plan 3) Business continuity plan

Industry-Specific Customer Facing Processes

1) Banking - loan 2) Insurance - Claim 3) Government - Grant allocation 4) Hotel - Reservation 5) Airline - Baggage

What are 3 generic business strategies Porter identified for entering a new market?

1) Broad differentiation 2) Broad cost leadership 3) Focused strategy

Ways Data Centers can be more Sustainable

1) Carbon emissions 2) Reduce energy consumption 3) Floor space 4) Stores greater amounts of info in less space 5) Geographic location 6) Resources are inexpensive, clean and available

What are the challenges of a connected world?

1) Networks create a diverse globally connected world eliminating time and distance 2) Networks make it possible to communicate in ways not previously imaginable 3) Even though networks provide many business advantages, they also create increased challenges in security, social, ethical and political issues.

Five Basic Supply Chain Activities

1) Plan 2) Source 3) Make 4) Deliver 5) Return

Decision Making Process (6 steps)

1) Problem identification 2) Data collection 3) Solution generation 4) Solution test 5) Solution selection 6) Solution implementation

Challenges of Wireless Networks

1) Protecting against theft 2) Protecting wireless connections 3) Preventing viruses on mobile devices 4) Addressing privacy concerns with RFID and LBS.

Business Facing Processes

1) Strategic planning 2) Tactical planning 3) Budget forecasting 4) Training 5) Purchasing raw materials

What are 2 support value activities?

1) Technology Development 2) Firm Infrastructure

What are 3 examples of service?

1) Waiting tables 2) Cutting hair 3) Personal training

Which company turned brand loyalty into brand relationships by using the vast amounts of information it collected to better understand customers' needs and expectations?

1-800-Flowers.com

Web 3.0

1. transforming the web into a database 2. evolutionary path to artificial intelligence 3. realization of semantic web and service-oriented architecture 4. evolution toward 3-D

Anne-Marie Cole runs the sales division for a local auto insurance firm. One of her key duties is to calculate her company's market share. When evaluating the prior year numbers, she found that her firm achieved total sales of $3 million and the entire industry had $30 million in sales. What is Anne-Marie's current market share?

10%

forward and backward or central repository

2 integration methods

Transactional and Analytical

2 primary types of information

directly and indirectly

2 primary ways that users can interact with a DBMS

relational and business-critical

2 types of integrity constraints

How many days is a typical sprint in the Scrum methodology?

30 days

How many days is a typical sprint in the scrum methodology?

30 days

online customers intentional enter inaccurate information to protect their privacy, different systems have different information entry standards and formats, call center operators enter abbreviated or erroneous information by accident or to save time, 3rd party and external information contains inconsistencies, inaccuracies, and errors

4 primary sources of low quality information

Which of the following represents the estimated percentage that spam accounts for in an organizations' email traffic?

40 to 60 percent

How long does a product's entire life cycle last today?

40 weeks

Geocache

A GPS technology adventure game that posts the longitude and latitude location for an item on the internet for users to find.

Describe the two primary diagrams most frequently used in project planning.

A PERT (Program Evaluation and Review Technique) chart is a graphical network model that depicts a project's tasks and the relationships between those tasks. A dependency is a logical relationship that exists between the project tasks, or between a project task and a milestone. A Gantt chart is a simple bar chart that depicts project tasks against a calendar. In a Gantt chart, tasks are listed vertically and the project's time frame is listed horizontally. A Gantt chart works well for representing the project schedule. It also shows actual progress of tasks against the planned duration.

What is failover?

A backup operational mode in which the functions of a computer component (such as a processor, server, network, or database) is assumed by secondary system components when the primary component becomes unavailable through either failure or scheduled down time

Bonnie Flat is a real estate agent who specializes in the luxury home market in Seattle, WA area. Bonnie is highly-technical and uses many types of online marketing techniques to increase business. One of the most successful online marketing techniques is to place a box along the top of real estate websites and luxury custom furniture websites. What type of

A banner ad

Bonnie Flat is a real estate agent who specializes in the luxury home market in the Seattle, Washington area. Bonnie is highly technical and uses many online marketing techniques to increase business. One of the most successful online marketing techniques is to place a box along the top of real estate websites and luxury custom furniture websites. What type of marketing technique is Bonnie using?

A banner ad

What is the difference between a business model and an ebusiness model?

A business model details how a company creates, delivers, and generates revenue. An ebusiness model does all of the same except on the Internet.

What is a pure-play business?

A business that operates only on the Internet without a physical store.

A change control board (CCB) that is responsible for approving or rejecting all change requests.

A change control board (CCB) that is responsible for approving or rejecting all change requests.

System

A collection of parts that link to achieve a common purpose. They are the primary enabler of cross-functional operations.

Secure Hypertext Transfer Protocol (SHTTP or HTTPS)

A combo of HTTP and SSL to provide encryption to secure identification of an internet server. Protects against interception of communications, transferring credit card info.

Worldwide Interoperability for Microwave Access (WiMAX)

A communications technology aimed at providing high speed wireless data over metro area networks. Operates like a Wifi, but covers greater distances and higher bandwidth. Can support data communication at a rate of 70 bps.

What is a network?

A communications, data exchange, and resource-sharing system created by linking two or more computers and establishing standards, or protocols, so that they can work together

Client

A computer designed to request info from a server.

Peer-to-Peer (P2P)

A computer network that relies on the computing power and bandwidth of the participants in the network rather than a centralized server. Example: Skype

What is fault tolerance?

A computer system designed that in the event a component fails, a backup component or procedure can immediately take its place with no loss of service

List, describe, and provide an example of a content management system.

A content management system (CMS) provides tools to manage the creation, storage, editing, and publication of information in a collaborative environment. The CMS marketplace is complex, incorporating document management, collaboration and versioning tools, digital asset management, and web content management. One example is www.vignette.com.

Which of the following is correct in reference to a database?

A database can support many logical views.

Which of the following types of information can be found in a database?

A database maintains information on inventory, transactions, and employees.

Modem

A device that enables a computer to transmit and receive data i.e. dial up

RFID Accelerometer

A device that measures the acceleration (the rate of exchange of velocity) of an item and is used to track truck speeds or taxi cab speeds.

What is a dividend?

A distribution of earnings to shareholders

What is a project charter?

A document issued by the project initiator or sponsor that formally authorizes the existence of a project and provides the project manager with the authority to apply organizational resources to project activities

Data Center

A facility used to house management info systems and asso. components such as telecommunications and storage systems. Sometimes referred to as "server farms." They consume power and require cooling and floor space while working to support business growth w/o disrupting normal business operations and the quality of service.

What is a primary key?

A field (or group of fields) that uniquely identifies a given entity in a table

RFID Reader (RFID Interrogator)

A transmitter/receiver that reads the contents of RFID tags in the area.

Five Forces Model

A method of evaluating the external environment in which a company operates. It involves assessing five forces that drive competition: threat of new entrants, threat of substitute products and services, buyer power, supplier power, and rivalry among existing firms.

Streaming

A method of sending audio and video files over the internet in such a way that the user can view the file while it is being transferred. The advantage is speed.

Wireless MAN (WMAN)

A metro area network that uses radio signals to transmit and receive data. They have not been highly successful because they are not widely available.

Cloud Computing

A model for enabling ubiguitous, convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction. Connects people when internet is not available.

What is a dimension?

A particular attribute of information.

What is a foreign key?

A primary key of one table that appears as an attribute in another table and acts to provide a logical relationship among the two tables

Applet

A program that runs with another application such as a website.

Geocoin

A round shaped coin-sized object uniquely numbered and hidden in a geocache. It can be shaped to match a theme such as the state of Colorado or party hat.

Global Positioning System (GPS)

A satellite based navigation system providing extremely accurate position, time, and speed info.

Hot Site

A separate and fully equipped facility where the company can move immediately after a disaster and resume business.

Cold Site

A separate facility that does not have any computer equipment, but is a place where employees can move after a disaster.

Warm Site

A separate facility with computer equipment that requires installation and configuration.

Domain Name Hosting (web hosting)

A service that allows the owner of a domain name to maintain a simple website and provide email capacity.

3G

A service that brings wireless broadband to mobile phones. It lets users surf web pages, enjoy streaming music, watch video on demand programming and download and play 3D games

Information Architecture

A set of ideas about how all info in a given context should be organized.

What is a SOA service?

A simple business task

Packet

A single unit of binary data routed through a network. Directly impacts network performance and reliability by subdividing an electronic message into smaller more manageable packets.

Pop-up ad

A small web page containing an advertisement.

What is COTS?

A software package or solution that is purchased to support one or more business functions and information systems

Satellite

A space station that orbits the earth receiving and transmitting signals from earth based stations over a wide area. Ranges from handheld units to mobile base stations to fixed satellite dishes.

Geocoding

A special database coding process that assigns a digital map feature an attribute that serves as a unique ID or classification.

Secure Sockets Layer (SSL)

A standard security technology for establishing an encrypted link between a web server and a browser. Ensures that all data passed between them will remain private. Millions of websites use SSL to protect their online transactions with their customers.

Protocol

A standard that specifies the format of the data as well as the rules to be followed during transmission. Some computers using the same protocol can communicate easily providing accessibility, scalability and connectability between networks.

What is a business process?

A standardized set of activities that accomplish a specific task, such as processing a customer's order.

Viral Marketing

A technique that induces websites or users to pass on a marketing message.

What is a project?

A temporary endeavor undertaken to create a unique product, service, or result.

Web 1.0

A term to refer to the WWW during its first few years of operation between 1991 and 2003.

Which of the following describes ETL?

A. A process that extracts information from internal and external databases B. A process that transforms information using a common set of enterprise definitions C. A process that loads information into a data warehouse D. All of the above

Which of the following is a phase in the SDLC?

A. Analysis B. Design C. Testing D. All of the above*

Which of the following should an organization consider during the buy vs. build decision?

A. Are there any currently available products that fit the organizations needs B. Can the organization customize or modify an existing COTS to fit its needs C. Is there a justification to purchase or develop based on the cost of acquisition D. All of the above*

Which act strengthened criminal laws against identity theft?

A. Bork Bill B. Sarbanes-Oxley Act C. Cable Communications Act D. None of the above*

What can a model accomplish?

A. Calculate risks B. Understand uncertainty C. Manipulate time D. All of the above A model can do all of the above.

Which of the following is a type of collaboration system?

A. Content management system B. Groupware system C. Knowledge management system D. All of the above*

What made-to-order views can analytical CRM tools slice-and-dice customer information into?

A. Customer value B. Customer spending C. Customer segmentation D. All of the above

Which of the following is a business-related consequence of failing software?

A. Decrease productivity B. Damage to brand reputation C. Incur liabilities D. All of the above*

Which of the following does a project manager perform?

A. Defines and develops the project plan B. Tracks the plan to ensure all key project milestones are completed on time C. Expert in project planning and management D. All of the above*

Which of the following is a characteristic of a successful project?

A. Delivered on time B. Delivered within budget C. Meets the business's requirements D. All of the above*

Which of the following is an outsourcing challenge caused by contract length?

A. Difficulties in getting out of a contract B. Problems in foreseeing future issues C. Problems in reforming an internal IT department D. All of the above*

What is information redundancy?

A. Duplication of information B. Storing the same information in multiple places C. Storing duplicate information in multiple places D. All of the above

What categories should an organization evaluate when making an outsourcing decision?

A. Geopolitical risk B. English proficiency C. Salary cost D. All of the above*

Which activity is performed during the planning phase?

A. Identify and select the system for development B. Assess project feasibility C. Develop the project plan D. All of the above*

Why would a business use a data warehouse that offers strategic level, external, integrated, and historical information?

A. Identify trends B. Make projections C. Decide key business issues D. All of the above

Which of the following can use BI to make informed decisions?

A. Law enforcement industry B. Airline industry C. Broadcasting industry D. All of the above*

Which of the following is a result of implementing business intelligence systems and tools allowing business users to receive data for analysis?

A. Reliable B. Understandable C. Easily Manipulated D. All of the above*

Which of the following is a quantitative model typically used by a DSS?

A. Sensitivity analysis B. What-if analysis C. Goal-seeking analysis D. All of the above A DSS can perform all of the above.

Which of the following represents operational CRM?

A. Supports traditional transactional processing B. Supports day-to-day front-office operations C. Supports operations that deal directly with the customers D. All of the above

Which of the following uses a DBMS to interact with a database?

A. Users of accounting programs B. Users of human resource programs C. Users of marketing programs D. All of the above

Which of the following is an evaluation criteria used to prioritize software development projects?

A. Value chain analysis B. Strategic alignment C. Resource availability D. All of the above*

An organization must identify what it wants to do and how it is going to do it. What does the "what" part of this question focus on?

A.Justification of the project B. Definition of the project C. Expected results of the project D. All of the above*

Artificial Intelligence

AI

Genetic Algorithm

AI system that mimics the evolutionary, survival-of-the-fittest process to generate increasingly better solutions to a problem; essentially an optimizing system; finds the combination of inputs that gives the best outputs

Application Programming Interface

API

Universities were among some of the first users of the Internet. What was the Internet first called?

ARPANET

Application Service Provider

ASP

Supply Chain Visability

Ability to view all areas up and down the supply chain in real time.

What is a policy that a user must agree to follow in order to be provided access to a network or to the Internet?

Acceptable use policy

Which policy is it common practice for many businesses and educational facilities to require employees or students to sign before being granted a network ID?

Acceptable use policy

Which policy typically contains a nonrepudiation clause?

Acceptable use policy

Agile MIS Infrastructure Characteristics

Accessibility - varying levels allow system users to access, view or perform operational functions.

Which of the following is not one of the CRM business drivers?

Accountability

What analyzes the transactional information of the business so the owners and investors can make sound economic decisions?

Accounting

3 core ERP components for internal ops:

Accounting and finance, product and materials management, and human resources

Core ERP Components

Accounting and finance, production and materials management and HR - Focuses on Internal Operations

ERP

Accounting, finance, logistics and production

Who are the primary users of ERP systems?

Accounting, finance, logistics, and production

Achieving perfect information is almost impossible. The more complete and accurate an organization wants its information to be, the more it costs. Which two variables are used to determine the trade-off for perfect information?

Accuracy versus completeness.

Which of the following represents a form of disruptive technology?

All of these are included: Enters the marketplace at the low end. Is a new way of doing things that initially does not meet the needs of existing customers. Tends to open new markets and destroy old ones.

What are some of the immediate results businesses found from using instant messaging?

All of these. Easily hold simultaneous IM sessions with multiple people. Resolve questions or problems immediately. Quickly identify which employees are at their computers.

Which of the following can be use BI to make informed decisions?

All of these: Airline industry Broadcasting industry Law enforcement industry

What are characteristics or properties of an entity called?

All of these: Attributes Fields Columns

Managing consumer trust is a challenge for ebusinesses. Which of the following is a good way to build trust when working with customers over the Internet?

All of these: Be accessible to communicate in-person. Be available to communicate in-person. Use customer testimonials that link to your client website.

Which of the following occurs during data cleansing?

All of these: Clean inaccurate data. Clean redundant records. Clean missing records.

What is the best way to measure a company's ebusiness success?

All of these: Clickstream data Interactivity Effective MIS metrics

Which of the following is one of the fundamental issues surrounding the struggle between Internet censorship and openness?

All of these: Controlling the conduits Filtering the flows Punishing the purveyors

Which of the following statements is true regarding customer information?

All of these: Customer information can exist in several operational systems. Customer information in each operational system could change. Customer information in each operational system can be different.

Which of the following was the original design for the Internet?

All of these: Display of static content Email Document exchange

Which of the following describes ERP systems?

All of these: ERP systems provide a foundation for collaboration between departments. ERP systems enable people in different business areas to communicate. ERP systems have been widely adopted in large organizations to store critical knowledge used to make the decisions that drive the organization's performance.

Which of the following is one of the four categories of costs associated with downtime?

All of these: Financial performance Revenue Damaged reputation

Which of the following is a benefit an organization can receive from outsourcing?

All of these: Financial savings Increased technical abilities Market agility

Which of the following is one of the 21st-century organizational trends on the business side?

All of these: Focus on improved business resiliency via the application of enhanced security. Emphasis on strategic analysis for cost reduction and productivity enhancement. Uncertainty in terms of future business scenarios and economic outlooks.

Which of the following is a benefit a business can receive by deploying the latest in security technology?

All of these: Greater advances in administration Fewer disruptions to organizational systems Increased productivity of employees

What is the name of a company's internal MIS department?

All of these: Management information systems (MIS) Information systems (IS) Information technology (IT)

How would you categorize mobile entertainment, mobile sales, mobile ticketing, and mobile banking?

All of these: Mcommerce Mbusiness Mobile business

MIS is a business function. Which of the following does MIS perform to help aid the company in decision making and problem solving?

All of these: Moves information about people. Moves information about processes across the company to improve systems. Moves information about products.

Which of the following is a reason why businesses want to have the appropriate levels of authentication, access control, and encryption?

All of these: Only authorized individuals can gain access to the network. Individuals cannot understand or alter information while in transit. Only authorized individuals can access applications for which they are entitled.

Which of the following is one of the new series of business success factors and challenges that are helping to determine marketplace winners and losers?

All of these: Organization agility Instantaneous business response A focus on core competencies and processes

What is a potential problem or impact of technology dependence?

All of these: Outages create potentially great havoc for people, businesses, and educational institutions that rely heavily on technology. Many have a need to be continuously connected for every activity, which potentially eliminates crucial in-person social skills and could stunt psychological growth. How do people or businesses function if the connection is down?

Which of the following are the influential driver(s) affecting the growth of outsourcing markets?

All of these: Rapid growth Core competencies Industry changes

What is the most secure type of authentication?

All of these: Something the user knows such as a user ID and password Something the user has such as a smart card or token Something that is part of the user such as a fingerprint or voice signature

What is the primary difference between the different types of backup/recovery media?

All of these: Speed Cost Expense

Which of the following can be completed by encryption?

All of these: Switch the order of characters Replace characters with other characters Use a mathematical formula to convert the information into some sort of code

What is recovery?

All of these: The ability to get a system up and running in the event of a system crash The ability to get a system up and running in the event of a system failure Restoring the information backup

What does the disaster recovery cost curve chart(s)?

All of these: The cost to the organization of the unavailability of technology The cost to the organization of recovering from a disaster over time The cost to the organization of the unavailability of information

Which of the following represents market basket analysis?

All of these: Analyzes website information Analyzes checkout scanner information Detects customers' buying behavior

What can analytical CRM modeling tools discover?

All of these: Identify opportunities for expanding customer relationships. Identify opportunities for cross-selling. Identify opportunities for up-selling.

Which of the following is not included in the four quadrants of ethical and legal behavior?

All of these: Legal behavior and ethical behavior Illegal behavior and ethical behavior Legal behavior and unethical behavior

Which of the following activities does a CIO perform?

All of these: Oversees all uses of information technology. Ensures the strategic alignment of IT with business goals. Ensures the strategic alignment of IT with business objectives.

Web Accessibility

All people with disabilities including visual, auditory, physical, speech, cognitive or neurological disabilities can use the web.

Define the relationship between the systems development life cycle and software development methodologies.

All software development methodologies use the systems development life cycle, however, the way that they use it differs. For example, all projects must have planning and testing phases, however one project might use the waterfall approach and have the planning occur at the beginning of the project and the testing occur at the end. Another project might use the XP method and have small planning and testing phases occurring all the time.

Click-to-talk

Allows customers to click on a button and talk with a representative via the internet.

Web-based Self Service Systems

Allows customers to use the web to find answers to their questions or solutions to their problems.

What is an integration?

Allows separate systems to communicate directly with each other

Integrations

Allows separate systems to communicate directly with each other eliminating the need for manual entry into multiple systems

Web Browser

Allows users to access the WWW

Social Bookmarking

Allows users to share, organize, search and manage bookmarks

Telecommuting (virtual workforce)

Allows workers to work from remote locations such as a home or hotel using high speed internet

Recency, Frequency, and Monetary Value (RFM)

An organization can find its most valuable customers by using the formula _____

Planning, ___________, design, development, testing, implementation, and maintenance are the seven phases in the SDLC.

Analysis

The _________ phase involves analyzing end-user business requirements and refining project goals into defined functions and operations of the intended system.

Analysis

What is the second step in the SDLC?

Analysis

Public Cloud

Amazon web services

Social Network

An application that connects people by matching profile info. This is one of the greatest advantages of 2.0.

SSL Certificate

An electronic document that confirms the identity of a website or server and verifies that a public key belongs to a trustworthy individual or company. Contains domain name, company name/address, expiration of the certificate and other details. Example: Versign - leading authority

RFID Tag

An electronic identification device that is made up of a chip and antenna.

Wired Equivalent Privacy (WEP)

An encryption algorithm designed to protect wireless transmission data.

What is a backup?

An exact copy of a system's information

What is a project manager?

An individual who is an expert in project planning and management.

Emergency Notification Service

An infrastructure built for notifying people in the event of an emergency. Example: Radio stations It can be deployed through the firm's own infrastructure, supplied by an outside service provider on company premisis or hosted remotely by an outside service provider.

What is a project management office (PMO)?

An internal department that oversees all organizational projects.

Blogs

An online journal that allows users to post their own comments, graphics and videos.

What represents the detailed set of knowledge worker requests that the system must meet in order to be successful?

Business requirements

Which of the following is not one of the five basic components of supply chain management?

Cost

Private Exchange

B2B marketplace in which a single buyer posts its needs and then opens the bidding to any supplier who would care to bid; reverse auction

Eprocurement

B2B purchase and sale of supplies and services over Net

Eprocurement

B2B purchase and sale of supplies and services over the Internet

reliable, consistent, understandable, and easily manipulated

BI Data analysis

Extended ERP components:

BI, CRM ERP, scm erp, and ebusiness erp

Business Process Management

BPM

The balanced scorecard was developed by Drs. Robert Kaplan of the Harvard Business School and David Norton. Which systems does the balanced scorecard measure?

BPR and ERP

Which is a virus that opens a way into the network for future attacks?

Backdoor programs

expanded market coverage, offerings of specialized products and services, & broadened range of offerings and a more complete solution

Benefits of PRM

What question can be answered using info?

Best selling product, best customer, worst selling product

Cheryl is the operations manager for Nature's Bread Company, which specializes in providing natural products for health conscience individuals. Cheryl is responsible for compiling, analyzing, and evaluating daily sales numbers to determine the company's profitability and forecast production for the next day. Which of the following is an example of knowledge that Cheryl would be using to successfully perform her job.

Best-selling product changes when Tony the best banker is working.

Which of the following is the most uncommon reason why companies outsource?

Better manage the costs of internal processes.

Where do organizations typically place firewalls?

Between the server and the Internet

Who breaks into other people's computer systems and just looks around or steals and destroys information?

Black-hat hacker

The ___________ bill prohibits the use of video rental information on customers for any purpose other than that of marketing goods and services directly to the customer.

Bork

Contacted customers regardless of their opt-out or opt-in decision

Bork Bill

Automating a business process that contains _____ or____ will magnify or amplify these problems if they are not corrected first

Bottlenecks;redundancies

Where is the position of IT infrastructure within the organization?

Bottom

Online Ad (banner ad)

Box running across a web page that contains advertisements.

What are the three primary models that a B2C business can use to operate?

Brick-and-mortar, click-and-mortar, virtual

What are the three primary models that a B2C can use to operate?

Brick-and-mortar, click-and-mortar, virtual

Web Assessibility Initiative (WAI)

Brings together people from industry, disability organizations, gov't and research labs around the world to dev. guidelines and resources to help make the web accessible to people with disabilities. It allows people to access the full potential of the web.

Which company experienced difficulty with answering their call center phone?

Brother International Corporation

Source

Build relationships with suppliers to procure raw materials

An API is a set of routines, protocols, and tools for

Building software applications

What is it called when distorted product demand information passes from one entity to the next throughout the supply chain?

Bullwhip effect

What is the size of the internal electrical pathway along which signals are sent from one part of the computer to another?

Bus width

ePolicies are policies and procedures that address the ethical use of computers and Internet usage in the ___________ environment.

Business

Extended ERP Componets

Business Intelligence, customer relationship management, supply chain management and e-business

What are collaborative web pages that allow users to edit documents, share ideas, or monitor the status of a project. Wikipedia, one of the largest online collaboration websites, is a good example.

Business Wiki

What creates a way for a company to recover and restore partially or completely interrupted critical functions within a predetermined time after a disaster or extended disruption?

Business continuity planning

Management info Systems

Business function, like accounting and HR moves info about people, products, and processes across the company to problem solve.

What is information that people use to support their decision-making efforts?

Business intelligence

What is the activity of creating a detailed flow chart or process map of a work process showing its inputs, tasks, and activities, in a structured sequence?

Business process modeling

Core Processes

Business processes such as manufacturing goods, selling products and producing services that make up the activities in a value chain.

Sarah Schin was recently hired by Bank West as the Global Director of HR. Her job duties include determining employment policies as well as overseeing all the hiring, firing and training of employees. What type of process does Sarah's new job demonstrate

Business-facing processes

The accounting and finance department performs processes such as creating financial statements, paying accounts payables, and collecting accounts receivables. What form of processes do these represent?

Business-facing processes

What are the four main types of ebusiness models?

Business-to-business, business-to-consumer, consumer-to-business, and consumer-to-consumer.

Associate Program (affiliate program)

Businesses generate commissions or royalties

How would a company like Flickr use social tagging on its website?

By allowing users to upload images and tag the images with their own keywords.

Which of the following is one of the five key competitive priorities?

Cost

What is the name of the highly publicized survey administered by the Institute for Citizen-Centered Services and the Institute for Public Administration in Canada?

Citizens First

25. According to the ethical computer use policy, users should be ______________ of the rules and, by agreeing to use the system on that basis, _______________ to abide by the rules.

C. Informed, consent

John and Jenny have been saving for two years to take their six children on a vacation to Disneyworld. They are surprised to find out that the airline tix are far more expensive than they had anticipated. They decide to try to find cheaper tix on Priceline where they are allowed to set their own price they are willing to pay for the airline tix. What form of ebusiness model are John and Jenny using?

C2B

Which act imposes limitations and penalties on businesses sending unsolicited email to consumers?

CAN-SPAM Act

Which ebusiness tool plays a crucial role in getting website visitors to view more than just the home page by providing clear navigation choices?

CMS

Which application's primary business benefits include sales forecasts, sales strategies, and marketing campaigns?

CRM

Which of the following is a component ERP vendors offer to differentiate themselves in the marketplace?

CRM

customer relationship management

CRM

Which of the following statements is incorrect?

CRM predicting technologies help organizations identify their customers across other applications.

customer service representative

CSR

What is responsible for the speed, accuracy, availability, and reliability of the MIS

CTO

Who is responsible for ensuring the throughput, speed, accuracy, availability, and reliability of an organization's information technology?

CTO

Which state recognizes an individual's right to privacy?

California

Administrator Access or Unrestricted Access

Can perform functions such as resetting passwords, deleting accounts and shutting down entire systems.

Carbon Emissions

Carbon dioxide and carbon monoxide produced by business processes and systems that are not reduced.

. What-if analysis checks the impact of a __________ in an assumption on the proposed solution.

Change

Which of the following is not a phase in the SDLC?

Change

____________ management system includes a collection of procedures to document a change request and define the steps necessary to consider the change based on the expected impact of the change.

Change

The PMI develops procedures and concepts necessary to support the profession of project management. Which of the following is not one of the three areas it focuses on?

Change in business goals during project planning (management)

Explain change management and how an organization can prepare for change.

Change management is a set of techniques that aid in evolution, composition, and policy management of the design and implementation of a system. An organization can prepare for change by implementing change management systems and a change control board. Change management systems are a collection of procedures to document a change request and define the steps necessary to consider the change based on the expected impact of the change. A change control board (CCB) is responsible for approving or rejecting all change requests.

type (transactional and analytical), timeliness, and quality

Characteristics that help determine the value of information

If a supplier has high power what can it do to influence its industry

Charge higher prices. Shift costs to industry participants. Limit quality or services.

Disaster Recovery Cost Curve

Charts 1) Costs to the company of the unavailability of info and technology 2) The costs to the company of recovery from a disaster over time.

What if Analysis

Checks the impact of a change in a variable or assumption on the model

Which company is improving how it manages the assets in fields by enabling employees in multiple disciplines to easily access and share the information they need to make decisions?

ChevronTexaco Corporation

Jeremy Bridges is an executive for Green Web Designs, where his primary role is to ensure the security of business systems and develop strategies to protect the company from online viruses and hackers. What is Jeremy's role within the company?

Chief Security Officer (CSO).

Which of the following countries is considered an up-and-comer in the outsourcing industry?

China

Which of the following is not one of the principal BI enablers?

Corporate processes

What is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (eg networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction?

Cloud computing

Which company was the victim of a distributed denial-of-service (DDoS) attack that forced the company to close operations and to eventually transfer over 2,500 customers to a rival organization?

CloudNine Communications

What is a technique used to divide an information set into mutually exclusive groups such that the members of each group are as close together as possible to one another and the different groups are as far apart as possible?

Cluster analysis

Your boss, Kerry Miller, has asked you to analyze the soft drink industry using Porter's Five Forces Model. Which of the following represents rivalry in the soft drink industry?

Coke and Pepsi submit bids to the owner of a football stadium for the exclusive sale of their products during games.

What is a separate facility that does not have any computer equipment, but is a place where employees can move after a disaster?

Cold site

Collective Intelligence

Collaborating and tapping into the core knowledge of all employees, partners, and customers.

A(n) ____________ system is an IT-based set of tools that supports the work of teams by facilitating the sharing and flow of information.

Collaboration

Which of the following is not one of the four gates in the RUP methodology?

Collaboration Elaboration is the gate in RUP, not collaboration.

What is an IT-based set of tools that supports the work of teams by facilitating the sharing and flow of information?

Collaboration system

Compare the different categories of collaboration technologies.

Collaboration technologies fall into one of two categories: (1) unstructured collaboration (sometimes referred to as information collaboration) which includes document exchange, shared whiteboards, discussion forums, and email; (2) structured collaboration (or process collaboration) which involves shared participation in business processes such as workflow in which knowledge is coded.

Wiki

Collaborative web page that allows users to add, remove and change content, which can be easily organized and reorganized as required.

WIKIS

Collaborative website that allows users to add, remove, and change content

Lisa loves her job as an executive recruiter for a large hospital located in Dallas, Texas. Part of Lisa's job requires her to gather industry info, collaborate with partners, compare competitors, and tap into the knowledge of prospective employees, partners, and customers. Which of the below would Lisa use to perform her job?

Collective intelligence

Which of the following is not a topic associated with the information age?

College statistics for data.

Search Engine Optimization

Combines art along with science to determine how to make URLs more attractive to search engines resulting in higher search engine ranking.

What is key for evaluating internal controls such as human resources, logistics, information technology, risk, legal, marketing and sales, operations, financial functions, procurement, and reporting?

Committee of Sponsoring Organizations

What is the most important part of the project plan?

Communication

Asynchronous Communication

Communications such as email that does not occur at the same time

Synchronous Communication

Communications that occur at the same time such as IBM or chat

What type of cloud computing serves a specific community with common business models, security requirements, and compliance considerations?

Community Cloud

Describe the benefits and challenges of outsourcing.

Competitive edge - effective and innovative use of IT can be lost when using an outsourcing service provider. Confidentiality - confidential information might be breached by an outsourcing service provider, especially one that provides services to competitors. Scope definition - scope creep is a common problem with outsourcing agreements. Contract length - most outsourcing contracts span several years and cause the issues discussed above. Contract length has three main issues (1) difficulties in getting out of a contract, (2) problems in foreseeing future needs, (3) problems in reforming an internal IT department after the contract is finished.

List Generators

Compiles customer information from a variety of sources and segments it for different marketing campaigns.

Managerial

Constantly evaluating company operations to hone the firms ability to identify, adapt to and change. -Covers short to medium range plans, schedules and budgets along with policies, procedures and business objectives for the firm. -Allocates resources and monitor's performance of subunits.

Which gate in the RUP methodology includes building and developing the project?

Construction

What was the primary problem Saab encountered with one of its marketing companies?

Contacted customers regardless of their opt-out or opt-in decision

Active RFID Tag

Contains a transmitter and a power source (typically a battery)

Source Code

Contains instructions written by a programmer specifying the actions to be performed by computer software.

What occurs when an organization uses software that filters content to prevent the transmission of unauthorized information?

Content filtering

What are the technologies available to help prevent and build resistance to attacks?

Content filtering, encryption, firewalls

What provides tools to manage the creation, storage, editing, and publication of information in a collaborative environment?

Content management system

Which of the below is not considered an advantage of a content management system?

Content management systems increase order entry speed.

Common E-business forms

Content providers, informediaries, online marketplaces, portals, service providers and transaction brokers

What are the four most common Business 2.0 characteristics?

Content sharing through open source, user-contributed content, collaboration inside the organization, and collaboration outside the organization.

Advantages of Business 2.0

Content sharing through open sourcing, user contributed content, collaboration inside the organization and collaboration outside the organization

Domain Name System

Converts IP addresses into domains Example: www.apple.com

Websites sometimes deposit on a customer's hard drive a small file containing information about the customer and the customer's web activities. What is that small file called?

Cookie

What is a small file deposited on a hard drive by a website containing information about customers and their web activities?

Cookie

What is a small file deposited on a hard drive by a website containing info about customers and their Web activities

Cookies

Privacy is the legal protection afforded an expression of an idea, such as a song, book or video game.

Copyright

What is the legal protection afforded an expression of an idea, such as a song, video game, and some types of proprietary documents?

Copyright

_____________ is the legal protection afforded an expression of an idea, such as a song, video game, and some types of proprietary documents

Copyright

What is an organization's key strength, a business function that it does better than any of its competitors?

Core competency

What is it called when an organization chooses to focus specifically on what it does best and forms partnerships and alliances with other specialist organizations to handle nonstrategic business processes?

Core competency strategy

What refers to the creation of new kinds of intermediaries that simply could not have existed before the advent of ebusiness, including comparison-shopping sites such as Kelkoo and bank account aggregation services such as Citibank?

Cybermediation

What type of mediation refers to the creation of new kinds of intermediaries that simply could not have existed before the advent of ebusiness?

Cybermediation

What is the science that studies encryption, which is the hiding of messages so that only the sender and receiver can read them?

Cyptography

Project ______________ are any measurable, tangible, verifiable outcome, result, or item that is produced to complete a project or part of a project

Deliverables

Which policy details the extent to which email messages may be read by others?

Email privacy policy

War Driving

Deliberately searching for Wi-Fi signals while driving by in a vehicle.

Which of the following is not one of the six principles for ethical information management according to CIO magazine?

D. The CIO is responsible for how outsiders view and analyze corporate information

Database management system

DBMS

Decision Support System

DSS

_________ models represent a formal way to express data relationships to a database management system (DBMS).

Data

What is a variable?

Data characteristic that stands for a value that changes or varies over time.

What is the primary problem most organizations face today concerning information?

Data rich, information poor

What is an interactive website kept constantly updated and relevant to the needs of its customers through the use of a database?

Data-driven website

What type of website is best to build for a continually changing information, including press releases, new product information, and updated pricing?

Data-driven website

What type of website is best to build for a website with continually changing information including press releases, new product information, and updated pricing?

Data-driven website

What is at the heart of any ERP system?

Database

Which of the following is not one of the primary information technology areas on which organizations are focusing?

Database

What stores documents in a central location and automatically asks the team members to access the document when it is their turn to edit the document?

Database-based workflow system

Finance

Deals with strategic financial issues including money, banking, credit, investments, and assets

What is the physical view of information?

Deals with the physical storage of information on a storage device such as a hard disk

Which of the following is not part of a typical SOA solution?

Decrease people productivity with better business integration

What is project scope?

Defines the work that must be completed to deliver a product with the specified features and functions

Which phase takes all of the detailed design documents from the design phase and transforming them into the actual system?

Development phase

Broad Differentiation

Difference in a product that appeals to a large audience

Which of the following is not a cultural business challenge?

Differences in architectures

Which of the following is not a political business challenge?

Differences in social attitude

_________ asset management system works with binary rather than text files, such as multimedia file types.

Digital

Which of the following terms implies that organizations that cannot adapt to the new demands placed on them for surviving in the information age are doomed to extinction?

Digital Darwinism

What works with binary rather than text files, such as multimedia file types?

Digital asset management system

Which of the following is not a reason for the explosive growth of the WWW?

Digital darwinism

What integrates information from multiple components and tailors the information to individual preferences?

Digital dashboard

What is technology that digitally represents handwriting in its natural form?

Digital ink

What is any paper that is optimized for any type of digital printing?

Digital paper

Virtual Private Network

Direct private network links among themselves or creates private secure internet access "private tunnel"

Interactive Voice Response

Directs customers to use touch tone phones/keywords to navigate or provide info

What is a detailed process for recovering information or an IT system in the event of a catastrophic disaster such as a fire or flood?

Disaster recovery plan

Ewaste

Discarded, obsolete or broken electronic devices

Partner Relationship Management

Discovers optimal sales channels by selecting the right partners and identifying mutual customers

Innovator's Dilemma by Clayton M. Christensen

Discusses how established companies can take advantage of disruptive technologies w/o hindering existing relationships with partners, customers and stakeholders. Example: Xerox, IBM, Sears and DEC

What occurs when a business sells directly to the customer online and cuts out the middle man?

Disintermediation

Internet Protocol TV (IPTV)

Distributes digital video content using IP across the internet and private IP networks. The user selects a channel and the service provider sends only that single program to the TV.

Outbound Logistics

Distributes goods and services to customers

Which of the following is not one of the tenets in the Agile Alliance's manifesto?

Do not allow changing requirements, especially late in development

Which of the following is NOT a common stipulation when creating an employee monitoring policy?

Do not state the consequences of violating the policy

___________ management system supports the electronic capturing, storage, distribution, archival, and accessing of documents.

Document

Steps in Business Process Improvement

Document as is - establish measures - follow process - measure performance - identify and implement improvements

What support the electronic capturing, storage, distribution, archival, and accessing of documents?

Document management system

____________ testing verifies that the instruction guides are helpful and accurate

Documentation

Passive RFID Tag

Does not have a power source

What is the practice of buying a domain name and not using the web page but waiting to profit from the trademark?

Domain or cyber squatting

What company monitors the operation of its vending machines via wireless technology?

Dr Pepper/Seven Up Inc.

Which of the following represents the connecting and communicating tools supporting and driving ebusiness?

Email, instant messaging, podcasting, content management systems, and video and Web conferencing

As the product manager for the eatery division of Whole Foods, Jerry is responsible for analyzing sales data to help him manage his team. Today Jerry is analyzing his data by looking at details, and details of details of info. Which of the following common digital dashboard capabilities is Jerry using to analyze his department's success?

Drill-down

What is the computer attack where an attacker accesses a wireless computer network, incepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network?

Drive-by-hacking

When does information cleansing occur in the data warehouse?

During the ETL process and once it is in the data warehouse

Primary Challenge of CRM in the Information Age

E-businesses firms must adhere to this rule as the power of the customer grows exponentially in the info age

enterprise application integration

EAI

Executive Information System

EIS

Which of the following represents the top-down (executives to analysts) organizational levels of information technology systems?

EIS, DSS, TPS

Employee relationship management

ERM

Which application's primary business benefits include forecasting, planning, purchasing, material management, warehousing, inventory, and distribution?

ERP

enterprise resource planning

ERP

The evolution of ERP

ERP has grown to become part of the extended enterprise.

Single Tenancy

Each customer or tenant must purchase and maintain and individual system.

Which of the following is not an additional benefit of virtualization?

Ease of use for customer relationship management systems

Which of the following is the result of BI that it is no longer required to have a PhD in statistics to get sophisticated analytics delivered to users' fingertips?

Easily manipulated

Internet's impact on info

Easy to compile, increased richness, increased reach and improved content

What is a plan that details how a company creates, delivers, and generates revenues on the Internet?

Ebusiness model

. A(n) _________ feasibility study identifies the financial benefits and costs associated with the systems development project.

Economic

List and define the five different types of feasibility studies.

Economic feasibility study - (cost-benefit analysis) - identifies the financial benefits and costs associated with the systems development project. Operational feasibility study - examines the likelihood that the project will attain its desired objectives. Technical feasibility study - determines the organization's ability to build and integrate the proposed system. Schedule feasibility study - assess the likelihood that all potential time frames and completion dates will be met. Legal and contractual feasibility study - examines all potential.

According to Peter Drucker, what are managers who do things right addressing?

Efficiency

A common mistake that many managers tend to make is focusing on only one type of metrics because they are easier to measure. Which type of metrics do they focus on?

Efficiency MIS metrics

The government has taken an active role online. Which of the following is the term that describes the use of strategies and technologies to transform government(s) by improving the delivery of services and enhancing the quality of interaction between government and the citizen-consumer within all the branches of government?

Egovernment

Government-to-Government (G2G)

Egovernment model that enhances international trade and information retrieval

Consumer-to-Government (C2G)

Egovernment model that includes elections, census, & taxation

Government-to-Business (G2B)

Egovernment model that includes procurement of goods and services from suppliers or information regarding legal and business issues that is transmitted electronically

Government-to-Consumer (G2C)

Egovernment model that provides updated government information; also includes applications for visas, renewal of passports and driver's licenses, advertising of tender notices, and other services online

Which gate in the RUP methodology expands on the agreed-upon details of the system, including the ability to provide an architecture to support and build it.

Elaboration

Which gate in the RUP methodology provides a rough order of magnitude?

Elaboration Elaboration provides a rough order of magnitude.

The __________ communications privacy act allows the reading of communications by a firm and says that employees have no right to privacy when using their companies' computers.

Electronic

What is a technique for identifying and tracking assets and individuals via technologies such as RFID and smart cards?

Electronic tagging

. A(n)____________ privacy policy details the extent to which email messages may be read by others

Email

Which ebusiness tool increases the speed of business by allowing the transfer of documents with the same speed as the telephone?

Email

What represents a new approach to middleware by packaging together commonly used functionality, such as providing prebuilt links to popular enterprise applications, which reduces the time necessary to develop solutions that integrate applications from multiple vendors?

Enterprise application integration middleware

In the relational database model, what is a person, place, thing, transaction, or event about which information is stored?

Entity

Which of the following is not a potential business impact created by the growth in information industries?

Entry-level positions will require less education

Structured Decisions

Established processes that offer potential solutions. They are made more frequently and are almost repetitive in nature, they effect short term business strategies. Examples: Recording inventory and creating schedules.

Your boss, Ty Jacob, has asked you to analyze the music industry using Porter's Five Forces Model. Which of the following represents supplier power in the music industry?

Established record labels like EMI, Sony, Universal.

What is another name for an eshop?

Estore or etailer

If an organization were to have only one policy, which one would it want?

Ethical computer use policy

If an organization were to have only one policy, which one would it want? Ethical computer use policy Information privacy policy Internet use policy Acceptable use policy

Ethical computer use policy

Which policy ensures that the users know how to behave at work and that the organization has a published standard through which to deal with user infractions?

Ethical computer use policy

What are the principles and standards that guide our behavior toward other people?

Ethics

___________ are the principles and standards that guide our behavior toward other people.

Ethics

Search Engine Ranking

Evaluates variables that search engines use to determine where a URL appears on the list of search results

Which two terms are confirmed or validated with a fact?

Event and Object

Backup

Exact copy of a system's info

Community Cloud

Example: All Colorado State gov't organizations

Who is the person or group who provides the financial resources for the project?

Executive sponsor

Ebusiness Advantages

Expanding global reach, opening new markets, reducing costs, improving operations, improving effectiveness

The project management role has several responsibilities in the area of cost. Which of the following represent these areas for cost?

Expectations, resources, technology choices

Test conditions are the detailed steps the system must perform along with the _______ results of each step.

Expected

______________ systems are computerized advisory programs that imitate the reasoning processes of experts in solving difficult problems.

Expert

Which of the following is the most commonly used form of AI in the business arena?

Expert system

___________ knowledge consist of anything that can be documented, archived, and codified, often with the help of IT.

Explicit

What consists of anything that can be documented, archived, and codified, often with the help of IT?

Explicit knowledge

What are the two categories that include intellectual and knowledge-based assets?

Explicit knowledge and tacit knowledge

Optimizational Analysis

Extension of goal setting analysis, finds the optimum value for a target variable by repeatedly changing the other variables, subject to specified constraints.

Extended ERP Components

Extra components that meet organizational needs not covered by the core componets Focus primarily on external operations

CRM is a technology based on the premise that those organizations that understand the needs of individual customers are best positioned to achieve sustainable competitive advantage in the future.

FALSE CRM is a business philosophy, not a technology, based on the premise that those organizations that understand the needs of individual customers are best positioned to achieve sustainable competitive advantage in the future.

Canada is considered a rookie outsourcing country.

FALSE Canada is considered a leader outsourcing country.

Extraction, transformation, and loading is a process that extracts information from internal databases, transforms the information using a common set of enterprise definitions, and loads the information into an external database.

FALSE Extraction, transformation, and loading is a process that extracts information from internal and external databases, transforms the information using a common set of enterprise definitions, and loads the information into a data warehouse.

Ideally, an organization only wants to build forward integrations.

FALSE Ideally, an organization wants to build both forward and backward integrations.

Outsourcing is a common approach using the professional expertise within an organization to develop and maintain the organization's information technology systems.

FALSE Insourcing is a common approach that uses the professional expertise within an organization to develop and maintain the organization's information technology systems

Insourcing is an arrangement by which one organization provides a service or services for another organization that chooses not to perform them in-house.

FALSE Outsourcing is an arrangement by which one organization provides a service or services for another organization that chooses not to perform them in-house.

Preventing liabilities is a business-related consequence of failed software.

FALSE Preventing liabilities is a business-related consequence of successful software.

Confidentiality is the right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent

FALSE Privacy is the right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent.

Project milestones are any measurable, tangible, verifiable outcome, result, or item that is produced to complete a project or part of a project.

FALSE Project deliverables are any measurable, tangible, verifiable outcome, result, or item that is produced to complete a project or part of a project

Project deliverables represent key dates when a certain group of activities must be performed.

FALSE Project milestones represent key dates when a certain group of activities must be performed.

Provide training for the system users typically occurs during the testing phase

FALSE Provide training for the system users typically occurs during the implementation phase.

Unstructured collaboration involves shared participation in business processes, such as workflow, in which knowledge is hard-coded as rules.

FALSE Structured collaboration involves shared participation in business processes, such as workflow, in which knowledge is hard-coded as rules.

Testing is the fourth phase in the SDLC.

FALSE Testing is the fifth phase in the SDLC.

The Data Warehousing Institute estimates that low-quality information costs U.S. businesses $60 billion annually.

FALSE The Data Warehousing Institute estimates that low-quality information costs U.S. businesses $600 billion annually.

38. The assess project feasibility activity typically occurs during the analysis phase.

FALSE The assess project feasibility activity typically occurs during the planning phase.

The data warehouse is a location for all of a business's information.

FALSE The data warehouse is not a location for all of a business's information.

The implementation phase involves taking all of the detailed design documents from the design phase and transforming them into the actual system.

FALSE The development phase involves taking all of the detailed design documents from the design phase and transforming them into the actual system.

The leaders, the newcomers, and the rookies are the three categories of outsourcing countries.

FALSE The leaders, the up-and-comers, and the rookies are the three categories of outsourcing countries.

The primary difference between operational CRM and analytical CRM is the direct interaction between the organization and its suppliers.

FALSE The primary difference between operational CRM and analytical CRM is the direct interaction between the organization and its customers.

The primary purpose of a data warehouse is to perform transactional processes.

FALSE The primary purpose of a data warehouse is to perform analytical process.

The relationship between the triple constraint variables is not dependent.

FALSE The relationship between the variables in the triple constraint is interdependent.

The three forms of BI include operational, tactical, and value-added.

FALSE The three forms of BI include operational, tactical, and strategic.

The triple constraint includes time, cost, and quality.

FALSE The triple constraint includes time, cost, and scope. All impact quality.

An information partnership is one in which an organization chooses to focus specifically on what it does best and forms partnerships and alliances with other specialist organizations to handle nonstrategic business processes.

FALSE This is the definition for core competency strategy, not information partnership.

What is it called when you may use copyrighted material in certain situations — for example, in the creation of new work or, within certain limits, for teaching purposes?

Fair Use Doctrine

Sensitivity analysis, what-if analysis, and market basket analysis are the three quantitative models typically used by a DSS.

False

Timely information must be up-to-the-second to be accurate.

False Timely information can change for each business decision. Some decisions require weekly information while others require daily information.

Which of the following describes agile?

Fast and efficient B. Small and nimble C. Lower cost D. All of the above*

___________ creep occurs when developers add extra features that were not part of the initial requirements.

Feature

What allows files containing text, programs, graphics, numerical data, and so on to be downloaded off or uploaded onto a network?

File transfer protocol (FTP)

Goal Seeking Analysis

Find the input necessary to achieve a goal such as a desired level of output. It is the opposite of what if and sensitivity analysis.

Which of the following is a fundamental of the RAD methodology?

Focus initially on creating a prototype that looks and acts like the desired system B. Actively involve system users in the analysis, design, and development phases C. Accelerate collecting the business requirements through an interactive and iterative construction approach D. All of the above*

Supplier Relationship Management (SRM)

Focuses on keeping suppliers satisfied by evaluating and categorizing suppliers for different projects

Technology Recovery Strategies

Focuses specifically on prioritizing the order for restoring hardware, software and data across the organization that best meets business recovery requirements.

What is the term that is similar to taxonomy except that crowdsourcing determines the tag or keyword-based classification system?

Folksonomy

Which of the following is a form of statistical analysis?

Forecasting

What are the primary business benefits of an ERP system?

Forecasting, planning, purchasing, material management, warehousing, inventory, and distribution.

_______ are predictions made on the basis of time-series information.

Forecasts

Which act protects health insurance information?

HIPAA

Hypertext Markup Language

HTML

Hypertext Transport Protocol

HTTP

______have philosophical and political reasons for breaking into systems and will often deface the website as a protest.

Hactivists

Production and Materials Management ERP Components

Handles production planning and execution tasks such as demand forecasting, production scheduling, job cost accounting and quality control

________________ key logger is a hardware device that captures keystrokes on their journey from the keyboard to the motherboard

Hardware

What is the difference between hardware and software?

Hardware is the physical devices associated with a computer system, where software is the instructions the hardware executes to carry out tasks.

What is a hardware device that captures keystrokes on their journey from the keyboard to the motherboard?

Hardware key logger

CRM Reporting Technologies

Helps an organization identify their customer across other applications

CRM Predicting Technologies

Helps an organization predict customer behavior, such as which customers are at risk for leaving

CRM Analysis Technologies

Helps organizations segment their customers into categories such as best/worst customers

Multi-Tenancy

Helps reduce operational costs associated with implementing large systems as costs are dispersed across many tenants.

Which of the following database structures stores information in a tree-like structure that allows repeating information using parent/child relationships, in such a way that it cannot have too many relationships?

Hierarchical database

Efficiency and Effectiveness

Higher level metrics to measure MIS projects

Ebusiness Benefits

Highly accessible Increased Customer Loyalty Improved Information Content Increased Convenience Increased Global Reach Decreased Cost

Which type of metric measures when a visitor reaches a website and their computer sends a request to the site's computer server to begin displaying pages?

Hit metric

What attacks computer systems by transmitting a virus hoax, with a real virus attached?

Hoaxes

Within the sites that support disaster recovery, ____ is a separate and fully equipped facility where the company can move immediately after a disaster and resume business.

Hot site

The _________ phase involves placing the system into production so users can begin to perform actual business operations with the system.

Implementation

The systems development life cycle is the overall process for developing information systems from planning and analysis through _________________ and maintenance.

Implementation

What is phased implementation?

Implementing the new system in phases until it is evident that the new system performs correctly and then implementing the remaining phases of the new system

Which of the following is true in regards to the elimination of redundant information?

Improves information quality

Which of the following is true in regard to eliminating redundant information?

Improves information quality.

What type of backup strategy would you recommend to an organization that deals with large volumes of critical information?

Hourly

with each other

How must the 3 forms of BI work?

Artificial intelligence simulates ______________ intelligence such as the ability to reason and learn.

Human

HTML

Hypertext markup language

What is the Internet protocol web browsers use to request and display web pages using universal resource locators?

Hypertext markup language (HTML)

Internet Engineering Steering Group

IESG

Internet Engineering Task Force

IETF

Information Systems

IS

Internet Service Provider

ISP

Information Technology

IT

Collaboration system

IT based set of tools that supports the work of teams by facilitating the sharing and flow of info

What is true about IT and business?

IT enables business success and motivation

collaboration system

IT-based set of tools that supports the work of teams by facilitating the sharing and flow of information

Business Impact Analysis

Identifies all critical business functions and the effect that a specific disaster may have upon them.

What is an economic feasibility study?

Identifies the financial benefits and costs associated with the systems development project

Spatial Data (geospatial data or geographic info)

Identifies the geographic location of features and boundaries on earth, such as natural or constructed features, oceans and more.

Challenges of E-business

Identifying limited market segments, managing consumer trust, ensuring consumer protection and adhering to taxation rules

What are the four challenges facing ebusinesses outlined in the text?

Identifying limited market segments, managing consumer trust, ensuring consumer protection, and adhering to taxation rules.

Which of the following is not a CRM industry best practice?

Implement in the big bang approach

Jackie is the head teller at ABC bank and her responsibilities include overseeing and managing tellers, resolving customer issues, and developing and implementing systems for an optimal and efficient team. She notices a steady increase in customer complaints and tracks back to find the complaints started right around the time ABC bank provided internet access to all employees. Jackie watched the tellers closely and found that they were spending significant amount of time playing internet games and posting on FB. Which policy should the company implement to help eliminate this problem?

Internet use policy

Managing global enterprise architectures is a key global IT challenge for the 21st century. What is included in the term global enterprise architectures?

Internet, intranet, extranet, and other telecommunication networks

Business-to-Business Marketplace (B2B)

Internet-based service that brings together many buyers and sellers; private exchange

Which of the following systems is designed with full-time monitoring tools that search for patterns in network traffic to identify intruders and to protect against suspicious network traffic which attempts to access files and data?

Intrusion Detection Software (IDS)

Which of the following is not a typical CRM metric?

Inventory metrics

What is the analysis phase in the SDLC?

Involves analyzing end-user business requirements and refining project goals into defined functions and operations of the intended system

Knowledge Management

Involves capturing, classifying, evaluating, retrieving, and sharing info assets in a way that provides context for effective decisions and actions.

What is the design phase in the SDLC?

Involves describing the desired features and operations of the system

What is process modeling?

Involves graphically representing the processes that capture, manipulate, store, and distribute information between a system and its environment

What is the implementation phase in the SDLC?

Involves placing the system into production so users can begin to perform actual business operations with the system

What is consolidation?

Involves the aggregation of information and features simple roll-ups to complex groupings of interrelated information.

MIS can be an important enabler of business success and innovation. Which statement is accurate when referring to MIS?

Is a valuable tool that can leverage the talents of people who know how to use and manage it effectively.

Which of the following countries is considered a leader in the outsourcing industry?

Israel

What is one of the biggest pitfalls associated with real-time information?

It continually changes

Which of the following is not a part of the email privacy policy stipulations?

It informs people that the organization has full control over email once it is transmitted outside the organization.

What consists of a series of tiny projects?

Iterative development

Joint Application Development

JAD

What represents a session where employees meet, sometimes for several days, to define or review the business requirements for the system?

JAD session

All of the following jobs will be increasingly performed by robots, except:

Jobs performed by scientists, engineers, and technicians

One of the most famous examples of wiki vandalism occurred when a false biography entry stated which of the following?

John Seigenthaler Sr. was assistant to Attorney General Robert F. Kennedy in the early 1960s and was involved in Kennedy's assassination as well as JFK's.

What is it called when you have a novice and an expert work together on a project to help bring the expert's approach to light?

Joint problem solving

knowledge management system

KMS

Key Performance Indicator

KPI

Which company developed a real-time collaboration system that ties together its partners, suppliers, and DoD customers via the Internet?

Lockheed Martin Corporation

A data warehouse is a _________ collection of information-gathered from many different ___________ databases-that supports business analysis activities and decision-making tasks.

Logical, operational

A data warehouse is a ______ collection of information - gathered from many different _____ databases - that supports business-analysis activities and decision-making tasks.

Logical; operational

Broad Cost Leadership

Low cost that appeals to a large audience

Operational

Lower management, department managers, analysists and staff. Focus: Internal, functional Time: Short, day to day Decision type: Structured, reoccurring and repetitive MIS type: Info Metrics: Key performance indicators focusing on efficiency. Example: How many employees are out sick?

Buyer Power

Loyalty programs are an example of which of the "Five Forces"?

How can companies reduce buyer power?

Loyalty programs, which reward customers based on their spendings.

Management Information Systems

MIS

Which of the following is the most common function outsourced?

MIS

What includes the plans for how an organization will build, deploy, use, and share its data, processes, and MIS assets?

MIS infrastructure

Dynamic Scaling

MIS infrastructure can be automatically scaled up or down based on needed requirements.

Maintenance, Repair, and Operations Materials

MRO

What is a program, when installed on a computer, records every keystroke and mouse click?

Key logger software

Tacit Knowledge

Knowledge contained in people's heads

What is the most common form of collective intelligence found inside the organization?

Knowledge management

What supports the capturing, organization, and dissemination of knowledge throughout an organization?

Knowledge management system

What kind of society is being created by the growth in information industries?

Knowledge-dependent global society

Swim Lane

Layout that arranges the steps of a business process into a set of rows depicting the various elements.

What is the ideal type of decision making for people in an organization?

Legal and ethical

at is the ideal type of decisions for people in an organization to make?

Legal and ethical

What are the different types of information?

Levels, formats, granularities

GIS Map Automation

Links business assets to a centralized system where they can be tracked and monitored over time.

Which of the following is not a principle of supply chain management?

Listen to signals from telecommunications equipment.

Packet Header

Lists the distinction along with the length of the message data Example: IP Address

Website Bookmark

Locally stored URL or the addy of a file or internet page saved as a shortcut

Online Transaction Processing

OLTP

What captures transaction and event info using technology to 1) process the info according to defined business rules 2) store the info 3) update existing info to reflect the new info

OLTP

Online Service Provider

OSP

Project __________ are quantifiable criteria that must be met for the project to be considered a success.

Objectives

Asset Tracking

Occures when a company places active or semi passive RFID tags on expensive products or assets to gather data on the item's location with little or no manual intervention. It allows its company to focus on supply chain, reduce theft and ID the last known user of assets.

Semi-Structured Decisions

Occurs in situations in which a few established processes help to evaluate potential situations. Example: Decisions about producing new products

Paradigm Shift

Occurs when a new radical form of business enters the market that reshapes the way organizations and companies behave.

Failover

Occurs when a redundant storage server offers an exact replica of the real-time data and if the primary server crashes, the users are automatically directed to the secondary or back-up server.

Website Personalization

Occurs when a website has stored enough data about a person's likes/dislikes to fashion offers more likely to appeal to that person

What is deperimeterization?

Occurs when an organization moves employees outside its firewall

The Bullwhip Effect

Occurs when distorted product demand info ripples from one partner to the next throughout the supply chain.

Edge Matching (warping, rubber sheeting)

Occurs when paper maps are laid edge to edge and items that run across maps but do not match are reconfigured to match.

Bottlenecks

Occurs when resources reach full capacity and cannot handle any additional demands.

Regional Service Providers (RSPs)

Offer internet service by connecting to NSPs, but they can connect directly to each other.

Smart Phone

Offers more advanced computing ability and connectivity than basic cell phones. Allows for web browsing, emailing, listening to music, watching video, computing, keeping track of contacts etc. Example: Iphone and RIM blackberry

Utility Computing

Offers pay-per-view use revenue model similar to a metered service.

Project management ____________ is an internal department that oversees all organizational projects.

Office

___________ outsourcing is using organizations from developing countries to write code and develop systems.

Offshore

What is it called when a company uses organizations from developing countries to write code and develop systems?

Offshore outsourcing

What percentage will all of today's technical knowledge represent in 2050?

One

Shopping Bot

One of the simpliest examples of an intelligent agent. It is a software that will search several retailer websites and provide a comparison of each retailer offering including price and availability.

What caused Polaroid to go bankrupt?

One-hour film processing and digital cameras stole its market share.

Explain why software problems are business problems.

Only 28 percent of projects are developed within budget and delivered on time and as promised, says a report from the Standish Group, a Massachusetts-based consultancy. The primary reasons for project failure are: Unclear or missing business requirements, skipping SDLC phases, failure to manage project scope, failure to manage project plan, and changing technology.

What is the number one reason that IT projects fall behind schedule or fail?

Poor planning or poor project management

What is the number one reason that IT projects fall behind schedule or fail?

Poor planning or poor project management.

Which of the following agile MIS infrastructure characteristics refers to the ability of an application to operate on different devices or software platforms, such as different operating systems?

Portability

What are forecasts?

Predictions made on the basis of time-series information

Plan

Prepare to manage all resources required to meet demand

Which of the following is not a characteristic of a well-defined project plan?

Prepared by the project manager

Summarize the activities associated with the design, development, and testing phases in the SDLC.

Primary design activities include (1) Design the IT infrastructure, (2) Design system models. Primary development activities include (1) Develop the IT infrastructure. (2) Develop the database and programs. Primary testing activities include (1) Write the test conditions. (2) Perform the system testing.

Failback

Primary machine recovers and resumes operations, taking over from the secondary server.

What are the two main categories in a value chain analysis?

Primary value activities and support value activities.

The _________ act restricts what information the federal government can collect.

Privacy

What is the right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent?

Privacy

National Service Providers (NSPs)

Private companies that own and maintain the worldwide backbone that supports the internet. Example: Sprint, Verizon, MCI, AT&T, NTT, Level 3, Century Link and Cable Wireless Worldwide

Cooking a patty and putting the ingredients together are included in which category of making a hamburger?

Process

_________ modeling involves graphically representing the processes that capture, manipulate, store, and distribute information between a system and its environment

Process

What is data mining?

Process of analyzing data to extract information not offered by the raw data alone.

Mutation

Process within a genetic algorithm of randomly trying combinations and evaluating the success or failure of the outcome.

Which of the following is an incorrect enterprise view of information technology?

Processing is OLTP for executives and OLAP for analysts

Visualization

Produces graphical displays of patterns and complex relationships in large amounts of data

Amazon.com uses a customer-profiling system whenever a customer visits its website. Using this system, Amazon can offer products tailored to that particular customer's profile and buying pattern. What is Amazon using to achieve this competitive advantage?

Product differentiation.

What is the process that where a business takes raw materials and processes them or converts them into a finished product for its goods or services?

Production

What are the factors included in the global customer's category of global IT business drivers?

Products are the same worldwide and global IT can help manage worldwide marketing, sales, and quality control.

What occurs when businesses sell products or services for more than they cost to produce?

Profit

Key logger or key trapper software is a __________ that when installed on a computer, records every keystroke and mouse click

Program

Which company used BPR to change its industry by implementing a mobile claims process?

Progressive Insurance.

. A(n) ____________ is a temporary endeavor undertaken to create a unique product, service, or result.

Project

Highlight the components of a project charter.

Project scope defines the work that must be completed to deliver a product with the specified features and functions. A project scope statement describes the business need, justification, requirements, and current boundaries for the project. The business need can be characterized by the problem the results of the project will satisfy. This is important in linking the project with the organization's overall business goals. The project scope statement includes constraints, assumptions, and requirements—all components necessary for developing accurate cost estimates. Project objectives are quantifiable criteria that must be met for the project to be considered a success. Project constraints are specific factors that can limit cost estimating options. They include: budget, delivery dates, available skilled resources, and organizational policies. Project assumptions are factors that are considered to be true, real, or certain without proof or demonstration. Examples include hours in a work week or time of year the work will be performed.

Who are individuals and organizations actively involved in the project or whose interests might be affected as a result of project execution or project completion?

Project stakeholders

Describe the project stakeholder's and executive sponsor's roles in choosing strategic projects.

Project stakeholders are individuals and organizations actively involved in the project or whose interests might be affected as a result of project execution or project completion. Stakeholders are not necessarily involved in the completion of project deliverables. For example, a chief financial officer (CFO) probably will not help test a new billing system, but she surely will be expecting the successful completion of the project. While all stakeholders are important, one stands out as having the most impact on the success or failure of a project. That person is the executive sponsor. PMI defines the executive sponsor as the person or group who provides the financial resources for the project. However, research has shown that the leadership strength of the executive sponsor has more do to with the success or failure of a project than any other critical success factor.

Ebusiness Challenges

Protecting Consumers Leveraging Existing Systmes Increasing Liability Providing Security Adhering to Taxation Rules

The rapid application development methodology emphasizes extensive user involvement in the rapid and evolutionary construction of working __________ of a system to accelerate the systems development process.

Prototypes

benefits of CRM

Provide better customer service, Make call centers more efficient, Cross sell products more effectively, Help sales staff close deals faster, Simplify marketing and sales processes, Discover new customers, & Increase customer revenues

Which of the following is a challenge in sustaining technology?

Provides a product that does not meet the existing customer's future needs.

Personal Area Networks (PAN)

Provides communication over a short distance that is intended for use with devices that are owned and operated by a single user.

Enterprise Systems

Provides enterprise wide support and data access for a firm's operations and business processes.

Digital Subscriber Line (DSL)

Provides high speed digital data transmission over standard telephone lines using broadband modem technology, allowing both the internet and telephone services to work over the same phone lines.

High Speed Internet Cable Connection

Provides internet access using cable TV infrastructure and a special cable modem.

What is a real-time system?

Provides real-time information in response to requests.

Transmission Control Protocol/internet protocol (TCP/IP)

Provides the technical foundation for the public internet as well as for large numbers of private networks. Allows diverse/differing networks to connect/communicate with each other.

Employee Relationship Management (ERM)

Provides web-based self-service tools that streamline and automate the human resource dept

Which type of ebusiness model is Amazon using?

Pure-play

When studying the figure of the four quadrants of ethical and legal behavior, the goal is for organizations to make decisions in which of the following quadrants?

Quadrant 1

The project management role has several responsibilities in the area of time. Which of the following represent these areas for time?

Quality, methodology

Which of the following is one of the four main categories of BI benefits?

Quantifiable benefits

Which type of BI benefits includes working time saved in producing reports and selling information to suppliers?

Quantifiable benefits

What are project objectives?

Quantifiable criteria that must be met for the project to be considered a success

All of the following are characteristics of information except:

Quantity

All of the following are characteristics of information, except:

Quantity

Which of the following is not one of the five characteristics common to high quality information?

Quantity

Five Steps in the order to delivery business process

Step#1: Marketing (create campaign, check inventory) Step#2: Sales (place an order, modify production, check credit) Step#3: Operations management (manufacturing goods) Step#4: Accounting and finance (deliver goods, bill customer) Step#5: Customer service (support sale)

Which system differentiates an executive information system from a decision support system and a transaction processing system?

Stock market information system

Which of the following is not a guideline for effectively dealing with change management?

Stop change

Rapid Elasticity

Storage, network bandwidth and computing capacity that can be increased or decreased

Which form of BI uses months to years as its time frame?

Strategic BI

Which type of BI achieves long-term organizational goals?

Strategic BI

Which evaluation criteria is an organization using that prioritizes its projects by giving priority to those projects that are in line with the organization's strategic goals and objectives?

Strategic alignment

Business process modeling or mapping, is the activity of creating a detailed flowchart or process map of a work process that shows its inputs, tasks, and activities in a ________ sequence.

Structured

___________ collaboration involves shared participation in business processes, such as workflow, in which knowledge is hard-coded as rules

Structured

What involves shared participation in business processes, such as workflow, in which knowledge is hard-coded as rules?

Structured collaboration

For the past 20 years, Perry has been an owner of several Coldwell Banker Real Estate franchises. To increase business Perry spends a great deal of money marketing and advertising his businesses online. Perry decides he would like to move beyond just marketing and create an actual ebusiness that acts like a search engine but focuses on only the real estate industry. The main revenue source for Perry's ebusiness will be a charge of $50 a month for each property that is listed on the website. What is the primary revenue model for Perry's new business?

Subscription fees

Emergency

Sudden, Unexpected event requiring immediate action due to potential health and safety, the environment or property.

Which of the following represents a typical supply chain?

Suppliers - Company - Customers.

Which of the following automates the different steps and stages of the supply chain?

Supply chain execution software

What is the ability to view all areas up and down the supply chain?

Supply chain visibility

Which of the following is a key to SCM success?

Support Organizational Goals.

Return

Support customers and product returns

What are the three business functions an MIS infrastructure supports?

Supports info change, change, and business continuity planning

Marketing

Supports sales by planning, pricing, and promoting goods or services

Knowledge Management Systems

Supports the capturing, organization and dissemination of knowledge (know how) throughout an organization

Multisourcing is a combination of professional services, mission-critical support, remote management, and hosting services that are offered to customers in any combination needed.

TRUE Multisourcing is a combination of professional services, mission-critical support, remote management, and hosting services that are offered to customers in any combination needed.

Offshore outsourcing is using organizations from developing countries to write code and develop systems.

TRUE Offshore outsourcing is using organizations from developing countries to write code and develop systems.

PMI stands for The Project Management Institute.

TRUE PMI stands for The Project Management Institute.

Parallel implementation uses both the old and new systems until it is evident that the new system performs correctly.

TRUE Parallel implementation uses both the old and new systems until it is evident that the new system performs correctly.

antifiable benefits, indirectly quantifiable benefits, unpredictable benefits, and intangible benefits are the four primary categories of BI benefits.

TRUE Quantifiable benefits, indirectly quantifiable benefits, unpredictable benefits, and intangible benefits are the four primary categories of BI benefits.

The traditional waterfall methodology is a sequential, activity-based process in which each phase in the SDLC is performed sequentially from planning through implementation and maintenance.

TRUE The traditional waterfall methodology is a sequential, activity-based process in which each phase in the SDLC is performed sequentially from planning through implementation and maintenance.

Employee monitoring policies explicitly state how, when, and where the company monitors its employees.

TRUE This is the definition of employee monitoring policies.

Ethical computer use policy contains general principles to guide computer user behavior.

TRUE This is the definition of ethical computer use policy.

Opt-in implies that the customers will only be contacted if they agreed to receive promotions and marketing material.

TRUE This is the definition of opt-in.

Project management is the application of knowledge, skills, tools, and techniques to project activities to meet project requirements.

TRUE This is the definition of project management.

Traditional business risk models typically ignored software development, largely because most organizations considered the impact from software and software development on the business to be minor.

TRUE Traditional business risk models typically ignored software development, largely because most organizations considered the impact from software and software development on the business to be minor.

___________ knowledge is contained in people's heads.

Tacit

What is the knowledge contained in people's heads?

Tacit knowledge

What is the type of knowledge that is contained in people's heads?

Tacit knowledge

Which form of BI uses the time frame of days to weeks to months?

Tactical BI

Which type of BI conducts short-term analysis to achieve strategic goals?

Tactical BI

Backward Integration

Take information entered into a given system and sends it automatically to all upstream systems and processes.

EAI Middleware

Takes a new approach to middleware by packaging commonly used applications together, reducing the time needed to integrate apps from multiple venders.

Forward Integration

Takes info entered into a given system and sends it automatically to all the downstream systems and processes

What is a forward integration?

Takes information entered into a given system and sends it automatically to all downstream systems and processes

What is a backward integration?

Takes information entered into a given system and sends it automatically to all upstream systems and processes

Which of the following is the primary reason why companies outsource?

Tap outside sources of expertise.

Opportunity Management CRM System

Targets sales opportunities by finding new customers/complaints for future sales.

What is a well-planned strategy that ensures the search and navigation functions are easy to use and user-friendly on a website?

Taxonomy

Which of the below is not a characteristic of Business 2.0?

Technical skills are required

Challenges of Business 2.0

Technology dependence, information vandalism, Violations of copyright and plagiarism

What focuses specifically on prioritizing the order for restoring hardware, software, and data across the organization that best meets business recovery requirements?

Technology recovery strategy

Which of the following are the principle BI enablers?

Technology, people, and corporate culture

What is the blending of computers and wireless telecommunications technologies with the goal of efficiently conveying information over vast networks to improve business operations?

Telematics

Which of the following is not one of the primary principles an organization should follow for successful agile software development?

Test and deliver infrequently.

List and describe the three categories of outsourcing countries.

The Leaders are countries that are leading outsourcing. The Up-and-Comers are countries that are beginning to emerge as solid outsourcing options. The Rookies are countries that are just entering the outsourcing industry.

Which act restricts what information the federal government can collect?

The Privacy Act

Describe the fundamentals of project management.

The Project Management Institute (PMI) defines a project as a temporary endeavor undertaken to create a unique product, service, or result. Project management is the application of knowledge, skills, tools, and techniques to project activities to meet project requirements. Project deliverables are any measurable, tangible, verifiable outcome, result, or item that is produced to complete a project or part of a project. Examples of project deliverables include design documents, testing scripts, and requirements documents. Project milestones represent key dates when a certain group of activities must be performed. For example, completing the planning phase might be a project milestone. If a project milestone is missed, then chances are the project is experiencing problems. Project manager is an individual who is an expert in project planning and management, defines and develops the project plan, and tracks the plan to ensure the project is completed on time and on budget. The project manager is the person responsible for executing the entire project plan. Project management office (PMO) is an internal department that oversees all organizational projects. This group must formalize and professionalize project management expertise and leadership. One of the primary initiatives of the PMO is to educate the organization on techniques and procedures necessary to run

Key Performance Indicators (one type of metric)

The Quantifiable metrics a company uses to evaluate progress toward critical success factors - more specific -Can focus on external or internal measurements

Which act protects investors by improving the accuracy and reliability of corporate disclosures?

The Sarbanes-Oxley Act

Fault Tolerance

The ability for a system to respond to unexpected failures or system crashes as the back-up system immediately and automatically takes over with no loss of service

Technology Failure

The ability of a company to operate is impaired because of hardware, software or data outage.

Mass Customization

The ability of an organization to tailor its products or services to the customers' specifications.

What are the two basic functions that social networking sites provide?

The ability to create and maintain a profile that is your online identity and create connections between other people within the network.

Recovery

The ability to get a system up and running in the event of a system crash or failure that includes restoring the info back-up.

Slice and Dice

The ability to look at info from different perspectives -Performed along a time axis to analyze trends and find time based patterns in the info

Consider a washing machine as a system. Which of the following represents the output?

The clean clothes.

Social Tagging

The collaborative activity of marketing shared online content with key words or tags as a way to organize it for future navigation, filteration or search.

Which of the following is not a potential business impact resulting from alternative energy sources?

The cost of alternative energy sources is increasing with technical advances

Cybermediation

The creation of new kinds of intermediaries that simply could not have existed before the advent of ebusiness, inc. Example: comparison shopping sites such as Kilko

Network Convergence

The efficient coexistence of TV, video, and data communication within a single network, offering convenience and flexibility not possible with separate infrastructures. Allows the weaving together of voice, data and video

Application Integration

The integration of a company's existing management systems

What category of outsourcing countries includes Canada, India, Ireland, Israel, and the Philippines?

The leaders

The balanced scorecard views the organization from four perspectives, and users should develop metrics, collect data, and analyze their business relative to each of these perspectives. Which of the following is not one of the four perspectives in the balanced scorecard?

The leading perspective

Supply Chain Management

The management of information flows between and among activities in a supply chain to maximize total supply chain effectiveness and corporate profitability

Ebusiness was characterized by a few companies or users posting content for the masses. What characterizes Business 2.0?

The masses posting content for the masses.

Bandwidth

The maximum amount of data that can pass from one point to another in a unit of time

Which of the following statements is true?

The more complete and accurate an organization wants to get its information, the more it costs.

Which of the following represents megahertz?

The number of millions of CPU cycles per second

Source Documents

The original transaction record - including time sheets, wage rates and employee benefit reports.

What is the systems development life cycle?

The overall process for developing information systems from planning and analysis through implementation and maintenance.

What is the critical path?

The path from start to finish that passes through all the tasks that are critical to completing the project in the shortest amount of time

Social Networking

The practice of expanding your business and/or social contacts by a personal network

War Chalking

The practice of tagging pavement with codes displaying where WiFi access is available.

Which of the following is one of the important characteristics of business processes?

The process is cross-departmental

Automation

The process of computerizing manual tasks, making them more efficient and effective and dramatically lowering operational costs. Example: payroll

Competitive Intelligence

The process of gathering info about the competitive environment, including competitor's plans, activities, and products to improve a company's ability to succeed.

Which of the following is not one of the important characteristics of business processes?

The processes occur only within organizations

The project management role has several responsibilities in the area of scope. Which of the following represent these areas for scope?

The project management role has several responsibilities in the area of scope. Which of the following represent these areas for scope?

Productivity

The rate at which goods and services are produced based upon total output given total inputs

Consider a washing machine as a system. Which of the following represents the process?

The wash and rinse cycle.

Network Access Points (NAPs)

Traffic exchange points in the routing hierarchy of the internet that connects NSPs

Which of the following describes privacy?

The right to be left alone when you want to be, to have control over your own personal possessions, and to not be observed without your consent.

What category of outsourcing countries includes Argentina, Chile, Costa Rica, New Zealand, Thailand, and Ukraine?

The rookies

Cartography

The science and art of making an illustrated map or chart.

Analytics

The science of fact-based decision making

What is software?

The set of instructions that the hardware executes to carry out specific tasks

Reliability

The system functions correctly and provides accurate info.

Portability

The system is available to operate on different devices or software platforms. Example: Apple Itunes

Maintainability

The system quickly transforms to support environmental changes.

All of the following are business-critical integrity constraints except:

The system will not allow returns of fresh produce after 15 days past delivery.

What is data latency?

The time duration to make data ready for analysis and loading the data into the database

What is analysis latency?

The time from which data are made available to the time when analysis is complete

What is decision latency?

The time it takes a human to comprehend the analytic result and determine an appropriate action.

Estimated Time of Arrival (ETA)

The time of day of an expected arrival at a certain destination and is typically used for navigation applications.

Estimated Time Enroute (ETE)

The time remaining before reaching a destination using the present speed and is typically used for navigation applications.

Cycle Time

The time required to process an order.

Which of the following is not a potential business impact from the world's population doubling in the next 40 years?

The time to get products and services to market is being shortened by technology

What are countries that are beginning to emerge as solid outsourcing options?

The up-and-comers

Core business relationships and models are dramatically changing, including shifts from which of the following?

The value in material things to the value of knowledge and intelligence

. Compare the waterfall methodology and the agile methodology.

The waterfall methodology is a sequential, activity-based process in which each phase in the SDLC is performed sequentially from planning through implementation and maintenance. The agile methodology is a form of XP, aims for customer satisfaction through early and continuous delivery of useful software components. These are two opposite ends of the spectrum in terms of systems development methodologies. The primary difference between the waterfall and XP methodologies is that XP divides its phases into iterations with user feedback.

Crowdsourcing

The wisdom of the crowd

Summarize the different software development methodologies.

There are a number of different software development methodologies. The waterfall methodology is a sequential, activity-based process in which each phase in the SDLC is performed sequentially from planning through implementation and maintenance. The rapid application development methodology (RAD) emphasizes extensive user involvement in the rapid and evolutionary construction of working prototypes of a system to accelerate the systems development process. The extreme programming (XP) methodology breaks a project into tiny phases, and developers cannot continue on to the next phase until the first phase is complete. The agile methodology is a form of XP, aims for customer satisfaction through early and continuous delivery of useful software components. Rational Unified Process (RUP) provides a framework for breaking down the development of software into four gates Gate One: Inception, Gate Two: Elaboration, Gate Three: Construction, Gate Four: Transition. Scrum - uses small teams to produce small pieces of deliverable software using sprints, or 30-day intervals, to achieve an appointed goal.

Identify the three primary areas a project manager must focus on managing to ensure success.

There are three primary areas a project manager must focus on managing to ensure success: Manage People: Managing people is one of the hardest and most critical efforts a project manager undertakes. How to resolve conflicts within the team and how to balance the needs of the project with the personal/professional needs of the team are a few of the challenges facing project managers. More and more project managers are the main (and sometimes sole) interface with the client during the project. As such, communication, negotiation, marketing, and salesmanship are just as important to the project manager as financial and analytical acumen. There are many times when the people management side of project management made the difference in pulling off a successful project. Manage Communications: While many companies develop unique project management frame-works based on familiar project management standards, all of them agree that communication is the key to excellent project management. This is quite easy to state, but not so easy to accomplish! It is extremely helpful if a project manager plans what and how he/she will communicate as a formal part of the project management plan. Most often a document, it is referred to as a communications plan. A project manager distributes timely, accurate, and meaningful information regarding project objectives that involve time, cost, scope and quality and the status of each. The project manager also shares small wins as the project progresses; informs others of needed corrections; makes requests known for additional resources; and, keeps all stakeholders informed of the project schedule. Manage Change: Dynamic organizational change is inevitable and an organization must effectively manage change as it evolves. With the numerous challenges and complexities that organizations face in today's rapidly changing environment, effective change management thus becomes a critical core competency. Change management is a set of techniques that aid in evolution, composition, and policy management of the design and implementation of a system.

On average, how many years longer does each generation live than the previous in the United States?

Three

Which trend has the following potential business impact?

Time is becoming one of the world's most precious commodities

What are the three primary variables (or triple constraints) in any project?

Time, cost, scope

What is time-series information?

Time-stamped information collected at a particular frequency

Which of the following implies that information is current with respect to the business requirement?

Timeliness

What is the primary purpose of a data warehouse?

To aggregate information throughout an organization into a single repository in such a way that employees can make decisions and undertake business analysis activities.

Paula Logston is the owner and operator of a high-end online custom clothing company. Paula has never heard of Porter's Five Forces Model and wants to understand why she would perform an analysis using it. If you were tasked with explaining Porter's Five Forces model to Paula what would be the primary reason she would want to use this type of analysis?

To help Paula evaluate the attractiveness of the clothing industry.

Why is Noodles & Company using business intelligence?

To improve financial analysis.

Why is Ben & Jerry's using business intelligence?

To improve quality.

A social bookmarking site is dedicated to providing all of the following except

To reconnect with colleagues for business progress

______is a small electronic device that changes user passwords automatically. The user enters his/her user ID and device displayed password to gain access to the network.

Tokens

Collaboration System

Tools that support the work of teams or groups by facilitating the sharing and flow of info. Generates more info faster from a wider audience.

HR ERP Componets

Tracks employee information including payroll, benefits, compensation and performance assessment to ensure compliance with all laws.

Operations

Transforms raw materials or inputs into goods and services

All of the following are scientific methods organizations use to anticipate, forecast, and assess the future, except:

Trend simulation

A data-driven website is an interactive website kept constantly updated and relevant to the needs of its customers through the use of a database.

True

A dimension is a particular attribute of information.

True

A genetic algorithm is an artificial intelligence system that mimics the evolutionary, survival-of-the-fittest process to generate increasingly better solutions to a problem.

True

Consolidation, drill-down, and slice-and-dice are the three most common capabilities offered in an EIS.

True

Organizational information comes at different levels and in different formats and granularities.

True

Relational integrity constraints are rules that enforce basic and fundamental information-based constraints.

True

Reports for each sales person, product, and part are examples of detail or fine information granularities.

True

The ultimate goal of AI is the ability to build a system that can mimic human intelligence.

True

Transactional information is used when performing operational tasks and repetitive decisions such as analyzing daily sales reports and production schedules to determine how much inventory to carry.

True

What refers to a type of cable composed of four (or more) copper wires twisted around each other within a plastic sheath?

Twisted-pair cable

An information partnership occurs when _______ or more organizations cooperate by integrating their IT systems.

Two

Hybrid Cloud

Two or more private, public or community clouds but each cloud remains separate. Example: Cloud bursting

Cable Modem (broad band modem)

Type of digital modem used with high speed internet service. Connects a home computer to residential cable TV service

What is one of the most common reasons why systems development projects fail?

Unclear or missing business requirements

Which of the following is the result of BI that the data have been defined in business terms and calculations and algorithms are easily accessed for comprehension?

Understandable

What is it called when each transaction, entity, and event is represented only once in the information?

Uniqueness

On the graph depicting the interrelationships between efficiency and effectiveness, where does an organization ideally want to operate?

Upper right-hand corner

All of the following are types of website visitors except:

Usability visitor

Eintegration

Use of the internet to provide customers with the ability to gain personalized info by querying corporate databases and their information sources

What is application software?

Used for specific information processing needs, including payroll, customer relationship management, project management, training, and many others

Which of the following highlights how to use the system?

User documentation

What is one of the major problems with email?

User's expectation of privacy

On demand Service

Users can increase storage and processing power as needed

Automatic Vehicle Location (AVL)

Uses GPS tracking to track vehicles. Example: Garmain is one of the more popular manufactors.

Voice over IP (VoIP)

Uses IP technology to transmit telephone calls

Semipassive RFID Tag

Uses a battery to run the microchip's circuitory,but communicates by drawing power from the RFID reader.

Supply Chain Planning Systems

Uses advanced mathematical algorithms to improve the flow and efficiency of the supply chain while reducing inventory.

Radio Frequency Identification (RFID)

Uses electronic tags and labels to identify objects wirelessly over short distances. Holds the promise of replacing bar codes, exchanges info between a tagged object and reader/writer

Chipless RFID Tag

Uses plastic or conductive polymers instead of silicon-based microchips, allowing them to be washed or exposed to water without damaging the chip. Example: chips injected under the skin of animals and retail stores use it to monitor and track inventory.

What is parallel implementation?

Using both the old and new systems until it is evident that the new system performs correctly

What is teleliving?

Using information devices and the Internet to conduct all aspects of life seamlessly

What is social engineering?

Using one's social skills to trick people into revealing access credentials or other information valuable to the attacker

Which of the following is not one of the parallels between challenges in business and those of war?

Using tactical business intelligence

Traceroute

Utility application that monitors the network path of packet data sent to a remote computer

What IT governance focus area ensures the IT department delivers the promised benefits for every project or investment?

Value delivery

Artificial Systems

Various commercial applications of artificial intelligence. They include sensors and software

Which company has "The Wall of Shaygan", which is a digital dashboard that tracks 100-plus IT systems on a single screen?

Verizon Communications

In a Gantt chart tasks are listed __________ and the project's timeframe is listed ____________.

Vertically, horizontally

Augumented Reality

Viewing of the physical world with computer generated layers of info added to it.

Which term describes the WWW during its first few years of operation between 1991 and 2003?

Web 1.0

What brings together people from industry, disability organizations, government, and research labs from around the world to develop guidelines and resources to help make the Web accessible to people with disabilities including auditory, cognitive, neurological, physical, speech and visual disabilities?

Web accessibility initiative

What enables publishing content both to intranets and to public websites?

Web content management system

Real Simple Syndication

Web format used to publish frequently updated works such as blogs, news headlines, audio and video in a standardized format

As a trainer for Exempla Healthcare, Tina is faced with many challenges to properly training her new hires. There are over 40 different locations where Exempla employees work across the Chicago metro area. Tina decides to implement some valuable ebusiness tools to help reduce traveling costs, increase speed, and provide flexibility for completing training sessions with all the new hires. Tina primarily uses PowerPoints and videos during her training modules. What is the most effective ebusiness tool for Tina to implement and accomplish all of her training goals?

Webinar

Mashup

Website or web application that uses content from more than 1 source to create a completely new product or service.

Search Engine

Website software that finds other pages based on keyword matching similar to Google.

Social Media

Websites that rely on user participation and user-contributed content

Time to Market, Availability of Corporate Resources, & Corporate Core Competencies

What 3 key factors should an organization consider when contemplating the buy vs. build decision?

Graphical User Interface (GUI) Screen Design & Data Models with Entity Relationship Diagrams (ERD)

What are 2 different modeling types?

broad cost leadership, broad differentiation, or focused strategy

What are Porter's 3 generic strategies when entering a new market?

Content Providers

What are companies that use the Internet to distribute copyrighted content, including news, music, games, books, movies, and many other types of information?

buyer power, supplier power, threat of substitute products/services, threat of new entrants, & rivalry among existing competitors

What are the "Five Forces"?

shadowing and joint-problem solving

What are the 2 best practices for transferring or recreating tact knowledge inside an organization

unstructured and structured

What are the 2 categories of collaboration systems?

explicit or tacit

What are the 2 categories of intellectual and knowledge-based assets?

operational and analytical

What are the 2 primary components of a CRM strategy?

elogistics and eprocurement

What are the 2 primary features of ebusiness components?

messaging-based & database-based

What are the 2 primary types of workflow systems?

overall fit, proper business analysis, & solid implementation plans

What are the 3 basic attributes of successful ERP projects?

operational, tactical, and strategic

What are the 3 categories of data mining analysis and BI?

cluster analysis, association detection, statistical analysis

What are the 3 common forms of data mining analysis capabilities?

A(n)___________ management system facilitates the automation and management of business processes and controls the movement of work through the business process.

Workflow

What facilitates the automation and management of business processes and controls the movement of work through the business process?

Workflow management systems

Broadband over Power Line

Works by transmitting data over electrical lines using signaling frequencies higher than the electrical signals.

. What type of training is set in a classroom-type environment and lead by an instructor?

Workshop training

Which of the following malware change their form as they propagate?

Worms

Which of the following is not performed during the implementation phase?

Write detailed business requirements

Extreme Programming Methodology

XP

Who did Business 2.0 rank as number one in the top 50 people who matter most in business?

You - the customer

Which of the following is not a technology company but used technology to revamp the business process of selling shoes

Zappos

Mcommerce (Mobile Commerce)

ability to purchase goods and services through a wireless Internet-enabled device

supply chain visibility

ability to view all areas up and down the SC

Call scripting systems

access org databases that track similar issues or q's and automatically generate details for CSR who can then relay them to the customer

Call scripting system

access organizational databases that track similar issues or questions and automatically generate the details for the CSR who can then relay them to the customer

Environmental Scanning

acquisition and analysis of events and trends in the environment external to an organization

Intermediaries

agents, software, or businesses that bring buyers and sellers together that provide a trading infrastructure to enhance ebusiness

Agile methodology

aims for customer satisfaction through early and continuous delivery of useful software components developed by an iterative process

Benchmarks

baseline values the system seeks to attain

Transaction Processing System (TPS)

basic business system that serves the operational level (analysis) in an organization

single consolidated view of all supplies, consistent & detailed management information allowing multiple views for every executive, & elimination of duplicate suppliers

benefits of SRM

Web conferencing

blends audio, video, and document sharing technologies to create virtual meeting rooms where people "gather" to at a password protected website

web conferencing

blends audio, video, and document-sharing technologies to create virtual meeting rooms where people "gather" at a password-protected website

Extreme programming (XP) methodology

breaks a project into tiny phases, and developers cannot continue on to next phase until first phase is complete

unstructured collaboration (or information collaboration)

collaboration system that includes document exchange, shared whiteboards, discussion forums, and email; can improve personal productivity, reducing the time spent searching for information or chasing answers

Business wikis

collaborative web pages that allow users to edit documents, share ideas, or monitor the status of a project

business wikis

collaborative web pages that allow users to edit documents, share ideas, or monitor the status of a project

BI ERP components

collect information sued throughout the organization, organize it, and apply analytical tools to assist managers with decisions

ISO 14000

collection of best practices for managing org's impact on environment doesn't prescribe performance levels but est. environmental management systems

Insourcing

common approach using professional expertise within an org to develop and maintain org's IT systems

cube

common term for the representation of multidimensional information

Malcolm Bridge National Quality Awards

companies can apply for these awards and must show quality in 7 areas

Application Service Provider (ASP)

company that offers an organization access over the Internet to systems and related services that would otherwise have to be located in personal or organizational computers

Internet Service Provider (ISP)

company that provides individuals and other companies access to the Internet along with additional related services (such as website building)

List generators

compile customer information from a variety of sources and segment the information for different marketing campaigns

Expert Systems

computerized advisory programs that imitate the reasoning processes of experts in solving difficult problems (most commonly used form of AI)

Ebusiness

conducting business on the Net, not only buying and selling, but also serving customers and collaborating with business partners

Ebusiness

conducting business ont he internet, not only buying and selling, but also serving customers and collaborating with business partners

strategic business units (SBUs)

consist of several stand alone businesses

Emall

consists of a number of eshops; serves as a gateway through which a visitor can access other eshops

Iterative Development

consists of a series of tiny projects

Supply chain

consists of all parties involved, directly or indirectly, in procurement of a product or raw material

explicit knowledge

consists of anything that can be documented, archived, and codified, often with the help of IT (ex. patents, trademarks, business plans, marketing research, and customer lists)

Iterative development

consists of series of tiny projects

data mart

contains a subset of data warehouse information

Nearshore outsourcing

contracting an outsourcing arrangement with a company in nearby country

Distribution management systems

coordinate process of transporting materials from manufacturer to distribution centers to the final customers

The goal of value chain analysis is to identify processes in which the firm can add value for the customer and create a competitive advantage for itself, with a ________ or ________________.

cost advantage, product differentiation

Business Process Modeling (Mapping)

creating a detailed flow chart or process map of a work process showing its inputs, tasks, and activities, in a structured sequence

Transactional Information

encompasses all of the information contained within a single business process or unit of work, and its primary purpose is to support the performing of daily operational tasks (ex. purchasing stocks, making an airline reservation, or withdrawing cash from an ATM)

Analytical Information

encompasses all organizational information, and its primary purpose is to support the performing of managerial analysis tasks (ex. product statistics, sales projections, future growth, and trends)

Analytical information

encompasses all organizational information, and purpose is to support performing of managerial analytical tasks

business-critical integrity constraints

enforce business rules vital to an organization's success

Business integrity constraints

enforce business rules vital to an organization's success and often requires more insight and knowledge than relational integrity ones

Onshore outsourcing

engaging another company w/in same country for services

Semantic Web

evolving extension of the WWW in which web content can be expressed not only in natural language, but also in a format that can be read and used by software agents, thus permitting them to find, share, and integrate information more easily

Clickstream Data

exact pattern of a consumer's navigation though a site

Workflow management systems

facilitate automation and management of business processes and control movement of work through business process

workflow management systems

facilitate the automation and management of business processes and control the movement of work through the business process

groupware system advantages

facilitating communication, enabling telecommuting, reducing travel costs, sharing expertise, forming groups with common interests where t would not be possible to gather a sufficient number of people face-to-face, saving time and cost in coordinating group work, & facilitating group problem solving

Project assumptions

factors that are considered to be true, real, or certain w/o proof or demonstration

Primary key

field (or group of fields) that uniquely identifies a given entity in a table

enterprise resource planning (ERP)

integrates all departments and functions throughout an organization into a single IT system (or integrated set of IT systems) so that employees can make decisions by viewing enterprisewide information on all business operations

Enterprise resource planning (ERP)

integrates all departments and functions throughout an organization into a single IT system so that employees can make decisions by viewing enterprisewide info on all business operations

Business Process Management (BPM)

integrates all of an organization's business process to make individual processes more efficient; can be used to solve a single glitch or to create one unifying system to consolidate a myriad of processes

Electronic Marketplace (emarketplace)

interactive business communities providing a central market where multiple buyers and sellers can engage in ebusiness activities

Data-Driven Website

interactive website kept constantly updated and relevant to the needs of its customer through the use of a database

data-driven website

interactive website kept constantly updated and relevant to the needs of its customers through the use of a database; especially useful when the site offers a great deal of information, products, or services and/or continually changing information

When evaluating the business value of disintermediation, the more ____________ that are cut from the distribution chain, the lower the product price.

intermediaries

Intranet

internalized portion of the Internet, protected from outside access, that allows an organization to provide access to information and application software to only its employees

Extranet

intranet that is available to strategic allies (such as customers, suppliers, and partners)

Business Facing Process

invisible to the external customer but essential to the effective management of the business (ex. goal setting, day-to-day planning, performance feedback, rewards, and resource allocation)

Knowledge management (KM)

involves capturing, classifying, evaluating, retrieving, and sharing info assets in a way that provides context for effective decisions and actions

Knowledge management (KM)

involves capturing, classifying, evaluating, retrieving, and sharing information assets in a away that pro vides context for effective decisions and actions

Analysis Phase

involves examining end-user business requirements and refining project goals into defined functions and operations of the intended system

SCM ERP components

involves management of info flows between and among stages in SC to maximize total SC effectiveness and profitability. Help plan, schedule, control, and optimize SC from acquisition to finished goods

Supply chain management (SCM)

involves management of info flows between and among stages in a supply chain to maximize total supply chain effectiveness and profitability

Customer relationship management (CRM)

involves managing all aspects of a customer's relationship w/ an org to increase customer loyalty and retention and an org's profitability

Customer relationship management (CRM)

involves managing all aspects of a customer's relationship with an organization to increase customer loyalty and retention and an organization's profitability

Customer relationship management (CRM) ERP components

involves managing all aspects of customers' relationships with an org to increase customer loyalty and retention and an org's profitability

Maintenance Phase

involves performing changes, corrections, additions, and upgrades to ensure the system continues to meet the business goals

structured collaboration (or process collaboration)

involves shared participation in business processes, such as workflow, in which knowledge is hard-coded as rules; beneficial in terms of improving automation and the routing of information

Structured collaboration (process collaboration)

involves shared participation in business processes, such as workflow, in which knowledge is hard-coded rules

Development Phase

involves taking all of the detailed design documents form the design phase and transforming them into the actual system

Consolidation

involves the aggregation of information and features simple roll-ups to complex groupings of interrelated information. Many organizations track financial information at a regional level and then consolidate the information at a a single global level

Supply chain management (SCM)

involves the management of information flows between and among stages in a supply chain to maximize total supply chain effectiveness and profitability

Egovernment

involves the use of strategies and technologies to transform government(s) by improving the delivery of services and enhancing the quality of interaction between the citizen-consumer within all branches of government

Chief Technology Officer (CTO)

responsible for ensuring the throughput, speed, accuracy, availability, and reliability of an organization's information technology; have direct responsibility for ensuring the efficiency of IT systems throughout the organization; possess well-rounded knowledge of all aspects of IT, including hardware, software, and telecommunications

Customer Facing Process

results in a product or service that is received by an organization's external customer

association detection

revelas the degree to which variables are related and the nature and frequency of these relationship in the information

Loyalty Programs

reward customers based on the amount of business they do with a particular organzation

relational integrity constraints

rules that enforce basic and fundamental information-based constraints

Relational integrity constraints

rules that enforce basic fundamental info based constraints

integrity constraints

rules that help ensure the quality of information

Integrity constraints

rules that help ensure the quality of the information. There are two types:

clustering

segment a heterogenous population of records into a number of more homogenous subgroups

cross-selling

selling additional products or services to a customer

messaging-based workflow systems

send work assignments though an email system

Message based workflow systems

send work assignments through email system

Web 2.0

set of economic, social, and technology trends that collectively form the basis for the next generation of the Internet-- a more mature, distinctive medium characterized by user participation, openness, and network effects

videoconference

set of interactive telecommunication technologies that allow 2 or more locations to interact via two-way video and audio transmissions simultaneously

Videoconferencing

set of interactive telecommunication technologies that allow two or more locations to interact via two way video and audio transmissions simultaneously

Methodology

set of policies, procedures, standards, processes, practices, tools, techniques,a nd tasks that people apply to technical and management challenges; used to manage the deployment of technology with work plans, requirements documents and test plans; also used to deploy technology

Application Programming Interface (API)

set of routines, protocols, and tools for building software applications; usually sources mashups

Change management

set of techniques that aid in evolution, composition, and policy management of design and implementation of system

middleware

several different types of software that provide connectivity between 2 or more software applications; achieves integrations; translates information between disparate systems

middleware

several different types of software that sit in middle of and provide connectivity between 2 or more software applications

To-Be Process Models

show the results of applying change improvement opportunities to the current process model; how the process problem will be solved or implemented

Gannt Chart

simple bar chart that depicts project tasks against a calendar

Artificial Intelligence (AI)

simulates human intelligence such as the ability to reason and learn (Some categories- Expert system, Neural Network, Genetic algorithm, & Intelligent agent)

Agent-Based Modeling

simulation of a human organization using a multi-agent system

Instant messaging (IMing)

type of communication that enables someone to create a kind of private caht room with another individual in order to communicate in real time of the Net

instant messaging

type of communications service that enables someone to create a kind of private chat room with another individual in order to communicated in real-time over the internet

relational database model

type of database that stores information in the form of logically related two-dimensional tables

data-mining tools

use a variety of techniques to find patterns and relationships in large volumes of information and infer rules from them that predict future behavior and guide decision-making

SC planning (SCP) systems

use advanced mathematical algorithms to improve the flow and efficiency of the SC while reducing inventory. Depends entirely on info for accuracy

Scrum Methodology

uses small teams to produce small pieces of deliverable software using springs to achieve an appoint goal; each day ends and begins with a stand-up meeting to monitor and control the development effort

Offshore outsourcing

using orgs from developing countries to write code and develop systems

Reintermediation

using the Internet to reassemble buyers, sellers, and other partners in a traditional supply chain in new ways

Eshop/Estore/Etailer

version of a retail store where customers can shop at any hour of the day without leaving their home or office

Value chain

views an organization as a series of processes, each of which adds value to the product or service for each customer (ex. lower costs or benefits)

Wikis

web based tools that make it easy for users to add, remove, and change online content

wikis

web-based tools that make it easy for users to add, remove, and change online content


Set pelajaran terkait

US History Topic 10 Practice Quiz

View Set

ARALING PANLIPUNAN: PAGKAMAMAMAYAN, KARAPATANG PANTAO, GAWAING PANSIBIKO, AT PATICIPATORY GOVERNANCE

View Set

Examen de mi-étape 3 sciences SYSTÈME LYMPHATIQUE

View Set

Accounting Issues: Chapter 4 - Communicating Results and Visualizations

View Set

Chapter 65: Assessment of Neurologic Function

View Set

Genetics - Ch. 13 Gene Mutations, Transposable Elements, & DNA Repair

View Set

Finance 331 Test 3 Conceptual Practice

View Set