BDT Test - Unit 1: Achieving Business Success

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Customer Facing vs Business Facing Processes - Identify whether each process is a Customer Facing Process or a Business Facing Process: - Budget Forecasting - Order Processing - Order Shipping - Training

- Business Facing Process - Customer Facing Process - Customer Facing Process - Business Facing Process

Financial, Website, Supply Chain, Sales, Service, and Marketing Metrics - Identify each metric as a Financial, Website, Supply Chain, Sales, Service, and Marketing metric: - Average Service Requests by Type - Back Order - Break-Even Analysis - Cases Closed in the Same Day - Inventory Turnover - Proposals Given/Accepted - Prospective Customers - Responses/Purchases by Campaign - Return on Investment - Revenue by Campaign - Total Hits - Unique Visitors

- Service Metric - Supply Chain Metric - Financial Metric - Service Metric - Supply Chain Metric - Sales Metric - Sales Metric - Marketing Metric - Financial Metric - Marketing Metric - Website Metric - Website Metric

Static vs Dynamic Processes - Identify whether each process is a Static Process or Dynamic Process: - Creating financial statements - Creating production levels due to changes in suppliers - Managing layoffs - Running payroll

- Static Process - Dynamic Process - Dynamic Process - Static Process

Information Security Vocabulary Matching - Match each word/phrase with its definition: - Experts in technology who use their knowledge to break into computers and networks - Form of malicious software that infects your computer and asks for money - Govern the ethical and moral issues arising from the development and use of information technologies - Intangible creative work that is embodied in physical form and includes copyrights, trademarks, and patents - Software written with malicious intent to cause annoyance or damage... must attach to something - Special class of adware that collects data about a user and transmits it over the Internet without the user's knowledge or permission - Spreads itself not only from file to file but also from computer to computer... don't have to be attached to something - Technological solution that allows publishers to control their digital media - The legal protection afforded an expression of an idea, such as a song, book, or video game

- hackers - ransomware - information ethics - Intellectual Property - Virus - Spyware - Worm - Digital Right Management - Copyright

According to the slides, name three types of computer categories.

1) Supercomputer 2) Desktop 3) Mainframe computer

On the Data to Knowledge chain, what would "There is heavy demand expected, and there is a large tariff of firework making supplies coming June 1st which will cause numerous supply chain interruptions throughout the US" be considered?

Business Intelligence

What is information that has been collected from multiple sources that analyzes patterns, trends, and relationships for strategic decision making?

Business Intelligence

On the Data to Knowledge chain, what would "I sell fireworks for professional shows" be considered?

Data

What are the raw facts that describe the characteristics of an event or object?

Data

Which of the following is not a phase of the Product Life Cycle?

Death


Set pelajaran terkait

Intro to coding : Automated Coding, coding Encoders

View Set

Computer Applications: Chapter 6-Study Guide

View Set

Chapter 19 Proteins and Amino acids

View Set

Leadership and Management - Exam #4

View Set

Unit 1, Unit 2, Unit 3, Unit 4, Unit 5, Unit 6, Unit 7, Unit 8, Unit 9, Unit 10, Unit 11, Unit 12, Unit 13, Unit 14, Unit 15

View Set

6th Grade SS Chapter 36 The Origins and Spread of Christianity

View Set