BUS 311 FINAL EXAM

Ace your homework & exams now with Quizwiz!

when you want to outsource or get a packaged IS you need to

-systems planning and selection - systems analysis

The following describes functions of Analytical CRM EXCEPT: A. Analyze customer service related data such as first-contact resolution and service personnel utilization B. Facilitate the analysis of customer behavior and perceptions as well as customer acquisition and retention C. Collect and compile data from sources inside and outside the companies to provide 360-degree view of customer D. Support pricing optimization and campaign development by building models of customer demand

Analyze customer service related data such as first-contact resolution and service personnel utilization

Why should organizations consider implementing vanilla off-the-shelf ERP system before developing one in-house? A. Easy to customize B. Cost effective C. Suitable for organization's specific business needs D. High return on investment guaranteed

Cost effective

vendor-managed inventory (VMI)

an inventory strategy where the supplier monitors a vendor's inventory for a product or group of products and replenishes products when needed

________ is designed to detect intrusion and prevent unauthorized access to or from a private network. It can be implemented in hardware, software, or a combination of both. A. WLAN B. Encryption C. Firewall D. VPN

Firewall

Which of the following technologies helps merge multiple records that belong to the same person and create customer profiles that contain information about what they want, purchase, like, are interested in, etc.? A. Fuzzy logic B. Text mining C. Data mining D. Chatbot

Fuzzy logic

User training is crucial for the success of ERP implementation as it can help prevent user dissatisfaction and frustration. Training should cover the following EXCEPT: A. How to break old habits and practices B. New set of business processes C. How to use the new ERP system D. How to configure the ERP system too fit users' needs

How to configure the ERP system too fit users' needs

tangible benefits

quantify using proxy variables

Which member of the IS development team is responsible for collecting business and system requirements for the new IS being acquired or developed? A. Systems analyst B. Programmer C. User D. Project manager

Systems analyst

In incidents of data breaches, sensitive personal identifiable information is often compromised. Which of the following is NOT considered as sensitive personal identifiable information? A. Birth date B. Name and address C. Username and password D. Social security number

Username and password

Which of the approaches listed below enables systematic comparison of different IS solutions for a given IS project? A. Break-even analysis B. Weighted multi-criteria analysis C. Detailed cost-benefit analysis D. Net present value analysis

Weighted multi-criteria analysis

SCM efficiency and effectiveness need to be

balanced

intangible benefits

- improves perception of the firm - improved process transparency - improved regulatory compliance - higher barrier to entry for competitors

system conversion

- install the new information system - migrate users to the new information system

scope creep

adding functions to an information system after the project has begun

fact

arguments are based on data, quantitative analysis, and/or indisputable factors

ERP deployment options

- On-premise - cloud basically, replacing stand alone system

The following lists reasons why customization of the off-the-shelf ERP software should be avoided EXCEPT: A. Customization increases cost, complexity, and risk of an implementation. B. Customization restricts businesses from taking advantage of industry standards and best practices built into the ERP software. C. Customization prevents organizations from forming a value chain with their business partners. D. Customization makes future upgrade and maintenance of customized ERP software difficult.

Customization prevents organizations from forming a value chain with their business partners.

It is an artificially intelligent system that approximates the operation of the human brain. It supports decision making that is based on large amount of noisy data, individual differences, and/or condition/circumstance differences. It is capable of creating common patterns in data, comparing new data to learned patterns, and then make a recommendation. It can be categorized as _______. A. Neural network B. Expert system C. Data mining D. Decision support system

Neural network

_________ is a business intelligence tool that facilitates multidimensional analysis of data beyond what simple ad hoc queries can do. Multidimensional analysis is enabled by the operation called slicing and dicing.

Online analytical processing (OLAP)

Supply Chain Management

managing upstream and downstream value-added flows of materials, final goods, and related information among suppliers, the company, resellers, and final consumers

what does ERP do?

- streamlines business processes throughout the entire database - replaces functional area - meant to replace stand-alone system

supply chain management system

- supply chain planning - supply chain execution

text mining

- to analyze free-form text analyzes documents linguistic structures - extracts info from textual documents

To ensure that the information system being implemented has features and functionalities that satisfy design requirements, _______ must be performed. A. Alpha testing B. Software testing C. Beta testing D. Developmental testing

Alpha testing

Sarbnes-Oxley Act

- demonstrate the compliance w accounting standards and sound corporate governance - demonstrate that there are measures in place to prevent errors, misuse or fraud, to detect any potential problems and to correct any problems - to preserve business documents for document compliance and for potential lawsuits

collaborative CRM

- methods and technologies to facilitate communication

Sources of Inputs for business analytics

- operational systems - survey, audio from phone calls w/ customers - social media platforms - clickstream data - web browsing data

IS development team user

- provide insights in a daily business activities (serve as a basis for needs analysis) - participare in beta testing and provide feedback - able to test in real environment + give feedback

Which of the following is not a reason for choosing cloud-based ERP deployment approach? A. Customization B. Low cost of adoption C. Predictable cost D. Mobile accessibility

Customization

web usage mining

analyses clickstream data (web-browsing)

Transform

remove data that is corrupt and transformed into data that is agreed upon

strongest business case needs

- faith - fear - fact

data mining

provides capabilities for discovering hidden predictive patterns, trends or rules

intangible cost

- clash w employee work culture - employee frustration - staff turnover

programmer

- code, test, debug and deploying the system - develop system documentation to ease future maintenance

types of system maintenance

- corrective - adaptive - preventive - perfective

project manager

- ensure that a project is a success - manage tasks and resources - monitor progress and adjust project plan when needed

systems analyst

- study the problems and needs of an organization - determine how people, methods, and info tech can be best combined to bring about improvements in the organization - make the business case - help users define their requirements for new or enhanced information systems

IS development team

- systems analyst - programmer - project manager - user

agile methodology

- use when requirements are constantly changing - implement small portions of SDLC at a time bc you want to accommodate changing requirements as they occur

ETL

Extract, Transform, Load

parallel

old and new systems are used at the same time

direct

old system is discontinued on one day, and the new is used on the next

phased

parts of the new system are implemented over time

pilot (single location)

entire system is used in one location

prototyping

helpful when users don't know what they want

bullwhip effect

the phenomenon in supply chains whereby ordering patterns experience increasing variance as you proceed upstream in the chain

expert system

uses reasoning methods based on knowledge about a specific problem domain in order to provide advice

net-present-value analysis

compare the initial cost of the project to the total value of future revenue that project

DSS

decision support system

artificial intelligence

enables information technologies to simulate human intelligence in terms of reasoning learning, gaining, sensing capabilities like seeking hearing, walking, talking

bullwhip effect is caused by

errors in demand forecast

chatbox

help us track problems throughout the supply chain

break even analysis

identify at what point (if ever) tangible benefits equal tangible costs

configuration

no coding required

Scope creep is among several factors that cause failure in ERP projects. Which of the following makes the project vulnerable to scope creep? A. Poorly defined business requirements B. Underestimated costs, time, and resources C. Unrealistic plan D. Lack of top-level management support

Poorly defined business requirements

Enterprise Resource Planning System (ERP)

- Big info system - anyone can use it - an integrated suite of business applications - streamlines an organizations internal value chain - integrates info across operations on a company - wide basis

hot backup site

- cloning of actual data center - everything stays the same - use it when you heavily rely on information centers - can't afford any downtime

What is the very first things that you have to do when you launch the system that you need?

- consult the people that are going to be affected by the changes - GIGO (garbage in garbage out) - business process reengineering - make sure there are no inefficiencies or redundancies

Which technology helps artificial intelligent systems like expert system and neural network deal with problems where information that serve as inputs for the analysis is incomplete or imprecise? A. Fuzzy logic B. Machine learning C. Intelligent agent D. Natural language processing

Fuzzy logic

OLAP

online analytical processing

Business Process Management (BPM)

- business process reengineering - systematic and structured improvement approach where organization-wide business processes are critically examined and redesigned/reengineered

Requirements for successful CRM

- customer focused culture - employee training - keep improving customer service - the type of data

analytical CRM

- data warehouses - data mining and visualization - business intelligence - ERP systems

cold backup site

- empty warehouse with all necessary connections for power and communication but nothing else - can afford to have downtime

online analytical processing

- facilitates complex multidimensional data analysis typically using graphical software tools - categorizes data as measures and dimensions - slicing and dicing - enables the analysis of data at more or less detailed - does not discover predictive relationships

technologies that support the tracking of products along the supply chain

- internet of things - chat box - RFID

Why do ERP projects fail?

- lack of top-level management - poorly defined scope - poor planning - poor fit - poor configuration - risks and complications from customization - staff whose jobs are impacted are not consulted before rolling out the project - inadequate training

decision support system

- provide support for recurring semi-structured problems - what-if analysis - goal-seeking analysis

operational CRM

- sales force automation - customer service and support - enterprise marketing management

achieving successful ERP implementation

- secure executive sponsorship and support - get help from external constraints - thoroughly train users to prevent user dissatisfaction - take a multidisciplinary approach to implementations - train to unlearn past habits and practices - adequate time and budget must be set aside - when including everyone at the start of the project, the will feel special

downstream information flow

- to attract potential customers - to create customer loyalty - transform existing customers into profitable ones

web content mining using web crawler (text mining + web crawler)

- uses web crawler to gather web documents that match pre-specified criteria - places collected data in a data store - applies text mining to extract information

ERP acquisition options

- vanilla off-the-shelf - customized off-the-shelf - custom-made

How does top-level management contribute to the success of the ERP project? A. They provide resources needed for ERP implementation. B. They authorize changes in the way the organization does business and promote the transition to new practices. C. They oversee the implementation and help address problems as they arise. D. All of the above

All of the above

When selecting an IS project to implement, why is it important to consider other IS projects being implemented concurrently in the pipeline? A. To ensure that resources can be effectively shared across projects B. To ensure that additional risks posed by the new project can be maintained and managed C. To balance projects in the project portfolio by type, risk, and resource demand so that all projects in a project port folio can be effectively manage D. All of the above

All of the above

Which of the following statements is FALSE? A. Making a business case refers to a process of identifying, quantifying, and presenting benefits that the proposed information system will bring to the organization. B. The strongest and most comprehensive business case is the one that consists of arguments that are based on faith, fear, and facts. C. A business case that is based solely on strategic arguments with no hard numbers demonstrating the potential Return on Investment (ROI) is not likely to get funded. D. Arguments based on facts can be derived through qualitative analysis.

Arguments based on facts can be derived through qualitative analysis.

Non-sensitive personal identifiable information are becoming highly targeted by criminals. Why? A. Because non-sensitive personal identifiable information can be used to acquire access to victims' secondary accounts. B. Because it is easier to steal non-sensitive personal identifiable information than to steal the sensitive one C. Because stealing non-sensitive personal identifiable information is often undetected. D. None of the above

Because non-sensitive personal identifiable information can be used to acquire access to victims' secondary accounts.

Which of the following technologies has been largely used to support customer service and support? A. CSS B. EMM C. Chatbot D. SFA

Chatbot

Which component of CRM system enables the sharing of information related to all aspects of marketing, sales, and customer support across an organization to ensure effective and efficient communication with the customer? A. Operational CRM B. Analytical CRM C. Collaborative CRM D. All of the above

Collaborative CRM

How does data mining complement OLAP? A. Data mining extracts information from data and helps examine organization's past and current performance. B. Data mining helps discover hidden relationships in the data, create predictive models, identify trends, and predict business outcomes. C. Data mining facilitates complex multidimensional analysis of data at more or less detailed levels. D. Data mining helps decision makers get a better view of organization's performance by bringing unstructured data to the analysis.

Data mining helps discover hidden relationships in the data, create predictive models, identify trends, and predict business outcomes.

Which of the following is NOT considered as a primary threat to information systems? A. Design flaw and insufficient system testing B. Crackers C. Employees D. Malicious software

Design flaw and insufficient system testing

Which of the following statements about cost-benefit analysis is FALSE? A. Detailed cost-benefit analysis for the proposed information system only involves the identification of tangible benefits and tangible costs. B. When the benefit of IS investment is difficult to quantify, proxy variables can be used to indicate how new system will add value to the organization. C. Total cost of ownership of an information system consists of non-recurring costs and recurring costs. D. Given that a dollar today is worth more than a dollar available at a future date, net-present-value analysis should be carried out to take into the account the value of the IS investment over time.

Detailed cost-benefit analysis for the proposed information system only involves the identification of tangible benefits and tangible costs.

__________ involves the setup of workflow, data fields, and tables in the database with an objective to introduce business contexts to the ERP system being installed whereas __________ involves the modification of the programming code to enable the ERP system to support company-specific tasks. A. ERP customization, ERP configuration B. ERP development, ERP deployment C. ERP deployment, ERP development D. ERP configuration, ERP customization

ERP configuration, ERP customization

Which of the following is NOT a valid observation about encryption? A. Encryption is the process of encoding data using an encryption key. B. Encryption is used for data enhancement rather than data protection. C. Encryption is performed before data enter the network. D. To decode data, a decryption key is required.

Encryption is used for data enhancement rather than data protection.

Which of the following statement is FALSE? A. Enterprise resource planning (ERP) system is one big system with one database that serves as a central data repository for all business activities. B. Enterprise resource planning (ERP) system streamlines organization-wide business processes and information flow. C. Enterprise resource planning (ERP) system comes with a centralized point of access and therefore common user interface for all. D. Enterprise resource planning (ERP) system can only be used to support internally focused business processes, i.e., financial management, operations management, and human resource management.

Enterprise resource planning (ERP) system can only be used to support internally focused business processes, i.e., financial management, operations management, and human resource management.

It is an artificially intelligent system with human cognitive abilities. It can process vast amounts of information to make complex and subtle logical connections. In the context of healthcare, it can help diagnose and treat patients. The physician first poses a query to the system, describing symptoms and other related factors. The system then a) parses the input to identify the key pieces of information, b) mines the patient data to find relevant facts about family history, current medications and other existing conditions, c) incorporates treatment guidelines, electronic medical record data, doctors' notes, research, clinical studies, journal articles, and patient information into the analysis, and d) provides a list of potential diagnoses along with a score that indicates the level of confidence for each hypothesis. This system can be categorized as ________. A. Decision support system B. Neural network C. Expert system D. Data mining

Expert system

To derive a single version of truth, the following must be carried out EXCEPT: A. Perform data cleansing to detect data that are not aligned with the standardized format, to transform them to the standardized format, as well as to remove data that are corrupt or inaccurate B. Implement master data management program where different business units at different corporate levels have to come together to identify master data items and define each of them in terms of semantic and representation format C. Extract data from operational systems and load them to a data warehouse. D. Develop master data or a set of data that is most important in business operation such as those that have to do with customers, suppliers, inventory, employees

Extract data from operational systems and load them to a data warehouse.

The following statements describe capabilities of geographic information system (GIS) EXCEPT: A. Geographical information system supports the analysis of geographically referenced information. B. Geographical information system organizes layers of geographically referenced information into visualizations using 2D maps. C. Geographical information system captures characteristics about geographic locations, allowing these characteristics to be coupled with other data to support querying, analysis, and decision making. D. None of the above

Geographical information system organizes layers of geographically referenced information into visualizations using 2D maps.

Human safeguards used to protect organization's information systems as well as its computing and information resources include the following EXCEPT: A. Effective management B. Physical access restrictions C. Laws D. Policies, procedures, and code of conduct

Physical access restrictions

When launching the ERP project, which of the following is not among the very first things that must be carried out? A. The analysis of current business processes, the identification of pain points, and the design of new and improved business processes B. Business process reengineering C. Business process management D. Purchasing ERP system from ERP vendor

Purchasing ERP system from ERP vendor

What can be done to prevent drive-by hacking? A. Put in place Wireless LAN control B. Implement two-factor authentication C. Encrypt data being transported over the network D. None of the above

Put in place Wireless LAN control

Which type of malicious software makes critical data and/or information systems inaccessible? For victim organizations to regain accessibility, certain amount of payment is required. A. Trojan B. Ransomeware C. Zombies D. Spyware

Ransomeware

Which of the following is not a factor to consider when selecting a project to implement? A. Resource availability B. Reliability of the new system C. Potential costs D. Potential benefits

Reliability of the new system

Items listed below are important for successful implementation of just-in-time production EXCEPT: A. Trustworthy suppliers and quality supplies B. Ability to accurately forecast demand C. Reversed logistics D. Visibility over multiple tiers of the supply chain

Reversed logistics

Which of the following statements is FALSE? A. SCM system helps monitor supply chain performance and identify areas that need improvement B. SCM system tracks the movement of products, provides members of the supply network access to information crucial for supply chain execution, but does not keep track of when payment must be issued to suppliers. C. SCM system comes with various analytical tools, such as statistical analysis, simulation, and visualization that support supply chain planning. D. SCM system provides greater visibility into the supply chain, allowing businesses to foresee and respond to external events in time.

SCM system tracks the movement of products, provides members of the supply network access to information crucial for supply chain execution, but does not keep track of when payment must be issued to suppliers.

Which of the following DOES NOT describe functions of sales force automation? A. Sales force automation facilitates the assessment of sales performance. B. Sales force automation provides up-to-the-minute information on existing customers, prospective customers, and sales personnel that serve as inputs for planning, scheduling, and coordinating sales function. C. Sales force automation automates sales process and handle sales related administrative tasks. D. Sales force automation facilitates the execution and management of marketing campaigns.

Sales force automation facilitates the execution and management of marketing campaigns.

Tools and techniques for business intelligence and advanced analytics can deal with structured, unstructured, and semi-structured data. Which of the following statements about data that serve as inputs for business analytics is FALSE? A. Unstructured data can be free from text, audio, video. Comments or tweets that you find on social network platforms are examples of unstructured data. B. Semi-structured data refers to data that usually has an irregular structure such as clickstream data or web browsing data where the sequential stream of clicks is recorded as web users move across the web. C. Structured data refers to data that has been formatted and categorized. It is data that is usually stored in databases. D. Structured, unstructured, and semi-structured data that serve as inputs for business analytics are from informational systems.

Structured, unstructured, and semi-structured data that serve as inputs for business analytics are from informational systems.

Why should systems analysis be conducted even when an organization intends to acquire a packaged IS from a third-party vendor? A. To justify the need for that packaged IS B. To secure resources needed for that IS acquisition C. To enable the selection of the packaged IS that best fits organization's business needs D. To demonstrate the benefits of the packaged IS to be acquired

To enable the selection of the packaged IS that best fits organization's business needs

Why are business cases required for any IS acquisition, development, upgrade? A. To facilitate the selection and prioritization of IS projects to implement as well as to ensure that organizational resources are used in strategic ways B. To demonstrate the need for the proposed information system C. To secure resources for implementing the proposed system D. To demonstrate that the investment for the proposed information system will benefit an organization

To facilitate the selection and prioritization of IS projects to implement as well as to ensure that organizational resources are used in strategic ways

Which of the following is NOT an example of two-factor authentication? A. To withdraw the money from the ATM machine, we need both a debit card and PIN number. B. To access servers stored in a data center cabinet, IT staff need to verify themselves using their ID card and fingerprint. C. To access our account on MyUH Portal, we need a password and a one-time based token sent to our cell phone. D. To pay my credit card bills online, I have to log into my account using my password and answers to my security questions.

To pay my credit card bills online, I have to log into my account using my password and answers to my security questions.

Company A is heavily dependent on the internet for transporting important messages to its business partners. Which of the following technologies should it use if it wants to ensure that only authorized users access those messages and that those messages cannot be intercepted? A. Encryption B. Firewall C. WLAN D. VPN

VPN

What kind of analysis does decision support system facilitate? A. Multidimensional analysis of past and current transactions B. Spatial analysis C. What-if analysis and goal seeking analysis D. Analysis of unstructured data

What-if analysis and goal seeking analysis

When should one consider adopting Agile Methodology over Waterfall SDLC when developing a new information system? A. When business and system requirements are highly structured and straightforward B. When business and system requirements are not well understood and constantly changing C. When the IS project is large with dozens or more developers D. When business and system requirements are very unique.

When business and system requirements are not well understood and constantly changing

CRM system enables businesses to provide highly personalized communication and service to customers. At what point does the personalization backfire a company? A. When personalization is unprofessional. B. When personalization is inadequate. C. When personalization is invasive. D. When personalization is inaccurate.

When personalization is invasive.

Why should organizations consider bringing in external consultants for their ERP project even when they believe that they have knowledge, technical expertise, and managerial skills needed for the implementation? A. Consultants can help define business requirements. B. Consultants can ensure successful customization of the ERP system. C. Consultants has knowledge about packaged ERP software and are able to identify ones that support industry standards and best practices. D. With ERP project experiences, consultants have the advantage of lessons learned from the most successful and least successful implementations.

With ERP project experiences, consultants have the advantage of lessons learned from the most successful and least successful implementations.

Which of the following technologies DOES NOT support the tracking of products as they move through the supply chain and enhance supply chain visibility? A. On-board telematic unit and sensor-enabled IoT solutions B. RFID C. Chatbot D. XML

XML

faith

arguments are based on beliefs about organization strategy, competitive advantage, industry forces, customer perceptions, market share and so on

fear

arguments are based on the notion that if the system is not implemented, the firm will lose out to the competition or worse, go out of business

customization

new elements, features, functions which means coding is required

intelligent agent

program that provides some kind of service at a specific time or when a specific event occurs

geographic info system (GIS)

system for creating, strong, analyzing and managing geographically referenced info

Under a VMI approach, _______________. A. a manufacturer has to signal restocking quantities to the supplier. B. stockout situations are more likely to occur. C. the vendor has access only to stock levels. D. the suppliers to a manufacturer manage the manufacturer's inventory levels based on negotiated service levels.

the suppliers to a manufacturer manage the manufacturer's inventory levels based on negotiated service levels.

Radio Frequency Identification (RFID)

uses electronic tags and labels to identify objects wirelessly over short distances

To pattern customer's web browsing behavior, which analytical technique should we use and what kind of data do we need as inputs for the analysis? A. web usage mining, web browsing data B. web content mining, web browsing data C. web usage mining, web content D. web content mining, web content

web usage mining, web browsing data


Related study sets

LS 7B Week 10 LaunchPad Questions

View Set

Quizlet 2 : Phrases pour l'emprunt

View Set

Lecture Chapter 2 Fill in the Blank 2.04

View Set

Class Book 1 Lesson 11- Listen and Read

View Set