INFO 360 Exam 3 Review - Ch. 10,11,13,14
Which component of PESTEL analysis can best help manufacturers evaluate any threats posed by a government policy change?
Legal
Who published "How Competitive Forces Shape Strategy" in the Harvard Business Review in 1979?
Michael E. Porter
How do businesses ultimately benefit from using a CRM to identify the highest revenue customers in a target market, before developing a marketing campaign?
They save time and money by targeting this precise segment of the market
Which statement best describes how managers use management information systems to develop SWOT analyses?
They use multiple management information systems to examine key factors that influence the internal strengths and weaknesses of any business
In the Five Whys, why is it important to continue to ask why after asking why the problem occurred?
This will help you understand the root cause of the problem, not just the surface issue that may have arose
As reported by Andrei Ene, one of the worst malware attacks in the last 10 years is the TBT, or
Tiny Banker Trojan
What is a downfall to just-in-time manufacturing and inventory management?
When supply chain disruptions occur, a lack of sufficient inventory on hand can lead to widespread shortages
Which computer experts help an organization ensure that its information system is protected against intrusions by testing the system's security measures?
White-hat hackers
In order to gain market share, a business must differentiate itself from its
competitors
According to Mintzberg, managers take part in what organizational role when they disseminate information and strategic objectives to their subordinates?
informational
Which is the stage of Herbert Simon's 4 stage approach to decision-making where the problem is identified?
intelligence
Quantifiable values that validate how effectively an organization is accomplishing significant business objectives are called
key performance indexes (KPIs)
Manufacturing practices that emphasize developing efficient and smooth supply lines and minimizing excess inventory, delays, and waste are
lean techniques
In the financial world, some Nigerian banks have used a fast-follower strategy. To reap benefits, they have
quickly developed and marketed products introduced by Western banks
Which step in securing customer data ensures proper management of firewalls and routers?
server security
Specialized hardware or software that capture packets transmitted over a network are called packet _____.
sniffers
What is a main component of the belief action outcome framework (BAO) that organizations provide to address the economic, environmental, and social impacts that result from their day-to-day operations?
sustainability reports
What distinguishes the 2 main types of cybercrimes?
their frequency (how often they're committed)
Every time you view a webpage, your data is captured in small pieces called packets. How are data packets transmitted across the internet?
through Transmission Control Protocol/Internet Protocol (TCP/IP)
Share of wallet is also known as share of
customer
Sales managers must identify the customer leads that best fit the company's goals. CRM assists in this aspect of a company's sales process, which is known as
customer qualification
The information needed to calculate share of customer is provided, in large part, by
customer relationship management systems
The Data Management Body of Knowledge (DMBOK) defines the planning, implementation, and control of activities that apply quality management techniques to data as
data quality (DQ)
The value that the future lifetime revenue an organization's customers will generate minus customer acquisition costs and customer retention costs is called customer
equity
Which of the following is generally not protected by an organization's network firewall?
files stored in a cloud-based system such as Dropbox or Google Drive