ist 305 final

Ace your homework & exams now with Quizwiz!

The complete data set on a customer is called a:

360-degree view

________ is an unauthorized access point into a wireless network.

A rogue access point

_________ is a software development methodology that delivers functionality in rapid iterations which are usually measured in weeks.

Agile development

The characteristics of ERP systems include which of the following?

All of the these

Which of the following is not a function of functional area information systems?

Providing data from business events to the corporate database

The leading ERP software vendor is _________.

SAP

________ transmission systems can have a large coverage area but are expensive.

Satellite

_________ is a system in which any object, natural or manmade, has a unique identity and is able to send and receive information over a network without human interaction.

The IoT

Business analytics applications include:

all of these

Key features of transaction processing systems include:

all of these

A _________ is a set of related steps or procedures designed to produce a specific outcome.

business process

A _________ allows programmers to develop an application that includes its own environment and can run as it was developed regardless of the operating system on which it was deployed.

container

A(n) ___________ is software that helps companies acquire and retain customers.

customer relationship management system

__________ can perform two basic operations: 1) identifying previously unknown patters and 2) predicting trends and behaviors.

data mining

________ refers to efforts by unauthorized users to access data that are traveling over wireless networks.

eavesdropping

Examination and answering the question "what is the problem" occur in the ______ phase of the IDC.

intelligence

_________ reports summarize the performance of critical activities.

key indicator

In the case of ________, organizations obtain a license to implement a version of the software product and are then able to further customize it to suit their needs.

open source

________ refers to erratic shifts in orders up and down the supply chain.

the bullwhip effect

Methods that organizations use to interact with their customers are called:

touch point

A ________ is any business event that generates data worthy of being captured and stored in the organization's database.

transaction

A filter bubble is a result of a search in which a website algorithm guesses what a user would like to see based on information about the user.

true

Analytics in the National Basketball Association is a mapping and data visualization challenge.

true

Data mining is a statistical tool for descriptive and predictive analytics.

true

__________ decisions deal with "fuzzy", complex problems.

unstructured

The entire business analytics process starts with

a business problem

The major problem with RFID has been:

expense

Only IT people are involved in the SDLC.

false

Almost ________ of consumers are more likely to purchase from a site that offers ratings and reviews.

2/3

LTE is ________ cellular technology.

4G

Approximately ________ percent of consumers consult reviews before making an online purchase.

50

Analytical CRM systems provide ________ by analyzing customer behavior and perceptions.

BI

________ is a short-range wireless network.

Bluetooth

_________ systems support the front-office business processes, which directly interact with customers.

Operational CRM

_________ is a method of delivering software in which a vendor hosts the applications and provides them as a service to customers over a network, typically the internet.

SaaS

________ are an example of harnessing collective intelligence.

Wikis

A wiki is _________.

a Web site on which anyone can post material and make changes to already posted material

Evaluating the benefits of IT projects is more complex than evaluating their costs for which of the following reasons?

all of these

__________ analytics answers the question "what has happened".

descriptive

The ________ has to be managed to ensure sustainable business practices in the teak wood furniture industry.

entire supply chain

Human Resource departments only use social computing applications for recruiting purposes.

false

________ flows involve money transfers, payments, credit card information and authorization, payment schedules, e-payments, and credit-related data.

financial

Social ________ is the monitoring, collection, and analysis of socially generated data to make strategic decisions.

intelligence

________ flows are the physical products, raw materials, supplies, and so forth that flow along the chain.

material

________ CRM systems have source code that is available to developers and users.

open-source

If a company acquires IT applications from outside contractors or external organizations, it is called ________.

outsourcing

Netcasting is __________.

the distribution of audio files and video files

Your actual download speed is determined by ________.

throughput

The ___________ is comprised of a company's suppliers, suppliers' suppliers, and the processes for managing them.

upstream segment of the supply chain

_____ refers to applications and technologies for consolidating, analyzing, and providing access to vast amounts of data to help users make better business and strategic decisions.

Business analytics

________ integrate the planning, management, and use of all of an organization's resources and are designed to tightly integrate the functional areas of the organization.

Enterprise resource planning systems

Organizations are using social computing in which of the following functions?

Marketing Customer relationship management Human resource management ALL OF THESE!!!!

The reasons why so many IS software development projects do not deliver their potential value include all of the following except:

Poor definition of user requirements

Which of the following is true of prescriptive analytics?

Prescriptive analytics recommend one or more courses of action and show the likely outcome of each decision.

IT applications can be developed in which of the following ways?

all of these

To effectively manage by exception (i.e., use exception reports), the company must first create:

performance standards

In April 2015, Google announced its new wireless service, ________.

Project Fi

_________ feasibility determines whether the project is an acceptable financial risk and, if so, whether the organization has the necessary time and money to successfully complete the project.

economic

HR managers are using social tools to build relationships with __________.

employees

________ transmission systems have signals that pass through walls but they are susceptible to snooping unless encrypted.

radio


Related study sets

Geography - Ch. 9 - Caribbean South America

View Set

Section 5.1: Proofs by contradiction (indirect proofs)

View Set

Week 4 Assignment: Blackboard Tools Activity

View Set

Network+ Chapter 4: Network Protocols and Routing

View Set

Domain 5: Identity and Access Management: Answer & Review Questions

View Set

Osteoblasts deposit bony matrix around themselves, which form spongy bone

View Set

Chapter 20 Anatomy and Physiology

View Set