Systems Test Chapters 9,15,7,11
The project management (PM) process has 4 phases. Place the phases in order with the first phase at the top.Instructions
1. initiation 2. planning 3. execution 4. closure
Spyware is software that collects information about your Internet surfing habits and behaviors. Spyware includes the collection of which three of the following?
Account numbers Keystrokes Passwords
What is conducted in the process design step of business process management?
Activities are examined and divided into their individual components.
Select three examples of why inventory management is often critical to business success.
An electronics retailer must mark down outdated smartphones. A grocery store must reduce prices and ultimately dispose of overripe fruit. The lack of necessary inventory can bring production to a halt or cause lost sales and dissatisfied customers.
What is conducted in the process modeling step of business process management?
Analysts use flowcharts and other tools to depict workflow.
What business management system seeks to streamline an organization's activities to prevent backlogs and inefficiencies?
Business Process Management (BPM)
Of the decisions/activities listed, which would be considered unstructured decisions?
Capital budgeting decisions: Market entry or exit decisions involve many unstructured decisions. Strategic goal development: The development of a marketing plan involves many complex and unstructured decisions.
When facing a moral dilemma, it is useful to be aware of the five principles of ethical ________
Conduct
A portrait that you paint matches
Copyright
Ethical challenges raised by the use of information systems fall into 5 dimensions (categories). Which 3 of the following are included in these 5 dimensions?
Copyright and intellectual property rights Quality of life Information privacy rights
Which business management system is focused on helping managers to maintain the business's focus on the individual customer by developing a lasting relationship that promote long-term buying?
Customer Relationship Management (CRM) System
If an increase in price results in a relatively large decrease in demand for the product, the firm cannot easily increase its profit margin. This demonstrates which of Porter's 5 forces?
Customers
in the settings area of each browser you should consider adjusting which three of the following?
Deciding from which sites you want to allow cookies Deleting cookies Blocking or customizing your cookie settings
Your organization has set strict policies prohibiting the use of company computers for personal activities. Which of the following policy violations would also be an illegal activity?
Distributing company-owned software without authorization.
Acting with high morals means you live a virtuous life, while your ___ provide a rational framework for your morals.
Ethics
Select three characteristics of just-in-time (JIT) manufacturing and inventory management.
JIT requires exceptionally smooth supply chains. Parts, and often even labor, are not purchased until the moment they are needed in the assembly process. JIT faces significant challenges during supply disruptions such as those that occur during natural disasters.
Because of its significant challenges during supply disruptions that occur during natural disasters (such as the COVID-19 pandemic), ___ has lost much of its popularity.
Just-in-time (JIT) manufacturing and inventory management
The principle of ethical conduct that attempts to distribute rewards equitably to individuals based on their level of effort or productivity level is called the principle of distributive __.
Justice
A form of spyware that records all actions typed on a keyboard is called a _____ logger.
Keystroke
A starting point to investigate the complex topic of a society's ethics is first to understand the society's______ and the history behind the enacting of them.
Laws
What is conducted in the process optimization step of business process management?
Managers adapt (modify) the process to enhance process performance.
Advances in technology greatly impact the capabilities of business management systems. The doubling of the number of transistors on each chip that occurs roughly every 18 months reflects the speed of this technology advance. This phenomenon is called ___ .
Moore's Law
Computer chips double in computing power roughly every 18 months. This phenomenon is called:Computer chips double in computing power roughly every 18 months. This phenomenon is called:
Moore's Law
Your right to control what happens with personal information about you is centered around the right to
Privacy
This keeps your computer from storing cookies, but doesn't securely hide your identity beyond the device because your IP address can still be tracked.
Private browsing
Select three major data analytics software platforms.
SAP Analytics Cloud Tableau by Salesforce Oracle Analytics Cloud
Select three popular inventory management systems.
SAP Material Management (SAP MM) QuickBooks Enterprise Oracle NetSuite
By improving communications throughout the organization, as well as gaining better perceptions of consumers' opinions using CRM software, managers are able to monitor which PESTEL factor?
Socio-cultural
Which two of the following potential workplace computer ethics violations are also illegal activities.
Software piracy using an employer's computer network. Computer scams launched from work computers.
Will the decision impact the privacy or property rights of any individuals or corporations?This question should be asked in which step of the 5 steps of an ethical analysis.
Step 2 - Determining the affected.
Select the true statements about structured management decisions.
Structured decisions are regularly made by individual employees and teams and frequently include operational decisions. Structured decisions involve tasks and choices that are routine. Structured decisions are made easier through the creation of defined processes and procedures.
Apple uses Corning's glass products for all its devices, such as the Gorilla Glass 6 used in the iPhone 11 series. To ensure that it continue to have a strong relationship with this glass industry leader, Apple has invested nearly $500 million toward Corning's advanced glass research division. By building up this relationship, Apple seeks to maintain some control over which of Porter's 5 forces?
Suppliers
The laws that were created to update copyright laws dealing with the issues of regulating digital material in accordance with World Intellectual Property Organization treaties is called:
The Digital Millennium Copyright Act (DMCA)
Which principle of ethical conduct attempts to distribute rewards equitably to individuals based on their level of productivity?
The Principle of Distributive Justice
Which principle of ethical conduct states that there exist certain moral values that should always be upheld or never be violated.
The Principle of Moral Rights
Which principle of ethical conduct asks the decision-maker to consider what a highly moral person would do when faced with this question.
The Principle of Virtue
Which principle of ethical conduct states that a manager must attempt to determine if a decision is fair for all involved.
The Universalist Principle
Which principle of ethical conduct states that when faced with an ethical dilemma the manager should choose the option that does the greatest good for the most involved?
The Utilitarian Principle
What is conducted in the process execution step of business process management?
The business process execution language engine is run.
Barriers to entry can protect existing firms from which of Porter's 5 forces?
The force of new competitors.
Due to the lack of normalized laws, it is important to use discretion on the Internet when traveling or living abroad.True false question
True
Select the two major types of patents.
Utility Design
BI has no value if it cannot be interpreted and presented effectively to decision makers. Because of this, one of the most important features of any BI system are its data __ tools.
Visualization
Which three of the following situations involve information privacy rights?
You allow an employee to take 2-hour lunch breaks because her daughter is receiving chemotherapy. Can you tell her colleagues why she is getting the special treatment? One of your new-hires has a large Twitter following under a pseudonym. Should you let your boss know? Your neighbor has a history of abusing children, do you have a right to know this?
Unstructured decisions
are often executed by higher-level management and include strategic decisions such as market entry or exit, capital budgeting, and strategic goal development.
The purpose of spyware is to
capture the user's account data, passwords, key strokes, and more
The last stage of the project management (PM) process, in which managers document the lessons they learned during the project's execution is the ___ phase
closure
A form of protection for original works of literature is called a ___.
copyright
Porter's 5 Forces include existing competitors, new competitors, and which 3 of the following?
customers substitutes suppliers
How quickly consumer demand changes with a change in price is referred to as of demand.
elasticity
During the first stage of the project management (PM) process, the manager outlines the requirements of the project, documents these requirements, and analyzes the costs of the project. This is called the _______- phase.
initiation
Ethics
involves making choices; what to do, what to say, and even what to think.
Today's employees expect to be able to go online and see a record of their compensation and make adjustments such as their tax withholding. Twenty years ago they would have planned to meet with their human resources department representative to make such changes. This is one example of how expectations change as advancements in business ______ systems occur.
management
According to Professor Porter, a business must differentiate itself from its competitors. One method is to encourage customers to believe that an organization provides higher quality goods or better service, then the organization can charge a premium, or gain market share, or (ideally) both. For example, by placing a swoop icon on a sweatshirt, Nike is able to charge a higher price. This methodology is called ___.
monopolistic competition
A variety of Management Information Systems (M I S) and the reports they provide are used to assist in making
structured decisions.
A business must not only look at its direct competitors, but also must contend with those firms that offer a product that a consumer might alternatively choose. For example, McDonald's and Burger King can be considered competitors and if one firm raises prices the other firm might gain its customers. However, if both firms raise their prices, customers may choose to purchase pizza instead. Porter refers to this as the force of __________ in the market.
substitutes
What are Utility Patents
the most common type, is granted for new machines or processes.
Cookies that are created by a website other than the one you are currently visiting and are used to track your surfing habits are known as ______ cookies.
third party
The principle of ethical conduct that states that a manager must attempt to determine if this decision is fair for all involved is the __________ principle.
universalist
Select two reasons why a human resource manager might choose to use recruiting and hiring management software.
Human resources managers often need sophisticated software to assist them in making accurate estimates of recruiting, hiring, and training requirements. Extensive governmental oversight regarding the hiring of employees makes using an updated recruiting and hiring management essential.
Using cookies to follow a customer's search history
Indirect tracking
A new type of flower that you invent.
Patent
Which law or set of laws implements two World Intellectual Property Organization (WIPO) treaties and was created to update copyright laws dealing with the issues of regulating digital material.
The Digital Millennium Copyright Act (DMCA)
Using cookies to follow someone's browsing patterns is a form of data collection called indirect __________
tracking
The dimension (category) of ethical dilemmas that examines how individuals or corporations can be held responsible in case of violations of privacy or intellectual property rights is referred to _________ and accountability.
Control
When you revisit a website, your browser will send the website's _______ (a small text file) to the Web server that uses this information to customize and optimize your experience.
Cookies
A form of protection provided by the laws of the United States for "original works of authorship", including literary, dramatic, musical, architectural, cartographic, choreographic, pantomimic, pictorial, graphic, sculptural, and audiovisual creations is called a
Copyright
Which of the following statements accurately describes spyware?
Downloading software or documents from unvetted sources is one way spyware can be installed. Spyware captures private information by monitoring how users interact online.
In 1979, Professor Michael E. Porter published "How Competitive Forces Shape Strategy" in the Harvard Business Review. In this paper, he described factors that impact businesses. The became known as Porter's _________ forces.
Five
SAP (originally Systems, Applications, & Products) is a recognized leader in the development of HRM software. SAP is headquartered in:
Germany
When did human resources management (HRM) originate?
HR management has existed at least as long as recorded history.
Your boss states that in your organization data must be used responsibly and privacy should always be respected. This aligns with which dimension of ethical concerns in the digital age?
Information Privacy Rights
Professors Lieberman and Montgomery of UCLA examined the advantages and disadvantages of being the first firm to enter a product into the market. They coined this the first-__ advantage.
Mover
Refers to specialized hardware or software that captures packets transmitted over a network.
Packet Analyzers, also called Packet Sniffers
A wide-ranging term that refers to various considerations, including how data and information are used, who has access to data and information, and the techniques and technologies used to protect sensitive and private data, communications, and preferences, is Internet ___.
Privacy
Common types of spyware include keystroke loggers and packet analyzers aka
Sniffers
Which law, passed in 1986, protects email and VoIP communications by making it illegal to intercept calls or messages without a warrant.
The Electronic Communications Privacy Act
Select three correct statements regarding international Internet privacy laws.
The European Union (EU) European Commission Data Protection Directive states that under EU law, personal data can only be gathered legally under strict conditions. International laws on Internet privacy vary greatly. It is very difficult to get nations across the globe to agree on standardized Internet privacy laws.
How quickly consumer demand changes with a change in price is referred to as ______ of demand.
elasticity
The U.N. General Assembly adopted resolution 68/167 in December 2013 that affirms that the rights held by people offline must also be protected online, and it called upon all Member States (nations) to respect and protect the right to privacy in digital communication. This means that ___
even though it sounds good, Internet users should be aware that digital privacy is not honored by many on the Internet.
During the third stage of the project management (PM) process, the manager constantly monitors the progress of the project and the project's resources. This is called the _________ phase.
execution
That employees will learn from experience how to use technologies to develop a product, gaining a "head start" over any competition that attempts to enter the market is considered a ___.
first-mover advantage
Structured decisions
involve tasks and choices that are routine and encompass prescribed and definite procedures for how they should be handled.
With regard to Internet privacy, the First Amendment to the U.S. Constitution is relevant because ___
it provides freedom of speech protection that extends to the Internet which means there is little government filtering of content.
Select two technologies that advanced the efficiency of inventory management systems.
Universal Product Codes (UPC) Radio Frequency Identification (RFID)
This principle simply states that when faced with an ethical dilemma the manager should choose the option that does the greatest good for the most involved.
Universalist Principle
Select two important considerations for managing cookies.
Users should be aware that cookie settings must be adjusted in each browser. Users should determine what cookie settings is appropriate for your browser use and privacy protection.
The federal law that protects person-to-person wire, oral, and electronic communications and also includes a variety of network crime statutes that include identity theft and unlawful access to stored communications is The _______ Act.
Wiretap
When selecting an inventory management solution, two reasons managers should opt for a system that integrates easily with existing business management software are ___ and ___.
employees will be less anxious if they are somewhat familiar with the system already using a system that employees are used to will probably reduce training time
structured data are designed
for input into databases, typically commercially available relational databases
Structured Data
have a defined length, type, and format and include numbers, dates, or strings such as a customer profile.
During the second stage of the project management (PM) process, a Gantt chart is created, or fine-tuned if one was started during the feasibility study. This is called the ______ phase.
planning
Smart managers understand that it is far less expensive to retain an existing customer than it is to acquire a new customer. This is the concept behind the use of which business management systems?
Customer Relationship Management (CRM) Systems
Select three categories of intellectual property.
Patents Trade secrets Copyrights
Of the decisions/activities listed, which would be considered structured
Payroll and overtime decisions Inventory decisions
Cookies are stored on the hard drive and are not lost when the web browser is closed are called ___ cookies.
Persistent
The strategic use of employees to allow organizations to operate efficiently and gain competitive advantage is referred to as
human resource management
If you are downloading a game or software onto a device, there may be an empty box asking you to check the box to agree to Terms of Use and the site's Privacy Policy. This checkbox is called a(n) _________ in.
opt
The fifth and final step in business process management has managers adapting the process to enhance process performance. This is called the process _______ step.
optimization
Cookies that are created by a website other than the one you are currently visiting and are used to track your surfing habits are called third _______ cookies. These cookies are considered an invasion of privacy.
party