Systems Test Chapters 9,15,7,11

Ace your homework & exams now with Quizwiz!

The project management (PM) process has 4 phases. Place the phases in order with the first phase at the top.Instructions

1. initiation 2. planning 3. execution 4. closure

Spyware is software that collects information about your Internet surfing habits and behaviors. Spyware includes the collection of which three of the following?

Account numbers Keystrokes Passwords

What is conducted in the process design step of business process management?

Activities are examined and divided into their individual components.

Select three examples of why inventory management is often critical to business success.

An electronics retailer must mark down outdated smartphones. A grocery store must reduce prices and ultimately dispose of overripe fruit. The lack of necessary inventory can bring production to a halt or cause lost sales and dissatisfied customers.

What is conducted in the process modeling step of business process management?

Analysts use flowcharts and other tools to depict workflow.

What business management system seeks to streamline an organization's activities to prevent backlogs and inefficiencies?

Business Process Management (BPM)

Of the decisions/activities listed, which would be considered unstructured decisions?

Capital budgeting decisions: Market entry or exit decisions involve many unstructured decisions. Strategic goal development: The development of a marketing plan involves many complex and unstructured decisions.

When facing a moral dilemma, it is useful to be aware of the five principles of ethical ________

Conduct

A portrait that you paint matches

Copyright

Ethical challenges raised by the use of information systems fall into 5 dimensions (categories). Which 3 of the following are included in these 5 dimensions?

Copyright and intellectual property rights Quality of life Information privacy rights

Which business management system is focused on helping managers to maintain the business's focus on the individual customer by developing a lasting relationship that promote long-term buying?

Customer Relationship Management (CRM) System

If an increase in price results in a relatively large decrease in demand for the product, the firm cannot easily increase its profit margin. This demonstrates which of Porter's 5 forces?

Customers

in the settings area of each browser you should consider adjusting which three of the following?

Deciding from which sites you want to allow cookies Deleting cookies Blocking or customizing your cookie settings

Your organization has set strict policies prohibiting the use of company computers for personal activities. Which of the following policy violations would also be an illegal activity?

Distributing company-owned software without authorization.

Acting with high morals means you live a virtuous life, while your ___ provide a rational framework for your morals.

Ethics

Select three characteristics of just-in-time (JIT) manufacturing and inventory management.

JIT requires exceptionally smooth supply chains. Parts, and often even labor, are not purchased until the moment they are needed in the assembly process. JIT faces significant challenges during supply disruptions such as those that occur during natural disasters.

Because of its significant challenges during supply disruptions that occur during natural disasters (such as the COVID-19 pandemic), ___ has lost much of its popularity.

Just-in-time (JIT) manufacturing and inventory management

The principle of ethical conduct that attempts to distribute rewards equitably to individuals based on their level of effort or productivity level is called the principle of distributive __.

Justice

A form of spyware that records all actions typed on a keyboard is called a _____ logger.

Keystroke

A starting point to investigate the complex topic of a society's ethics is first to understand the society's______ and the history behind the enacting of them.

Laws

What is conducted in the process optimization step of business process management?

Managers adapt (modify) the process to enhance process performance.

Advances in technology greatly impact the capabilities of business management systems. The doubling of the number of transistors on each chip that occurs roughly every 18 months reflects the speed of this technology advance. This phenomenon is called ___ .

Moore's Law

Computer chips double in computing power roughly every 18 months. This phenomenon is called:Computer chips double in computing power roughly every 18 months. This phenomenon is called:

Moore's Law

Your right to control what happens with personal information about you is centered around the right to

Privacy

This keeps your computer from storing cookies, but doesn't securely hide your identity beyond the device because your IP address can still be tracked.

Private browsing

Select three major data analytics software platforms.

SAP Analytics Cloud Tableau by Salesforce Oracle Analytics Cloud

Select three popular inventory management systems.

SAP Material Management (SAP MM) QuickBooks Enterprise Oracle NetSuite

By improving communications throughout the organization, as well as gaining better perceptions of consumers' opinions using CRM software, managers are able to monitor which PESTEL factor?

Socio-cultural

Which two of the following potential workplace computer ethics violations are also illegal activities.

Software piracy using an employer's computer network. Computer scams launched from work computers.

Will the decision impact the privacy or property rights of any individuals or corporations?This question should be asked in which step of the 5 steps of an ethical analysis.

Step 2 - Determining the affected.

Select the true statements about structured management decisions.

Structured decisions are regularly made by individual employees and teams and frequently include operational decisions. Structured decisions involve tasks and choices that are routine. Structured decisions are made easier through the creation of defined processes and procedures.

Apple uses Corning's glass products for all its devices, such as the Gorilla Glass 6 used in the iPhone 11 series. To ensure that it continue to have a strong relationship with this glass industry leader, Apple has invested nearly $500 million toward Corning's advanced glass research division. By building up this relationship, Apple seeks to maintain some control over which of Porter's 5 forces?

Suppliers

The laws that were created to update copyright laws dealing with the issues of regulating digital material in accordance with World Intellectual Property Organization treaties is called:

The Digital Millennium Copyright Act (DMCA)

Which principle of ethical conduct attempts to distribute rewards equitably to individuals based on their level of productivity?

The Principle of Distributive Justice

Which principle of ethical conduct states that there exist certain moral values that should always be upheld or never be violated.

The Principle of Moral Rights

Which principle of ethical conduct asks the decision-maker to consider what a highly moral person would do when faced with this question.

The Principle of Virtue

Which principle of ethical conduct states that a manager must attempt to determine if a decision is fair for all involved.

The Universalist Principle

Which principle of ethical conduct states that when faced with an ethical dilemma the manager should choose the option that does the greatest good for the most involved?

The Utilitarian Principle

What is conducted in the process execution step of business process management?

The business process execution language engine is run.

Barriers to entry can protect existing firms from which of Porter's 5 forces?

The force of new competitors.

Due to the lack of normalized laws, it is important to use discretion on the Internet when traveling or living abroad.True false question

True

Select the two major types of patents.

Utility Design

BI has no value if it cannot be interpreted and presented effectively to decision makers. Because of this, one of the most important features of any BI system are its data __ tools.

Visualization

Which three of the following situations involve information privacy rights?

You allow an employee to take 2-hour lunch breaks because her daughter is receiving chemotherapy. Can you tell her colleagues why she is getting the special treatment? One of your new-hires has a large Twitter following under a pseudonym. Should you let your boss know? Your neighbor has a history of abusing children, do you have a right to know this?

Unstructured decisions

are often executed by higher-level management and include strategic decisions such as market entry or exit, capital budgeting, and strategic goal development.

The purpose of spyware is to

capture the user's account data, passwords, key strokes, and more

The last stage of the project management (PM) process, in which managers document the lessons they learned during the project's execution is the ___ phase

closure

A form of protection for original works of literature is called a ___.

copyright

Porter's 5 Forces include existing competitors, new competitors, and which 3 of the following?

customers substitutes suppliers

How quickly consumer demand changes with a change in price is referred to as of demand.

elasticity

During the first stage of the project management (PM) process, the manager outlines the requirements of the project, documents these requirements, and analyzes the costs of the project. This is called the _______- phase.

initiation

Ethics

involves making choices; what to do, what to say, and even what to think.

Today's employees expect to be able to go online and see a record of their compensation and make adjustments such as their tax withholding. Twenty years ago they would have planned to meet with their human resources department representative to make such changes. This is one example of how expectations change as advancements in business ______ systems occur.

management

According to Professor Porter, a business must differentiate itself from its competitors. One method is to encourage customers to believe that an organization provides higher quality goods or better service, then the organization can charge a premium, or gain market share, or (ideally) both. For example, by placing a swoop icon on a sweatshirt, Nike is able to charge a higher price. This methodology is called ___.

monopolistic competition

A variety of Management Information Systems (M I S) and the reports they provide are used to assist in making

structured decisions.

A business must not only look at its direct competitors, but also must contend with those firms that offer a product that a consumer might alternatively choose. For example, McDonald's and Burger King can be considered competitors and if one firm raises prices the other firm might gain its customers. However, if both firms raise their prices, customers may choose to purchase pizza instead. Porter refers to this as the force of __________ in the market.

substitutes

What are Utility Patents

the most common type, is granted for new machines or processes.

Cookies that are created by a website other than the one you are currently visiting and are used to track your surfing habits are known as ______ cookies.

third party

The principle of ethical conduct that states that a manager must attempt to determine if this decision is fair for all involved is the __________ principle.

universalist

Select two reasons why a human resource manager might choose to use recruiting and hiring management software.

Human resources managers often need sophisticated software to assist them in making accurate estimates of recruiting, hiring, and training requirements. Extensive governmental oversight regarding the hiring of employees makes using an updated recruiting and hiring management essential.

Using cookies to follow a customer's search history

Indirect tracking

A new type of flower that you invent.

Patent

Which law or set of laws implements two World Intellectual Property Organization (WIPO) treaties and was created to update copyright laws dealing with the issues of regulating digital material.

The Digital Millennium Copyright Act (DMCA)

Using cookies to follow someone's browsing patterns is a form of data collection called indirect __________

tracking

The dimension (category) of ethical dilemmas that examines how individuals or corporations can be held responsible in case of violations of privacy or intellectual property rights is referred to _________ and accountability.

Control

When you revisit a website, your browser will send the website's _______ (a small text file) to the Web server that uses this information to customize and optimize your experience.

Cookies

A form of protection provided by the laws of the United States for "original works of authorship", including literary, dramatic, musical, architectural, cartographic, choreographic, pantomimic, pictorial, graphic, sculptural, and audiovisual creations is called a

Copyright

Which of the following statements accurately describes spyware?

Downloading software or documents from unvetted sources is one way spyware can be installed. Spyware captures private information by monitoring how users interact online.

In 1979, Professor Michael E. Porter published "How Competitive Forces Shape Strategy" in the Harvard Business Review. In this paper, he described factors that impact businesses. The became known as Porter's _________ forces.

Five

SAP (originally Systems, Applications, & Products) is a recognized leader in the development of HRM software. SAP is headquartered in:

Germany

When did human resources management (HRM) originate?

HR management has existed at least as long as recorded history.

Your boss states that in your organization data must be used responsibly and privacy should always be respected. This aligns with which dimension of ethical concerns in the digital age?

Information Privacy Rights

Professors Lieberman and Montgomery of UCLA examined the advantages and disadvantages of being the first firm to enter a product into the market. They coined this the first-__ advantage.

Mover

Refers to specialized hardware or software that captures packets transmitted over a network.

Packet Analyzers, also called Packet Sniffers

A wide-ranging term that refers to various considerations, including how data and information are used, who has access to data and information, and the techniques and technologies used to protect sensitive and private data, communications, and preferences, is Internet ___.

Privacy

Common types of spyware include keystroke loggers and packet analyzers aka

Sniffers

Which law, passed in 1986, protects email and VoIP communications by making it illegal to intercept calls or messages without a warrant.

The Electronic Communications Privacy Act

Select three correct statements regarding international Internet privacy laws.

The European Union (EU) European Commission Data Protection Directive states that under EU law, personal data can only be gathered legally under strict conditions. International laws on Internet privacy vary greatly. It is very difficult to get nations across the globe to agree on standardized Internet privacy laws.

How quickly consumer demand changes with a change in price is referred to as ______ of demand.

elasticity

The U.N. General Assembly adopted resolution 68/167 in December 2013 that affirms that the rights held by people offline must also be protected online, and it called upon all Member States (nations) to respect and protect the right to privacy in digital communication. This means that ___

even though it sounds good, Internet users should be aware that digital privacy is not honored by many on the Internet.

During the third stage of the project management (PM) process, the manager constantly monitors the progress of the project and the project's resources. This is called the _________ phase.

execution

That employees will learn from experience how to use technologies to develop a product, gaining a "head start" over any competition that attempts to enter the market is considered a ___.

first-mover advantage

Structured decisions

involve tasks and choices that are routine and encompass prescribed and definite procedures for how they should be handled.

With regard to Internet privacy, the First Amendment to the U.S. Constitution is relevant because ___

it provides freedom of speech protection that extends to the Internet which means there is little government filtering of content.

Select two technologies that advanced the efficiency of inventory management systems.

Universal Product Codes (UPC) Radio Frequency Identification (RFID)

This principle simply states that when faced with an ethical dilemma the manager should choose the option that does the greatest good for the most involved.

Universalist Principle

Select two important considerations for managing cookies.

Users should be aware that cookie settings must be adjusted in each browser. Users should determine what cookie settings is appropriate for your browser use and privacy protection.

The federal law that protects person-to-person wire, oral, and electronic communications and also includes a variety of network crime statutes that include identity theft and unlawful access to stored communications is The _______ Act.

Wiretap

When selecting an inventory management solution, two reasons managers should opt for a system that integrates easily with existing business management software are ___ and ___.

employees will be less anxious if they are somewhat familiar with the system already using a system that employees are used to will probably reduce training time

structured data are designed

for input into databases, typically commercially available relational databases

Structured Data

have a defined length, type, and format and include numbers, dates, or strings such as a customer profile.

During the second stage of the project management (PM) process, a Gantt chart is created, or fine-tuned if one was started during the feasibility study. This is called the ______ phase.

planning

Smart managers understand that it is far less expensive to retain an existing customer than it is to acquire a new customer. This is the concept behind the use of which business management systems?

Customer Relationship Management (CRM) Systems

Select three categories of intellectual property.

Patents Trade secrets Copyrights

Of the decisions/activities listed, which would be considered structured

Payroll and overtime decisions Inventory decisions

Cookies are stored on the hard drive and are not lost when the web browser is closed are called ___ cookies.

Persistent

The strategic use of employees to allow organizations to operate efficiently and gain competitive advantage is referred to as

human resource management

If you are downloading a game or software onto a device, there may be an empty box asking you to check the box to agree to Terms of Use and the site's Privacy Policy. This checkbox is called a(n) _________ in.

opt

The fifth and final step in business process management has managers adapting the process to enhance process performance. This is called the process _______ step.

optimization

Cookies that are created by a website other than the one you are currently visiting and are used to track your surfing habits are called third _______ cookies. These cookies are considered an invasion of privacy.

party


Related study sets

Chapter 6: Mitigating Security Threats

View Set

Leadership/ Management/ Delegation/ Prioritizing

View Set

US History I: Chapter 18 Homework

View Set

Psychology Exam 4 Practice Questions

View Set

CompTIA Security+ SYO 601 Chapter 15 Digital Forensics

View Set