Business Applications Flashcards

1
Q

Define “e-business.”

A

Any business process that relies on electronic dissemination of information or on automated transaction processing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Identify five risks of e-commerce .

A
  1. Risk of system unavailability,
  2. Security and confidentiality risks,
  3. Authentication risks,
  4. Nonrepudiation risks,
  5. System integrity risks.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Identify three risks of not implementing e-commerce systems.

A
  1. Customers move online,
  2. Limited growth,
  3. Limited markets.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

E-commerce depends on trust in two parties. Please identify them.

A
  1. Trading partner,

2. The trading site or service provider.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define “e-commerce.”

A

Transactions between the organization and its trading partners.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is business-to-consumer (B2C) e-commerce?

A

This involves selling goods and services directly to consumers, almost always using the Internet and web-based technology. B2C e-commerce relies heavily on intermediaries or brokers to facilitate the sales transaction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define business-to-business (B2B) e-commerce.

A

The electronic processing of transactions between businesses. Includes electronic data interchange (EDI), supply chain management (SCM) and electronic funds transfer (EFT).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are customer relationship management (CRM) systems?

A

Technologies that facilitate managing e-relationships with clients. Both biographic and transaction information about existing and potential customers is collected and stored in a database. The CRM provides tools to analyze the information and develop personalized marketing plans for individual customers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Define “electronic data interchange (EDI).”

A

The system-to-system exchange of business data (e.g., purchase orders, confirmations, invoices, etc.) in structured formats that allow direct processing of the data by the receiving system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Define “electronic funds transfer (EFT).”

A

A technology for transferring money from one bank account directly to another without the use of paper money or checks. Reduces the time and expense required to process checks and credit transactions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define “token-based payment systems.”

A

Electronic cash, smart cards (cash cards), and online payment systems (e.g., PayPal); similar to electronic fund transfer (EFT), but governed by different laws.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Define “electronic wallets.”

A

Software programs that allow the user to manage credit cards, user names, passwords, and address information in an easy-to-use, centralized location (e.g., RoboForm).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Define “supply chain management (SCM).”

A

The process of planning, implementing, and controlling the operations of the supply chain: the process of transforming raw materials into a finished product and delivering that product to the consumer. Supply chain management incorporates all activities from the purchase and storage of raw materials, through the production process, into finished goods through to the point-of-consumption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are operational systems?

A

These systems support the day-to-day activities of the business (purchasing of goods and services, manufacturing activities, sales to customers, cash collections, payroll, etc.) Also known as transaction processing systems (TPS).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Define management information systems.

A

Systems designed to support routine management problems based primarily on data from transaction processing systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are decision support systems (DSS)?

A

These systems provide information to mid- and upper-level management to assist them in managing nonroutine problems and in long-range planning. Unlike MISs, DSSs frequently include external data in addition to summarized information from the TPS and include significant analytical and statistical capabilities.

17
Q

What are data-driven decision support systems (data-driven DSS)?

A

These systems process large amounts of data to find relationships and patterns that are useful in decision making.

18
Q

What is the purpose of executive support systems (ESS) and strategic support systems (SSS)?

A

A subset of decision support systems (DSS) especially designed for forecasting and making long-range, strategic decisions. As such, they have a greater emphasis on external data. Sometimes called “DSS for dummies.”

19
Q

What is a data warehouse?

A

A database for organizational decision making. Data from the live databases are copied to the warehouse so that data can queried without reducing the performance (i.e., speed) or stability (i.e., reliability) of the live systems.

20
Q

What is data mining?

A

Searching data in a warehouse to discover patterns and relationships in historical data.

21
Q

What is a knowledge work system?

A

Knowledge work systems facilitate the work activities of professional-level employees (engineers, accountants, attorneys, etc.) by providing information relevant to their day-to-day activities (e.g., how the company has handled specific types of audit exceptions) and/or by automating some of their routine functions (e.g., computer-aided systems engineering [CASE] packages used by programmers to automated some programming functions).

22
Q

Describe a flat file system.

A

Early information technology systems used flat file technology. Flat files are characterized by independent programs and data sets, high degrees of data redundancy, and difficulty in achieving cross functional reporting. BAD

23
Q

Describe the concept of knowledge management (KM).

A

Attempts to ensure that the right information is available at the right time to the right user. A variety of practices attempt to electronically capture and disseminate information throughout the organization. Knowledge management practices seek specific outcomes, including shared intelligence, improved performance, competitive advantage, and more innovation.

24
Q

Define “knowledge base (or knowledgebase)”.

A

A component of a knowledge management system. A special type of database designed for retrieval of knowledge. It provides the means to collect and organize the information and develop relationships among information components.

25
Q

Define “expert system (knowledge-based system)”

A

A computer program that contains subject-specific knowledge derived from experts. The system consists of a set of rules that are used to analyze information provided by the user of the system. Based on the information provided, the system recommends a course of action.

26
Q

Define “data mart”.

A

A specialized version of a data warehouse that contains data that is pre-configured to meet the needs of specific departments. Companies often support multiple data marts within their organization.

27
Q

Define “drill down”.

A

Concept associated with data warehouses. The ability to move from summary information to more granular information (i.e. viewing an accounts receivable customer balance and drilling down to the invoices and payments which resulted in that balance).

28
Q

Define “slicing and dicing” as it relates to data warehouses.

A

The ability to view a single data item in multiple dimensions; for example, the sale of VCRs might be viewed by product, by region, by time period, by company, etc.

29
Q

Define mobile computing.

A

Transportable computing devices. That is, computing devices that can be carried from place to place.

30
Q

Define malicious app.

A

An app that collects and transmits user data to a third party.

31
Q

Define view-only access.

A

Permitting a user to view, but not change, a file.

32
Q

Identify items that should be included in user training in mobile applications.

A

Organizational policies, password maintenance and protection, when and how to use mobile devices, procedures for lost or stolen devices.

33
Q

Identify three characteristics of the small business computing environment.

A
  1. Exclusive use of microcomputers and laptops (e.g., there may be no servers), 2. Outsourced IT, 3.poor segregation of duties.
34
Q

Identify five risks of user-developed systems.

A
  1. Not integrated with existing systems, 2. Inadequate testing and documentation, 3. Poor data input controls, 4. Poor system design, 5. Management may rely on these systems without knowing their risks.