Final Exam Flashcards

1
Q

Organizational Strategy

A

is a planned approach that the organization takes to achieve its goals and its mission statement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Competitive Advantage

A

an advantage over competitors in some measure such as cost, quality, or speed; leads to control of a market and to larger-than-average profits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Business Process

A

a collection of related activities (inputs, resources and outputs) that produce a product or service of value to the organization, its business partners and/or its customers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Cross-Functional Process

A

A cross functional business process is one in which no single functional area is responsible for its execution. Multiple functional areas collaborate to perform the process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Business Process Reengineering (BPR)

A

a radical strategy for improving the efficiency and effectiveness of an organization’s business approach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Business Process Improvement (BPI)

A

a more incremental approach, with lower risk and cost than BPR.

Six sigma is a popular methodology for bpi

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Business Process Management (BPM)

A

a management technique that includes methods and tools to support the design, analysis, implementation, management, and optimization of business processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Competitive Advantage

A

helps a company function profitability within a market and generate larger-than-average profits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Strategic Information System

A

provide a competitive advantage by helping an organization implement its strategic goals and improve its performance and productivity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Porter’s Competitive Forces Model

A

Threat of entry of new competition

the bargaining power of suppliers

the bargaining power of customers

the threat of substitute products or services

the rivalry among firms in an industry

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Business Information Technology Alignment

A

the tight integration of the IT function with the organization’s strategy, mission, and goals of the organization. That is, the IT function directly supports the business objectives of the organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Utilitarian

A

provides the most good or does the least harm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Rights

A

best protects and respects the moral rights of the affected parties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Fairness

A

treat all humans equally, or if unequally, then fairly, based on some defensible standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Common Good

A

respect and compassion for all others is the basis for ethical actions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Code of Ethics

A

a collection of principles that are intended to guide decision making by members of an organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Three Ethical Areas in IT

A

Privacy: about collecting, storing, and disseminating information about individuals

Accuracy: involves the authenticity, fidelity and accuracy of information that is collected and processed

Property: involves the ownership and value of information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Privacy Codes

A

organization’s guidelines for protecting the privacy of its customers, clients and employees

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

PIPEDA

A

accountability, identifying purposes, consent, limiting collection, limiting use, accuracy, safeguards, openness, individual access, challenging compliance

The Personal Information Protection and Electronic Documents Act is a Canadian law relating to data privacy. It governs how private sector organizations collect, use and disclose personal information in the course of commercial business

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Database Management Systems (DBMS)

A

creates and manages a database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Entity

A

is a person, place, thing, or event about which an organization maintains information. A record describes an entity

22
Q

Instance

A

is one specific, unique representation of the entity

23
Q

Attribute

A

is a characteristic or quality of a particular entity

24
Q

Primary Key

A

is a field that uniquely identifies a record

every record MUST have a primary key

25
Secondary Keys
are other identifying fields that typically do not identify that file with complete accuracy
26
Foreign Key
fields are used to uniquely identify a row of another table that is linked to the current table
27
Characteristics of Big Data
volume velocity variety
28
Information Security
refers to all of the processes and policies designed to protect an organization's information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction
29
Social Engineering
an attack in which the perpetrator uses social skills to trick or manipulate a legitimate employee into providing confidential company information such as passwords
30
Risk Mitigation and Strategies
Risk acceptance: accept the potential risk, continue operating with no controls, and absorb any damages that occur Risk limitation: limit the risk by implementing controls that minimize the impact of the threat Risk transference: transfer the risk by using other means to compensate for the loss, such as by purchasing insurance
31
E-Commerce
the process of buying, selling, transferring or exchanging products, services or information via computer networks, including the internet
32
Types of E-Commerce
Business-to-consumer (B2C): business sells to consumers Business-to-business (B2B): business sells to business Consumer-to-consumer (C2C): consumer sells to consumers Business-to-employee (B2E): business interacts with employees (e.g. pays payroll) Government-to-citizen (G2C) or government-to-business (G2B): government interacts with consumers or business (e.g. collects taxes) Mobile commerce (m-commerce): any of the e-commerce types handled using mobile systems
33
Online Direct Marketing
selling online directly to customers
34
Electronic Tendering System
B2B reverse auction that involves requesting quotes from suppliers
35
Name-your-own-price
using an intermediary customer decide how much they are willing to pay
36
Affiliate Marketing
logos or banners are placed on partner sites; if purchases are made then the advertiser pays a commission to the affiliate
37
Forward and Reverse Auction
forward auctions increase sales prices over time reverse auctions lower buying prices over time
38
Enterprise Planning Systems (EPS)
systems adopt a business process view of the overall organization to integrate the planning, management, and use of all an organization's resources, employing a common software platform and database
39
Supply Chains
the flow of materials, information, money, and services from raw material suppliers, through factories and warehouses, to the end customers; it includes the organizations and processes that create and deliver products, information, and services to end customers
40
Push Model
also known as made-to-stock, the production process begins with a forecast, which is simply an educated guess as to customer demand. The forecast must predict which products customers will want as well as the quantity of each product. The company then produces the amount of products in the forecast, typically by using mass production, and sells, or “pushes,” those products to consumers
41
Pull Model
also known as make-to-order, the production process begins with a customer order. Therefore, companies make only what customers want, a process closely aligned with mass customization
42
Bullwhip Effect
erratic shifts in orders up and down the supply chain
43
Electronic data interchange (EDI
communication standard that enables business partners to exchange routine documents, such as purchasing orders, electronically.
44
Extranets
are networks that link business partners over the internet
45
Data Mining
Data mining can perform two basic operations: Predicting trends and behaviours e.g. for targeted marketing and predicting bankruptcy Identifying previously unknown patterns e.g. for detecting fraudulent credit card transactions
46
IS Operational Plan
that consists of a clear set of projects that the IS department and the functional area managers will execute in support of the IT strategic plan a typical IS operational plan consists of: mission IT environment objectives of the IT function constraints of the IT function application portfolio resource allocation and project management
47
Ultra-Wideband
Ultra-wideband is a high-bandwidth wireless technology with transmission speeds in excess of 100 Mbps. Example: streaming multimedia from, say, a personal computer to a television
48
Near-Filed Communications (NFC)
Near-filed communications (NFC) has the smallest range of any short-range wireless network. It is designed to be embedded in mobile devices such as cell phones and credit cards Ex: swiping your device or card within a few centimetres of a point-of-sale terminal to pay for items (i.e. “tap”)
49
Mobile Computing
refers to real-time, wireless connection between a mobile device and other computing environments, such as the internet and an intranet
50
Public Cloud
promotes massive, global and industry-wide applications offered to the general public