ISYS 363 Quiz 5 Flashcards
Which of the following goods are typically produced under a make-to-order approach?
a. mass-produced goods
b. cheap high-volume goods
c. expensive high-volume goods
d. goods from external vendors
e. very expensive low-volume goods
e. very expensive low-volume goods
A(n) ________ information flow consists of information that is received from another organization.
a. stand-alone
b. packaged
c. legacy
d. downstream
e. upstream
e. upstream
Fen-phen was an anti-obesity medication that consisted of two drugs: fenfluramine and phentermine. Fenfluramine was initially marketed by American Home Products. It was shown to cause potentially fatal pulmonary hypertension and heart valve problems. This eventually led to the withdrawal of the product and legal damages of over $13 billion. This is an example of ________.
a. a green business
b. production control
c. a product recall
d. lean manufacturing
e. the bullwhip effect
c. a product recall
________ refers to systems for providing effective and efficient communication with the customer from the entire organization.
a. Analytical customer relationship management (CRM)
b. Business intelligence
c. Operational customer relationship management (CRM)
d. Sales force automation
e. Collaborative customer relationship management (CRM)
e. Collaborative customer relationship management (CRM)
________ is the process of identifying and assessing the volume and sentiment of what is being said about a company, individual, product, or brand.
a. Digital marketing
b. Digital radiography
c. Visual analytics
d. Social media monitoring
e. Social bookmarking
d. Social media monitoring
Which of the following portrays the individualized service benefit of a customer relationship management (CRM) system?
a. enabling improved record keeping and efficient methods of capturing customer complaints that help to identify and solve problems faster
b. learning how each customer defines product and service quality so that customized product, pricing, and services can be designed or developed collaboratively
c. integrating all information for all points of contact with the customers so that all who interact with customers have the same view and understand current issues
d. providing integrated information which removes information handoffs, thereby speeding both sales and support processes
e. providing product information, sales status, support information, issue tracking, and so on
b. learning how each customer defines product and service quality so that customized product, pricing, and services can be designed or developed collaboratively
________ involves the development of various resource plans to support the efficient and effective production of goods and services.
a. Supply chain analytics
b. Requirement execution
c. Supply chain networking
d. Requirement planning
e. Supply chain planning
e. Supply chain planning
________ is a business model in which the suppliers to a manufacturer manage the manufacturer’s inventory levels based on preestablished service levels.
a. Lean manufacturing
b. Vendor-managed inventory
c. Scan-based trading
d. Just-in-case manufacturing
e. Just-in-time manufacturing
b. Vendor-managed inventory
Supply chain planning begins with ________.
a. inventory planning
b. product demand planning and forecasting
c. safety stock planning
d. production scheduling
e. product distribution planning and scheduling
b. product demand planning and forecasting
A company needs a new information system to manage increasing customer orders and changing demands. The company’s five-member information system (IS) team is competent and capable of developing a new system, but decides against developing a system in-house. Which of the following, if true, would most weaken the company’s decision?
a. The company’s requirements for the new system are very specialized.
b. The company’s IS team is short-staffed, and is finding it difficult to cope with increased work.
c. The costs of outsourcing systems development are greater than those of adapting an off-the-shelf system.
d. The company’s preferred vendor is willing to provide a basic information system at a reduced rate.
e. The company’s IS department has the qualifications to develop the new system.
a. The company’s requirements for the new system are very specialized.
Which of the following is the correct order of phases in the systems development life cycle (SDLC)?
a. analysis, planning, design, implementation
b. design, analysis, planning, implementation
c. design, planning, analysis, implementation
d. planning, analysis, design, implementation
e. analysis, design, planning, implementation
d. planning, analysis, design, implementation
Business case arguments based on fear are dependent on ________.
a. the results of a qualitative analysis of employee responses to the new information system
b. the belief that implementing the new information system can have significant positive consequences for the firm
c. beliefs about organizational strategy, competitive advantage, industry forces, customer perceptions, market share, and so on
d. the notion that if the system is not implemented, the firm will lose out to the competition or go out of business
e. data, quantitative analysis, and/or indisputable factors
d. the notion that if the system is not implemented, the firm will lose out to the competition or go out of business
The first phase of the systems development life cycle (SDLC) is systems ________.
a. implementation
b. operation
c. planning and selection
d. design
e. analysis
c. planning and selection
Which of the following steps takes place in an organization during both in-house systems development and external acquisition?
a. development of a request for proposal (RFP)
b. proposal evaluation
c. systems analysis
d. vendor selection
e. systems selection
c. systems analysis
A ________ is a business document containing only predefined data for online viewing or printing.
a. form
b. script
c. module
d. sheet
e. report
e. report
The term systems development life cycle (SDLC) describes the life of an information system from conception to ________.
a. retirement
b. implementation
c. development
d. verification
e. estimation
a. retirement
Violating data belonging to banks or other financial institutions is a crime in the United States. Which of the following legislations prohibits such violations?
a. the Computer Fraud and Abuse Act
b. the Electronic Communications Privacy Act
c. the Glass-Steagall Act
d. the Foreign Intelligence Surveillance Act
e. the Patriot Act
a. the Computer Fraud and Abuse Act
________ describes covert activities, such as theft of trade secrets, bribery, blackmail, and technological surveillance, to gain an advantage over rivals.
a. Packet sniffing
b. Industrial espionage
c. Unauthorized data modification
d. Cyberterrorism
e. Spyware
b. Industrial espionage
________ is a more sophisticated fraudulent e-mail attack that targets a specific person or organization by personalizing the message in order to make the message appear as if it is from a trusted source.
a. Hacking
b. Viral marketing
c. Cyber tunneling
d. Logic bombing
e. Spear phishing
e. Spear phishing
Information systems ________ is done to obtain an understanding of the threats to the confidentiality, integrity, and availability of data and systems.
a. requirements analysis
b. quality testing
c. security modeling
d. risk assessment
e. data processing
d. risk assessment
Some data centers rent server space to multiple customers and provide necessary infrastructure in terms of power, backups, connectivity, and security. Such data centers are called ________.
a. virtual private networks
b. offshore networks
c. control centers
d. collocation facilities
e. hot backup sites
d. collocation facilities
________ is the stealing of another person’s Social Security number, credit card number, and other personal information for the purpose of using the victim’s credit rating to borrow money, buy merchandise, and otherwise run up debts that are never repaid.
a. Identity theft
b. Battery
c. Bot herding
d. Logic bombing
e. Spear phishing
a. Identity theft
The acts of cybercriminals to gain information on a victim by monitoring online activities, accessing databases, and making false accusations are forms of ________.
a. bot herding
b. spam filtering
c. viral marketing
d. cyberstalking
e. spear phishing
d. cyberstalking
WikiLeaks is a famous not-for-profit whistleblower Web site. MasterCard and Visa stopped payments to WikiLeaks after a series of leaks by the site. An anonymous group attacked the Web sites of both MasterCard and Visa reacting to this. These Web vandals, who tried to protect WikiLeaks, are called ________.
a. hacktivists
b. bots
c. ethical hackers
d. patriot hackers
e. cyber soldiers
a. hacktivists
Which of the following is a core business process?
a. plan-to-produce
b. time-to-purchase
c. account-to-report
d. make-to-stock
e. hire-to-retire
d. make-to-stock
If the ________ version does not support a certain business process, the company may require a customized version.
a. vanilla
b. best-practices
c. customized
d. modified
e. reengineered
a. vanilla
Enterprise resource planning (ERP) extended components focus primarily on ________.
a. human capital management and supply chain management
b. customer relationship management and supply chain management
c. customer relationship management and human capital management
d. product lifecycle management and supply chain management
e. customer relationship management and product lifecycle management
b. customer relationship management and supply chain management
________ is a support activity.
a. Customer service
b. Technology development
c. Operations and manufacturing
d. Outbound logistics
e. Marketing and sales
b. Technology development
According to business process management, identify the management’s next step after developing a vision for the organization.
a. They should identify the critical processes that are to be redesigned.
b. They should design and implement a prototype of the new processes.
c. They should manage the information technology to be used from a business transaction perspective.
d. They should identify the ways in which information systems can be used to improve the various business processes.
e. They should understand and measure the existing processes as a baseline for future improvements.
a. They should identify the critical processes that are to be redesigned.
Human resource activities ________.
a. integrate the internal applications with suppliers, business partners, and customers
b. are classified as a support activity since the primary activities cannot be accomplished without the employees to perform them
c. streamline the organization’s internal value chain
d. include the purchasing of goods and services that are required as inputs to the primary activities
e. include the design and development of applications that support the primary business activities
b. are classified as a support activity since the primary activities cannot be accomplished without the employees to perform them