ISYS 363 Quiz 5 Flashcards

1
Q

Which of the following goods are typically produced under a make-to-order approach?

a. mass-produced goods
b. cheap high-volume goods
c. expensive high-volume goods
d. goods from external vendors
e. very expensive low-volume goods

A

e. very expensive low-volume goods

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A(n) ________ information flow consists of information that is received from another organization.

a. stand-alone
b. packaged
c. legacy
d. downstream
e. upstream

A

e. upstream

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Fen-phen was an anti-obesity medication that consisted of two drugs: fenfluramine and phentermine. Fenfluramine was initially marketed by American Home Products. It was shown to cause potentially fatal pulmonary hypertension and heart valve problems. This eventually led to the withdrawal of the product and legal damages of over $13 billion. This is an example of ________.

a. a green business
b. production control
c. a product recall
d. lean manufacturing
e. the bullwhip effect

A

c. a product recall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

________ refers to systems for providing effective and efficient communication with the customer from the entire organization.

a. Analytical customer relationship management (CRM)
b. Business intelligence
c. Operational customer relationship management (CRM)
d. Sales force automation
e. Collaborative customer relationship management (CRM)

A

e. Collaborative customer relationship management (CRM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

________ is the process of identifying and assessing the volume and sentiment of what is being said about a company, individual, product, or brand.

a. Digital marketing
b. Digital radiography
c. Visual analytics
d. Social media monitoring
e. Social bookmarking

A

d. Social media monitoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following portrays the individualized service benefit of a customer relationship management (CRM) system?

a. enabling improved record keeping and efficient methods of capturing customer complaints that help to identify and solve problems faster
b. learning how each customer defines product and service quality so that customized product, pricing, and services can be designed or developed collaboratively
c. integrating all information for all points of contact with the customers so that all who interact with customers have the same view and understand current issues
d. providing integrated information which removes information handoffs, thereby speeding both sales and support processes
e. providing product information, sales status, support information, issue tracking, and so on

A

b. learning how each customer defines product and service quality so that customized product, pricing, and services can be designed or developed collaboratively

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

________ involves the development of various resource plans to support the efficient and effective production of goods and services.

a. Supply chain analytics
b. Requirement execution
c. Supply chain networking
d. Requirement planning
e. Supply chain planning

A

e. Supply chain planning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

________ is a business model in which the suppliers to a manufacturer manage the manufacturer’s inventory levels based on preestablished service levels.

a. Lean manufacturing
b. Vendor-managed inventory
c. Scan-based trading
d. Just-in-case manufacturing
e. Just-in-time manufacturing

A

b. Vendor-managed inventory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Supply chain planning begins with ________.

a. inventory planning
b. product demand planning and forecasting
c. safety stock planning
d. production scheduling
e. product distribution planning and scheduling

A

b. product demand planning and forecasting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A company needs a new information system to manage increasing customer orders and changing demands. The company’s five-member information system (IS) team is competent and capable of developing a new system, but decides against developing a system in-house. Which of the following, if true, would most weaken the company’s decision?

a. The company’s requirements for the new system are very specialized.
b. The company’s IS team is short-staffed, and is finding it difficult to cope with increased work.
c. The costs of outsourcing systems development are greater than those of adapting an off-the-shelf system.
d. The company’s preferred vendor is willing to provide a basic information system at a reduced rate.
e. The company’s IS department has the qualifications to develop the new system.

A

a. The company’s requirements for the new system are very specialized.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following is the correct order of phases in the systems development life cycle (SDLC)?

a. analysis, planning, design, implementation
b. design, analysis, planning, implementation
c. design, planning, analysis, implementation
d. planning, analysis, design, implementation
e. analysis, design, planning, implementation

A

d. planning, analysis, design, implementation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Business case arguments based on fear are dependent on ________.

a. the results of a qualitative analysis of employee responses to the new information system
b. the belief that implementing the new information system can have significant positive consequences for the firm
c. beliefs about organizational strategy, competitive advantage, industry forces, customer perceptions, market share, and so on
d. the notion that if the system is not implemented, the firm will lose out to the competition or go out of business
e. data, quantitative analysis, and/or indisputable factors

A

d. the notion that if the system is not implemented, the firm will lose out to the competition or go out of business

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The first phase of the systems development life cycle (SDLC) is systems ________.

a. implementation
b. operation
c. planning and selection
d. design
e. analysis

A

c. planning and selection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following steps takes place in an organization during both in-house systems development and external acquisition?

a. development of a request for proposal (RFP)
b. proposal evaluation
c. systems analysis
d. vendor selection
e. systems selection

A

c. systems analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A ________ is a business document containing only predefined data for online viewing or printing.

a. form
b. script
c. module
d. sheet
e. report

A

e. report

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The term systems development life cycle (SDLC) describes the life of an information system from conception to ________.

a. retirement
b. implementation
c. development
d. verification
e. estimation

A

a. retirement

17
Q

Violating data belonging to banks or other financial institutions is a crime in the United States. Which of the following legislations prohibits such violations?

a. the Computer Fraud and Abuse Act
b. the Electronic Communications Privacy Act
c. the Glass-Steagall Act
d. the Foreign Intelligence Surveillance Act
e. the Patriot Act

A

a. the Computer Fraud and Abuse Act

18
Q

________ describes covert activities, such as theft of trade secrets, bribery, blackmail, and technological surveillance, to gain an advantage over rivals.

a. Packet sniffing
b. Industrial espionage
c. Unauthorized data modification
d. Cyberterrorism
e. Spyware

A

b. Industrial espionage

19
Q

________ is a more sophisticated fraudulent e-mail attack that targets a specific person or organization by personalizing the message in order to make the message appear as if it is from a trusted source.

a. Hacking
b. Viral marketing
c. Cyber tunneling
d. Logic bombing
e. Spear phishing

A

e. Spear phishing

20
Q

Information systems ________ is done to obtain an understanding of the threats to the confidentiality, integrity, and availability of data and systems.

a. requirements analysis
b. quality testing
c. security modeling
d. risk assessment
e. data processing

A

d. risk assessment

21
Q

Some data centers rent server space to multiple customers and provide necessary infrastructure in terms of power, backups, connectivity, and security. Such data centers are called ________.

a. virtual private networks
b. offshore networks
c. control centers
d. collocation facilities
e. hot backup sites

A

d. collocation facilities

22
Q

________ is the stealing of another person’s Social Security number, credit card number, and other personal information for the purpose of using the victim’s credit rating to borrow money, buy merchandise, and otherwise run up debts that are never repaid.

a. Identity theft
b. Battery
c. Bot herding
d. Logic bombing
e. Spear phishing

A

a. Identity theft

23
Q

The acts of cybercriminals to gain information on a victim by monitoring online activities, accessing databases, and making false accusations are forms of ________.

a. bot herding
b. spam filtering
c. viral marketing
d. cyberstalking
e. spear phishing

A

d. cyberstalking

24
Q

WikiLeaks is a famous not-for-profit whistleblower Web site. MasterCard and Visa stopped payments to WikiLeaks after a series of leaks by the site. An anonymous group attacked the Web sites of both MasterCard and Visa reacting to this. These Web vandals, who tried to protect WikiLeaks, are called ________.

a. hacktivists
b. bots
c. ethical hackers
d. patriot hackers
e. cyber soldiers

A

a. hacktivists

25
Q

Which of the following is a core business process?

a. plan-to-produce
b. time-to-purchase
c. account-to-report
d. make-to-stock
e. hire-to-retire

A

d. make-to-stock

26
Q

If the ________ version does not support a certain business process, the company may require a customized version.

a. vanilla
b. best-practices
c. customized
d. modified
e. reengineered

A

a. vanilla

27
Q

Enterprise resource planning (ERP) extended components focus primarily on ________.

a. human capital management and supply chain management
b. customer relationship management and supply chain management
c. customer relationship management and human capital management
d. product lifecycle management and supply chain management
e. customer relationship management and product lifecycle management

A

b. customer relationship management and supply chain management

28
Q

________ is a support activity.

a. Customer service
b. Technology development
c. Operations and manufacturing
d. Outbound logistics
e. Marketing and sales

A

b. Technology development

29
Q

According to business process management, identify the management’s next step after developing a vision for the organization.

a. They should identify the critical processes that are to be redesigned.
b. They should design and implement a prototype of the new processes.
c. They should manage the information technology to be used from a business transaction perspective.
d. They should identify the ways in which information systems can be used to improve the various business processes.
e. They should understand and measure the existing processes as a baseline for future improvements.

A

a. They should identify the critical processes that are to be redesigned.

30
Q

Human resource activities ________.

a. integrate the internal applications with suppliers, business partners, and customers
b. are classified as a support activity since the primary activities cannot be accomplished without the employees to perform them
c. streamline the organization’s internal value chain
d. include the purchasing of goods and services that are required as inputs to the primary activities
e. include the design and development of applications that support the primary business activities

A

b. are classified as a support activity since the primary activities cannot be accomplished without the employees to perform them