Save
Upgrade to remove ads
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

BUS311 EXAM 2

QuestionAnswer
Define Business Intelligence Refers to tools and techniques for analyzing and visualizing data
What is Master Data Management How a company makes sure important data — like customer or product info — is correct, complete, and the same across all systems.
Sequence Discovery Used to discover associations over time
Web content mining Process of automatically searching and extracting useful information from the content of websites
How is Web Content Mining and Text Mining related? WCM gets data (text from websites); Text-mining understands data (finds meaning in the text)
What is Machine Learning Type of AI that lets computers learn from data and improve on their own without being directly programmed for every task
In RDBMS, an entity is represented as a(n)... Table
A(n) _____ report provides a summary of critical metrics on a recurring schedule Key indicator
In order to swiftly respond to a highly competitive and rapidly changing environment, organizations utilize a ______ . Continuous planning process
To determine the likelihood of new customers to default on a loan, a manager in a bank would typically use ______ . Classification
Web usage mining entails analyzing ______ . Clickstream data
A(n) _______ is a special-purpose information system designed to support organizational decision-making. Decision support system
Big Data is characterized by all of the following except ______. Verifiability
______ agents keep track of key information such as inventory levels, notifying the users when conditions change. Monitoring and sensing
What is true about knowledge management? As baby boomers retire, KM helps keep their knowledge. KM systems use many tools, not just one. It's easier to choose tools than to figure out what knowledge is needed and who has it.
What are the Core Business Processes 1. Order to cash (selling product or service) 2. Procure to pay (Obtaining goods from suppliers) 3. Make to stock (Producing goods/Push-base approach) 4. Make to order (Storing raw materials/Pull-base approach)
What are core activities? performed by functional areas that process inputs and product outputs
What are support activities? enable core activities to take place
_______ are information systems that allow companies to integrate information and support operations on a company-wide basis. Enterprise systems
Which of the following is a core activity according to the value chain model? Customer service
According to the value chain model, which of the following is a support activity Technology development
All of the following are true about legacy systems except _____. They are ERP systems
The processes associated with obtaining goods from external vendors are referred to as Procure to pay processes
The processes associated with selling a product or service are referred to as _______. Order to cash processes
Which processes are most often associated with pull-based manufacturing of products Make to order processes
Information systems that focus on supporting functional areas, business processes, and decision making within an organization are referred to as _____. Internally focused systems
An enterprise system that has not been customized is commonly referred to as _____. A vanilla version
_ _ is a systematic improvement approach by all or part of an organization that critically examines, rethinks, and redesigns processes in order to achieve dramatic improvements in one or more performance measures(such as quality, cycle, time, or cost) Business process management
What is Just-in-Time production? Optimize ordering quantities such that parts or raw materials arrive just when needed for production
The three elements of Supply Chain Execution 1. Product flow 2. Information flow 3. Financial flow
Researchers found the cost of trying to win back customers can be 50-100 times as expensive as keeping a current one satisfied True
The Three main objectives of CRM (Customer Relationship Management) are _____ 1. Attract potential customers 2. Create customer loyalty 3. Portray a positive corporate image
Which of the following is commonly used to refer to the producers of supplies that a company uses? Supply network
Under a VMI model_____ The suppliers to a manufacturer manage the manufacturer’s inventory levels based on negotiated service levels.
The bullwhip effect refers to _____ Small forecasting errors at the end of the supply chain causing massive forecasting errors farther up the supply chain.
Which type of flow does supply chain execution not focus on? Procurement flow
During supply chain planning, which four plans are created? Demand forecast, transportation plan, production plan, sourcing plan
A comprehensive CRM system includes all but which of the following components? Cooperative CRM
SFA is most closely associated with what? Operational CRM
______ enables companies to engage with their customers using a variety of social media channels Social CRM
A metric for being able to quickly resolve customers' issues is called _____ First-call resolution
Categorizing customers based on statistical analysis of past behavior is ______ Ethical and a common business practice
What is Productivity Paradox? Productivity increases at a rate lower than expected when new technology is introduced
What are the factors of Productivity Paradox 1. Measurement problems 2. Time lags 3. Redistribution 4. Mismanagement
What are Agile Methodologies? Building a project in small parts that the client approves along the way, instead of waiting to deliver everything all at once at the end
Which of the following is not one of the four phases of the systems development life cycle? System Analysis
________ is the process of gathering and organizing information from users, managers, business processes, and documents to understand how a proposed information system should function Records Archiving
Which of the following is the correct order of phases in the systems development life cycle? Planning, Analysis, Design, Implementation
In the systems design phase, the elements that must be designed when building an information system include all of the following except _____ Questionnaires
________ maintenance involves making enhancements to improve processing performance or interface usability or adding desired system features (bells and whistles) Perfective
Which of the following is not one of the three types of arguments commonly made in the business case for an information system? Fiction
A ________ is a document that an organization uses to tell vendors what its requirements are and to invite them to provide information about how they might be able to meet those Request for proposal
A user of proprietary software has the right to ________ the software Run
Which of the following factors is a good reason to outsource? All of the above
Most competitive external acquisition processes have at lease five general steps. Which of the following is not one of those steps? Implementation
4 Main Groups Who Commit Computer Crime are _____ Employees who steal or harm their company’s data. Tech experts who sabotage for personal gain. Criminals who use computers to help crimes. Hackers who snoop but usually don’t cause much harm
Types of Computer Viruses/Destructive Codes Denial of Service blocks users from a service. Spyware secretly collects data. Spam is junk email. Phishing tricks you into giving info. Spear Phishing targets specific people. Cookies save small info files on your computer.
Four Core Principles of Information Security 1. Confidentiality - private data 2. Integrity - accurate data 3. Availability - access data when needed 4. Authentication - verifying identity of users before access
After assessing risks, a strategy is made to protect information systems using: Preventive Controls: Stop problems before they happen. Detective Controls: Find problems or attacks quickly. Corrective Controls: Fix problems and reduce damage after they occur.
What is the common rule for deciding if an information system faces a security risk? All systems connected to networks are vulnerable to security violations
Those individuals who break into computer systems with the intention of doing damage or committing a crime are usually called ________. Crackers
Which of the following does not pose a threat to electronic data? Unauthorized access Jailbreaking one’s mobile phone Unauthorized data modification
Unauthorized data modification includes Someone who is not authorized to do so changing electronic data
Technological controls used to protect information include ________. Firewalls and physical access restrictions
Limiting access to electronic data can involve ________. Something you have, know, are
Which of the following is the process of determining the true, accurate identity of a user of an information system? Authentication
Using computers and networks to scare or harm people or governments to reach political, religious, or belief goals is called ________. Cyberterrorism
A(n) ________ is a system composed of hardware, software, or both that is designed to detect intrusion and prevent unauthorized access to or from a private network. Firewall
________ is the process of encoding messages before they enter the network or airwaves, then decoding them at the receiving end of the transmission so that recipients can read or hear them Encryption
Created by: user-1982423
 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards