click below
click below
Normal Size Small Size show me how
BUS311 EXAM 2
| Question | Answer |
|---|---|
| Define Business Intelligence | Refers to tools and techniques for analyzing and visualizing data |
| What is Master Data Management | How a company makes sure important data — like customer or product info — is correct, complete, and the same across all systems. |
| Sequence Discovery | Used to discover associations over time |
| Web content mining | Process of automatically searching and extracting useful information from the content of websites |
| How is Web Content Mining and Text Mining related? | WCM gets data (text from websites); Text-mining understands data (finds meaning in the text) |
| What is Machine Learning | Type of AI that lets computers learn from data and improve on their own without being directly programmed for every task |
| In RDBMS, an entity is represented as a(n)... | Table |
| A(n) _____ report provides a summary of critical metrics on a recurring schedule | Key indicator |
| In order to swiftly respond to a highly competitive and rapidly changing environment, organizations utilize a ______ . | Continuous planning process |
| To determine the likelihood of new customers to default on a loan, a manager in a bank would typically use ______ . | Classification |
| Web usage mining entails analyzing ______ . | Clickstream data |
| A(n) _______ is a special-purpose information system designed to support organizational decision-making. | Decision support system |
| Big Data is characterized by all of the following except ______. | Verifiability |
| ______ agents keep track of key information such as inventory levels, notifying the users when conditions change. | Monitoring and sensing |
| What is true about knowledge management? | As baby boomers retire, KM helps keep their knowledge. KM systems use many tools, not just one. It's easier to choose tools than to figure out what knowledge is needed and who has it. |
| What are the Core Business Processes | 1. Order to cash (selling product or service) 2. Procure to pay (Obtaining goods from suppliers) 3. Make to stock (Producing goods/Push-base approach) 4. Make to order (Storing raw materials/Pull-base approach) |
| What are core activities? | performed by functional areas that process inputs and product outputs |
| What are support activities? | enable core activities to take place |
| _______ are information systems that allow companies to integrate information and support operations on a company-wide basis. | Enterprise systems |
| Which of the following is a core activity according to the value chain model? | Customer service |
| According to the value chain model, which of the following is a support activity | Technology development |
| All of the following are true about legacy systems except _____. | They are ERP systems |
| The processes associated with obtaining goods from external vendors are referred to as | Procure to pay processes |
| The processes associated with selling a product or service are referred to as _______. | Order to cash processes |
| Which processes are most often associated with pull-based manufacturing of products | Make to order processes |
| Information systems that focus on supporting functional areas, business processes, and decision making within an organization are referred to as _____. | Internally focused systems |
| An enterprise system that has not been customized is commonly referred to as _____. | A vanilla version |
| _ _ is a systematic improvement approach by all or part of an organization that critically examines, rethinks, and redesigns processes in order to achieve dramatic improvements in one or more performance measures(such as quality, cycle, time, or cost) | Business process management |
| What is Just-in-Time production? | Optimize ordering quantities such that parts or raw materials arrive just when needed for production |
| The three elements of Supply Chain Execution | 1. Product flow 2. Information flow 3. Financial flow |
| Researchers found the cost of trying to win back customers can be 50-100 times as expensive as keeping a current one satisfied | True |
| The Three main objectives of CRM (Customer Relationship Management) are _____ | 1. Attract potential customers 2. Create customer loyalty 3. Portray a positive corporate image |
| Which of the following is commonly used to refer to the producers of supplies that a company uses? | Supply network |
| Under a VMI model_____ | The suppliers to a manufacturer manage the manufacturer’s inventory levels based on negotiated service levels. |
| The bullwhip effect refers to _____ | Small forecasting errors at the end of the supply chain causing massive forecasting errors farther up the supply chain. |
| Which type of flow does supply chain execution not focus on? | Procurement flow |
| During supply chain planning, which four plans are created? | Demand forecast, transportation plan, production plan, sourcing plan |
| A comprehensive CRM system includes all but which of the following components? | Cooperative CRM |
| SFA is most closely associated with what? | Operational CRM |
| ______ enables companies to engage with their customers using a variety of social media channels | Social CRM |
| A metric for being able to quickly resolve customers' issues is called _____ | First-call resolution |
| Categorizing customers based on statistical analysis of past behavior is ______ | Ethical and a common business practice |
| What is Productivity Paradox? | Productivity increases at a rate lower than expected when new technology is introduced |
| What are the factors of Productivity Paradox | 1. Measurement problems 2. Time lags 3. Redistribution 4. Mismanagement |
| What are Agile Methodologies? | Building a project in small parts that the client approves along the way, instead of waiting to deliver everything all at once at the end |
| Which of the following is not one of the four phases of the systems development life cycle? | System Analysis |
| ________ is the process of gathering and organizing information from users, managers, business processes, and documents to understand how a proposed information system should function | Records Archiving |
| Which of the following is the correct order of phases in the systems development life cycle? | Planning, Analysis, Design, Implementation |
| In the systems design phase, the elements that must be designed when building an information system include all of the following except _____ | Questionnaires |
| ________ maintenance involves making enhancements to improve processing performance or interface usability or adding desired system features (bells and whistles) | Perfective |
| Which of the following is not one of the three types of arguments commonly made in the business case for an information system? | Fiction |
| A ________ is a document that an organization uses to tell vendors what its requirements are and to invite them to provide information about how they might be able to meet those | Request for proposal |
| A user of proprietary software has the right to ________ the software | Run |
| Which of the following factors is a good reason to outsource? | All of the above |
| Most competitive external acquisition processes have at lease five general steps. Which of the following is not one of those steps? | Implementation |
| 4 Main Groups Who Commit Computer Crime are _____ | Employees who steal or harm their company’s data. Tech experts who sabotage for personal gain. Criminals who use computers to help crimes. Hackers who snoop but usually don’t cause much harm |
| Types of Computer Viruses/Destructive Codes | Denial of Service blocks users from a service. Spyware secretly collects data. Spam is junk email. Phishing tricks you into giving info. Spear Phishing targets specific people. Cookies save small info files on your computer. |
| Four Core Principles of Information Security | 1. Confidentiality - private data 2. Integrity - accurate data 3. Availability - access data when needed 4. Authentication - verifying identity of users before access |
| After assessing risks, a strategy is made to protect information systems using: | Preventive Controls: Stop problems before they happen. Detective Controls: Find problems or attacks quickly. Corrective Controls: Fix problems and reduce damage after they occur. |
| What is the common rule for deciding if an information system faces a security risk? | All systems connected to networks are vulnerable to security violations |
| Those individuals who break into computer systems with the intention of doing damage or committing a crime are usually called ________. | Crackers |
| Which of the following does not pose a threat to electronic data? | Unauthorized access Jailbreaking one’s mobile phone Unauthorized data modification |
| Unauthorized data modification includes | Someone who is not authorized to do so changing electronic data |
| Technological controls used to protect information include ________. | Firewalls and physical access restrictions |
| Limiting access to electronic data can involve ________. | Something you have, know, are |
| Which of the following is the process of determining the true, accurate identity of a user of an information system? | Authentication |
| Using computers and networks to scare or harm people or governments to reach political, religious, or belief goals is called ________. | Cyberterrorism |
| A(n) ________ is a system composed of hardware, software, or both that is designed to detect intrusion and prevent unauthorized access to or from a private network. | Firewall |
| ________ is the process of encoding messages before they enter the network or airwaves, then decoding them at the receiving end of the transmission so that recipients can read or hear them | Encryption |