(+) Save a GPA. Donate your notes with us.

Loading...

mis

1
When using Yahoo Messenger, Roger gets an unsolicited advertisement from a company. The advertisement contains a link to connect to the merchant's Web site. Which of the following is the most suitable way of describing this type of advertisement?
2
A firewall is a part of a computer system designed to detect intrusion and prevent unauthorized access to or from a private network
3
In an operational customer relationship management (CRM), marketing, sales, and support personnel see only current interactions with the customer depending on where it occurred within the organization
4
Robert receives an e-mail which says that he has won an online lottery worth $50 billion. Robert has his doubts as he does not remember buying a lottery ticket. He finds out that it is a spam e-mail intended to obtain his bank account details and credit card number. Which of the following is evident here?
5
Which of the following portrays the individualized service benefit of a customer relationship management (CRM) system?
6
How is business process management similar to quality improvement approach such as total quality management?
7
There are two major categories of enterprise resource planning (ERP) components-ERP core components and ERP extended components
8
________ is the process of identifying and assessing the volume and sentiment of what is being said about a company, individual, product, or brand
9
An effective ________ process can create customer satisfaction, speed up the collection process, and serve to provide valuable inputs into business intelligence and customer relationship management applications
10
A company has a five-member team in charge of the development and maintenance of its information systems. An information system is in place, and the team performs routine maintenance to keep it running smoothly. Which of the following scenarios is an example of perfective maintenance?
11
Which of the following goods are produced using the make-to-order approach?
12
Business case arguments based on data, quantitative analysis, and/or indisputable factors are known as arguments based on ________
13
Which of the following steps takes place in an organization during both in-house systems development and external acquisition?
14
Customer relationship management applications are commonly integrated with a comprehensive enterprise resource planning implementation to leverage internal and external information to better serve customers
15
Identify a true statement about a vulnerability scanner
16
Systems that focus on the specific needs of individual departments are typically not designed to communicate with other systems in the organization and are therefore referred to as stand-alone applications
17
Which of the following statements best describes the productivity paradox of technology investment?
18
Ransomware is a type of adware
19
The biggest increases in productivity results from increased system efficiency rather than system effectiveness
20
While adding information to the employee information database, Neil's computer crashed, and the entire database was erased. Which of the following types of viruses caused Neil's computer to crash?
21
Companies that have successfully installed enterprise systems are found to follow a basic set of recommendations related to enterprise system implementations
22
When Shelly downloaded an arcade game from an unknown Internet Web site, an unauthorized connection unknown to Shelly was established with her computer. The arcade game is most likely to be ________
23
________ systems facilitate the sharing of information across the various departments of an organization in order to increase customer satisfaction and loyalty
24
A(n) ________ system coordinates business processes with customers, suppliers, and business partners of an organization
25
An organization builds a fully equipped backup facility, having everything from office chairs to a one-to-one replication of the most current data. This facility is called a ________
26
________ is the extent to which a company's supply chain is focusing on maximizing customer service with lesser focus on procurement, production, and transportation costs
27
Which of the following types of software is best suited for tasks that are unique to a particular business?
28
Just-in-time is a business model in which the suppliers manage the manufacturer's inventory based on pre-established service levels
29
Spyware is electronic junk mail or junk newsgroup postings usually posted for the purpose of advertising some product and/or service
30
Controls that are used to assess whether anything went wrong, such as unauthorized access attempts, are called ________ controls
31
In core business processes, which of the following uses a push-based approach?
32
In ________, an attacker accesses the network, intercepts data from it, and even uses network services and/or sends attack instructions to it without having to enter the home, office, or organization that owns the network
33
The individuals who are knowledgeable enough to gain access to computer systems without authorization are referred to as ________
34
Data flows represent the movement of data through an organization or within an information system
35
________ is a group meeting-based process for requirements collection
36
________ customer relationship management (CRM) systems help to create mass e-mail marketing campaigns wherein each consumer receives an individualized e-mail based on their prior purchase history
37
________ is a more sophisticated fraudulent e-mail attack that targets a specific person or organization by personalizing the message in order to make the message appear as if it is from a trusted source
38
Identify the policy that lists procedures for adding new users to systems and removing users who have left the organization
39
A net-present-value analysis is an analysis of the relevant cash flow streams associated with the system at the organization's discount rate
40
________ refers to offering stolen proprietary software for free over the Internet
41
Corrective maintenance involves making changes to an information system to evolve its functionality, to accommodate changing business needs, or to migrate it to a different operating environment
42
The act of cybercriminals to gain information on a victim by monitoring online activities, accessing databases, and making false accusations are forms of ________
43
________ is the use of standardized performance tests to facilitate comparison between systems
44
A collaborative customer relationship management system supports customer communication and collaboration with the entire organization, thus providing more streamlined customer service with fewer handoffs
45
Identify the software that is cost effective, since the vendor that builds the application spreads out the development costs by selling copies to a large number of users?
46
Receiving the goods is followed by ________ in the procure-to-pay process
47
With ________, employees may be identified by fingerprints, retinal patterns in the eye, facial features, or other bodily characteristics before being granted access to use a computer or to enter a facility
48
Which of the following terms refers to a computer, data, or network site that is designed to be enticing to crackers so as to detect, deflect, or counteract illegal activity?
49
Making false accusations that damage the reputation of the victim on blogs, Web sites, chat rooms, or e-commerce sites is a form of cyberstalking
50
________ are alternative measures of outcomes that help clarify the impact a change will have on the firm
51
Salaries paid to employees are non-recurring costs
52
________ targeted at networks is designed to spread by itself without the need for an infected host file to be shared
53
The process of making changes to an information system to repair flaws in design, coding, or implementation is known as ________ maintenance
54
A company has a five-member team in charge of development and maintenance of its information systems. An information system is in place, and the team performs routine maintenance to keep it running smoothly
55
An online retailer has finished creating a customer record. Identify the retailer's next step in an order-to-cash process
56
Outbound logistics activities focus on the ________
57
Fyroff consultants, a leading software consulting firm in the United States, decides to launch an Enterprise Resource Planning (ERP) solution. The company chooses the brand name FyroffEnterprise for the new solution
58
Supply chain execution involves the development of various resource plans to support the efficient and effective production of goods and services
59
________ refers to the use of a computer to communicate obscene, vulgar, or threatening content that causes a reasonable person to endure distress
60
________ is the process of decommissioning the current way of doing things and installing the new system in the organization
61
Supply chain effectiveness is the extent to which a company's supply chain is focusing on minimizing procurement, production, and transportation costs, sometimes by sacrificing excellent customer service
62
The key use of the order promising module of supply chain management is to ________
63
Collaborative customer relationship management enhances communication by understanding customer history and current needs
64
Applications that are designed and developed exclusively for a specific organization are known as ________ software
65
Which of the following is a part of a computer system designed to detect intrusion and to prevent unauthorized access to or from a private network?
66
A(n) ________ is a network connection that is constructed dynamically within an existing network in order to connect users or nodes
67
Which of the following examples explains the improved planning benefit of using a customer relationship management (CRM) system?
68
Production scheduling ________
69
An enterprise license is also known as a(n) ________ license
70
The term shoulder surfing refers to looking over one's shoulder while the person is keying in access information
71
Software programming and testing takes place during the systems ________ stage of the systems development process
72
________ is a standard for exchanging structured information over the Web
73
Which of the following statements about a just-in-time strategy is true?
74
________ is the use of electromagnetic energy to transmit information between a reader (transceiver) and a processing device
75
________ refers to the process of identifying, quantifying, and presenting the value provided by a system
76
Supply chain planning begins with ________
Welcome to Sciemce, where you can ask questions and receive answers from other members of the community.
...