When shoppers come into a store to evaluate the look and feel of a product, just to then purchase it online or at a competitor's store is known as ________
Information dissemination refers to the use of Web sites to provide information for recruiting new members as well as utilizing more interactive Internet technologies
________ is a business model in which the suppliers to a manufacturer manage the manufacturer's inventory levels based on preestablished service levels
Sales force automation improves the effectiveness of the marketing function by providing an improved understanding of market conditions, competitors, and products
A(n) ________ typically consists of a distorted image displaying a combination of letters and/or numbers that a user has to input into a form before submitting it
An account management policy explains technical controls on all organizational computer systems, such as access limitations, audit-control software, firewalls, and so on
Jason has just made some changes to the information system at a company and wants to check if the system is working correctly. What should Jason do to conduct a beta test of the system?
Fyroff consultants, a leading software consulting firm in the United States, decides to launch an Enterprise Resource Planning (ERP) solution. The company chooses the brand name FyroffEnterprise for the new solution
________ systems facilitate the sharing of information across the various departments of an organization in order to increase customer satisfaction and loyalty
________ maintenance involves making enhancements to improve processing performance or interface usability or adding desired (but not necessarily required) system features (in other words, "bells and whistles")
Corrective maintenance involves making changes to an information system to evolve its functionality, to accommodate changing business needs, or to migrate it to a different operating environment
Key technologies within collaborative customer relationship management (CRM) systems include data mining, decision support, and other business intelligence technologies that attempt to create predictive models of various customer attributes
A company has a five-member team in charge of the development and maintenance of its information systems. An information system is in place, and the team performs routine maintenance to keep it running smoothly. Which of the following scenarios is an example of perfective maintenance?
When a company uses a fingerprint recognition system instead of access cards, it helps the company prevent unauthorized physical access. Which of the following technologies is used for authentication here?
________ focuses on studying customer behavior and perceptions in order to provide the business intelligence necessary to identify new opportunities and to provide superior customer service
________ use the Internet to check the software vendor's Web site for available fixes to problems. The application downloads and installs these in order to fix software flaws
________ by terrorists refers to the use of the vast amount of information available on the Internet regarding virtually any topic for planning, recruitment, and numerous other endeavors
________ customer relationship management (CRM) systems help to create mass e-mail marketing campaigns wherein each consumer receives an individualized e-mail based on their prior purchase history
________ allow(s) designers of Web documents to create their own customized tags, enabling the definition, transmission, validation, and interpretation of data between applications and between organizations
________ is the stealing of another person's Social Security number, credit card number, and other personal information for the purpose of using the victim's credit rating to borrow money, buy merchandise, and otherwise run up debts that are never repaid.
Which of the following laws makes it mandatory for organizations to demonstrate that there are controls in place to prevent misuse and detect any potential problems?
Which of the following terms refers to a computer, data, or network site that is designed to be enticing to crackers so as to detect, deflect, or counteract illegal activity?
A method for deciding among different information system (IS) investments or when considering alternative designs for a given system is ________ analysis
In the ________ process, raw materials, subcomponents, and accessories are procured based on forecasts, but actual manufacturing does not start until sales orders are received
When using Yahoo Messenger, Roger gets an unsolicited advertisement from a company. The advertisement contains a link to connect to the merchant's Web site. Which of the following is the most suitable way of describing this type of advertisement?
In ________, an attacker accesses the network, intercepts data from it, and even uses network services and/or sends attack instructions to it without having to enter the home, office, or organization that owns the network
Enterprise resource planning replaces stand-alone applications by providing various modules based on a common database and similar application interfaces that service the entire enterprise rather than portions of it
Computers that are located in homes, schools, and businesses are infected with viruses or worms to create armies of zombie computers to execute ________ attacks
An organization builds a fully equipped backup facility, having everything from office chairs to a one-to-one replication of the most current data. This facility is called a ________
You have been hired by a firm in a non-information-intensive industry to evaluate its inventory of systems and IT projects. Which types of projects should the firm focus on?
Welcome to Sciemce, where you can ask questions and receive answers from other members of the community.