Create an account
Developing a new product, fulfilling an order, and hiring a new employee are examples of business processes.
A business model describes how a company produces, delivers, and sells a product or service to create wealth.
Information technology (IT) consists of all the hardware that a firm needs to use in order to achieve its business objectives, whereas information systems consist of all the software and business processes needed.
An IT infrastructure provides the platform on which the firm can build its information systems.
UPS's use of Web-based tools that allow customers to embed UPS functions such as tracking and cost calculations into their own Web sites was an information systems solution used to achieve customer intimacy.
Dell Computer's use of information systems to improve efficiency and implement "mass customization" techniques to maintain consistent profitability and an industry lead illustrates which business objective?
The move of retail banking to use ATMs after Citibank unveiled its first ATMs illustrates the use of information systems to achieve which business objective?
Which of the following objectives best describes the business strategy behind the development of smart grid initiatives by power companies, as discussed in the chapter case?
Operational management is responsible for directing the day-to-day operations of the business and therefore needs transaction-level information.
Transaction processing systems are most commonly used by the senior management level of an organization
A transaction processing system is a computerized system that performs and records the daily routine transactions necessary to conduct business.
Decision-support systems help managers make decisions that are unique, rapidly changing, and not easily specified in advance.
ESSs are designed to incorporate data about external events, but they also draw summarized information from internal MIS and DSS.
Producing bills of materials is a business process within the ________ function.
manufacturing and production
An application server may reside on the same computer as a Web server or on its own dedicated computer.
Enterprise integration requires software that can link disparate applications and enable data to flow freely among different parts of the business.
SANs create large central pools of storage that can be rapidly accessed and shared by multiple servers.
Hypertext markup language specifies how text, graphics, video, and sound are placed on a Web page document.
A field identified in a record as holding the unique identifier for that record is called the
A field identified in a table as holding the unique identifier of the table's records is called the
A network that covers broad geographical regions is most commonly referred to as a(n)
wide area network
A protocol is a standard set of rules and procedures for the control of communications in a network.
In a telecommunications network architecture, a protocol is
a standard set of rules and procedures for control of communications in a network.
In a relational database, complex groupings of data must be streamlined to eliminate awkward many-to-many relationships.
One or more access points positioned on a ceiling, wall, or other strategic spot in a public place to provide maximum wireless coverage for a specific area are referred to as
The process of streamlining data to minimize redundancy and awkward many-to-many relationships is called
________ refers to policies, procedures, and technical measures used to prevent unauthorized access, alternation, theft, or physical damage to information systems.
Tricking employees to reveal their passwords by pretending to be a legitimate member of a company is called
Unauthorized access is a security challenge that is most likely to occur in which of the following points of a corporate network?
Sniffers enable hackers to steal proprietary information from anywhere on a network, including e-mail messages, company files, and confidential reports.
Wal-mart's strategy of continuous replenishment of inventory based on actual customer purchases is an example a pull-based SCM model.
A salesperson clicks repeatedly on the online ads of a competitor in order to drive the competitor's advertising costs up. This is an example of
A suite of integrated software modules for finance and accounting, human resources, manufacturing and production, and sales and marketing that allows data to be used by multiple functions and business processes best describes
Sniffing is a security challenge that is most likely to occur in which of the following points of a corporate network?
To minimize the expense of implementing an enterprise system, businesses can opt to curtail the customization of an enterprise package and instead change business processes to match the software.
Customer relationship management systems typically provide software and online tools for sales, customer service, and
A firewall allows the organization to
prevent unauthorized communication both into and out of the network
Zero defects cannot be achieved in larger software programs because fully testing programs that contain thousands of choices and millions of paths would require thousands of years
A distortion of information about the demand for a product as it passes from one entity to the next across the supply chain is called the ________ effect.
Implementing an enterprise application typically requires organizational change as well as adjustments to existing business processes.
One form of spoofing involves forging the return address on an e-mail so that the e-mail message appears to come from someone other than the sender.
In addition to e-mail, instant messages and P2P file-sharing can also pose security threats to computer systems and networks
NAT conceals the IP addresses of the organization's internal host computers to deter sniffer programs.
Enterprise software is built around thousands of predefined business processes that reflect
Why is overstocking warehouses not an effective solution for a problem of low availability?
It increases inventory costs
Wireless networks are vulnerable to penetration because radio frequency bands are easy to scan.
In a phenomenon called ________, some argue that large numbers of people can make better decisions about a wide range of topics or products than a single person or even a small committee of experts.
the wisdom of crowds
The act of engaging consumers in a dialog that dynamically adjusts the experience to the individual describes which dimension of e-commerce technology?
The integration of video, audio, and text marketing messages into a single marketing message and consumer experience describes which dimension of e-commerce technology?
In which of the following revenue models does a Web site charge a fee for access to some or all of its offerings on a continual, regular basis?
Selling products and services directly to individual consumers via the Internet best describes
The process of sourcing goods and materials, negotiating with suppliers, paying for goods, and making delivery arrangements is called
The quality of ubiquity, as it relates to e-commerce, is illustrated by
the availability of the Internet everywhere and anytime.
What type of knowledge management system did Canadian Tire implement in order to improve the communications with dealers?
content management system
An example of the service provider business model is Netflix, an online video store and streaming media outlet.
A third-party Net marketplace that connects many buyers and suppliers for spot purchasing is called a(n)
An information systems plan contains a statement of corporate goals and specifies how information technology will support the attainment of those goals.
Between 30 and 40 percent of all software projects are "runaway" projects that far exceed original schedule and budget projections.
Counterimplementation refers to a deliberate strategy to thwart the implementation of an information system or an innovation in an organization.
Mandatory use of a system is one effective way of overcoming user resistance to an information system.
The ________ consists of systems analysts, specialists from the relevant end-user business areas, application programmers, and perhaps database specialists.
The larger the systems project, the more risk the project runs in terms of being completed on time, within budget, and according to project requirements.
The level of a project's risk is influenced primarily by
project size, project structure, and the level of technical expertise.
Please allow access to your computer’s microphone to use Voice Recording.
Having trouble? Click here for help.
We can’t access your microphone!
Click the icon above to update your browser permissions and try again
Reload the page to try again!Reload
Press Cmd-0 to reset your zoom
Press Ctrl-0 to reset your zoom
It looks like your browser might be zoomed in or out. Your browser needs to be zoomed to a normal size to record audio.
Please upgrade Flash or install Chrome
to use Voice Recording.
For more help, see our troubleshooting page.
Your microphone is muted
For help fixing this issue, see this FAQ.
Star this term
You can study starred terms together