Computer Software – Information Technology

Computer Software Information Technology

This discussion is about Computer Software Information Technology,


Information technology

any computer-based tool that people use to work with information and support the information and information-processing needs of an organization


Hardware

the physical components of a computer, physical devices that make up a computer (or computer system)


Software

set of instructions that hardware executes to carry out a specific task for you


Input device

enter information and commands


Output device

hear, see, or otherwise recognize the results of information-processing requests


Storage device

store information for use at a later time


CPU

hardware that interprets and executes software and coordinates all hardware


RAM

temporary holding area for information and software


Telecommunications device

send information to and receive it from another person or computer in a network


Connecting device

lets you connect peripherals to your computer


Application software

enables you to solve specific problems or perform specific tasks


System software

handles tasks specific to technology management and coordinates the interaction of all technology devices


Operating system software

controls application software and manages hardware devices


Utility software

provides additional functionality to your operating system


Personal digital assistant (PDA)

small handheld computer for personal tasks like appointment scheduling and address book maintenance


Tablet PC

pen-based computer with the functionality of a notebook or desktop


Notebook computer

small, portable, fully functional, battery-powered computer.


Desktop computer

most popular type of personal computer


Minicomputer (mid-range computer)

meets needs of several people simultaneously in a small or medium-sized business


Mainframe computer

meets needs of hundreds of people in a large business


Supercomputer

fastest, most powerful, and most expensive type of computer


Personal productivity software

SOFTWARE – INTELLECTUAL INTERFACE helps you perform personal tasks


Software suite

several applications bundled together (usually productivity software)


Word processing

helps you create letters, memos, and other basic documents


Spreadsheet

helps you work with numbers, perform calculations and create graphs


Presentation

helps you create and edit information that will appear in slides


Desktop publishing

extends word processing by including design and formatting techniques to enhance the appearance of the document


Personal information management (PIM)

helps you create and maintain to-do lists, appointments, calendars, etc.


Personal finance

helps you maintain your checkbook and handle other personal finance tasks


Web authoring

helps you design and develop Web sites


Graphics

helps you create and edit photos and art


Communications

helps you communicate with others


Database management system (DBMS)

helps you specify the logical organization for a database; access and use the information within a database


Vertical market software

application software for a specific industry


Horizontal market software

– application software suitable for use in many industries


Utility Software

adds functionality to operating system software


Anti-virus software

detects and removes or quarantines computer viruses


Crash-proof software

helps save information if your system crashes


Uninstaller software

removes software from your hard disk


Disk optimization software

organizes information on your hard disk


Spam blocker

filters unwanted e-mail


Binary digit (bit)

smallest unit of information your computer can process


Byte –

eight bits or the number of bits it takes to represent one natural character


ASCII (American Standard Code for Information Interchange)

coding system that personal computers use


Keyboards

most frequently input devices for notebooks and desktops to enter information and commands


Stylus

most frequently used input devices for PDAs and tablet PCs to enter information and commands


Pointing Device –

used to input commands


Touchpad

dark rectangle you use to move the cursor with your finger


Pointing stick

a little rod, used mostly on notebooks


Scanners

used to convert information that exists in visible form into electronic form


Image scanner –

captures images, photos, text, and artwork


Bar code scanner –

reads information in the form of vertical bars


Biometric scanner –

scans a human physical attribute, like a fingerprint or iris, for security purposes


Viewable image size (VIS) –

the size of the image on a monitor


Resolution of a screen –

the number of pixels it has


Pixels (picture elements) –

the dots that make up the image


Dot pitch –

the distance between the centers of two like-colored pixels


Megabyte (MB or M or Meg) –

– about 1 million bytes


Gigabyte (GB or Gig)

about 1 billion bytes


Terabyte (TB)

about 1 trillion bytes


Hard disk –

magnetic storage with one or more thin metal platters sealed inside the drive


Insourcing –

IT specialists inside your organization


Selfsourcing –

do-it-yourself approach many end users take with little or no help from IT specialists


Outsourcing –

a third-party organization (i.e., let someone do the work and pay them for it)


Systems development life cycle (SDLC) –

a structured step-by-step approach for developing information systems


Also called a waterfall

methodology, an approach in which each phase of the SDLC is followed by another, from planning through implementation


Planning phase

– create a solid plan for developing your information system


Project scope –

clearly defines the high-level system requirements


Scope creep –

occurs when the scope of the project increases


Feature creep –

occurs when developers add extra features that were not part of the initial requirements


Project scope document –

a written definition of the project scope and is usually no longer than a paragraph


Project plan –

defines the what, when, and who questions of system development


Project manager

– an individual who is an expert in project planning and management, defines and develops the project plan and tracks the plan to ensure all key project milestones are completed on time


Project milestones

– represent key dates for which you need a certain group of activities performed


Analysis phase –

involves end users and IT specialists working together to gather, understand, and document the business requirements for the proposed system


Business requirements

– the detailed set of knowledge worker requests that the system must meet in order to be successful


Requirements definition document –

prioritizes the business requirements and places them in a formal comprehensive document


Design phase –

build a technical blueprint of how the proposed system will work


Development phase –

take all of your detailed design documents from the design phase and transform them into an actual system


Testing phase

– verifies that the system works and meets all of the business requirements defined in the analysis phase


Test conditions

the detailed steps the system must perform along with the expected results of each step


Unit testing –

tests individual units of code


System testing –

verifies that the units of code function correctly when integrated


Integration testing –

verifies that separate systems work together


User acceptance testing (UAT) –

determines if the system satisfies the business requirements


Implementation phase –

distribute the system to all of the knowledge workers and they begin using the system to perform their everyday jobs


User documentation –

highlights how to use the system


Online training –

runs over the Internet or off a CD-ROM


Workshop training –

is held in a classroom environment and lead by an instructor


Parallel implementation

– use both the old and new system simultaneously


Plunge implementation

– discard the old system completely and use the new


Pilot implementation

– start with small groups of people on the new system and gradually add more users


Phased implementation

– implement the new system in phases


Maintenance phase –

monitor and support the new system to ensure it continues to meet the business goals


Selfsourcing (end-user development)

– the development and support of IT systems by end users with little or no help from IT specialists


Prototype –

a model of a proposed product, service, or system


Prototyping –

the process of building a model that demonstrates the features of a proposed product, service, or system


Outsourcing –

the delegation of specified work to a third party for a specified length of time, at a specified cost, and at a specified level of service


Intellectual property

– intangible creative work that is embodied in physical form


Copyright

– legal protection afforded an expression of an idea


Fair Use Doctrine

– may use copyrighted material in certain situations


Pirated software

– the unauthorized use, duplication, distribution, or sale of copyrighted software


Privacy –

the right to left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent


Phishing (carding, brand spoofing) –

a technique to gain personal information for the purpose of identity theft


Pharming –

rerouting your request for a legitimate Web site


Cookie –

a small file that contains information about you and your Web activities, which a Web site places on your computer


Spam –

unsolicited e-mail from businesses advertising goods and services


Adware –

software to generate ads that installs itself when you download another program


Spyware (sneakware, stealthware) –

software that comes hidden in downloaded software and helps itself to your computer resources


Trojan horse software –

software you don’t want inside software you do want


Hackers –

knowledgeable computer users who use their knowledge to invade other people’s computers


Computer virus (virus) –

software that is written with malicious intent to cause annoyance or damage


Worm –

type of virus that spreads itself from computer to computer usually via e-mail


Denial-of-service (DoS) attack –

floods a Web site with so many requests for service that it slows down or crashes


Anti-virus software –

detects and removes or quarantines computer viruses


Firewall –

hardware and/or software that protects a computer or network from intruders


Encryption –

scrambles the contents of a file so that you can’t read it without having the right decryption key


in this​ video, samir describes how business executives use a bi application to drill down and see​ _____ data, the detail in the data such as data on a particular store or data on a particular item.

Granular


With​ E-commerce and the​ Internet, which of the following depicts a trend in​ advertising?

E-commerce and Internet advertising have grown while traditional advertising and commerce have remained flat.


What is emerging as a major business area of innovation that offers a flexible collection of computers on the Internet that can perform tasks previously performed on corporate​ computers?

Cloud Computing


Which of the following most accurately describes an information​ system?

A set of components that​ gather, analyze,​ store, and utilize information for making better decisions for a firm


What are the dimensions of information​ systems?

Organizations, People, and Information Technology


What are the steps of the problem solving​ process?

Problem​ Identification, Solution​ Design, Solution Evaluation and​ Choice, and Implementation


As Julie explains to​ Trey, she needs sales data in order to plan future cookie production. Based on her​ explanation, data is defined as​ _____.

recorded facts or figures


When Julie describes calculating the average number of cookies sold in​ February, she is describing an example of obtaining​ _____ from​ _____.

​information; data


Based on the information in this​ video, which of the following describes high quality​ data?

It is​ correct, current, and complete.


In this video​ dramatization, Julie and Trey discuss the need to document any changes they make to a cookie recipe. If they change the recipe for red velvet cookies and​ don’t change the list of ingredients they use for the procurement of​ inputs, this is an example of failure of data to be​ _____.

correct


As Julie explains to​ Trey, she needs information obtained from high quality data to help her make good decisions. Which of the following four documents would not be a good source of information for​ Julie?

a social media report that shows the total number of​ “likes” for each cookie


What primary goal does the San Francisco​ Giants’ “dynamic ticket​ pricing” help​ accomplish?

It allows ticket prices to fluctuate according to demand


Businesses in America will spend approximately​ $600 ____________ on​ hardware, software, and telecommunications equipment in 2015.

Billion


With new laws requiring the storage of emails and other important​ documents, estimates of information systems storage now exceeds​ 1.8:

Zettabytes


When talking about changes related to information​ technology, the text identifies three interrelated changes that are responsible for the bulk of innovations. These include the mobile digital​ platform, ________________________, and the growth of cloud computing.

the growing use of big data


___________________ is a business driver which focuses on ways to achieve better efficiencies to increase profits.

Operational Excellence


If a competitor to your business introduces an effective product or service​ (i.e., when Citibank first introduced the​ ATM), your need to follow is considered an example of the business​ driver:

Survival


A manager upset that he or she is not receiving​ forecasts, sales​ projections, or appropriate dashboards is expressing frustration for having a poor​ ______________ business​ driver:

Improved Decision Making


An automobile rental company interested in learning and adapting to the needs of its customers is focusing on the business​ driver:

Customer and Supplier Intimacy


Which is an example of a business using information systems for customer​ intimacy?

Mandarin Oriental​ Hotel’s customer-preference tracking system


In its simplest​ form, ___________ represents streams of raw facts with limited usefulness until organized.

Data


An information system can be defined technically as a set of interrelated components that collect​ (or retrieve),​ process, store, and distribute information to support which of the​ following?

Decision making and control in an organization


What is the name for the process of converting raw data into a more meaningful​ form?

Processing


What is the name for the field that deals with behavioral issues as well as technical issues surrounding the​ development, use, and impact of information systems used by managers and employees in the​ firm?

Management Information Systems


Information​ systems, management information​ systems, information​ technology, information​ management, and computer information systems are often confused with one another. Which of these focuses primarily on hardware and​ software?

Information Technology


Which of the following is NOT an element of critical​ thinking?

Providing iterative feedback


Which of the following business problems is NOT a problem in the technology​ dimension?

Complexity of task


Which of the following is NOT a step in the​ problem-solving process?

Solution analysis


Which of the following is NOT considered to be a typical people​ problem?

Political Conflict


The problem solving model consists of problem​ identification, solution​ design, ________________, and implementation.

Solution evaluation and choice


in this​ video, samir describes how business executives use a bi application to drill down and see​ _____ data, the detail in the data such as data on a particular store or data on a particular item.

Granular


If you are solving a problem using the problem solving​ model, the phase where you identify as many possible solutions as possible would represent the​ ___________ phase.

Solution Design


The final phase of the problem solving model is the​ ___________ phase.

Implementation


Accountants rely heavily on information systems to do all of the following EXCEPT​ ________.

Manage financial investments


Which of the following is FALSE about the information systems occupations through​ 2022?

Offshore outsourcing will decrease demand in the US for managerial IS positions


​_____________ is the largest single group in the U.S. business labor force and this group dramatically benefits from information to help with the decision making process.

Management


Among fields such as​ accounting, finance,​ marketing, and​ others, which has undergone the most change because of technology in the past 5​ years?

Marketing


Checking for quality and paying creditors would fall within which two functional​ areas?

Manufacturing and​ production, and finance and accounting


Enterprise Systems are also known as​ ________________.

Enterprise Resource Planning​ (ERP) Systems


​ESS, DSS, and MIS systems all fall under the generic term of​ _______ systems as they help with the decision making process.

Business Intelligence


What solution would a corporation use if they had a collection of mostly older systems which they wanted to connect to one​ another?

Enterprise applications


​_____ refers to the use of social networking to extend a​ business’ collaboration efforts in order to engage and connect better with their​ employees, suppliers,​ and/or their customers.

Social Business


Based on the information in this​ video, which of the following is the most accurate description of a business intelligence​ system?

an information system that processes data into information containing​ patterns, relationships, and trends


In this​ video, Samir describes how business executives use a BI application to drill down and see​ _____ data, the detail in the data such as data on a particular store or data on a particular item.

Granular


According to​ Samir’s explanation to​ Ryan, all of the following statements about data marts are true except​ _____.

They are larger than data warehouses.


In this​ video, Samir describes the role of the business intelligence team in three primary activities that include data​ acquisition, data​ analysis, and​ _____.

Publishing results


Based on the information in this​ video, modern business intelligence reporting tools use​ _____ interfaces that display the results of data analysis.

Graphical Dashboard


ABB implemented a​ __________ system to help staff more effectively locate information about company projects and initiatives.

dynamic knowledge sharing


An antique dealer buying items and hoping to sell them for more than he or she paid for them is the very definition of​ a:

business


The four major functions of a business include​ manufacturing/production, sales/marketing,​ finance/accounting, and​ _________________.

human resources


Which of the following statements represents a responsibility of the sales and marketing functional​ area?

Identifying customers


in this​ video, samir describes how business executives use a bi application to drill down and see​ _____ data, the detail in the data such as data on a particular store or data on a particular item.

Granular


The order fulfillment process involves which of the following functional areas of the​ business?

​Sales, accounting,​ manufacturing, and production


Which of the following is FALSE about the needs for information by different groups in an​ organization?

Knowledge workers need access to financial performance information.


A secretary assisting management is considered a​ _________ worker.

Data


Which of the following entities is NOT a part of the​ firm’s environment?

Employees


​____________ focus on​ day-to-day operations of a business including managing​ sales, payroll, and receipts.

Transaction processing systems


in this​ video, samir describes how business executives use a bi application to drill down and see​ _____ data, the detail in the data such as data on a particular store or data on a particular item.


Granular

_______________ is an emerging area where data is organized in a meaningful way to help managers make​ data-driven business decisions.

Business Intelligence


Examining a map that depicts different colors based on flu outbreaks is an example of a digital​ ____________.

Dashboard


​__________________ are designed to capture critical​ processes, procedures, and experience to ensure this critical content​ isn’t lost when someone leaves the organization.

Knowledge management systems


eBay is an example of​ a/n ___________ because it sells products over the Internet.

Electronic Commerce


Someone visiting a government website to purchase a fishing license is specifically an example​ of:

E-government


​________________ commonly involves sites like Twitter and Facebook to collaborate with customers.

Social Business


Which of the following is NOT a reason that collaboration and teamwork are more important today than​ ever?

Growth of outsourcing


A​ ______________ is a social website that allows groups to meet together and share knowledge about a specific area like​ coins, space, or stamps.

community


Which of the following is NOT an application used in social​ business?

Email


​___________ commerce is a way for individuals to provide feedback and reviews about products and services.

Social


Which of the following is a file storage and synchronization service for cloud​ storage, file​ sharing, and collaborative​ editing?

Google Drive


A key benefit of collaboration is​ _______________, which focuses on deriving better and more unique ideas for products and services.

Innovation


Which capability of social software allows users to use​ real-time information​ streams, status​ updates, and​ announcements?

Feeds and Notifications


​_________________ are information systems professionals who help bridge the relationships between programmers and end users to identify requirements for improved systems.

Systems Analysts


What is the advantage of having a centralized information services​ department, which operates as a separate department similar to other​ departments?

This is more likely to produce more compatible systems and more coherent​ long-term systems development plans.


A​ ________ is a senior manager who oversees the use of IT in the firm.

CIO


For the sale of online used textbooks with many suppliers and low cost to switch to a different​ supplier, is an example​ of:

Customers having a lot of power


What are the four generic information system strategies for dealing with competitive​ forces?

​Low-cost leadership, product​ differentiation, focus on market​ niche, and strengthening customer and supplier intimacy


What is the domestic exporter strategy characterized​ by?

Heavy centralization of corporate activities in the home country of origin


in this​ video, samir describes how business executives use a bi application to drill down and see​ _____ data, the detail in the data such as data on a particular store or data on a particular item.

Granular


Transnational firms have no single national headquarters but instead have many regional headquarters and perhaps a world headquarters. What is the transnational strategy characterized​ by?

Nearly all the​ value-adding activities are managed from a global perspective without reference to national borders.


Six sigma is a specific measure of​ _________, representing​ ____________________.

​quality; 3.4 defects per million opportunities


Based on the information provided in this​ video, Porter’s Five Forces Model is useful to analyze a business and identify its​ _____.

strategic position within its industry


As David explains to​ Lauren, which of the following can force a business and its competitors to compete on​ price?

bargaining power of buyers


In this video​ dramatization, David diagrams Michael​ Porter’s Five Forces Model. The force at the center of this model that is affected by the other forces is the​ _____.

intensity of rivalry within the industry


According to​ David, Walmart negotiates with manufacturers and wholesalers to keep their profit margins low so that Walmart can offer lower prices to its customers. This is an example of​ _____.

strong bargaining power of buyers​ [Walmart is the​ buyer]


Walmart’s decision to build fulfillment centers illustrates which force in​ Porter’s Five Forces​ Model?

Threat of new entrants


Which of​ Porter’s competitive forces model would describe an organization that loses customers due to its product prices being too​ high?

Substitute products and services


Which of the following is NOT an impact of the Internet on competitive forces and industry​ structure?

Reduces the price of products and services


Which type of activity within the value chain model is directly related to the production and distribution for a​ firm’s products and​ services?

Primary activities


Which of the following is NOT an example of a primary activity in the value​ chain?

Human resources management


Which of the following is NOT a way that information systems provide a competitive​ advantage?

Collecting and storing large amounts of data


​Porter’s Five Forces Model states that the intensity of the competitive forces determines all of the following EXCEPT industry​ ________.

segmentation


Which of the following is NOT part of the description of a value​ web?

They promote communication among units.


When a firm does something in which they are a​ world-class leader, that activity would be considered to be a​ _____________ for the company.

core competency


If​ Koa’s Puppy Food Corporation maintains a highly centralized operation with all corporate operations taking place in its home​ country, it is said to have a​ ___________ global strategy.

Domestic Exporter


A networked system configuration supports which of the following international business​ strategies?

Multinational and transnational


If​ Koa’s Puppy Food Corporation maintains a highly centralized operation with financial​ management, but decentralizes production and marketing to other​ countries, is said to have a​ ___________ global strategy.

Multinational


If​ Koa’s Puppy Food Corporation maintains a strategy to take advantage of local competitive advantages and avoids the notion of national​ boarders, it is said to have a​ ___________ global strategy.

Transnational


Companies often use information systems to improve quality by​ ______________ as a way to set standards for products and services against predefined standards.

Benchmarking


To help improve​ quality, Delta Airlines installed customer care systems at some of its airport gates. The goal of this information system is to improve​ ______________________.

customer service and the quality of the product


Automobiles have the opportunity to use​ computer-aided design​ (CAD) to create virtual models of parts and even prototype vehicles. This use of information systems to improve quality is related to​ ______________________.

improving design quality and precision


The acronym related to organizational​ improvements, TQM, stands for​ ____________________.

Total quality management


The popular quality management technique that specifically calls for 3.4 defects per million opportunities is called​

six sigma


​______________ is a​ term, when described from a customer​ perspective, that involves demanding​ durability, safety, ease of​ use, as well as service effectiveness and responsiveness.

Quality


​______________ is the total time it takes a child to purchase lemonade​ ingredients, create the​ lemonade, and set up operations for a neighborhood lemonade stand.

Cycle Time


​______ is the acronym related to a leading model for improving business processes to enhance competitiveness.

BPM


​____________ is the final and ongoing step of the business process management model.

Continuous Measurement


Which of the following is FALSE regarding the description of business process management​ (BPM)?

It works on increasing process throughput and quality.


In the Datacard​ Case, the company decided on a complete business process transformation. An example of a successful business process redesign described in the case included​ ________________.

the distribution of pricing to​ Datacard’s partners


​____________ is a business process improvement model which is most know———-

n and used when dramatic change is needed to gain improvements in productivity and efficiency.

Business process reengineering


With​ E-commerce and the​ Internet, which of the following depicts a trend in​ advertising?

​E-commerce and Internet advertising have grown while traditional advertising and commerce have remained flat.


What is emerging as a major business area of innovation that offers a flexible collection of computers on the Internet that can perform tasks previously performed on corporate​ computers?

Cloud computing


If you include​ hardware, software,​ networking, and necessary management​ consulting, this amounts to over​ ________ in 2015 in the United States

​$1 trillion


A collection of computers on the Internet that allow for innovations such as software as a service​ (SaaS) is simply called​ (the):

Cloud.


IoT stands for​ the:

Internet of Things


For​ technology, which are the three interrelated advances that make MIS so exciting now and into the​ future?

Big​ data, cloud​ computing, and the mobile digital platform


Which of the following most accurately describes an information​ system?

A set of components that​ gather, analyze,​ store, and utilize information for making better decisions for a firm


What are the dimensions of information​ systems?

​Organizations, People, and Information Technology


​Apple’s ITunes and a traditional music store have very different business​ ___________ with regards to how they produce and deliver products to customers.

Models


An online store asking you to complete a customer satisfaction survey to better understand its customers after making a purchase is primarily addressing which business​ objective?

customer and supplier intimacy


An example of the business objective​ ___________ would include one online coin shop offering a free app that can detect fake​ coins, and all other online stores following this strategy or potentially going out of business.

Survival


​_____ is output from an information system that is returned to key people who analyze it​ to, evaluate​ it, and refine inputs for the system.

Feedback


What are the steps of the problem solving​ process?

Problem​ Identification, Solution​ Design, Solution Evaluation and​ Choice, and Implementation


What are the four elements of critical​ thinking?

Maintaining doubt and suspending​ judgment, Being aware of different​ perspectives, Testing alternatives and letting experience​ guide, and Being aware of organizational and personal limitations


The​ Problem-Solving Model consists of​ __________________, solution​ design, solution evaluation and​ choice, and implementation.

problem identification


The​ Problem-Solving Model phase where you determine a performance discrepancy that might be caused by an outdated system is the​ ________ phase.

problem identification


Regarding dimensions of business​ problems, a lack of properly trained employees is considered a​ ______________ dimension.

People


Which of the following is false about information​ systems?

Customers and suppliers are considered important elements of the information system as they provide key data.


​_________ is when a company transfers tasks of the firm to other firms that operate in​ low-wage countries, possibly reducing job opportunities within the U.S.

Offshoring


What are the major objectives that businesses use information systems to​ achieve?

Operational​ excellence, new​ products, services, and business​ models; customer/supplier​ intimacy; improved decision​ making; competitive​ advantage; and​ day-to-day survival


Because important financial documents are required to be submitted via the Internet in formats such as​ XBRL, ______________ has been impacted by information systems.

Accounting


​_________________ has been impacted by information systems as things like traditional guest comment cards are transformed into online guest comment cards.

Marketing


Outsourcing to domestic U.S. firms and​ _____________ outsourcing are both considered ways to reduce costs by US organizations.

Offshore


Expansion to global markets requires more coordination of resources for a firm to create their goods. This has transformed the need for information systems for the field of​ ________________.

Operations management


Checking for quality and paying creditors would fall within which two functional​ areas?

Manufacturing and​ production, and finance and accounting


Enterprise Systems are also known as​ ________________.

Enterprise Resource Planning​ (ERP) Systems


Business​ ______________ are the strategized steps and activities that are coordinated within an organization.

processes


​_______________________ are the functional business processes responsible for quality assurance.

manufacturing and production


​_______________________ is the functional business process responsible for managing cash accounts.

finance and accounting


​Technology, economy,​ politics, and global changes are typically classified best by which of the​ following?

​Broad, general, external environment groups that influence an​ organization’s strategy


in this​ video, samir describes how business executives use a bi application to drill down and see​ _____ data, the detail in the data such as data on a particular store or data on a particular item.

Granular


ESS, DSS, and MIS systems all fall under the generic term of​ _______ systems as they help with the decision making process.

business intelligence


What solution would a corporation use if they had a collection of mostly older systems which they wanted to connect to one​ another?

Enterprise Applications


​________________ focus(es) on providing decision making data available for middle managers to make sound business decisions.

Management information systems


in this​ video, samir describes how business executives use a bi application to drill down and see​ _____ data, the detail in the data such as data on a particular store or data on a particular item.

Granular


Creating a new system that provides charts and graphs to assist senior management make​ non-routine decisions is called​ (a):

Executive support systems.


Systems designed to help maintain and improve customer data and its relationship with customers are called​ __________________ systems.

customer relationship management


in this​ video, samir describes how business executives use a bi application to drill down and see​ _____ data, the detail in the data such as data on a particular store or data on a particular item.

Granular


A single screen of graphs or charts of key performance indicators is known as​ a(n) ________________________.

digital dashbaord


​_____ refers to the use of social networking to extend a​ business’ collaboration efforts in order to engage and connect better with their​ employees, suppliers,​ and/or their customers.

Social Business


What is social​ business?

Use of social networking platforms to engage​ employees, customers, and suppliers


An important word associated with social business is​ ___________ which includes​ customers, suppliers,​ employees, managers, and oversight committees.

conversations


​___________________ is/are an application of social business that allows for the opportunity to share documents.

File Sharing


Virtually anyone can set up​ a(n) ________________, an application of social business which allows for publishing opinions and experiences about a variety of topics.

Blog


Which of the following is an interorganizational system that provides a seamless flow of information to both suppliers of raw materials as well as to​ customers?

supply chain management system


​_____ is responsible for​ enterprise-wide governance and usage of information to maximize the value of the​ organization’s data.

Chief data officer


Many companies have social networks that gather and use information from customers and employees thus creating an important role for the​ _____ to coordinate the protection of all data.

chief privacy officer


When a leading discount​ store’s database was​ breached, a lot of attention was on the​ company’s ____________________, who is specifically responsible for training employees about security.

chief security officer


The senior leadership position responsible for the​ organization’s data is called the​ ____________ officer.

chief data


in this​ video, samir describes how business executives use a bi application to drill down and see​ _____ data, the detail in the data such as data on a particular store or data on a particular item.

Granular


The senior leadership position responsible for the​ organization’s internal knowledge​ (i.e. tacit​ knowledge) is called the​ ____________.

chief knowledge officer


​_____ are the people or​ groups, both internal and external to the​ organization, for whom applications are developed.

end users


For the sale of online used textbooks with many suppliers and low cost to switch to a different​ supplier, is an example​ of:

customers having a lot of power.


What are the four generic information system strategies for dealing with competitive​ forces?

​Low-cost leadership, product​ differentiation, focus on market​ niche, and strengthening customer and supplier intimacy


Michael Porter developed the​ ________________ model, which emerged as a leading model for better understanding the important concept of competitive advantage.

competitive forces


​Porter’s competitive forces model includes​ _________ forces that impact every organization.

5


​Porter’s competitive force concerned about barriers to entry​ is/are _______________.

new market entrants


in this​ video, samir describes how business executives use a bi application to drill down and see​ _____ data, the detail in the data such as data on a particular store or data on a particular item.

Granular


Homepage