Presentation on theme: "1 Purchasing prepackaged systems is always the best approach to solve IT needs."— Presentation transcript:
1 Purchasing prepackaged systems is always the best approach to solve IT needs.
2 Requirements collection is the process of gathering and organizing information from users, managers, business processes, and documents to understand how a proposed information system should function.
3 Spoofing is the practice of pretending to be an authorized user, similar to identity theft.
4 A report is a business document containing some predefined data and often some spaces for additional information.
5 A trademark is used by firms for the purpose of distinguishing its goods and services from those of another firm.
6 Since ERP applications are designed to service external business activities, they tend not to be well suited for managing value system activities.
7 Management and users do not need to understand the development process in order to have an IT system that meets the organizations business needs.
8 Programming is the process of transforming the system design into a working computer system.
9 Procurement includes the design and development of applications that support the primary business activities.
10 The flow of information though a set of business activities is referred to as a value chain in which information flows through functional areas that facilitate the internal activities of the business.
11 The collection and structuring of system requirements is arguably the most important activity in systems development.
12 A certificate authority is a third-party entity.
13 Sharing information between organizations helps companies to adapt more quickly to changing business processes.
14 Each department normally has its own computing system that runs its necessary applications.
15 Many companies utilize SCM applications to accelerate production.
16 Outside acquisition is the practice of turning over responsibility of some to all of the organizations information system development and operations to an outside firm.
17 Support activities are business activities that enable the primary activities to take place and include infrastructure, human resources, technology development and procurement.
18 The system maintenance process parallels the process used for the initial development of the information system.
19 Applications focusing on downstream information flows accelerate product development and reduce costs associated with procuring raw materials, components and services from suppliers.
20 Factors such as duration and complexity usually don't have much influence on the selection of a given project.
21 Vendors such as Siebel Systems work with consulting firms such as Accenture and IBM rather than maintaining a huge, internal implementation division.
22 The development costs of custom systems are much lower than packaged applications due to the time, money and resources that are required to design and develop them.
23 Most organizations enter into a strictly legal contract with an outsourcing vendor.
24 A worm virus usually does not destroy files.
25 Internally focused systems coordinate business activities with customers, suppliers, business partners and others who operate outside the organizations boundaries.
26 Legacy systems are typically older systems that are either fast approaching or beyond the end of their useful life within the organization.
27 During the system logic phase, the details of the chosen approach are developed.
28 Decomposing large problems into smaller programs makes the systems development process more difficult to maintain. _
29 ERP implementations will go more smoothly when companies change their business practices to fit the way the ERP software operates.
30 Processing logic represents the way in which data are transformed.
31 Social engineering refers to the practice of gaining access to a computer system by tricking honest employees into revealing passwords or access codes.
32 ERP implementations are often used as a control for overall improvement of underlying business processes.
33 Intellectual property refers to property that is subject to copyright, trademark, or patent legislation.
34 Enterprise systems affect the entire organization and, thus companies should include personnel from different levels and departments in the implementation project. 35 Most organizations can exist effectively without utilizing information systems.
36 Neither logic bombs nor time bombs reproduce themselves.
37 Management information systems are information systems that allow companies to integrate information across operations on a company-wide basis.
38 Canadian National Railways (CNadopted an SCM package from I2 Technologies to forecast its business opportunities as well as to translate incoming market information.
39 It is during the testing phase that the largest part of the system development occurs.
4 0 The physical data model is more complete and shows more data than the conceptual data model.
41 An ERD is a type of data model.
42 Cybersquatting is the practice of registering a domain name that refers to another person or entity.
43 The further out in the supply chain one looks, the less and less suppliers are involved.
44 The U.S. government fought to maintain control over encryption keys until 1999 when federal regulations were written that allowed for the exportation of strong encryption programs. 45 The service side of CRM brings with it many opportunities to gain competitive advantage by providing customized, individual attention to existing customers.
46 In a survey of 64 Fortune 5 companies that have implemented enterprise systems, 25 percent have experienced productivity problems after going live.
47 The "digital divide" refers to those with high-speed Internet access compared with those who have only slow (dial-upInternet connections.
48 Enterprise Planning systems are applications that integrate business activities across departmental boundaries. 49 An upstream information flow relates to the information that is produced by a company and sent along to another organization.
5 The functional area of outbound logistics focuses on the distribution of the end products.
51 Salami slicing is a form of identity theft where a cracker intends to extract money from another's bank account without the persons knowledge or consent.
52 Different approaches for identifying and selecting projects are likely to have different organizational outcomes.
53 Enterprise systems come in a variety of shapes and sizes, each providing a unique set of features and functionality.
54 Projects identified by top management tend to have a strategic organizational focus.
55 The single most important factor of an ongoing outsourcing alliance is ongoing management.
56 The process of designing, building, and maintaining information systems is often referred to as systems analysis and design
57 The term "computer literacy" refers to ones ability to read content from Web pages.
58 ERP systems are stand-alone applications that are purchased from software vendors such as BAAN, Oracle and PeopleSoft.
59 The term systems development life cycle is used to describe the life of a information system from conception to retirement.
6 According to SAP Canada, executive sponsorship is inextricably linked to employee involvement and motivation.
61 Any information that feeds into a company's value chain, whether its source is another company's value chain or an end consumer, is considered to be part of the value system.
62 Sales modules in CRM applications include SFA functions which are designed to assist companies with the postsales aspects of the business activities, such as marketing and prospecting. 63 To determine the organizations CSFs, the analyst only interviews top management.
64 Running different applications on similar computing platforms can create tremendous inefficiencies within organizations because data cannot readily be shared between the systems.
65 It is uncommon to have enterprise system implementation projects that run over budget.
66 With the increase of both computer-based communication between individuals and online databases, the individual(swho has the right to collect, access and monitor this information has raised many IS ethical concerns.
67 Customer Relationship Management applications concentrate on the upstream information flows, integrating the value chains of a company and its distributors.
68 The primary reason that enterprise system implementation fail is believed to be a direct result of a lack of top-level management support.
69 Interorganizational systems could be used to coordinate the flow of information from a company to its potential or existing customers who exist outside the organization.
7 Companies need to have a distributed system that captures information from the various methods they use to communicate upstream with their suppliers.
71 Given that older systems are not designed to communicate with other applications beyond departmental boundaries, they are classified as legacy systems.
72 A firewall is a virus that prevents authorized users from accessing their own computer accounts.
73 A close and mutually respectful working relationship between analysts and users is a key to project success.
74 In Canada, the Personal Information Protection and Electronic Documents Act (PIPEDAbecame fully operative on January 1, 2 4.
75 The asymmetric, or public key technology uses two keys for encryption.