2 1Purchasing prepackaged systems is always the best approach to solve IT needs.
3 2Requirements collection is the process of gathering and organizing information from users, managers, business processes, and documents to understand how a proposed information system should function.
4 3Spoofing is the practice of pretending to be an authorized user, similar to identity theft.
5 4A report is a business document containing some predefined data and often some spaces for additional information.
6 5A trademark is used by firms for the purpose of distinguishing its goods and services from those of another firm.
7 6Since ERP applications are designed to service external business activities, they tend not to be well suited for managing value system activities.
8 7Management and users do not need to understand the development process in order to have an IT system that meets the organizations business needs.
9 8Programming is the process of transforming the system design into a working computer system.
10 9Procurement includes the design and development of applications that support the primary business activities.
11 10The flow of information though a set of business activities is referred to as a value chain in which information flows through functional areas that facilitate the internal activities of the business.
12 11The collection and structuring of system requirements is arguably the most important activity in systems development.
13 A certificate authority is a third-party entity. 12A certificate authority is a third-party entity.
14 13Sharing information between organizations helps companies to adapt more quickly to changing business processes.
15 14Each department normally has its own computing system that runs its necessary applications.
16 15Many companies utilize SCM applications to accelerate production.
17 16Outside acquisition is the practice of turning over responsibility of some to all of the organizations information system development and operations to an outside firm.
18 17Support activities are business activities that enable the primary activities to take place and include infrastructure, human resources, technology development and procurement.
19 18The system maintenance process parallels the process used for the initial development of the information system.
20 19Applications focusing on downstream information flows accelerate product development and reduce costs associated with procuring raw materials, components and services from suppliers.
21 20Factors such as duration and complexity usually don't have much influence on the selection of a given project.
22 21Vendors such as Siebel Systems work with consulting firms such as Accenture and IBM rather than maintaining a huge, internal implementation division.
23 22The development costs of custom systems are much lower than packaged applications due to the time, money and resources that are required to design and develop them.
24 23Most organizations enter into a strictly legal contract with an outsourcing vendor.
26 25Internally focused systems coordinate business activities with customers, suppliers, business partners and others who operate outside the organizations boundaries.
27 26Legacy systems are typically older systems that are either fast approaching or beyond the end of their useful life within the organization.
28 27During the system logic phase, the details of the chosen approach are developed.
29 28Decomposing large problems into smaller programs makes the systems development process more difficult to maintain._
30 29ERP implementations will go more smoothly when companies change their business practices to fit the way the ERP software operates.
31 30Processing logic represents the way in which data are transformed.
32 31Social engineering refers to the practice of gaining access to a computer system by tricking honest employees into revealing passwords or access codes.
33 32ERP implementations are often used as a control for overall improvement of underlying business processes.
34 33Intellectual property refers to property that is subject to copyright, trademark, or patent legislation.
35 34Enterprise systems affect the entire organization and, thus companies should include personnel from different levels and departments in the implementation project.35Most organizations can exist effectively without utilizing information systems.
36 36Neither logic bombs nor time bombs reproduce themselves.
37 37Management information systems are information systems that allow companies to integrate information across operations on a company-wide basis.
38 38Canadian National Railways (CNadopted an SCM package from I2 Technologies to forecast its business opportunities as well as to translate incoming market information.
39 39It is during the testing phase that the largest part of the system development occurs.
40 4 0The physical data model is more complete and shows more data than the conceptual data model.
42 42Cybersquatting is the practice of registering a domain name that refers to another person or entity.
43 43The further out in the supply chain one looks, the less and less suppliers are involved.
44 44The U.S. government fought to maintain control over encryption keys until 1999 when federal regulations were written that allowed for the exportation of strong encryption programs.45The service side of CRM brings with it many opportunities to gain competitive advantage by providing customized, individual attention to existing customers.
45 46In a survey of 64 Fortune 5 companies that have implemented enterprise systems, 25 percent have experienced productivity problems after going live.
46 47The "digital divide" refers to those with high-speed Internet access compared with those who have only slow (dial-upInternet connections.
47 48Enterprise Planning systems are applications that integrate business activities across departmental boundaries.49An upstream information flow relates to the information that is produced by a company and sent along to another organization.
48 5The functional area of outbound logistics focuses on the distribution of the end products.
49 51Salami slicing is a form of identity theft where a cracker intends to extract money from another's bank account without the persons knowledge or consent.
50 52Different approaches for identifying and selecting projects are likely to have different organizational outcomes.
51 53Enterprise systems come in a variety of shapes and sizes, each providing a unique set of features and functionality.
52 54Projects identified by top management tend to have a strategic organizational focus.
53 55The single most important factor of an ongoing outsourcing alliance is ongoing management.
54 56The process of designing, building, and maintaining information systems is often referred to as systems analysis and design
55 57The term "computer literacy" refers to ones ability to read content from Web pages.
56 58ERP systems are stand-alone applications that are purchased from software vendors such as BAAN, Oracle and PeopleSoft.
57 59The term systems development life cycle is used to describe the life of a information system from conception to retirement.
58 6According to SAP Canada, executive sponsorship is inextricably linked to employee involvement and motivation.
59 61Any information that feeds into a company's value chain, whether its source is another company's value chain or an end consumer, is considered to be part of the value system.
60 62Sales modules in CRM applications include SFA functions which are designed to assist companies with the postsales aspects of the business activities, such as marketing and prospecting.63To determine the organizations CSFs, the analyst only interviews top management.
61 64Running different applications on similar computing platforms can create tremendous inefficiencies within organizations because data cannot readily be shared between the systems.
62 65It is uncommon to have enterprise system implementation projects that run over budget.
63 66With the increase of both computer-based communication between individuals and online databases, the individual(swho has the right to collect, access and monitor this information has raised many IS ethical concerns.
64 67Customer Relationship Management applications concentrate on the upstream information flows, integrating the value chains of a company and its distributors.
65 68The primary reason that enterprise system implementation fail is believed to be a direct result of a lack of top-level management support.
66 69Interorganizational systems could be used to coordinate the flow of information from a company to its potential or existing customers who exist outside the organization.
67 7Companies need to have a distributed system that captures information from the various methods they use to communicate upstream with their suppliers.
68 71Given that older systems are not designed to communicate with other applications beyond departmental boundaries, they are classified as legacy systems.
69 72A firewall is a virus that prevents authorized users from accessing their own computer accounts.
70 73A close and mutually respectful working relationship between analysts and users is a key to project success.
71 74In Canada, the Personal Information Protection and Electronic Documents Act (PIPEDAbecame fully operative on January 1, 2 4.
72 75The asymmetric, or public key technology uses two keys for encryption.