21Purchasing prepackaged systems is always the best approach to solve IT needs.
32Requirements collection is the process of gathering and organizing information from users, managers, business processes, and documents to understand how a proposed information system should function.
43Spoofing is the practice of pretending to be an authorized user, similar to identity theft.
54A report is a business document containing some predefined data and often some spaces for additional information.
65A trademark is used by firms for the purpose of distinguishing its goods and services from those of another firm.
76Since ERP applications are designed to service external business activities, they tend not to be well suited for managing value system activities.
87Management and users do not need to understand the development process in order to have an IT system that meets the organizations business needs.
98Programming is the process of transforming the system design into a working computer system.
109Procurement includes the design and development of applications that support the primary business activities.
1110The flow of information though a set of business activities is referred to as a value chain in which information flows through functional areas that facilitate the internal activities of the business.
1211The collection and structuring of system requirements is arguably the most important activity in systems development.
13A certificate authority is a third-party entity. 12A certificate authority is a third-party entity.
1413Sharing information between organizations helps companies to adapt more quickly to changing business processes.
1514Each department normally has its own computing system that runs its necessary applications.
1615Many companies utilize SCM applications to accelerate production.
1716Outside acquisition is the practice of turning over responsibility of some to all of the organizations information system development and operations to an outside firm.
1817Support activities are business activities that enable the primary activities to take place and include infrastructure, human resources, technology development and procurement.
1918The system maintenance process parallels the process used for the initial development of the information system.
2019Applications focusing on downstream information flows accelerate product development and reduce costs associated with procuring raw materials, components and services from suppliers.
2120Factors such as duration and complexity usually don't have much influence on the selection of a given project.
2221Vendors such as Siebel Systems work with consulting firms such as Accenture and IBM rather than maintaining a huge, internal implementation division.
2322The development costs of custom systems are much lower than packaged applications due to the time, money and resources that are required to design and develop them.
2423Most organizations enter into a strictly legal contract with an outsourcing vendor.
2625Internally focused systems coordinate business activities with customers, suppliers, business partners and others who operate outside the organizations boundaries.
2726Legacy systems are typically older systems that are either fast approaching or beyond the end of their useful life within the organization.
2827During the system logic phase, the details of the chosen approach are developed.
2928Decomposing large problems into smaller programs makes the systems development process more difficult to maintain._
3029ERP implementations will go more smoothly when companies change their business practices to fit the way the ERP software operates.
3130Processing logic represents the way in which data are transformed.
3231Social engineering refers to the practice of gaining access to a computer system by tricking honest employees into revealing passwords or access codes.
3332ERP implementations are often used as a control for overall improvement of underlying business processes.
3433Intellectual property refers to property that is subject to copyright, trademark, or patent legislation.
3534Enterprise systems affect the entire organization and, thus companies should include personnel from different levels and departments in the implementation project.35Most organizations can exist effectively without utilizing information systems.
3636Neither logic bombs nor time bombs reproduce themselves.
3737Management information systems are information systems that allow companies to integrate information across operations on a company-wide basis.
3838Canadian National Railways (CNadopted an SCM package from I2 Technologies to forecast its business opportunities as well as to translate incoming market information.
3939It is during the testing phase that the largest part of the system development occurs.
404 0The physical data model is more complete and shows more data than the conceptual data model.
4242Cybersquatting is the practice of registering a domain name that refers to another person or entity.
4343The further out in the supply chain one looks, the less and less suppliers are involved.
4444The U.S. government fought to maintain control over encryption keys until 1999 when federal regulations were written that allowed for the exportation of strong encryption programs.45The service side of CRM brings with it many opportunities to gain competitive advantage by providing customized, individual attention to existing customers.
4546In a survey of 64 Fortune 5 companies that have implemented enterprise systems, 25 percent have experienced productivity problems after going live.
4647The "digital divide" refers to those with high-speed Internet access compared with those who have only slow (dial-upInternet connections.
4748Enterprise Planning systems are applications that integrate business activities across departmental boundaries.49An upstream information flow relates to the information that is produced by a company and sent along to another organization.
485The functional area of outbound logistics focuses on the distribution of the end products.
4951Salami slicing is a form of identity theft where a cracker intends to extract money from another's bank account without the persons knowledge or consent.
5052Different approaches for identifying and selecting projects are likely to have different organizational outcomes.
5153Enterprise systems come in a variety of shapes and sizes, each providing a unique set of features and functionality.
5254Projects identified by top management tend to have a strategic organizational focus.
5355The single most important factor of an ongoing outsourcing alliance is ongoing management.
5456The process of designing, building, and maintaining information systems is often referred to as systems analysis and design
5557The term "computer literacy" refers to ones ability to read content from Web pages.
5658ERP systems are stand-alone applications that are purchased from software vendors such as BAAN, Oracle and PeopleSoft.
5759The term systems development life cycle is used to describe the life of a information system from conception to retirement.
586According to SAP Canada, executive sponsorship is inextricably linked to employee involvement and motivation.
5961Any information that feeds into a company's value chain, whether its source is another company's value chain or an end consumer, is considered to be part of the value system.
6062Sales modules in CRM applications include SFA functions which are designed to assist companies with the postsales aspects of the business activities, such as marketing and prospecting.63To determine the organizations CSFs, the analyst only interviews top management.
6164Running different applications on similar computing platforms can create tremendous inefficiencies within organizations because data cannot readily be shared between the systems.
6265It is uncommon to have enterprise system implementation projects that run over budget.
6366With the increase of both computer-based communication between individuals and online databases, the individual(swho has the right to collect, access and monitor this information has raised many IS ethical concerns.
6467Customer Relationship Management applications concentrate on the upstream information flows, integrating the value chains of a company and its distributors.
6568The primary reason that enterprise system implementation fail is believed to be a direct result of a lack of top-level management support.
6669Interorganizational systems could be used to coordinate the flow of information from a company to its potential or existing customers who exist outside the organization.
677Companies need to have a distributed system that captures information from the various methods they use to communicate upstream with their suppliers.
6871Given that older systems are not designed to communicate with other applications beyond departmental boundaries, they are classified as legacy systems.
6972A firewall is a virus that prevents authorized users from accessing their own computer accounts.
7073A close and mutually respectful working relationship between analysts and users is a key to project success.
7174In Canada, the Personal Information Protection and Electronic Documents Act (PIPEDAbecame fully operative on January 1, 2 4.
7275The asymmetric, or public key technology uses two keys for encryption.