The key use of the manufacturing execution module of supply chain management is to ________.
safety stock and target stock levels in all inventories in the supply network
forecast and plan anticipated demand for products
support receiving, storing, and picking of goods in a warehouse
support production processes, taking into account capacity and material constraints
ensure that the materials required for production are available where needed and when needed
________ refers to any software that covertly gathers information about a user through an Internet connection without the user’s knowledge.
With regards to the World Wide Web, Web pages are stored on ________.
Which of the following statements is true about an explicit knowledge asset?
It reflects a person’s ability to effectively solve a problem without external help.
It reflects the strategies that can be applied to an enterprise resource planning system.
It reflects knowledge that can be documented, archived, and codified, often with the help of information systems.
It reflects the processes and procedures that are located in a person’s mind on how to effectively perform a particular task.
It reflects an individual’s special knowledge about a new-to-the-world product.
Which of the following laws makes it mandatory for organizations to demonstrate that there are controls in place to prevent misuse and detect any potential problems?
Trade Expansion Act of 1962
U.S.A. Patriot Act
Central Intelligence Agency Act
Electronic Communications Privacy Act of 1986
At the ________ level of an organization, information systems provide key performance indicators (KPIs) that are focused on balancing performance across the organization.
In the order-to-cash process, checking credit is followed by ________.
creating an order
picking, packing, and shipping
preparing and sending the invoice
________ activities encompass all business activities associated with employee management, such as hiring, interview scheduling, payroll, and benefits management.
________ testing is testing of the overall system to see whether it meets design requirements.
Responding to threats and opportunities and continuous planning are based on analyzing internal data primarily from the ________ level of an organization.
The network effect refers to the notion that the value of a network is dependent on ________.
the speed of the network
the technical expertise of the moderators
the knowledge of the users
the commitment of the users
the number of other users
________ attempts to increase the relevance of search results by including content from blogs and microblogging services.
With respect to the components of a business model, ________ is the utility that the product/service must offer to customers.
The term ________ was coined by Harvard business professor Jeffrey Rayport to describe how good business techniques can be driven by word-of-mouth or person-to-person communication.
________ are false messages circulated online about new viruses, earthquakes, kids in trouble, cancer causes, or any other topic of public interest.
Computer criminals who attempt to break into systems or deface Web sites to promote political or ideological goals are called ________.
Controls that are used to assess whether anything went wrong, such as unauthorized access attempts, are called ________ controls.
________ systems are designed to handle multiple concurrent transactions from customers.
Network transaction maximization
Online transaction processing
Yield optimization management
Real utility management
Which of the following statements is true about the e-business innovation cycle?
The vertical dimension of the cycle shows the efficiency of a particular information technology and the horizontal dimension shows life expectancy of that information technology.
The vertical dimension of the cycle shows the extent to which an organization derives value from a particular information technology and the horizontal dimension shows time.
The vertical dimension of the cycle shows the life expectancy of a particular information technology and the horizontal dimension shows time.
The vertical dimension of the cycle shows the expected investments required for a particular information technology and the horizontal dimension shows time.
The vertical dimension of the cycle shows the user-friendliness of a particular technology and the horizontal dimension shows the investment in that technology.
The organization waits for an order, allowing the organization to initiate a ________ sequence to move the order through the production process.
Analytical tools are used to optimally utilize materials, equipment, and labor during the ________ process of supply chain planning.
safety stock scheduling
A ________ is defined as an economic system in which assets or services are shared between private individuals, either free or for a fee.
How can the effectiveness of e-mail advertising campaigns be measured directly?
by including special links in the e-mail that allow tracking which e-mails the customers have opened or reacted to
by reflecting the percentage of visitors who actually perform the marketer’s desired action
by creating use cases and business models to determine the ratio of the opened mails to the sent mails
by reflecting the number of surfers who click on an ad divided by the number of times it was displayed
by conducting online polls, starting online forums, and collecting user feedbacks
________ planning focuses on delivering products or services to consumers as well as warehousing, delivering, invoicing, and payment collection.
Which of the following can be cited as an example of a digital divide?
Sam has better multitasking skills than Neal that make him a better manager.
Kevin has better chances of promotion when compared to Vincent because of his people skills.
Lora has access to more information than Frank because she knows how to operate a computer.
Unlike Joey, Ryan has access to more books and good advice because he studies in a better school.
Unlike Ben, Claudia possesses superior analytical skills that make her better at mathematics.
A company implements a new information system and observes a 5 percent increase in its monthly sales. This is a(n) ________ of the system.
In e-business terminology, ________ companies are sometimes called pure play companies.
Managers at the ________ level include the president and chief executive officer, vice presidents, and possibly the board of directors.
Identify a true statement about reintermediation regarding e-tailing.