Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
117 Cards in this Set
- Front
- Back
VALUE CHAIN
|
series of activities, each of which adds values/supports the addition of value to firms G+S
|
|
each action an org. takes, from securing the necessary raw mat. (input)-> making goods or serv. (process) -> completing transact. w/ customer (output) is either a ___ or ____ activity.
|
1. primary
2. support |
|
Activities directly related to prod. +dist. of org. prod +serv. that create bus. value for the org. and customers.
|
primary act.
|
|
Obtaining raw mat, creating prod, shipping it , selling are examples of what type of act.
|
primary act.
|
|
5 components of value chain
|
1. inbound logistics
2. operations 3. outbound logistics 4. mark.&sales 5. service |
|
Receiving, warehousing, inventory control of raw mat are part of which component in value chain
|
inbound logistics
|
|
value- creating/proprietary activ. that transform raw inputs into to final prod. are part of which component of value chain?
|
operations
|
|
activities that require to get te finished prod to customer(packaging, warehousing, order fulfillment) are part of which component of value chain?
|
outbound logistics
|
|
activities to get buyers to purchase prod & working w/ distributors, retailers, online channels...are part of which component of value chain?
|
Marketing &sales
|
|
Activities that maintain and enhance prod.'s value, (customer support, repair service, warranty, recall) are part of which component of value chain?
|
Service
|
|
Value chain act. that an org. conducts to support creation of bus. value including
1. firm infrastructure 2. tech. devel. 3. HR manag 4. procurement |
Support activities
|
|
8 types of IS (MOST common)
|
1. functional (FIS)
2 workflow manag. sys (WMS) 3. TPS 4. manag. info and document man.syst 5. knowledge manag sys 6. DSS 7. Supply chain man. 8. ERP (enterprise resource planning) |
|
type of IS divided along lines that corresponds to functional dep't.
|
Functional IS. (FIS)
|
|
acco IS, mark. IS, HR IS, Financial IS are examples of what type of IS
|
FIS
|
|
Type of IS that supports activities that several dep'ts of org may carry out and focuses on bus. process from beginning to end.
|
WMS (workflow man. syst)
|
|
Represents steps, resources, input and output data and tools needed to complete bus. process
|
Workflow
|
|
statement that defines/constrains some aspect of business
|
Business rule
|
|
Type of IS that controls flow of both activ. and data involved in transaction.
|
TPS
|
|
This IS must incorporate
- logic of controlling and enabling transactions - bus. rules of org. -necessary error- handling logic |
TPS
|
|
A transactions has the following 4 characteristics:
|
(ACID)
Atomicity (completed) Consistency (preserved) Isolation (independent) Durability (permanent) |
|
Type of IS that uses captured +stored data to create info for decision making.
|
MIS
|
|
3 types of reports generated by MIS
|
1. periodic
2. exception 3. demand |
|
Report updated/generated after specific time period has passed
|
periodic
|
|
report to monitor when/why exceptions occur of key values, critical to operation
|
exception
|
|
report generated based on user request (ex. based on querying)
|
demand
|
|
IS to provide summary info about bus. performance to those making higher- level strat. decisions
|
Executive info. syst (EIS)
|
|
IS that enters, tracks, routes, processes many documents used in org.( including all 3 reports as well)
|
Document man. syst. (DMS)
|
|
DMS can create doc. electronically and convert them to elect. form using ____ technology
|
imaging
|
|
Type of IS that involves, recognizes, manages, generates, shares knowledge
|
Knowledge man. syst (KMS)
|
|
form of knowledge manag. that tries to capture and store knowledge of human expert
|
expert syst. (tacit knowledge)
|
|
Knowledge man. syst are a form of ______that tries to provide computer applications that mimic human intelligence.
|
Artifcial intellignece
|
|
To support tacit knowledge manag, this software is used fir comm. tools, to form shared workspaces to store common files, conferencing tools..:
|
collaborative software (groupware)
|
|
Type of IS that help businesses use comm. techno., knowledge, models to orrganize/access date to perform decision-making act.
|
DSS
|
|
5 types of DSS
|
1. comm. driven
2. data-driven 3. document driven 4. knowledge driven 5. model driven |
|
conferencing tools, email chat are ex. of this type of DSS
|
comm. driven
|
|
Exec. IS, geog. IS, OLAP-enabled data warehouses are ex. of this type of DSS
|
Data driven
|
|
DMS, search services are ex. of this type of DSS
|
document- driven
|
|
expert syst., data mining are ex. of this type of DSS
|
knowledge-driven
|
|
financial, statistics, optimization and stimulation models are ex. of this type of DSS
|
model-driven
|
|
true/false
more value is created by keeping each component of value chain separate, focusing only on its contribution to bus. value |
false
|
|
a ____ allows the data from transact. to be processed and passed on immediately to org. data storage
a. DSS b. FIS c. WMS d. TPS |
d. TPS
|
|
___ are computer syst. that support teamwork, comm, and collaboration.
a. DSS b. groupware c. TPS d. WMS |
b.
|
|
this type of IS is manages materials, info and finances as they move from supplier to manuf. to wholesaler, to retailer to consumer.
|
Supply chain manag. (SCM)
|
|
a system involved in moving prod or serv. from supplier to customer
|
Supply chain
|
|
typical modules in any supply chain manag. include (4)
|
-material man.
- inventory man. - order man. - logistics man. |
|
This IS is the cornerstone and starting pt. of ERP syst. implementations
|
SCM
|
|
Software that integrates the dep'ts and functions across an org. , streamlines bus. processes and can support all areas of supply chain
|
ERP
|
|
Disadvantage of ERP
|
- can become highly complex and difficult to manage when it grows (requires customization)
|
|
large scale applications that support bus. units or functions (+another way that an org. might apply IT to its value chain)
|
Enterprise syst.
|
|
Enterprise syst that provides tools to service customers
|
CRM
|
|
enterprise syst that aims at automating and optimizing admin. processes to reduce costs and ensure efficiency
|
Admin. + finan. syst
|
|
enterprise syst that support recruiting, hiring, training and compensation
|
HR
|
|
enterprise syst that supports value-creating act. of the org. (Intranet for eg)
|
techno. develop.
|
|
raw materials necessary for prod/serv are acquired thru ____syst
|
procurement
|
|
Ways for IT to create bus. value
|
1. integrating techno (reduce costs)
2. develop specific IT strat. to eneable bus to implement strat. |
|
enterprise software that is essentially done by renting
|
Software as a Service (SaaS)
|
|
services that provide on-demand software, hosted on servers, which can be accessed from anywhere
|
utility computing serv.
|
|
software can be provided to organ. thru a ____
|
Application service provider (ASP)
|
|
An online techno company that develops and delivers software tools on Internet
|
ASP
|
|
true/false
metrics are not necessary when implementing an enterprise syst. because enterprise syst. always improve efficiency of value chain |
false
|
|
which of the following is not a source of enterprise syst
a. asp b. ide c. custom develop. d. saas |
b
|
|
operations and the IT syst. that support it tend to be ___as it is here that proprietary practives are used to gain comp. adv.
|
unique
|
|
4 views of how bus. can derive benefits by applying IT(strategically fitting IT to org.)
|
(SAInT)
Support of value chain Automating Informating Transforming |
|
process
-effected by an entity's stakeholders -applied strat. across enterprise - designed to identify potential events that may affect entity +manage risk to be within risk appetite |
ERM (enterprise risk management)
|
|
Adhering to the laws is refered to
|
Compliance
|
|
___reduces risk thru policies and processes that ensure proper financ. and acco procedures
|
compliance
|
|
5 risk reduction methods
|
1- risk transfer
2- risk deferral 3- risk reduction 4- risk acceptance 5- risk avoidance |
|
risk-reduction method that moves the risk to someonw who's more able to deal w/ it
|
risk transfer
|
|
risk reduction method that postpones exposure risk until it can be dealt w/ effectively
|
risk deferral
|
|
risk reduct. method that either reduces probab. of risk or lessen impact
|
risk reduction
|
|
risk -reduct. method that realize that some risks are unavoidable
|
risk acceptance
|
|
risk reduct. method that eliminate the possibility of risk occurring
|
risk avoidance
|
|
3 steps to applying risk framework
|
1. identify and categorize potential risks
2. assess risks and threats (impact and likelihood) 3. determine likelihood of doS attack using data from surveys for eg. |
|
the strengthening of internal controls and compliance thru application of IT based controls to bus processes, policies, and procedures
|
control advantage
|
|
process that runs throughout the org. influencing how people behave at work
|
control
|
|
specific actions, (policies+procedures) designed to ensure achievement of bus objectives
|
controls
|
|
preocess designed to provide reasonable assurance regarding:
- effectiveness and efficiency of operations - reliability of financ. reporting - compliance w/ applicable laws and regulations - could be preventive, detective, corrective |
internal control
|
|
7 internal control processes
|
1. segregation of duties
2. authorization 3. security 4. ID codes 5. verification 6. control totals 7. supervisory review |
|
internal control process that ensures that there are no conflicts of interest
|
segreg. of duties
|
|
internal control process defining scope of work
|
authorization
|
|
internal control process definining access rights
|
security
|
|
internal control process that create an audit trail that org. can follow to ensure proper controls
|
id codes
|
|
internal control process that can confirm that application is being accomplished
|
verification
|
|
internal control process that can help detect fraudulent actions
|
control totals
|
|
internal control process that allows for supervisors to periodically audit and review processes and transactions
|
supervisory review
|
|
which one of the following is not an organiz. response to risk
a. risk avoidance b. risk acceptance c. risk behaviour d. risk reduction |
c
|
|
true / false
corrective controls reduce risk by discovering when preventive controls have failed and providing notification that action must be taken |
false
|
|
1. A supply chain is a system of organizations, people, technology, activities, information, and resources involved in moving a product or service from supplier to customer.
A. True B. False |
a
|
|
The type of decision support system that focuses on retrieval and management of unstructured documents is:
A. communications-driven DSS B. data-driven DSS C. knowledge-driven DSS D. none of the above |
d
|
|
In order to streamline a business, software that works across the functions in an organization, using a single database, is called a:
A. supply chain management system B. enterprise resource planning system C. decision support system D. inventory management system |
b
|
|
Buying insurance is an example of:
A. risk deferral B. risk reduction C. risk acceptance D. risk transfer |
d
|
|
The strengthening of internal controls and compliance through the application of IT-based controls to business processes, policies and procedures is called:
A. control advantage B. control implementation C. business continuity plan D. strategy |
a
|
|
1. In the early days, management information systems (MIS) were used specifically to meet the need of storing processed transaction data as reports for managers.
A. True B. False |
a
|
|
Risk is an essential element of business.
A. True B. False |
b
|
|
The core components of a typical value chain include:
A. inbound and outbound logistics B. marketing and sales C. operations and service D. all of the above |
d
|
|
_______________ IS includes internal input items such as financial objectives and project needs, and external input items such as competitor and environmental data.
A. Marketing B. Human resources C. Financial D. Manufacturing |
c
|
|
A transaction is a unit of work that has the following characteristics:
A. isolation, durability B. processes, atomicity C. repeated, simplicity D. replicable, scheduled |
a
|
|
6. A characteristic of a periodic report is:
A. that it is created on demand B. that it monitors when exceptions occur C. it is created on a schedule (e.g., monthly) D. that it incorporates data into a mathematical model of a situation |
c
|
|
Which of the following is NOT a disadvantage of ERP systems?
A. They are incredibly complex. B. They force streamlining of business processes. C. They can be difficult to manage as they grow. D. They must be customized for the business processes they support. |
b
|
|
Which of the following activities are NOT considered part of “operations”?
A. Administrative processes B. Creation of product or service C. Manufacturing D. Design of new products |
a
|
|
Realizing that some risks are unavoidable and making sure that contingency plans are in place is an action associated with which risk response?
A. risk transfer B. risk acceptance C. risk reduction D. risk avoidance |
b
|
|
When compared to application service providers (ASP) , software as a service (SaaS) has the following characteristic:
A. client has some control over the system B. pricing model is either monthly, flat fee, or subscription C. for a price, can implement major deviations from the core product. D. none of the above |
d
|
|
________ are the value-creating and often proprietary activities that transform the raw inputs into the final product.
A. Inbound logistics B. Operations C. Outbound logistics D. Service activities |
b
|
|
__________ are those activities that maintain and enhance a product's value.
A. Inbound logistics B. Operations C. Outbound logistics D. Service activities |
d
|
|
An example of a functional information system (FIS) is:
A. accounting IS B. ERP C. TPS D. MIS |
a
|
|
Executive information systems are designed to:
A. store processed transaction data as reports B. provide summary information about business performance to those making higher level strategic decisions C. enter, track, route, and processes the many documents used in an organization D. generate reports such as periodic and exception reports |
b
|
|
Communications-driven decision support systems (DSS):
A. emphasize access to and manipulation of internal company data B. focus on retrieval and management of unstructured documents C. provide special problem-solving tools that help decision making by recommending actions to users D. focus on collaboration and shared decision making |
d
|
|
An example of knowledge-driven DSS is:
A. expert systems (es) B. financial and statistical models C. optimization and simulation models D. conferencing tools |
a
|
|
Supply chain management does the following:
A. manages materials, information, and finances as they move from supplier to manufacturer B. manages materials, information, and finances as they move from manufacturer to wholesaler C. manages materials, information, and finances as they move from wholesaler to retailer or customer D. all of the above |
d
|
|
Customer relationship management (CRM) systems support:
A. outbound logistics B. marketing and sales C. service D. operations |
c
|
|
Point of sale (POS) systems support which value chain component?
A. inbound logistics B. operations C. outbound logistics D. marketing and sales |
c
|
|
Software as a service (SaaS) has which of the following characteristics?
A. some ability to customize at a price but major deviations from the core product are discouraged B. provides clients with some control over the system in the form of administrator tools C. operates on a flat fee or subscription pricing model D. offers the option to connect to the system over a dedicated connection |
a
|
|
High-level goals, aligned with and supporting its mission, is what type of business objective?
A. reporting B. strategic C. operations D. compliance |
b
|
|
In response to risk, organizations may decide to use a strategy of “risk deferral” to:
A. move the risk to someone who is more able to deal with it B. postpone exposure to the risk until circumstances are more favourable C. reduce the probability of the risk D. lessen the impact of the risk |
b
|
|
Controls are specific actions, including policies and procedures, designed to ensure the achievement of business objectives. Corrective controls:
A. reduce risk by discovering when preventive controls have failed B. aim to remedy the situation and try to keep it from recurring C. are designed to prevent increased exposure to risk by stopping an action or process before it occurs D. provide notification when action must be taken |
b
|
|
An example of a preventative control is:
A. creating a corporate network rule requiring employees to change their passwords every 25 days. B. notifying an employee that their password has not been changed in 25 days C. sending an email to an employee asking them to change their password D. locking an employee out of the system if the password is not changed |
a
|
|
A business continuity plan does which of the following?
A. allows an organization to resume operations after a major disruptive event B. allows an organization to reverse every action that took place to return to its original state C. addresses problem prevention, response to crises, resumption of business D. strengthens internal controls and compliance through the application of IT based controls |
c
|