管理信息系统填空2.doc_第1页
管理信息系统填空2.doc_第2页
管理信息系统填空2.doc_第3页
管理信息系统填空2.doc_第4页
管理信息系统填空2.doc_第5页
已阅读5页,还剩18页未读 继续免费阅读

下载本文档

版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领

文档简介

1.A(n) token is a physical device similar to an identification card that is designed to prove the identity of a single user. Difficulty: EasyReference: p. 363 2.Biometric authentication is based on the measurement of a physical or behavioral trait that makes each individual unique. Difficulty: EasyReference: p. 363 3.Packet filtering examines selected fields in the headers of data packets flowing back and forth between the trusted network and the Internet, examining individual packets in isolation. Difficulty: EasyReference: p. 364 4.A(n) intrusion detection system monitors the most vulnerable points in the network to detect and deter unauthorized users. Difficulty: MediumReference: p. 364 5.Antivirus software is designed to detect, and often eliminate, rogue software programs from an information system. Difficulty: EasyReference: p. 364 6.A(n) encrypted message is coded and scrambled to prevent it being read or accessed without authorization. Difficulty: EasyReference: p. 365 7.A(n) digital certificate is an attachment to an electronic message to verify the identity of the sender and to provide the receiver with the means to encode a reply. Difficulty: EasyReference: p. 366 8.A(n) walkthrough is the review of software specification or design documents by a small group of people carefully selected based on the skills needed for the particular objectives being tested. Difficulty: MediumReference: p. 367 9.Debugging is the process of discovering and eliminating the errors and defects in program code. Difficulty: EasyReference: p. 367 10.Enterprise resource planning (ERO) systems are based on a suite of integrated software modules and a common central database. Difficulty: MediumReference: p. 380 11.Enterprise software consists of a set of interdependent software modules that support basic internal business processes for finance and accounting, human resources, manufacturing and production, and sales and marketing. Difficulty: MediumReference: p. 380 12.Best practices are the most successful solutions or problem-solving methods for consistently and effectively achieving a business objective. Difficulty: EasyReference: p. 381 13.SAP, Oracle, PeopleSoft and Baan are all vendors of enterprise software packages. Difficulty: MediumReference: p. 383 14.An enterprise-enabled organization does business the same way worldwide. Difficulty: MediumReference: p. 383 15.Supply chain management is the close linkage and coordination of activities involved in buying, making, and moving a product. Difficulty: MediumReference: p. 385 16.The supply chain is a network of organizations and business processes for procuring raw materials, transforming these materials into intermediate and finished products, and distributing the finished products to customers. Difficulty: MediumReference: p. 385 17.The upstream portion of the supply chain includes the organizations suppliers and their suppliers and the process of managing relationships with them. Difficulty: HardReference: p. 386 18.The downstream portion of the supply chain consists of the organizations and processes for distributing and delivering products to the final customers. Difficulty: MediumReference: p. 386 19.In the supply chain process, planning consists of processes that balance aggregate demand and supply to develop a course of action to meet sourcing, production, and delivery requirements. Difficulty: EasyReference: p. 386 20.In the supply chain process, sourcing consists of processes that procure goods and services needed to create a specific product or service. Difficulty: EasyReference: p. 386 21.In the supply chain process, making consists of processes that transform a product into a finished state to meet planned or actual demand. Difficulty: EasyReference: p. 386 22.SCOR identifies five major supply chain processes: plan, source, make, deliver, and return. Difficulty: MediumReference: p. 386 23.In the supply chain process, delivering consists of processes that provide finished goods and services to meet actual or planned demand, including order management, transportation management, and distribution management. Difficulty: EasyReference: p. 387 24.Inefficiencies in the supply chain are caused by inaccurate or untimely information. Difficulty: MediumReference: p. 387 25.In the supply chain process, returning consists of processes associated with returning products or receiving returned products, including postdelivery customer support. Difficulty: EasyReference: p. 387 26.Logistics deals with the planning and control of all factors that will have an impact on transporting the correct product or service to where it is needed on time and at the least cost. Difficulty: MediumReference: p. 387 27.If a manufacturer had perfect information about exactly how many units of product customers wanted, when they wanted them, and when they could be produced, it would be possible to implement a highly efficient just-in-time strategy. Difficulty: HardReference: p. 387 28.Information about the demand for a product gets distorted as it passes from one entity to the next across the supply chain is referred to as the bullwhip effect. Difficulty: HardReference: p. 387 29.Supply chain planning systems enable a firm to generate demand forecasts for a product and to develop sourcing and manufacturing plans for that product. Difficulty: HardReference: p. 388 30.Demand planning is used to determine how much product a business needs to make to satisfy all of its customers demands. Difficulty: EasyReference: p. 389 31.Supply chain execution manage the flow of products through distribution centers and warehouses to ensure that products are delivered to the right locations in the most efficient manner. Difficulty: MediumReference: p. 389 32.A(n) metric is a standard measurement of performance. Difficulty: MediumReference: p. 389 33.Firms can use intranets to improve coordination among their internal supply chain processes, and they can use extranets to coordinate supply chain processes shared with their business partners. Difficulty: MediumReference: p. 390 34.In a push-based model of supply chain management systems, production master schedules are based on forecasts or best guesses of demand for products, and products are shoved to customers. Difficulty: HardReference: p. 391 35.With new flows of information made possible by Web-based tools, supply chain management can more easily follow a pull-based model. Difficulty: MediumReference: p. 391 36.Customer relationship management (CRM) is both a business and technology discipline for managing customer relationships to optimize revenue, profitability, customer satisfaction, and customer retention. Difficulty: EasyReference: p. 393 37.Partnership relationship management (PRM) uses many of the same data, tools, and systems as customer relationship management to enhance collaboration between a company and its selling partners. Difficulty: EasyReference: p. 394 38.A(n) touch point is a method of interaction with the customer, such as telephone, e-mail, customer service desk, conventional mail, Web site, or retail store. Difficulty: MediumReference: p. 394 39.Employee relationship management software deals with employee issues that are closely related to CRM, such as setting objectives, employee performance management, performance-based compensation, and employee training. Difficulty: EasyReference: p. 394 40.Sales force automation modules in CRM systems help sales staff increase their productivity by focusing sales efforts on the most profitable customers, those who are good candidates for sales and services. Difficulty: MediumReference: p. 394 41.Cross-selling is the marketing of complementary products to customers. Difficulty: EasyReference: p. 395 42.Up-selling is the marketing of higher-value products or services to new or existing customers. Difficulty: EasyReference: p. 395 43.Bundling is one kind of cross-selling in which a combination of products is sold as a package at a price lower than the total cost of the individual products. Difficulty: EasyReference: p. 395 44.Operational CRM includes customer-facing applications such as tools for sales force automation, call center and customer service support, and marketing automation. Difficulty: EasyReference: p. 397 45.Analytical CRM includes applications that analyze customer data generated by operational CRM applications to provide information for improving business performance management. Difficulty: EasyReference: p. 397 46.The churn rate measures the number of customers who stop using or purchasing products or services from a company. Difficulty: EasyReference: p. 398 47.Customer lifetime value (CLTV) is based on the relationship between the revenue produced by a specific customer, the expenses incurred in acquiring and servicing that customer, and the expected life of the relationship between the customer and the company. Difficulty: MediumReference: p. 399 48.A service platform integrates multiple applications form multiple business functions, business units, or business partners to deliver a seamless experience for the customer, employee, manager, or business partner. Difficulty: EasyReference: p. 401 49.Business process management is a methodology for dealing with the organizations need to change its business processes continually to remain competitive. Difficulty: EasyReference: p. 401 50.Data is defined as the flow of events or transactions captured by an organizations system that, by itself, is useful for transacting, but little else. Difficulty: EasyReference: p. 416 51.To turn data into useful information, a firm must expend resources to organize data into categories of understanding. Difficulty: EasyReference: p. 416 52.Knowledge is the concepts experience, and insight that provide a framework for creating, evaluating, and using information. Difficulty: EasyReference: p. 416 53.To transform information into knowledge, a firm must expend additional resources to discover patterns, rules, and contexts where the knowledge works. Difficulty: EasyReference: p. 416 54.Wisdom is thought to be the collective and individual experience of applying knowledge to the solution of problems. Difficulty: EasyReference: p. 416 55.Tacit knowledge is the expertise and experience of organizational members that has not been formally documented. Difficulty: EasyReference: p. 416 56.Knowledge residing in the minds of employees that has not been documented is called tacit knowledge. Difficulty: EasyReference: p. 416 57.Knowledge residing in the minds of employees that has been documented is called explicit knowledge. Difficulty: EasyReference: p. 416 58.Changing organizational behavior by sensing and responding to new experience and knowledge is called organizational learning. Difficulty: EasyReference: p. 418 59.Knowledge management refers to the set of business processes developed in an organization to create, store, transfer, and apply knowledge. Difficulty: EasyReference: p. 418 60.Document management systems digitize, index, and tag documents according to a coherent framework. Difficulty: EasyReference: p. 419 61.The chief knowledge officer (CKO) is a senior executive who is responsible for the firms knowledge management system. Difficulty: EasyReference: p. 420 62.Communities of practice (COPs) are informal social networks of professionals and employees within and outside the firm who have similar work-related activities and interests. Difficulty: MediumReference: p. 420 63.Knowledge work systems (KWS) are specialized systems built for engineers, scientists, and other knowledge workers charged with discovering and creating new knowledge for a company. Difficulty: MediumReference: p. 421 64.Knowledge management also includes a diverse group of intelligent techniques, such as data mining, expert systems, neural networks, fuzzy logic, genetic algorithms, and intelligent agents. Difficulty: EasyReference: p. 421 65.Knowledge that already exists inside a firm in the form of structured text documents and reports or presentations is referred to as structured knowledge . Difficulty: EasyReference: p. 422 66.Knowledge that exists inside a firm in the form of voice mail, e-mail, chat room exchanges, videos, digital pictures, brochures, or bulletin boards is commonly referred to as semistructured knowledge. Difficulty: EasyReference: p. 422 67.A knowledge repository is a collection of internal and external knowledge in a single location for more efficient management and utilization by the organization. Difficulty: MediumReference: p. 422 68.Knowledge network systems are also known as expertise location and management systems. Difficulty: MediumReference: p. 423 69.Structured knowledge is explicit knowledge that exists in formal documents, as well as in formal rules that organizations derive by observing experts and their decision-making behaviors. Difficulty: EasyReference: p. 423 70.A taxonomy is a scheme for classifying information and knowledge in such a way that it can be easily accessed. Difficulty: MediumReference: p. 427 71.A learning management system (LMS) provides tools for the management, delivery, tracking, and assessment of various types of employee learning and training. Difficulty: MediumReference: p. 430 72.Knowledge workers include researchers, designers, architects, scientists, and engineers who primarily create knowledge and information for the organization. Difficulty: EasyReference: p. 431 73.Computer aided design (CAD) automates the creation and revision of designs, using computers and sophisticated graphics software. Difficulty: EasyReference: p. 433 74.Virtual reality systems have visualization, rendering, and simulation capabilities that go far beyond those of conventional CAD systems. Difficulty: EasyReference: p. 434 75.Virtual Reality Modeling Language (VRML) is a set of specifications for interactive, three-dimensional modeling on the World Wide Web that can organize multiple media types, including animation, images, and audio to put users in a simulated real-world environment. Difficulty: EasyReference: p. 434 76.Artificial intelligence (AI) technology consists of computer-based systems that attempt to emulate human behavior. Difficulty: EasyReference: p. 436 77.Expert systems are an intelligent technique for capturing tacit knowledge as a set of rules in a very specific and limited domain of human expertise. Difficulty: EasyReference: p. 436 78.The model of human knowledge used by expert systems is called the knowledge base. Difficulty: EasyReference: p. 436 79.The AI shell is the programming environment of an expert system. Difficulty: EasyReference: p. 436 80.The strategy used to search through the rule base is called the inference engine. Difficulty: EasyReference: p. 436 81.In forward chaining the inference engine begins with the information entered by the user and searches the rule base to arrive at a conclusion. Difficulty: HardReference: p. 436 82.In backward chaining the strategy for searching the rule base starts with a hypothesis and proceeds by asking the user questions about selected facts until the hypothesis is either conformed or disproved. Difficulty: MediumReference: p. 437 83.A(n) knowledge engineer is similar to a traditional systems analysts but has special expertise in eliciting information and expertise from other professionals. Difficulty: EasyReference: p. 437 84.In case-based reasoning (CBR), descriptions of past experiences of human specialists, represented as cases are stored in a database for later retrieval when the user encounters a new case with similar parameters. Difficulty: MediumReference: p. 439 85.Fuzzy logic is a rule-based technology that can represent such imprecision by creating rules that use approximate or subjective values. Difficulty: EasyReference: p. 440 86.Neural networks are used for modeling complex, poorly understood problems for which large amounts of data have been collected. Difficulty: EasyReference: p. 441 87.Genetic algorithms are used for finding the optimal solution for a specific problem by examining a very large number of possible solutions for that problem. Difficulty: EasyReference: p. 442 88.Genetic algorithms, fuzzy logic, neural networks, and expert systems can be integrated in a single application to take advantage of the best features of these technologies. Such systems are called hybrid AI systems. Difficulty: MediumReference: p. 44389.Intelligent agents are software programs that work in the background without direct human intervention to carry out specific, repetitive, and predictable tasks for individual user, business process, or software applications. Difficulty: EasyReference: p. 44490.The term business intelligence refers to applications and technologies that work with data from many different sources to help users make better business decisions. Difficulty: EasyRefer

温馨提示

  • 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
  • 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
  • 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
  • 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
  • 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
  • 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
  • 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

评论

0/150

提交评论