Chapter_02-KEY0

Chapter_02-KEY0 - A. EDI B. JIT C. CRM D. EPOD 7. ____...

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
Chapter 2 – Analyzing the Business Case 1. The term ____ refers to the reasons, or justification, for a proposal. A. business opportunity B. business case C. SWOT D. feasibility 2. SWOT analysis does NOT include an analysis of ____. A. Strengths B. Weaknesses C. Options D. Threats 3. A formal way of asking for IT support is a ____. A. systems order B. systems tag C. systems path D. systems request 4. The coding of data to keep it safe from unauthorized users is referred to as ____. A. encryption B. biometric services C. entry controls D. locking 5. Many companies implement ____ systems that integrate all customer-related events and transactions. A. EDI B. JIT C. CRM D. EPOD 6. Using ____, a supplier uses RFID tags on each case to create a digital shipping list. The customer receives the list and scans the incoming shipment.
Background image of page 1
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: A. EDI B. JIT C. CRM D. EPOD 7. ____ feasibility means that the proposed system will be used effectively after it has been developed. A. Operational B. Technical C. Economic D. Schedule 8. ____ feasibility refers to the technical resources needed to develop, purchase, install, or operate the system. A. Operational B. Technical C. Economic D. Schedule 9. The estimated cost of a system, including ongoing support and maintenance costs, is referred to as ____. A. discretionary expense (DE) B. profit/loss analysis (PLA) C. total profitability of ownership (TPO) D. total cost of ownership (TCO) 10. The Ishikawa diagram is also called a(n) ____ diagram. A. arrow B. fishbone C. waterfall D. data...
View Full Document

This note was uploaded on 01/30/2012 for the course CNIT 180 taught by Professor Victorbarlow during the Spring '12 term at Purdue.

Ask a homework question - tutors are online