What occurs when paper maps are laid edge to edge and items that run across maps do not match are reconfigured to match?

Uses plastic or conductive polymers instead of silicon-based microchips, allowing them to be washed or exposedto water without damaging the chipGlobal Positioning SystemGlobal positioning system (GPS)A satellite-based ___________________________ system providing extremely accurate position,time, and speed informationAutomatic vehicle _____________________ (AVL)– Uses GPS tracking to track vehicles_____________________Represents a north/south measurement of position_____________________Represents an east/west measurement of positionGeocache– A GPS technology adventure game that posts the longitude and latitude location for an item on the Internet for users tofindGeocoinA round coin-sized object uniquely numbered and hidden in geocacheEstimated time of arrival (ETA)– The time of day of an expected arrival at a certain destination, typically used for navigationapplicationsEstimated time enroute (ETE)– The time remaining before reaching a destination using the present speed, typically used fornavigation applicationsGeographic Information Systems (GIS)Geographic information system (GIS)Consists of hardware, software, and data that provide location information for display on a________________________________________ mapCartography– The science and art of making an illustrated map or chartEdgematching(warping, rubber sheeting)Occurs when paper maps are laid edge to edge and items that run across maps but donot match are reconfigured to matchGIS mapautomationLinks business assets to a centralized system where they can be tracked and monitored over time__________________ data (___________________ data or geographic information)Identifies the geographic location of featuresand boundaries on Earth, such as natural or constructed features, oceans, and more_________________________A spatial database coding process that assigns a digital map feature an attribute that serves as aunique ID or classificationLocationBasedservices (LBS)– Applications that use location information to provide a serviceBenefits of Business MobilityEnhancesmobilityProvides immediate data accessIncreases location andmonitoringcapabilityImproves workflowProvides mobile business opportunities

Show

A _________-driven website is an interactive website kept constantly updated and relevant to the needs of its customers using a database.

Table of Contents

  • A _________-driven website is an interactive website kept constantly updated and relevant to the needs of its customers using a database.
  • A ____________ key is a primary key of one table that appears as an attribute in another table and acts to provide a logical relationship between the two tables.
  • A ____________ rule defines how a company performs certain aspects of its business and typically results in either a yes/no or true/false answer. Stating that merchandise returns are allowed within 10 days of purchase is an example of a business rule
  • A ______________ is a collection of related data elements (in the MUSICIANS table these include)
  • A ________________ key is a field (or group of fields) that uniquely identifies a given record in a table
  • A ___________database model stores information in the form of logically related two-dimensional tables
  • A content ________ is the person responsible for updating and maintaining website content
  • A content _________ is the person responsible for creating the original website content
  • A data __________ is the smallest or basic unit of information
  • A data driven _________ is an interactive website kept constantly updated and relevant to the needs of its customers using a database
  • A database management system or _________creates, reads, updates, and deletes data in a database while controlling access and security
  • A relational database management system allows users to create, read, update, and delete data in a relational _______________
  • A relational database model stores information in the form of logically related _________-dimensional tables
  • An __________________ stores information about a person, place, thing, transaction, or event
  • Association ___________ reveals the relationship between variables along with the nature and frequency of the relationships
  • broadly defined, a __________ maintains information about various types of objects, events, people, and places.
  • Business intelligence ____________ track corporate metrics such as critical success factors and key performance indicators and include advanced capabilities such as interactive controls allowing users to manipulate data for analysis
  • Business-critical ___________ constraints enforce business rules vital to an organization's success and often require more insight and knowledge than relational integrity constraints
  • Businesses collect a tremendous amount of _____________ information as part of their routine operations
  • Companies can gain valuable business knowledge by viewing the data accessed and analyzed from their ________
  • Data ___________ are logical data structures that detail the relationships among data elements using graphics or pictures
  • Data _____________ tools move beyond Excel graphs and charts into sophisticated analysis techniques such as pie charts, controls, instruments, maps, time-series graphs, and more
  • Data ______________ compiles all of the metadata about the data elements in the data model
  • Data _______________ refers to the overall management of the availability, usability, integrity, and security of company data
  • Data ___________________ describes technologies that allow users to "see" or visualize data to transform information into a business perspective
  • Data mining is the process of analyzing data to extract information not offered by the raw _______ alone
  • Data mining occurs on ____________ data that are already in a database or a spreadsheet
  • Data warehouses can _____________ information like the example of gender
  • Databases today scale to exceptional levels, allowing all types of users and programs to perform _____________ processing and information-searching tasks
  • Dynamic __________ information is stored in a dynamic catalog , or an area of a website that stores information about products in a database
  • Extraction, transformation, and ___________ is a process that extracts information from internal and external databases, transforms it using a common set of enterprise definitions, and loads it into a data warehouse
  • Information __________ issues occur when a system produces incorrect, inconsistent, or duplicate data
  • Information ___________ is a measure of the quality of information
  • Information ____________ occurs when the same data element has different values
  • Information ______________ is the duplication of data, or the storage of the same data in multiple places
  • Information cleansing or __________ is a process that weeds out and fixes or discards inconsistent, incorrect, or incomplete information
  • Information is everywhere in an organization. Information ____________ refers to the extent of detail within the information
  • Integrity _________ are rules that help ensure the quality of information
  • Many firms complete data ___________ audits to determine the accuracy and completeness of its data
  • Many organizations find themselves in the position of being data ___________ and information poor. Even in today's electronic world, managers struggle with the challenge of turning their business data into business intelligence
  • Of the two primary tools available for retrieving information from a DBMS, the first is a _______by example tool that helps users graphically design the answer to a question against a database
  • Organizations using business intelligence can find the cause to many issues and problems simply by asking the question _________
  • Real-time _______ means immediate, up-to-date information
  • Real-time ___________ provide real-time information in response to requests
  • Relational _____________ constraints are rules that enforce basic and fundamental information-based constraints
  • 0.15873 out of 0.15873 pointsRelational _______________ constraints are rules that enforce basic and fundamental information-based constraints
  • The __________ view of information deals with the physical storage of information on a storage device
  • The ___________ view of information focuses on how individual users logically access information to meet their own business needs
  • The five common characteristics of high-quality include accurate, complete, __________, timely and unique
  • The primary purpose of a data ___________ is to combine information, specifically, strategic information, throughout an organization into a single repository in such a way that the people who need that information can make decisions and undertake business analysis
  • Time-series information is time-stamped information collected at a particular _______
  • Two of the challenges businesses faced before data warehouses were lack of data standards and poor data ______
  • Unstructured __________ does not exist in a fixed location and can include text documents, PDFs, voice messages, emails, and so on
  • Zappos credits its success as an online _________ retailer to its vast inventory of nearly 3 million products available through its dynamic data-driven website
  • ______ information includes data that change based on user actions
  • _______ information includes fixed data incapable of change in the event of a user action
  • _______ mining analyzes unstructured data associated with websites to identify consumer behavior and website navigation
  • _______ visualization tools can help uncover correlations and trends in data that would otherwise go unrecognized
  • _________ displays information graphically so it can be easily understood
  • ___________ provides details about data
  • ______________ can present the results of large data analysis looking for patterns and relationships that monitor changes in variables over time
  • _________ is accessing large amounts of data from different management information systems
  • ___________ are the data elements associated with an entity
  • A _________ is a single unit of binary data routed through a network
  • A __________ is software that prevents direct communication between a sending and receiving computer and is used to monitor packets for security reasons
  • A ___________ area network connects a group of computers in close proximity, such as in an office building, school, or home
  • A ___________ area network is a large computer network usually spanning a city, and is used by colleges, universities, and large companies that span their campuses
  • A ___________ is a space station that orbits the Earth receiving and transmitting signals from Earth-based stations over a wide area
  • A ___________ is a standard that specifies the format of data as well as the rules to be followed during transmission
  • A ___________ metropolitan area network uses radio signals to transmit and receive data
  • A ____________ receives and repeats a signal extending its attenuation or range
  • A _____________ is a round coin-sized object, is uniquely numbered and hidden in geocache
  • A metropolitan area network (MAN) is a large computer network usually spanning a _______
  • An ___________ is an extension of an intranet that is available only to authorized outsiders, such as customers, partners, and suppliers
  • Automatic _________ location (AVL) uses GPS tracking to track vehicles
  • Network _____________is the efficient coexistence of telephone, video, and data communication within a single network, offering convenience and flexibility not possible with separate infrastructures
  • One benefit of a connected world, resource ___________ makes all applications, equipment (such as a high-volume printer), and data available to anyone on the network, without regard to the physical location of the resource or the user
  • One of the main benefits of business mobility is enhancing _____________, which gives a company the power to place the right resources in the right place at the right time
  • Protecting against theft can expose a company to many significant risks such as stolen IDs, __________, encryption keys, and even confidential company information
  • Providing immediate data ______________, is an advantage of wireless networks, and includes the ability to have instant access to customer profiles, account history, and current order status which can improve the quality of interactions with customers and business partners
  • Providing network access to those who want or need it helps to level the playing field and removes the digital _____________, a worldwide gap giving advantage to those with access to technology
  • RFID _______________ is a device that measures the acceleration (the rate of change of velocity) of an item and is used to track truck speeds or taxi cab speeds
  • RFID tag is an electronic identification device that is made up of a __________ and antenna
  • Radio frequency ___________ uses electronic tags and labels to identify objects wirelessly over short distances
  • Routing information, sending information alerts, mapping densities and quantities are all examples of ___________ information systems
  • Secure hypertext transfer _____________ is a combination of HTTP and SSL to provide encryption and secure identification of an Internet server.
  • Secure socket ____________ is a standard security technology for establishing an encrypted link between a Web server and a browser, ensuring that all data passed between them remain private
  • Semi-passive RFID tags use a ______________ to run the microchip's circuitry, but communicate by drawing power from the RFID reader.
  • The U.S. Department of Defense developed this technology in the early 1970s, a global ____________ system where satellite-based navigation systems provide extremely accurate position, time, and speed information
  • The ability to ___________ and monitor assets reduces losses from theft and damage, gathers information from remote or difficult-to-reach locations, enhances safety, and makes possible a new wave of personalized services
  • The largest and most important network, the ______________, is like a network made up of millions of smaller networks able to operate independently
  • The packet ____________ lists the destination (for example in IP packets the destination is the IP address) along with the length of the message data
  • The packet ______________ represents the end of the packet or transmission end
  • To create an SSL connection, a Web server requires an SSL _____________, an electronic document that confirms the identity of a website or server and verifies that a public key belongs to a trustworthy individual or company
  • War ___________ is deliberately searching for Wi-Fi signals while driving by in a vehicle
  • 0.15625 out of 0.15625 pointsWar _____________ is the practice of tagging pavement with codes displaying where Wi-Fi access is available
  • We measure network performance in terms of _______________, the maximum amount of data that can pass from one point to another in a unit of time.
  • Wired ______________ privacy (WEP) is an encryption algorithm designed to protect wireless transmission data
  • Wireless ____________ is a means by which portable devices can connect wirelessly to a local area network, using access points that send and receive data via radio waves
  • ________ RFID tags have their own transmitter and a power source (typically a battery)
  • ______ RFID tags do not have a power source
  • ______ tracking occurs when a company places active or semi-passive RFID tags on expensive products or assets to gather data on the items location with little or no manual intervention
  • _______ directly impact network performance and reliability by subdividing an electronic message into smaller more manageable packets
  • _______ matching (warping, rubber sheeting) occurs when paper maps are laid edge-to-edge and items that run across maps do not match are reconfigured to match
  • ________ data identifies the geographic location of features and boundaries on Earth, such as natural or constructed features, oceans, and more. Spatial data can be mapped and is stored as coordinates and topology. A GIS accesses, manipulates, and analyzes spatial data
  • _______ enable customers, suppliers, consultants, subcontractors, business prospects, and others to access selected intranet websites and other company network resources that allow the sharing of information
  • ___________ is a method of sending audio and video files over the Internet in such a way that the user can view the file while it is being transferred
  • _______ over power line (BPL) technology makes possible high-speed Internet access over ordinary residential electrical lines and offers an alternative to DSL or high-speed cable modems
  • _______ packet formats include a packet header, packet body containing the original message, and packet footer
  • ________ professionals are certified in geocoding practices to ensure industry standards are met when classifying spatial data
  • _______ represents an east/west measurement of position
  • _________-based services are applications that use location information to provide a service. Some examples include mapping, emergency services, navigation, and weather information
  • _________ address is a unique number that identifies where computers are located on the network
  • __________ offer many advantages for business including sharing resources, providing opportunities, and reducing travel
  • __________ service providers (NSPs), private companies that own and maintain the worldwide backbone that supports the Internet. These include Sprint, Verizon, MCI (previously UUNet/WorldCom), AT&T, NTT, Level3, Century Link, and Cable & Wireless Worldwide
  • __________ RFID tags do not depend on a silicon microchip and use plastic or conductive polymers instead of silicon-based microchips allowing them to be washed or exposed to water without damaging the chip
  • __________ communications (UC) is the integration of communication channels into a single service. UC integrates communication channels allowing participants to communicate using the method that is most convenient for them. UC merges instant messaging, videoconferencing, email, voice mail, and VoIP.
  • _______ in spatial databases is a coding process that takes a digital map feature and assigns it an attribute that serves as a unique ID (tract number, node number) or classification (soil type, zoning category)
  • ______________ is a utility application that monitors the network path of packet data sent to a remote computer
  • ______________ represents a north/south measurement of position
  • _______ represents the loss of a network signal strength measured in decibels (dB) and occurs because the transmissions gradually dissipate in strength over longer distances or radio interference or physical obstructions like walls also impact communication signals
  • ____________ information system (GIS) stores, views, and analyzes geographic data creating multidimensional charts or maps. For example, GIS are monitoring global warming by measuring the speed of glaciers melting in Canada, Greenland, and Antarctica
  • ______________ Host Configuration Protocol (DHCP) allows dynamic IP address allocation so users do not have to have a preconfigured IP address to use the network
  • _____________ is the science and art of making an illustrated map or chart. GIS allows users to interpret, analyze, and visualize data in different ways that reveal patterns and trends in the form of reports, charts, and maps
  • ___________________ allows users to work from remote locations such as home or hotel using high-speed Internet to access business applications and data
  • _________ is a GPS technology adventure game that posts the longitude and latitude location for an item on the Internet for users to find
  • ___________________ service providers (RSPs) offer Internet service by connecting to NSPs, but they also can connect directly to each other.
  • "Why did sales not meet forecasts?" is an example of _________ technologies in CRM
  • A _________ integration takes information entered into a given system and sends it automatically to all downstream systems and processes
  • A _________ integration takes information entered into a given system and sends it automatically to all upstream systems and processes
  • A(n) _________ allows separate systems to communicate directly with each other, eliminating the need for manual entry into multiple systems
  • A(n) _________ system is a current or existing system that will become the base for upgrading or integrating with a new system
  • Accounting and finance components manage accounting data and ______________ processes within the enterprise with functions such as general ledger, accounts payable, accounts receivable, budgeting, and asset management
  • Accounting, finance, logistics, and production are the primary users of ___________ systems
  • An organization can find its most valuable customers by using a formula that industry insiders call Recency, ______________, and Monetary Value
  • Business intelligence, customer relationship management, supply chain management, and __________ are the four most common extended ERP components
  • Collaborative ___________ planning helps organizations reduce their investment in inventory, while improving customer satisfaction through product availability
  • Collaborative ______________ allows an organization to reduce the cost and time required during the design process of a product
  • Contact center, web-based self-service, and __________ scripting are the three primary operational CRM technologies used in the customer service department
  • Cross-selling is selling _________ products or services to a customer.
  • Customer relationship management involves managing all aspects of a customer's relationship with an organization to increase customer ____________ and retention and an organization's profitability
  • Distribution of products flow from customers and their _____________ customers at all levels
  • Enterprise _____________ integration connects the plans, methods, and tools aimed at integrating separate enterprise systems
  • Enterprise resource planning integrates all departments and functions through an organization into a ________ IT system so that employees can make decisions by viewing enterprisewide information on all business operations
  • Enterprise resource planning systems ______________ all departments and functions throughout an organization into a single IT system
  • Human resource component is one of the three most common _________ ERP components
  • Human resource components have the ability to identify employees that are likely to ________ the company
  • Human resource components track ___________ information including payroll, benefits, compensation, performance assessment, and assumes compliance with the legal requirements of multiple jurisdictions and tax authorities
  • Integrations are achieved by using ___________
  • List ____________ compile customer information from a variety of sources and segment the information for different marketing campaigns
  • List generator, ________ management, and cross-selling/up-selling are the three primary operational CRM technologies used in the marketing department
  • Materials flow from suppliers and their _______________ suppliers at all levels
  • McDonald's is _________ selling when it asks their customers if they would like an apple pie with their meal
  • McDonald's is ____________ selling when it asks their customers if they would like to super-size their meals
  • Most organizations manage their relationships with customers by setting ___________ limits
  • Production and materials management components handle the various aspects of production planning and execution such as __________ forecasting, production scheduling, job cost accounting, and quality control
  • Sales management, contact management, and __________ management are the three primary operational CRM technologies used in the sales department
  • Sales, marketing, and customer service are the primary users of ______ systems
  • Supply chain ________ management enables an organization to react more quickly to resolve supply chain issues.
  • Supply chain management involves the management of ___________ flow between and among stages in a supply chain to maximize total supply chain effectiveness and profitability
  • The three phases of CRM include (1) reporting, (2) ____________, and (3) predicting
  • The three phases of CRM include (1) reporting, (2) ____________, and (3) predicting
  • ______ and materials management is one of the three most common core ERP components
  • _______ chain management applies technology to the activities in the order life cycle from inquiry to product delivery
  • ______ dialing automatically dials outbound calls and when someone answers, the call is forwarded to an available agent
  • ______ management systems maintain customer contact information and identify prospective customers for future sales
  • ______ management systems target sales opportunities by finding new customers or companies for future sales
  • ____ relationship management focuses on keeping vendors satisfied by managing alliance partner and reseller relationships that provide customers with the optimal sales channel
  • ____ technologies help organizations identify their customers across applications
  • _____ management systems automate each phase of the sales process, helping individual sales representatives coordinate and organization all of their accounts
  • ______ CRM supports back-office operations and strategic analysis and includes all systems that do not deal directly with the customers
  • _____ CRM supports traditional transactional processing for day-to-day front-office operations or systems that deal directly with the customers
  • ______ management systems guide users through marketing campaigns performing such tasks as campaign definition, planning, scheduling, segmentation, and success analysis
  • _______ office operations deal directly with the customer
  • _____ relationship management focuses on keeping suppliers satisfied by evaluating and categorizing suppliers for different projects, which optimizes supplier selection
  • ______ scripting systems access organizational databases that track similar issues or questions and automatically generate the details to the CSR who can then relay them to the customer
  • ____ systems provide enterprisewide support and data access for a firm's operations and business processes
  • _______ ERP components are the extra components that meet the organizational needs not covered by the core components and primarily focus on external operations
  • _______ integration is the integration of a company's existing management information systems
  • ______ integration is the integration of data from multiple sources, which provides a unified view of all data
  • _______ ERP components are the traditional components included in most ERP systems and they primarily focus on internal operations
  • ________ application integration middleware takes a new approach to middleware by packaging commonly used applications together, reducing the time needed to integrate applications from multiple vendors
  • __________ is the use of the Internet to provide customers with the ability to gain personalized information by querying corporate databases and their information sources

A ____________ key is a primary key of one table that appears as an attribute in another table and acts to provide a logical relationship between the two tables.

A ____________ rule defines how a company performs certain aspects of its business and typically results in either a yes/no or true/false answer. Stating that merchandise returns are allowed within 10 days of purchase is an example of a business rule

A ________________ key is a field (or group of fields) that uniquely identifies a given record in a table

A content ________ is the person responsible for updating and maintaining website content

A content _________ is the person responsible for creating the original website content

A data __________ is the smallest or basic unit of information

A data driven _________ is an interactive website kept constantly updated and relevant to the needs of its customers using a database

A database management system or _________creates, reads, updates, and deletes data in a database while controlling access and security

A relational database management system allows users to create, read, update, and delete data in a relational _______________

An __________________ stores information about a person, place, thing, transaction, or event

Association ___________ reveals the relationship between variables along with the nature and frequency of the relationships

broadly defined, a __________ maintains information about various types of objects, events, people, and places.

Business intelligence ____________ track corporate metrics such as critical success factors and key performance indicators and include advanced capabilities such as interactive controls allowing users to manipulate data for analysis

Business-critical ___________ constraints enforce business rules vital to an organization's success and often require more insight and knowledge than relational integrity constraints

Businesses collect a tremendous amount of _____________ information as part of their routine operations

Companies can gain valuable business knowledge by viewing the data accessed and analyzed from their ________

Data ___________ are logical data structures that detail the relationships among data elements using graphics or pictures

Data _______________ refers to the overall management of the availability, usability, integrity, and security of company data

Data ___________________ describes technologies that allow users to "see" or visualize data to transform information into a business perspective

Data mining is the process of analyzing data to extract information not offered by the raw _______ alone

Data mining occurs on ____________ data that are already in a database or a spreadsheet

Data warehouses can _____________ information like the example of gender

Databases today scale to exceptional levels, allowing all types of users and programs to perform _____________ processing and information-searching tasks

Dynamic __________ information is stored in a dynamic catalog , or an area of a website that stores information about products in a database

Extraction, transformation, and ___________ is a process that extracts information from internal and external databases, transforms it using a common set of enterprise definitions, and loads it into a data warehouse

Information __________ issues occur when a system produces incorrect, inconsistent, or duplicate data

Information ___________ is a measure of the quality of information

Information ____________ occurs when the same data element has different values

Information ______________ is the duplication of data, or the storage of the same data in multiple places

Information cleansing or __________ is a process that weeds out and fixes or discards inconsistent, incorrect, or incomplete information

Information is everywhere in an organization. Information ____________ refers to the extent of detail within the information

Integrity _________ are rules that help ensure the quality of information

Many firms complete data ___________ audits to determine the accuracy and completeness of its data

Many organizations find themselves in the position of being data ___________ and information poor. Even in today's electronic world, managers struggle with the challenge of turning their business data into business intelligence

Organizations using business intelligence can find the cause to many issues and problems simply by asking the question _________

Real-time ___________ provide real-time information in response to requests

Relational _____________ constraints are rules that enforce basic and fundamental information-based constraints

0.15873 out of 0.15873 pointsRelational _______________ constraints are rules that enforce basic and fundamental information-based constraints

The __________ view of information deals with the physical storage of information on a storage device

The ___________ view of information focuses on how individual users logically access information to meet their own business needs

The five common characteristics of high-quality include accurate, complete, __________, timely and unique

The primary purpose of a data ___________ is to combine information, specifically, strategic information, throughout an organization into a single repository in such a way that the people who need that information can make decisions and undertake business analysis

Time-series information is time-stamped information collected at a particular _______

Two of the challenges businesses faced before data warehouses were lack of data standards and poor data ______

Unstructured __________ does not exist in a fixed location and can include text documents, PDFs, voice messages, emails, and so on

Zappos credits its success as an online _________ retailer to its vast inventory of nearly 3 million products available through its dynamic data-driven website

______ information includes data that change based on user actions

_______ information includes fixed data incapable of change in the event of a user action

_______ mining analyzes unstructured data associated with websites to identify consumer behavior and website navigation

_________ displays information graphically so it can be easily understood

___________ provides details about data

______________ can present the results of large data analysis looking for patterns and relationships that monitor changes in variables over time

_________ is accessing large amounts of data from different management information systems

___________ are the data elements associated with an entity

A _________ is a single unit of binary data routed through a network

A __________ is software that prevents direct communication between a sending and receiving computer and is used to monitor packets for security reasons

A ___________ area network connects a group of computers in close proximity, such as in an office building, school, or home

A ___________ area network is a large computer network usually spanning a city, and is used by colleges, universities, and large companies that span their campuses

A ___________ is a space station that orbits the Earth receiving and transmitting signals from Earth-based stations over a wide area

A ___________ is a standard that specifies the format of data as well as the rules to be followed during transmission

A ___________ metropolitan area network uses radio signals to transmit and receive data

A ____________ receives and repeats a signal extending its attenuation or range

A metropolitan area network (MAN) is a large computer network usually spanning a _______

An ___________ is an extension of an intranet that is available only to authorized outsiders, such as customers, partners, and suppliers

Automatic _________ location (AVL) uses GPS tracking to track vehicles

Network _____________is the efficient coexistence of telephone, video, and data communication within a single network, offering convenience and flexibility not possible with separate infrastructures

One benefit of a connected world, resource ___________ makes all applications, equipment (such as a high-volume printer), and data available to anyone on the network, without regard to the physical location of the resource or the user

One of the main benefits of business mobility is enhancing _____________, which gives a company the power to place the right resources in the right place at the right time

Protecting against theft can expose a company to many significant risks such as stolen IDs, __________, encryption keys, and even confidential company information

Providing immediate data ______________, is an advantage of wireless networks, and includes the ability to have instant access to customer profiles, account history, and current order status which can improve the quality of interactions with customers and business partners

Providing network access to those who want or need it helps to level the playing field and removes the digital _____________, a worldwide gap giving advantage to those with access to technology

RFID _______________ is a device that measures the acceleration (the rate of change of velocity) of an item and is used to track truck speeds or taxi cab speeds

RFID tag is an electronic identification device that is made up of a __________ and antenna

Routing information, sending information alerts, mapping densities and quantities are all examples of ___________ information systems

Secure hypertext transfer _____________ is a combination of HTTP and SSL to provide encryption and secure identification of an Internet server.

The U.S. Department of Defense developed this technology in the early 1970s, a global ____________ system where satellite-based navigation systems provide extremely accurate position, time, and speed information

The ability to ___________ and monitor assets reduces losses from theft and damage, gathers information from remote or difficult-to-reach locations, enhances safety, and makes possible a new wave of personalized services

The largest and most important network, the ______________, is like a network made up of millions of smaller networks able to operate independently

The packet ____________ lists the destination (for example in IP packets the destination is the IP address) along with the length of the message data

The packet ______________ represents the end of the packet or transmission end

To create an SSL connection, a Web server requires an SSL _____________, an electronic document that confirms the identity of a website or server and verifies that a public key belongs to a trustworthy individual or company

War ___________ is deliberately searching for Wi-Fi signals while driving by in a vehicle

0.15625 out of 0.15625 pointsWar _____________ is the practice of tagging pavement with codes displaying where Wi-Fi access is available

We measure network performance in terms of _______________, the maximum amount of data that can pass from one point to another in a unit of time.

Wired ______________ privacy (WEP) is an encryption algorithm designed to protect wireless transmission data

Wireless ____________ is a means by which portable devices can connect wirelessly to a local area network, using access points that send and receive data via radio waves

_______ directly impact network performance and reliability by subdividing an electronic message into smaller more manageable packets

_______ matching (warping, rubber sheeting) occurs when paper maps are laid edge-to-edge and items that run across maps do not match are reconfigured to match

________ data identifies the geographic location of features and boundaries on Earth, such as natural or constructed features, oceans, and more. Spatial data can be mapped and is stored as coordinates and topology. A GIS accesses, manipulates, and analyzes spatial data

_______ enable customers, suppliers, consultants, subcontractors, business prospects, and others to access selected intranet websites and other company network resources that allow the sharing of information

___________ is a method of sending audio and video files over the Internet in such a way that the user can view the file while it is being transferred

_______ over power line (BPL) technology makes possible high-speed Internet access over ordinary residential electrical lines and offers an alternative to DSL or high-speed cable modems

________ professionals are certified in geocoding practices to ensure industry standards are met when classifying spatial data

_______ represents an east/west measurement of position

_________-based services are applications that use location information to provide a service. Some examples include mapping, emergency services, navigation, and weather information

_________ address is a unique number that identifies where computers are located on the network

__________ offer many advantages for business including sharing resources, providing opportunities, and reducing travel

__________ communications (UC) is the integration of communication channels into a single service. UC integrates communication channels allowing participants to communicate using the method that is most convenient for them. UC merges instant messaging, videoconferencing, email, voice mail, and VoIP.

_______ in spatial databases is a coding process that takes a digital map feature and assigns it an attribute that serves as a unique ID (tract number, node number) or classification (soil type, zoning category)

______________ is a utility application that monitors the network path of packet data sent to a remote computer

______________ represents a north/south measurement of position

_______ represents the loss of a network signal strength measured in decibels (dB) and occurs because the transmissions gradually dissipate in strength over longer distances or radio interference or physical obstructions like walls also impact communication signals

____________ information system (GIS) stores, views, and analyzes geographic data creating multidimensional charts or maps. For example, GIS are monitoring global warming by measuring the speed of glaciers melting in Canada, Greenland, and Antarctica

______________ Host Configuration Protocol (DHCP) allows dynamic IP address allocation so users do not have to have a preconfigured IP address to use the network

___________________ allows users to work from remote locations such as home or hotel using high-speed Internet to access business applications and data

_________ is a GPS technology adventure game that posts the longitude and latitude location for an item on the Internet for users to find

___________________ service providers (RSPs) offer Internet service by connecting to NSPs, but they also can connect directly to each other.

"Why did sales not meet forecasts?" is an example of _________ technologies in CRM

A _________ integration takes information entered into a given system and sends it automatically to all downstream systems and processes

A _________ integration takes information entered into a given system and sends it automatically to all upstream systems and processes

A(n) _________ allows separate systems to communicate directly with each other, eliminating the need for manual entry into multiple systems

A(n) _________ system is a current or existing system that will become the base for upgrading or integrating with a new system

Accounting and finance components manage accounting data and ______________ processes within the enterprise with functions such as general ledger, accounts payable, accounts receivable, budgeting, and asset management

Accounting, finance, logistics, and production are the primary users of ___________ systems

An organization can find its most valuable customers by using a formula that industry insiders call Recency, ______________, and Monetary Value

Business intelligence, customer relationship management, supply chain management, and __________ are the four most common extended ERP components

Collaborative ___________ planning helps organizations reduce their investment in inventory, while improving customer satisfaction through product availability

Collaborative ______________ allows an organization to reduce the cost and time required during the design process of a product

Cross-selling is selling _________ products or services to a customer.

Customer relationship management involves managing all aspects of a customer's relationship with an organization to increase customer ____________ and retention and an organization's profitability

Distribution of products flow from customers and their _____________ customers at all levels

Enterprise resource planning integrates all departments and functions through an organization into a ________ IT system so that employees can make decisions by viewing enterprisewide information on all business operations

Enterprise resource planning systems ______________ all departments and functions throughout an organization into a single IT system

Human resource component is one of the three most common _________ ERP components

Human resource components have the ability to identify employees that are likely to ________ the company

Integrations are achieved by using ___________

List ____________ compile customer information from a variety of sources and segment the information for different marketing campaigns

List generator, ________ management, and cross-selling/up-selling are the three primary operational CRM technologies used in the marketing department

Materials flow from suppliers and their _______________ suppliers at all levels

McDonald's is _________ selling when it asks their customers if they would like an apple pie with their meal

McDonald's is ____________ selling when it asks their customers if they would like to super-size their meals

Most organizations manage their relationships with customers by setting ___________ limits

Production and materials management components handle the various aspects of production planning and execution such as __________ forecasting, production scheduling, job cost accounting, and quality control

Sales, marketing, and customer service are the primary users of ______ systems

Supply chain ________ management enables an organization to react more quickly to resolve supply chain issues.

Supply chain management involves the management of ___________ flow between and among stages in a supply chain to maximize total supply chain effectiveness and profitability

The three phases of CRM include (1) reporting, (2) ____________, and (3) predicting

The three phases of CRM include (1) reporting, (2) ____________, and (3) predicting

______ and materials management is one of the three most common core ERP components

_______ chain management applies technology to the activities in the order life cycle from inquiry to product delivery

______ dialing automatically dials outbound calls and when someone answers, the call is forwarded to an available agent

______ management systems maintain customer contact information and identify prospective customers for future sales

______ management systems target sales opportunities by finding new customers or companies for future sales

____ relationship management focuses on keeping vendors satisfied by managing alliance partner and reseller relationships that provide customers with the optimal sales channel

____ technologies help organizations identify their customers across applications

_____ management systems automate each phase of the sales process, helping individual sales representatives coordinate and organization all of their accounts

______ CRM supports back-office operations and strategic analysis and includes all systems that do not deal directly with the customers

_____ CRM supports traditional transactional processing for day-to-day front-office operations or systems that deal directly with the customers

______ management systems guide users through marketing campaigns performing such tasks as campaign definition, planning, scheduling, segmentation, and success analysis

_______ office operations deal directly with the customer

_____ relationship management focuses on keeping suppliers satisfied by evaluating and categorizing suppliers for different projects, which optimizes supplier selection

______ scripting systems access organizational databases that track similar issues or questions and automatically generate the details to the CSR who can then relay them to the customer

____ systems provide enterprisewide support and data access for a firm's operations and business processes

_______ ERP components are the extra components that meet the organizational needs not covered by the core components and primarily focus on external operations

_______ integration is the integration of a company's existing management information systems

______ integration is the integration of data from multiple sources, which provides a unified view of all data

_______ ERP components are the traditional components included in most ERP systems and they primarily focus on internal operations

________ application integration middleware takes a new approach to middleware by packaging commonly used applications together, reducing the time needed to integrate applications from multiple vendors

__________ is the use of the Internet to provide customers with the ability to gain personalized information by querying corporate databases and their information sources

What occurs when paper maps are laid edge to edge and items that run across?

edge matching (warping, rubber sheeting) Occurs when paper maps are laid edge to edge, and items that run across maps but do not match are reconfigured to match. GIS map automation Links business assets to a centralized system where they can be tracked and monitored over time.

What occurs when paper maps are laid edge to edge and items that run across maps and do not match are reconfigured to match quizlet?

Traceroute occurs when paper maps are laid edge-to-edge and items that run across maps and do not match are reconfigured to match.

Which business application is a satellite based navigation system providing extremely accurate position time and speed information?

GPS is a satellite-based navigation system providing extremely accurate position, time, and speed information.

What stores views and analyzes geographic data creating multidimensional charts or maps?

What is a geographic information system (GIS)? Stores, views and analyzes geographic data, creating multidimensional charts or maps.