Systems/Software
Process/Theory/Models
Security
Acronyms
Miscellaneous
100

In this type of organization, departments are organized on the basis of core competencies.

What is a functional organization?

100

A series of structured activities or tasks performed to achieve a specific goal, often resulting in a product or service for customers.

What is a business process?

100

According to our textbook, on average, it takes ___ days to discover a data breach.

What is 21 days?

100

ERP

Enterprise Resource Planning

100

A coordinated set of actions to fulfill goals, objectives, and purposes.

What is strategy?

200

Systems in place before organizations transition to newer systems.

What are legacy systems?

200

This theory aligns decisions regarding business strategy, IS, and organizational design.

What is the information systems strategy triangle?

200

The use of two or more authorization methods to gain access to a system.

What is multifactor authentication?

200

SAP

Systems Applications and Products

200

A clear statement that unifies an organization's effort and describes what the firm is about.

What is a mission statement?

300

** Daily Double **

An incremental data-driven approach to quality management for eliminating defects from a process.

What is Six Sigma?

300

Organizational variables used by decision makers to effect changes in their organization.

What are managerial levers?

300

People hired to try to break into systems to help the client firm uncover weaknesses.

What are white hat hackers?

300

BPR

Business Process Reengineering

300

An architecture based on services provided over the internet.

What is cloud computing?

400

This company produces the leading ERP software.

What is SAP?

400

A blueprint for translating business strategy into infrastructure.

What is architecture?

400

Software and sometimes hardware-based filter that prevents or allows outside traffic from accessing the network.

What is a firewall?

400

TQM

Total Quality Management

400

A strategy that aims to establish competitive advantage by having the lowest cost of operation in the industry.

What is cost leadership?

500

This company produces popular cloud-based SAAS customer relationship management software.

Who is Salesforce?

500

In computing, this is a series of technologies that allows the division of physical computing resources into a series of virtual machines, operating systems, processes or containers.

What is virtualization?

500

Security leaders use this concept, known for having multiple layers of different security technologies, policies, and practices, to increase the security and decrease the risk of a cyber breach.

What is defense in depth?

500

NIST

National Institute of Standards and Technology

500

** Daily Double **

Anything tangible or intangible that can be used by a company to create, produce and/or offer its products.

What is an IT asset?

M
e
n
u