An inventory manager is using a company's customer relationship management (CRM) system to determine how much inventory to pre-order for an upcoming sales promotion.
Which phase of CRM does this describe?
Which business impact is attributed to the creation of a knowledge-dependent global society from growth in information industries?
Employees in different business levels need knowledge to effectively drive their work and decision-making.
Which term describes the trait of an IT leader to effectively translate perspectives at both a broad and corporate strategic level?
Which two reasons show why organizations need to effectively grasp the deep currents of technological evolution? Choose 2 answers.
Which three primary elements of information infrastructure support ongoing operations? Choose 3 answers.
Which term is used to describe the business needs, justification, requirements, and boundaries of a project?
An attacker uses a guest account to exploit a weakness that enables the attacker to change access rights and alter user account information. Which type of attack is described?
Which basic business system serves operational level analysts in an organization?
A company no longer wants to sell one product to as many customers as possible. Now they want to sell one customer as many products as possible. Which type of software gathers and analyzes customer information to tailor this marketing campaign?
A company wants to create a shopping bot that will search several retailers' websites to find the best prices on products that it frequently orders. Which type of software should the company use to create a shopping bot?
What are two purposes of the IT Strategy Board in any organization? Choose 2 answers.
Which two benefits does RFID tagging offer for supply chain management? Choose 2 answers.
A director of software development observes friction between various team members. How should the director alleviate team friction?
What is an advantage of using a trusted third party to confirm correlations between users and public keys in disaster recovery planning?