2205 info hw 2

¡Supera tus tareas y exámenes ahora con Quizwiz!

core ERP components or extended ERP components: human resources

Core ERP

under what policy might an employee be fired for attempting to break into other employees computers

acceptable use policy

Manages accounting data and financial processes within the enterprise with functions such as general ledger, accounts payable, accounts receivable, budgeting, and asset management.

accounting and finance ERP component

sales projections for bike sales for the next 12 months is an example of ____ data

analytical

What supports back-office operations and strategic analysis and includes all systems that do not deal directly with the customers?

analytical CRM

highlighting all customers who have purchased a service in over a year and sending a personal letter and a special discount coupon is an example of...

analytical CRM

what type of data is quarterly sales forecast, industry growth perspective, and market trend analysis?

analytical data

attribute or entity: customer name, distributor ID, product price

attributes

fingerprint or voice encryption, user id and token and smartcard are all examples of

authentication and authorization

what type of hacker breaks into other peoples computer systems and may just look around or may steal and destroy info

black hat hacker

a crowdsourcing initiative that rewards individuals for discovering and reporting software bugs

bug bounty program

creating an iphone application and securing legal protection so others cannot sell your application

copyright

core ERP components or extended ERP components: accounting and finance

core erp

core ERP components or extended ERP components: production and materials management

core erp

The traditional components included in most ERP systems and primarily focus on internal operations

core erp component

creating a fake version of microsoft office and selling it to other people

counterfeit software

what type of hacker has criminal intent when hacking

cracker

What are the 4 types of attributes you might find in the Electra Bike Customer/Sales database management system?

customer ID, order number, order amount, order date

What are the 4 types of entities you might find in the Electra Customer/Sales database management system?

customer, order, shipping, payment

what type of hacker seeks to cause harm to people or to destroy critical systems or info and use internet as a weapon

cyberterrorist

a process that weeds out and fixes inconsistent, incorrect, or incomplete data

data cleansing

The smallest or basic unit of information.

data element

master data management and data validation fall under the data category of

data governance

the overall management of the availability, usability, integrity, and security of company data is known as

data governance

What is a storage repository that holds a vast amount of raw data in its original format until the business needs it?

data lake

a storage repository that holds a vast amount of raw data in its original format until the business needs it

data lake

contains a subset of data warehouse data

data mart

Logical data structures that detail the relationships among data elements using graphics or pictures.

data model

What occurs if there are duplicate data in a data file?

data not unique

content filtering, antivirus software, and firewall are all examples of _____ _____ and ______

data prevention and resistance

data inconsistency, data integrity issues, and data steward fall under the data category of

data quality

a process of extracting large amounts of data from a website and saving it to a spreadsheet or computer is know as:

data scraping

real time data and real time systems fall under the data category of

data timeliness

transactional data and analytical data fall under the data category of

data type

Creates, reads, updates, and deletes data in a database while controlling access and security is a ______ ______ system

database management system

intrusion detection software is an example of _____ and _____ of ____

detection and response of attacks

erroneous or flawed data

dirty data

looking through peoples trash is another way hackers obtain information

dumpster diving

under what policy might an employee be fired for sending spam to other employees

email privacy policy

Stores information about a person, place, thing, transaction, or event

entity

attribute or entity: customer, distributor, product

entity

under what policy would someone be fired for spending a significant amount of time playing computer games at work _____ _____ _____ policy

ethical computer use policy

What are the principles and standards that guide our behavior toward other people?

ethics

core ERP components or extended ERP components: business intelligence

extended ERP

core ERP components or extended ERP components: customer relationship management

extended ERP

core ERP components or extended ERP components: ebusiness

extended ERP

core ERP components or extended ERP components: supply chain management

extended ERP

The extra components that meet organizational needs not covered by the core components and primarily focus on external operations

extended erp component

a process that extracts data from internal and external databases, transforms it using a common set of enterprise definitions, and loads it into a data warehouse

extraction, transformation, and loading (ETL)

a general term for a set of standards governing the collection and use of personal data and addressing issues of privacy and accuracy is ______ ______ practices

fair information practices

sharing a video in a lecture to demonstrate a course concept is protected by ___ ___ doctrine

fair use doctrine

A primary key of one table that appears as an attribute in another table and acts to provide a logical relationship between the two tables

foreign key

a legal framework that sets guidelines for the collection and processing of personal information of individuals within the european union

general data protection regulation

what type of hacker has philosophical and political reasons for breaking into systems as protests

hacktivist

the common term for the representation of multidimensional data

information cube

Which of the following is a method or system of government for information management or control?

information governace

Which of the following epolicies would be most important to Warby Parker's customers?

information privacy policy

____ contains general principles regarding information privacy

information privacy policy

under what policy : a company posts its employees social security numbers on its website

information privacy policy

details how an organization will implement the information security policies

information security plan

identify the rules to maintain information security, such as requiring users to change password every 30 days

information security policies

Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident

insiders

writing a song and posting it to youtube is an example of ___ ___

intellectual property

How would Warby Parker categorize the large competitor that bought up many smaller eyewear brands enabling it to set the price for glasses throughout the industry?

legal and unethical

Warby Parker considered the business strategy of creating a profitable company with the goal of selling it to the large competitor as ________ and _________

legal and unethical

software that is intended to damage or disable computers and computer systems

malware

supports traditional processioning, supports operations that deal with customers, and supports day to day front offices is an example of

operational CRM

using campaign management systems to guide users through marketing campaigns is an example of ______ CRM

operational CRM

What is the primary problem associated with the enormous volume of organizational data?

organization becomes data rich but information poor (DRIP)

What term best describes the business component that Warby Parker designs its own eyeglass frames?

patent

copying microsoft office and distributing it for free is an example of

pirated software

Field (or group of fields) that uniquely identifies a given record in a table.

primary key

Handles production planning and execution tasks such as demand forecasting, production scheduling, job cost accounting, and quality control.

production and materials management ERP

a type of malware designed to trick victims into giving up personal information to purchase or download useless and potentially dangerous software

scareware

what type of hacker finds hacking code on the internet and click and point their way into systems to cause damage or spread viruses

script kiddie

hackers use their social skills to trick people into revealing access credentials or other valuable information

social engineering

under what policy might an employee be fired for inappropriate company remark on his facebook page

social media privacy policy

which represents the most costly and intrusive form of authentication?

something that is part of the user, such as fingerprint or voice signature

Asks users to write lines of code to answer questions against a database is ______ ______ _______

structured query language (SQL)

What are the 4 types of attributes you might find in the Electra Bike Manufacturing/Production database management system?

supplier ID, supplier address, supplier phone number, supplier name

What are the 4 types of entities you might find in the Electra Bike Manufacturing/Production database management system?

supplier, inventory, materials, distribution

packing slip for shipping three bikes to a new customer is an example of ____ data

transactional data

what type of data is hotel reservation, shipping invoice, and restaurant receipt

transactional data

what type of hacker works at the request of the system owners to find system vulnerabilities and plug the holes

white hack hacker

under what policy might an employee be fired for visiting elicit websites on his work compute

workplace monitoring policy


Conjuntos de estudio relacionados

AWS Solution Architect Associate SAA-C03

View Set

Product Design & Technology UNIT 3

View Set

DE American Literature - Mid-Term Review

View Set

Chapter 20 AC311 Accounting Changes and Error Corrections

View Set