BA 304 Midterm Exam

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which of the following are common cloud service delivery models? (Check all that apply.)

- Infrastructure as a Service - Software as a Service - Platform as a Service

What are the characteristics of an agile MIS infrastructure? (Check all that apply.)

- accessibility - maintainability - portability - scalability

Which characteristics support an agile MIS infrastructure? (Check all that apply.)

- accessibility - maintainability - portability - usability

Which of the following are common departments found in an organization? (Check all that apply.)

- accounting - operations management - marketing - finance

Which of the following represent the five common characteristics of high-quality data?

- accurate - complete - consistent - timely - unique

Which of the following represent the common ebusiness revenue models? (Check all that apply.)

- advertising fees - instant messaging transactions - subscription fees - transaction fees

Which of the following represent the benefits of ebusiness marketing? (Check all that apply.)

- affiliate program - banner ads - cookies - freemium - viral marketing

Which characteristics support an information MIS infrastructure? (Check all that apply.)

- backup - recovery - disaster recovery - business continuity planning

Select four types of advanced data analytics.

- behaviour analysis - social media analysis - text analysis - web analysis

What are the two problems with having so much data available for data-driven decision making?

- being data rich - being information poor

Which of the following are considered information? (Check all that apply.)

- best customer by month - best-selling item by month

Which of the following are types of hackers? (Check all that apply.)

- black-hat - script kiddies - cracker

Which of the following are the common forms of business-to-consumer ebusiness models? (Check all that apply.)

- brick-and-mortar - click-and-mortar - pure-play (virtual)

Which of the following are the three mobile device management policies a company can choose?

- bring your own device - chose your own device - company-issued, personally enabled

What are the four main types of ebusiness models? (Check all that apply.)

- business-to-business - business-to-consumer - consumer-to-consumer - consumer-to-business

Which of the following are advantages of cloud computing? (Check all that apply.)

- capacity on demand - cost savings - scalability - flexibility

Which of the following are MIS roles found in an organization? (Check all that apply.)

- chief information officer - chief security officer - chief automation officer

Which characteristics support a sustainable MIS infrastructure? (Check all that apply.)

- cloud computing - grid computing - virtualization

Which of the following are the four parts of the data analysis cycle?

- collect - analyze - communicate - visualize

Which of the following represent external databases in a data warehouse? (Check all that apply.)

- competitor data - stock market data - weather data

Which of the following represent the common ebusiness forms? (Check all that apply.)

- content providers - infomediaries - online marketplaces - transaction brokers

Which of the following are the three mobile information management characteristics?

- data at rest - data in motion - data in use

Which of the following represent the four primary traits of the value of data?

- data type - data timeliness - data quality - data governance

Which of the following statements are examples of unstructured or strategic level decisions? (Check all that apply.)

- deciding to enter a new market - deciding to enter a new industry over the next three years - choosing to eliminate an entire product line

Select all of the following that represent the three broad categories of analytics. (Check all that apply.)

- descriptive analytics - predictive analytics - prescriptive analytics

Which of the following represent the data granularities in an organization? (Check all that apply.)

- detail - aggregate - summary

Which of the following statements are examples of semistructured or managerial level decisions? (Check all that apply.)

- determining sales forecasts for next month - analyzing the impact of last month's marketing campaign - comparing expected sales and actual sales by month

Which of the following represent the data formats in an organization? (Check all that apply.)

- document - presentation - individual

Which of the following are the four mobile application management characteristics?

- dual persona technology - accelerometer - progressive web application - containerization

Which of the following is a problem associated with dirty data? (Check all that apply.)

- duplicate data - nonformatted data - violates business rules data - nonintegrated data

Which of the following are not types of information security breach? (Check all that apply.)

- ediscovery - BYOD

Which of the following represent the connecting and communicating tools supporting and driving ebusiness? (Check all that apply.)

- email - instant messaging - podcasting - web conferencing

If your boss believed in data democratization, who would be allowed to collect, analyze, and access data? (Check all that apply.)

- employees - customer service representatives - chief information officer - human resource employees

Which of the following represent the data levels in an organization? (Check all that apply.)

- enterprise - department - individual

What are the primary concepts of a relational database model? (Check all that apply.)

- entities - attributes - primary key - foreign key

Which of the following are data mining techniques? (Check all that apply.)

- estimation analysis - affinity grouping analysis - cluster analysis - classification analysis

Which of the following represent the fundamental building blocks that protect organizational information? (Check all that apply.)

- ethics - security

What does ETL stand for? (Check all that apply.)

- extraction - transformation - loading

Which of the following are key areas of a technology recovery strategy? (Check all that apply.)

- hardware - software - networking - data center

What are the three primary components in a block?

- hash - previous hash - data

Which of the following are the different sites that support disaster recovery? (Check all that apply.)

- hot site - cold site - warm site

Which of the following represent the components of the World Wide Web? (Check all that apply.)

- hypertext markup language 5 - web browser - applets - hypertext transport protocol (HTTP)

What are the three advantages of using blockchain technology?

- immutability - digital trust - Internet of Things integration

Which of the following are the reasons business analysis is difficult from operational databases? (Check all that apply.)

- inconsistent data definitions - lack of data standards - inadequate data usefulness

Which of the following are examples of critical success factors? (Check all that apply.)

- increase customer satisfaction - retain competitive advantages - hire and retain the best business professionals

Which of the following are the business advantages of a relational database? (Check all that apply.)

- increased flexibility - increased scalability - reduced data redundancy - increased data integrity

Which of the following are epolicies a business should implement to protect itself? (Check all that apply.)

- information privacy policy - acceptable use policy - Internet use policy - anti-spam policy

Which of the following are not included as common DSS analysis techniques? (Check all that apply.)

- input analysis - output analysis - process analysis

Which of the following are types of Internet monitoring technology? (Check all that apply.)

- key logger - clickstream - web log - adware

Determining what is ethical can sometimes be difficult because certain actions can be justified or condemned depending on how you view the relationship between which of the following terms? (Choose two.)

- legal - ethical

Which of the following are included in each of the four quadrants between acting ethically and acting legally? (Check all that apply.)

- legal and ethical behaviour - illegal and unethical behaviour - legal and unethical behaviour - illegal and ethical behaviour

Which of the following are included in each of the four quadrants between acting ethically and acting legally? (Check all that apply.)

- legal behaviour - illegal behaviour - ethical behaviour - unethical behaviour

Which of the following DO NOT represent the four common characteristics of big data? (Check all that apply.)

- machine-generated structured data - analytics - business analytics - virtualization

Which of the following represent internal databases in a data warehouse? (Check all that apply.)

- marketing data - sales data - accounting data - inventory data

Which of the following are the three primary areas of an enterprise mobility management strategy?

- mobile device management - mobile application management - mobile information management

Which of the following are the benefits of wireless networking? (Check all that apply.)

- mobility - real-time data - remote work

Which of the following are included as part of the four overview areas for artificial intelligence? (Check all that apply.)

- natural language processing - natural language understanding - knowledge representation - knowledge planning

What are the three primary areas of artificial intelligence? (Check all that apply.)

- neural networks - machine learning - virtual reality

Which of the following is a characteristic of cloud computing? (Check all that apply.)

- on-demand self-service - broad network access - multi-tenancy - rapid elasticity

A virtualized system creates a virtual version of computing resources, including ________. (Check all that apply.)

- operating system - server - storage device - network resource

Which of the following are data mining modeling techniques for predictions? (Check all that apply.)

- optimization model - forecasting model - regression model

Which of the following represent a business process you would find in the operations management department? (Check all that apply.)

- ordering inventory - creating production schedules - manufacturing goods

How can websites generate revenue? (Check all that apply.)

- pay-per-click - pay-per-call - pay-per-conversion

Which of the following are examples of key performance indicators? (Check all that apply.)

- percentage of help desk calls answered - number of product returns - turnover rates of employees

Which of the following are wireless networks? (Check all that apply.)

- personal area network - wireless local area network - wireless metropolitan area network - wireless wide area network

Which of the following are examples of unplanned downtime? (Check all that apply.)

- power outages - tornados - network failures

What do you need to create the relationships in a relational database? (Check all that apply.)

- primary key - foreign key

Which of the following are cloud computing environments? (Check all that apply.)

- private cloud - public cloud - community cloud - hybrid cloud

Which of the following represent analytical data? (Check all that apply.)

- product statistics - trends - sales projections - future growth forecasts

Which of the following are considered data? (Check all that apply.)

- quantity sold - customer number - order date

Which of the following are wireless business applications? (Check all that apply.)

- radio-frequency identification - global positioning systems - geographic information systems

Which of the following statements are examples of structured or operational level decisions? (Check all that apply.)

- reordering inventory - creating the employee weekly staffing schedule - creating the employee weekly production schedule - determining payroll issues

Which of the following are examples of a way to maintain information security that a company should include in their information security policies? (Check all that apply.)

- requiring computer users to log off before leaving for lunch - requiring users to never share user or password information with anyone - changing passwords every 30 to 60 days

Which of the following do not represent the fundamental building blocks that protect organizational information? (Check all that apply.)

- sales - human resources - click-fraud - threats

Which of the following represent transactional data? (Check all that apply.)

- sales receipt - packing slip - airline ticket

Which of the following represent the four types of bias in machine learning? (Check all that apply.)

- sample bias - prejudice bias - measurement bias - variance bias

Select all of the following that represent forms of unstructured data. (Check all that apply.)

- satellite images - photographic data - social media data - text messages data

Select all of the following that represent forms of machine-generated unstructured data. (Check all that apply.)

- satellite images - scientific atmosphere data - radar data

Select all of the following that represent forms of structured data. (Check all that apply.)

- sensor data - web log data - clickstream data - point-of-sale data

Which of the following are the four basic categories of virtualization? (Check all that apply.)

- storage virtualization - network virtualization - server virtualization - system virtualization

What are the three types of machine learning?

- supervised machine learning - unsupervised machine learning - transfer machine learning

Select all of the following that represent forms of human-generated unstructured data. (Check all that apply.)

- text messages data - social media data - email data

Select all of the following that DO NOT represent the three broad categories of analytics. (Check all that apply.)

- user analytics - intelligence analytics - anomaly analytics

Which of the following represent the four common characteristics of big data? (Check all that apply.)

- variety - veracity - volume - velocity

Select the four common characteristics of big data along with the correct definition. (Check all that apply.)

- variety—represents different forms of data - veracity—represents uncertainty of data - volume—represents the scale of data - velocity—represents the analysis of streaming data

Which of the following are included as common DSS analysis techniques? (Check all that apply.)

- what-if analysis - sensitivity analysis - goal-seeking analysis - optimization analysis

Which of the following are types of viruses? (Check all that apply.)

- worm - malware - adware - spyware - ransomware - scareware

Which generation of wireless broadband technology is based on the 802.11ac standard engineered to greatly increase the speed and responsiveness of wireless networks?

5G

What is extraction, transformation, and loading?

It is a process that extracts data from internal and external databases, transforms it using a common set of enterprise definitions, and loads it into a data warehouse.

Which network uses radio signals to transmit and receive data over distances of a few hundred feet?

WLAN

What is WiMAX?

Worldwide Interoperability for Microwave Access

What is the difference between a business model and an ebusiness model?

a business model details how a company creates, delivers, and generates revenue; an ebusiness model does all of the same except on the Internet.

What is geocoding?

a coding process in spatial databases that assigns a digital map feature to an attribute that serves as a unique ID (tract number, node number) or classification (soil type, zoning category)

What is a chipless RFID tag?

a device that uses plastic or conductive polymers instead of silicon-based microchips, allowing them to be washed or exposed to water without damaging the chip

What is a primary key?

a field (or group of fields) that uniquely identifies a given entity in a table

What is wireless fidelity (Wi-Fi)?

a means by which portable devices can connect wirelessly to a local area network, using access points that send and receive data via radio waves

What is bluetooth?

a wireless PAN technology that transmits signals over short distances among cell phones, computers, and other devices

What are keywords that advertisers choose to pay for and appear as sponsored links on the Google results pages?

adwords

The information MIS infrastructure supports the day-to-day business operations and plans for

all of the answer choices are correct

What are the three main drivers of the direct-to-consumer sales channel?

all of the answers are correct

What encompasses all organizational information and its primary purpose is to support the performance of managerial analysis or semistructured decisions?

analytical information

Which of the following terms is synonymous with business analytics?

analytics

What is the process of identifying rare or unexpected items or events in a dataset that do not conform to other items in the dataset?

anomaly detection

What does API stand for?

application programming interface

What uses GPS tracking to track vehicles?

automatic vehicle location

What uses data about people's behaviors to understand intent and predict future action?

behavioural analytics

What is a collection of large, complex datasets, which cannot be analyzed using traditional database methods and tools?

big data

Who are hackers who break into other people's computer systems and may just look around or steal and destroy information?

black-hat hackers

What is IT consumerization?

blending the personal and business use of technology devices and applications

What is a type of distributed ledger consisting of blocks of data that maintain a permanent and tamper-proof record of transactional data?

blockchain

What is a wireless PAN technology that transmits signals over short distances among cell phones, computers, and other devices?

bluetooth

What is information collected from multiple sources such as suppliers, customers, competitors, partners, and industries that analyzes patterns, trends, and relationships for strategic decision making?

business intelligence

The sustainable infrastructure pressure of increased energy consumption poses new and growing pressure. The energy consumed by a computer is estimated to produce as much as 10 percent of the amount of carbon dioxide produced by a

car

What includes the carbon dioxide and carbon monoxide in the atmosphere produced by business processes and systems?

carbon emissions

Who determines if a person or business process can be replaced by a robot or software?

chief automation officer

Who is responsible for ensuring the security of business systems and developing strategies and safeguards against attacks by hackers and viruses?

chief security officer (CSO)

What type of Internet monitoring technique records information about a customer during a web surfing session, such as what websites were visited and how long the visit was, what ads were viewed, and what was purchased?

clickstream

What is any proprietary software licensed under exclusive legal right of the copyright holder?

closed source

What serves a specific community with common business models, security requirements, and compliance considerations?

community cloud

What can compare two or more datasets to identify patterns and trends?

comparative analysis

What can help managers keep tabs of its competitor's activities on the web using software that automatically tracks all competitor website activities such as discounts and new products?

competitive monitoring

What is the primary way that social networks work?

connecting people by matching profile information

Which of the following describes a company's acknowledged responsibility to society?

corporate social responsibility

What sources capital for a project by raising many small amounts from a large number of individuals, typically via the Internet?

crowdfunding

What is measured by such benchmarks as satisfaction surveys, percentage of existing customers retained, and increases in revenue dollars per customer?

customer satisfaction

What is a type of mediation that refers to the creation of new kinds of intermediaries that simply could not have existed before the advent of ebusiness?

cybermediation

What is the electronic defacing of an existing website?

cybervandalism

What is a collection of data from various sources for the purpose of data processing?

data aggregation

What is the ability for data to be collected, analyzed, and accessible to all users (the average end user)?

data democratization

Which of the following occurs when a system produces incorrect, inconsistent, or duplicate data?

data integrity issue

What is the term for the time it takes for data to be stored or retrieved?

data latency

What is the ultimate outcome of a data warehouse?

data marts

What maintains data about various types of objects, events, people, and places?

database

What implies that organizations that cannot adapt to the new demands placed on them for surviving in the information age are doomed to extinction?

digital darwinism

What is a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution?

digital rights management

What is an ebusiness model where companies build, market, sell, and ship their products themselves, without relying on traditional stores or intermediaries?

direct-to-consumer

What is a new way of doing things that initially does not meet the needs of existing customers?

disruptive technology

________ is a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network.

drive-by hacking

What types of metrics measure customer satisfaction?

effectiveness MIS metrics

What type of decision is the following: Did customers use the marketing campaign to purchase products?

effectiveness decision

What type of decision is the following: Did the amount of daily transactions increase?

effectiveness decision

What type of decision is the following: How do we best use the ingredients in the warehouse to make the most profits?

efficiency decision

What type of decision is the following: What is the best route for dropping off FedEx or UPS packages?

efficiency decision

Which data types are typically found in the human resources department?

employee data, promotion data, vacation data

The policy that ensures the users know how to behave at work and the organization has a published standard regarding computer user behavior is called ________ computer use policy.

ethical

What is made up of discarded technology devices?

ewaste

Which of the following definitions represents a data scientist?

extracts knowledge from data by performing statistical analysis, data mining, and advanced analytics on big data to identify trends, market changes, and other relevant information

Which of the following is considered the output in the systems thinking example of a DSS?

forecasts

What is a technique where a business offers a free basic product giving the customer an option to use an advanced version for a premium cost?

freemium

Which type of AI system assigns values of 0 and 1 to vague or ambiguous information?

fuzzy logic

What is a legal framework that sets guidelines for the collection and processing of personal information of individuals within the European Union?

general data protection regulation

What are material items or products that customers will buy to satisfy a want or need?

goods

What uses technology allowing humans to interact with a computer through bodily sensations and movements—for example, a cell phone vibrating in your pocket?

haptic interface

What consists of the physical devices associated with a computer system?

hardware

Within the sites that support disaster recovery, a ________ is a separate and fully equipped facility where the company can move immediately after a disaster and resume business.

hot site

What are areas around access points where users can connect to the Internet via Wi-Fi?

hotspots

What includes two or more private, public, or community clouds, but each cloud remains separate and is only linked by technology that enables data and application portability?

hybrid cloud

Which of the following describes a sustainable MIS infrastructure?

identifies ways that a company can grow in terms of computing resources while simultaneously becoming less dependent on hardware and energy consumption

Which of the following describes an information MIS infrastructure?

identifies where and how important information, such as customer records, is maintained and secured

What simply means unchangeable?

immutable

In terms of big data, what is variety?

includes different forms of structured and unstructured data

Which of the following describes an agile MIS infrastructure?

includes the hardware, software, and telecommunications equipment that, when combined, provides the underlying foundation to support the organization's goals

What is Wi-Fi infrastructure?

includes the inner workings of a Wi-Fi service or utility, including the signal transmitters, towers, or poles and additional equipment required to send out a Wi-Fi signal

Which of the following describes an MIS infrastructure?

includes the plans for how a firm will build, deploy, use, and share its data, processes and MIS assets

What measures the number of people a firm can communicate with all over the world?

information reach

What is consolidation?

involves the aggregation of information and features simple roll-ups to complex groupings of interrelated information

Which of the following is correct in reference to a database?

it can support many logical views

What is a scripting language developed by Netscape and used to create interactive websites, a big driver of Business 2.0?

javascript

What is a word used in a performing a search?

keyword

What records classified and summarized transactional data?

ledger

Determining what is ethical can sometimes be difficult because certain actions can be justified or condemned depending on how you view the relationship between ________ and ________.

legal; ethical

What is the ability of a computer to "see" by digitizing an image, processing the data it contains, and taking some kind of action?

machine vision

What is data created by a machine without human intervention?

machine-generated data

What is a destructive agent?

malicious agents designed by spammers and other Internet attackers to farm email addresses off websites or deposit spyware on machines

MIS is a business function, like accounting or sales, which moves information about people, products, and processes across the company to facilitate decision making and problem solving. What does MIS stand for?

management information system

What type of decision is the following: What was the difference between forecast sales and actual sales last month?

managerial decision

What type of decision is the following: What was the impact of last month's marketing campaign discount on the primary product?

managerial decision

What is the practice of gathering data and ensuring that it is uniform, accurate, consistent, and complete, including such entities as customers, suppliers, products, sales, employees, and other critical entities that are commonly integrated across organizational systems?

master data management

Which of the following is the correct definition of algorithms?

mathematical formulas placed in software that performs an analysis on a dataset

What are measurements that evaluate results to determine whether a project is meeting its goals?

metrics

Twitter is an example of a

microblogging website

What is a security strategy comprised of products and services that offer remote support for mobile devices, such as smart phones, laptops, and tablets?

mobile device management

What describes how products in a network increase in value to users as the number of users increases?

network effect

What is a category of AI that attempts to emulate the way the human brain works?

neural network

What is one of the guidelines an organization can follow when creating an information privacy policy?

notice and disclosure

What is the system that consists of nonproprietary hardware and software based on publicly known standards that allows third parties to create add-on products to plug into or interoperate with the system?

open system

Todd Smith works at a retail store selling sports equipment. His daily tasks include opening the store, creating the work schedules, processing payroll, overseeing sales and inventory, and training employees. At what level of the organizational pyramid would you categorize Todd?

operational

Which of the following represents the three different levels of a company pyramid from the bottom to the top?

operational - managerial - strategic

What type of decision is the following: How many temporary employees do we need to hire for Cyber Monday?

operational decision

What type of decision is the following: Should we fire an employee who is perpetually late?

operational decision

Which department manages the process of converting or transforming resources into goods or services?

operations management

What are the three business functions an MIS infrastructure supports?

operations, change, and the environment or sustainability

What are the unpaid entries in a search engine results page that were derived based on their content's relevance to the keyword query?

organic search

What is a data value that is numerically distant from most of the other data points in a dataset?

outlier

What are links a company paid to have displayed based on a user's keywords?

paid search

What measures how quickly a system performs a process or transaction?

performance

Imagine you accidently mistype the URL for your bank and you are redirected to a fake website that collects your information. You have just been a victim of ________ identity theft.

pharming

What converts an audio broadcast to a digital music player?

podcasting

Which of the following agile MIS infrastructure characteristics refers to the ability of an application to operate on different devices or software platforms, such as different operating systems?

portability

Which type of bias occurs as a result of training data that is influenced by cultural or other stereotypes?

prejudice bias

What is distributed computing?

processes and manages algorithms across many machines in a computing environment

What is the rate at which goods and services are produced based upon total output given total inputs?

productivity

Which data types are typically found in the marketing department?

promotion data, sales data, advertising data

Which of the following is a challenge of sustaining technology?

provides a more expensive product for current customers

A wireless MAN (WMAN) is a metropolitan area network uses ___________ to transmit and receive data.

radio signals

What is immediate, up-to-date data?

real-time data

What is the ability to get a system up and running in the event of a system crash or failure that includes restoring the information backup?

recovery

Which of the following systems allows users to create, read, update, and delete data in a relational database?

relational database management system

Which constraint does not allow someone to create an order for a nonexistent customer?

relational integrity constraint

What is a pivot analysis?

rotates data to display alternative presentations of the data

What is a problem with using incorrect training data to train a machine?

sample bias

Which of the following describes how well a system can adapt to increased demands?

scalability

What combines art with science to determine how to make URLs more attractive to search engines, resulting in higher search engine ranking?

search engine optimization

What is a standard security technology for establishing an encrypted link between a web server and a browser, ensuring that all data passed between them remain private?

secure sockets layer

Emily Graham wants to be a model, and she is constantly taking photos of herself and posting them to her Facebook and Instagram accounts. What are the photos called that Emily Graham is taking?

selfies

Which of the following terms represents how quickly a third-party or vendor can change a system to ensure it meets user needs and the terms of any contracts, including agreed levels of reliability, maintainability, or availability?

serviceability

What is software used to make a website's product catalog available for online ordering whereby visitors may select, view, add/delete, and purchase merchandise?

shopping cart

What is the type of authentication that requires a username and password?

single-factor authentication

What is the process of monitoring and responding to what is being said about a company, individual, product, or brand?

social media monitoring

To find out your company policy regarding such websites as YouTube, Facebook, and Twitter, you would have to refer to the ________ policy.

social media policy

What is unsolicited email that plagues employees at all levels and clogs email systems?

spam

What uses a systematic approach in an attempt to improve business effectiveness and efficiency continuously?

static process

What measures the amount of time visitors spend on a website or application?

stickiness

What type of decision is the following: How will new technology laws impact the business?

strategic decision

Which data type has a defined length, type, and format and includes numbers, dates, or strings such as Customer Address?

structured data

What asks users to write lines of code to answer questions against a database?

structured query language

Many social media websites use ________ or specific keywords or phrases incorporated into website content for means of classification or taxonomy.

tags

What is a well-planned strategy that ensures the search and navigation functions are easy to use and user-friendly on a website?

taxonomy

If you were thinking about a washing machine as a system, which of the following represents the outputs?

the clean clothes

What is software?

the set of instructions the hardware executes to carry out specific tasks

What is a problem that occurs when someone registers purposely misspelled variations of well-known domain names?

typosquatting

Miranda White likes taking old computer parts and remaking them into products such as earrings and clocks. Which of the following represents what Miranda is doing?

upcycle

In the information security policy, managers should consider including virus protection, which includes how often the system should be scanned and how frequently the software should be

updated

What are prescriptive analytics?

use techniques that create models indicating the best decision to make or course of action to take

In terms of big data, what includes the uncertainty of data, including biases, noise, and abnormalities?

veracity

What is a marketing phenomenon that facilitates and encourages people to pass along a marketing message?

viral marketing

What creates a virtual version of computing resources, such as an operating system, server, storage device, or network resource?

virtualized system

Which of the following describes a system's weakness that can be exploited by a threat?

vulnerability

What is the practice of tagging pavement with codes displaying where Wi-Fi access is available?

war chalking

What is deliberately searching for Wi-Fi signals while driving by in a vehicle?

war driving

What analyzes unstructured data associated with websites to identify consumer behavior and website navigation?

web analytics

Which of the following allows a user to access the WWW?

web browser

What is a locally stored URL, or the address of a file or Internet page saved as a shortcut?

website bookmark

What uses clickstream data to determine the effectiveness of the site as a channel-to-market?

website business analytics

What uses clickstream data to determine the efficiency of the site for the users and operates at the server level?

website traffic analytics

What is the DSS analysis that checks the impact of a change in a variable or assumption on the model?

what-if analysis

What is underfitting?

when a machine learning model has poor predictive abilities because it did not learn the complexity in the training data

What is overfitting?

when a machine learning model matches the training data so closely that the model fails to make correct predictions on new data

What is an encryption algorithm designed to protect wireless transmission data?

wired equivalent privacy


Conjuntos de estudio relacionados

Material Fallacies (Finals Studying)

View Set

Genetics Exam 1 & Final Material

View Set