Business Info Systems Exam 2 (MIS-3,8,6,7)

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which of the following is an example of why a database should be accessible through the web? (More than one answer)

1.) A large portion of a company's workforce are contract workers who work offsite, using their own devices to complete their work. 2.) A company has recently scaled its operations so that it competes internationally and needs business partners all over the world to have access to its database. 3.) A small distributor with limited staffing wants customers to be able to track the status of their orders without having to contact a customer service representative.

Select two objectives that might typically be accomplished during the planning phase (the second stage) of the project management process.

1.) A meeting with project stakeholders is convened allowing these key players to review the Gantt chart and the project timeline. 2.) A Gantt chart is created or fine-tuned if one was started during the feasibility study.

Business management systems need three major components in order to provide the services expected by today's managers. These include:

1.) A predictive information system 2.) A decision-making information system 3.) A database management system (DBMS)

Jim, an HR director, does not want to change business management systems, even though it brings several advantages and falls within his department budget. What are two reasons why Jim might not want to make the change? (More than one answer)

1.) Jim believes changing to the new system will cause a decrease in productivity, at least in the short-term. 2.) Jim believes the change will create employee stress as they are required to adapt to a new system.

Assisting managers by examining large quantities of data and parsing it into usable information is what makes data __ software so valuable in today's business world.

Analytics

What is the purpose of an SQL statement?

Answer questions about the database

The technology and processes used to gain intelligent, usable information from applicable databases across the Internet is referred to as ___ .

Big data analytics

Which type of database maintains the hardware and operating system offsite and is accessed via Internet-based applications?

Cloud database

Jose's business management system needs to meet very unique needs. He also has a very small IT department. Which business management system should Jose adopt?

Custom cloud-based Solution (PaaS or IaaS)

What element of a database field specifies the data in a field such as text, numeric, or date/time?

Data Type

Which statement best summarizes how organizations use data warehouses?

Data warehouses are used to store data from multiple sources for collective analysis.

Which statement most accurately describes the value of data integrity to an organization?

Databases and database management system (DBMS) with a high level of data integrity enable more efficient data maintenance in support of organizational goals.

Which statement best explains why traditional file systems have certain issues?

Each file is independent of another file in a traditional system.

Tracking the performance of employees will always be a critical component of management for this reason, most firms use ___.

Employee Evaluation Software

The third step in business process management provides managers with real-time (executable) decision making as well as the ability to play the "what-if" game by changing input variables (abstract) decision making. This is called the process __ step.

Execution

Which of the following is a tool commonly used by project managers?

Gantt chart (a horizontal bar chart that could be used to visualize a project schedule)

How does the structure of an online analytical processing (OLAP) database shape its core functionality?

Its use of data cubes allows users to conduct complex queries, analyses, and modeling by taking multiple dimensions of data (types or levels) into account and viewing data from multiple viewpoints or "slices" (such as by date and location).

Which of these steps in the data mining process most likely involves the actual "mining" or "Knowledge Discovery in Data"?

Model building and evaluation

The doubling of the number of transistors on each chip that occurs roughly every 18 months means that computer capability, and the corresponding software, also improve rapidly. This phenomenon is called _____ Law .

Moore's

Why is it important for all organizations, no matter how small, to create and implement organizational information policies?

Organizational data are a critical asset; it is important to ensure its security.

The four steps in a data quality audit are ______.

assessment, design, transformation, and monitoring

Referential integrity states that structural relationships in relational databases must ______.

be consistent: a foreign key field that references a primary key field must agree with that primary key

Along with their pay, HR managers often need to track employee hiring dates, marital status, number of dependents, cafeteria choices, and usage, in order to accurately manage their employees' ___ . For this reason, nearly all firms use a management system to ensure this is done correctly.

benefits packages

Many managers, particularly in smaller firms, use companies such as Zenefits and BenefitFocus to manage their employees' ___.

benefits systems

To search a database for information, create a ___.

query

Select two examples of the direct inquiry method of data collection.

1.) A fitness app that tracks your workouts 2.) A loyalty card that awards points for every purchase

Select three examples of why inventory management is often critical to business success.

1.) A grocery store must reduce prices and ultimately dispose of overripe fruit. 2.) The lack of necessary inventory can bring production to a halt or cause lost sales and dissatisfied customers. 3.) An electronics retailer must mark down outdated smartphones.

Select the three correct statements regarding patents.

1.) A patent will only be granted for something that is useful. 2.) To qualify for a patent, the invention must be non-obvious, meaning that a skilled artisan would find the invention surprising or unexpected. 3.) To qualify for a patent, the invention must be novel, or different, from other similar inventions.

Select three objectives that might typically be accomplished during the initiation phase (the first stage) of the project management process.

1.) A projected timeline for deliverables is developed. 2.) A statement of work or other working agreement is created. 3.) Stakeholders in the project are identified.

Which three of the following are considered intellectual property and entitled to protection?

1.) A song that you wrote. 2.) A story that you published. 3.) A mural that you painted.

Which of the following is an example of what an information policy could specify? (More than one answer)

1.) A user agreement on a website indicates that it will store the browsing history linked to the IP address for an indefinite amount of time and reserves the right to sell that information to interested parties. 2.) A large corporation grants access to salary information to the direct supervisors of employees and to members of the Human Resources department who administer payroll. 3.) A health insurance company stores data that patients self-report as inputs on its website, but does not link that data with information about the patient's search history.

Which of the following are examples of data objects that a relational database management system (RDBMS) may include? (More than one answer)

1.) Addresses of the company's wholesalers and the number of items in a company's inventory 2.) Names of customers and records of when merchandise was returned

Relational database management systems (RDBMS) have a variety of tools that can be used to execute/run queries. One of these query tools is the ability to execute/run action queries. Which of the following are common types of action queries? (More than one answer)

1.) Append query 2.) Delete query 3.) Update query

White hat hackers use the same techniques and tools that are used by illegitimate hackers. These tools include which of the following?

1.) Back door programs 2.) Rootkits 3.) Social engineering

Select two ways managers encourage employees to act unethically.

1.) By not enforcing strong ethical behavior. 2.) By failing to act ethically themselves.

According to the Federal Emergency Management Agency (FEMA), which of the following are steps businesses can take to help protect systems, data, and information from natural disasters?

1.) Create a business continuity plan 2.) Utilize off-site cloud storage 3.) Store data in different areas across the United States (geographic data redundancy)

Mohammed is experiencing issues with his work computer. He speaks to the IT department and they identify various symptoms of a computer virus. Symptoms of a computer virus include:

1.) Critical files may be automatically deleted 2.) Unexpected error messages 3.) The operating system may not launch properly

Select the reasons a government may choose to get involved in state-sponsored cyberwarfare.

1.) Cyberwarfare can cause widespread damage to IT infrastructure. 2.) Cyberwarfare is relatively inexpensive when compared to traditional warfare. 3.) Cyberwarfare is often difficult to trace and identify.

According to Norton, which of the following steps should be taken to defend against rootkits?

1.) Don't ignore software updates 2.) Be aware of phishing emails 3.) Watch out for drive-by-downloads

Which of the following statements accurately describes spyware? (More than one answer)

1.) Downloading software or documents from unvetted sources is one way spyware can be installed. 2.) Spyware captures private information by monitoring how users interact online.

Which three of the following can encourage ethical computer use in the workplace?

1.) Employee monitoring software 2.) Remote desktop software 3.) Setting a good example

Select three examples of the impact of advancements in business management systems on the expectations of users.

1.) Employees expect to make changes to their tax withholding online. 2.) A manager expects to view changing sales projections from different stores from a computer in her office. 3.) Students expect to be able to view a syllabus, from any course, at any time from their phone.

Place the 5 steps of business process management (BPM) in order with the first step at the top.

1.) Examining the design of the process 2.) Modeling the process 3.) Running the process 4.) Monitoring the process 5.) Initiating process improvements

Which 3 of the following are examples of cyberattacks?

1.) Identity theft 2.) Pharming and phishing 3.) DoS attacks

Select three common methods in which organizations collect data.

1.) Indirect tracking 2.) Third-party data purchase 3.) Direct inquiry

Select two concerns that fall into the dimension of establishing standards in the digital age.

1.) Lynn checks her personal social media sites approximately 16 times per day while she is at work. Is this too much? 2.) A hotel allows employees to use its Wi-Fi to stream audio and video while they are working. Should the amount of streaming be limited?

Which three of the following are widely used tactics that can help keep you safe on the Web?

1.) Make sure the sites you visit use HTTPS if entering personal information 2.) Consider using a VPN 3.) Use your browser's private browsing mode.

Select the true statements about state-sponsored cyberwarefare.

1.) Originate and are executed by foreign governments. 2.) Can be used to send warnings or to create conflict between countries. 3.) Attacks can be directly launched by a foreign government or by a group or individual who has been paid by to execute the attack

Which of the following statements correctly describes phishing?

1.) Phishing scams use legitimate looking email messages to con a user into giving up private information. 2.) Phishing is the illegitimate use of an email message that appears to be from an established organization such as a bank.

Select three steps you can take to help to safeguard your privacy in the digital age.

1.) Practice safe online purchasing techniques 2.) Monitor your credit reports 3.) Incorporate anti-virus protection

Select the true statements about ransomware attacks.

1.) Ransomware attacks invade computers via Trojan Horse viruses, worms, or by a user opening a legitimate looking email. 2.) Ransomware is malware that makes a computer's data inaccessible until a ransom is paid. 3.) One of the most popular methods used in ransomware attacks is through phishing.

Human resources managers focus on which three of the following?

1.) Recruiting, hiring, training, retaining, compensating, appraising, promoting, reassigning, and firing employees 2.) Managing employee grievances, absences, sick days, and paid-time-off days 3.) Scanning the environment to determine future HR needs

Emerson has decided to implement a new business management system. What are three advantages of choosing a cloud-based custom option such as a platform as a service (PaaS) or an infrastructure as a service (IaaS) system, over an on-premises option?

1.) Reduces the need for a large IT staff 2.) More secure from hackers 3.) Storage size can be quickly scaled to meet changing needs

Rootkits are typically used to allow hackers to do which of the following?

1.) Remotely control the operations of a computer. 2.) Create a backdoor into a computer

Select three correct statements regarding international Internet privacy laws.

1.) The European Union (EU) European Commission Data Protection Directive states that under EU law, personal data can only be gathered legally under strict conditions. 2.) International laws on Internet privacy vary greatly. 3.) It is very difficult to get nations across the globe to agree on standardized Internet privacy laws.

There are five basic ethical principles that we can look to when facing an ethical dilemma. Select the three ethical principles from the choices offered.

1.) The Principle of Moral Rights 2.) The Principle of Virtue 3.) The Principle of Distributive Justice

Select the three correct statements regarding credit monitoring.

1.) Three major credit agencies, TransUnion, Equifax, and Experian provide credit reports to lenders. 2.) An easy way to monitor your credit rating is simply to order your FICO score from each different agency every four months and check for unusual activity. 3.) Checking your own credit score is referred to as making a "soft inquiry" and does not affect your credit rating.

Select the three major titles of the Digital Millennium Copyright Act (DMCA) that impact digital copyright protection.

1.) Title 1 - This act requires that measures be taken to make it difficult to copy analog video recordings. 2.) Title 4 - This act facilitates distance learning by allowing educational institutions latitude with regard to the use of copyrighted material. 3.) Title 2 - This act protects Internet Service Providers (ISPs) from being sued for copyright infringement when the ISP's user wrongfully copies items from the Internet.

One method organizations are using to deal with the increase in cybersecurity threats and the decrease in the effectiveness of traditional security means is through the use of behavior science in their data and network security policies. One of these methods is called UEBA. Select the true statements about UEBA.

1.) UEBA uses a variety of different tactics to create a map of pattern behavior including machine learning, statistical analysis, and artificial intelligence (AI) 2.) UEBA stands for user and entity behavior analytics 3.) It is a type of cybersecurity that observes and records the conduct of computer and network users

Which of the following statements about computer viruses are true?

1.) Viruses can destroy programs or alter the operations of a computer or network. 2.) A computer virus is software that infects computers and is created using computer code.

Select 3 common services provided by project management (PM) systems software.

1.) Visual project depictions 2.) Document storage 3.) Permissions levels

Select three privacy concerns associated with cookies.

1.) Websites can use cookies to track your surfing behavior and use this information to create specific user profiles. 2.) Corporate and government entities can use cookies to monitor your surfing behavior. 3.) Websites that use cookies can collect information about surfing habits and sell that information to a variety of third-parties.

Recently, TechJury compiled a list of cybersecurity statistics that show the impact of different malware and network attacks. What percentage of cyberattacks are aimed at small businesses?

43%

A deliberate misuse of computers and networks via the Internet that uses malicious code to modify the normal operations of a computer or network is called __.

A cyberattack

Used by firewalls, routers, and computers that are part of a network and are connected to the Internet, Network ___ Translation provides a type of firewall protection by hiding internal IP addresses.

Access

Managers and management information systems can begin the process of increasing process efficiency by breaking each business process into its constituent ___.

Activities

What is conducted in the process design step of business process management?

Activities are examined and divided into their individual components.

A computer program that scans files to identify and remove computer viruses and other malicious programs is called _____.

Antivirus software

Security risk can be calculated using the following calculation: Risk = Threat x Vulnerability x _____

Asset

What business management system seeks to streamline an organization's activities to prevent backlogs and inefficiencies?

Business Process Management (BPM)

Mapping and analyzing business processes allows managers to gain control over unwieldy and often chaotic processes, allowing them to focus on creating efficiencies. This is part of ___.

Business process management

The process of gathering, storing, and searching relevant data is referred to as ___ .

Data science

Changing cookie settings in one browser (Chrome, for example) will automatically change your cookie settings in your other browsers (Safari, Firefox, Edge, for example). (True or False)

False

Computer viruses are not frequently disguised as attachments of funny images, greeting cards, or audio and video files. (True or False)

False

Which dimension of ethical behavior in the digital age is represented by the following question? You are interviewing 3 applicants for a management position in your firm and wish to ensure that they will represent your company with professionalism and maturity. Should you check the applicants' social media sites prior to making your hiring decision?

Information Privacy Rights

Calculating re-ordering points and order quantity levels are key advantages of modern ___ .

Inventory Management Systems

Select the objective that is typically accomplished during the execution phase (the third stage) of the project management process.

Managers monitor the progress of the project and resources.

The technology that provides a type of firewall protection by hiding internal IP addresses is called _____.

Network Address Translation (NAT)

A checkbox may ask if you want to receive news and updates, or participate in surveys from the site. When creating or browsing websites, this checkbox is referred to as an ___.

Opt-in and Opt-out

Activities where white-hat hackers are paid to hack into private networks and applications is referred to as __ testing.

Penetration

The law passed in 1986 that protects email and VoIP communications by making it illegal to intercept calls or messages without a warrant is The Electronic Communications _____ Act.

Privacy

All the steps required for the HR department to onboard a new employee would be referred to as a business ___.

Process

In the first step in business process management, analysts often "storyboard" the processes in an attempt to view the entire system prior to investigating each component. This is called:

Process Design

The 3rd step in business process management provides managers the ability to play the "what-if" game by changing input variables (abstract) decision making. This is the ___ step

Process Execution

The 2nd step of BPM involves the use of flow-charts and other tools to examine decision points and inputs. This step is called:

Process Modeling

In the fourth step in business process management, managers track the individual components of the process as well as the process as a whole so engine performance can be measured. This is the __ step.

Process Monitoring

By identifying potential slowdowns or savings opportunities, the last step of business process management, the ___ step allows managers to create a continually improving process.

Process Optimization

Managers are able to visualize the entire process and see how each activity interacts with other activities and the business process itself during business ___.

Process management development

One version of this type of malware encrypts a victims data until a payment is made. Another version threatens to make public a victim's personal data unless a payment is made. This type of malware is called ___.

Ransomware

Because the number of variables involved in calculating future workforce needs makes this determination highly complex, HR managers often rely on ___

Recruiting and Hiring Software

For which task is a data mart more useful or appropriate than a data warehouse?

Resolving a current problem with a specific type of inventory, purchase transaction, or supply chain

Which of the following is a task that an SQL statement would be expected to perform?

Retrieve data

A type of cookie, sometimes called a transient cookie, that is not stored but just kept in memory when a user visits a website is called a _____ cookie.

Session

Which two of the following potential workplace computer ethics violations are also illegal activities.

Software piracy using an employer's computer network. Computer scams launched from work computers.

The NIST states that cybersecurity risk assessments are essential for determining which data should be protected. NIST stands for National Institute of ___ and Technology.

Standards

Will the decision impact the privacy or property rights of any individuals or corporations? This question should be asked in which step of the 5 steps of an ethical analysis.

Step 2 - Determining the affected.

A DBMS maximizes the benefits a database can provide. DBMS stands for Database Management ____.

System

Which Act, signed into law in December 2015, allows companies to share cyber-security threat information with the U.S. government?

The Cybersecurity Information Sharing Act

Which Act protects email and VoIP communications by making it illegal to intercept calls or messages without a warrant.

The Electronic Communications Privacy Act

Which Act outlines a plan to protect government information and assets against cyber threats.

The Federal Information Security Management Act (FISMA)

Which principle of ethical conduct attempts to distribute rewards equitably to individuals based on their level of productivity?

The Principle of Distributive Justice

Which principle of ethical conduct asks the decision-maker to consider what a highly moral person would do when faced with this question.

The Principle of Virtue

Which law, passed after the 9/11 attacks allowed law enforcement to obtain information about online and offline communications related to terrorist activities without a warrant.

The US PATRIOT Act/USA Freedom Act

Which principle of ethical conduct states that a manager must attempt to determine if a decision is fair for all involved.

The Universalist Principle

This federal law protects person-to-person wire, oral, and electronic communications.

The Wiretap Act

Visualization tools

These display information in a manner that make it easier for managers to assimilate or to see patterns.

These programs use a variety of techniques to identify and remove viruses and malware. ---> This keeps your computer from storing cookies, but doesn't securely hide your identity beyond the device because your IP address can still be tracked. ---> This essentially hides your IP address to outside websites by running your communications through a secure network. ---> Checking your FICO score from each different agency every four months and watching for unusual activity. --->

These programs use a variety of techniques to identify and remove viruses and malware. ---> Anti-virus software This keeps your computer from storing cookies, but doesn't securely hide your identity beyond the device because your IP address can still be tracked. ---> Private browsing This essentially hides your IP address to outside websites by running your communications through a secure network. ---> Virtual private network (VPN) Checking your FICO score from each different agency every four months and watching for unusual activity. ---> Credit monitoring

Why do large, data-driven companies use analytic platforms?

They generate vast amounts of organizational data and need to be able to rapidly analyze and interpret this information to make informed business decisions.

Why must database administrators (DBA) be trained or experienced in using an organization's specific database platform?

They must troubleshoot or solve problems with the database when necessary.

You own a real estate brokerage and need a list of high-income residents. You buy the list from a data marketing company. This is called ___.

Third party data purchase

Data mining

This accesses external databases as well as data that the firm has collected itself (internal data).

Predictive analysis

This uses algorithms to determine the most likely outcomes given a set of inputs.

Business Intelligence (BI)

This uses data mining techniques combines and then adds data visualization tools so that managers can make faster, more informed, decisions.

What is the primary role of a database administrator (DBA)?

To monitor the database and ensure that it functions when needed

This principle simply states that when faced with an ethical dilemma the manager should choose the option that does the greatest good for the most involved.

Utilitarian Principle

A leading manufacturer of fitness trackers partners with a large health insurance network. Insurance network members receive a discounted fitness tracker and financial rewards for setting and achieving tracked personal fitness goals. Which characteristic of the resulting Big Data would be most directly affected by a tracker software error that counted users' arm movements as steps?

Veracity

BI has no value if it cannot be interpreted and presented effectively to decision makers. Because of this, one of the most important features of any BI system are its data __ tools.

Visualization

A corporate sales organization is hosting its annual regional meeting. It needs to book a hotel within the region where attendees will stay for three days and two nights. The hotel must have: 30 standard hotel rooms for its sales reps, 5 suites for the regional managers, and 5 conference rooms to hold training sessions. There also must be two restaurants within walking distance of the hotel that can accommodate a dinner reservation for 40 people. Which web mining technique would the organization use to narrow down the choices of hotels to those that fit these parameters?

Web content mining

TechJury compiled a list of cybersecurity statistics that show the impact of different malware and network attacks. Match the correct percentage to the correct statement. What percentage of cyberattacks are aimed at small business? ---> What percentage of cyberattacks are launched with a phishing email? ---> What percentage of daily email attachments are harmful for their intended recipient? ---> What percentage of malicious attachments are masked as Microsoft Office files? --->

What percentage of cyberattacks are aimed at small business? ---> 43% What percentage of cyberattacks are launched with a phishing email? ---> 91% What percentage of daily email attachments are harmful for their intended recipient? ---> 85% What percentage of malicious attachments are masked as Microsoft Office files? ---> 38%

Under what circumstance should you report a computer ethics violation to your employer?

You pass a co-worker's computer screen and see him surfing through child pornography.

Data mining is best described as ______.

a research and analysis technique in which data analysts employ mathematical tools and artificial intelligence (AI) to search large volumes of data and discover less-obvious patterns and trends

A specific step within a process is called a business ______

activity

Methodologies that attempt to deal with the vast amount of complex information that accumulates at high, and accelerating, velocity use _____ data.

big

A group of computers under the control of a hacker is referred to as a

botnet

Management information systems because they can be used to communicate, coordinate, and monitor business activities, can be indispensable when it comes to using ___.

business processes

The purpose of spyware is to ______.

capture the user's account data, passwords, key strokes, and more

The dimension (category) of ethical dilemmas that examines how individuals or corporations can be held responsible in case of violations of privacy or intellectual property rights is referred to _____ and accountability.

control

This is a small text file of information created by websites you visit that your web browser stores on your hard disk.

cookie

A form of protection provided by the laws of the United States for "original works of authorship", including literary, dramatic, musical, architectural, cartographic, choreographic, pantomimic, pictorial, graphic, sculptural, and audiovisual creations is called a _____

copyright

Because it is difficult to trace and it is accessible through any Internet connected device, cyber criminals often request payment in ___ .

cryptocurrency

Skyler, an executive, wants to implement a business management system that can be quickly scaled as he anticipates rapidly changing database storage needs. He likes his uniquely developed current system but wants increased security from hackers while decreasing his need for a large IT department. Skyler should choose a ___

custom Cloud-based solution (PaaS or IaaS)

The business management system seeks to manage a firm's interactions with customers using analytics and data analysis to identify the most valuable customers and target future customers is the customer management system.

customer relationship management system

To maximize a sale force's efficiency and effectiveness, managers use _____ relationship management systems.

customer relationship management systems

A deliberate misuse of computers and networks, _____ use malicious code to modify the normal operations of a computer or network.

cyberattacks

A crime in which a computer is the object of the crime or is used to commit a criminal offense is called _____.

cybercrime

Cyberattacks that originate and are executed by foreign governments is called state-sponsored _____. These attacks can be directly launched by a foreign government or by a group or individual who has been paid by to execute the attack.

cyberwarfare

Nearly all BI software platforms have a(n) ___, that displays an overview of the data that is presented.

dashboard presentation

Insurance companies use big _____ in actuarial analysis in order to more accurately estimate risk, often lowering the cost of their services.

data

Raw facts that describe the characteristics of an event, object, or set of information that can be entered into a computer is ______

data

Establishing how an organization manages its data and making sure the organization adheres to these methods is a function called ______.

data administration

Data integrity is increased when ______.

data are centralized

Organizing data so that data are in simple tables without any redundancies is known as __________.

data normalization

The 3 main components of a business management system include a decision-making information system, a predictive information system, and a ___.

database management system

Integrating database management systems (DBMS) with predictive analytics, to give managers a recommended course of action is the focus of ___

decision making management information systems

The first step in business process management examines business activities and breaks them down into their individual components. This is called the process ______ step.

design

Customers are offered a free dessert if they complete a survey. This method of data collection is referred to as _____ inquiry.

direct

A _____ denial-of-service (DDoS) attack takes place when a hacker gains unauthorized access and control of a network of computers that are connected to the Internet.

distributed

Through training and repetition, employees become experts at a specific activity, leading to increased efficiencies. This concept is referred to as ___.

division of labor

The practice of data scrubbing is a vital part of data quality management because it ______.

ensures ongoing data validity by identifying and then fixing data errors

Determining how much time employees should be allowed to browse their social media sites while at work falls under which dimension of ethical behavior in the digital age?

establishing standards

A religious leader might instruct you on how to uphold high morals, but the reasons for acting morally are based on your ___.

ethics

Organizations use data warehouses mainly to ______.

facilitate the analysis of data from multiple sources

The ethical concerns of the digital age can be divided into ___ dimensions (categories).

five

Select the first step in the five steps of an ethical analysis.

getting the facts

Artwork, literary works, inventions, music, and images are some of the creations that most societies believe should be protected. These works are considered _____ property and can be protected with copyrights, trademarks, and patents.

intellectual

A form of spyware that records all actions typed on a keyboard is called a _____ logger.

keystroke

The final step when making an ethical analysis is to make a decision and to prepare for the consequences. Preceding this is the fourth step, which has the manager ___ .

listing options

Many businesses have reduced the likelihood of experiencing an expensive data breach by moving data storage to __

major cloud storage service providers such as Amazon Web Services.

Decision _____ management information systems provide managers with tools to assist them in using this data to make better choices.

making

Managers should opt for a system that integrates easily with existing business management software, and that will take the shortest training time for employees that need to provide sale's or usage quantity inputs when choosing an inventory ______ solution.

management

The goal of business process _____ is to continually increase process efficiency.

management

Cookies stored on your device's hard drive and remain even if your computer has been restarted are called __ cookies.

persistent

Employee compensation software at major corporations is often included as part of its enterprise resource _____ (ERP) software suite.

planning

Managers must protect the online ___ of employees and organization stakeholders.

privacy

Monitoring your credit, creating strong passwords, using anti-virus protection, and practicing safe browsing techniques are methods of protecting your personal _____ while using the Internet.

privacy

Your right to control what happens with personal information about you is centered around the right to

privacy

By allowing managers to automate business processes through modeling, analyzing, and improving efficiencies, business _____ management (BPM) systems streamline organizations' activities.

process

By allowing managers to automate business processes through modeling, analyzing, and improving efficiencies, business ______ management (BPM) systems streamline organizations' activities.

process

Every business function will have a set of business ______ to accomplish the specific goals of the function.

processes

Studies indicate that the more time teens spend on social media the more likely they are to suffer from depression. This concern falls in the ethical dimension of _____ of life.

quality

The principle of ethical conduct that states that some decisions are either morally right or morally wrong is called the principle of moral _____

rights

Because prior management decisions might provide guidance on your current situation, the third step of an ethical analysis is to ___ .

search for precedents

Which of the following is not one of the steps included in the 5 steps of an ethical analysis?

setting a strong example

Hubspot CRM, Zoho CRM, and Freshsales CRM aim to meet the needs of ___ .

smaller businesses

Specialized hardware or software that capture packets transmitted over a network are called packet ___.

sniffers

The best way of implementing a new BI system is to make it as seamless as possible by using ___.

software with which the users (typically first line employees, supervisors, and junior management) are already familiar

Unlike phishing which does not have a specific target and is designed to reach the maximum amount of people, _____ phishing is a precise type of attack.

spear

The dimension (category) of ethical concerns in the digital age that refers to determining what constitutes proper levels of protection of digital information is called establishing __.

standards

The primary characteristic of a relational database is that it ______.

stores and allows access to data objects that are related to one another

Decision making management information systems became necessary because ___

the amount of information available far exceeds any manager's ability to take advantage of this increased information.

Even though the Child Online Protection Act of 1998 was sponsored by both Democrats and Republicans and was passed by both Houses of Congress and signed into law by President Clinton, you cannot be punished for violating law because ___ .

the law violated the 1st Amendment (freedom of speech) rights and was found unconstitutional.

Using cookies to follow someone's browsing patterns is a form of data collection called indirect

tracking

A program that appears legitimate, but executes an unwanted activity when activated is called a _____ horse virus.

trojan

As reported by Andrei Ene, Tiny Banker _____ (TBT) is one of the worst malware attacks in the last 10 years.

trojan

Part of making an ethical decision is understanding that your decision will most like result in ___ .

unintended consequences

Which of the following is an example of a web experience that could be improved by web mining? (More than one answer)

1.) A travel company wants to know what amenities people search for before booking a hotel for a vacation so that the company can increase the coverage of those amenities on their website. 2.) A small online retailer has noticed that most people viewing products from its gaming pages browse for about 5 minutes and end up making purchases, but over 75 percent of people viewing products from its home goods pages leave within the first 30 seconds. It wants information on how the two pages are different. 3.) A subscription learning app that targets kindergarten students wants to meaningfully update its lessons so that visually impaired children can use them.

Which of the following are advantages of cloud databases over a traditional database? (More than one answer)

1.) Are maintained by an external provider, such as Amazon or Oracle 2.) Can support both SQL and NoSQL databases 3.) Can be accessed through an application programming interface (API)

Which of the following tasks are NoSQL databases designed to do? (More than one answer)

1.) Create queries from the data created from web apps 2.) Analyze nonstructured data 3.) Manage large datasets across different platforms

A query is a request for information stored in a database. One of the benefits of using a database to store information is the ability to run a query. In relational database management systems (RDBMS), there are a variety of query tools that are used to execute and run queries. Which of the following are tools used to run queries in an RDBMS? (More than one answer)

1.) Crosstab queries 2.) SQL specific queries 3.) Action queries

Select the two statements that correctly explain the roles of data marts and data warehouses in a decision support system (DSS).

1.) Data marts are used to analyze recent data that a department needs for operational troubleshooting and management, because they collect and measure data specific to that area. 2.) Data warehouses are used to analyze long-term, historical data for an organization's strategic purposes, because they store data from different time periods and subject areas.

Which of the following sets of characteristics specifically apply to relational databases? (More than one answer)

1.) Data tables in a relational database are linked by the fields they have in common. 2.) A relational database organizes data in tables composed of records or objects (the rows), and fields (the columns).

Which of the following correctly describes a type of data mart? (More than one answer)

1.) Dependent data marts extract data from a data warehouse when it is needed. 2.) Hybrid data marts combine data from a data warehouse and other collection systems. 3.) Independent data marts are separate from a data warehouse and are created in order to collect data relating only to particular business functions.

Which of the following improvements might be the direct outcome of a data quality audit? (More than one answer)

1.) Elimination of redundant metadata and strengthened referential integrity 2.) Recommendations for a new data management design and prescriptions for preserving data quality 3.) Corrections in source data issues and ways to examine data over time

Select 3 activities that typically fall under the purview of an HR manager.

1.) Fraternization policies 2.) Dress policies 3.) Employment agreements

Sara, an executive with McMurtry Management, has decided that her organization needs to update its business management system. What three questions should she consider prior to choosing a system?

1.) Is the change worth the expense and impact on employee morale? 2.) Where will the new system be housed? 3.) How will the new system interact with existing systems?

Why is online analytical processing (OLAP) software included in many business intelligence (BI) software applications? (More than one answer)

1.) It allows users to view data from different perspectives or angles and gain new insights. 2.) It allows for sophisticated data and trend analysis, data modeling, and forecasting. 3.) It allows reports and analytics to be exported to more user-friendly, front-end tools.

Ayala has decided to implement a new business management system. What are two advantages of hosting on-premises?

1.) It can be configured to meet the unique needs of the organization. 2.) Any changes deemed necessary can be implemented extremely quickly.

Select three objectives that might typically be accomplished during the closure phase (the last stage) of the project management process.

1.) Managers document the lessons they learned during the project's execution. 2.) Stakeholders discuss how closely the project met expectations. 3.) All associated contracts are ended.

Which of the following is an example of the type of information data mining can yield? (More than one answer)

1.) Middle-aged males who are members of their local church bible study group are more inclined to vote than younger males who are also members of local bible study groups. 2.) The likelihood of a Gen-X female who makes $50,000 and is divorced with no children will take a trip within a year of her divorce being finalized

Which of the following is an example of an organization analyzing predictive behavior with the goal of creating new offerings?

1.) Netflix tracks what users who viewed all three seasons of Stranger Things also had in their queues. 2.) An in-home healthcare provider tracks the hospital readmission rates of elderly people who live alone after they received care for falling in their homes.

Which of the following tasks can businesses perform with the help of in-memory computing? (More than one answer)

1.) Predicting the impact of news on stock prices and conducting immediate transactions 2.) Alerting online customers that the desired item is out of stock, before the order is placed 3.) Mapping alternate driving routes to help truckers avoid bad weather and traffic jams

Select three popular inventory management systems.

1.) QuickBooks Enterprise 2.) SAP Material Management (SAP MM) 3.) Oracle NetSuite

Select three methods businesses use to house a business management system.

1.) SaaS solution 2.) Customized, cloud-based solution (PaaS or IaaS) 3.) On-premises custom solution

Select three common features of modern data visualization tools that accompany most business intelligence (BI) systems.

1.) Scroll-over features 2.) Search capabilities 3.) Dashboard presentation

Which of the following is an example of an advantage of being able to access a database via the web? (More than one answer)

1.) Your product is primarily sold in developing countries where most of your suppliers are small business owners who access the Internet via a mobile device instead of a computer. 2.) Your company needs suppliers in all countries to be able to access your inventory database. 3.) Turnover among telephone customer service representatives at your company is high and they receive only brief training before they interact with customers. Reps need to be able to access your sales database to assist customers who call.

Given the Four V's of Big Data, which of the following organizations most likely uses Big Data?

A leading news website that uses data about its visitors' and followers' activities to shape its news coverage, customize news alerts, and gain advertisers and subscribers.

How are data marts different from data warehouses?

Data marts focus on an individual department or business function and manage less data than a data warehouse.

What term describes the process organizations use to discover meaningful relationships and patterns among the data sets it has collected?

Data mining

Brooks Accounting is no stranger to audits—for their customers. Managers discovered some issues in services and billing they suspected were linked to their database practices rather than to employee competence. Brooks hired an outside firm to perform a data quality audit. Which statement best describes how the audit process identified problems?

Data profiling analyzed the accounting firm's data sources.

When using a flowchart as part of business process modeling notation, a ___ shows the project's beginning and ending points.

Oval

When implementing a new business management system, which option provides managers with lowest initial start-up expenses.

Software-as-a-Service (SaaS) Option

Flowcharts are often used in business process modeling notation (BPMN), to provide a concise graphical depiction for documenting business processes. Match the flowchart symbol with its typical use. The Oval --> ______ The Arrow --> ______ The Rectangle --> ______ The Diamond --> ______

The Oval --> Shows the project's beginning and ending points. The Arrow --> Indicates the directional progress of the flowchart. The Rectangle --> Indicates an activity in the process The Diamond --> Represents decision points and typically hold questions.

Which statement best summarizes the primary advantages of performing a data quality audit?

The audit recommends ways the organization can improve its data quality and reduce costs through increasing data consistency.

What is conducted in the process execution step of business process management?

The business process execution language engine is run.

A mid-sized independent hardware store has recently merged with a large national chain. The local owners have long used a reliable database to manage inventory. Their database has been essential in balancing orders for seasonal merchandise with the problem of limited shelf space. The merger will soon entail managing many more types of data, as the national chain has approved lists of suppliers, precise requirements for recording transactions, specific human resources procedures, and more. Which statement best summarizes what the local managers will be able to do for the first time when they start using the parent company's database management system (DBMS)?

The managers will be able to create, edit, and store data in a secure manner across all data types required by the parent company.

Which statement best summarizes how a data governance (DG) plan is created?

The plan is tailored to the organization's specific goals, objectives, and activities.

The 3rd stage of the project management (PM) process, in which managers constantly monitor the progress of the project and the project's resources. is the ___ phase.

execution

To control how information is entered into a database, programmers and database administrators create ___ to help ensure data integrity.

forms

Organizations perform data quality audits in order to ______.

gain an overall assessment of the strengths and weaknesses of their data

The primary purpose of a business intelligence (BI) system is to ______.

help a business make strategic decisions based on its own data

A database management system (DBMS) is a computer program that is used to ______.

help organize the data found in a database

A company's periodic web mining exercise to determine its best-selling products resulted in the discovery that a product sold in conjunction with a movie released 10 years ago has recently become coveted by nostalgia fans. The company redesigned its website so that interested consumers can purchase the product right on the homepage. This company has used web mining to ______.

improve site usability

Forms structure data input to help ensure data ____ , meaning the information entered is accurate, timely, and useful.

integrety

Businesses can use in-memory computing to conduct or support almost any task that ______.

involves the near-instantaneous processing and analysis of huge volumes of data

Providing a concise graphical depiction for documenting business processes, business process _____ notation (BPMN) often involves the use of flowcharts.

modeling

Jameson, a senior executive, wants significant control of his business management system so that he can implement changes to quickly adapt to the dynamic business environment. The system that would best meet these needs would be a ___ system.

on-premises option

The fifth and final step in business process management has managers adapting the process to enhance process performance. This is called the process ____.

optimization

In contrast to computerized systems, traditional file management systems can create issues with ______.

organization, repetition, and lack of consistency

During the second stage of the project management (PM) process, a Gantt chart is created, or fine-tuned if one was started during the feasibility study. This is called the ____ phase.

planning

The 2nd stage of the project management (PM) process, which involves meetings with project stakeholders is the ___ phase.

planning

The Important goals of data governance (DG) are to ______.

protect data from risk, misuse, regulatory noncompliance, and quality and cost issues

In a relational database, such as Microsoft Access, a collection of related fields in a data file is called a ___.

record

A link between tables in a relational database that defines how the data are related is called a _____.

relationship

Forms allow data to go into a database, ___ displays information coming out of a database.

reports

To display or distribute information from a database, programmers or database administrators create ___.

reports


Conjuntos de estudio relacionados

Assisted Delivery and Cesarean Birth

View Set

NU141- Chapter 24 Antiparkinsonism Agents

View Set

Analyze the effect of colonial rule on Native American societies in TWO areas of the region.

View Set

Economics Final Exam Defintion Quizlet

View Set