CIS Test 1

¡Supera tus tareas y exámenes ahora con Quizwiz!

Select the three structured decisions that are almost repetitive in nature and affect short-term business strategies.

Creating employee staffing schedules Reordering inventory Creating weekly production schedules

Who includes governments that are after some form of information about other governments?

Cyberespionage

Which statement accurately describes the relationships between departments in a company for making solid business decisions for the company to operate as a whole?

Departments are interdependent and need data from other departments

What delivers everything from animation to graphics and music to movies; it can also be used to build complicated web applications and works across platforms, including a PC, tablet, smartphone, or smart TV?

HTML 5

What is the Internet protocol web browsers use to request and display web pages using universal resource locators?

HTTP

______ is the Internet protocol web browsers use to request and display web pages using universal resource locators.

HTTP

When considering the interrelationships between efficiency and effectiveness where does a company want to operate?

High efficiency, high effectiveness

Which company took advantage of the long tail?

Netflix

Transforms raw materials or inputs into goods and services. Transforms raw materials or inputs into goods and services.

Operations

Select three primary value activities.

Outbound logistics Inbound logistics Marketing and sales

What acquires raw materials to manufacture, deliver, market, sell, and provide after-sales services?

Primary value activities

Select the three characteristics of online transactional processing.

Processes the information according to defined business rules Stores the information Updates existing information to reflect the new information

Select four pressures that Michael Porter identified as potential challenges to the profitability of a company.

Substitute products can steal customers. Influential suppliers can drive down profits by charging higher prices for supplies. Competition can steal customers. New market entrants can steal potential investment capital.

Select two support value activities.

Technology development Firm infrastructure

Select the group of items that can be determined using information.

The best-selling product, best customer, and worst-selling product

Choice, Chooses business focus Chooses business focus

The three generic strategies matches

What is the address of a file or resource on the web such as www.apple.com?

Universal Resource Locator (URL)

Select two reasons why ebusiness has expanded global reach.

Unlimited size Unlimited customers

Select two terms for content created and updated by many users for many users.

User-generated content User-contributed content

Select two accurate statements relating to an ethical computer use policy.

Users need to consent to following the rules Users need to be informed of the rules

What is the primary difference between a worm and a virus?

Viruses attach to something, worms tunnel themselves

Provides access to Internet information through documents, including text, graphics, and audio and video files that use a special formatting language called Hypertext Markup Language.

WWW

________-if analysis checks the impact of a change in a variable or assumption on the model.

What

Which question can be answered using business intelligence?

What was the lowest sales per week compared with the economic interest rate?

What is underfitting?

When a machine learning model has poor predictive abilities because it did not learn the complexity in the training data

What is overfitting?

When a machine learning model matches the training data so closely that the model fails to make correct predictions on new data

What are mathematical formulas placed in software that performs an analysis on a data set?

algorithm

Which form of communication do the message and the response not occur at the same time?

asynchronous communication

Detection and response

attacks

What is the process of computerizing manual tasks, making them more efficient and effective and dramatically lowering operational costs called?

automation

What is a robot capable of making its own decisions and perform an action accordingly?

autonomous robotics

Which of the following are types of viruses? (Check all that apply.)

backdoor polymorphic trojan-horse

Opens a way into the network for future attacks.

backdoor program

Regardless of what process is measured, how it is measured, and whether it is performed for the sake of efficiency or effectiveness, managers must set ________, or baseline values the system seeks to attain.

benchmarks

What does fuzzy logic assign as values to vague or ambiguous information?

between 0 and 1

What is the practice of artificially inflating traffic statistics for online advertisements?

click fraud

A business that operates in a physical store and on the Internet. Example: Barnes & Noble

click-and-mortar

I have one item.

data

What is a service that allows the owner of a domain name to maintain a simple website and provide email capacity?

domain name hosting

What was the original term for a company operating on the Internet?

dot-com

Which policy stating explicitly how, when, and where the company monitors its employees?

employee monitoring policy

Fair compensation, job security, ethical conduct Fair compensation, job security, ethical conduct

employees

A search ________ is website software that finds other pages based on keyword matching similar to Google.

engine

Through social ____________, hackers use their social skills to trick people into revealing access credentials or other valuable information.

engineering

A feature of a product or service that customers have come to expect and entering competitors must also offer is a(n) ______.

entry barrier

True or false: Cybervigilantes includes governments that are after some form of information about other governments.

false

True or false: The choices made by MIS should dictate the business processes of a company.

false

What refers to the level of detail in the model or the decision-making process?

granularity

Social _______ represent the interconnection of relationships in a social network.

graphs

Provides employee training, hiring, and compensation.

human resource management

Employee data, promotion data, vacation data

human resources

Hiring employees, Enrolling employees in health care, Tracking vacation and sick time

human resources

What is data that humans, in interaction with computers, generate?

human-generated structured data

_________ markup language links documents, allowing users to move from one to another simply by clicking on a hot spot or link.

hypertext

What is the forging of someone's identity for the purpose of fraud?

identity theft

A user can opt _____ to receive emails by choosing to allow permissions to incoming emails.

in

In terms of big data, what is variety?

includes different forms of structured and unstructured data

Banking—Loan processing, Insurance—Claims processing, Government—Grant allocation, Hotel—Reservation handling, Airline—Baggage handling

industry-specific customer-facing processes

What is a representation of information in a graphic format designed to make the data easily understandable at a glance?

infographic

Provide specialized information on behalf of producers of goods and services and their potential customers.

infomediaries

Management ________ systems is a business function, like accounting and human resources, which moves information about people, products, and processes across the company to facilitate decision making and problem solving.

information

The item I have is a product that has the most sales during the month of December

information

What age are we currently living in when infinite quantities of facts are widely available to anyone who can use a computer?

information age

What are the two primary resources knowledge workers use to make decisions?

information and intuition

What is the act of conforming, acquiescing, or yielding information?

information compliance

Select the statement that accurately defines the association between information and ethics.

information has no ethics

A(n) ________ policy contains general principles regarding information privacy.

information privacy policy

Which epolicy contains general principles regarding information privacy?

information privacy policy

Which of the following are epolicies a business should implement to protect itself? (Check all that apply.)

information privacy policy acceptable use policy internet use policy anti-spam policy

What is an ethical issue that focuses on who owns information about individuals and how information can be sold and exchanged?

information property

What measures the number of people a firm can communicate with all over the world?

information reach

What refers to the depth and breadth of details contained in a piece of textual, graphic, audio, or video information?

information richness

What is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity?

information secrecy

What details how an organization will implement the information security policies?

information security plan

What identifies the rules required to maintain information security, such as requiring users to log off before leaving for lunch or meetings, never sharing passwords with anyone, and changing passwords every 30 days?

information security policies

Time sheets, wage rates, employee benefits

input

Transaction processing system

input

Which of the following are not included as common DSS analysis techniques? (Check all that apply.)

input analysis output analysis process analysis

___________ are legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident.

insiders

What is a service that enables instant or real-time communication between people?

instant messaging

Intellectual property is ________ creative work that is embodied in physical form and includes copyrights, trademarks, and patents.

intangible

What is consolidation?

involves the aggregation of information and features simple roll-ups to complex groupings of interrelated information

What are the quantifiable metrics a company uses to evaluate progress toward critical success factors?

key performance indicators

Who helps harness the wealth of knowledge in the organization?

knowledge facilitators

What involves capturing, classifying, evaluating, retrieving, and sharing information assets in a way that provides context for effective decisions and actions?

knowledge management

_________ is software that is intended to damage or disable computers and computer systems.

malware

______ share is the proportion of the market that a firm captures.

market

What evaluates such items as websites and checkout scanner information to detect customers' buying behavior and predict future behavior by identifying affinities among customers' choices of products and services?

market basket analysis

Promotion data, sales data, advertising data

marketing

Promotes, prices, and sells products to customers. Promotes, prices, and sells products to customers.

marketing and sales

Promoting of discounts, Communicating marketing campaigns, Attracting customers, Processing sales

marketing and sales

What is a website or web application that uses content from more than one source to create a completely new product or service?

mashup

Which of the following is a what-you-see-is-what-you-get (WYSIWYG) tool?

mashup editor

What is the ability of an organization to tailor its products or services to the customers' specifications?

mass customization

What is a problem caused by using collected data that skews the data in one direction?

measurement bias

What are measurements that evaluate results to determine whether a project is meeting its goals?

metrics

What is the practice of sending brief posts (140 to 200 characters) to a personal blog, either publicly or to a private group of subscribers who can read the posts as IMs or as text messages?

microblogging

Data ______ is the process of analyzing data to extract information not offered by the raw data alone.

mining

_____ authentication requires more than two means of authentication such as what the user knows (password), what the user has (security token), and what the user is (biometric verification).

multifactor

What is the process within a genetic algorithm of randomly trying combinations and evaluating the success (or failure) of the outcome?

mutation

Bring together buyers and sellers of products and services.

online marketplaces

What is the system that consists of nonproprietary hardware and software based on publicly known standards that allows third parties to create add-on products to plug into or interoperate with the system?

open system

_______ decisions affect how the firm is run from day to day; they are the domain of operations managers, who are the closest to the customer.

operational

____________ business processes are static, routine, daily business processes such as stocking inventory, checking out customers, or daily opening and closing processes.

operational

What is a form of social engineering in which one individual lies to obtain confidential data about another individual?

pretexting

________ is a form of social engineering in which one individual lies to obtain confidential data about another individual.

pretexting

The person responsible for ensuring the ethical and legal use of information within a company is the Chief ______ Officer.

privacy

_______ is the right to be left alone when you want to be, to have control over your personal possessions, and not to be observed without your consent.

privacy

What is a network intrusion attack that takes advantage of programming errors or design flaws to grant the attacker elevated access to the network and its associated data and applications?

privilege escalation

What is a view of data at a particular moment in time?

snapshot

Detail every solution possible, including ideas that seem farfetched.

solution generation

________ is unsolicited email.

spam

The number of hours a system is available for users.

system availability

What provides an end-to-end view of how operations work together to create a product or service?

systems thinking

What is a marketing phenomenon that facilitates and encourages people to pass along a marketing message?

viral marketing

What is a technique that induces websites or users to pass on a marketing message to other websites or users, creating exponential growth in the message's visibility and effect?

viral marketing

Select the two substitutes you could choose instead of taking an airplane to attend a meeting in another country.

virtual meetings videoconferencing

What is a computer-simulated environment that can be a simulation of the real world or an imaginary world?

virtual reality

What is software written with malicious intent to cause annoyance or damage?

virus

What is a phone scam that attempts to defraud people by asking them to call a bogus telephone number to confirm their account information?

vishing

What analyzes unstructured data associated with websites to identify consumer behavior and website navigation?

web analytics

What blends videoconferencing with document sharing and allows the user to deliver a presentation over the web to a group of geographically dispersed participants?

web conferencing

What is an open source project that seeks to embed real-time voice, text, and video communications capabilities in web browsers?

web real-time communications (WebRTC)

What is another term from data scraping?

web scraping

Affiliate programs allow a business to generate commissions or referral fees when a customer visiting its website clicks a link to another merchant's _______.

website

What uses clickstream data to determine the effectiveness of the site as a channel-to-market?

website ebusiness analytics

Work at the request of the system owners to find system vulnerabilities and plug the holes.

white-hat hackers

A _______ is a type of collaborative web page that allows users to add, remove, and change content, which can be easily organized and reorganized as required.

wiki

______ includes the tasks, activities, and responsibilities required to execute each step in a business process.

workflow

A virtual _________ is a work environment that is not located in any one physical space.

workplace

_________ MIS monitoring tracks people's activities by such measures as number of keystrokes, error rate, and number of transactions processed.

workplace

Spreads itself, not only from file to file, but also from computer to computer.

worm

________ is a program that secretly takes over another computer for the purpose of launching attacks on other computers.

zombie

Select two types of DSS systems.

A system that identifies risks for insurance companies A system to diagnose and treat patients

What is a set of routines, protocols, and tools for building software applications?

Application programming interface (API)

Organizations address security risks through two lines of defense; the first is _________, and the second is _________

- people - technology

Who is responsible for ensuring the speed, accuracy, availability, and reliability of the MIS? (Please use the acronym)

CTO

What characteristic is high when there are many alternatives to a product or service and low when there are few alternatives from which to choose?

Threat of substitute products or services

_______ are keywords that advertisers choose to pay for and appear as sponsored links on the Google results pages.

adwords

__________ is the automation of existing manual and paper-based processes and workflows to a digital format.

digitization

Which privacy policy details the extent to which email messages may be read by others?

email privacy policy

What scrambles information into an alternative form that requires a key or password to decrypt?

encryption

A program or device that can monitor data traveling over a network.

sniffer

True or false: The value of information is only as good as the people who make use of the information.

true

Which of the following are included as common DSS analysis techniques? (Check all that apply.)

what-if analysis sensitivity analysis goal-seeking analysis optimization analysis

What monitors processes to ensure tasks, activities, and responsibilities are executed as specified?

workflow control systems

What tracks people's activities by such measures as number of keystrokes, error rate, and number of transactions processed?

workplace MIS monitoring

A(n) ________ spreads itself not only from file to file but also from computer to computer.

worm

What is a program that secretly takes over another computer for the purpose of launching attacks on other computers?

zombie

Applies to businesses buying from and selling to each other over the Internet.

B2B

Select three items contained in a typical Internet use policy.

Describes user responsibility for citing sources. Describes the Internet services available to users. States the ramifications if the policy is violated.

Which dilemma is facing Polaroid?

Digital Darwinism

What are the different types of process models?

as-is and to-be

What is the abuse of pay-per-click, pay-per-call, and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser?

click-fraud

What is a count of the number of people who visit one site and click on an advertisement that takes them to the site of the advertiser?

click-through

What type of Internet monitoring technique records information about a customer during a web surfing session, such as what websites were visited and how long the visit was, what ads were viewed, and what was purchased?

clickstream

_________ data can observe the exact pattern of a consumer's navigation through a site.

clickstream

What is the process of collecting, analyzing and reporting aggregate data about which pages a website visitor visits—and in what order?

clickstream analytics

__________ is the legal protection afforded an expression of an idea, such as a song, book, or video game.

copyright

What is a process that employs specialized algorithms to model and study and establish relationships among data and datasets?

deep learning

A new way of doing things that initially does not meet the needs of existing customers.

disruptive technology

What types of metrics measure customer satisfaction?

effectiveness MIS metrics

What are material items or products that customers will buy to satisfy a want or need?

goods

What is a category of AI that attempts to emulate the way the human brain works?

neural network

What are the three primary areas of artificial intelligence? (Check all that apply.)

neural networks machine learning virtual reality

Which of the following is not included in the four basic options for a BYOD policy?

no access for personal devices

A contractual stipulation which ensures that ebusiness participants do not deny their online actions is called a __________ clause.

nonrepudiation

A(n) ________ clause is typically contained in an acceptable use policy.

nonrepudiation

Which department manages the process of converting or transforming resources into goods or services?

operations management

Expanded product line, increase in demand, new markets

opportunities

What are users doing when they choose to deny permission to incoming emails?

opt out

Search engine ________ combines art along with science to determine how to make URLs more attractive to search engines resulting in higher search engine ranking.

optimization

Which type of analysis finds the optimum value for a target variable by repeatedly changing other variables, subject to specified constraints?

optimization

What is a common type of transaction processing system?

order entry system

What is the unauthorized use, duplication, distribution, or sale of copyrighted software?

pirated software

The structure of a typical organization is similar to a __________, and the different levels require different types of information to assist in decision making, problem solving, and opportunity capturing.

pyramid

What is a form of malicious software that infects your computer and asks for money?

ransomware

Productivity is the ______ at which goods and services are produced based upon total output given total inputs.

rate

Information _________ measures the number of people a firm can communicate with all over the world.

reach

What is a web format used to publish frequently updated works, such as blogs, news headlines, audio, and video, in a standardized format?

real simple syndication

Core competencies, market leaders, cost advantages

strengths

True or false: The difference between the CIO and CDO is that the CIO is responsible for the information systems through which data is stored and processed, while the CDO is responsible for the data, regardless of the information system.

true

True or false: The threat of new entrants is high when it is easy for new competitors to enter a market and low when there are significant entry barriers to joining a market.

true

True or false: With machine learning, machines are able to act without human programs detailing how to perform tasks.

true

The National Institute of Standards and Technology (NIST) introduced an ________________ designed to keep government information secure.

AES

Select three ways that companies duplicate competitive advantages.

Acquire new technology Hire key employees Copy business operations

Select two items typically contained in an employee monitoring policy.

Always enforce the policy the same for everyone. State the consequences of violating the policy.

What are the four main types of ebusiness models? (Check all that apply.)

B2B C2B C2C B2C

Applies to any business that sells its products or services directly to consumers online.

B2C

What applies to any business that sells its products or services directly to consumers online?

B2C

What in BPMN notation is a task in a business process?

BPMN activity

In BPMN what represents anything that happens during the course of a business process?

BPMN event

In BPMN notation what is used to control the flow of a process?

BPMN gateway

What are the most successful solutions or problem solving methods that have been developed by a specific organization or industry?

Best practices

Select the three generic business strategies Porter identified for entering a new market.

Broad differentiation Focused strategy Broad cost leadership

Select two terms representing the next generation of Internet use—a more mature, distinctive communications platform characterized by new qualities such as collaboration sharing, and free.

Business 2.0 Web 2.0

Step 1 Step 2 Step 3 Step 4 Step 5 Step 6

Business Understanding Data Understanding Data Preparation Data Modeling Evaluation Deployment

Applies to any consumer that sells a product or service to a business over the Internet.

C2B

Applies to sites primarily offering goods and services to assist consumers interacting with each other over the Internet.

C2C

Who is responsible for (1) overseeing all uses of MIS and (2) ensuring that MIS strategically aligns with business goals and objectives? (Please use the acronym)

CIO

Select the four characteristics of Web 2.0.

Content sharing through open sourcing Collaboration outside the organization User-contributed content

A static process uses a systematic approach in an attempt to improve business effectiveness and efficiency continuously. Managers constantly attempt to optimize static process. Which of the following are examples of static processes? (Choose all that apply)

Creating financial statements Calculating taxes Payroll

Select the four core drivers of the information age.

Data, information, business intelligence, knowledge

Choice, Techniques that describes past performance and history. Techniques that describes past performance and history.

Descriptive analytics

What are the three categories of analytics?

Descriptive analytics Prescriptive analytics Predictive analytics

Select three steps to improve business processes.

Document as-is process Follow process Establish measures

__________ MIS metrics measure the impact MIS has on business processes and activities, including customer satisfaction and customer conversion rates.

Effectiveness

Select three items typically contained in a social media policy.

Employee Twitter, corporate Twitter, and personal Twitter policies. Employee blog and personal blog policies. Employee social network and personal social network policies.

Select two unstructured decisions.

Entering a new market Entering a new industry

Select the three reasons why organizations should develop written epolicies.

Establish organizational rules Establish employee procedures Establish employee guidelines

Select three purposes of a business process model.

Expose process detail gradually and in a controlled manner Focus attention on the process model interfaces Encourage conciseness and accuracy in describing the process model

Which of the following is a type of unplanned downtime? (Choose all that apply)

Frozen pipe Water damage Static electricity Smoke Damage

Select three examples of analytical information.

Future growth projections Sales trends Market projections

What is a legal framework that sets guidelines for the collection and processing of personal information of individuals within the European Union(EU)?

General Data Protection Regulation (GDPR)

Select three examples of features that may be included in a digital dashboard for a manufacturing team.

Graph of stock market prices List of KPIs List of outstanding alerts

The current version of __________ delivers everything from animation to graphics and music to movies; it can also be used to build complicated web applications and works across platforms, including a PC, tablet, smartphone, or smart TV.

HTML

Select two alternate names for an MIS department. Multiple select question. - IT department - IS department - MIT department - CTT department

IT department IS department

Acquires raw materials and resources and distributes to manufacturing as required. Acquires raw materials and resources and distributes to manufacturing as required.

Inbound logistics

Select 3 goals or objectives that a leadership plan might include to achieve a solid business strategy.

Increasing sales Attracting new customers Decreasing costs

What is the primary difference between information and business intelligence?

Information primarily focuses on internal variables. BI manipulates multiple variables including both internal and external variables.

Which of the following are included in ebusiness tools?

Instant message Podcasting Web conferencing Email

What is a nonprofit organization that has assumed the responsibility for Internet Protocol (IP) address space allocation, protocol parameter assignment, domain name system management, and root server system management functions previously performed under U.S. government contract?

Internet Corporation for Assigned Names and Numbers (ICANN)

What is a world where interconnected Internet-enabled devices or "things" have the ability to collect and share data without human intervention?

Internet of Things

Select three opportunities managers can identify when focusing on reengineering.

Is the process broken? Is it crucial for productivity improvement? Will savings from automation be clearly visible?

What is a scripting language developed by Netscape and used to create interactive websites, a big driver of Business 2.0?

JavaScript

What is the primary difference between KPIs and CSFs?

KPIs are far more specific than CSFs

Which of the following are classified as static report types? (Select two)

Last year's sales report Last year's salary report

Select three features of a neural network.

Learning and adjusting to new circumstances on their own Coping with huge volumes of information with many dependent variables Lending themselves to massive parallel processing

Select three types of clickstream data metrics.

Length of stay on the website Demographics of registered visitors Number of abandoned registrations

When evaluating the value chain, all of the following are included in the primary value activities except

MIS analytics

Select the accurate statement in terms of MIS. Multiple choice question. - MIS represents business success and innovation - MIS equals business success and innovation - MIS enables business success and innovation

MIS enables business success and innovation

What is the difference between existing MIS workplace knowledge and the knowledge required to fulfill the business goals and strategies?

MIS skills gap

Select all the activities for which transactional information is created.

Making airline reservations Withdrawing cash from an ATM Purchasing stocks

Select the three primary decision-making challenges facing managers today.

Managers must apply sophisticated analysis techniques, such as Porter's strategies or forecasting, to make strategic decisions Managers need to analyze large amounts of information Manager must make decisions quickly

What are the two types of personally identifiable information?

Nonsensitive PII and Sensitive PII

Select three items typically found in an acceptable use policy.

Not attempting to break the security of any computer network or user. Not using the service as part of violating any law. Not performing any nonrepudiation.

Which of the following describes how a company can reduce the threat of substitute products or services?

Offer additional value through wider product distribution.

Which of the following statements is correct when considering a SWOT analysis?

Opportunities and threats originate outside an organization.

Select three different ways a business can measure stickiness.

Page views Minutes per month Time spent per visit

Any data that could potentially identify a specific individual.

Personally identifiable information (PII)

Why is ebusiness able to take advantage of the long tail?

Physical stores are limited by shelf space

Select the three benefits an organization can identify by investigating business processes.

Remove redundant tasks Recognize smooth-running processes Identify bottlenecks

Choice, Evaluates project position Evaluates project position

SWOT analysis

What evaluates an organization's strengths, weaknesses, opportunities, and threats to identify significant influences that work for or against business strategies?

SWOT analysis

Which of the following evaluates a project's position?

SWOT analysis

Select three characteristics of managerial decisions.

Semistructured, ad hoc reporting decision types Short term, daily, monthly, and yearly time frames Middle management and director employee types

Select three characteristics of strategic decisions.

Senior management, presidents, leaders, and executives employee types Unstructured, nonrecurring, one time decision types Long term, yearly, and multi-year time frames

Select the factors used to assess buyer power.

Size of orders Sensitivity to price Number of customers

Select three epolicies.

Social media policy Acceptable use policy Ethical computer use policy

Select three categories of authentication and authorization.

Something that is part of the user, such as a fingerprint or voice signature. Something the user has, such as a smart card or token. Something the user knows, such as a user ID and password.

Select the three characteristics of operational information.

Structured, recurring, repetitive decision types Analysts and staff employee types Short term and day-to-day operational time frames

Select two competitive advantage decisions a company can make after completing a value chain analysis.

Target high value-adding activities to further enhance their value Target low value-adding activities to increase their value

Which of the following are the three conditions that indicate the time is right to initiate a business process change?

The company is markedly below industry benchmarks on its core processes There has been a pronounced shift in the market the process was designed to serve To regain competitive advantages, the company must leapfrog competition on key dimensions

The translation of a long URL into an abbreviated alternative that redirects to the longer URL.

URL shortening

Select three Business 2.0 communication and collaboration tools.

Wiki Blog Mashup

What provides access to Internet information through documents including text, graphics, audio, and video files that use a special formatting language called HTML?

World Wide Web

_________ provides access to Internet information through documents including text, graphics, audio, and video files that use a special formatting language called HTML.

World Wide Web

What is an international community that develops open standards to ensure the long-term growth of the Web?

World Wide Web Consortium

Which of the following is a good example of a system, since removing one part will cause the entire system to stop working?

a car engine

What is a set of tools that supports the work of teams or groups by facilitating the sharing and flow of information?

a collaboration system

A(n) ___________ use policy requires a user to agree to follow it to be provided access to corporate email, information systems, and the Internet.

acceptible

Records, measures, and reports monetary transactions.

accounting

transactional data, purchasing data, payroll data, tax data

accounting

Select the three departments found in a typical company. Multiple select question. - Systems thinking - Accounting - Chief Technology Officer - Payroll - Human resources - Sales

accounting human resources sales

Creating financial statements, Paying of Accounts Payable, Collecting of Accounts Receivable

accounting and finance

Which of the following are included in the different types of ebusiness revenue models? (Choose all that apply)

advertising fees subscription fees transaction fees

Which of the following represent the common ebusiness revenue models? (Check all that apply.)

advertising fees subscription fees transaction fees instant messaging transactions

What is software that, although purporting to serve some useful function and often fulfilling that function, also allows Internet advertisers to display advertisements without the consent of the computer user?

adware

What are keywords that advertisers choose to pay for and appear as sponsored links on the Google results pages?

adwords

What revels the relationship between variables along with the nature and frequency of the relationships?

affinity grouping analysis

__________ are mathematical formulas placed in software that performs an analysis on a dataset.

algorithm

Business analytics use ___ to derive meaning form data by finding patterns to make future predictions.

algorithms

Business analytics use ____________ to derive meaning form data by finding patterns to make future predictions.

algorithms

Social networking _________ maps group contacts (personal and professional) identifying who knows each other and who works together.

analysis

Online ____________ processing is the manipulation of information to create business intelligence in support of strategic decision making.

analytical

__________ information encompasses all organizational information, and its primary purpose is to support the performance of managerial analysis or semistructured decisions.

analytical

What encompasses all organizational information and its primary purpose is to support the performance of managerial analysis or semistructured decisions?

analytical information

Which of the following terms is synonymous with business analytics?

analytics

__________ detection is the process of identifying rare or unexpected items or events in a data set that do not conform to other items in the data set.

anomaly

Which policy simply states that email users will not send unsolicited emails?

anti-spam policy

What scans and searches hard drives to prevent, detect, and remove known viruses, adware, and spyware?

antivirus software

What is a program that runs within another application such as a website?

applet

_________ programming interface is a set of routines, protocols, and tools for building software applications.

application

What does API stand for?

application programming interface

Astroturfing is the practice of ____________ stimulating online conversation and positive reviews about a product, service, or brand.

artificially

_________ process models represent the current state of the operation that has been mapped, without any specific improvements or changes to existing processes.

as-is

What allows a business to generate commissions or referral fees when a customer visiting its website clicks on a link to another merchant's website?

associate program

_________ communications, or communication such as email in which the message and the response do not occur at the same time.

asynchronous

________ reality is the viewing of the physical world with computer-generated layers of information added to it.

augmented

What is the viewing of the physical world with computer-generated layers of information added to it?

augmented reality

___________ is a method for confirming users' identities.

authentication

What is the process of providing a user with permission including access levels and abilities such as file access, hours of access, and amount of allocated storage space?

authorization

What is a box running across a website that advertises the products and services of another business, usually another ebusiness?

banner ad

What is a chart or graph that presents grouped data with rectangular bars with lengths proportional to the values that they represent?

bar chart

Market ________ analysis evaluates such items as websites and checkout scanner information to detect customers' buying behavior and predict future behavior by identifying affinities among customers' choices of products and services.

basket

What is a collection of large, complex datasets, which cannot be analyzed using traditional database methods and tools?

big data

What is the identification of a user based on a physical characteristic, such as a fingerprint, iris, face, voice, or handwriting?

biometrics

Break into other people's computer systems and may just look around or may steal and destroy information.

black-hat hackers

Who are hackers who break into other people's computer systems and may just look around or steal and destroy information?

black-hat hackers

A ________ is an online journal that allows users to post their own comments, graphics, and video.

blog

A website ____________ is a locally stored URL or the address of a file or Internet page saved as a shortcut.

bookmark

Social __________ allows users to share, organize, search, and manage bookmarks.

bookmarking

__________ occur when resources reach full capacity and cannot handle any additional demands; they limit throughput and impede operations.

bottlenecks

A business that operates in a physical store without an Internet presence.

brick-and-mortar

Which of the following are the common forms of business-to-consumer ebusiness models? (Check all that apply.)

brick-and-mortar click-and-mortar pure-play

What is a business that operates in a physical store without an Internet presence?

brick-and-mortar business

Which policy allows employees to use their personal mobile devices and computers to access enterprise data and applications?

bring your own device policy

What is a crowdsourcing initiative that rewards individuals for discovering and reporting software bugs?

bug bounty program

A _______ process patent protects a specific set of procedures for conducting a particular business activity.

business

A(n) ________ process model is a graphic description of a process, showing the sequence of process tasks, which is developed for a specific purpose and from a selected viewpoint.

business

Business Process Model and Notation (BPMN) is a graphical notation that depicts the steps in a __________ process.

business

________ analytics is the scientific process of transforming data into insight for making better decisions.

business

________ process modeling is the activity of creating a detailed flowchart or process map of a work process that shows its inputs, tasks, and activities in a structured sequence.

business

__________ -facing processes are invisible to the external customer but essential to the effective management of the business.

business

What is the scientific process of transforming data into insight for making better decisions?

business analytics

The month of December this year is going to see interest rates raise by 10 percent and snow storms are expected to cause numerous problems throughout the East coast.

business intelligence

What is information collected from multiple sources such as suppliers, customers, competitors, partners, and industries that analyzes patterns, trends, and relationships for strategic decision making?

business intelligence

What is a plan that details how a company creates, delivers, and generates revenues?

business model

What is a standardized set of activities that accomplish a specific task, such as processing a customer's order?

business process

________ is a standardized set of activities that accomplishes a specific task.

business process

What attempts to understand and measure the current process and make performance improvements accordingly?

business process improvement

What is a leadership plan that achieves a specific set of goals or objectives?

business strategy

What gains a clear understating of the business problem that must be solved and how it impacts the company?

business understanding

What is a segment of a company representing a specific business function?

business unit

Strategic planning, Tactical planning, Budget forecasting, Training, Purchasing raw materials

business-facing processes

What applies to businesses buying from and selling to each other over the Internet?

business-to-business

High because customers have many airlines to choose from

buyer power

What is the ability of buyers to affect the price they must pay for an item?

buyer power

How will a business estimate the impact on profits from increases or decreases in costs?

by changing variables

What is a method whereby new problems are solved based on the solutions from similar cases solved in the past?

case-based reasoning

Internet ________ is a government's attempts to control Internet traffic, thus preventing some material from being viewed by a country's citizens.

censorship

Internet _________ is government attempts to control Internet traffic, thus preventing some material from being viewed by a country's citizens.

censorship

What is a trusted third party, such as VeriSign, that validates user identities by means of digital certificates?

certificate authority

Which is a semistructured decision?

changing employee benefits

determines if a person or business process can be replaced by a robot or software

chief automation officer

Who is responsible for determining the types of information the enterprise will capture, retain, analyze, and share, regardless of the system used to do so?

chief data officer

Responsible for determining the types of information the enterprise will capture, retain, analyze, and share.

chief data officer (CDO)

Responsible for (1) overseeing all uses of MIS and (2) ensuring that MIS strategically aligns with business goals and objectives.

chief information officer (CIO)

manage and defend intellectual property, copyrights, and patents

chief intellectual property officer

Which of the following represent executive levels you might see created over the next decade? Multiple select question. - Chief intellectual property officer - Chief user experience officer - Chief fact officer - Chief MIS skills gap officer - Chief automation officer - Chief computer officer

chief intellectual property officer chief user experience officer chief automation officer

Responsible for collecting, maintaining, and distributing company knowledge.

chief knowledge officer (CKO)

Who is responsible for ensuring the ethical and legal use of information within a company?

chief privacy officer

Responsible for ensuring the ethical and legal use of information within a company.

chief privacy officer (CPO)

Responsible for ensuring the security of business systems and developing strategies and safeguards against attacks by hackers and viruses.

chief security officer (CSO)

Responsible for ensuring the speed, accuracy, availability, and reliability of the MIS.

chief technology officer (CTO)

will create the optimal relationship between user and technology

chief user experience officer

The ________ Online Protection Act was passed to protect minors from accessing inappropriate material on the Internet.

child

What is the process of organizing data into categories or groups for its most effective and efficient use?

classification analysis

What is a business that operates in a physical store and on the Internet?

click-and-mortar business

_______ is the process of collecting, analyzing and reporting aggregate data about which pages a website visitor visits—and in what order.

clickstream analytics

What can observe the exact pattern of a consumer's navigation through a site?

clickstream data

What is any proprietary software licensed under exclusive legal right of the copyright holder?

closed source

Source ________ contains instructions written by a programmer specifying the actions to be performed by computer software.

code

__________ intelligence is collaborating and tapping into the core knowledge of all employees, partners, and customers.

collective

Which of the following was mostly unheard of prior to the information age?

college student start-up

Real-time _________ occurs when a system updates information at the same rate it receives it.

communication

A(n) ________ advantage features a product or service on which customers place a greater value than they do on similar offerings from competitors.

competitive

__________ click-fraud is a computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link.

competitive

What is the process of gathering information about the competitive environment, including competitors' plans, activities, and products, to improve a company's ability to succeed?

competitive intelligence

Information _________ is the act of conforming, acquiescing, or yielding information.

compliance

What is the assurance that messages and information remain available only to those authorized to view them?

confidentiality

What is the primary way that social networks work?

connecting people by matching profile information

What is the aggregation of data from simple roll-ups to complex groupings of interrelated information?

consolidation

What helps companies manage the creation, storage, editing, and publication of their website content?

content management systems

Generate revenues by providing digital content such as news, music, photos, or videos.

content providers

Which of the following represent the common ebusiness forms? (Check all that apply.)

content providers infomediaries online marketplaces transaction brokers

Workflow ________ systems monitor processes to ensure tasks, activities, and responsibilities are executed as specified.

control

The number of customers an organization "touches" for the first time and persuades to purchase its products or services. The number of customers an organization "touches" for the first time and persuades to purchase its products or services.

conversion rate

What is a small file deposited on a hard drive by a website containing information about customers and their browsing activities?

cookie

What is the legal protection afforded an expression of an idea, such as a song, book, or video game?

copyright

What processes are business processes, such as manufacturing goods, selling products, and providing service, that make up the primary activities in a value chain?

core processes

Broad strategies reach a large market segment, while focused strategies target a niche or unique market with either ________ leadership or differentiation.

cost

What is software that is manufactured to look like the real thing and sold as such?

counterfeit software

__________ success factors are the crucial steps companies perform to achieve their goals and objectives and implement their strategies.

critical

What sources capital for a project by raising many small amounts from a large number of individuals, typically via the Internet?

crowdfunding

___________ refers to the wisdom of the crowd.

crowdsourcing

____________ is the science that studies encryption, which is the hiding of messages so that only the sender and receiver can read them.

cryptography

Which of the following is an example of data as opposed to information that is derived from data?

customer number

Which is used by Amazon to create product differentiation?

customer profiling

What is measured by such benchmarks as satisfaction surveys, percentage of existing customers retained, and increases in revenue dollars per customer?

customer satisfaction

Measured by satisfaction surveys, percentage of existing customers retained, and increases in revenue dollars per customer.

customer satisfacttion

Order processing, Customer service, Sales processing, Customer billing, Order shipping

customer-facing processes

What results in a product or service received by an organization's external customer?

customer-facing processes

Exceptional service, high-quality products, ethical dealings

customers

Hitbots create the illusion that a large number of potential _______ are clicking the advertiser's links, when in fact there is no likelihood that any of the clicks will lead to profit for the advertiser?

customers

Mass ___________ is the ability of an organization to tailor its products or services to the customers' specifications.

customization

What type of attack is identity theft?

cyberattacks

_________ includes threats, negative remarks, or defamatory comments transmitted via the Internet or posted on the website.

cyberbullying

What is a type of mediation that refers to the creation of new kinds of intermediaries that simply could not have existed before the advent of ebusiness?

cybermediation

What refers to the creation of new kinds of intermediaries that simply could not have existed before the advent of ebusiness, including comparison-shopping sites such as Kelkoo and bank account aggregation services such as Citibank?

cybermediation

What involves prevention, detection, and response to cyberattacks that can have wide-ranging effects on the individual, organization, community, and at the national level?

cybersecurity

____________ is the use of computer and networking technologies against persons or property to intimidate or coerce governments, individuals, or any segment of society to attain political, religious, or ideological goals.

cyberterrorism

Seek to cause harm to people or to destroy critical systems or information and use the Internet as a weapon of mass destruction.

cyberterrorist

What is the electronic defacing of an existing website?

cybervandalism

___________ is the electronic defacing of an existing website.

cybervandalism

Who includes individuals that seek notoriety or want to make a social or political point such as WikiLeaks?

cybervigilantes

A(n) ___________ is an organized attempt by a country's military to disrupt or destroy information and communication systems for another country.

cyberwar

_____ time is the time required to process an order.

cycle

Which of the following are dynamic reports? (Select two) Multiple select question. - Daily stock market price report - Last year sales report - Last year salary report - Available inventory report

daily stock market price report available inventory report

What is a portion of the Internet that is intentionally hidden from search engines, uses masked IP addresses, and is accessible only with a special web browser?

dark web

What is the portion of the Internet that is intentionally hidden from search engines, uses masked IP addresses, and is accessible only with a special web browser?

dark web

Digital __________ track KPIs and CSFs by compiling information from multiple sources and tailoring it to meet user needs.

dashboards

A big part of business intelligence is an area called predictive analytics, which extracts information from ________ and uses it to predict future trends and identify behavioral patterns.

data

Prevention and resistance

data

The Internet of Things (IoT) is a world where interconnected, Internet-enabled devices or "things" can collect and share __________ without human intervention.

data

What are the raw facts that describe the characteristics of an event or object?

data

What occurs when adding additional training examples by transforming existing examples?

data augmentation

Gather problem-related data, including who, what, where, when, why, and how. Be sure to gather facts, not rumors or opinions about the problem.

data collection

What is the ability for data to be collected, analyzed, and accessible to all users (the average end user)?

data democratization

What uses a variety of techniques to find patterns and relationships in large volumes of information that predict future behavior and guide decision making?

data mining tools

What is the process of collecting statistics and information about data in an existing source?

data profiling

What is the process of sharing information to ensure consistency between multiple data sources?

data replication

What is the process of extracting large amounts of data from a website and saving it to a spreadsheet or computer?

data scraping

Select the system that models information using OLAP, which provides assistance in evaluating and choosing among different courses of action?

decision support systems

What decodes information and is the opposite of encrypt?

decrypt

______ learning is a process that employs specialized algorithms to model and study complex datasets; the method is also used to establish relationships among data and datasets.

deep

What is the large part of the Internet that is inaccessible to conventional search engines, such as email messages, chat messages, private content on social media sites, and electronic bank statements?

deep web

Floods a website with so many requests for service that it slows down or crashes the site

denial-of-service attack

What type of analytics is best described with a report that includes charts and graphs explaining the data?

descriptive analytics

__________ agents are malicious agents designed by spammers and other Internet attackers to farm email addresses off websites or deposit spyware on machines.

destructive

Which of the following statements are examples of semistructured or managerial level decisions? (Check all that apply.)

determining sales forecasts for next month analyzing the impact of last month's marketing campaign comparing expected sales and actual sales by month

Product __________ occurs when a company develops unique differences in its products or services with the intent to influence demand.

differentiation

_______ certificate is a data file that identifies individuals or organizations online and is comparable to a digital signature.

digital

________ rights management is a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution.

digital

__________ Darwinism implies that organizations that cannot adapt to the new demands placed on them for surviving in the information age are doomed to extinction.

digital

What implies that organizations that cannot adapt to the new demands placed on them for surviving in the information age are doomed to extinction?

digital Darwinism

________ is a data file that identifies individuals or organizations online and is comparable to a digital signature.

digital certificate

What tracks KPIs and CSFs by compiling information from multiple sources and tailoring it to meet user needs?

digital dashboard

What is the measure of consumer, partner, and employee confidence in an organization's ability to protect and secure data and the privacy of individuals?

digital trust

What is an ebusiness model where companies build, market, sell, and ship their products themselves, without relying on traditional stores or intermediaries?

direct-to-consumer

The introduction of ebusiness brought about ________, which occurs when a business sells directly to the customer online and cuts out the intermediary.

disintermediation

What is a new way of doing things that initially does not meet the needs of existing customers?

disruptive technology

What refers to a period of time when a system is unavailable?

downtime

______ enables users to view details, and details of details, of information.

drill-down

_________-by hacking is a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network.

drive

________ is a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network.

drive-by hacking

________ diving, or looking through people's trash, is another way hackers obtain information.

dumpster

________ occurs when a hacker looks through your trash to find personal information.

dumpster diving

throwing a bird in the air

dynamic process

What is continuously changing and provides business solutions to ever-changing business operations?

dynamic processes

__________ includes ecommerce along with all activities related to internal and external business operations such as servicing customer accounts, collaborating with partners, and exchanging real-time information.

ebusiness

What is a plan that details how a company creates, delivers, and generates revenues specifically on the Internet?

ebusiness model

What is the buying and selling of goods and services over the Internet?

ecommerce

What refers to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry?

ediscovery

Which of the following are not types of information security breach? (Check all that apply.)

ediscovery BYOD

What type of decision is the following: Did customers use the marketing campaign to purchase products?

effectiveness decision

What type of decision is the following: Did the amount of daily transactions increase?

effectiveness decision

____________ MIS metrics measure the performance of MIS itself, such as throughput, transaction speed, and system availability.

efficiency

_________ focuses on the extent to which a firm is using its resources in an optimal way, while effectiveness focuses on how well a firm is achieving its goals and objectives.

efficiency MIS metrics

What type of decision is the following: How do we best use the ingredients in the warehouse to make the most profits?

efficiency decision

What type of decision is the following: What is the best route for dropping off FedEx or UPS packages?

efficiency decision

A process by which a user misleads a system into granting unauthorized rights, usually for the purpose of compromising or destroying the system.

elevation of privilege

Which of the following represent the connecting and communicating tools supporting and driving ebusiness? (Check all that apply.)

email instant messaging podcasting web conferencing

Which of the following are policies and procedures that address information management along with the ethical use of computers and the Internet in the business environment?

epolicies

________ are policies and procedures that address information management along with the ethical use of computers and the Internet in the business environment.

epolicies

A(n) _________ computer use policy contains general principles to guide computer user behavior.

ethical

Which policy contains general principles to guide computer user behavior?

ethical computer use policy

What are the principles and standards that guide our behavior toward other people?

ethics

BPMN _______ is anything that happens during the course of a business process, including customer requests, time requests, and the end of the process.

event

What is a specialized DSS that supports senior-level executives and unstructured, long-term, nonroutine decisions requiring judgment, evaluation, and insight?

executive information system

Phishing ________ is a masquerading attack that combines spam with spoofing.

expedition

What are computerized advisory programs that imitate the reasoning processes of experts in solving difficult problems?

expert systems

What consists of anything that can be documented, archived, and codified, often with the help of MIS?

explicit knowledge

Which of the following definitions represents a data scientist?

extracts knowledge from data by performing statistical analysis, data mining, and advanced analytics on big data to identify trends, market changes, and other relevant information

What is a magazine published only in electronic form on a computer network?

ezine

What is the confirmation or validation of an event or object?

fact

_________ information practices is a general term for a set of standards governing the collection and use of personal data and addressing issues of privacy and accuracy.

fair

True or false: Cyberespionage include individuals that seek notoriety or want to make a social or political point such as WikiLeaks.

false

Sock puppet marketing is the use of a ________ to artificially stimulate demand for a product, brand, or service.

false identity

A zombie _________ is a group of computers on which a hacker has planted zombie programs.

farm

What is information that returns to its original transmitter (input, transform, or output) and modifies the transmitter's actions?

feedback

controls to ensure correct processing

feedback

Content ____________ occurs when organizations use software that filters content, such as emails, to prevent the accidental or malicious transmission of unauthorized information.

filtering

Deals with strategic financial issues including money, banking, credit, investments, and assets.

finance

Investment data, monetary data, reporting data

finance

Such as return on investment (the earning power of an organization's assets), cost benefit analysis (the comparison of projected revenues and costs including development, maintenance, fixed, and variable), and break even analysis (the point at which constant revenues equal ongoing costs).

financial

A(n) ___________ is hardware and/or software that guard a private network by analyzing incoming and outgoing information for the correct markings.

firewall

Includes the company format or departmental structures, environment, and systems. Includes the company format or departmental structures, environment, and systems.

firm infrastructure

What occurs when a company can significantly increase its market share by being first with a new competitive advantage?

first-mover advantage

BPMN ________ display the path in which the process flows.

flows

______ is similar to taxonomy except that crowdsourcing determines the tags or keyword-based classification system.

folksonomy

Which of the following is considered the output in the systems thinking example of a DSS?

forecasts

What is a mathematical method of handling imprecise or subjective information?

fuzzy logic

Which type of AI system assigns values of 0 and 1 to vague or ambiguous information?

fuzzy logic

What is a legal framework that sets guidelines for the collection and processing of personal information of individuals within the European Union?

general data protection regulation

_________ algorithm is an artificial intelligence system that mimics the evolutionary, survival-of-the-fittest process to generate increasingly better solutions to a problem.

genetic

What is an artificial intelligence system that mimics the evolutionary, survival-of-the-fittest process to generate increasingly better solutions to a problem?

genetic algorithm

Which of the following is a primary type of MIS system for decision making?

genetic algorithms

_________ -seeking analysis finds the inputs necessary to achieve a goal such as a desired level of output.

goal

Production is the process where a business takes raw materials and processes or converts them into finished ____ or services.

goods

Adhere to regulations/laws, increase employment

government

Which group of stakeholder's primary interests includes adhering to regulations/laws, increasing employment, and ethical taxation reporting?

government

What are experts in technology who use their knowledge to break into computers and computer networks, either for profit or just motivated by the challenge?

hackers

Have philosophical and political reasons for breaking into systems and will often deface the website as a protest.

hactivist

A(n) ___________ interface uses technology allowing humans to interact with a computer through bodily sensations and movements—for example, a cell phone vibrating in your pocket

haptic

What is a keyword or phrase used to identify a topic and is preceded by a hash or pound sign (#)?

hashtag

What is a two-dimensional representation of data in which values are represented by colors?

heat map

If buyer power is ______, customers can force a company and its competitors to compete on price, which typically drives prices down.

high

Rivalry among existing competitors is _________ when competition is fierce in a market and low when competitors are more complacent.

high

What is a graphical display of data using bars of different heights?

histogram

Attack computer systems by transmitting a virus hoax, with a real virus attached.

hoaxes

Which attackers grant themselves the same access levels they already have but assume the identity of another user?

horizontal privilege escalation

Which of the following are examples of critical success factors? (Check all that apply.)

increase customer satisfaction retain competitive advantage hire and retain the best business professionals

Porter's Five Forces Model analyzes the competitive forces within the environment in which a company operates to assess the potential for profitability in a(n) _________.

industry

In the _________ age infinite quantities of facts are widely available to anyone who can use a computer.

information

The person responsible for (1) overseeing all uses of MIS and (2) ensuring that MIS strategically aligns with business goals and objectives is the Chief ________ Officer.

information

____________ ethics govern the ethical and moral issues arising from the development and use of information technologies, as well as the creation, collection, duplication, distribution, and processing of information itself.

information

The extent to which a system generates the correct results when executing the same transaction numerous times.

information accuracy

What governs the ethical and moral issues arising from the development and use of information technologies, as well as the creation, collection, duplication, distribution, and processing of information itself?

information ethics

What is a method or system of government for information management or control?

information governance

Data that is entered in a computer

input

What is intangible creative work that is embodied in physical form and includes copyrights, trademarks, and patents?

intellectual property

What measures advertising effectiveness by counting visitor interactions with the target ad?

interactivity

What are agents, software, or businesses that provide a trading infrastructure to bring buyers and sellers together?

intermediaries

A massive network that connects computers all over the world and allows them to communicate with one another.

internet

A(n) _________ service provider is a company that provides access to the Internet for a monthly fee.

internet

A(n) _________ use policy contains general principles to guide the proper use of the Internet.

internet

____________ Corporation for Assigned Names and Numbers is a nonprofit organization that has assumed the responsibility for Internet Protocol (IP) address space allocation, protocol parameter assignment, domain name system management, and root server system management functions previously performed under U.S. government contract.

internet

What occurs when a government attempts to control Internet traffic, thus preventing some material from being viewed by a country's citizens?

internet censorship

Which policy contains general principles to guide the proper use of the Internet?

internet use policy

What features full-time monitoring tools that search for patterns in network traffic to identify intruders?

intrusion detection software

Return on _________ indicates the earning power of a project.

investment

Which of the following are types of Internet monitoring technology? (Check all that apply.)

key logger clickstream web log adware anti-spam policy

What is a word used in a performing a search?

keyword

Given the unexpected financial issues caused by the storms and the interest rate hike we will offer a discount on purchase in November and December to ensure sales levels increase by 10 percent.

knowledge

The person responsible for collecting, maintaining, and distributing company knowledge is the Chief __________ Officer.

knowledge

What includes the skills, experience, and expertise, coupled with information and intelligence, that creates a person's intellectual resources?

knowledge

_________ includes the skills, experience, and expertise, coupled with information and intelligence, that creates a person's intellectual resources.

knowledge

__________ management involves capturing, classifying, evaluating, retrieving, and sharing information assets in a way that provides context for effective decisions and actions.

knowledge

Knowledge facilitators help harness the wealth of knowledge in the organization. Knowledge facilitators help acquire and catalog the __________ in an organization.

knowledge assets

What are the human, structural, and recorded resources available to the organization?

knowledge assets

What are the two names for the assets that reside within the minds of members, customers, and colleagues and include physical structures and recorded media?

knowledge assets intellectual capital

What are the two names for the assets that reside within the minds of members, customers, and colleagues and include physical structures and recorded media? Multiple select question. - Knowledge workers - Knowledge assets - Knowledge facilitators - Intellectual capital

knowledge assets intellectual capital

What supports the capturing, organization, and dissemination of knowledge (i.e., know-how) throughout an organization?

knowledge management system

Who are individuals valued for their ability to interpret and analyze information?

knowledge workers

Determining what is ethical can sometimes be difficult because certain actions can be justified or condemned depending on how you view the relationship between which of the following terms? (Choose two.)

legal ethical

Select the area where you want to operate in terms of the intersection between what is ethical and what is legal.

legal and ethical

Which of the following are included in each of the four quadrants between acting ethically and acting legally? (Check all that apply.)

legal behavior illegal behavior unethical behavior ethical behavior

Chris Anderson, editor-in-chief of Wired magazine, describes niche-market ebusiness strategies as capturing the ______ tail, referring to the tail of a typical sales curve.

long

What rewards customers based on their spending?

loyalty programs

What refers to devices that connect directly to other devices?

machine to machine (M2M)

The extent to which a machine can differentiate between objects.

machine vision resolution

The ability of a machine to see in dim light or to detect weak impulses at invisible wavelengths.

machine vision sensitivity

What is created by a machine without human intervention?

machine-generated data

What sends a massive amount of email to a specific person or system that can cause that user's server to stop functioning?

mail bomb

Includes a variety of threats such as viruses, worms, and Trojan horses.

malicious code

Scareware is a type of ________ designed to trick victims into giving up personal information to purchase or download useless and potentially dangerous software.

malware

Information ___________ examines the organizational resource of information and regulates its definitions, uses, value, and distribution ensuring it has the types of data/information required to function and grow effectively.

management

MIS is a business function, like accounting or sales, which moves information about people, products, and processes across the company to facilitate decision making and problem solving. What does MIS stand for?

management information system

What is a business function that moves information about people, products, and processes across the company to facilitate decision making and problem solving?

management information systems

At the __________ level, employees are continuously evaluating company operations to hone the firm's abilities to identify, adapt to, and leverage change.

managerial

__________ business processes are semidynamic, semiroutine, monthly business processes such as resource allocation, sales strategy, or manufacturing process improvements.

managerial

A ______ is a simplified representation or abstraction of reality.

model

How can a spreadsheet program, such as Microsoft Office Excel, help managers make decisions?

modeling relationships

An outlier is a data value that is numerically distant from ________ of the other data points in a set of data?

most

______ advertising is an online marketing concept in which the advertiser attempts to gain attention by providing content in the context of the user's experience in terms of its content, format, style, or placement.

native

What is an online marketing concept in which the advertiser attempts to gain attention by providing content in the context of the user's experience?

native advertising

Which of the following are included as part of the four overview areas for artificial intelligence? (Check all that apply.)

natural language processing natural language understanding knowledge representation knowledge planning

A social __________ is an application that connects people by matching profile information.

network

What gathers an organization's computer network traffic patterns to identify unusual or suspicious operations?

network behavior analysis

What describes how products in a network increase in value to users as the number of users increases?

network effect

_________ network is a category of AI that attempts to emulate the way the human brain works.

neural

Information transmitted without encryption and includes information collected from public records, phone books, corporate directories, websites, etc.

nonsensitive PII

What is one of the guidelines an organization can follow when creating an information privacy policy?

notice and disclosure

At which level do employees develop, control, and maintain core business activities required to run the day-to-day operations?

operational level

Manufacturing data, distribution data, production data

operations management

Ordering inventory, Creating production schedules, Manufacturing goods

operations management

Which of the following are data mining modeling techniques for predictions? (Check all that apply.)

optimization model forecasting model regression model

The unpaid entries in a search engine results page that were derived based on their contents relevance to the keyword query.

organic search

A user can opt ______ of receiving emails by choosing to deny permission to incoming emails.

out

Distributes goods and services to customers. Distributes goods and services to customers.

outbound logistics

What is a data value that is numerically distant from most of the other data points in a dataset?

outlier

What is a data value that is numerically distant from most of the other data points in a set of data?

outlier

Forecasts, simulations, ad hoc reports

output

Generating payroll reports, creating paychecks

output

the resulting information from the computer program

output

What occurs when a machine learning model matches the training data so closely that the model fails to make correct predictions on new data?

overfitting

Consists of altering the contents of packets as they travel over the Internet or altering data on computer disks after penetrating a network.

packet tampering

Links a company paid to have displayed based on a users keyword search.

paid search

What are links a company paid to have displayed based on a user's keywords?

paid search

What occurs when a new radical form of business enters the market that reshapes the way companies and organizations behave?

paradigm shift

Reliable contracts, ethical materials handling Reliable contracts, ethical materials handling

partners/suppliers

A(n) _________ is an exclusive right to make, use, and sell an invention and is granted by a government to the inventor.

patent

What is an exclusive right to make, use, and sell an invention and is granted by a government to the inventor?

patent

How can websites generate revenue? (Check all that apply.)

pay-per-call pay-per-click pay-per-conversion

Generates revenue each time a user clicks on a link to a retailer's website.

pay-per-click

Generates revenue each time a website visitor is converted to a customer.

pay-per-conversion

Generates revenue each time a user clicks on a link that takes the user directly to an online agent waiting for a call.

pay=per-call

Authentication and authorization

people

Which of the following are examples of key performance indicators? (Check all that apply.)

percentage of help desk calls answered number of product returns turnover rates of employees

A stakeholder is a ______ or group that has an interest or concern in an organization.

person

__________ occurs when a company knows enough about a customer's likes and dislikes that it can fashion offers more likely to appeal to that person, say by tailoring its website to individuals or groups based on profile information, demographics, or prior transactions.

personalization

Imagine you accidently mistype the URL for your bank and you are redirected to a fake website that collects your information. You have just been a victim of ________ identity theft.

pharming

What reroutes requests for legitimate websites to false websites?

pharming

What uses a zombie farm, often by an organized crime association, to launch a massive phishing attack?

pharming attack

What is a technique to gain personal information for the purpose of identity theft, usually by means of fraudulent emails that look as though they came from legitimate businesses?

phishing

_________ security is tangible protection such as alarms, guards, fireproof doors, fences, and vaults.

physical

A _____ chart is a type of graph in which a circle is divided into sectors that each represent a proportion of the whole.

pie

What rotates data to display alternative presentations of the data?

pivot

What converts an audio broadcast to a digital music player?

podcasting

___________ converts an audio broadcast to a digital music player.

podcasting

Viruses and worms change their form as they propagate.

polymorphic viruses

What is a small web page containing an advertisement that appears outside of the current website loaded in the browser?

pop-up ad

Operate central website for users to access specialized content and other services.

portals

Which of the following are examples of unplanned downtime? (Check all that apply.)

power outages tornados network failures

________ is a statement about what will happen or might happen in the future; for example, predicting future sales or employee turnover.

prediction

Choice, Techniques that extract information from data and uses it to predict future trends and identify behavioral patterns. Techniques that extract information from data and uses it to predict future trends and identify behavioral patterns.

predictive analytics

Which of the following is a result of training data that is influenced by cultural or other stereotypes?

prejudice bias

Techniques that create models indicating the best decision to make or course of action to take.

prescriptive analytics

What type of analytics would take past purchasing data as inputs into a model and then recommend the best pricing strategy for maximizing revenue?

prescriptive analytics

Define the problem as clearly and precisely as possible

problem identification

Update employee records, calculate payroll, summarize benefits

process

What-if, sensitivity, goal-seeking, optimization

process

computer program that processes the data

process

Purchases inputs such as raw materials, resources, equipment, and supplies.

procurement

What is the process where a business takes raw materials and processes them or converts them into a finished product for its goods or services?

production

What is the rate at which goods and services are produced based upon total output given total inputs?

productivity

What is a temporary activity a company undertakes to create a unique product, service, or result?

project

Information _________ is an ethical issue that focuses on who owns information about individuals and how information can be sold and exchanged.

property

Intellectual ___________ is intangible creative work that is embodied in physical form and includes copyrights, trademarks, and patents.

property

Which of the following is a challenge of sustaining technology?

provides a more expensive product for current customers

What uses two keys: a public key that everyone can have and a private key for only the recipient?

public key encryption

A business that operates on the Internet only without a physical store. Example: Google

pure-play

What is a business that operates on the Internet only without a physical store?

pure-play (virtual) business

What occurs when a system updates information at the same rate it receives it?

real-time communication

What is a data mining algorithm that analyzes a customer's purchases and actions on a website and then uses the data to recommend complementary products?

recommendation engine

What occurs when a task or activity is unnecessarily repeated?

redundancy

Business process __________ is the analysis and redesign of workflow within and between enterprises.

reengineering

What is the training of machine learning models to make a sequence of decisions?

reinforcement learning

In __________ steps are added to the value chain as new players find ways to add value to the business process.

reintermediation

Which of the following statements are examples of structured or operational level decisions? (Check all that apply.)

reordering inventory creating the employee weekly staffing schedule creating the employee weekly production schedule determining payroll issues

What is a document containing data organized in a table, matrix, or graphical format allowing users to easily comprehend and understand information?

report

A(n) ________ system is where buyers post feedback on sellers.

reputation

What is a place where buyers post feedback on sellers?

reputation system

The time it takes to respond to user interactions such as a mouse click.

response time

Spoofing is the forging of the ________ address on an email so that the email message appears to come from someone other than the actual sender.

return

Select the two benefits a business that sold hamburgers would experience if it could produce a hamburger with less expensive inputs or produce more hamburgers with the same inputs. Multiple select question. - Rise in productivity - A likely increase in profits - A likely decrease in profits - Fall in productivity

rise in productivity a likely increase in profits

What is the use of software with artificial intelligence (AI) and machine learning capabilities to handle high-volume, repeatable tasks that previously required a human to perform?

robotic process automation

What is a pivot analysis?

rotates data to display alternative presentations of the data

Potential customer data, sales report data, commission data, customer support data

sales

Which of the following do not represent the fundamental building blocks that protect organizational information? (Check all that apply.)

sales human resources click-fraud threats

What is a problem with using incorrect training data to train a machine?

sample bias

What are two sources of unstructured data? Multiple select question. - Gaming data - Satellite images - Point-of-sale data - Social media data

satellite images social media data

A data __________ extracts knowledge from data by performing statistical analysis, data mining, and advanced analytics on big data to identify trends, market changes, and other relevant information.

scientist

Find hacking code on the Internet and click-and-point their way into systems to cause damage or spread viruses.

script kiddies

What combines art with science to determine how to make URLs more attractive to search engines, resulting in higher search engine ranking?

search engine optimization

What evaluates variables that search engines use to determine where a URL appears on the list of search results?

search engine ranking

Information __________ is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity.

secrecy

Information ________ is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization.

security

The person responsible for ensuring the security of business systems and developing strategies and safeguards against attacks by hackers and viruses is the Chief _________ Officer.

security

A(n) _______ is a self-photograph placed on a social media website.

selfie

What is a component of Web 3.0 that describes things in a way that computers can understand?

semantic web

___________-structured decisions occur in situations in which a few established processes help to evaluate potential solutions, but not enough to lead to a definite recommended decision.

semi

Information transmitted with encryption and, when disclosed, results in a breach of an individual's privacy and can potentially cause the individual harm.

sensitive PII

What is the study of the impact on other variables when one variable is changed repeatedly?

sensitivity analysis

Provides customer support after the sale of goods and services

service

Provide services such as photo sharing, video sharing, online backup and storage.

service providers

Maximize profits, grow market share, high return on investment

shareholders/investors

What is software used to make a website's product catalog available for online ordering whereby visitors may select, view, add/delete, and purchase merchandise?

shopping cart

What is software used to make a website's product catalog available for online ordering, whereby visitors may select, view, add/delete, and purchase merchandise?

shopping cart

What was one of the primary drivers of ebusiness?

shopping carts

A sparkline is a small embedded line graph that illustrates a _____________ trend. Sparklines are often used in reports, presentations, dashboards, and scoreboards.

single

________-factor authentication is the traditional security process, which requires a user name and password.

single

What is the type of authentication that requires a username and password?

single-factor authentication

What is knowledge?

skills, experience, and expertise, coupled with information and intelligence, which create a person's intellectual resources

__________ is the ability to look at information from different perspectives, such as analyzing total product sales during a given promotion versus the sales of a single product across all promotions.

slice-and-dice

A(n) _______ card is a device about the size of a credit card, containing embedded technologies that can store information and small amounts of software to perform some limited processing.

smart

What is content that is designed to be easy for readers to consume and to share?

snackable content

Which of the following relies on social skills to trick people into revealing access credentials or other valuable information?

social engineering

What refers to websites that rely on user participation and user-contributed content, such as Facebook, YouTube, and Digg?

social media

Who is a person within the organization who is trusted to monitor, contribute, filter, and guide the social media presence of a company, individual, product, or brand?

social media manager

What is the process of monitoring and responding to what is being said about a company, individual, product, or brand?

social media monitoring

To find out your company policy regarding such websites as YouTube, Facebook, and Twitter, you would have to refer to the ________ policy.

social media policy

Which policy outlines the corporate guidelines or principles governing employee online communications?

social media policy

What is the practice of expanding your business and/or social contacts by constructing a personal network?

social networking

What is the use of a false identity to artificially stimulate demand for a product, brand, or service?

sock puppet marketing

Evaluate solutions in terms of feasibility (can it be completed?), suitability (is it a permanent or a temporary fix?), and acceptability (can all participants form a consensus?).

solution test

Open ________ refers to any software whose source code is made available free for any third party to review and modify.

source

_______ documents are the original transaction record.

source

What is unsolicited email that plagues employees at all levels and clogs email systems?

spam

What is a phishing expedition in which the emails are carefully designed to target a particular person or organization?

spear phising

Fake blogs created solely to raise the search engine rank of affiliated websites.

splogs (spam blogs)

The forging of the return address on an email so that the message appears to come from someone other than the actual sender.

spoofing

Structured data has a defined length, type, and format and includes numbers, dates, or strings such as Customer Address. Which two sources typically store structured data?

spreadsheet relational database

Software that comes hidden in free downloadable software and tracks online movements.

spyware

________ is a special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission.

spyware

_________ is a special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission.

spyware

throwing a rock in the air

static process

A report is a document containing data organized in a table, matrix, or graphical format allowing users to easily comprehend and understand information. What are the two common types of reports?

static reports dynamic reports

Which of the following best describes Web 1.0?

static text-based information websites

Website name ____________ is the theft of a website's name that occurs when someone, posing as a site's administrator, changes the ownership of the domain name assigned to the website to another website owner.

stealing

What measures the amount of time visitors spend on a website or application?

stickiness

At the _________ level, managers develop overall business strategies, goals, and objectives as part of the company's strategic plan.

strategic

________ decisions involve higher level issues concerned with the overall direction of the organization; these decisions define the organization's overall goals and aspirations for the future.

strategic

What are dynamic, nonroutine, long-term business processes such as financial planning, expansion strategies, and stakeholder interactions?

strategic business processes

What type of decision is the following: How will new technology laws impact the business?

strategic decision

________ improve(s) business process efficiencies simplifying or eliminating unnecessary steps.

streamlining

___________ improves business process efficiencies by simplifying or eliminating unnecessary steps.

streamlining

Refers to the field of artificial intelligence that works toward providing brain-like powers to AI machines; in effect, it works to make machines as intelligent as the humans.

strong AI

Operational decisions are considered __________ decisions, which arise in situations where established processes offer potential solutions.

structured

What has a defined length, type, and format and includes numbers, dates, or strings such as Customer Address?

structured data

Which data type has a defined length, type, and format and includes numbers, dates, or strings such as Customer Address?

structured data

Training a model from input data and its corresponding labels.

supervised machine learning

What are the three types of machine learning?

supervised machine learning unsupervised machine learning transfer machine learning

High because there are limited plane and engine manufacturers to choose from

supplier power

What is the suppliers' ability to influence the prices they charge for supplies (including materials, labor, and services)?

supplier power

________ is the suppliers' ability to influence the prices they charge for supplies (including materials, labor, and services).

supplier power

A ______ chain consists of all parties involved, directly or indirectly, in obtaining raw materials or a product.

supply

What consists of all parties involved, directly or indirectly, in obtaining raw materials or a product?

supply chain

________ consists of all parties involved, directly or indirectly, in obtaining raw materials or a product.

supply chain

What includes firm infrastructure, human resource management, technology development, and procurement?

support value activities

Produces an improved product customers are eager to buy, such as a faster car or larger hard drive.

sustaining technology

What produces an improved product customers are eager to buy, such as a faster car or larger hard drive?

sustaining technology

A(n)_______ lane layout arranges the steps of a business process into a set of rows depicting the various elements.

swim

________ are costs that make customers reluctant to switch to another product or service.

switching costs

_________ communication, or communications that occur at the same time such as IM or chat.

synchronous

Real Simple ________ is a web format used to publish frequently updated works, such as blogs, news headlines, audio, and video, in a standardized format.

syndication

An open ________ consists of nonproprietary hardware and software based on publicly known standards that allows third parties to create add-on products to plug into or interoperate with the system.

system

What is a collection of parts that link to achieve a common purpose?

system

________ knowledge is the knowledge contained in people's heads.

tacit

What is the knowledge contained in people's heads?

tacit knowledge

Social _________ describes the collaborative activity of marking shared online content with keywords or tags as a way to organize it for future navigation, filtering, or search.

tagging

Many social media websites use ________ or specific keywords or phrases incorporated into website content for means of classification or taxonomy.

tags

________ are specific keywords or phrases incorporated into website content for means of classification or taxonomy.

tags

What is a well-planned strategy that ensures the search and navigation functions are easy to use and user-friendly on a website?

taxonomy

What is the scientific classification of organisms into groups based on similarities of structure or origin?

taxonomy

The person responsible for ensuring the speed, accuracy, availability, and reliability of the MIS is the Chief _______ Officer.

technology

Applies MIS to processes to add value.

technology development

____________ is an antispamming approach where the receiving computer launches a return attack against the spammer, sending email messages back to the computer that originated the suspected spam.

teergrubing

Competitive advantages are typically ___________.

temporary

Identifying competitive advantages can be difficult, which explains why they are typically

temporary

Evaluates industry attractiveness

the five forces model

What discusses how established companies can take advantage of disruptive technologies without hindering existing relationships with customers, partners, and stakeholders?

the innovator's dilemma

_________ is a massive network that connects computers all over the world and allows them to communicate with one another.

the internet

What is a world where interconnected, Internet-enabled devices or "things" can collect and share data without human intervention?

the internet of things (IoT)

What is an act or object that poses a danger to assets?

threat

High because new airlines are continuously entering the market

threat of new entrants

________ is high when there are many alternatives to a product or service and low when there are few alternatives from which to choose.

threat of substitute products and services

High because of alternatives, such as videoconferencing and virtual meetings

threat of substitute products or services

New entrants, substitute products, shrinking markets New entrants, substitute products, shrinking markets

threats

The amount of information that can travel through a system at any point in time.

throughput

__________ bombs are computer viruses that wait for a specific date before executing their instructions.

time

_______ process models show the results of applying change improvement opportunities to the current process model.

to-be

What are small electronic devices that change user passwords automatically?

token

What is the basic business system that serves the operational level (analysts) and assists in making structured decisions?

transaction processing system

The amount of time a system takes to perform a transaction.

transaction speed

What type of information encompasses all the information contained within a single business process or unit of work, and its primary purpose is to support the performance of daily operational or structured decisions?

transactional information

Transferring information from one machine learning task to another.

transfer machine learning

Hides inside other software, usually as an attachment or a downloadable file.

trojan-horse virus

True or false: A cyborg anthropologist is an individual who studies the interaction between humans and technology, observing how technology can shape humans' lives.

true

True or false: A time-series chart is a chart is a graphical representation showing change of a variable over time. Time-series charts are used for data that changes continuously, such as stock prices.

true

True or false: Analytics is the science of fact-based decision making.

true

True or false: Artificial intelligence simulates human thinking and behavior, such as the ability to reason and learn. Its ultimate goal is to build a system that can mimic human intelligence.

true

True or false: Big data is a collection of large, complex data sets, including structured and unstructured data, which cannot be analyzed using traditional database methods and tools.

true

True or false: Continuously measuring MIS projects against benchmarks provides feedback so managers can control the system.

true

True or false: Decisions in organizations range from routine choices, such as how many items to order or how many people to hire, to unexpected ones such as what to do if a key employee suddenly quits or needed materials do not arrive.

true

True or false: One of the biggest benefits of ebusiness is a reduction in costs including communication costs, travel costs, and start-up costs.

true

True or false: Rule 41 is the part of the United States Federal Rules of Criminal Procedure that covers the search and seizure of physical and digital evidence. Rule 41 originally granted a federal judge magistrate the authority to issue a warrant to search and seize a person or property located within that judge's district if the person or property is part of a criminal investigation or trial.

true

True or false: The HIPAA Security Rule ensures national standards for securing patient data that is stored or transferred electronically. The HIPAA Security Rule requires the placement of both physical and electronic safeguards on sensitive PII health information.

true

True or false: The Internet and the World Wide Web are not synonymous. The WWW is just one part of the Internet, and its primary use is to correlate and disseminate information. The Internet includes the WWW and also other forms of communication systems such as email.

true

Digital ___________ is the measure of consumer, partner, and employee confidence in an organization's ability to protect and secure data and the privacy of individuals.

trust

_______-factor authentication requires the user to provide two means of authentication, what the user knows (password) and what the user has (security token).

two

What is a problem that occurs when someone registers purposely misspelled variations of well-known domain names?

typosquatting

Select all the factors used to appraise supplier power in an industry.

uniqueness of supplier services availability of substitute products number of suppliers

Contains the address of a file or resource on the web.

universal resource locator

What are decisions that occur in situations in which no procedures or rules exist to guide decision makers toward the correct choice?

unstructured

What is not defined and does not follow a specified format and is typically free-form text such as emails, Twitter tweets, and text messages?

unstructured data

Training a model to find patterns in a dataset, typically an unlabeled dataset.

unsupervised machine learning

The ease with which people perform transactions and/or find information.

usability

What are prescriptive analytics?

use techniques that create models indicating the best decision to make or course of action to take

A value chain analysis views a firm as a series of business processes that each add ________ to the product or service.

value

Choice, Executes business strategy Executes business strategy

value chain analysis

Which of the following executes the business strategy?

value chain analysis

A(n) ________ is a data characteristic that stands for a value that changes or varies over time.

variable

In terms of big data, what includes the uncertainty of data, including biases, noise, and abnormalities?

veracity

Which big data term describes the uncertainty of data, including biases, noise, and abnormalities?

veracity

A(n) ___________ allows people at two or more locations to interact via two-way video and audio transmissions simultaneously as well as share documents, data, computer displays, and whiteboards.

videoconferencing

______ marketing is a marketing phenomenon that facilitates and encourages people to pass along a marketing message.

viral

Machine ______ is the ability of a computer to "see" by digitizing an image, processing the data it contains, and taking some kind of action.

vision

__________ produces graphical displays of patterns and complex relationships in large amounts of data.

visualization

What is a set of measurable characteristics of a human voice that uniquely identifies an individual?

voiceprint

What is another name for a bug bounty program?

vulnerability rewards program

Select two examples of services. Multiple select question. - Manufacturing automobiles - Waiting tables - Groceries - Cutting hair

waiting tables cutting hair

Machines that can still make their own decisions based on reasoning and past sets of data.

weak AI

Lack of strategic direction, obsolete technologies, outdated product line Lack of strategic direction, obsolete technologies, outdated product line

weaknesses

What is a term to refer to the World Wide Web during its years of operation between 1991 and 2003?

web 1.0

What is the next generation of Internet use—a more mature, distinctive communications platform characterized by new qualities such as collaboration sharing, and free?

web 2.0

What is the theft of a website's name that occurs when someone, posing as a site's administrator, changes the ownership of the domain name assigned to the website to another website owner?

website name stealing

What is the DSS analysis that checks the impact of a change in a variable or assumption on the model?

what-if analysis


Conjuntos de estudio relacionados

EMT-Chapter 24 -Gynecologic Emergencies

View Set

Psych 5.1 Sensation and Perception

View Set

Ch 3 - Balance Sheet and Disclosure notes

View Set

Rocks and Minerals: Silicate Family

View Set

Maritime Logistics Management Chapter 1-4

View Set