BADM 7050

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

A hacker uses a network of compromised devices to attack your corporate network. What type of attack is this?

Distributed Denial of Service

When a firm describes how they will distribute their products, what aspect of the business model canvas captures this idea?

Distribution channel

Business process design has historical origins in:

Division of labor paradigm

Software and sometimes hardware-based filter prevent or allow outside traffic from

Firewall

In the digital revolution...

Firms nurtured the agility and nimbleness of networks

You work for a company that has decided to collaborate together on the new product development. What type of role is IT playing in the supply chain?

Planning and control supply chain integration

Safeguards to ensure delivery of critical infrastructure services

Protect

As you analyze the risks to your network, you decide that you will use a control to remove or reduce an impact of a threat. What type of approach are you using?

Risk mitigation

With regards to evaluation, outcome controls are predominant. Focus is on performing well on algorithmically-derived goals and subjective customer ratings

Algorithmic approach

An exabyte is

10^18 bytes

When was Era I of information usage in organizations?

1960s

When was Era V of information usage in organizations?

2000s

They break in for their own gain or to wreak havoc on a firm

Black hat hackers

This is a plan articulating where a business seeks to go and how it expects to get there

Business strategy

You need to find information about a customer. What type of IT system would you look to in order to find this information?

CRM (Customer Relationship Management)

The individual at the helm of the analytics activities of an organization

Chief analytics officer

Which of the following is NOT a critical success factor for a BPM project?

Create your own customized process management approach

You are in charge of data management inside of your company and you need to define who is responsible for accuracy, accessibility, consistency, and completeness of data. What aspect of data and information management is this?

Data governance

The process of analyzing data warehouses and other sources for "gems" that can be used in management decision making

Data mining

You work for a grocery store chain and your boss asks you to use some software to look for products that your consumers are purchasing and you find that they are purchasing diapers and beer together between 4 and 6 PM everyday. What approach did you use to discover this relationship?

Data mining

You want to ensure that your data is clean and non-tainted. What aspect of data and information management is this?

Data quality management

This is a collection of data designed to support management decision making

Data warehouses

The technology and business capability to pave the way for developing and implementing digital innovations

Digital service platform

The structure set up to ensure coordination among all units within the organization; reflects allocation of decision rights

Formal reporting relationships

The characteristics of this organizational structure are division of labor, specialization, span of control, unity of command, and formalization

Hierarchical

Who makes decisions regarding security policy?

IT and business leaders

With the increasing availability of networks, web tools, social media, videoconferencing, apps, mobile devices, cloud-based computing, and the Internet, in general, managers can now design work for employees who come to the office or who work remotely

Where will the work be performed?

Security policies provide guidelines for the organization's activities, both technical and organizational, to increase cyber resiliance

Information security policy

Identifying customer demographics such as age, gender, location, and other trends to foster closer relationships with the community

Learning who is in the community

Answers "How should we respond?" by automatically linking analytics with other systems, creating continuous updates from business intelligence tools that automatically are understood by operational tools and trigger events as needed

Level 5: Prescriptive

Which of the following is not a detriment to remote work?

Need to live close to office

These include such physical manifestations as type of dress, symbols in art, acronyms, awards, myths and stories told about the group

Observable Artifacts

Which revenue model is the following: Customers make purchases

Selling products or services

The capacity allows a firm to see signs of the change in their environment and ferret out opportunities

Sensing

You are consulting with a company that has stopped acquiring new customers and their growth has plateaud. What phenomenon are you observing?

Strategic inflection point

The level of the organization responsible for providing the organization with overall direction and guidance is:

Strategic level

SAS describes four types of machine learning.

Supervised, semi-supervised, unsupervised, & reinforcement learning

System sends a warning when it detects unusual activity in the logs such as multiple failed login attempts or large files being transferred out

System alerts

These data sources have information embedded in them, but work needs to be done to extract the useful information

Unstructured data

Sometimes the work can be automated, or even performed by a robot or artificially intelligent system

Who is going to do the work?


Kaugnay na mga set ng pag-aaral

Micro Economics Final- PITT STATE

View Set

Abeka 5th Grade History Quiz 22 Study Guide

View Set

Inquiry Quiz 6: Academic Journals and Evaluating Sources

View Set

Chapter 4 - Ethical Considerations in Research

View Set

Ch 47 Assessment of Kidney and Urinary Function

View Set

ECON chapter 2 guided reading (lesson 1)

View Set

Which of the following statements are true about kinetic energy? Include all that apply.

View Set