Bis Midterm LS

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

strong AI weak AI

- refers to field of AI that works toward providing brain-like powers to AI machines - machines that can still make their own decisions based on reasoning and past sets of data

cyber-vigilants espionage

-include individuals that seek notoriety or want to make a social or political point such as WikiLeaks. -includes governments that are after some form of information about other governments.

select three characteristics of the online transactional processing

-stores the information -processes the information according to defined business rules - updates existing information to reflect the new information

steps in the decision-making process

1. problem identification 2. data collection 3. solution generation 4. solution test 5. solution selection 6. solution implementation

Which of the following is a potential feature of a digital dashboard?

A graph of stock market prices, A running line graph of planned versus actual production for the past 24 hours, A hot list of KPIs refreshed every 15 minutes

What is the primary difference between a worm and a virus?

A virus must attach to something to spread, where a worm does not need to attach to anything to spread and can tunnel itself into the computer

________ process models represent the current state of the operation that has been mapped, without any specific improvements or changes to existing processes.

As-Is

Which of the following represents the three areas where technology can aid in the defense against information security attacks?

Authentication and authorization, prevention and resistance, detection and response

What is represented by a circle in a business process model?

BPMN Event

BPMN notation displays the path in which the process flows in which part

BPMN flows

Cheryl Steffan is the operations manager for Nature's Bread Company, which specializes in providing natural products for health conscious individuals. Cheryl is responsible for compiling, analyzing, and evaluating daily sales numbers to determine the company's profitability and forecast production for the next day. Which of the following is an example of the type of information Cheryl would be using to successfully perform her job?

Best-selling product by day.

The best and most effective way to manage authentication is through ___________.

Biometrics is the most effective way to manage authentication.

Which of the following is a valid type of hacker?

Black-hat hackers, script kiddies, and crackers are all types of hackers.

CSF's and KPI's are the two core metrics used within a business to track progress or success. What is the relationship between CSFs and KPIs?

CSF's are business strategy elements where KPI's measure the progress of the CSF's

who is responsible for ensuring the speed, accuracy, availability, and reliability of the MIS?

CTO- technology officer

Which of the following is considered an operational decision or structured decision?

Determining how many employees are out sick Structured decisions are made frequently and are almost repetitive in nature; they affect short-term business strategies. Reordering inventory and creating the employee staffing and weekly production schedules are examples of routine structured decisions, where entering a new market is a type of unstructured decision.

Which of the follow represents a form of disruptive technology?

Disruptive technology is 1) a new way of doing things that initially doesn't meet the needs of existing customers, 2) tend to open new markets and destroy old ones, 3) enter the marketplace at the low end and eventually evolve to displace high-end competitors and their reigning technologies.

What is the difference between ecommerce and ebusiness?

Ecommerce is buying and selling of goods or services online; ebusiness includes ecommerce and all activities related to internal and external business operations

social media policy terms:

Employee online communication policy detailing brand communication. Employee blog and personal blog policies. Employee social network and personal social network policies. Employee Twitter, corporate Twitter, and personal Twitter policies. Employee LinkedIn policy. Employee Facebook usage and brand usage policy. Corporate YouTube policy

_______ is the internet protocol web browsers use to request and display web pages using universal resource locators

HTTP

What is data converted into a meaningful and useful context?

Information.

Which of the below would create transactional information?

Making an airline reservation

Jennifer Bloom is writing a paper and she must determine which of Porter's three generic strategies The Museum Company has implemented. Jennifer finds out that The Museum Company offers specialty products found only in museums around the world to affluent customers. What would Jennifer determine The Museum Company is using as its generic strategy?

Narrow market, high cost.

If a business is following a focused strategy then its competitive scope is ________.

Narrow market.

What is a category of AI that attempts to emulate the way the human brain works?

Neural network

Users agree to the following in a typical acceptable use policy:

Not using the service as part of violating any law. Not attempting to break the security of any computer network or user. Not posting commercial messages to groups without prior permission. Not performing any nonrepudiation.

Native advertising

Online marketing concept in which the advertiser attempts to gain attention by providing content in the context of the user's experience in terms of its content, format, style, or placement.

Netflix creates a unique recommendation listing for each customer that revisits its website. How would you classify Netflix's ebusiness strategy?

Personalization

Which of the following is considered data?

Quantity sold, customer number, and order date

what evaluates an organization's strengths, weaknesses, opportunities, and threats to identify significant influences that work for or against business strategies?

SWOT analysis

what evaluates variables that search engines use to determine where a URL appears on the list of search results

Search engine ranking

Identifying competitive advantages can be difficult and explains why they are typically _______.

Temporary

Which of the following represents the common ebusiness revenue models? (Check all that apply.)

The primary ebusiness revenue models include advertising fees, license fees, subscription fees, transaction fees, and value-added services fees.

Automation

The process of computerizing manual tasks, making them more efficient and effective, and dramatically lowering operational costs

What is the primary goal of using As-Is and To-Be process models?

To determine what the problem is and then how to solve the problem

__________ process models show the results of applying change improvement opportunities to the current process model

To- Be

zombie

a program that secretly takes over another computer for the purpose Page 161of launching attacks on other computers

types of epolicies

acceptable use policy, information privacy policy, social media policy, workplace monitoring policy, email privacy policy, ethical computer use policy

what is included in the four basic options for BYOD policy

access only to nonsensitive systems and data, access but with IT control over personal devices, apps, and stored data, access, but preventing local storage of data on personal devices

what are keywords that advertisers choose to pay for and appear as sponsored links on the Google results pages.

adwords

intermediaries

agents, software, or businesses that provide a trading infrastructure to bring buyers and sellers together

affiliate program

allow a business to generate commissions or referral fees when a customer visiting its website clicks a link to another merchant's website

Personally Indentifiable Information (PII)

any data that could potentially identify a specific individual

swim lane layout

arranges the steps of a business process into a set of rows depicting the various elements.

what allows a business to generate commissions or referral fees when a customer visiting its website clicks on a link to another merchant's website?

associate program

sock puppet marketing is one example of....

astroturfing, the practice of artificially stimulating online conversation and positive reviews about a product, service, or brand.

Hoaxes

attack computer systems by transmitting a virus hoax with a real virus attached. By masking the attack in a seemingly legitimate message, unsuspecting users more readily distribute the message and send the attack on to their co-workers and friends, infecting many users along the way

select three objectives that a leadership plan might include to achieve a solid business strategy

attracting new customers, decreasing costs, increasing sales

what is a chart or graph that presents grouped data with rectangular bars with lengths proportional to the values that they represent

bar chart

what are the most successful solutions or problem solving methods that have been developed by a specific organization or industry?

best practices

three generic business strategies Porter identified for entering a new market?

broad cost leadership focused strategy broad differentiation

__________ process modeling is the activity of creating a detailed flowchart or process map of a work process that shows its inputs, tasks, and activities in a structured sequence

business

__________- facing processes are invisible to the external customers but essential to the effective management of the business

business

a _______ process patent protects a specific set of procedures for conducting a particular business activity

business

a _________ process model is a graphic description of a process, showing the sequence of process tasks, which is developed for a specific purpose and from a selected viewpoint

business

what is the scientific process of transforming data into insight fir making better decisions?

business analytics

what is the analysis and redesign of workflow within and between enterprises?

business process reengineering

What are the four main types of ebusiness models?

business-to-business (B2B), business-to-consumer (B2C), consumer-to-business (C2B), and consumer-to-consumer (C2C)

three examples of goods

cars, groceries, clothing

a dynamic process is continuously changing and provides business solutions to ever-changing business operations. As the business and its strategies change, so do the dynamic processes. Which of the following are examples of dynamic processes?

changing order levels based on currency rates managing layoffs of employees canceling business travel due to extreme weather

________is any proprietary software licensed under exclusive legal right of the copyright holder

closed source

open system

consists of nonproprietary hardware and software based on publicly known standards that allow third parties to create add-on products to plug into or interoperate with the system.

source code

contains instructions written by a programmer specifying the actions to be performed by computer software

hitbot

create the illusion that a large number of potential customers are clicking the advertiser's links, when in fact there is no likelihood that any of the clicks will lead to profit for the advertiser.

select three structured decisions that are almost repetitive in nature and affect short-term business strategies

creating employee staffing schedules, creating weekly production schedules, reordering inventory

two examples of services

cutting hair waiting tables

which of the following are dynamic reports

daily stock market price report available inventory report

Dark web/deep web

dark web is part of the deep web. like deep web content, dark web cannot be accessed by conventional search engines, but most often the reason dark web content remains inaccessible to search engines is bc content is illegal

what are the raw facts that describe the characteristics of an event or object?

data

three types of clickstream data metrics

demographics of registered visitors, number of abandoned registrations, length of stay on the website

three items contained in a typical internet use policy:

describes user responsibility for citing sources, describes the internet services available to users, states the ramifications if the policy is violated

the key term machine to machine refers to devices that connect directly to other __________

device

smart card

device about the size of a credit card containing embedded technologies that can store information and small amounts of software to perform some limited processing. Smart cards can act as identification instruments, a form of digital cash, or a data storage device with the ability to store an entire medical record.

which policy stating how, when and where the company monitors its employees?

employee monitoring policy

two unstructured decisions:

entering a new industry, entering a new market

three reasons why organizations should develop written epolicies:

establish employee guidelines, establish employee procedures, establish organizational rules

three steps to improve business processes

establish measures, document as-is process, follow process

what is the confirmation or validation of an event or object?

fact

select two support value activities

firm infrastructure technology development

human generated structured data is data that humans, in interaction with computers, generate. which two sources of data are human generated structured data

gaming data input data

Input process output feedback

gas engine petal warning light

select three primary value activities

inbound logistics marketing and sales outbound logistics

Malicious codes....

includes a variety of threats such as viruses, worms, and Trojan horses.

Which of the following are epolicies a business should implement to protect itself?

information privacy policy, acceptable use policy, Internet use policy, and anti-spam policy are all epolicies a business must implement.

an ethical issue that focuses on who owns information about individual and how information can be sold and exchanged?

information property

__________ measures the number of people a firm can communicate with all over the world.

information reach

sensitive PII

information transmitted with encryption and when disclosed, results in a breach of an individual's privacy and can potentially cause the individual harm

nonsensitive PII

information transmitted without encryption and includes information collected from public records, phone books, corporate directories, websites, etc

what are the two names for the assets that reside within the minds of members, customers, and colleagues and include physical structures and recorded media

intellectual capital knowledge assets

what is intangible creative work that is embodied in physical form and includes copyrights, trademarks, and patents

intellectual property

what are various commercial applications of AI?

intelligent systems

what is a sniffer

is a program or device that can monitor data traveling over a network. Sniffers can show all the data being transmitted over a network, including passwords and sensitive information. Sniffers tend to be a favorite weapon in the hacker's arsenal.

sock puppet marketing

is the use of a false identity to artificially stimulate demand for a product, brand, or service. A false identity on the Internet is known colloquially as a sock puppet or catfish, depending upon the level of detail attached to the false identity.

what are the quantifiable metrics a company uses to evaluate progress toward critical success factors (CSF's)

key performance indicators (KPI's)

which of the following are classified as static report types?

last year's salary report last year's sales report

three examples of features that may be included in a digital dashboard for a manufacturing team

list fo KPI's, list of outstanding alerts, graph of stock market prices

type of AI that enables computers to both understand concepts in the environment and to learn

machine learning

ezine

magazine published only in electronic form on a computer network. Flipboard is a social-network aggregation, magazine-format application software for multiple devices that collects content from social media and other websites, presents it in magazine format, and allows users to flip through the content.

what is a business function that moves info about people, products, and processes across the the company to facilitate decision making and problem solving

management info. systems (MIS)

___________ decisions concern how the organization should achieve the goals and objectives set by its strategy and they are usually the responsibility of mid-level management

managerial

3 primary decision-making challenges facing managers today

managers must apply sophisticated analysis techniques, like porter's strategies or forecasting, to make strategic decisions, manager must make decisions quickly, managers need to analyze large amounts of information

what is a website or web application that uses content from more than one source to create a completely new product or service.

mashup

what are measurements that evaluate results to determine whether a project is meeting its goals

metrics

A ____________ is a simplified representation of abstraction of reality

model

Decision support systems (DSSs)

model information using OLAP, which provides assistance in evaluating and choosing among different courses of action. DSSs enable high-level managers to examine and manipulate large amounts of detailed data from different internal and external sources. Analyzing complex relationships among thousands or even millions of data items to discover patterns

_________ is the process within a genetic algorithm of randomly trying combinations and evaluating the success (or failure) of the outcome

mutation

which of the following is not included in the four basic options for BYOD policy?

no access for personal devices

what are two types of personally identifiable information?

nonsensitive PII and sensitive PII

what is the manipulation of information to create business intelligence in support of strategic decision making

online analytical processing (OLAP)

___________ refers to any software whose source code is made available free (not on a fee or licensing basis as in ebusiness) for any third party to review and modify.

open source

what type of decisions affect how the firm is run from day to day; they are the domain of operations managers, who are the closest to the customer

operational decisions

a(n) ________ is an exclusive right to make, use, and sell an invention and is granted by a government to the inventor?

patent

a static process uses a systematic approach in an attempt to improve business effectiveness and efficiency continuously. managers constantly attempt to optimize static process. which of the following are ex.) of static processes?

payroll, calculating taxes, creating financial statements

static process decision examples:

payroll, creating financial statements, calculating taxes

What are the first two lines of defense a company should take when addressing security risks?

people first, technology second

why is ebusiness able to take advantage of the long tail?

physical stores are limited by shelf space

what is an area of business intelligence, which extracts info from data and uses it to predict future trends?

predictive analytics

the person responsible for ensuring the ethical and legal use of info within a co. is the Chief _______ officer

privacy

a business _________ is standardized set of activities that accomplish a specific task, such as processing a customer's order

process

what occurs when a company develops unique differences in its products or services with the intent to influence demand

product differentiation

intellectual ____________ is intangible creative work that is embodied in physical form and includes copyrights, trademarks, and patents

property

select all the activities for which transactional information is created.

purchasing stocks, withdrawing cash from an ATM, making airline reservations

case-based ___________ is a method whereby nee problems are solved based on the solutions from similar cases solved in the past

reasoning

CSF's:

reduce product costs, create high-quality products, retain competitive advantages

cybermediation

refers to the creation of new kinds of intermediaries that simply could not have existed before the advent of ebusiness, including comparison-shopping sites such as Kelkoo and bank account aggregation services such as Citibank

what occurs when steps are added to the value chain as new players find ways to add value to the business process.

reintermediaton

structured data has a defined length, type, and format and includes numbers, dates, or strings such as Customer address. which two sources typically store structured data

relational database spreadsheet

what is a document containing data organized in a table, matrix, or graphical format allowing users to easily comprehend and understand info?

report

what indicates the earning power of a project

return on investment

what is another name for a pivot

rotation

three examples of analytical information

sales trends, market projections, future growth projections

________- structured decisions occur in situations in which a few established processes help to evaluate potential solutions, but not enough to lead to a definite recommended decision

semi

machine generated data is created by a machine without human intervention. which two sources represent machine generated data?

sensor data point-of-sale data

a(n) __________ bot is a software that will search several retailer websites and provide a comparison of each retailer's offerings including price and availability

shopping

three characteristics of managerial decisions

short term, daily, monthly, and yearly time frames semistructured, ad hoc reporting decision types middle management and director employee types

which of the following is a type of unplanned downtime?

smoke damage, water damage, static electricity, frozen pipe

Using ones social skills to trick people into revealing access credentials or other valuable information is called ______________.

social engineering

two sources of unstructured data?

social media data satellite data

_______ documents are the original transaction record

source

items typically contained in an employee monitoring policy ...

state the consequences of violating the policy, always enforce the policy the same for everyone

operational decisions are considered ________ decisions, which arise in situations where established processes offer potential solutions

structured

what produces an improved product customers are eager to buy, such as a faster car or larger hard drive?

sustaining technology

Employees need to understand that email privacy exists to an extent and that corporate email is solely owned by _________.

the company

When thinking about a washing machine as a system, which of the following represents the feedback?

the light indicating that the washer is off balance and has stopped

click fraud

the practice of artificially inflating traffic statistics for online advertisements. Some unethical individuals or click fraud scammers even use automated clicking programs called hitbots.

dynamic process static process

throwing a bird in the air throwing a rock in the air

what is the basic business system that serves the operational level (analysts) and assists in making structured decisions?

transaction processing system

what are KPI's

turnover rates of employees, average customer spending, number of new customers

a value chain analysis views a form as a series of business processes that each add ____________ to the product of service

value

an _____ is a data characteristic that stands for a value that changes or varies over time

variable

technique that induces websites or users to pass on a marketing message to other websites or users, creating exponential growth in the message's visibility?

viral marketing

what is the primary difference between a worm and a virus

viruses attach to something, worms tunnel themselves

_________ includes the tasks, activities, and responsibilities required to execute each step in a business process

workflow

a virtual _________ is a work environment that is not located in any one physical space.

workplace

what spreads itself not only from file to file but also from computer to computer?

worm


Kaugnay na mga set ng pag-aaral

ICND1 - "Do I Know This Already?"

View Set

T/F: Body Planes, Directions and Cavities

View Set

Fundamentals of Nursing P&P Chapter 22

View Set

Advanced Skills For Healthcare Providers Final Review Chapter 1-17

View Set

Mental Health Exam 2 Recommended NCLEX Qs.

View Set