Computer Fundamentals for Business - Concept Assessment 2 Study guide

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

If you receive $1,000 15 years from now, what is the PV of that $100 if you use a 7% interest or discount rate?

$362.45

Michelle runs a shop on Etsy. One month, she spends $2,800 to promote her shop on Etsy and other social media sites. In that month, she gains 50 new customers. What is her customer acquisition cost for that month?

$56

If you receive $100 five years from now, what is the PV of that $100 if you use a 6% interest or discount rate?

$74.73

A doctor in a small, private practice is looking for a safe way to share and receive patient information with other doctors his patients go to for care. She wants to make sure that any system she uses guarantees her patients privacy and abides by all local, state, and federal regulations (including HIPPA). Her tech adviser recommends a system that uses blockchain. Why would this be a good system for this type of information?

(WRONG ANSWER): Because blockchain can be used for quality assurance purposes, using it in healthcare would ensure that no mistakes were made when treating patients. Guess - In blockchain, a secure connection is created between computers accessing information. This would prevent unauthorized people from accessing any sensitive data.

What is the term for a CRM that tracks the type of sale that is most likely to make a person purchase an item that they have previously viewed on an e-commerce site?

(WRONG ANSWER): Product Development Guess - User Experience

Cybersecurity threat mitigation is best defined as the policies, procedures, and tools that help an organization

(WRONG ANSWER): keep its IT assets and other proprietary information confidential and protected from ransomware.

What does the General Data Protection Regulation (GDPR) strive to achieve?

(WRONG ANSWER): to ensure U.S. companies protect the privacy and personal data of U.S. citizens

Malicious bots are cybersecurity risks because they

(WRONG ANSWER): ultimately destroy an individual computer's hard drive.

What is a key difference between business-to-government (B2G) transactions and other types of e-commerce?

B2G transactions involve prenegotiated contracts.

How does each additional block added to the blockchain strengthen the integrity of the entire chain?

Because each block contains information on recording time and sequence for both its transaction and the transaction immediately preceding it, with more blocks there is more transaction history information, making it difficult to falsify.

Which of the following is the clearest definition of a computer virus?

Code-created malware that, when executed, damages programs and performance.

How does the cybersecurity goal of preserving data integrity relate to the goal of authenticating users?

Data integrity is more easily preserved if users must be authorized to access data and make changes.

What is the primary reason that businesses use CRM systems to help them identify MQLs and SQLs during the customer acquisition process?

Different engagement is needed to turn each type of lead into a customer.

What is the correct term for the small computer within a smartphone that analyzes the sounds entering your phone through the analog/digital converter?

Digital Signal Processor (DSP)

The abbreviation for Future Value is (___).

FV

Excel functions can be found under which tab?

Formulas

Positive and negative numbers/values will impact the __________ Value (FV) calculation.

Future

Negative numbers are shown with which sign in front of the number?

Minus sign (−)

The abbreviation for Net Present Value is (_____).

NPV

NPER is the acronym for what financial function term?

Number of Periods

The __________ calculates the payment for a loan based on constant payments and a constant interest rate.

PMT

The total amount a series of payments is worth now is called the __________.

PV (Present Value)

Explain the purpose of the National Institute of Standards Technology (NIST) Cybersecurity Framework.

The NIST Cybersecurity Framework is a voluntary guide that helps organizations understand and protect themselves against cybersecurity risks.

Why is it important to preserve the integrity of data, information, and systems?

These assets lose their usefulness and value if their consistency, accuracy, or dependability is compromised.

What is the second step that occurs when placing a call on a cellular network?

Your voice is converted by your phone to an electrical signal that is transmitted via radio waves to the nearest cell tower.

Which of the following is one of the primary components that enable networks and individual devices to connect to the Internet?

a "backbone" of connected hardware and a suite of Internet protocol software

Which of the four criteria is occurring when a network confirms that a transaction has not yet occurred on the blockchain?

a transaction is verified

If a company wants to create a secure computer network that can be accessed and used solely by its employees, it should create

an intranet.

An __________ is a contract between an individual and a company in which you make a lump sum payment or series of payments and, in return, receive regular disbursements beginning either immediately or more commonly at some point in the future.

annuity

"Cybersecurity threat mitigation" includes all of the policies, procedures, and tools that help organizations

anticipate and counter threats from security vulnerabilities or incidents and reduce their impact.

What are the core actions of the protect (PR) function?

controlling access to systems and preventing unauthorized access

Saraiya runs a small café. She would like to start placing small ad buys on social media and hires an analytics firm to determine which platforms she should advertise on. What type of cost would this be considered?

customer acquisition cost

Sales managers must identify the customer leads that best fit the company's goals. CRM assists in this aspect of a company's sales process, which is known as

customer qualification.

A Trojan horse succeeds through

deceptive access.

The purpose of the application protocol layer of TCP/IP is to

define how email programs and other software communicate within and across networks.

In addition to overall digital flexibility, technological savings, and increased collaboration, computing in the cloud provides organizations with

disaster recovery.

The __________ is the interest rate that is actually earned or paid on an investment, loan, or other financial instrument due to the result of compounding interest over a given time period.

effective interest rate

Vector and raster files are

geographic data.

A PaaS vendor offers its clients the ability to quickly build a customer loyalty app that allows customers to earn points for every purchase. The client chooses what features they'd like the app to have from a predetermined list of choices. What is this an example of?

mobile software development kit

When calculating (FV) Future Value of an annuity it is important to set the payment (PMT) to a __________ value.

negative

What is a key advanced technology behind CRM analytics?

online analytical processing

What type of computer users are considered miners?

people who validate cryptocurrency transactions on the digital ledger

To remain relevant in today's e-commerce landscape, many businesses use progressive ________ applications to undertake m-commerce.

web

A benign Internet robot that gathers data is called a(n)

web crawler.

It is especially important for startup companies to create and follow a well-designed e-commerce strategy. Which of the following is the first phase in a well-designed strategy?

web planning

In which situation should the origin of information be authenticated to protect data integrity?

when electronic votes are submitted during an election

What does the abreviation (FV) stand for?

Future Value

The term Internal Rate of Return is abbreviated (____).

IRR

What is the second step in the process of sending a message via the Internet?

Identify the correct domain name.

What is the goal of the planning phase of the plan-protect-respond cycle?

Understand common threats that an organization may face and determine how vulnerable they are to such threats.

How does VPN software ensure that people accessing a network are authorized to do so?

VPN software authenticates users.

Why is establishing authentication procedures a common cybersecurity goal?

Verifying that users are authorized to access systems, data, and resources is fundamental to preventing their unauthorized use.

Manuel runs a small business that paints residential interiors. He has decided most of his current customers can best be reached by sending out a seasonal email newsletter. He will target new customers by placing ads on Facebook targeted at people located within 20 miles of his business who have searched for house painters. Where would he place this information on an e-commerce presence map?

type of presence

Collaboration software is designed to increase collaboration and productivity primarily by enabling team members to

view, edit, and add shared information in real time, from anywhere.

Which function of the NIST Cybersecurity Framework calls for an organization to implement plans for resilience?

recover (RC) function

A cybersecurity exploit allows a hacker or intruder to

remotely access a network, gain privileges, and make unauthorized changes.

For which type of cybersecurity vulnerability do organizations maintain and share databases of known problems?

security weaknesses in operating systems or application software

Payment can be made in the form of funds, assets, or __________.

services

With Web 3.0, everyday devices connected to the Web will become

smarter and more capable, given the improved support for the Internet of Things (IoT).

Which Web 2.0 feature utilizes application programming interfaces (APIs) to automate web content and/or processes?

software as a service (SaaS)

As of 2020, all legislation that has been passed to protect elections from cybersecurity threats are part of

state-specific cybersecurity laws.

The e-commerce company with the highest revenue is based in which country?

the United States

To calculate an organization's customer equity (CE) value we first determine

the future lifetime revenue the organization's customers will generate.

What is the main purpose of content delivery networks (CDNs)?

to minimize the distance between website users and website servers

M-commerce is a subset of

traditional e-commerce.

What is the second criteria necessary for adding a block to the blockchain?

transaction verification

What if any difference is there between a Trojan horse and a regular computer virus?

A Trojan horse does not self-replicate.

What is the difference between a cloud service and a web service?

A cloud service provides users with increased computing power and data management, whereas a web service provides the software tools needed for devices and systems to communicate with each other.

How does a cybersecurity exploit threaten the safety of a system?

It is a tool or technique for taking advantage of a system vulnerability to cause harm.

How are data in process different from data at rest or data in storage?

It is held in the device's RAM until it can be processed by the CPU or GPU.

__________ is widely used in finance in the stock valuation, bond pricing, and financial modeling.

PV (Present Value)

PMT is the Excel function for __________.

Payment

Why is data that is located in the RAM of a device considered data in transit?

RAM only holds data and instructions temporarily; nothing is permanently stored in RAM.

Interest Rate goes into which line in the Excel PMT function?

Rate

Of the following statements, which one specifically applies to the CRM integration of platforms such as Facebook, YouTube, and TikTok?

Social media platforms provide targeted customer information.

Which of the following is the term for CRM analytics that provides information about where data erosion occurs and how the erosion can be minimized?

Standardized Data Collection Processes

How do businesses ultimately benefit from using a CRM to identify the highest revenue customers in a target market, before developing a marketing campaign?

They save time and money by targeting this precise segment of the market.

Which cryptocurrency shares features with a previous cryptocurrency but is technologically enhanced?

bitcoin cash

What is the MOST direct way in which customer relationship management (CRM) systems can help businesses increase their sales?

by helping them identify and attract prospective customers

How does using a CRM to track customer acquisition rates help organizations improve their future customer acquisition rates?

by revealing whether their marketing efforts are effective or require changes

Amazon, Kamatera, Salesforce, and Google are all examples of

cloud service providers.

Which type of collaboration software could best help an organization increase engagement between remote employees and those who are "in-house" or organization-based?

cloud-based forums, messaging, and meeting apps

As e-commerce continues to develop, many retailers are likely to maintain some type of "brick-and-mortar" store or physical location primarily because

consumers expect integrated shopping experiences that include face-to-face options.

Gartner IT Services company predicts that by 2021, customer relationship management systems will be the single largest revenue area of spending in

enterprise software.

An ordinary annuity is a series of __________ payments made at the end of consecutive periods over a fixed length of time.

equal

The value that the future lifetime revenue an organization's customers will generate minus customer acquisition costs and customer retention costs is called customer

equity.

Apple has a very high customer equity (CE) value. Apple has gained this high CE value due to

extreme customer loyalty.

Time Value of Money (TVM) is one of the most basic fundamentals in __________.

finance

The key feature of Web 2.0 that allows users to collectively classify information, such as by tagging websites and online images, is called

folksonomy.

An educational startup has already written its proprietary "Homework Helper" code, using AI to help high school students with homework. While their data storage needs are currently small, they expect their needs to grow exponentially as they increase their user base. Which of the following could help them with this?

infrastructure as a service (IaaS)

Future Value (FV) calculations help you determine the amount of money you will have if you deposit a sum of money into an account or __________ money in a financial instrument that pays interest.

invest

An online photo printing company can temporarily lose its e-commerce ubiquity if

its website crashes due to a coding error or attack by hackers.

Built on real-time geodata and information provided from wireless mobile devices, ________ are widely used in m-commerce.

location-based services (LBS)

Which of the following is a goal of confidentiality as defined by the CIA triad?

making sure the right people have access to secure information

Which of the following acts is an example of social engineering?

manipulating people in order to obtain and misuse their personal information

It is especially important for startup companies to create and follow a well-designed e-commerce strategy. Which of the following is the last phase in a well-designed strategy?

mobile platform planning and implementation

An interest rate (or rate) is usually stated as a __________.

percentage

The organizations likely to benefit the most from the global reach of e-commerce are those that

previously depended on foot traffic into one physical store to sell their products.

Bad actors seeking to create computer viruses primarily must know how to

program code.

While using her phone's GPS to drive to her vacation destination, Siena needs to find a gas station. She enters into her phone's GPS that she is looking for a gas station that is no more than five miles away from the route she is currently on. What is this an example of?

proximity location


Kaugnay na mga set ng pag-aaral

Environmental - Chapter 2 Study Guide

View Set

prepU Chapter 42: Loss, Grief, and Dying

View Set

Anatomy wk 30 - Neck and Thyroid

View Set

Chapter 10 Gene Action: From DNA to Protein

View Set

ExamFX Completing the application, underwriting, and Delivering the Policy

View Set