Computer Fundamentals For Business
Michelle runs a shop on Etsy. One month, she spends $2,800 to promote her shop on Etsy and other social media sites. In that month, she gains 50 new customers. What is her customer acquisition cost for that month?
$56
What if any difference is there between a Trojan horse and a regular computer virus?
A Trojan horse does not self-replicate.
What is a cloud deployment model?
A cloud deployment model defines the framework of a cloud environment.
What is the difference between a cloud service and a web service?
A cloud service provides users with increased computing power and data management, whereas a web service provides the software tools needed for devices and systems to communicate with each other.
Which of the following scenarios represents a customer acquisition cost of $100?
A company spends $100,000 on advertising and marketing in one month. They gain 1,000 new customers in that month.
Which of the elements of the CIA triad does properly maintaining all hardware serve?
Availability
What is a key difference between business-to-government (B2G) transactions and other types of e-commerce?
B2G transactions involve prenegotiated contracts.
Why is a denial-of-service attack (DoS attack) a threat to data availability?
By flooding a system with incoming messages, a DoS attack forces the system to shut down, rendering it inaccessible to the users who legitimately have access to it.
How do CRM systems make troubleshooting customer problems easier?
CRMs store information about customer purchases and interactions.
What is the key reason to implement cloud computing into one's personal and/or business data and information processing?
Cloud computing diminishes the need to store files and software on a local drive.
Which of the following is the clearest definition of a computer virus?
Code-created malware that, when executed, damages programs and performance.
How does the cybersecurity goal of preserving data integrity relate to the goal of authenticating users?
Data integrity is more easily preserved if users must be authorized to access data and make changes.
What is the correct term for the small computer within a smartphone that analyzes the sounds entering your phone through the analog/digital converter?
Digital Signal Processor
In addition to overall digital flexibility, technological savings, and increased collaboration, computing in the cloud provides organizations with
Disaster recovery
Which privacy law governs the transfer of personal data outside of the geographic location the law was written in?
Europe's General Data Protection Regulation
Makoto and Rebecca want to hire a nanny for their 6-month-old baby. Before allowing someone into their home to watch their child, they are planning on running a comprehensive background check, including a credit check. Which law specifies whether Makoto and Rebecca are legally allowed to access potential candidate's credit information?
Fair Credit Reporting Act
How does a cybersecurity exploit threaten the safety of a system?
It is a tool or technique for taking advantage of a system vulnerability to cause harm.
Of the following statements, which one specifically applies to the CRM integration of platforms such as Facebook, YouTube, and TikTok?
Organizations can various platforms and integrate them. A variety of social media should be used.
Why are probable loss calculations important?
Organizations have limited funds to use toward system protections.
A corporation that was recently the victim of hacking that was caused by a high-level employee falling for a phishing scheme institutes a required, annual, self-paced training module that alerts employees to the most common recent phishing attacks. The institution of this new training requirement represents which phase of the plan-protect-respond cycle?
Respond
Which of the following is the term for CRM analytics that provides information about where data erosion occurs and how the erosion can be minimized?
Standardized Data Collection Processes
Explain the purpose of the National Institute of Standards Technology (NIST) Cybersecurity Framework.
The NIST Cybersecurity Framework is a voluntary guide that helps organizations understand and protect themselves against cybersecurity risks.
A company is trying to determine why users are deleting or no longer engaging with their app on a regular basis. Which of the below is an example of how the company could use CRM to make this determination?
The company could use CRM to determine what part of the app users who deleted it were in right before the app was deleted.
Which is the best explanation of how the World Wide Web (WWW) differs from the Internet?
The web is only one of many applications that runs on and is accessed through the Internet.
Why is it important to preserve the integrity of data, information, and systems?
These assets lose their usefulness and value if their consistency, accuracy, or dependability is compromised.
Which is the most common characteristic of social engineering cybersecurity attacks?
They are conducted via emails that offer a reward in exchange for clicking a given link.
How do businesses ultimately benefit from using a CRM to identify the highest revenue customers in a target market, before developing a marketing campaign?
They save time and money by targeting this precise segment of the market.
How does VPN software ensure that people accessing a network are authorized to do so?
VPN software authenticates users.
Why would a vendor agreement be a disadvantage of cloud computing?
Vendor agreements make it difficult to switch services.
Why is establishing authentication procedures a common cybersecurity goal?
Verifying that users are authorized to access systems, data, and resources is fundamental to preventing their unauthorized use.
Software-based keyloggers often infect a system through
a malicious email or link opened by an unsuspecting user.
Share of wallet is also known as share of
customer
When a user has determined their destination, GIS can assist in providing directions. This is called
route information.
Which Web 2.0 feature utilizes application programming interfaces (APIs) to automate web content and/or processes?
software as a service (SaaS)
What is the second criteria necessary for adding a block to the blockchain?
transaction verification
Manuel runs a small business that paints residential interiors. He has decided most of his current customers can best be reached by sending out a seasonal email newsletter. He will target new customers by placing ads on Facebook targeted at people located within 20 miles of his business who have searched for house painters. Where would he place this information on an e-commerce presence map?
type of presence
E-commerce ________ is the ability of an organization to create a strong presence among consumers in many places, with minimal time constraints, to sell them products and services.
ubiquity
Online content that has been created and posted by unpaid contributors such as customers or fans of a product or service is referred to as
user-generated
Collaboration software is designed to increase collaboration and productivity primarily by enabling team members to
view, edit, and add shared information in real time, from anywhere.
Which type of cybersecurity breach can cause the most damage to an organization's systems, data, and information?
viruses
The NIST Cybersecurity Framework is a
voluntary guide for organizations.
It is especially important for startup companies to create and follow a well-designed e-commerce strategy. Which of the following is the first phase in a well-designed strategy?
web planning
On an e-commerce presence map, what is presence?
websites, email, social media sites, and offline media
In which situation should the origin of information be authenticated to protect data integrity?
when electronic votes are submitted during an election
To remain relevant in today's e-commerce landscape, many businesses use progressive ________ applications to undertake m-commerce.
wireless
Michelle runs a shop on Etsy. One month, she spends $2,800 to promote her shop on Etsy and other social media sites. In that month, she gains 50 new customers. All customers purchased products that cost $100, that were marked up 100 percent. What is the actual amount of revenue earned per customer, taking into account materials and promotional costs?
−$6.00
Which statement accurately describes the need to keep sensitive data, information, and systems confidential?
It is both a major goal and a requirement for cybersecurity.
An investment firm creates a network designed to facilitate information exchange between devices at its offices in New York City and New Haven, Connecticut. Which type of network would the company use to exchange information?
Wide Area Network (WAN)
What is the second step that occurs when placing a call on a cellular network?
Your voice is converted by your phone to an electrical signal that is transmitted via radio waves to the nearest cell tower.
Which of the following is one of the primary components that enable networks and individual devices to connect to the Internet?
a "backbone" of connected hardware and a suite of Internet protocol software
What is a cybersecurity threat?
an event or condition that can lead to IT asset loss and the negative consequences of such loss
How is quantitative data about a customer most accurately characterized?
as a record of how a customer interacts with a business.
What does business-to-consumer (B2C) e-commerce replace?
brick-and-mortar store locations
What is the MOST direct way in which customer relationship management (CRM) systems can help businesses increase their sales?
by helping them identify and attract prospective customers
How does using a CRM to track customer acquisition rates help organizations improve their future customer acquisition rates?
by revealing whether their marketing efforts are effective or require changes
Manufacturers of computers and other electronic devices follow the IEEE 802.3 protocol to ensure that their products
can be used to create a standard ethernet connection.
Spyware's basic function is to
capture the user's account data, passwords, keystrokes, and more.
Amazon, Kamatera, Salesforce, and Google are all examples of
cloud service providers.
A computer network must be connected to the Internet to support
communicating via email with people on other networks.
As e-commerce continues to develop, many retailers are likely to maintain some type of "brick-and-mortar" store or physical location primarily because
consumers expect integrated shopping experiences that include face-to-face options.
Sales managers must identify the customer leads that best fit the company's goals. CRM assists in this aspect of a company's sales process, which is known as
customer qualification.
The information needed to calculate share of customer is provided, in large part, by
customer relationship management systems.
What is one of the greatest risks of an organization storing customer data?
data breaches
The purpose of the application protocol layer of TCP/IP is to
define how email programs and other software communicate within and across networks.
A company has an excess of puffer jackets at the end of the season that it wants to sell quickly. In order to quickly sell this excess inventory, they send out emails to customers currently in their database. However, they want to determine what type of sale their customers find most motivating, so they send out three different emails with different discounts (BOGO free, 50% a purchase over $100, or free expedited shipping). The information gained during this campaign will be tracked, and customers who made purchases will receive similar email offers in the future. What type of CRM strategy is the company using?
demonstrating the value of CRM
The __________ is the interest rate that is actually earned or paid on an investment, loan, or other financial instrument due to the result of compounding interest over a given time period.
effective interest rate
An ordinary annuity is a series of __________ payments made at the end of consecutive periods over a fixed length of time.
equal
hich cryptocurrency offers a blockchain-based platform that can be used to develop decentralized applications?
ethereum
One benefit of using a CRM system to segment a market (rather than another type of market segmentation tool) is that a good CRM tool
facilitates using the company's own, collected data about customers.
Time Value of Money (TVM) is one of the most basic fundamentals in __________.
finance
The key feature of Web 2.0 that allows users to collectively classify information, such as by tagging websites and online images, is called
folksonomy
Vector and raster files are
geographic data
How do businesses ultimately benefit from using a CRM to identify the highest revenue customers in a target market, before developing a marketing campaign?
greater return on investment
Which level of share of wallet means that existing customers are spending more to purchase products or services from one organization than they are from direct or indirect competitors?
high share of wallet
A new app was released providing consumers with digital coupons for products the consumer indicates they frequently purchase. The app gives different users coupons with different values and shares purchasing as well as demographic information with the product manufacturer. Under what circumstances would the information sharing with product manufacturers be ethical?
if the app's terms of service indicated who they would be sharing information with and what information would be shared
According to research by Risk Based security, there were 2037 publicly reported data breaches
in the first half of 2020.
An educational startup has already written its proprietary "Homework Helper" code, using AI to help high school students with homework. While their data storage needs are currently small, they expect their needs to grow exponentially as they increase their user base. Which of the following could help them with this?
infrastructure as a service (IaaS)
An email that appears to be from a legitimate company is most likely to be a social engineering cybersecurity attack if
it contains a link to a free offer that seems too good to be true.
An online photo printing company can temporarily lose its e-commerce ubiquity if
its website crashes due to a coding error or attack by hackers.
One surveillance technology that relies on how the user enters data is a
keylogger.
The amount of time that passes between when a device is asked to perform and when it completes the task is known as
latency.
Descriptive data about a customer includes categories such as
lifestyle and career.
Built on real-time geodata and information provided from wireless mobile devices, ________ are widely used in m-commerce.
location-based services (LBS)
Ransomware basically holds a target hostage because it
makes the target's own data inaccessible.
What type of computer users are considered miners?
people who validate cryptocurrency transactions on the digital ledger
E-commerce ________ includes creating marketing messages that contain the individual's name, appeal to his/her interests, and take their purchase behavior into account.
personalization
The organizations likely to benefit the most from the global reach of e-commerce are those that
previously depended on foot traffic into one physical store to sell their products.
While using her phone's GPS to drive to her vacation destination, Siena needs to find a gas station. She enters into her phone's GPS that she is looking for a gas station that is no more than five miles away from the route she is currently on. What is this an example of?
proximity location
A cybersecurity exploit allows a hacker or intruder to
remotely access a network, gain privileges, and make unauthorized changes.
Which step in securing customer data ensures proper management of firewalls and routers?
server security
With Web 3.0, everyday devices connected to the Web will become
smarter and more capable, given the improved support for the Internet of Things (IoT).
If an organization's automated backup system is vulnerable to data loss or corruption, its cybersecurity vulnerability is a weakness or flaw in its
software
As of 2020, all legislation that has been passed to protect elections from cybersecurity threats are part of
state-specific cybersecurity laws.
For laptops and tablets to use a LAN to connect to the Internet wirelessly,
the LAN device hosting the ISP connection must act as a wireless access point.
The e-commerce company with the highest revenue is based in which country?
the U.S.