Connect: CH2, Connect Ch:3, BPI02, CH:4, CH: 5, BPI06, BPI07, CIS CH:6, CIS CH:7, CIS: CH 8
Rule ______ is the part of the U.S. Federal Rules of Criminal Procedure that covers the search and seizure of physical and digital evidence.
41
Who is a business analytics specialist who uses visual tools to help people understand complex data?
A data artist
Lead Account Contact Sales opportunity
A person or company that is unknown to your business. ----- An existing business relationship exists and can include customers, prospects, partners, and competitors. ----- Specific individual representing the account. ----- An opportunity exists for a potential sale of goods or services related to an account or contact.
Elevation of privilege Hoaxes Malicious code Packet tampering Sniffer Spoofing Splogs Spyware
A process by which a user misleads a system into granting unauthorized rights, usually for the purpose of compromising or destroying the system. ----- Attack computer systems by transmitting a virus hoax, with a real virus attached. ----- Includes a variety of threats such as viruses, worms, and Trojan horses. ----- Consists of altering the contents of packets as they travel over the Internet or altering data on computer disks after penetrating a network. ----- A program or device that can monitor data traveling over a network. ----- The forging of the return address on an email so that the message appears to come from someone other than the actual sender. ----- Fake blogs created solely to raise the search engine rank of affiliated websites. ----- Software that comes hidden in free downloadable software and tracks online movements.
Key logger Cookie Adware Spyware Clickstream
A program that records every keystroke and mouse click. ----- A small file deposited on a hard drive by a website containing information about customers and their web activities. ----- Software that generates ads that install themselves on a computer when a person downloads some other program from the Internet. ----- Software that comes hidden in free downloadable software and tracks online movements. ----- Records information about a customer during a web surfing session such as what websites were visited.
______ use policy requires a user to agree to follow it to be provided access to corporate email, information systems, and the Internet.
ACCEPTABLE
BPMN ______ is a task in a business process.
ACTIVITY
The National Institute of Standards and Technology (NIST) introduced an ________________ designed tokeep government information secure.
AES
______ policy simply states that email users will not send unsolicited emails.
ANTI-SPAM
Select three common website metrics.
Abandoned shopping carts Page exposures Unique visitors
Inbound logistics ------ Operations ------ Outbound logistics ----- Marketing and sales ----- Service
Acquires raw materials and resources and distributes to manufacturing as required. ----- Transforms raw materials or inputs into goods and services. ----- Distributes goods and services to customers. ----- Promotes, prices, and sells products to customers. ----- Provides customer support after the sale of goods and services
What is software that, while purporting to serve some useful function and often fulfilling that function, also allows Internet advertisers to display advertisements without the consent of the computer user?
Adware
Common data repository Module software design
Allows every department of a company to store and retrieve information in real-time allowing information to be more reliable and accessible. ----- Divides the system into a set of functional units (named modules) that can be used independently or combined with other modules for increased business flexibility.
Select two items typically contained in an employee monitoring policy.
Always enforce the policy the same for everyone. State the consequences of violating the policy.
______ paralysis occurs when the user goes into an emotional state of over-analysis (or over-thinking) a situation so that a decision or action is never taken, in effect paralyzing the outcome.
Analysis
What occurs when the user goes into an emotional state of over-analysis (or over-thinking) a situation so that a decision or action is never taken, in effect paralyzing the outcome?
Analysis paralysis
______ data encompasses all organizational data, and its primary purpose is to support the performance of managerial analysis or semistructured decisions.
Analytical
______ process models represent the current state of the operation that has been mapped, without any specific improvements or changes to existing processes.
As-Is
What is the practice of artificially stimulating online conversation and positive reviews about a product, service or brand?
Astroturfing
3 goals or objectives that a leadership plan might include to achieve a solid business strategy.
Attracting new customers Decreasing costs Increasing sales
Select the three terms for the data elements associated with an entity.
Attributes Fields Columns
What is the process of providing a user with permission including access levels and abilities such as file access, hours of access, and amount of allocated storage space?
Authorization
What is the process of computerizing manual tasks, making them more efficient and effective, and dramatically lowering operational costs?
Automation
______ is the process of computerizing manual tasks, making them more efficient and effective, and dramatically lowering operational costs.
Automation
What is the identification of a user based on a physical characteristic, such as a fingerprint, iris, face, voice, or handwriting?
BIOMETRICS
A mail ______ sends a massive amount of email to a specific person or system that can cause that user's server to stop functioning.
BOMB
What in BPMN notation is a task in a business process?
BPMN activity
In BPMN what represents anything that happens during the course of a business process?
BPMN event
A(n) ______ process model is a graphic description of a process, showing the sequence of process tasks, which is developed for a specific purpose and from a selected viewpoint.
BUSINESS
What is a management system, as well as a measurement system, that a firm uses to translate business strategies into executable tasks?
Balanced scorecard
What is a process of continuously measuring system results, comparing those results to optimal system?
Benchmarking
______ is a process of continuously measuring system results, comparing those results to optimal system.
Benchmarking
Regardless of what process is measured, how it is measured, and whether it is performed for the sake of efficiency or effectiveness, managers must set ______, or baseline values the system seeks to attain.
Benchmarks
What are baseline values the system seeks to attain?
Benchmarks
What are the most successful solutions or problem solving methods that have been developed by a specific organization or industry?
Best practices
______ is a type of digital currency in which a record of transactions is maintained and new units of currency are generated by the computational solution of mathematical problems and which operates independently of a central bank.
Bitcoin
What is a type of distribution ledger, consisting of blocks of data that maintain a permanent and tamper-proof record of transactional data?
Blockchain
What is a data structure containing a hash, previous hash, and data?
Blocks
______ occurs when resources reach full capacity and cannot handle any additional demands they limit throughput and impede operations.
Bottlenecks
Which policy allows employees to use their personal mobile devices and computers to access enterprise data and applications?
Bring your own device policy
______ -facing processes are invisible to the external customer but essential to the effective management of the business.
Business
______ process modeling is the activity of creating a detailed flowchart or process map of a work process that shows its inputs, tasks, and activities in a structured sequence.
Business
is a technology-driven process for analyzing data and delivering actionable information that helps executives, managers and workers make informed business decisions.
Business intelligence (BI)
What tracks corporate metrics such as critical success factors and key performance indicators and include advanced capabilities such as interactive controls allowing users to manipulate data for analysis?
Business intelligence dashboards
What attempts to understand and measure the current process and make performance improvements accordingly?
Business process improvement
What is a graphic description of a process, showing the sequence of process tasks, which is developed for a specific purpose and from a selected viewpoint?
Business process model
What is the activity of creating a detailed flowchart or process map of a work process that shows its inputs, tasks, and activities in a structured sequence?
Business process modeling
What is the analysis and redesign of workflow within and between enterprises?
Business process reengineering
What defines how a company performs certain aspects of its business and typically results in either a yes/no or true/false answer?
Business rule
What enforces business rules vital to an organization's success and often require more insight and knowledge than relational integrity constraints?
Business-critical integrity constraints
What are invisible to the external customer but essential to the effective management of the business?
Business-facing processes
_______ power is the ability of buyers to affect the price they must pay for an item.
Buyer
What is the ability of buyers to affect the price they must pay for an item?
Buyer power
What helps an organization segment their customers into categories such as best and worst customers?
CRM analysis technologies
What is a trusted third party, such as VeriSign, that validates user identities by means of digital certificates?
Certificate authority
Select the three things a supplier can do to take advantage in an industry if it has high supplier power.
Charging higher prices Limiting quality or services Shifting costs to industry participants
Who is responsible for overseeing all uses of MIS and ensuring that MIS strategically aligns with business goals and objectives? (Please use the acronym.)
Chief Information Officer
Who manages and defends intellectual property, copyrights, and patents?
Chief Intellectual Property Officer
Who is responsible for collecting, maintaining, and distributing company knowledge?
Chief Knowledge Officer
Who is responsible for ensuring the security of business systems and developing strategies and safeguards against attacks by hackers and viruses?
Chief Security Officer
______-fraud is the abuse of pay-per-click, pay-per-call, and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser.
Click
What can compare two or more data sets to identify patterns and trends?
Comparative analysis
______ click-fraud is a computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link.
Competitive
What occurs when a company keeps tabs of its competitor's activities on the web using software that automatically tracks all competitor website activities such as discounts and new products?
Competitive monitoring
What is the assurance that messages and information remain available only to those authorized to view them?
Confidentiality
What occurs when organizations use software that filters content, such as emails, to prevent the accidental or malicious transmission of unauthorized information?
Content filtering
Select three ways that companies duplicate competitive advantages.
Copy business operations Hire key employees Acquire new technology
______ software is software that is manufactured to look like the real thing and sold as such.
Counterfeit
Select the four functions that a database management system can perform on data in a database?
Create data Read data Update data Delete data
Which are critical success factors?
Create high-quality products Retain competitive advantages Reduce product costs
______ success factors are the crucial steps companies perform to achieve their goals and objectives and implement their strategies.
Critical
What are the crucial steps companies perform to achieve their goals and objectives and implement their strategies?
Critical success factors
What is the science that studies encryption, which is the hiding of messages so that only the sender and receiver can read them?
Cryptography
______ analytics involves gathering, classifying, comparing, and studying customer data to identify buying trends, at-risk customers, and potential future opportunities.
Customer
______-facing processes result in a product or service received by an organization's external customer.
Customer
What involves gathering, classifying, comparing, and studying customer data to identify buying trends, at-risk customers, and potential future opportunities?
Customer analytics
Select three common supply chain management metrics.
Customer order promised cycle time Inventory turnover Customer order actual cycle time
Which is used by Amazon for creating differentiation to reduce rivalry?
Customer profiling
Select the four primary strategic initiatives for competitive advantages.
Customer relationship management Supply chain management Business process reengineering Enterprise resource planning
What includes governments that are after some form of information about other governments?
Cyber-espionage
______ includes individuals who seek notoriety or want to make a social or political point such as WikiLeaks.
Cyber-vigilantes
______ includes threats, negative remarks, or defamatory comments transmitted via the Internet or posted on the website.
Cyberbullying
______ involves prevention, detection, and response to cyberattacks that can have wide-ranging effects on the individual, organizations, community, and at the national level.
Cybersecurity
What organization builds the national capacity to defend against cyberattacks and works with the federal government to provide cybersecurity tools, incident response services, and assessment capabilities to safeguard the ".gov" networks that support the essential operations of partner departments and agencies?
Cybersecurity and Infrastructure Security Agency
______ is the electronic defacing of an existing website.
Cybervandalism
______ is an organized attempt by a country's military to disrupt or destroy information and communication systems for another country.
Cyberwar
Which of the following are the three areas of information security?
DATA: prevention and resistance ATTACKS: detection and response PEOPLE: authentication and authorization
Data-driven _______ management is an approach to business governance that values decisions that can be backed up with verifiable data.
DECISION
What is a process that weeds out and fixes or discards inconsistent, incorrect, or incomplete information?
Data cleansing or scrubbing
What is the common term for the representation of multidimensional data?
Data cube
What compiles all of the metadata about the data elements in the data model?
Data dictionary
Select a term that is a synonym for data element, the smallest or basic unit of data in a database.
Data field
What occurs when a company examines its data to determine if it can meet business expectations, while identifying possible data gaps or where missing data might exist?
Data gap analysis
What refers to the extent of detail within the data?
Data granularity
What occurs when the same data element has different values?
Data inconsistency
What is a measure of the quality of data?
Data integrity
What is the time it takes for data to be stored or retrieved?
Data latency
What are logical data structures that detail the relationships among data elements using graphics or pictures?
Data models
What determines the accuracy and completeness of its data?
Data quality audit
Select the statement that accurately describes a situation in which there is too much data to properly understand or make use of it.
Data rich and information poor
Who is responsible for ensuring the policies and procedures are implemented across the organization and acts as a liaison between the MIS department and the business?
Data steward
What is the management and oversight of an organization's data assets to help provide business users with high-quality data that is easily accessible in a consistent manner?
Data stewardship
Select the four primary traits of the value of data.
Data type Data timeliness Data quality Data governance
What includes the tests and evaluations used to determine compliance with data governance polices to ensure correctness of data?
Data validation
What describes technologies that allow users to "see" or visualize data to transform information into a business perspective?
Data visualization
What maintains data about various types of objects (inventory), events (transactions), people (employees), and places (warehouses)?
Database
Select three items contained in a typical Internet use policy.
Describes the Internet services available to users. States the ramifications if the policy is violated. Describes user responsibility for citing sources.
______ agents are malicious agents designed by spammers and other Internet attackers to farm email addresses off websites or deposit spyware on machines.
Destructive
What are malicious agents designed by spammers and other Internet attackers to farm email addresses off websites or deposit spyware on machines?
Destructive agents
Select the four primary reasons low-quality data occurs in a system.
Different systems have different data entry standards and formats. Third-party and external data contains inconsistencies and errors. Data-entry personnel enter abbreviated data to save time. Online customers intentionally enter inaccurate data to protect their privacy.
________ rights management is a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution.
Digital
______ computing processes and manages algorithms across many machines in a computing environment.
Distributed
Processing and managing algorithms across many machines in a computing environment is known as ______
Distributed computing
_________-by hacking is a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network.
Drive
What is continuously changing and provides business solutions to ever-changing business operations?
Dynamic process
BPMN ______ is anything that happens during the course of a business process, including customer requests, time requests, and the end of the process.
EVENT
What refers to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry?
Ediscovery
Select the two terms that refer to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry.
Ediscovery Electronic discovery
______ MIS metrics measure the impact MIS has on business processes and activities, including customer satisfaction and customer conversion rates.
Effectiveness
Which metrics measure the impact MIS has on business processes and activities, including customer satisfaction and customer conversion rates?
Effectiveness MIS metrics
______ MIS metrics measure the performance of MIS itself, such as throughput, transaction speed, and system availability.
Efficiency
______ focuses on the extent to which a firm is using its resources in an optimal way, while effectiveness focuses on how well a firm is achieving its goals and objectives.
Efficiency MIS metrics
Which privacy policy details the extent to which email messages may be read by others?
Email privacy policy
Which policy stating explicitly how, when, and where the company monitors its employees?
Employee monitoring policy
What scrambles information into an alternative form that requires a key or password to decrypt?
Encryption
______ scrambles information into an alternative form that requires a key or password to decrypt.
Encryption
______ Resource Planning integrates all departments and functions throughout an organization into a single IT system (or integrated set of IT systems) so employees can make decisions by viewing enterprise wide information about all business operations.
Enterprise
What stores data about a person, place, thing, transaction, or event?
Entity
______ are policies and procedures that address information management along with the ethical use of computers and the Internet in the business environment.
Epolicies
Select the three reasons why organizations should develop written epolicies.
Establish organizational rules Establish employee guidelines Establish employee procedures
Which policy contains general principles to guide computer user behavior?
Ethical computer use policy
Select three epolicies.
Ethical computer use policy Social media policy Acceptable use policy
What are the two fundamental blocks on which organizations base their businesses?
Ethics and security
Select three purposes of a business process model.
Expose process detail gradually and in a controlled manner Focus attention on the process model interfaces Encourage conciseness and accuracy in describing the process model
______, transformation, and loading is a process that extracts information from internal and external databases, transforms it using a common set of enterprise definitions, and loads it into a data warehouse.
Extraction
A BPMN ____ display the path in which the process flows.
FLOWS
______ information practices is a general term for a set of standards governing the collection and use of personal data and addressing issues of privacy and accuracy.
Fair
What is a general term for a set of standards governing the collection and use of personal data and addressing issues of privacy and accuracy?
Fair information practices
True or false: There is only one force that Michael Porter identified as a potential profitability of a company.
False
What is hardware and/or software that guard a private network by analyzing incoming and outgoing information for the correct markings?
Firewall
Occurs when an organization can significantly impact its market share by being first to market with a competitive advantage.
First-mover advantage
Select the three generic business strategies Porter identified for entering a new market.
Focused strategy Broad cost leadership Broad differentiation
What is a primary key of one table that appears as an attribute in another table and acts to provide a logical relationship between the two tables?
Foreign key
Select three examples of analytical data.
Future growth projections Market projections Sales trends
What is the first block created in the blockchain?
Genesis block
A(n) ______ is a function that converts an input of letters and numbers into an encrypted output of a fixed length.
HASH
What is a function that converts an input of letters and numbers into an encrypted output of a fixed length?
Hash
Buyer power ----- Supplier power ----- Threat of substitute products or services ----- Threat of new entrants ----- Rivalry among existing competitors
High because customers have many airlines to choose from ----- High because there are limited plane and engine manufacturers to choose from ----- High because of alternatives, such as videoconferencing and virtual meetings ----- High because new airlines are continuously entering the market ----- High because of the existence of websites such as Travelocity.com that force competition based solely on price
When considering the interrelationships between efficiency and effectiveness where does a company ideally want to operate?
High efficiency, high effectiveness
What occurs when attackers grant themselves the same access levels they already have but assume the identity of another user?
Horizontal privilege escalation
A(n) ______ security plan details how an organization will implement the information security policies.
INFORMATION
Potential Internal Strengths ----- Potential Internal Weaknesses ------ Potential External Opportunities ----- Potential External Threats
Identify new or innovative services and special expertise or experience ----- Identify all key areas that require improvement ----- Identify new markets, additional customer groups, and innovative technologies ------ Identify new market entrants, substitute products, and adverse changes in regulations
What is a broad administrative area that deals with identifying individuals in a system (such as a country, a network, or an enterprise) and controlling their access to resources within that system by associating user rights and restrictions with the established identity?
Identity management
______ is the ability for a blockchain ledger to remain a permanent, indelible, and unalterable history of transactions.
Immutability
What simply means unchangeable?
Immutable
Select three primary value activities.
Inbound logistics Outbound logistics Marketing and sales
firm infrastructure ----- Human resource management ------ Technology development ------ Procurement
Includes the company format or departmental structures, environment, and systems. ----- Provides employee training, hiring, and compensation. ----- Applies MIS to processes to add value. ----- Purchases inputs such as raw materials, resources, equipment, and supplies.
Select two ways an effective and efficient supply chain management system impacts Porter's Five Forces.
Increase its supplier power Create entry barriers to reduce the threat of new entrants.
Data levels Data formats Data granularities
Individual, department, enterprise ----- Documents, presentations, spreadsheets, database ----- Detail, summary, aggregate
____________ ethics govern the ethical and moral issues arising from the development and use of information technologies, as well as the creation, collection, duplication, distribution, and processing of information itself.
Information
Which epolicy contains general principles regarding information privacy?
Information privacy policy
What is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity?
Information secrecy
What is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization?
Information security
What details how an organization will implement the information security policies?
Information security plan
Nonsensitive PII
Information transmitted without encryption and includes information collected from public records, phone books, corporate directives, and websites.
______ are legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident.
Insiders
What is intangible creative work that is embodied in physical form and includes copyrights, trademarks, and patents?
Intellectual property
What occurs when a government attempts to control Internet traffic, thus preventing some material from being viewed by a country's citizens?
Internet censorship
Which policy contains general principles to guide the proper use of the Internet?
Internet use policy
What features full-time monitoring tools that search for patterns in network traffic to identify intruders?
Intrusion detection software
Accurate Complete Consistent Timely Unique
Is there an incorrect value in the data? Is a value missing from the data? Is aggregate or summary data in agreement with detailed data? Is the data current with respect to business needs? Is each transaction and event represented only once in the data?
What is the primary difference between KPIs and CSFs?
KPIs are far more specific than CSFs
__________ performance indicators are the quantifiable metrics a company uses to evaluate progress toward critical success factors.
Key
What are the quantifiable metrics a company uses to evaluate progress toward critical success factors?
Key performance indicators
A data ______ is a storage repository that holds a vast amount of raw data in its original format until the business needs it.
LAKE
What focuses on how individual users logically access data to meet their own particular business needs?
Logical view of data
A data ______ contains a subset of data warehouse data.
MART
A social Blank______ policy outlines the corporate guidelines or principles governing employee online communications.
MEDIA
What sends a massive amount of email to a specific person or system that can cause that user's server to stop functioning?
Mail bomb
______ is software that is intended to damage or disable computers and computer systems.
Malware
______ business processes are semidynamic, semiroutine, monthly business processes such as resource allocation, sales strategy, or manufacturing process improvements.
Managerial
What are semidynamic, semiroutine, monthly business processes such as resource allocation, sales strategy, or manufacturing process improvements?
Managerial business processes
______ share is the proportion of the market that a firm captures.
Market
What is the proportion of the market that a firm captures?
Market share
______ data management is the practice of gathering data and ensuring that it is uniform, accurate, consistent, and complete, including such entities as customers, suppliers, products, sales, employees, and other critical entities that are commonly integrated across organizational system.
Master
______ provides details about data.
Metadata
________ are measurements that evaluate results to determine whether a project is meeting its goals.
Metrics
Which company is using a broad market and high cost strategy?
Neiman Marcus
What gathers an organization's computer network traffic patterns to identify unusual or suspicious operations?
Network behavior analysis
Select three items typically found in an acceptable use policy.
Not attempting to break the security of any computer network or user. Not performing any nonrepudiation. Not using the service as part of violating any law.
Select three common customer relationship management metrics.
Number of marketing campaigns Number of new customers Number of sales calls
Select the key performance indicators.
Number of new customers Number of product returns Average customer spending Turnover rates of employees Percentage of help desk calls answered in the first minute
Backdoor program Trojan-horse virus Polymorphic virus Denial-of-service attack
Opens a way into the network for future attacks. ----- Hides inside other software, usually as an attachment or a downloadable file. ----- Viruses and worms change their form as they propagate. ----- Floods a website with so many requests for service that it slows down or crashes the site.
What are static, routine, daily business processes such as stocking inventory, checking out customers, or daily opening and closing processes?
Operational business processes
Choose three reasons why operational systems are not appropriate for business analysis.
Operational systems are not integrated Information from other operational applications is not included Operational information is mainly current
Customer-facing processes Industry-specific facing processes Business-facing processes
Order processing, Customer service, Sales process, Customer billing, Order shipping ----- Banking—Loan processing, Insurance—Claims processing, Government—Grant allocation, Hotel—Reservation handling, Airline—Baggage handling ----- Strategic planning, Tactical planning, Budget forecasting, Training, Purchasing raw materials
______ is a technique to gain personal information for the purpose of identity theft, usually by means of fraudulent emails that look as though they came from legitimate businesses.
PHISHING
A data ______ is an individual item on a graph or a chart.
POINT
What is a form of social engineering in which one individual lies to obtain confidential data about another individual?
PRETEXTING
Sock ______ marketing is the use of a false identity to artificially stimulate demand for a product, brand, or service.
PUPPET
______ is a string of alphanumeric characters used to authenticate a user and provide access to a system.
Password
Which company is using a narrow market and low cost strategy?
Payless Shoes
What is any data that could potentially identify a specific individual?
Personally identifiable information
What reroutes requests for legitimate websites to false websites?
Pharming
What is a technique to gain personal information for the purpose of identity theft, usually by means of fraudulent emails that look as though they came from legitimate businesses?
Phishing
______ security is tangible protection such as alarms, guards, fireproof doors, fences, and vaults.
Physical
What is tangible protection such as alarms, guards, fireproof doors, fences, and vaults?
Physical security
What deals with the physical storage of data on a storage device?
Physical view of data
What is the unauthorized use, duplication, distribution, or sale of copyrighted software?
Pirated software
What analyzes the competitive forces within the environment in which a company operates to assess the potential for profitability in an industry?
Porter's Five Forces Model
What are generic business strategies that are neither organization nor industry specific and can be applied to any business, product, or service?
Porter's three generic strategies
Plan Source Make Deliver Return
Prepare to manage all resources required to meet demand ----- Build relationships with suppliers to procure raw materials ----- Manufacture products and create production schedules ----- Plan for transportation of goods to customers ----- Support customers and product returns
If buyer power is high, customers can force a company and its competitors to compete on ______, which typically drives prices down.
Price
What is a field that uniquely identifies a given record in a table?
Primary key
What acquires raw materials to manufacture, deliver, market, sell, and provide after-sales services?
Primary value activities
_______ is the right to be left alone when you want to be, to have control over your personal possessions, and not to be observed without your consent.
Privacy
What occurs when a company develops unique differences in its products or services with the intent to influence demand?
Product differentiation
What is a way to validate transactions and achieve a distributed consensus?
Proof-of-stake
What is a requirement to define an expensive computer calculation, also called mining, that needs to be performed in order to create a new group of trustless transactions (blocks) on the distributed ledger or blockchain?
Proof-of-work
What uses two keys: a public key that everyone can have and a private key for only the recipient?
Public key encryption
Which tool helps users graphically design the answer to a question against a database?
Query-by-example
What is a form of malicious software that infects your computer and asks for money?
Ransomware
What are the three components of the RFM formula?
Recency, frequency, and monetary value
Select the three accurate statements reflecting the business advantages of a relational database.
Reduced data redundancy Increased data integrity Increased data security
What occurs when a task or activity is unnecessarily repeated?
Redundancy
______ integrity constraints are rules that enforce basic and fundamental information-based constraints.
Relational
Which system allows users to create, read, update, and delete data in a relational database?
Relational database management system
Which of the following are rules that enforce basic and fundamental information-based constraints, such as not creating an order for a nonexistent customer?
Relational integrity constraints
Which of the following are part of the five basic supply chain activities? (Select five)
Return Make Deliver Source Plan
What indicates the earning power of a project?
Return on investment
Financial performance Damaged reputation Revenue Other expenses
Revenue recognition, cash flow, credit rating, stock price ----- Customers, suppliers, banks, business partners ----- Lost future revenue, billing losses, investment losses, lost productivity ----- Temporary employees, equipment rentals, overtime costs, travel expenses, legal obligations
What is high when competition is fierce in a market and low when competitors are more complacent?
Rivalry among existing competitors
What is the use of software with artificial intelligence and machine learning capabilities to handle high-volume, repeatable tasks that previously required a human to perform?
Robotic process automation
What is the management of information flows between and among activities in a supply chain to maximize total supply chain effectiveness and corporate profitability?
SCM
A data ______ is an organized collection of data.
SET
What is unsolicited email?
SPAM
Select the four common tools managers use to analyze competitive intelligence and develop competitive advantages.
SWOT Analysis Value Chain Analysis The Three Generic Strategies The Five Forces Model
______ analytics involves gathering, classifying, comparing, and studying company sales data to analyze product cycles, sales pipelines, and competitive intelligence.
Sales
What involves gathering, classifying, comparing, and studying company sales data to analyze product cycles, sales pipelines, and competitive intelligence?
Sales analytics
Transactional data Analytical data
Sales receipt, Airline ticket, Packing slip ----- Sales projections, Product statistics, Future growth and trends
What is designed to trick victims into giving up personal information to purchase or download useless and potentially dangerous software?
Scareware
What information is transmitted with encryption and when disclosed, results in a breach of an individual's privacy and can potentially cause the individual harm?
Sensitive PII
Select the factors used to assess buyer power.
Sensitivity to price Number of customers Size of orders Differences between competitors Availability of substitute products
What is a device about the size of a credit card, containing embedded technologies that can store information and small amounts of software to perform some limited processing?
Smart card
Select three categories of authentication and authorization.
Something the user has, such as a smart card or token. Something that is part of the user, such as a fingerprint or voice signature. Something the user knows, such as a user ID and password.
What identifies the primary location where data is collected?
Source data
______ phishing is a phishing expedition in which the emails are carefully designed to target a particular person or organization.
Spear
What is a special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission?
Spyware
What are dynamic, nonroutine, long-term business processes such as financial planning, expansion strategies, and stakeholder interactions?
Strategic business processes
______ improves business process efficiencies by simplifying or eliminating unnecessary steps.
Streamlining
What is the tool that consists of lines of code (in contrast to a graphical design) for answering questions against a database?
Structured query language
Select the pressures that Michael Porter identified as potential profitability of a company.
Substitute products can steal customers. Influential suppliers can drive down profits by charging higher prices for supplies. New market entrants can steal potential investment capital. Knowledgeable customers can force down prices by pitting rivals against each other Competition can steal customers
What is the suppliers' ability to influence the prices they charge for supplies (including materials, labor, and services)?
Supplier power
___________ chain management is the management of information flows between and among activities in a supply chain to maximize total supply chain effectiveness and corporate profitability.
Supply
What consists of all parties involved, directly or indirectly, in obtaining raw materials or a product?
Supply chain
What includes firm infrastructure, human resource management, technology development, and procurement?
Support value activities
What are costs that make customers reluctant to switch to another product or service?
Switching costs
______ is an act or object that poses a danger to assets.
THREAT
True or false: Infographics (information graphics) present the results of data analysis, displaying the patterns, relationships, and trends in a graphical format.
TRUE
Select two competitive advantage decisions a company can make after completing a value chain analysis.
Target low value-adding activities to increase their value Target high value-adding activities to further enhance their value
Select the support value activities.
Technology development Firm infrastructure Human resource management Procurement
______ is an antispamming approach where the receiving computer launches a return attack against the spammer, sending email messages back to the computer that originated the suspected spam.
Teergrubing
throughput transaction speed system availability information accuracy response time
The amount of information that can travel through a system at any point in time. ----- The amount of time a system takes to perform a transaction. ----- The number of hours a system is available for users. ----- The extent to which a system generates the correct results when executing the same transaction numerous times. ----- The time it takes to respond to user interactions such as a mouse click.
Information secrecy Information management Information property Information compliance Information governance
The category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity. ----- Examines the organizational resource of information and regulates its definitions, uses, value, and distribution, ensuring that it has the types of data/information required to function and grow effectively. ----- An ethical issue that focuses on who owns information about individuals and how information can be sold and exchanged. ----- The act of conforming, acquiescing, or yielding information. ----- A method or system of government for information management or control.
Select the factors not associated with the appraisal of supplier power in an industry.
The color of the product sold The size of the product sold
usability customer satisfaction conversion rates financial
The ease with which people perform transactions and/or find information. ----- Measured by satisfaction surveys, percentage of existing customers retained, and increases in revenue dollars per customer. ----- The number of customers an organization "touches" for the first time and persuades to purchase its products or services. ----- Such as return on investment (the earning power of an organization's assets), cost benefit analysis (the comparison of projected revenues and costs including development, maintenance, fixed, and variable), and break even analysis (the point at which constant revenues equal ongoing costs).
Internal rate of return (IRR) Return on investment (ROI) Payback method Break-even analysis
The rate at which the net present value of an investment equals zero. ----- Indicates the earning power of a project and is measured by dividing the benefits of a project by the investment. ----- Number of years to recoup the cost of an initiative based on projected annual net cash flow. ----- Determines the volume of business required to make a profit at the current prices charged for the products or services
What is high when it is easy for new competitors to enter a market and low when there are significant entry barriers to joining a market?
Threat of new entrants
What characteristic is high when there are many alternatives to a product or service and low when there are few alternatives from which to choose?
Threat of substitute products or services
Select the two characteristics that are high when there are many alternatives to a product or service and low when there are few alternatives from which to choose.
Threat of substitute services Threat of substitute products
What are the strategies for entering a new market including broad cost leadership, broad differentiation, and focused strategy?
Three generic business strategies
Which company is using a narrow market and high cost strategy?
Tiffany & Co.
______ process models show the results of applying change improvement opportunities to the current process model.
To-Be
What are small electronic devices that change user passwords automatically?
Tokens
______ data encompasses all raw facts contained within a single process and its purpose is to support daily operational tasks.
Transactional
Business-critical integrity constraints tend to mirror the very rules by which an organization achieves success.
True
True or false: Competitive advantages are typically temporary.
True
True or false: Continuously measuring MIS projects against benchmarks provides feedback so managers can control the system.
True
True or false: The chief data officer (CDO) is responsible for determining the types of information the enterprise will capture, retain, analyze, and share.
True
______ (one word) is a problem that occurs when someone registers purposely misspelled variations of well-known domain names.
Typosquatting
Select two accurate statements relating to an ethical computer use policy.
Users need to consent to following the rules Users need to be informed of the rules
What views a firm as a series of business processes that each add value to the product or service?
Value chain analysis
Why does a database offer increased information security?
Various security features of databases ensure that individuals have only certain types of access to certain types of information.
Which company is using a broad market and low cost strategy?
Walmart
What is the theft of a website's name that occurs when someone, posing as a site's administrator, changes the ownership of the domain name assigned to the website to another website owner?
Website name stealing
Reporting Predicting Analyzing
What are the current inventory levels? ----- Which products will the customers buy? ----- Why was revenue so high?
What is a crowdsourcing initiative that rewards individuals for discovering and reporting software bugs?
What is a crowdsourcing initiative that rewards individuals for discovering and reporting software bugs?
Reporting Predicting Analyzing
What is the total revenue by customer? Asking what happened ----- Which customers are at risk of leaving? Asking what will happen ------ Why was production so low? Asking why it happened
Select the statement below that accurately reflects a database.
While a database has only one physical view, it can easily support multiple logical views that provides for flexibility.
White-hat hacker Script kiddies Cyberterrorist Cracker
Work at the request of the system owners to find system vulnerabilities and plug the holes. ----- Find hacking code on the Internet and click-and-point their way into systems to cause damage or spread viruses. ----- Seek to cause harm to people or to destroy critical systems or information and use the Internet as a weapon of mass destruction. ----- Have criminal intent when hacking.
______ includes the tasks, activities, and responsibilities required to execute each step in a business process.
Workflow
What monitors processes to ensure tasks, activities, and responsibilities are executed as specified?
Workflow control systems
______ MIS monitoring tracks people's activities by such measures as number of keystrokes, error rate, and number of transactions processed.
Workplace
What tracks people's activities by such measures as number of keystrokes, error rate, and number of transactions processed?
Workplace MIS monitoring
What is a program that secretly takes over another computer for the purpose of launching attacks on other computers?
ZOMBIE
A competitive ___ is a feature of a product or service on which customers place a greater value than they do on similar offerings from competitors.
advantage
Data ______ is the collection of data from various sources for the purpose of data processing.
aggregation
The ___________ scorecard is a management system, as well as a measurement system, that a firm uses to translate business strategies into executable tasks.
balanced
Network ______ analysis gathers an organization's computer network traffic patterns to identify unusual or suspicious operations.
behavior
What is a type of digital currency in which a record of transactions is maintained and new units of currency are generated by the computational solution of mathematical problems and which operates independently of a central bank?
bitcoin
A blockchain is formed by linking ______, data structures containing a hash, previous hash, and data.
blocks
What is a type of malware that causes a collection of connected devices to be controlled by a hacker?
botnets
The problem of being data rich and information poor results from an inability to turn business data into
business intelligence
What is a leadership plan that achieves a specific set of goals or objectives?
business strategy
A supply ________ consists of all parties involved, directly or indirectly, in obtaining raw materials or a product.
chain
A value _____ analysis views a firm as a series of business processes that each add value to the product or service.
chain
Who determines if a person or business process can be replaced by a robot or software?
chief automation officer
The ________ Online Protection Act was passed to protect minors from accessing inappropriate material on the Internet.
child
BI can help managers with Blank______ monitoring where a company keeps tabs of its competitor's activities on the web using software that automatically tracks all competitor website activities such as discounts and new products.
competitive
Integrity ______ are rules that help ensure the quality of data.
constraits
Workflow ______ systems monitors processes to ensure tasks, activities, and responsibilities are executed as specified.
control
In business, supplier power is the ability suppliers have to ______
control the prices they charge customers.
What is the legal protection afforded an expression of an idea, such as a song, book, or video game?
copyright
What are business processes, such as manufacturing goods, selling products, and providing service, that make up the primary activities in a value chain?
core processes
______ are malicious attempts to access or damage a computer system.
cyberattacks
Business intelligence ______ track corporate metrics such as critical success factors and key performance indicators and include advanced capabilities such as interactive controls allowing users to manipulate data for analysis.
dashboards
What is the smallest or basic unit of data?
data element
What is an organized collection of data?
data set
What is an approach to business governance that values decisions that can be backed up with verifiable data?
data-driven decision management
A(n) ________ maintains data about various types of objects (inventory), events (transactions), people (employees), and places (warehouses).
database
What creates, reads, updates, and deletes data in a database while controlling access and security?
database management system
To ______ information is to decode it and is the opposite of encrypt.
decrypt
A data _____ compiles all of the metadata about the data elements in the data model.
dictionary
Product _____ occurs when a company develops unique differences in its products or services with the intent to influence demand.
differentiation
What is a data file that identifies individuals or organizations online and is comparable to a digital signature?
digital certificate
What is erroneous or flawed data?
dirty data
Proof-of-stake is a way to validate transactions and achieve a ______ consensus.
distributed
______ refers to a period of time when a system is unavailable.
downtime
Through social ______, hackers use their social skills to trick people into revealing access credentials or other valuable information.
engineering
A feature of a product or service that customers have come to expect and entering competitors must also offer is a(n)
entry barrier
A feature of a product or service that customers have come to expect and entering competitors must also offer is a(n) _____
entry barrier
A(n) ______ computer use policy contains general principles to guide computer user behavior.
ethical
An _______ hacker is a person who hacks into a computer system to find vulnerabilities to help a company test its security.
ethical
Phishing ______ is a masquerading attack that combines spam with spoofing.
expedition
Select the components in a SWOT analysis. (Select all that apply)
external threats internal weaknesses external opportunities internal strengths
True or false: There does not exist a relationship between KPI's and CSFs.
false
Content _____ occurs when organizations use software that filters content, such as emails, to prevent the accidental or malicious transmission of unauthorized information.
filtering
Broad strategies reach a large market segment, whereas _____ stategies target a niche or unique market.
focused
Broad strategies reach a large market segment, whereas ______ strategies target a niche or unique market.
focused
Customer-facing processes which includes fulfilling orders, communicating with customers, and sending out bills and marketing information, are also called ______-_______ processes.
front office
A data ______ analysis occurs when a company examines its data to determine if it can meet business expectations, while identifying possible data gaps or where missing data might exist.
gap
BPMN _____ is used to control the flow of a process.
gateway
Data ___________ refers to the overall management of the availability, usability, integrity, and security of company data.
governance
If buyer power is ______, customers can force a company and its competitors to compete on price, which typically drives prices down.
high
Rivalry among existing competitors is _____ when competition is fierce in a market and ______ when competitors are more complacent.
high; low
The threat of new entrants is ______ when it is easy for new competitors to enter a market and ______ when there are significant entry barriers to joining a market.
high; low
Data ___________ occurs when the same data element has different values.
inconsistency
Porter's Five Forces Model analyzes the competitive forces within the environment in which a company operates to assess the potential for profitability in a(n) _____
industry
Information _________ is a measure of the quality of information.
integrity
Competitive __________ is the process of gathering information about the competitive environment, including competitors' plans, activities, and products, to improve a company's ability to succeed.
intelligence
Return on _________ indicates the earning power of a project.
investment
The person responsible for collecting, maintaining, and distributing company knowledge is the chief __________ officer.
knowledge
A(n) ______ records classified and summarized transactional data.
ledger
______ view of information focuses on how individual users logically access information to meet their own particular business needs.
logical
Scareware is a type of _____ designed to trick victims into giving up personal information to purchase or download useless and potentially dangerous software.
malware
A data _______ is a technique for establishing a match, or balance, between the source data and the target data warehouse.
map
What is the practice of gathering data and ensuring that it is uniform, accurate, consistent, and complete, including such entities as customers, suppliers, products, sales, employees, and other critical entities that are commonly integrated across organizational system?
master data management
authentication requires more than two means of authentication such as what the user knows (password), what the user has (security token), and what the user is (biometric verification).
multifactor
A contractual stipulation which ensures that ebusiness participants do not deny their online actions is called a ______ clause.
nonrepudiation
Select all the factors used to appraise supplier power in an industry.
number of suppliers uniqueness of supplier services availability of substitute products
One primary goal of a database is to eliminate data redundancy by recording each piece of data in _____ place(s) in the database.
only one
What makes analytics part of a business process?
operationalized analytics
What is an exclusive right to make, use, and sell an invention and is granted by a government to the inventor?
patent
Select the three roles the chief intellectual property officer manages and defends.
patents intellectual property copyright
Organizations address security risks through two lines of defense; the first is ______ and the second is ______.
people, technology
The ______ view of data deals with the physical storage of data on a storage device.
physical
______ software is the unauthorized use, duplication, distribution, or sale of copyrighted software.
pirated
Best ______ are the most successful solutions or problem solving methods that have been developed by a specific organization or industry.
practices
CRM ______ technologies help organizations predict customer behavior, such as which customers are at risk of leaving.
predicting
A(n) ______ key is a field (or group of fields) that uniquely identifies a given record in a table.
primary
The person responsible for ensuring the ethical and legal use of information within a company is the chief ______ officer.
privacy
______ escalation is a network intrusion attack that takes advantage of programming errors or design flaws to grant the attacker elevated access to the network and its associated data and applications.
privilege
A(n ______ is a temporary activity a company undertakes to create a unique product, service, or result.
project
Intellectual ______ is intangible creative work that is embodied in physical form and includes copyrights, trademarks, and patents.
property
______ -by-example tool helps users graphically design the answer to a question against a database.
query
What is data that has not been processed for use?
raw data
What means immediate, up-to-date data?
real-time data
A(n) ________ is a collection of related data elements.
record
What is a collection of related data elements?
record
Data ______ is the duplication of data, or the storage of the same data in multiple places.
redundancy
Business process ______ is the analysis and redesign of workflow within and between enterprises.
reengineering
______ database management system allows users to create, read, update, and delete data in a relational database.
relational
______ database model stores data in the form of logically related two-dimensional tables.
relational
CRM ______ technologies help organizations identify their customers across other applications.
reporting
Information ________ is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization.
security
The person responsible for ensuring the security of business systems and developing strategies and safeguards against attacks by hackers and viruses is the chief _________ officer.
security
-factor authentication requires only a username and password.
single
The number of customers and their sensitivity to price and Blank______ of orders are factors used to assess buyer power.
size
MIS ________ gap is the difference between existing MIS workplace knowledge and the knowledge required to fulfill the business goals and strategies.
skills
What is the process of monitoring and responding to what is being said about a company, individual, product, or brand?
social media monitoring
The most common example of unintentional information reuse is the ______.
social security number
Companies can reduce buyer power with loyalty programs, which reward customers based on their _______.
spendings
A(n) ___________ is a person or group that has an interest or concern in an organization.
stakeholder
A(n) ____ process uses a systematic approach in an attempt to improve business effectiveness and efficiency continuously.
static
A data _______ is responsible for ensuring the policies and procedures are implemented across the organization and acts as a liaison between the MIS department and the business.
steward
Data __________ is the management and oversight of an organization's data assets to help provide business users with high-quality data that is easily accessible in a consistent manner.
stewardship
A(n) __________ query language asks users to write lines of code to answer questions against a database.
structured
A(n) _____ chain consists of all parties involved, directly or indirectly, in obtaining raw materials or a product.
supply
______ officer will oversee the corporation's "environmental" programs, such as helping adapt to climate change and reducing carbon emissions.
sustainability
Real-time __________ provide real-time information in response to requests.
systems
The person responsible for ensuring the speed, accuracy, availability, and reliability of the MIS is the Chief _______ Officer.
technology
Porter's Blank______ strategies are generic business strategies that are neither organization nor industry specific and can be applied to any business, product, or service.
three generic
Digital ______ is the measure of consumer, partner, and employee confidence in an organization's ability to protect and secure data and the privacy of individuals.
trust
Chief ______ experience officer will create the optimal relationship between user and technology.
user
Data _______ includes the tests and evaluations used to determine compliance with data governance polices to ensure correctness of data.
validation
What occurs when attackers grant themselves a higher access level such as administrator, allowing the attacker to perform illegal actions such as running unauthorized code or deleting data?
vertical privilege escalation
What is a phone scam that attempts to defraud people by asking them to call a bogus telephone number to "confirm" their account information?
vishing
Data ______ describes technologies that allow users to "see" or visualize data to transform information into a business perspective.
visualization
Data ______ tools move beyond Excel graphs and charts into sophisticated analysis techniques such as pie charts, controls, instruments, maps, time-series graphs, and more.
visualization
What is another name for a bug bounty program?
vulnerability rewards program
A data ______ is a logical collection of data, gathered from many different operational databases, that supports business analysis activities and decision-making tasks.
warehouse
What spreads itself not only from file to file but also from computer to computer?
worm