PLS 21 Exam #2
What kinds of risks come with bluetooth-equipped devices?
-Bluejacking is when anonymous text messages are sent to mobile phones -Bluespamming is when a phone's contacts are secretly sent text messages -Bluesnarfing is when hackers gain access to a mobile phone's contacts -Bluebugging is when hackers have access to a handset's commands
How to secure your wireless network?
-Change the device password to something unique -Turn SSID off -Enable encryption such as WPA
What are some reasons for studying file systems?
-Complexity of database design is easier to understand -Understanding file system problems helps to avoid problems with DBMS systems -Knowledge of file system is useful for converting file system to a database system
Which is an advantage and role of a Database Management System?
-DBMS is the intermediary between the user and the database (Database structure stored as file collection) (Can only access files through the DBMS) -DBMS enables data to be shared -DBMS integrates many users' views of the data
what is the difference between of the data and information?
-Data are raw facts -Information is the result of processing raw data to reveal the meaning -Information requires context to reveal the meaning -Raw data must be formatted for storage, processing, and presentation -Data are the foundation of information, which is the bedrock of knowledge
If you think your computer has been infected, what are the recommended after action steps?
-Disconnect your computer from the Internet. -Make sure your anti-virus signatures are up-to-date. If possible, don't download updates using the computer you think is compromised, but use another computer (e.g. a friend's computer). This is important: if your computer is infected and you connect to the Internet, a malicious program may send important information to a remote hacker, or send itself to people whose e-mail addresses are stored on your computer. .
What are basic threat securities?
-Download known content from trusted sites -Only open email attachments from trusted sources -Set your browser to discard passwords immediately
Which of the following are problems with Non-ERP systems?
-In-house design limits connectivity outside the company -Tendency toward separate IS's within a firm lack of integration limits communication within the company -Strategic decision-making not supported -Long-term maintenance costs high -Limits ability to engage in process reengineering
What is a disadvantage of managing a database system?
-Increased costs -Management complexity -Maintaining currency -Vendor dependence -Frequent upgrade/replacement cycles
Which statement about malware is correct?
-Malicious Software -consists of programming (code, scripts, active content, and other software) -designed to disrupt or deny operation, gather the information that leads to loss of privacy or exploitation, gain unauthorized access to system resources, and other abusive behavior. -general term used by computer professionals to mean a variety of forms of hostile, intrusive, or annoying software or program code.
Databases can be classified according to which of the following?
-Number of users -Database location(s) -Expected type and extent of use
Which of the following is a basic element of a computer program?
-Variables & Assignments -Arithmetic -Logic (if-statement)
What are symptoms of an infection?
-Your computer behaves strangely, i.e. in a way that you haven't seen before. -You see unexpected messages or images. -You hear unexpected sounds, played at random. -Programs start unexpectedly. -Your personal firewall tells you that an application has tried to connect to the Internet (and it's not a program that you ran). -Your friends tell you that they have received e-mail messages from your address and you haven't sent them anything. -Your computer 'freezes' frequently, or programs start running slowly. -You get lots of system error messages. -The operating system will not load when you start your computer. -You notice that files or folders have been deleted or changed. -You notice hard disk access (shown by one of the small flashing lights)
Which of the following is true regarding worms?
-also self-replicating -does not need to attach itself to another program; -can transmit itself across networks harm can come in two ways: destroyed files (like viruses) - consumption of bandwidth of the network as part of the repeated transmissions "DoS" attack = "denial-of-service" attack - network ports are so consumed with the data transmission of the worm that no-one can get any work done
What is true about computer virus?
-it is always attached (or inserted) into some other (non-malware) software -may or may not take some other bad action on the computer (e.g. file erasure, file corruption,etc) without knowledge or permission of computer owner -many times the user notices no symptoms -when damage occurs: destroyed files or folders
What is the correct order of the programming work-flow?
1. Write code in an editor program 2. Compile the code, which produces an executable file 3. Run the program (executable file)
Metcalfe's Law: A growth from 3 to 6 users would show a ___ fold increase
4
Almost _________ percent of ransomware victims pay the ransom and hackers _________ decrypt the data as promised.
50; do
The 80/20 rule means that if the software meets _________ percent of the company's needs, then the company should modify _________ percent of its business processes to use the software.
80 ; 20
What is a worm?
A worm is a computer program that replicates, but does not infect other files. Instead, it installs itself once on a computer and then looks for a way to spread to other computers.
_________ refers to determining who is responsible for actions that were taken.
Accountability
What is needed to make a good decision?
Accurate, relevant, timely information is the key to good decision making
What is a well-defined, ordered set of steps for defining a problem?
Algorithms
_________ did not file comments with the FCC opposing Marriott's Wi-Fi blocking plan.
Amazon
a set of rules to be followed in performing some operation or task.
An algorithms
What is syntax?
An entire sequence of instruction
Which is NOT a limitations of file system data management?
Analyst must review and update file systems frequently
which of the following statements is true about animations in powerpoint?
Animations = lot of time unless good PowerPoint skills Animations = problems with mouse during presentation (Murphy's law I) Animations = PC & mouse far from you during presentation (Murphy's law II) Animations = 'show', not 'facts'
Analytical CRM systems provide ________ by analyzing customer behavior and perceptions.
BI
Which of the following is NOT a problem associated with Big Data?
Big Data can be structured, unstructured, or semi-structured.
Which of the following is NOT a risk resulting from the use of Bluetooth in the context on security?
Bluejacking
Which bluetooth threat allows hackers to gain access to a mobile phone's contacts?
Bluesnarfing
Which of these modern settings involve data management?
Business, Research, & Administration
________ is an approach that integrates various automated factory systems.
CIM
________ refers to the maximum number of times an instance of one entity can be associated with an instance in the related entity.
Cardinality
which one of the following translates human-reable code into computer-reable instructions
Code complier
what is a computer code?
Collection of a computer instructions written in a human-reable programming language, usually as plain text.
________________ development is closely linked with the idea of web services and service-oriented architectures.
Component based
What three keys you need to press to apply Array Formula?
Control(Command)+ Shift+ Enter
What is one of the ERP Applications?
Core Applications
Which of the following is NOT a reason Priceline.com moved to a new customer contact center?
Cost
________ is an advantage of cloud-based ERP systems.
Cost
________ is the marketing of additional related products to customers based on a previous purchase.
Cross-selling
What is the short-key for "Save"?
Ctrl+S
What is CRM?
Customer Relationship Management
Which of the following is NOT a product of ERP?
D.J. Edwards
Hackers would use a botnet to perform a _________.
DDoS
A(n) _________ is located between two firewalls.
DMZ
Which is not an example of a security threat?
Danger warning
Ashley Madison's data was first released on the _________ by ________.
Dark Web; The Impact Team
What are the building blocks of information?
Data
Which of the following is NOT an advantage of DBMS?
Data redundancy
Data is managed most efficiently when stored in a...
Database
What does DBMS stand for?
Database management system
What company was unable to adapt to changing technology?
Dell
The _________ approach states that the morality of an action is based on whether the action itself is right or wrong under a series of rules, rather than based on the consequences of that action.
Deontology
The internet is designed to aid with the following
Discovery, Communication, Collaboration
ERP systems that include administrative, sales, marketing, and HR processes are referred to as _________.
ERP II
________ are designed to correct a lack of communication among _________.
ERP; FAIS
_________ feasibility determines whether the project is an acceptable financial risk and, if so, whether the organization has the necessary time and money to successfully complete the project.
Economic
_________ is an approach in which the organization's end users develop their own applications with little or no formal assistance from the IT department.
End-user development
Which one is not the common programming language?
English
What does the acronym ERP stand for?
Enterprise Resource Planning Systems
_________ is the third step in the general framework for ethics.
Evaluate alternative actions
What does XML mean?
Extensible Markup Language
_________ costs are those costs that remain the same regardless of any change in the company's activity level. The CIO's salary is an example of a _________ cost.
Fixed ; fixed
Which of the following is not a setting databases are used?
For Facebook use
Which of the following data is NOT currently collected by usage-based car insurance companies?
GPS
Which of the following is NOT required software in the database system environment?
Hardware
What are the 5 major parts of a database system
Hardware, Software, People, Procedures, Data
What US Government agency is dedicated to cyber security?
Homeland Security
Which of the following is an accuracy issue?
How can we ensure that the information will be processed properly and presented accurately to users?
Which of the following is an accessibility issue?
How much should companies charge for permitting access to information in their databases?
Africa collaborated with ________ to stop the Ebola virus outbreak in 2013 and 2014.
IBM
The _________ consists of a clear set of projects that the IS department and the functional area managers will execute in support of the IT strategic plan.
IS operational plan
________ originally managed Priceline.com's customer management system.
IT
Which of the following is NOT an impact of IT on organizations?
IT can be the solution to anything
Which of the following is not an example of an advantage of a DBMS?
Improve datum's appearance
Which of the following is the problem with NON-ERP Systems?
In-house design limits connectivity outside the company Tendency toward separate IS's within firm lack of integration limits communication within the company Strategic decision-making not supported Long-term maintenance costs high Limits ability to engage in process reengineering
Which of the following are NOT advantages of a DBMS?
Increased money in our lawmakers pockets
CRM leads to all of the following benefits except:
Increases employees salaries.
Which of the following does NOT contribute to the increasing vulnerability of organizational information resources?
Increasing skills necessary to be a computer hacker
Data Management is understood to focus on the proper generation, storage and retrieval of data; therefore, all of the following are significant in this process EXCEPT:
Information and data have no role in data management
Which of the following is an advantage of JAD?
Involves many users in the development process
________ is a legal concept that gives individuals the right to recover the damages done to them by other individuals, organizations, or systems.
Liability
________ is the customer's potential revenue stream over a number of years.
Lifetime value
Which of the following is NOT a desirable attribute of a good presentation slide?
Long and wordy body
________ is the correct evolution of POM planning.
MRP MRP II ERP
What to look for in CRM software
Make sure the primary goal (ie: customer service) is standard in the software. Customization is very expensive. ezinearticles.com Be able to integrate smoothly and flawlessly. ezinearticles.com Make sure the program doesn't offer more then you need. ezinearticles.com Compare with other companies of equivalently the same size who have purchased the same CRM software and examine their results.
________ is part of the ________ process and occurs when the company is trying to increase its inventory.
Make-to-stock; production
Which of the following is one of the six keys to getting the most out of your Connectivity?
Management Systems Timely information accessible across platforms and time i.e. sales reports, inventory, etc... Collaborative Workgroups Stay connected with similar professionals within your organization Connecting cross functional teams Online Reference Access to the information your workers need to empower them to be productive Interactive Communication Get feedback immediately Sign up for a workshop and get email confirmation before the browser tab is closed Training Fast, easy, secure and time-independent way to get new information out to the group...
Which one is NOT an advantaged of a database management system (DBMS)?
Maximized data inconsistency
Can you use internet pictures for professional powerpoint?
No you can not use internet pictures
what are the important aspects of an algorithm?
Non-ambiguity, finite
Which of the following is best suited for PowerPoint Presentations?
Normal pictures
Data marts and data warehouses typically use ________.
OLAP
If you analyze a data cube, this is an example of using
OLAP
Most organizations design TPS to process transactions as soon as they occur. This is called _________.
OLTP
________ CRM systems are hosted by an external vendor in the vendor's data center.
On-demand
What are some ERP products?
Oracle, PeopleSoft, and Baan
What are some risk Associated with ERP Implementation?
Pace of Implementation, Opposition to Changes to the Businesses Culture, Choosing the Wrong ERP, Choosing the Wrong Consultant, High Cost and Cost Overruns, Disruptions to Operations
A _________ conversion involves running the old and new systems at the same time.
Parallel
It refers to the act of attempting to acquire sensitive information
Phishing
Which of the following is not an essential stage of data warehousing process?
Put the data on a external hard drive
_________ is the first step in the general framework for ethics.
Recognize an ethical issue
what is benefit of CRM?
Research has shown that companies that create satisfied, loyal customers have more repeat business, lower customer-acquisition costs and stronger brand value.
The following are safe anti-virus systems except?
Rootkit
What links vendors, carriers, third-party logistics companies, and information systems providers?
SCM
________ is the component of an operational CRM system that automatically records all of the components in a sales transaction process.
SFA
Which one of these is not an example of new photography?
SLR
________ is the most popular query language used for interacting with a database.
SQL
________ is the best-known on-demand CRM vendor.
Salesforce
________ is part of the ________ process and involves sending goods that are in the warehouse to customers.
Sell-from-stock; fulfillment
Which of the following answer is not a right way to minimize the risk of threat?
Set your browser to remember your passwords
Legacy systems were developed as _________.
Silos
Which of the following is not included in the 'Content' of the slide?
Simplicity
Which key features does ERP include?
Smooth and seamless flow of information across organizational boundaries Standardized environment with shared database independent of applications and integrated applications
Which of the following is NOT an example of a threat to computer security?
Spartan
Which of following is not one of 6S PowerPoint Summary?
Specific--make your audience understand you
The following are types of threats to computer and network security except for?
Spider
which following is not one of 6S of PowerPoint?
Sport
Try not to use...
Standard Table option
Which one of the following is not apart of the 6S's of success for powerpoint?
Strength
Considering the following tables, ________ is a primary key.
Student Table: ID
________ is an extended ERP module.
Supply chain management
What is not a basic element of a computer program?
Syntax
_________ are IS professionals who specialize in analyzing and designing information systems.
Systems analysts
A URL that begins with https uses _________.
TLS
________ is the cumulative store of subjective or experiential learning.
Tacit knowledge
What is Metcalfe's Law?
The value of a network grows roughly in line with the square of the number of its users
Which Tier is the application layer on?
Tier 2
Where are some areas with high costs regarding Enterprise Resource Planning Systems?
Training Testing and Integration Database Conversion
Which of the following is NOT the essential stage of data warehousing process?
Transforming data out of the warehouse model
Which threat may appear to perform a desirable function but actually performs undisclosed malicious functions?
Trojan
Threats are a serious deal and comprises our safety. Which of the following are examples of threats?
Trojan, Worms, Malware
Data must be processed in order to produce information
True
How to minimize the risk of most threats?
Use a firewall
John Hancock partnered with ________, a global wellness company.
Vitality
Which one does NOT belong to the 4 rules in access?
We need to double check the color of header.
_________ is the most recent example of ethical misbehavior in organizations.
Wells Fargo bank
What fonts should you use in typical powerpoints?
What fonts should you use in typical powerpoints?
Which of the following is a privacy issue?
What information about individuals should be kept in databases, and how secure is the information there?
What background color is best for most presentations?
White
You get a new smartphone and throw your old one away without erasing all your data. This is _________ and is an _________ mistake.
a human error; unintentional
Which of the following was NOT used in the cyberattack on Ukraine?
a logic bomb
What is an algorithm?
a set of rules to be followed in performing some operation or task.
You can check your credit report annually for free through TransUnion, Equifax, and Experian. This allows you to catch signs of identity theft early and note any problems in your credit reports. This is an example of an ethical issue that falls into the category of ________.
accuracy
The end product of the _________ stage is a set of system requirements.
analysis
which one of the following should we avoid to use if possible when making powerpoint?
animations
Auditing _________ the computer means verifying processing by checking for known outputs using specific inputs.
around
Overstock's chatbot, called Mila, _________.
automates the simple but time-consuming process of requesting sick leave
Which of the following is NOT a computer threat?
bacteria
You decide to purchase SAP but modify it to handle your specific business processes. This is an example of the ________ approach to ERP implementation.
best-of-breed
The most current form of ransomware demands payment in the form of _________.
bitcoins
You are an executive working for a Fortune 500 company. You want to see how each factory floor worker is performing compared to every other worker. You would look at the ________ wall in the Management Cockpit.
blue
A ________ is a group of eight ________.
byte; bits
malware consist of what type of programming?
codes, scripts, active content
A _________ site is the least expensive option.
cold
Your southern region is not doing very well. You want to know why, so you ask for a special report showing the numbers for the southern region compared to the northern, eastern, and western regions. This is a(n) ________ report.
comparative
Which of the following is NOT a use for data mining?
comparing products
Which short-key is for Re-do?
control + y
Companies purchase digital dossiers to ________.
create customer intimacy
What is the biggest threat faced by computers?
crimeware
Amazon's recommender system is an example of ________.
cross-selling
_________ refers to malicious acts in which attackers use a target's computer systems to cause physical, real-world harm or severe disruption, often to carry out a political agenda.
cyberterrorism
A transaction is any business event that generates ________ worthy of being captured and stored in a database.
data
What is metadata?
data about data
If you want to know what items customers typically buy together so that you can place them next to each other on the shelf, you would be using
data mining
Data reduction is the conversion of raw _______ into a smaller amount of more useful _______.
data; information
All of the following describe the advantages of Database Management Systems except:
decrease in productivity
What is malicious software?
designed to disrupt or deny operation, gather information that leads to loss of privacy or exploitation, gain unauthorized access to system resources, and other abusive behavior.
GIS is a computer-based system for capturing, integrating, manipulating, and displaying data using
digitized maps
A _________ conversion involves shutting the old system off and turning the new system on at a certain point in time.
direct
You use FedEx and UPS to ship your products to customers. This is an example of a(n) ________ activity.
downstream
You are looking at a sales report from last month. You notice one salesperson's numbers are much lower than the rest, so you click on that person's name to get more details on the products they sold last month. You are using the _______ feature of a dashboard.
drill down
The European Union's highest court ruled that ________.
embarrassing material should be removed from search results when requested
_________ is an access control.
encryption
_________ occurs when an unauthorized individual attempts to gain illegal access to organizational information.
espionage
Dashboards evolved from
executive information systems.
Suppose you work for XYZ Corporation. You know you can contribute 6% of your salary to a 401K and the company will match that 100% after 6 years of service because it is in the employee handbook. This is an example of ________.
explicit knowledge
Data management focuses on?
focuses on proper generation, storage, and retrieval of data
Operational CRM systems support _________-office business processes or processes that _________.
front; directly interact with customers
What is the name for the physical components of a computer?
hardware
Which type of text may be formatted to print at the top of every page?
header
Answering the question "did this option work as proposed" occurs in the _____ phase of the IDC.
implementation
Which one is the full name of IT?
information technology
All the information about you in your university's database is a(n) ________.
instance
Packing, assembly, or manufacturing are ________ activities.
internal
SCM systems are ________ systems.
interorganizational
Systems _________ addresses the business problem or business opportunity by means of a feasibility study.
investigation
A(n) ________ report summarizes the performance of critical activities.
key indicator
Typing in your password to access a system is an example of something the user _________.
knows
Organizations typically invest in cloud-based ERP systems because they are _________.
less expensive
For an hour long presentation, the presenter should have prepared a powerpoint with
less than 25 slides
The ________ component of SCM is the most metric-intensive part of the supply chain in which organizations measure quality levels, production output, and worker productivity.
make
Message authentication is a service beyond
message integrity
Databases ________ inconsistency; this means ________.
minimize; various copies of the data do not agree
Normalization is a method for analyzing and reducing a relational database to its most streamlined form to ensure ________ redundancy, ________ data integrity, and optimal processing performance.
minimum; maximum
Which one is not a customer support?
money
Data marts can be implemented ________ compared to data warehouses.
more quickly
_____ is NOT a statistical tool used for predictive analytics.
multidimensional analysis
How to start a new file script in Rstudio?
open a new rscript
Above all, you want to implement the cheapest CRM system available. You are willing to accept any risks associated with this, so you would want to implement a(n) ________ CRM system.
open-source
All of the following are types of computer hardware, Except:
operating system
Europeans and privacy advocates prefer the _________ model of informed consent.
opt-in
The _________ model of informed consent permits the company to collect personal information until the customer specifically requests that the data not be collected.
opt-out
A circle with a "chicken leg" to the entity represents the ________ cardinality symbol.
optional many
A _________ conversion introduces components of the new system in stages.
phased
Organizations must have a strategy for managing all the resources that are involved in meeting customer demand for their product or service. This strategy is developed in the ________ component of SCM.
plan
A _______________ is an underlying computer system on which application programs can run.
platform
You would use optimization or simulation for ______ analytics.
prescriptive
______ analytics require _______ analytics.
prescriptive; predictive
The ________ process originates in the warehouse department and ends in the accounting department.
procurement
The _________ represents the business users and any other stakeholders in the project.
product owner
What language allows us to use words instead of numbers?
programming language
Which of these is NOT a major component of hardware?
programs
which of the following is one of the four basic programming concepts?
programs
What is data?
raw facts
What is End-user data?
raw facts of interest to end user
What is the definition of End-user data?
raw facts of interest to end user
Southwest Airlines utilized a(n) ________ CRM system to rearrange a customer's flight schedule to get to her comatose son.
real-time
A ________ generally describes an entity.
record
Database systems minimize ________.
redundancy
What is a lookup value?
requires only one cell
which step is not the true to resize a shape?
resize shape with "red diamond"
_______ is a decisional role.
resource allocator
In the ________ component of SCM, supply chain managers create a responsive and flexible network for receiving defective, returned, or excess products back from their customers, as well as for supporting customers who have problems with delivered products.
return
Jana is a mobile startup designed to ________.
reward users with data in exchange for collecting their personal information when sampling apps
The pursuit of the "American dream" and our ability to choose our religious orientation is a reflection of the _________ approach.
rights
You recently inherited an Alvin and The Chipmunks "A Chipmunk Christmas" record. Since you don't have a record player, you need to find a way to convert the record into a CD. This is an example of data ________.
rot
The fulfillment process originates in the ________ department and ends in the ________ department.
sales; accounting
Which does NOT fit into the category of "types of Businesses & IT presence"
satellite television
Which of the following is consider a hardware?
screen
You are a jeweler who wants to make sure you have the maximum number of diamonds for sale. You notice that the number of diamonds available drops more when the size is relevant versus when the color is relevant. By comparing these factors, you are conducting a(n) _____ analysis.
sensitivity
What is database?
shared, integrated computer structure that stores a collection of: End-user data: raw facts of interest to end user Metadata: data about data Provides description of data characteristics and relationships in data Complements and expands value of data
What are the mandatory elements on all slides?
slide number
Which one of the following do NOT belong to "6S" rule?
soccer
SaaS is a method of delivering _________ in which a vendor hosts the applications and provides them as a service to customers over a network, typically the internet.
software
_________ collects personal information about users without their consent.
spyware
As a purchasing manager, you have to purchase widgets every week to replenish your inventory. This is a(n) ________ decision.
structured
You are an employee in Inside Sales. This means you take calls and address customer issues like entering orders, updating orders, and providing order status reports. This is a(n) _____ task and a(n) _______ decision.
structured; operational control
Capital One's insourcing initiative meant it had to build its reputation as a _________ company.
technology
________ refers to erratic shifts in orders up and down the supply chain.
the bullwhip effect
You want to make sure your entire organization is using a single data warehouse instead of using a data mart for every department. This is an example of
the development of infrastructure to support enterprise-wide analytics
Data marts are typically associated with
the development of one or a few related analytics applications
Management is a process by which an organization achieves its goals (called ______) through the use of resources (called _______).
the output; inputs
A _________ is an intellectual work that is not based on public information.
trade secret
If you shift your risk by using other means to compensate for the loss like purchasing insurance, you have implemented a risk _________ strategy.
transference
The complier is the
translator
Industry experts estimate that 80-90 percent of data in an organization is ________.
unstructured
Knowledge management is a process that helps organizations manipulate important knowledge that comprises part of the organization's memory, usually in a(n) ________ format.
unstructured
If a company doesn't want to write any computer code, it would choose to ________.
use a prewritten application
With the ________ approach to on-premise ERP implementation, a company implements a standard ERP package using the package's built-in configuration options.
vanilla
Containers are another step in the development of _________ technology.
virtual
_________ is a remote attack requiring user action.
virus
A _________ site typically does not include the actual application the company needs to get the business back up and running immediately.
warm
Which kind of threat is self-replicating?
worms