PLS 21 Lecture Exam 2

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

What type of file does the (base) need to upload datasheet in RSTUDIO? .java .jpeg .png .csv

.csv

How many data points are necessary in order to use linear regression in predictive analytics? 10 20 30 as many as you want

30

How many stages of the data warehousing process are there? 1 3 5 7

5

Almost _________ percent of ransomware victims pay the ransom and hackers _________ decrypt the data as promised. 50; do not 95; do 50; do 95; do not

50; do

how many bits in a byte? 32 4 8 16

8

The 80/20 rule means that if the software meets _________ percent of the company's needs, then the company should modify _________ percent of its business processes to use the software. 20; 80 80; 20 80; 80 20; 20

80; 20

What is malware? Choose the best option. A malicious software A malicious software consisting of a program a friendly software A friendly software consisting of a program

A malicious software consisting of a program

_________ did not file comments with the FCC opposing Marriott's Wi-Fi blocking plan. Microsoft Google Amazon Consumer Electronics Association

Amazon

What is ERP? - An integrated approach to identifying, acquiring and maintaining customers. - A relational or multi-dimensional database that may consume hundreds of gigabytes or even terabytes of disk storage - Supports management-critical tasks through analytical investigation of complex data associations captured in data warehouses - client links to the application server which then initiates a second connection to the database server

An integrated approach to identifying, acquiring and maintaining customers

_________ comprises the vast majority of e-commerce by volume. B2C B2B B2E C2B

B2B

Analytical CRM systems provide ________ by analyzing customer behavior and perceptions. CIC ERP SFA BI

BI

What is not as essential stage of data warehousing process? Modeling data for the data warehouse Extracting data from operational databases Cleansing extracted data Backing up data to an offline server.

Backing up data to an offline server.

Which of the following is NOT a problem associated with Big Data? Big Data can be structured, unstructured, or semi-structured. Big Data can come from untrusted sources. Big Data lacks quality. Big Data changes.

Big Data can be structured, unstructured, or semi-structured

The most current form of ransomware demands payment in the form of _________. credit cards Bitcoins Paypal transactions cash

Bitcoins

________ is an approach that integrates various automated factory systems. CIM TPS MRP CRM

CIM

Which of the following statements concerning CRM is not true? - CRM builds sustainable long-term relationships with customers - CRM is designed for companies to interact with their customers as a group. - CRM helps companies acquire new customers. - CRMs help keep repeat customers

CRM is designed for companies to interact with their customers as a group.

Which of the following statements concerning CRM is not true? - CRM is designed for companies to interact with their customers as a group. - CRM builds sustainable long-term relationships with customers - CRMs help keep repeat customers - RM helps companies acquire new customers.

CRM is designed for companies to interact with their customers as a group.

What does batch processing do? - Processes data in batches - Collects data from transactions as they occur and places them into batches - Processes data as it comes - Processes data at the end of the day in batches

Collects data from transactions as they occur and places them into batches

________________ development is closely linked with the idea of web services and service-oriented architectures. Component-based Object-oriented Agile End-user

Component-based

Which of the following is NOT a reason Priceline.com moved to a new customer contact center? Customer growth Contact options Competition Cost

Cost

________ is the marketing of additional related products to customers based on a previous purchase. Bundling Cross-selling Downselling Upselling

Cross-selling

Which is NOT one of the four most common approaches to cost-benefit analysis? Net present value method return on investment Cumulative dollar method business case approach

Cumulative dollar method

What does CRM stand for? Central Relationship Managing Customer Real Management Customer Relationship Management Consumer Relationship Management

Customer Relationship Management

What does CRM stand for? Customer Relationship Management Consumer Relationship Management Consumer Retail Management Customer Retail Management

Customer Relationship Management

What is CRM? Customer Relationship Management Cost Relationship Management Cost Relationship Manner None of these above

Customer Relationship Management

What are the two major components of operational CRM systems ? - Customer-facing applications and customer-touching applications - customer service and support - none of these -products and services

Customer-facing applications and customer-touching applications

_________ refers to malicious acts in which attackers use a target's computer systems to cause physical, real-world harm or severe disruption, often to carry out a political agenda. A SCADA attack Espionage Identity theft Cyberterrorism

Cyberterrorism

Which of the following is NOT a role of DBMS? DBMS is the intermediary between the user and the database DBMS enables data to be shared DBMS integrates many users' views of the data DBMS stores data in private

DBMS stores data in private

Hackers would use a botnet to perform a _________. DDoS a Trojan horse a logic bomb virus

DDoS

A(n) _________ is located between two firewalls. spamware detector DMZ ERP anti-malware system

DMZ

Ashley Madison's data was first released on the _________ by ________. Web; Anonymous Dark Web; Anonymous Dark Web; The Impact Team Web; The Impact Team

Dark Web; The Impact Team

What is metadata? - Data about data; provides description of data characteristics and relationships in data - A system that controls data and access to data - Data kept by an organization regarding its staff - A collection of programs that organizes and sorts data

Data about data; provides description of data characteristics and relationships in data

What is not a core elements of On Line Transaction Processing Business Planning Logistics Data running Shop Floor Control

Data running

Which is NOT a problem of Non-ERP systems? - In-house design limits connectivity outside the company - Strategic decision-making not supported - Data warehouses must be created and maintained separately from the operational databases - Limits ability to engage in process reengineering

Data warehouses must be created and maintained separately from the operational databases

Which firm was the #1 PC vendor in 2000? Acer HP Huawei Dell

Dell

ERP systems that include administrative, sales, marketing, and HR processes are referred to as _________. ERP III ERP IV ERP I ERP II

ERP II

________ are designed to correct a lack of communication among _________. FAIS; TPS FAIS; ERP ERP; FAIS ERP; TPS

ERP; FAIS

_________ is an access control. Encryption A company gate A firewall RFID

Encryption

_________ is an approach in which the organization's end users develop their own applications with little or no formal assistance from the IT department. JAD RAD Agile development End-user development

End-user development

What does ERP stand for? Enterprise reports planing Enterprise resource planning Event-related potential Enterprise rewards planning

Enterprise resource planning

_________ occurs when an unauthorized individual attempts to gain illegal access to organizational information. Alien software Identity theft Espionage Information extortion

Espionage

_________ is the third step in the general framework for ethics. Act and reflect on the outcome of your decision Make a decision and test it Evaluate alternative actions Recognize an ethical issue Get the facts

Evaluate alternative actions

_________ costs are those costs that remain the same regardless of any change in the company's activity level. The CIO's salary is an example of a _________ cost. Variable; variable Variable; fixed Fixed; variable Fixed; fixed

Fixed; fixed

Which of the following data is NOT currently collected by usage-based car insurance companies? Mileage Speed GPS Time of day

GPS

What does GIS stands for? Graphic Interface Source Graphic Information System Geographic Interface Source Geographic Information System

Geographic Information System

Which of the following is an accuracy issue? - What information about oneself should an individual be required to reveal to others? - What information does a person or an organization have a right to obtain, under what conditions, and with what safeguards? - How should we handle illegally copying copyrighted software? - How can we ensure that the information will be processed properly and presented accurately to users?

How can we ensure that the information will be processed properly and presented accurately to users?

Which of the following is an accessibility issue? - How can we ensure that errors in databases, data transmissions, and data processing are accidental and not intentional? - What information about individuals should be kept in databases, and how secure is the information there? - Under what circumstances can one use proprietary databases? - How much should companies charge for permitting access to information in their databases?

How much should companies charge for permitting access to information in their databases?

Africa collaborated with ________ to stop the Ebola virus outbreak in 2013 and 2014. IBM Amazon Google Microsoft

IBM

The _________ consists of a clear set of projects that the IS department and the functional area managers will execute in support of the IT strategic plan. IT architecture organization strategic plan organization mission IS operational plan

IS operational plan

________ originally managed Priceline.com's customer management system. HR Product management IT Marketing

IT

The _________ is a set of long-range goals that describe the IT infrastructure and identify the major IT initiatives needed to achieve the organization's goals. IT strategic plan IT strategic plan IT status poll LR IT

IT strategic plan

How does a computer represent data? In the form of 0's and 1's. Exactly as the the data is written. As a series of numbers ranging from 0-9. In the form of -1's and 0's.

In the form of 0's and 1's.

Which of the following does NOT contribute to the increasing vulnerability of organizational information resources? - International organized crime taking over cybercrime - Smaller, faster, cheaper computers and storage devices - Lack of management support - Increasing skills necessary to be a computer hacker - Today's interconnected, interdependent, wirelessly networked business environment

Increasing skills necessary to be a computer hacker

Audits could provide assurance covering the areas of all of these EXCEPT process integrity application security Infraestructure security implementation integrity

Infraestructure security

Which of the following is an advantage of JAD? Bypasses the IS department and avoids delays Enforces quality by maintaining standards Involves many users in the development process Works wells for ill-defined problems

Involves many users in the development process

Which of the following is NOT an advantage of prototyping? Helps clarify user requirements Promotes close working relationship between systems developers and users Is practical with a very large number of users Helps verify the feasibility of the design

Is practical with a very large number of users

How can Hardware and Software be a basic security method? - By downloading them on your computer - It keeps your computer safe and sound - It contains firewall, limits router settings, antivirus, use group policies, and automatic updates - Makes storage for your files

It contains firewall, limits router settings, antivirus, use group policies, and automatic updates

________ is the customer's potential revenue stream over a number of years. Market capitalization Lifetime value Customer churn Customer life cycle

Lifetime value

What is an application portfolio? List of existing and potential IT applications a bunch of apps in a folder Apps you develop for a company all of the above

List of existing and potential IT applications

________ is the correct evolution of POM planning. ERP MRP MRP II MRP ARP ERP ERP ARP MRP MRP MRP II ERP

MRP MRP II ERP

________ is part of the ________ process and occurs when the company is trying to increase its inventory. Make-to-stock; production Make-to-stock; procurement Make-to-order; production Make-to-order; procurement

Make-to-stock; production

_____ is NOT a statistical tool used for predictive analytics. Data mining Linear regression Logistic regression Multidimensional analysis

Multidimensional analysis

Data marts and data warehouses typically use ________. RFID OLAP OLTP ERP

OLAP

If you analyze a data cube, this is an example of using data mining. DSS. OLAP. OLTP.

OLAP

Most organizations design TPS to process transactions as soon as they occur. This is called _________. OLAP OLTP source data processing batch processing

OLTP

________ CRM systems are hosted by an external vendor in the vendor's data center. On-demand Social On-premise Mobile

On-demand

What does OLAP stand for? Online Analytical Processing Online Access Point Online Assist Port Online Agent Processor

Online Analytical Processing

What does OLAP stand for? Online Learning Application Program Online Linguistic Analytical Processing Online Analytical Program Online Analytical Processing

Online Analytical Processing

What type of implementation introduces components of the new system, such as individual modules, in stages? Pilot conversion direct conversion Phased conversion systems conversion

Phased conversion

What is an underlying computer system on which application programs can run. Google Drive Microsoft word Platform

Platform

What did Moore's law predict - Predicted in 1965 that the processing power of silicon chips would double every 18 months - Predicted in 1965 that the processing power of silicon chips would triple every 18 months - Predicted in 1955 that the power of silicon chips would double every year - Predicted in 1965 that the processing power of silicon chips would double every 3 months

Predicted in 1965 that the processing power of silicon chips would double every 18 months

Which is Moore's law? - Predicted in 1965 that the processing power of silicon chips would double every 18 months - The value of a network grows roughly in line with the square of the number of its users - Geared for economics and business - Is often used for software application services

Predicted in 1965 that the processing power of silicon chips would double every 18 months

Which of the following is true of prescriptive analytics? - The statistical procedures involved in prescriptive analytics include linear and multiple regression. - Prescriptive analytics do not require any prior analytics or analysis. - Prescriptive analytics recommend one or more courses of action and show the likely outcome of each decision. - all of the above

Prescriptive analytics recommend one or more courses of action and show the likely outcome of each decision.

______ analytics require _______ analytics. Descriptive; predictive Descriptive; prescriptive Predictive; prescriptive Prescriptive; predictive

Prescriptive; predictive

Which is an advantage of prototyping? Promotes genuine user participation. System is built too quickly and results in low quality. May encourage inadequate problem analysis May generate confusion about the system.

Promotes genuine user participation.

_____ is a language and environment for statistical computing and graphics R excel IT Microsoft word

R

_______ is a decisional role. Analyzer Leader Liaison Resource allocator

Resource allocator

________ is the component of an operational CRM system that automatically records all of the components in a sales transaction process. CMA CIC SFA JIT

SFA

________ is the most popular query language used for interacting with a database. TPS RFID SQL ETL

SQL

________ is the best-known on-demand CRM vendor. SAP Microsoft Salesforce Oracle

Salesforce

________ is part of the ________ process and involves sending goods that are in the warehouse to customers. Sell-from-stock; fulfillment Configure-to-order; fulfillment Sell-from-stock; procurement Configure-to-order; procurement

Sell-from-stock; fulfillment

What are the 6S'? Software, Structure, Scale, Speed, Schedule, Story Speed, Simplicity, Standard, Scope, Structure, Story Speed, Simplicity, Scope, Schedule, Structure, Story None of the Above

Speed, Simplicity, Scope, Schedule, Structure, Story

_________ collects personal information about users without their consent. Spamware Adware Spyware Marketware

Spyware

Which is not an example of short-range wireless networks? Bluetooth Ultra-wideband Near-field communication Super Wifi

Super Wifi

________ is an extended ERP module. HR management Operations management Financial management Supply chain management

Supply chain management

_________ are IS professionals who specialize in analyzing and designing information systems. Users Technical specialists Systems analysts Programmers

Systems analysts

A URL that begins with https uses _________. TLS ERP VPN DMZ

TLS

What is information literacy? - Technical knowledge and skill in the use of computers and information technology. - The ability to use computers to gather data and/or information. - A series of applications that work together to meet a need, or to increase core productivity. - The applications and programs needed to start, run and perform tasks on your computer.

The ability to use computers to gather data and/or information.

________ refers to erratic shifts in orders up and down the supply chain. The bullwhip effect JIT VMI Vertical integration

The bullwhip effect

which one is not the Advantages of the buy options? - Many different types of off-the-shelf software are available. - The company can try out the software before purchasing it. - The company can save much time by buying rather than building. - The company can refund what it is getting after it fails to invests in the product.

The company can refund what it is getting after it fails to invests in the product.

The term "data rot" refers to: Data that are irrelevant or contain errors. The deterioration of the medium on which the data are stored. Data that no longer serve a purpose. All of these

The deterioration of the medium on which the data are stored.

What does TPS stand for? Transfer Processing System Transaction Processing System Transfer Protocol System none of the above

Transaction Processing System

TPS stands for... Transaction Processing Systems Transaction Progression System Tariff Processing System Transgression Project System

Transaction Processing Systems

Which one is not an essencial stage of the data warehousing? Cleansing extracted data Transforming data into the database model Loading the data into de data warehouse database Modeling data for the data warehouse

Transforming data into the database model

What is the function of a computer programming compiler? Exports completed code sequences Translates computer readable code to human readable code Translates human readable code to computer readable code Imports unreadable code from the cloud

Translates human readable code to computer readable code

John Hancock partnered with ________, a global wellness company. Vitality TotalWellness Weight Watchers Medifit

Vitality

Which of the following typically connects multiple LANs? WAN LAN Router SDN

WAN

_________ is the most recent example of ethical misbehavior in organizations. Enron Wells Fargo bank Tyco WorldCom

Wells Fargo bank

Which of the following is a privacy issue? - What information about individuals should be kept in databases, and how secure is the information there? - Under what circumstances can one use proprietary databases? - How can we ensure that errors in databases, data transmissions, and data processing are accidental and not intentional? - How much should companies charge for permitting access to information in their databases?

What information about individuals should be kept in databases, and how secure is the information there?

Data bases can not be classified according to number of users database location(s) Expected type and extent of use Workgroup and enterprise databases

Workgroup and enterprise databases

Which of these statements about worms is NOT true? Worms are self-replicating Worms are always attached to another non-malware program Worms do not need to be attached to another program Worms can transmit themselves across networks

Worms are always attached to another non-malware program

You get a new smartphone and throw your old one away without erasing all your data. This is _________ and is an _________ mistake. social engineering; unintentional a human error; unintentional social engineering; intentional a human error; intentional

a human error; unintentional

Which of the following was NOT used in the cyberattack on Ukraine? a logic bomb Spear-phishing a SCADA attack DoS

a logic bomb

What is master data? - a process that spans all organizational business processes and applications. - a set of core data, such as customer, product, employee, vendor, geographic location, and so on, that span the enterprise information systems. - an approach to managing information across an entire organization. - a collection of logically related records.

a set of core data, such as customer, product, employee, vendor, geographic location, and so on, that span the enterprise information systems.

Which of the following is not true about business analysis applications? - a.k.a. Online Transaction Processing (OLTP) - decision support tool for management-critical tasks through analytical investigation of complex data associations - includes decision support, modeling, information retrieval, ad-hoc reporting/analysis, and what-if analysis

a.k.a. Online Transaction Processing (OLTP)

Which is not a fundamental tenets of ethics? responsibility accountability accessibility liability

accessibility

_________ refers to determining who is responsible for actions that were taken. Accountability Answerability Liability Responsibility

accountability

You can check your credit report annually for free through TransUnion, Equifax, and Experian. This allows you to catch signs of identity theft early and note any problems in your credit reports. This is an example of an ethical issue that falls into the category of ________. accessibility property privacy accuracy

accuracy

Which of the following is not a type of report? drill-down comparative advanced key-indicator

advanced

What does the OS do? keeps track of what I/O hardware is attached prioritizes I/O activity communicates with the I/O devices via small programs all of the above

all of the above

The end product of the _________ stage is a set of system requirements. operation investigation design analysis

analysis

Auditing _________ the computer means verifying processing by checking for known outputs using specific inputs. around through into with

around

Overstock's chatbot, called Mila, _________. - automates the simple but time-consuming process of requesting sick leave - allows customers to describe what they are looking for instead of just choosing from standard options - provides a list of recommendations and enables customers to have a real-time dialogue with the bot - asks shoppers to input their skin type and then suggests beauty tips and products tailored to their needs

automates the simple but time-consuming process of requesting sick leave

You decide to purchase SAP but modify it to handle your specific business processes. This is an example of the ________ approach to ERP implementation. vanilla best-of-breed as-is custom

best-of-breed

Place the following members of the data hierarchy in the correct order:

bit - byte - field - record - file - database

Which wall in the management cockpit room projects the performance of internal processes and employees? white black blue red

blue

You are an executive working for a Fortune 500 company. You want to see how each factory floor worker is performing compared to every other worker. You would look at the ________ wall in the Management Cockpit. black blue red white

blue

What is the key feature of ERP? - Smooth and seamless flow of information across organizational boundaries - Standardized environment with shared database independent of applications and integrated applications - Help customers to manage their money more efficiently - both A and B

both A and B

Which of the follow is not a type of software attack? virus worm bug spear phishing

bug

Which is NOT one of the six keys in getting the most of your connectivity? management systems online reference business support collaborative workgroups

business support

A ________ is a group of eight ________. file; fields bit; bytes field; files byte; bits

byte; bits

________ refers to the maximum number of times an instance of one entity can be associated with an instance in the related entity. Data dictionary Business rules Modality Cardinality

cardinality

Data that is located at a single site is which type of database? operational database distributed database centralized database data warehouse

centralized database

Which type of these organizations do most of their sales in the physical world but also conduct e-commerce activities? brick-and-mortar virtual clicks-and-mortar e-government

clicks-and-mortar

When customers access a Web site and make purchases, they generate tracking cookies information clickstream data web data

clickstream data

A _________ site is the least expensive option. hot warm medium cold

cold

Your southern region is not doing very well. You want to know why, so you ask for a special report showing the numbers for the southern region compared to the northern, eastern, and western regions. This is a(n) ________ report. exception routine comparative drill-down

comparative

Which of the following is NOT a use for data mining? Comparing products Detecting fraudulent credit card transactions Forecasting bankruptcy Predicting sales

comparing products

The process for justifying IT investment involves assessing costs, assessing benefits and which third step? Align benefits with the organizations strategic plan Complete IT market research conduct cost-benefit analysis Modify IT strategic plan with daily goals

conduct cost-benefit analysis

________ is an advantage of cloud-based ERP systems. Control Cost Recovery Security

cost

Companies purchase digital dossiers to ________. evaluate the competition engage in electronic surveillance track their own reputations create customer intimacy

create customer intimacy

Amazon's recommender system is an example of ________. downselling cross-selling bundling upselling

cross-selling

A transaction is any business event that generates ________ worthy of being captured and stored in a database. wisdom information knowledge data

data

If you want to know what items customers typically buy together so that you can place them next to each other on the shelf, you would be using data mining. DSS. OLAP. OLTP.

data mining

Data reduction is the conversion of raw _______ into a smaller amount of more useful _______. data; information data; knowledge information; data information; knowledge

data; information

The _________ approach states that the morality of an action is based on whether the action itself is right or wrong under a series of rules, rather than based on the consequences of that action. common good fairness rights deontology utilitarian

deontology

____ are the first step in data reduction and summarizes what has happened in the past descriptive analytics predictive analytics prescriptive analytics structured decisions

descriptive analytics

GIS is a computer-based system for capturing, integrating, manipulating, and displaying data using analytics. dashboards. digitized maps. solar energy.

digitized maps

A _________ conversion involves shutting the old system off and turning the new system on at a certain point in time. pilot phased parallel direct

direct

You use FedEx and UPS to ship your products to customers. This is an example of a(n) ________ activity. upstream downstream irrelevant internal

downstream

You are looking at a sales report from last month. You notice one salesperson's numbers are much lower than the rest, so you click on that person's name to get more details on the products they sold last month. You are using the _______ feature of a dashboard. CSF drill down exception reporting trend analysis

drill down

What allows the user to see data in selective increasing levels of detail? slicing and dicing consolidation drill-down none of the above

drill-down

_________ feasibility determines whether the project is an acceptable financial risk and, if so, whether the organization has the necessary time and money to successfully complete the project. Behavioral Competitive Economic Technical

economic

The European Union's highest court ruled that ________. - court documents should be taken off the Internet after a certain time period - embarrassing material should be removed from search results when requested - publishers need to remove or alter all articles that are no longer relevant - people must remove revealing photographs from the web when requested

embarrassing material should be removed from search results when requested

What is NOT a key feature of ERP? - Smooth and seamless flow of information across organizational boundaries - standardized environment with shared database independent of applications and integrated applications - supported by multi-module application software that help a company manage the important parts of its business in an integrated fashion. - enables the user to examine data from different viewpoints often performed along a time axis to depict trends and patterns.

enables the user to examine data from different viewpoints often performed along a time axis to depict trends and patterns.

Dashboards evolved from enterprise resource planning systems. executive information systems. functional area information systems. transaction processing systems.

executive information systems.

Suppose you work for XYZ Corporation. You know you can contribute 6% of your salary to a 401K and the company will match that 100% after 6 years of service because it is in the employee handbook. This is an example of ________. tacit information explicit knowledge tacit knowledge explicit information

explicit knowledge

Which is not a segment of the supply chain? upstream internal downstream external

external

Which is NOT a type of computer & network security threat? worms rootkit fireware Phishing

fireware

Operational CRM systems support _________-office business processes or processes that _________. front; do not directly interact with customers back; directly interact with customers back; do not directly interact with customers front; directly interact with customers

front; directly interact with customers

Which of these is NOT one of the three characteristics separate Big Data from traditional data? high-volume high-variety high-visibility high-velocity

high-visibility

Answering the question "did this option work as proposed" occurs in the _____ phase of the IDC. choice design intelligence implementation

implementation

What are advantages of a DBMS? improved data sharing Decreased data security lower data integration Improved market integration

improved data sharing

Which of the following is NOT a common type of database? centralized database distributed database information base data warehouse

information base

Which of the following industries grew at more than double the rate of the economy in the early 2000s? informational technologies agriculture media all of these

informational technologies

All the information about you in your university's database is a(n) ________. database instance entity attribute

instance

What is a 4-bytes size of data type? character double integer float

integer

Packing, assembly, or manufacturing are ________ activities. internal irrelevant downstream upstream

internal

SCM systems are ________ systems. extraorganizational intraorganizational interorganizational extraorganizational

interorganizational

Systems _________ addresses the business problem or business opportunity by means of a feasibility study. operation design analysis investigation

investigation

A(n) ________ report summarizes the performance of critical activities. key indicator ad hoc drill-down comparative

key indicator

Which report summarizes the performance of critical activities? ad hoc (on demand) reports drill-down reports key-indicator reports comparative reports

key-indicator reports

Typing in your password to access a system is an example of something the user _________. is knows has does

knows

Organizations typically invest in cloud-based ERP systems because they are _________. more accessible more secure less expensive less error-prone

less expensive

_________ is a legal concept that gives individuals the right to recover the damages done to them by other individuals, organizations, or systems. Accountability Liability Responsibility Answerability

liability

The ________ component of SCM is the most metric-intensive part of the supply chain in which organizations measure quality levels, production output, and worker productivity. source return plan deliver make

make

Databases ________ inconsistency; this means ________. maximize; various copies of the data do not agree minimize; the same data are stored in multiple locations minimize; various copies of the data do not agree maximize; the same data are stored in multiple locations

minimize; various copies of the data do not agree

Normalization is a method for analyzing and reducing a relational database to its most streamlined form to ensure ________ redundancy, ________ data integrity, and optimal processing performance. minimum; minimum maximum; minimum maximum; maximum minimum; maximum

minimum; maximum

Data marts can be implemented ________ compared to data warehouses. more quickly It depends on the situation. at the same pace less quickly

more quickly

Above all, you want to implement the cheapest CRM system available. You are willing to accept any risks associated with this, so you would want to implement a(n) ________ CRM system. mobile open-source social on-premise

open-source

Europeans and privacy advocates prefer the _________ model of informed consent. sign-out opt-out opt-in sign-up

opt-in

The _________ model of informed consent permits the company to collect personal information until the customer specifically requests that the data not be collected. opt-in sign-out sign-up opt-out

opt-out

A circle with a "chicken leg" to the entity represents the ________ cardinality symbol. mandatory single optional single optional many mandatory many

optional many

A _________ conversion involves running the old and new systems at the same time. pilot direct phased parallel

parallel

A _________ conversion introduces components of the new system in stages. parallel phased direct pilot

phased

Organizations must have a strategy for managing all the resources that are involved in meeting customer demand for their product or service. This strategy is developed in the ________ component of SCM. make return plan deliver source

plan

A _______________ is an underlying computer system on which application programs can run. stage container virtual machine platform

platform

You would use optimization or simulation for ______ analytics. descriptive predictive prescriptive useful

prescriptive

Which of the following is not a characteristic of data warehouses or subject? integrated organized by business dimension or subject nonvolatile processed online as they occur

processed online as they occur

The ________ process originates in the warehouse department and ends in the accounting department. fulfillment production procurement marketing

procurement

The _________ represents the business users and any other stakeholders in the project. scrum master program developer team product owner

product owner

Southwest Airlines utilized a(n) ________ CRM system to rearrange a customer's flight schedule to get to her comatose son. real-time mobile open-source social

real-time

_________ is the first step in the general framework for ethics. Evaluate alternative actions Recognize an ethical issue Get the facts Make a decision and test it Act and reflect on the outcome of your decision

recognize an ethical issue

A ________ generally describes an entity. field byte record file

record

Database systems minimize ________. redundancy security integrity independence

redundancy

In the ________ component of SCM, supply chain managers create a responsive and flexible network for receiving defective, returned, or excess products back from their customers, as well as for supporting customers who have problems with delivered products. deliver plan source return make

return

Jana is a mobile startup designed to ________. - give app developers free access to other apps - charge users less money to use mobile data than they have to pay their telecommunication company - offer free smartphones to people who make less than 20 cents an hour in China - reward users with data in exchange for collecting their personal information when sampling apps

reward users with data in exchange for collecting their personal information when sampling apps

The pursuit of the "American dream" and our ability to choose our religious orientation is a reflection of the _________ approach. common good deontology utilitarian fairness rights

rights

Which of the following is NOT a risk-mitigation strategy? risk acceptance risk warranty risk limitation risk transference

risk warranty

You recently inherited an Alvin and The Chipmunks "A Chipmunk Christmas" record. Since you don't have a record player, you need to find a way to convert the record into a CD. This is an example of data ________. clickstreaming rot scattering degradation

rot

Customer relationship management (CRM), as an application that must be included in a true enterprise resource planning (ERP) product, includes ________. HR management capacity planning Cash management sales prospecting

sales prospecting

The fulfillment process originates in the ________ department and ends in the ________ department. accounting; sales warehouse; warehouse sales; accounting warehouse; accounting

sales; accounting

You are a jeweler who wants to make sure you have the maximum number of diamonds for sale. You notice that the number of diamonds available drops more when the size is relevant versus when the color is relevant. By comparing these factors, you are conducting a(n) _____ analysis. affinity goal-seeking sensitivity what-if

sensitivity

Legacy systems were developed as _________. DSS Integrating systems Silos ERP

silos

SaaS is a method of delivering _________ in which a vendor hosts the applications and provides them as a service to customers over a network, typically the internet. hardware a platform an architecture software

software

Which is not a characteristic of Big Data? variety structure volume velocity

structure

As a purchasing manager, you have to purchase widgets every week to replenish your inventory. This is a(n) ________ decision. midstructured semistructured structured unstructured

structured

You are an employee in Inside Sales. This means you take calls and address customer issues like entering orders, updating orders, and providing order status reports. This is a(n) _____ task and a(n) _______ decision. structured; management control structured; operational control unstructured; management control unstructured; operational control

structured; operational control

Out of the 6s in Powerpoint which one is false? speed story schedule successful

successful

________ is the cumulative store of subjective or experiential learning. Explicit knowledge Explicit information Tacit information Tacit knowledge

tacit knowledge

Capital One's insourcing initiative meant it had to build its reputation as a _________ company. marketing technology banking human resources

technology

Which of these is not a step in the decision making process? intelligence design choice testing

testing

You want to make sure your entire organization is using a single data warehouse instead of using a data mart for every department. This is an example of - the development of infrastructure to support enterprise-wide analytics. - the development of one or a few related analytics applications. - support for maintaining organizational strategy. - support for organizational transformation.

the development of infrastructure to support enterprise-wide analytics.

Data marts are typically associated with - the development of infrastructure to support enterprise-wide analytics. - the development of one or a few related analytics applications. - support for maintaining organizational strategy. - support for organizational transformation.

the development of one or a few related analytics applications.

Management is a process by which an organization achieves its goals (called ______) through the use of resources (called _______). the input; inputs the input; outputs the output; inputs the output; outputs

the output; inputs

Information is: raw facts data provided by database analysis the result of processing raw data building blocks of data

the result of processing raw data

A _________ is an intellectual work that is not based on public information. copyright trade secret patent trademark

trade secret

If you shift your risk by using other means to compensate for the loss like purchasing insurance, you have implemented a risk _________ strategy. acceptance avoidance transference limitation

transference

Industry experts estimate that 80-90 percent of data in an organization is ________. structured part-structured unstructured semi-structured

unstructured

Knowledge management is a process that helps organizations manipulate important knowledge that comprises part of the organization's memory, usually in a(n) ________ format. part-structured semi-structured structured unstructured

unstructured

If a company doesn't want to write any computer code, it would choose to ________. use a prewritten application outsource the application custom-write an entire application customize a prewritten application

use a prewritten application

Which ethical framework provides least harm? utilitarian fairness approach rightd approach common good approach

utilitarian

With the ________ approach to on-premise ERP implementation, a company implements a standard ERP package using the package's built-in configuration options. vanilla best-of-breed as-is custom

vanilla

What is the most important type of object in R? vectors matrices lists functions

vectors

What does VMI stand for? vendor‐managed inventory Very Modern Interaction Vertical Management IT Vex Major IT

vendor‐managed inventory

Containers are another step in the development of _________ technology. cloud computing architecture virtual customized

virtual

_________ is a remote attack requiring user action. A logic bomb A Trojan horse Virus DoS

virus

A _________ site typically does not include the actual application the company needs to get the business back up and running immediately. warm hot cold medium

warm


Kaugnay na mga set ng pag-aaral

Ch 9 Infant Elsevier Evolve Wong's Essentials

View Set

Chapter 42: Caring for Clients with Eye Disorders

View Set

Complementary and Alternative Therapies

View Set

ATI- Pharm Made Easy- Hematology Questions

View Set

Health & Healing Practice Questions

View Set