BA 304 Midterm Exam
Which of the following are common cloud service delivery models? (Check all that apply.)
- Infrastructure as a Service - Software as a Service - Platform as a Service
What are the characteristics of an agile MIS infrastructure? (Check all that apply.)
- accessibility - maintainability - portability - scalability
Which characteristics support an agile MIS infrastructure? (Check all that apply.)
- accessibility - maintainability - portability - usability
Which of the following are common departments found in an organization? (Check all that apply.)
- accounting - operations management - marketing - finance
Which of the following represent the five common characteristics of high-quality data?
- accurate - complete - consistent - timely - unique
Which of the following represent the common ebusiness revenue models? (Check all that apply.)
- advertising fees - instant messaging transactions - subscription fees - transaction fees
Which of the following represent the benefits of ebusiness marketing? (Check all that apply.)
- affiliate program - banner ads - cookies - freemium - viral marketing
Which characteristics support an information MIS infrastructure? (Check all that apply.)
- backup - recovery - disaster recovery - business continuity planning
Select four types of advanced data analytics.
- behaviour analysis - social media analysis - text analysis - web analysis
What are the two problems with having so much data available for data-driven decision making?
- being data rich - being information poor
Which of the following are considered information? (Check all that apply.)
- best customer by month - best-selling item by month
Which of the following are types of hackers? (Check all that apply.)
- black-hat - script kiddies - cracker
Which of the following are the common forms of business-to-consumer ebusiness models? (Check all that apply.)
- brick-and-mortar - click-and-mortar - pure-play (virtual)
Which of the following are the three mobile device management policies a company can choose?
- bring your own device - chose your own device - company-issued, personally enabled
What are the four main types of ebusiness models? (Check all that apply.)
- business-to-business - business-to-consumer - consumer-to-consumer - consumer-to-business
Which of the following are advantages of cloud computing? (Check all that apply.)
- capacity on demand - cost savings - scalability - flexibility
Which of the following are MIS roles found in an organization? (Check all that apply.)
- chief information officer - chief security officer - chief automation officer
Which characteristics support a sustainable MIS infrastructure? (Check all that apply.)
- cloud computing - grid computing - virtualization
Which of the following are the four parts of the data analysis cycle?
- collect - analyze - communicate - visualize
Which of the following represent external databases in a data warehouse? (Check all that apply.)
- competitor data - stock market data - weather data
Which of the following represent the common ebusiness forms? (Check all that apply.)
- content providers - infomediaries - online marketplaces - transaction brokers
Which of the following are the three mobile information management characteristics?
- data at rest - data in motion - data in use
Which of the following represent the four primary traits of the value of data?
- data type - data timeliness - data quality - data governance
Which of the following statements are examples of unstructured or strategic level decisions? (Check all that apply.)
- deciding to enter a new market - deciding to enter a new industry over the next three years - choosing to eliminate an entire product line
Select all of the following that represent the three broad categories of analytics. (Check all that apply.)
- descriptive analytics - predictive analytics - prescriptive analytics
Which of the following represent the data granularities in an organization? (Check all that apply.)
- detail - aggregate - summary
Which of the following statements are examples of semistructured or managerial level decisions? (Check all that apply.)
- determining sales forecasts for next month - analyzing the impact of last month's marketing campaign - comparing expected sales and actual sales by month
Which of the following represent the data formats in an organization? (Check all that apply.)
- document - presentation - individual
Which of the following are the four mobile application management characteristics?
- dual persona technology - accelerometer - progressive web application - containerization
Which of the following is a problem associated with dirty data? (Check all that apply.)
- duplicate data - nonformatted data - violates business rules data - nonintegrated data
Which of the following are not types of information security breach? (Check all that apply.)
- ediscovery - BYOD
Which of the following represent the connecting and communicating tools supporting and driving ebusiness? (Check all that apply.)
- email - instant messaging - podcasting - web conferencing
If your boss believed in data democratization, who would be allowed to collect, analyze, and access data? (Check all that apply.)
- employees - customer service representatives - chief information officer - human resource employees
Which of the following represent the data levels in an organization? (Check all that apply.)
- enterprise - department - individual
What are the primary concepts of a relational database model? (Check all that apply.)
- entities - attributes - primary key - foreign key
Which of the following are data mining techniques? (Check all that apply.)
- estimation analysis - affinity grouping analysis - cluster analysis - classification analysis
Which of the following represent the fundamental building blocks that protect organizational information? (Check all that apply.)
- ethics - security
What does ETL stand for? (Check all that apply.)
- extraction - transformation - loading
Which of the following are key areas of a technology recovery strategy? (Check all that apply.)
- hardware - software - networking - data center
What are the three primary components in a block?
- hash - previous hash - data
Which of the following are the different sites that support disaster recovery? (Check all that apply.)
- hot site - cold site - warm site
Which of the following represent the components of the World Wide Web? (Check all that apply.)
- hypertext markup language 5 - web browser - applets - hypertext transport protocol (HTTP)
What are the three advantages of using blockchain technology?
- immutability - digital trust - Internet of Things integration
Which of the following are the reasons business analysis is difficult from operational databases? (Check all that apply.)
- inconsistent data definitions - lack of data standards - inadequate data usefulness
Which of the following are examples of critical success factors? (Check all that apply.)
- increase customer satisfaction - retain competitive advantages - hire and retain the best business professionals
Which of the following are the business advantages of a relational database? (Check all that apply.)
- increased flexibility - increased scalability - reduced data redundancy - increased data integrity
Which of the following are epolicies a business should implement to protect itself? (Check all that apply.)
- information privacy policy - acceptable use policy - Internet use policy - anti-spam policy
Which of the following are not included as common DSS analysis techniques? (Check all that apply.)
- input analysis - output analysis - process analysis
Which of the following are types of Internet monitoring technology? (Check all that apply.)
- key logger - clickstream - web log - adware
Determining what is ethical can sometimes be difficult because certain actions can be justified or condemned depending on how you view the relationship between which of the following terms? (Choose two.)
- legal - ethical
Which of the following are included in each of the four quadrants between acting ethically and acting legally? (Check all that apply.)
- legal and ethical behaviour - illegal and unethical behaviour - legal and unethical behaviour - illegal and ethical behaviour
Which of the following are included in each of the four quadrants between acting ethically and acting legally? (Check all that apply.)
- legal behaviour - illegal behaviour - ethical behaviour - unethical behaviour
Which of the following DO NOT represent the four common characteristics of big data? (Check all that apply.)
- machine-generated structured data - analytics - business analytics - virtualization
Which of the following represent internal databases in a data warehouse? (Check all that apply.)
- marketing data - sales data - accounting data - inventory data
Which of the following are the three primary areas of an enterprise mobility management strategy?
- mobile device management - mobile application management - mobile information management
Which of the following are the benefits of wireless networking? (Check all that apply.)
- mobility - real-time data - remote work
Which of the following are included as part of the four overview areas for artificial intelligence? (Check all that apply.)
- natural language processing - natural language understanding - knowledge representation - knowledge planning
What are the three primary areas of artificial intelligence? (Check all that apply.)
- neural networks - machine learning - virtual reality
Which of the following is a characteristic of cloud computing? (Check all that apply.)
- on-demand self-service - broad network access - multi-tenancy - rapid elasticity
A virtualized system creates a virtual version of computing resources, including ________. (Check all that apply.)
- operating system - server - storage device - network resource
Which of the following are data mining modeling techniques for predictions? (Check all that apply.)
- optimization model - forecasting model - regression model
Which of the following represent a business process you would find in the operations management department? (Check all that apply.)
- ordering inventory - creating production schedules - manufacturing goods
How can websites generate revenue? (Check all that apply.)
- pay-per-click - pay-per-call - pay-per-conversion
Which of the following are examples of key performance indicators? (Check all that apply.)
- percentage of help desk calls answered - number of product returns - turnover rates of employees
Which of the following are wireless networks? (Check all that apply.)
- personal area network - wireless local area network - wireless metropolitan area network - wireless wide area network
Which of the following are examples of unplanned downtime? (Check all that apply.)
- power outages - tornados - network failures
What do you need to create the relationships in a relational database? (Check all that apply.)
- primary key - foreign key
Which of the following are cloud computing environments? (Check all that apply.)
- private cloud - public cloud - community cloud - hybrid cloud
Which of the following represent analytical data? (Check all that apply.)
- product statistics - trends - sales projections - future growth forecasts
Which of the following are considered data? (Check all that apply.)
- quantity sold - customer number - order date
Which of the following are wireless business applications? (Check all that apply.)
- radio-frequency identification - global positioning systems - geographic information systems
Which of the following statements are examples of structured or operational level decisions? (Check all that apply.)
- reordering inventory - creating the employee weekly staffing schedule - creating the employee weekly production schedule - determining payroll issues
Which of the following are examples of a way to maintain information security that a company should include in their information security policies? (Check all that apply.)
- requiring computer users to log off before leaving for lunch - requiring users to never share user or password information with anyone - changing passwords every 30 to 60 days
Which of the following do not represent the fundamental building blocks that protect organizational information? (Check all that apply.)
- sales - human resources - click-fraud - threats
Which of the following represent transactional data? (Check all that apply.)
- sales receipt - packing slip - airline ticket
Which of the following represent the four types of bias in machine learning? (Check all that apply.)
- sample bias - prejudice bias - measurement bias - variance bias
Select all of the following that represent forms of unstructured data. (Check all that apply.)
- satellite images - photographic data - social media data - text messages data
Select all of the following that represent forms of machine-generated unstructured data. (Check all that apply.)
- satellite images - scientific atmosphere data - radar data
Select all of the following that represent forms of structured data. (Check all that apply.)
- sensor data - web log data - clickstream data - point-of-sale data
Which of the following are the four basic categories of virtualization? (Check all that apply.)
- storage virtualization - network virtualization - server virtualization - system virtualization
What are the three types of machine learning?
- supervised machine learning - unsupervised machine learning - transfer machine learning
Select all of the following that represent forms of human-generated unstructured data. (Check all that apply.)
- text messages data - social media data - email data
Select all of the following that DO NOT represent the three broad categories of analytics. (Check all that apply.)
- user analytics - intelligence analytics - anomaly analytics
Which of the following represent the four common characteristics of big data? (Check all that apply.)
- variety - veracity - volume - velocity
Select the four common characteristics of big data along with the correct definition. (Check all that apply.)
- variety—represents different forms of data - veracity—represents uncertainty of data - volume—represents the scale of data - velocity—represents the analysis of streaming data
Which of the following are included as common DSS analysis techniques? (Check all that apply.)
- what-if analysis - sensitivity analysis - goal-seeking analysis - optimization analysis
Which of the following are types of viruses? (Check all that apply.)
- worm - malware - adware - spyware - ransomware - scareware
Which generation of wireless broadband technology is based on the 802.11ac standard engineered to greatly increase the speed and responsiveness of wireless networks?
5G
What is extraction, transformation, and loading?
It is a process that extracts data from internal and external databases, transforms it using a common set of enterprise definitions, and loads it into a data warehouse.
Which network uses radio signals to transmit and receive data over distances of a few hundred feet?
WLAN
What is WiMAX?
Worldwide Interoperability for Microwave Access
What is the difference between a business model and an ebusiness model?
a business model details how a company creates, delivers, and generates revenue; an ebusiness model does all of the same except on the Internet.
What is geocoding?
a coding process in spatial databases that assigns a digital map feature to an attribute that serves as a unique ID (tract number, node number) or classification (soil type, zoning category)
What is a chipless RFID tag?
a device that uses plastic or conductive polymers instead of silicon-based microchips, allowing them to be washed or exposed to water without damaging the chip
What is a primary key?
a field (or group of fields) that uniquely identifies a given entity in a table
What is wireless fidelity (Wi-Fi)?
a means by which portable devices can connect wirelessly to a local area network, using access points that send and receive data via radio waves
What is bluetooth?
a wireless PAN technology that transmits signals over short distances among cell phones, computers, and other devices
What are keywords that advertisers choose to pay for and appear as sponsored links on the Google results pages?
adwords
The information MIS infrastructure supports the day-to-day business operations and plans for
all of the answer choices are correct
What are the three main drivers of the direct-to-consumer sales channel?
all of the answers are correct
What encompasses all organizational information and its primary purpose is to support the performance of managerial analysis or semistructured decisions?
analytical information
Which of the following terms is synonymous with business analytics?
analytics
What is the process of identifying rare or unexpected items or events in a dataset that do not conform to other items in the dataset?
anomaly detection
What does API stand for?
application programming interface
What uses GPS tracking to track vehicles?
automatic vehicle location
What uses data about people's behaviors to understand intent and predict future action?
behavioural analytics
What is a collection of large, complex datasets, which cannot be analyzed using traditional database methods and tools?
big data
Who are hackers who break into other people's computer systems and may just look around or steal and destroy information?
black-hat hackers
What is IT consumerization?
blending the personal and business use of technology devices and applications
What is a type of distributed ledger consisting of blocks of data that maintain a permanent and tamper-proof record of transactional data?
blockchain
What is a wireless PAN technology that transmits signals over short distances among cell phones, computers, and other devices?
bluetooth
What is information collected from multiple sources such as suppliers, customers, competitors, partners, and industries that analyzes patterns, trends, and relationships for strategic decision making?
business intelligence
The sustainable infrastructure pressure of increased energy consumption poses new and growing pressure. The energy consumed by a computer is estimated to produce as much as 10 percent of the amount of carbon dioxide produced by a
car
What includes the carbon dioxide and carbon monoxide in the atmosphere produced by business processes and systems?
carbon emissions
Who determines if a person or business process can be replaced by a robot or software?
chief automation officer
Who is responsible for ensuring the security of business systems and developing strategies and safeguards against attacks by hackers and viruses?
chief security officer (CSO)
What type of Internet monitoring technique records information about a customer during a web surfing session, such as what websites were visited and how long the visit was, what ads were viewed, and what was purchased?
clickstream
What is any proprietary software licensed under exclusive legal right of the copyright holder?
closed source
What serves a specific community with common business models, security requirements, and compliance considerations?
community cloud
What can compare two or more datasets to identify patterns and trends?
comparative analysis
What can help managers keep tabs of its competitor's activities on the web using software that automatically tracks all competitor website activities such as discounts and new products?
competitive monitoring
What is the primary way that social networks work?
connecting people by matching profile information
Which of the following describes a company's acknowledged responsibility to society?
corporate social responsibility
What sources capital for a project by raising many small amounts from a large number of individuals, typically via the Internet?
crowdfunding
What is measured by such benchmarks as satisfaction surveys, percentage of existing customers retained, and increases in revenue dollars per customer?
customer satisfaction
What is a type of mediation that refers to the creation of new kinds of intermediaries that simply could not have existed before the advent of ebusiness?
cybermediation
What is the electronic defacing of an existing website?
cybervandalism
What is a collection of data from various sources for the purpose of data processing?
data aggregation
What is the ability for data to be collected, analyzed, and accessible to all users (the average end user)?
data democratization
Which of the following occurs when a system produces incorrect, inconsistent, or duplicate data?
data integrity issue
What is the term for the time it takes for data to be stored or retrieved?
data latency
What is the ultimate outcome of a data warehouse?
data marts
What maintains data about various types of objects, events, people, and places?
database
What implies that organizations that cannot adapt to the new demands placed on them for surviving in the information age are doomed to extinction?
digital darwinism
What is a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution?
digital rights management
What is an ebusiness model where companies build, market, sell, and ship their products themselves, without relying on traditional stores or intermediaries?
direct-to-consumer
What is a new way of doing things that initially does not meet the needs of existing customers?
disruptive technology
________ is a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network.
drive-by hacking
What types of metrics measure customer satisfaction?
effectiveness MIS metrics
What type of decision is the following: Did customers use the marketing campaign to purchase products?
effectiveness decision
What type of decision is the following: Did the amount of daily transactions increase?
effectiveness decision
What type of decision is the following: How do we best use the ingredients in the warehouse to make the most profits?
efficiency decision
What type of decision is the following: What is the best route for dropping off FedEx or UPS packages?
efficiency decision
Which data types are typically found in the human resources department?
employee data, promotion data, vacation data
The policy that ensures the users know how to behave at work and the organization has a published standard regarding computer user behavior is called ________ computer use policy.
ethical
What is made up of discarded technology devices?
ewaste
Which of the following definitions represents a data scientist?
extracts knowledge from data by performing statistical analysis, data mining, and advanced analytics on big data to identify trends, market changes, and other relevant information
Which of the following is considered the output in the systems thinking example of a DSS?
forecasts
What is a technique where a business offers a free basic product giving the customer an option to use an advanced version for a premium cost?
freemium
Which type of AI system assigns values of 0 and 1 to vague or ambiguous information?
fuzzy logic
What is a legal framework that sets guidelines for the collection and processing of personal information of individuals within the European Union?
general data protection regulation
What are material items or products that customers will buy to satisfy a want or need?
goods
What uses technology allowing humans to interact with a computer through bodily sensations and movements—for example, a cell phone vibrating in your pocket?
haptic interface
What consists of the physical devices associated with a computer system?
hardware
Within the sites that support disaster recovery, a ________ is a separate and fully equipped facility where the company can move immediately after a disaster and resume business.
hot site
What are areas around access points where users can connect to the Internet via Wi-Fi?
hotspots
What includes two or more private, public, or community clouds, but each cloud remains separate and is only linked by technology that enables data and application portability?
hybrid cloud
Which of the following describes a sustainable MIS infrastructure?
identifies ways that a company can grow in terms of computing resources while simultaneously becoming less dependent on hardware and energy consumption
Which of the following describes an information MIS infrastructure?
identifies where and how important information, such as customer records, is maintained and secured
What simply means unchangeable?
immutable
In terms of big data, what is variety?
includes different forms of structured and unstructured data
Which of the following describes an agile MIS infrastructure?
includes the hardware, software, and telecommunications equipment that, when combined, provides the underlying foundation to support the organization's goals
What is Wi-Fi infrastructure?
includes the inner workings of a Wi-Fi service or utility, including the signal transmitters, towers, or poles and additional equipment required to send out a Wi-Fi signal
Which of the following describes an MIS infrastructure?
includes the plans for how a firm will build, deploy, use, and share its data, processes and MIS assets
What measures the number of people a firm can communicate with all over the world?
information reach
What is consolidation?
involves the aggregation of information and features simple roll-ups to complex groupings of interrelated information
Which of the following is correct in reference to a database?
it can support many logical views
What is a scripting language developed by Netscape and used to create interactive websites, a big driver of Business 2.0?
javascript
What is a word used in a performing a search?
keyword
What records classified and summarized transactional data?
ledger
Determining what is ethical can sometimes be difficult because certain actions can be justified or condemned depending on how you view the relationship between ________ and ________.
legal; ethical
What is the ability of a computer to "see" by digitizing an image, processing the data it contains, and taking some kind of action?
machine vision
What is data created by a machine without human intervention?
machine-generated data
What is a destructive agent?
malicious agents designed by spammers and other Internet attackers to farm email addresses off websites or deposit spyware on machines
MIS is a business function, like accounting or sales, which moves information about people, products, and processes across the company to facilitate decision making and problem solving. What does MIS stand for?
management information system
What type of decision is the following: What was the difference between forecast sales and actual sales last month?
managerial decision
What type of decision is the following: What was the impact of last month's marketing campaign discount on the primary product?
managerial decision
What is the practice of gathering data and ensuring that it is uniform, accurate, consistent, and complete, including such entities as customers, suppliers, products, sales, employees, and other critical entities that are commonly integrated across organizational systems?
master data management
Which of the following is the correct definition of algorithms?
mathematical formulas placed in software that performs an analysis on a dataset
What are measurements that evaluate results to determine whether a project is meeting its goals?
metrics
Twitter is an example of a
microblogging website
What is a security strategy comprised of products and services that offer remote support for mobile devices, such as smart phones, laptops, and tablets?
mobile device management
What describes how products in a network increase in value to users as the number of users increases?
network effect
What is a category of AI that attempts to emulate the way the human brain works?
neural network
What is one of the guidelines an organization can follow when creating an information privacy policy?
notice and disclosure
What is the system that consists of nonproprietary hardware and software based on publicly known standards that allows third parties to create add-on products to plug into or interoperate with the system?
open system
Todd Smith works at a retail store selling sports equipment. His daily tasks include opening the store, creating the work schedules, processing payroll, overseeing sales and inventory, and training employees. At what level of the organizational pyramid would you categorize Todd?
operational
Which of the following represents the three different levels of a company pyramid from the bottom to the top?
operational - managerial - strategic
What type of decision is the following: How many temporary employees do we need to hire for Cyber Monday?
operational decision
What type of decision is the following: Should we fire an employee who is perpetually late?
operational decision
Which department manages the process of converting or transforming resources into goods or services?
operations management
What are the three business functions an MIS infrastructure supports?
operations, change, and the environment or sustainability
What are the unpaid entries in a search engine results page that were derived based on their content's relevance to the keyword query?
organic search
What is a data value that is numerically distant from most of the other data points in a dataset?
outlier
What are links a company paid to have displayed based on a user's keywords?
paid search
What measures how quickly a system performs a process or transaction?
performance
Imagine you accidently mistype the URL for your bank and you are redirected to a fake website that collects your information. You have just been a victim of ________ identity theft.
pharming
What converts an audio broadcast to a digital music player?
podcasting
Which of the following agile MIS infrastructure characteristics refers to the ability of an application to operate on different devices or software platforms, such as different operating systems?
portability
Which type of bias occurs as a result of training data that is influenced by cultural or other stereotypes?
prejudice bias
What is distributed computing?
processes and manages algorithms across many machines in a computing environment
What is the rate at which goods and services are produced based upon total output given total inputs?
productivity
Which data types are typically found in the marketing department?
promotion data, sales data, advertising data
Which of the following is a challenge of sustaining technology?
provides a more expensive product for current customers
A wireless MAN (WMAN) is a metropolitan area network uses ___________ to transmit and receive data.
radio signals
What is immediate, up-to-date data?
real-time data
What is the ability to get a system up and running in the event of a system crash or failure that includes restoring the information backup?
recovery
Which of the following systems allows users to create, read, update, and delete data in a relational database?
relational database management system
Which constraint does not allow someone to create an order for a nonexistent customer?
relational integrity constraint
What is a pivot analysis?
rotates data to display alternative presentations of the data
What is a problem with using incorrect training data to train a machine?
sample bias
Which of the following describes how well a system can adapt to increased demands?
scalability
What combines art with science to determine how to make URLs more attractive to search engines, resulting in higher search engine ranking?
search engine optimization
What is a standard security technology for establishing an encrypted link between a web server and a browser, ensuring that all data passed between them remain private?
secure sockets layer
Emily Graham wants to be a model, and she is constantly taking photos of herself and posting them to her Facebook and Instagram accounts. What are the photos called that Emily Graham is taking?
selfies
Which of the following terms represents how quickly a third-party or vendor can change a system to ensure it meets user needs and the terms of any contracts, including agreed levels of reliability, maintainability, or availability?
serviceability
What is software used to make a website's product catalog available for online ordering whereby visitors may select, view, add/delete, and purchase merchandise?
shopping cart
What is the type of authentication that requires a username and password?
single-factor authentication
What is the process of monitoring and responding to what is being said about a company, individual, product, or brand?
social media monitoring
To find out your company policy regarding such websites as YouTube, Facebook, and Twitter, you would have to refer to the ________ policy.
social media policy
What is unsolicited email that plagues employees at all levels and clogs email systems?
spam
What uses a systematic approach in an attempt to improve business effectiveness and efficiency continuously?
static process
What measures the amount of time visitors spend on a website or application?
stickiness
What type of decision is the following: How will new technology laws impact the business?
strategic decision
Which data type has a defined length, type, and format and includes numbers, dates, or strings such as Customer Address?
structured data
What asks users to write lines of code to answer questions against a database?
structured query language
Many social media websites use ________ or specific keywords or phrases incorporated into website content for means of classification or taxonomy.
tags
What is a well-planned strategy that ensures the search and navigation functions are easy to use and user-friendly on a website?
taxonomy
If you were thinking about a washing machine as a system, which of the following represents the outputs?
the clean clothes
What is software?
the set of instructions the hardware executes to carry out specific tasks
What is a problem that occurs when someone registers purposely misspelled variations of well-known domain names?
typosquatting
Miranda White likes taking old computer parts and remaking them into products such as earrings and clocks. Which of the following represents what Miranda is doing?
upcycle
In the information security policy, managers should consider including virus protection, which includes how often the system should be scanned and how frequently the software should be
updated
What are prescriptive analytics?
use techniques that create models indicating the best decision to make or course of action to take
In terms of big data, what includes the uncertainty of data, including biases, noise, and abnormalities?
veracity
What is a marketing phenomenon that facilitates and encourages people to pass along a marketing message?
viral marketing
What creates a virtual version of computing resources, such as an operating system, server, storage device, or network resource?
virtualized system
Which of the following describes a system's weakness that can be exploited by a threat?
vulnerability
What is the practice of tagging pavement with codes displaying where Wi-Fi access is available?
war chalking
What is deliberately searching for Wi-Fi signals while driving by in a vehicle?
war driving
What analyzes unstructured data associated with websites to identify consumer behavior and website navigation?
web analytics
Which of the following allows a user to access the WWW?
web browser
What is a locally stored URL, or the address of a file or Internet page saved as a shortcut?
website bookmark
What uses clickstream data to determine the effectiveness of the site as a channel-to-market?
website business analytics
What uses clickstream data to determine the efficiency of the site for the users and operates at the server level?
website traffic analytics
What is the DSS analysis that checks the impact of a change in a variable or assumption on the model?
what-if analysis
What is underfitting?
when a machine learning model has poor predictive abilities because it did not learn the complexity in the training data
What is overfitting?
when a machine learning model matches the training data so closely that the model fails to make correct predictions on new data
What is an encryption algorithm designed to protect wireless transmission data?
wired equivalent privacy