CIS Test 1
Select the three structured decisions that are almost repetitive in nature and affect short-term business strategies.
Creating employee staffing schedules Reordering inventory Creating weekly production schedules
Who includes governments that are after some form of information about other governments?
Cyberespionage
Which statement accurately describes the relationships between departments in a company for making solid business decisions for the company to operate as a whole?
Departments are interdependent and need data from other departments
What delivers everything from animation to graphics and music to movies; it can also be used to build complicated web applications and works across platforms, including a PC, tablet, smartphone, or smart TV?
HTML 5
What is the Internet protocol web browsers use to request and display web pages using universal resource locators?
HTTP
______ is the Internet protocol web browsers use to request and display web pages using universal resource locators.
HTTP
When considering the interrelationships between efficiency and effectiveness where does a company want to operate?
High efficiency, high effectiveness
Which company took advantage of the long tail?
Netflix
Transforms raw materials or inputs into goods and services. Transforms raw materials or inputs into goods and services.
Operations
Select three primary value activities.
Outbound logistics Inbound logistics Marketing and sales
What acquires raw materials to manufacture, deliver, market, sell, and provide after-sales services?
Primary value activities
Select the three characteristics of online transactional processing.
Processes the information according to defined business rules Stores the information Updates existing information to reflect the new information
Select four pressures that Michael Porter identified as potential challenges to the profitability of a company.
Substitute products can steal customers. Influential suppliers can drive down profits by charging higher prices for supplies. Competition can steal customers. New market entrants can steal potential investment capital.
Select two support value activities.
Technology development Firm infrastructure
Select the group of items that can be determined using information.
The best-selling product, best customer, and worst-selling product
Choice, Chooses business focus Chooses business focus
The three generic strategies matches
What is the address of a file or resource on the web such as www.apple.com?
Universal Resource Locator (URL)
Select two reasons why ebusiness has expanded global reach.
Unlimited size Unlimited customers
Select two terms for content created and updated by many users for many users.
User-generated content User-contributed content
Select two accurate statements relating to an ethical computer use policy.
Users need to consent to following the rules Users need to be informed of the rules
What is the primary difference between a worm and a virus?
Viruses attach to something, worms tunnel themselves
Provides access to Internet information through documents, including text, graphics, and audio and video files that use a special formatting language called Hypertext Markup Language.
WWW
________-if analysis checks the impact of a change in a variable or assumption on the model.
What
Which question can be answered using business intelligence?
What was the lowest sales per week compared with the economic interest rate?
What is underfitting?
When a machine learning model has poor predictive abilities because it did not learn the complexity in the training data
What is overfitting?
When a machine learning model matches the training data so closely that the model fails to make correct predictions on new data
What are mathematical formulas placed in software that performs an analysis on a data set?
algorithm
Which form of communication do the message and the response not occur at the same time?
asynchronous communication
Detection and response
attacks
What is the process of computerizing manual tasks, making them more efficient and effective and dramatically lowering operational costs called?
automation
What is a robot capable of making its own decisions and perform an action accordingly?
autonomous robotics
Which of the following are types of viruses? (Check all that apply.)
backdoor polymorphic trojan-horse
Opens a way into the network for future attacks.
backdoor program
Regardless of what process is measured, how it is measured, and whether it is performed for the sake of efficiency or effectiveness, managers must set ________, or baseline values the system seeks to attain.
benchmarks
What does fuzzy logic assign as values to vague or ambiguous information?
between 0 and 1
What is the practice of artificially inflating traffic statistics for online advertisements?
click fraud
A business that operates in a physical store and on the Internet. Example: Barnes & Noble
click-and-mortar
I have one item.
data
What is a service that allows the owner of a domain name to maintain a simple website and provide email capacity?
domain name hosting
What was the original term for a company operating on the Internet?
dot-com
Which policy stating explicitly how, when, and where the company monitors its employees?
employee monitoring policy
Fair compensation, job security, ethical conduct Fair compensation, job security, ethical conduct
employees
A search ________ is website software that finds other pages based on keyword matching similar to Google.
engine
Through social ____________, hackers use their social skills to trick people into revealing access credentials or other valuable information.
engineering
A feature of a product or service that customers have come to expect and entering competitors must also offer is a(n) ______.
entry barrier
True or false: Cybervigilantes includes governments that are after some form of information about other governments.
false
True or false: The choices made by MIS should dictate the business processes of a company.
false
What refers to the level of detail in the model or the decision-making process?
granularity
Social _______ represent the interconnection of relationships in a social network.
graphs
Provides employee training, hiring, and compensation.
human resource management
Employee data, promotion data, vacation data
human resources
Hiring employees, Enrolling employees in health care, Tracking vacation and sick time
human resources
What is data that humans, in interaction with computers, generate?
human-generated structured data
_________ markup language links documents, allowing users to move from one to another simply by clicking on a hot spot or link.
hypertext
What is the forging of someone's identity for the purpose of fraud?
identity theft
A user can opt _____ to receive emails by choosing to allow permissions to incoming emails.
in
In terms of big data, what is variety?
includes different forms of structured and unstructured data
Banking—Loan processing, Insurance—Claims processing, Government—Grant allocation, Hotel—Reservation handling, Airline—Baggage handling
industry-specific customer-facing processes
What is a representation of information in a graphic format designed to make the data easily understandable at a glance?
infographic
Provide specialized information on behalf of producers of goods and services and their potential customers.
infomediaries
Management ________ systems is a business function, like accounting and human resources, which moves information about people, products, and processes across the company to facilitate decision making and problem solving.
information
The item I have is a product that has the most sales during the month of December
information
What age are we currently living in when infinite quantities of facts are widely available to anyone who can use a computer?
information age
What are the two primary resources knowledge workers use to make decisions?
information and intuition
What is the act of conforming, acquiescing, or yielding information?
information compliance
Select the statement that accurately defines the association between information and ethics.
information has no ethics
A(n) ________ policy contains general principles regarding information privacy.
information privacy policy
Which epolicy contains general principles regarding information privacy?
information privacy policy
Which of the following are epolicies a business should implement to protect itself? (Check all that apply.)
information privacy policy acceptable use policy internet use policy anti-spam policy
What is an ethical issue that focuses on who owns information about individuals and how information can be sold and exchanged?
information property
What measures the number of people a firm can communicate with all over the world?
information reach
What refers to the depth and breadth of details contained in a piece of textual, graphic, audio, or video information?
information richness
What is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity?
information secrecy
What details how an organization will implement the information security policies?
information security plan
What identifies the rules required to maintain information security, such as requiring users to log off before leaving for lunch or meetings, never sharing passwords with anyone, and changing passwords every 30 days?
information security policies
Time sheets, wage rates, employee benefits
input
Transaction processing system
input
Which of the following are not included as common DSS analysis techniques? (Check all that apply.)
input analysis output analysis process analysis
___________ are legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident.
insiders
What is a service that enables instant or real-time communication between people?
instant messaging
Intellectual property is ________ creative work that is embodied in physical form and includes copyrights, trademarks, and patents.
intangible
What is consolidation?
involves the aggregation of information and features simple roll-ups to complex groupings of interrelated information
What are the quantifiable metrics a company uses to evaluate progress toward critical success factors?
key performance indicators
Who helps harness the wealth of knowledge in the organization?
knowledge facilitators
What involves capturing, classifying, evaluating, retrieving, and sharing information assets in a way that provides context for effective decisions and actions?
knowledge management
_________ is software that is intended to damage or disable computers and computer systems.
malware
______ share is the proportion of the market that a firm captures.
market
What evaluates such items as websites and checkout scanner information to detect customers' buying behavior and predict future behavior by identifying affinities among customers' choices of products and services?
market basket analysis
Promotion data, sales data, advertising data
marketing
Promotes, prices, and sells products to customers. Promotes, prices, and sells products to customers.
marketing and sales
Promoting of discounts, Communicating marketing campaigns, Attracting customers, Processing sales
marketing and sales
What is a website or web application that uses content from more than one source to create a completely new product or service?
mashup
Which of the following is a what-you-see-is-what-you-get (WYSIWYG) tool?
mashup editor
What is the ability of an organization to tailor its products or services to the customers' specifications?
mass customization
What is a problem caused by using collected data that skews the data in one direction?
measurement bias
What are measurements that evaluate results to determine whether a project is meeting its goals?
metrics
What is the practice of sending brief posts (140 to 200 characters) to a personal blog, either publicly or to a private group of subscribers who can read the posts as IMs or as text messages?
microblogging
Data ______ is the process of analyzing data to extract information not offered by the raw data alone.
mining
_____ authentication requires more than two means of authentication such as what the user knows (password), what the user has (security token), and what the user is (biometric verification).
multifactor
What is the process within a genetic algorithm of randomly trying combinations and evaluating the success (or failure) of the outcome?
mutation
Bring together buyers and sellers of products and services.
online marketplaces
What is the system that consists of nonproprietary hardware and software based on publicly known standards that allows third parties to create add-on products to plug into or interoperate with the system?
open system
_______ decisions affect how the firm is run from day to day; they are the domain of operations managers, who are the closest to the customer.
operational
____________ business processes are static, routine, daily business processes such as stocking inventory, checking out customers, or daily opening and closing processes.
operational
What is a form of social engineering in which one individual lies to obtain confidential data about another individual?
pretexting
________ is a form of social engineering in which one individual lies to obtain confidential data about another individual.
pretexting
The person responsible for ensuring the ethical and legal use of information within a company is the Chief ______ Officer.
privacy
_______ is the right to be left alone when you want to be, to have control over your personal possessions, and not to be observed without your consent.
privacy
What is a network intrusion attack that takes advantage of programming errors or design flaws to grant the attacker elevated access to the network and its associated data and applications?
privilege escalation
What is a view of data at a particular moment in time?
snapshot
Detail every solution possible, including ideas that seem farfetched.
solution generation
________ is unsolicited email.
spam
The number of hours a system is available for users.
system availability
What provides an end-to-end view of how operations work together to create a product or service?
systems thinking
What is a marketing phenomenon that facilitates and encourages people to pass along a marketing message?
viral marketing
What is a technique that induces websites or users to pass on a marketing message to other websites or users, creating exponential growth in the message's visibility and effect?
viral marketing
Select the two substitutes you could choose instead of taking an airplane to attend a meeting in another country.
virtual meetings videoconferencing
What is a computer-simulated environment that can be a simulation of the real world or an imaginary world?
virtual reality
What is software written with malicious intent to cause annoyance or damage?
virus
What is a phone scam that attempts to defraud people by asking them to call a bogus telephone number to confirm their account information?
vishing
What analyzes unstructured data associated with websites to identify consumer behavior and website navigation?
web analytics
What blends videoconferencing with document sharing and allows the user to deliver a presentation over the web to a group of geographically dispersed participants?
web conferencing
What is an open source project that seeks to embed real-time voice, text, and video communications capabilities in web browsers?
web real-time communications (WebRTC)
What is another term from data scraping?
web scraping
Affiliate programs allow a business to generate commissions or referral fees when a customer visiting its website clicks a link to another merchant's _______.
website
What uses clickstream data to determine the effectiveness of the site as a channel-to-market?
website ebusiness analytics
Work at the request of the system owners to find system vulnerabilities and plug the holes.
white-hat hackers
A _______ is a type of collaborative web page that allows users to add, remove, and change content, which can be easily organized and reorganized as required.
wiki
______ includes the tasks, activities, and responsibilities required to execute each step in a business process.
workflow
A virtual _________ is a work environment that is not located in any one physical space.
workplace
_________ MIS monitoring tracks people's activities by such measures as number of keystrokes, error rate, and number of transactions processed.
workplace
Spreads itself, not only from file to file, but also from computer to computer.
worm
________ is a program that secretly takes over another computer for the purpose of launching attacks on other computers.
zombie
Select two types of DSS systems.
A system that identifies risks for insurance companies A system to diagnose and treat patients
What is a set of routines, protocols, and tools for building software applications?
Application programming interface (API)
Organizations address security risks through two lines of defense; the first is _________, and the second is _________
- people - technology
Who is responsible for ensuring the speed, accuracy, availability, and reliability of the MIS? (Please use the acronym)
CTO
What characteristic is high when there are many alternatives to a product or service and low when there are few alternatives from which to choose?
Threat of substitute products or services
_______ are keywords that advertisers choose to pay for and appear as sponsored links on the Google results pages.
adwords
__________ is the automation of existing manual and paper-based processes and workflows to a digital format.
digitization
Which privacy policy details the extent to which email messages may be read by others?
email privacy policy
What scrambles information into an alternative form that requires a key or password to decrypt?
encryption
A program or device that can monitor data traveling over a network.
sniffer
True or false: The value of information is only as good as the people who make use of the information.
true
Which of the following are included as common DSS analysis techniques? (Check all that apply.)
what-if analysis sensitivity analysis goal-seeking analysis optimization analysis
What monitors processes to ensure tasks, activities, and responsibilities are executed as specified?
workflow control systems
What tracks people's activities by such measures as number of keystrokes, error rate, and number of transactions processed?
workplace MIS monitoring
A(n) ________ spreads itself not only from file to file but also from computer to computer.
worm
What is a program that secretly takes over another computer for the purpose of launching attacks on other computers?
zombie
Applies to businesses buying from and selling to each other over the Internet.
B2B
Select three items contained in a typical Internet use policy.
Describes user responsibility for citing sources. Describes the Internet services available to users. States the ramifications if the policy is violated.
Which dilemma is facing Polaroid?
Digital Darwinism
What are the different types of process models?
as-is and to-be
What is the abuse of pay-per-click, pay-per-call, and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser?
click-fraud
What is a count of the number of people who visit one site and click on an advertisement that takes them to the site of the advertiser?
click-through
What type of Internet monitoring technique records information about a customer during a web surfing session, such as what websites were visited and how long the visit was, what ads were viewed, and what was purchased?
clickstream
_________ data can observe the exact pattern of a consumer's navigation through a site.
clickstream
What is the process of collecting, analyzing and reporting aggregate data about which pages a website visitor visits—and in what order?
clickstream analytics
__________ is the legal protection afforded an expression of an idea, such as a song, book, or video game.
copyright
What is a process that employs specialized algorithms to model and study and establish relationships among data and datasets?
deep learning
A new way of doing things that initially does not meet the needs of existing customers.
disruptive technology
What types of metrics measure customer satisfaction?
effectiveness MIS metrics
What are material items or products that customers will buy to satisfy a want or need?
goods
What is a category of AI that attempts to emulate the way the human brain works?
neural network
What are the three primary areas of artificial intelligence? (Check all that apply.)
neural networks machine learning virtual reality
Which of the following is not included in the four basic options for a BYOD policy?
no access for personal devices
A contractual stipulation which ensures that ebusiness participants do not deny their online actions is called a __________ clause.
nonrepudiation
A(n) ________ clause is typically contained in an acceptable use policy.
nonrepudiation
Which department manages the process of converting or transforming resources into goods or services?
operations management
Expanded product line, increase in demand, new markets
opportunities
What are users doing when they choose to deny permission to incoming emails?
opt out
Search engine ________ combines art along with science to determine how to make URLs more attractive to search engines resulting in higher search engine ranking.
optimization
Which type of analysis finds the optimum value for a target variable by repeatedly changing other variables, subject to specified constraints?
optimization
What is a common type of transaction processing system?
order entry system
What is the unauthorized use, duplication, distribution, or sale of copyrighted software?
pirated software
The structure of a typical organization is similar to a __________, and the different levels require different types of information to assist in decision making, problem solving, and opportunity capturing.
pyramid
What is a form of malicious software that infects your computer and asks for money?
ransomware
Productivity is the ______ at which goods and services are produced based upon total output given total inputs.
rate
Information _________ measures the number of people a firm can communicate with all over the world.
reach
What is a web format used to publish frequently updated works, such as blogs, news headlines, audio, and video, in a standardized format?
real simple syndication
Core competencies, market leaders, cost advantages
strengths
True or false: The difference between the CIO and CDO is that the CIO is responsible for the information systems through which data is stored and processed, while the CDO is responsible for the data, regardless of the information system.
true
True or false: The threat of new entrants is high when it is easy for new competitors to enter a market and low when there are significant entry barriers to joining a market.
true
True or false: With machine learning, machines are able to act without human programs detailing how to perform tasks.
true
The National Institute of Standards and Technology (NIST) introduced an ________________ designed to keep government information secure.
AES
Select three ways that companies duplicate competitive advantages.
Acquire new technology Hire key employees Copy business operations
Select two items typically contained in an employee monitoring policy.
Always enforce the policy the same for everyone. State the consequences of violating the policy.
What are the four main types of ebusiness models? (Check all that apply.)
B2B C2B C2C B2C
Applies to any business that sells its products or services directly to consumers online.
B2C
What applies to any business that sells its products or services directly to consumers online?
B2C
What in BPMN notation is a task in a business process?
BPMN activity
In BPMN what represents anything that happens during the course of a business process?
BPMN event
In BPMN notation what is used to control the flow of a process?
BPMN gateway
What are the most successful solutions or problem solving methods that have been developed by a specific organization or industry?
Best practices
Select the three generic business strategies Porter identified for entering a new market.
Broad differentiation Focused strategy Broad cost leadership
Select two terms representing the next generation of Internet use—a more mature, distinctive communications platform characterized by new qualities such as collaboration sharing, and free.
Business 2.0 Web 2.0
Step 1 Step 2 Step 3 Step 4 Step 5 Step 6
Business Understanding Data Understanding Data Preparation Data Modeling Evaluation Deployment
Applies to any consumer that sells a product or service to a business over the Internet.
C2B
Applies to sites primarily offering goods and services to assist consumers interacting with each other over the Internet.
C2C
Who is responsible for (1) overseeing all uses of MIS and (2) ensuring that MIS strategically aligns with business goals and objectives? (Please use the acronym)
CIO
Select the four characteristics of Web 2.0.
Content sharing through open sourcing Collaboration outside the organization User-contributed content
A static process uses a systematic approach in an attempt to improve business effectiveness and efficiency continuously. Managers constantly attempt to optimize static process. Which of the following are examples of static processes? (Choose all that apply)
Creating financial statements Calculating taxes Payroll
Select the four core drivers of the information age.
Data, information, business intelligence, knowledge
Choice, Techniques that describes past performance and history. Techniques that describes past performance and history.
Descriptive analytics
What are the three categories of analytics?
Descriptive analytics Prescriptive analytics Predictive analytics
Select three steps to improve business processes.
Document as-is process Follow process Establish measures
__________ MIS metrics measure the impact MIS has on business processes and activities, including customer satisfaction and customer conversion rates.
Effectiveness
Select three items typically contained in a social media policy.
Employee Twitter, corporate Twitter, and personal Twitter policies. Employee blog and personal blog policies. Employee social network and personal social network policies.
Select two unstructured decisions.
Entering a new market Entering a new industry
Select the three reasons why organizations should develop written epolicies.
Establish organizational rules Establish employee procedures Establish employee guidelines
Select three purposes of a business process model.
Expose process detail gradually and in a controlled manner Focus attention on the process model interfaces Encourage conciseness and accuracy in describing the process model
Which of the following is a type of unplanned downtime? (Choose all that apply)
Frozen pipe Water damage Static electricity Smoke Damage
Select three examples of analytical information.
Future growth projections Sales trends Market projections
What is a legal framework that sets guidelines for the collection and processing of personal information of individuals within the European Union(EU)?
General Data Protection Regulation (GDPR)
Select three examples of features that may be included in a digital dashboard for a manufacturing team.
Graph of stock market prices List of KPIs List of outstanding alerts
The current version of __________ delivers everything from animation to graphics and music to movies; it can also be used to build complicated web applications and works across platforms, including a PC, tablet, smartphone, or smart TV.
HTML
Select two alternate names for an MIS department. Multiple select question. - IT department - IS department - MIT department - CTT department
IT department IS department
Acquires raw materials and resources and distributes to manufacturing as required. Acquires raw materials and resources and distributes to manufacturing as required.
Inbound logistics
Select 3 goals or objectives that a leadership plan might include to achieve a solid business strategy.
Increasing sales Attracting new customers Decreasing costs
What is the primary difference between information and business intelligence?
Information primarily focuses on internal variables. BI manipulates multiple variables including both internal and external variables.
Which of the following are included in ebusiness tools?
Instant message Podcasting Web conferencing Email
What is a nonprofit organization that has assumed the responsibility for Internet Protocol (IP) address space allocation, protocol parameter assignment, domain name system management, and root server system management functions previously performed under U.S. government contract?
Internet Corporation for Assigned Names and Numbers (ICANN)
What is a world where interconnected Internet-enabled devices or "things" have the ability to collect and share data without human intervention?
Internet of Things
Select three opportunities managers can identify when focusing on reengineering.
Is the process broken? Is it crucial for productivity improvement? Will savings from automation be clearly visible?
What is a scripting language developed by Netscape and used to create interactive websites, a big driver of Business 2.0?
JavaScript
What is the primary difference between KPIs and CSFs?
KPIs are far more specific than CSFs
Which of the following are classified as static report types? (Select two)
Last year's sales report Last year's salary report
Select three features of a neural network.
Learning and adjusting to new circumstances on their own Coping with huge volumes of information with many dependent variables Lending themselves to massive parallel processing
Select three types of clickstream data metrics.
Length of stay on the website Demographics of registered visitors Number of abandoned registrations
When evaluating the value chain, all of the following are included in the primary value activities except
MIS analytics
Select the accurate statement in terms of MIS. Multiple choice question. - MIS represents business success and innovation - MIS equals business success and innovation - MIS enables business success and innovation
MIS enables business success and innovation
What is the difference between existing MIS workplace knowledge and the knowledge required to fulfill the business goals and strategies?
MIS skills gap
Select all the activities for which transactional information is created.
Making airline reservations Withdrawing cash from an ATM Purchasing stocks
Select the three primary decision-making challenges facing managers today.
Managers must apply sophisticated analysis techniques, such as Porter's strategies or forecasting, to make strategic decisions Managers need to analyze large amounts of information Manager must make decisions quickly
What are the two types of personally identifiable information?
Nonsensitive PII and Sensitive PII
Select three items typically found in an acceptable use policy.
Not attempting to break the security of any computer network or user. Not using the service as part of violating any law. Not performing any nonrepudiation.
Which of the following describes how a company can reduce the threat of substitute products or services?
Offer additional value through wider product distribution.
Which of the following statements is correct when considering a SWOT analysis?
Opportunities and threats originate outside an organization.
Select three different ways a business can measure stickiness.
Page views Minutes per month Time spent per visit
Any data that could potentially identify a specific individual.
Personally identifiable information (PII)
Why is ebusiness able to take advantage of the long tail?
Physical stores are limited by shelf space
Select the three benefits an organization can identify by investigating business processes.
Remove redundant tasks Recognize smooth-running processes Identify bottlenecks
Choice, Evaluates project position Evaluates project position
SWOT analysis
What evaluates an organization's strengths, weaknesses, opportunities, and threats to identify significant influences that work for or against business strategies?
SWOT analysis
Which of the following evaluates a project's position?
SWOT analysis
Select three characteristics of managerial decisions.
Semistructured, ad hoc reporting decision types Short term, daily, monthly, and yearly time frames Middle management and director employee types
Select three characteristics of strategic decisions.
Senior management, presidents, leaders, and executives employee types Unstructured, nonrecurring, one time decision types Long term, yearly, and multi-year time frames
Select the factors used to assess buyer power.
Size of orders Sensitivity to price Number of customers
Select three epolicies.
Social media policy Acceptable use policy Ethical computer use policy
Select three categories of authentication and authorization.
Something that is part of the user, such as a fingerprint or voice signature. Something the user has, such as a smart card or token. Something the user knows, such as a user ID and password.
Select the three characteristics of operational information.
Structured, recurring, repetitive decision types Analysts and staff employee types Short term and day-to-day operational time frames
Select two competitive advantage decisions a company can make after completing a value chain analysis.
Target high value-adding activities to further enhance their value Target low value-adding activities to increase their value
Which of the following are the three conditions that indicate the time is right to initiate a business process change?
The company is markedly below industry benchmarks on its core processes There has been a pronounced shift in the market the process was designed to serve To regain competitive advantages, the company must leapfrog competition on key dimensions
The translation of a long URL into an abbreviated alternative that redirects to the longer URL.
URL shortening
Select three Business 2.0 communication and collaboration tools.
Wiki Blog Mashup
What provides access to Internet information through documents including text, graphics, audio, and video files that use a special formatting language called HTML?
World Wide Web
_________ provides access to Internet information through documents including text, graphics, audio, and video files that use a special formatting language called HTML.
World Wide Web
What is an international community that develops open standards to ensure the long-term growth of the Web?
World Wide Web Consortium
Which of the following is a good example of a system, since removing one part will cause the entire system to stop working?
a car engine
What is a set of tools that supports the work of teams or groups by facilitating the sharing and flow of information?
a collaboration system
A(n) ___________ use policy requires a user to agree to follow it to be provided access to corporate email, information systems, and the Internet.
acceptible
Records, measures, and reports monetary transactions.
accounting
transactional data, purchasing data, payroll data, tax data
accounting
Select the three departments found in a typical company. Multiple select question. - Systems thinking - Accounting - Chief Technology Officer - Payroll - Human resources - Sales
accounting human resources sales
Creating financial statements, Paying of Accounts Payable, Collecting of Accounts Receivable
accounting and finance
Which of the following are included in the different types of ebusiness revenue models? (Choose all that apply)
advertising fees subscription fees transaction fees
Which of the following represent the common ebusiness revenue models? (Check all that apply.)
advertising fees subscription fees transaction fees instant messaging transactions
What is software that, although purporting to serve some useful function and often fulfilling that function, also allows Internet advertisers to display advertisements without the consent of the computer user?
adware
What are keywords that advertisers choose to pay for and appear as sponsored links on the Google results pages?
adwords
What revels the relationship between variables along with the nature and frequency of the relationships?
affinity grouping analysis
__________ are mathematical formulas placed in software that performs an analysis on a dataset.
algorithm
Business analytics use ___ to derive meaning form data by finding patterns to make future predictions.
algorithms
Business analytics use ____________ to derive meaning form data by finding patterns to make future predictions.
algorithms
Social networking _________ maps group contacts (personal and professional) identifying who knows each other and who works together.
analysis
Online ____________ processing is the manipulation of information to create business intelligence in support of strategic decision making.
analytical
__________ information encompasses all organizational information, and its primary purpose is to support the performance of managerial analysis or semistructured decisions.
analytical
What encompasses all organizational information and its primary purpose is to support the performance of managerial analysis or semistructured decisions?
analytical information
Which of the following terms is synonymous with business analytics?
analytics
__________ detection is the process of identifying rare or unexpected items or events in a data set that do not conform to other items in the data set.
anomaly
Which policy simply states that email users will not send unsolicited emails?
anti-spam policy
What scans and searches hard drives to prevent, detect, and remove known viruses, adware, and spyware?
antivirus software
What is a program that runs within another application such as a website?
applet
_________ programming interface is a set of routines, protocols, and tools for building software applications.
application
What does API stand for?
application programming interface
Astroturfing is the practice of ____________ stimulating online conversation and positive reviews about a product, service, or brand.
artificially
_________ process models represent the current state of the operation that has been mapped, without any specific improvements or changes to existing processes.
as-is
What allows a business to generate commissions or referral fees when a customer visiting its website clicks on a link to another merchant's website?
associate program
_________ communications, or communication such as email in which the message and the response do not occur at the same time.
asynchronous
________ reality is the viewing of the physical world with computer-generated layers of information added to it.
augmented
What is the viewing of the physical world with computer-generated layers of information added to it?
augmented reality
___________ is a method for confirming users' identities.
authentication
What is the process of providing a user with permission including access levels and abilities such as file access, hours of access, and amount of allocated storage space?
authorization
What is a box running across a website that advertises the products and services of another business, usually another ebusiness?
banner ad
What is a chart or graph that presents grouped data with rectangular bars with lengths proportional to the values that they represent?
bar chart
Market ________ analysis evaluates such items as websites and checkout scanner information to detect customers' buying behavior and predict future behavior by identifying affinities among customers' choices of products and services.
basket
What is a collection of large, complex datasets, which cannot be analyzed using traditional database methods and tools?
big data
What is the identification of a user based on a physical characteristic, such as a fingerprint, iris, face, voice, or handwriting?
biometrics
Break into other people's computer systems and may just look around or may steal and destroy information.
black-hat hackers
Who are hackers who break into other people's computer systems and may just look around or steal and destroy information?
black-hat hackers
A ________ is an online journal that allows users to post their own comments, graphics, and video.
blog
A website ____________ is a locally stored URL or the address of a file or Internet page saved as a shortcut.
bookmark
Social __________ allows users to share, organize, search, and manage bookmarks.
bookmarking
__________ occur when resources reach full capacity and cannot handle any additional demands; they limit throughput and impede operations.
bottlenecks
A business that operates in a physical store without an Internet presence.
brick-and-mortar
Which of the following are the common forms of business-to-consumer ebusiness models? (Check all that apply.)
brick-and-mortar click-and-mortar pure-play
What is a business that operates in a physical store without an Internet presence?
brick-and-mortar business
Which policy allows employees to use their personal mobile devices and computers to access enterprise data and applications?
bring your own device policy
What is a crowdsourcing initiative that rewards individuals for discovering and reporting software bugs?
bug bounty program
A _______ process patent protects a specific set of procedures for conducting a particular business activity.
business
A(n) ________ process model is a graphic description of a process, showing the sequence of process tasks, which is developed for a specific purpose and from a selected viewpoint.
business
Business Process Model and Notation (BPMN) is a graphical notation that depicts the steps in a __________ process.
business
________ analytics is the scientific process of transforming data into insight for making better decisions.
business
________ process modeling is the activity of creating a detailed flowchart or process map of a work process that shows its inputs, tasks, and activities in a structured sequence.
business
__________ -facing processes are invisible to the external customer but essential to the effective management of the business.
business
What is the scientific process of transforming data into insight for making better decisions?
business analytics
The month of December this year is going to see interest rates raise by 10 percent and snow storms are expected to cause numerous problems throughout the East coast.
business intelligence
What is information collected from multiple sources such as suppliers, customers, competitors, partners, and industries that analyzes patterns, trends, and relationships for strategic decision making?
business intelligence
What is a plan that details how a company creates, delivers, and generates revenues?
business model
What is a standardized set of activities that accomplish a specific task, such as processing a customer's order?
business process
________ is a standardized set of activities that accomplishes a specific task.
business process
What attempts to understand and measure the current process and make performance improvements accordingly?
business process improvement
What is a leadership plan that achieves a specific set of goals or objectives?
business strategy
What gains a clear understating of the business problem that must be solved and how it impacts the company?
business understanding
What is a segment of a company representing a specific business function?
business unit
Strategic planning, Tactical planning, Budget forecasting, Training, Purchasing raw materials
business-facing processes
What applies to businesses buying from and selling to each other over the Internet?
business-to-business
High because customers have many airlines to choose from
buyer power
What is the ability of buyers to affect the price they must pay for an item?
buyer power
How will a business estimate the impact on profits from increases or decreases in costs?
by changing variables
What is a method whereby new problems are solved based on the solutions from similar cases solved in the past?
case-based reasoning
Internet ________ is a government's attempts to control Internet traffic, thus preventing some material from being viewed by a country's citizens.
censorship
Internet _________ is government attempts to control Internet traffic, thus preventing some material from being viewed by a country's citizens.
censorship
What is a trusted third party, such as VeriSign, that validates user identities by means of digital certificates?
certificate authority
Which is a semistructured decision?
changing employee benefits
determines if a person or business process can be replaced by a robot or software
chief automation officer
Who is responsible for determining the types of information the enterprise will capture, retain, analyze, and share, regardless of the system used to do so?
chief data officer
Responsible for determining the types of information the enterprise will capture, retain, analyze, and share.
chief data officer (CDO)
Responsible for (1) overseeing all uses of MIS and (2) ensuring that MIS strategically aligns with business goals and objectives.
chief information officer (CIO)
manage and defend intellectual property, copyrights, and patents
chief intellectual property officer
Which of the following represent executive levels you might see created over the next decade? Multiple select question. - Chief intellectual property officer - Chief user experience officer - Chief fact officer - Chief MIS skills gap officer - Chief automation officer - Chief computer officer
chief intellectual property officer chief user experience officer chief automation officer
Responsible for collecting, maintaining, and distributing company knowledge.
chief knowledge officer (CKO)
Who is responsible for ensuring the ethical and legal use of information within a company?
chief privacy officer
Responsible for ensuring the ethical and legal use of information within a company.
chief privacy officer (CPO)
Responsible for ensuring the security of business systems and developing strategies and safeguards against attacks by hackers and viruses.
chief security officer (CSO)
Responsible for ensuring the speed, accuracy, availability, and reliability of the MIS.
chief technology officer (CTO)
will create the optimal relationship between user and technology
chief user experience officer
The ________ Online Protection Act was passed to protect minors from accessing inappropriate material on the Internet.
child
What is the process of organizing data into categories or groups for its most effective and efficient use?
classification analysis
What is a business that operates in a physical store and on the Internet?
click-and-mortar business
_______ is the process of collecting, analyzing and reporting aggregate data about which pages a website visitor visits—and in what order.
clickstream analytics
What can observe the exact pattern of a consumer's navigation through a site?
clickstream data
What is any proprietary software licensed under exclusive legal right of the copyright holder?
closed source
Source ________ contains instructions written by a programmer specifying the actions to be performed by computer software.
code
__________ intelligence is collaborating and tapping into the core knowledge of all employees, partners, and customers.
collective
Which of the following was mostly unheard of prior to the information age?
college student start-up
Real-time _________ occurs when a system updates information at the same rate it receives it.
communication
A(n) ________ advantage features a product or service on which customers place a greater value than they do on similar offerings from competitors.
competitive
__________ click-fraud is a computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link.
competitive
What is the process of gathering information about the competitive environment, including competitors' plans, activities, and products, to improve a company's ability to succeed?
competitive intelligence
Information _________ is the act of conforming, acquiescing, or yielding information.
compliance
What is the assurance that messages and information remain available only to those authorized to view them?
confidentiality
What is the primary way that social networks work?
connecting people by matching profile information
What is the aggregation of data from simple roll-ups to complex groupings of interrelated information?
consolidation
What helps companies manage the creation, storage, editing, and publication of their website content?
content management systems
Generate revenues by providing digital content such as news, music, photos, or videos.
content providers
Which of the following represent the common ebusiness forms? (Check all that apply.)
content providers infomediaries online marketplaces transaction brokers
Workflow ________ systems monitor processes to ensure tasks, activities, and responsibilities are executed as specified.
control
The number of customers an organization "touches" for the first time and persuades to purchase its products or services. The number of customers an organization "touches" for the first time and persuades to purchase its products or services.
conversion rate
What is a small file deposited on a hard drive by a website containing information about customers and their browsing activities?
cookie
What is the legal protection afforded an expression of an idea, such as a song, book, or video game?
copyright
What processes are business processes, such as manufacturing goods, selling products, and providing service, that make up the primary activities in a value chain?
core processes
Broad strategies reach a large market segment, while focused strategies target a niche or unique market with either ________ leadership or differentiation.
cost
What is software that is manufactured to look like the real thing and sold as such?
counterfeit software
__________ success factors are the crucial steps companies perform to achieve their goals and objectives and implement their strategies.
critical
What sources capital for a project by raising many small amounts from a large number of individuals, typically via the Internet?
crowdfunding
___________ refers to the wisdom of the crowd.
crowdsourcing
____________ is the science that studies encryption, which is the hiding of messages so that only the sender and receiver can read them.
cryptography
Which of the following is an example of data as opposed to information that is derived from data?
customer number
Which is used by Amazon to create product differentiation?
customer profiling
What is measured by such benchmarks as satisfaction surveys, percentage of existing customers retained, and increases in revenue dollars per customer?
customer satisfaction
Measured by satisfaction surveys, percentage of existing customers retained, and increases in revenue dollars per customer.
customer satisfacttion
Order processing, Customer service, Sales processing, Customer billing, Order shipping
customer-facing processes
What results in a product or service received by an organization's external customer?
customer-facing processes
Exceptional service, high-quality products, ethical dealings
customers
Hitbots create the illusion that a large number of potential _______ are clicking the advertiser's links, when in fact there is no likelihood that any of the clicks will lead to profit for the advertiser?
customers
Mass ___________ is the ability of an organization to tailor its products or services to the customers' specifications.
customization
What type of attack is identity theft?
cyberattacks
_________ includes threats, negative remarks, or defamatory comments transmitted via the Internet or posted on the website.
cyberbullying
What is a type of mediation that refers to the creation of new kinds of intermediaries that simply could not have existed before the advent of ebusiness?
cybermediation
What refers to the creation of new kinds of intermediaries that simply could not have existed before the advent of ebusiness, including comparison-shopping sites such as Kelkoo and bank account aggregation services such as Citibank?
cybermediation
What involves prevention, detection, and response to cyberattacks that can have wide-ranging effects on the individual, organization, community, and at the national level?
cybersecurity
____________ is the use of computer and networking technologies against persons or property to intimidate or coerce governments, individuals, or any segment of society to attain political, religious, or ideological goals.
cyberterrorism
Seek to cause harm to people or to destroy critical systems or information and use the Internet as a weapon of mass destruction.
cyberterrorist
What is the electronic defacing of an existing website?
cybervandalism
___________ is the electronic defacing of an existing website.
cybervandalism
Who includes individuals that seek notoriety or want to make a social or political point such as WikiLeaks?
cybervigilantes
A(n) ___________ is an organized attempt by a country's military to disrupt or destroy information and communication systems for another country.
cyberwar
_____ time is the time required to process an order.
cycle
Which of the following are dynamic reports? (Select two) Multiple select question. - Daily stock market price report - Last year sales report - Last year salary report - Available inventory report
daily stock market price report available inventory report
What is a portion of the Internet that is intentionally hidden from search engines, uses masked IP addresses, and is accessible only with a special web browser?
dark web
What is the portion of the Internet that is intentionally hidden from search engines, uses masked IP addresses, and is accessible only with a special web browser?
dark web
Digital __________ track KPIs and CSFs by compiling information from multiple sources and tailoring it to meet user needs.
dashboards
A big part of business intelligence is an area called predictive analytics, which extracts information from ________ and uses it to predict future trends and identify behavioral patterns.
data
Prevention and resistance
data
The Internet of Things (IoT) is a world where interconnected, Internet-enabled devices or "things" can collect and share __________ without human intervention.
data
What are the raw facts that describe the characteristics of an event or object?
data
What occurs when adding additional training examples by transforming existing examples?
data augmentation
Gather problem-related data, including who, what, where, when, why, and how. Be sure to gather facts, not rumors or opinions about the problem.
data collection
What is the ability for data to be collected, analyzed, and accessible to all users (the average end user)?
data democratization
What uses a variety of techniques to find patterns and relationships in large volumes of information that predict future behavior and guide decision making?
data mining tools
What is the process of collecting statistics and information about data in an existing source?
data profiling
What is the process of sharing information to ensure consistency between multiple data sources?
data replication
What is the process of extracting large amounts of data from a website and saving it to a spreadsheet or computer?
data scraping
Select the system that models information using OLAP, which provides assistance in evaluating and choosing among different courses of action?
decision support systems
What decodes information and is the opposite of encrypt?
decrypt
______ learning is a process that employs specialized algorithms to model and study complex datasets; the method is also used to establish relationships among data and datasets.
deep
What is the large part of the Internet that is inaccessible to conventional search engines, such as email messages, chat messages, private content on social media sites, and electronic bank statements?
deep web
Floods a website with so many requests for service that it slows down or crashes the site
denial-of-service attack
What type of analytics is best described with a report that includes charts and graphs explaining the data?
descriptive analytics
__________ agents are malicious agents designed by spammers and other Internet attackers to farm email addresses off websites or deposit spyware on machines.
destructive
Which of the following statements are examples of semistructured or managerial level decisions? (Check all that apply.)
determining sales forecasts for next month analyzing the impact of last month's marketing campaign comparing expected sales and actual sales by month
Product __________ occurs when a company develops unique differences in its products or services with the intent to influence demand.
differentiation
_______ certificate is a data file that identifies individuals or organizations online and is comparable to a digital signature.
digital
________ rights management is a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution.
digital
__________ Darwinism implies that organizations that cannot adapt to the new demands placed on them for surviving in the information age are doomed to extinction.
digital
What implies that organizations that cannot adapt to the new demands placed on them for surviving in the information age are doomed to extinction?
digital Darwinism
________ is a data file that identifies individuals or organizations online and is comparable to a digital signature.
digital certificate
What tracks KPIs and CSFs by compiling information from multiple sources and tailoring it to meet user needs?
digital dashboard
What is the measure of consumer, partner, and employee confidence in an organization's ability to protect and secure data and the privacy of individuals?
digital trust
What is an ebusiness model where companies build, market, sell, and ship their products themselves, without relying on traditional stores or intermediaries?
direct-to-consumer
The introduction of ebusiness brought about ________, which occurs when a business sells directly to the customer online and cuts out the intermediary.
disintermediation
What is a new way of doing things that initially does not meet the needs of existing customers?
disruptive technology
What refers to a period of time when a system is unavailable?
downtime
______ enables users to view details, and details of details, of information.
drill-down
_________-by hacking is a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network.
drive
________ is a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network.
drive-by hacking
________ diving, or looking through people's trash, is another way hackers obtain information.
dumpster
________ occurs when a hacker looks through your trash to find personal information.
dumpster diving
throwing a bird in the air
dynamic process
What is continuously changing and provides business solutions to ever-changing business operations?
dynamic processes
__________ includes ecommerce along with all activities related to internal and external business operations such as servicing customer accounts, collaborating with partners, and exchanging real-time information.
ebusiness
What is a plan that details how a company creates, delivers, and generates revenues specifically on the Internet?
ebusiness model
What is the buying and selling of goods and services over the Internet?
ecommerce
What refers to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry?
ediscovery
Which of the following are not types of information security breach? (Check all that apply.)
ediscovery BYOD
What type of decision is the following: Did customers use the marketing campaign to purchase products?
effectiveness decision
What type of decision is the following: Did the amount of daily transactions increase?
effectiveness decision
____________ MIS metrics measure the performance of MIS itself, such as throughput, transaction speed, and system availability.
efficiency
_________ focuses on the extent to which a firm is using its resources in an optimal way, while effectiveness focuses on how well a firm is achieving its goals and objectives.
efficiency MIS metrics
What type of decision is the following: How do we best use the ingredients in the warehouse to make the most profits?
efficiency decision
What type of decision is the following: What is the best route for dropping off FedEx or UPS packages?
efficiency decision
A process by which a user misleads a system into granting unauthorized rights, usually for the purpose of compromising or destroying the system.
elevation of privilege
Which of the following represent the connecting and communicating tools supporting and driving ebusiness? (Check all that apply.)
email instant messaging podcasting web conferencing
Which of the following are policies and procedures that address information management along with the ethical use of computers and the Internet in the business environment?
epolicies
________ are policies and procedures that address information management along with the ethical use of computers and the Internet in the business environment.
epolicies
A(n) _________ computer use policy contains general principles to guide computer user behavior.
ethical
Which policy contains general principles to guide computer user behavior?
ethical computer use policy
What are the principles and standards that guide our behavior toward other people?
ethics
BPMN _______ is anything that happens during the course of a business process, including customer requests, time requests, and the end of the process.
event
What is a specialized DSS that supports senior-level executives and unstructured, long-term, nonroutine decisions requiring judgment, evaluation, and insight?
executive information system
Phishing ________ is a masquerading attack that combines spam with spoofing.
expedition
What are computerized advisory programs that imitate the reasoning processes of experts in solving difficult problems?
expert systems
What consists of anything that can be documented, archived, and codified, often with the help of MIS?
explicit knowledge
Which of the following definitions represents a data scientist?
extracts knowledge from data by performing statistical analysis, data mining, and advanced analytics on big data to identify trends, market changes, and other relevant information
What is a magazine published only in electronic form on a computer network?
ezine
What is the confirmation or validation of an event or object?
fact
_________ information practices is a general term for a set of standards governing the collection and use of personal data and addressing issues of privacy and accuracy.
fair
True or false: Cyberespionage include individuals that seek notoriety or want to make a social or political point such as WikiLeaks.
false
Sock puppet marketing is the use of a ________ to artificially stimulate demand for a product, brand, or service.
false identity
A zombie _________ is a group of computers on which a hacker has planted zombie programs.
farm
What is information that returns to its original transmitter (input, transform, or output) and modifies the transmitter's actions?
feedback
controls to ensure correct processing
feedback
Content ____________ occurs when organizations use software that filters content, such as emails, to prevent the accidental or malicious transmission of unauthorized information.
filtering
Deals with strategic financial issues including money, banking, credit, investments, and assets.
finance
Investment data, monetary data, reporting data
finance
Such as return on investment (the earning power of an organization's assets), cost benefit analysis (the comparison of projected revenues and costs including development, maintenance, fixed, and variable), and break even analysis (the point at which constant revenues equal ongoing costs).
financial
A(n) ___________ is hardware and/or software that guard a private network by analyzing incoming and outgoing information for the correct markings.
firewall
Includes the company format or departmental structures, environment, and systems. Includes the company format or departmental structures, environment, and systems.
firm infrastructure
What occurs when a company can significantly increase its market share by being first with a new competitive advantage?
first-mover advantage
BPMN ________ display the path in which the process flows.
flows
______ is similar to taxonomy except that crowdsourcing determines the tags or keyword-based classification system.
folksonomy
Which of the following is considered the output in the systems thinking example of a DSS?
forecasts
What is a mathematical method of handling imprecise or subjective information?
fuzzy logic
Which type of AI system assigns values of 0 and 1 to vague or ambiguous information?
fuzzy logic
What is a legal framework that sets guidelines for the collection and processing of personal information of individuals within the European Union?
general data protection regulation
_________ algorithm is an artificial intelligence system that mimics the evolutionary, survival-of-the-fittest process to generate increasingly better solutions to a problem.
genetic
What is an artificial intelligence system that mimics the evolutionary, survival-of-the-fittest process to generate increasingly better solutions to a problem?
genetic algorithm
Which of the following is a primary type of MIS system for decision making?
genetic algorithms
_________ -seeking analysis finds the inputs necessary to achieve a goal such as a desired level of output.
goal
Production is the process where a business takes raw materials and processes or converts them into finished ____ or services.
goods
Adhere to regulations/laws, increase employment
government
Which group of stakeholder's primary interests includes adhering to regulations/laws, increasing employment, and ethical taxation reporting?
government
What are experts in technology who use their knowledge to break into computers and computer networks, either for profit or just motivated by the challenge?
hackers
Have philosophical and political reasons for breaking into systems and will often deface the website as a protest.
hactivist
A(n) ___________ interface uses technology allowing humans to interact with a computer through bodily sensations and movements—for example, a cell phone vibrating in your pocket
haptic
What is a keyword or phrase used to identify a topic and is preceded by a hash or pound sign (#)?
hashtag
What is a two-dimensional representation of data in which values are represented by colors?
heat map
If buyer power is ______, customers can force a company and its competitors to compete on price, which typically drives prices down.
high
Rivalry among existing competitors is _________ when competition is fierce in a market and low when competitors are more complacent.
high
What is a graphical display of data using bars of different heights?
histogram
Attack computer systems by transmitting a virus hoax, with a real virus attached.
hoaxes
Which attackers grant themselves the same access levels they already have but assume the identity of another user?
horizontal privilege escalation
Which of the following are examples of critical success factors? (Check all that apply.)
increase customer satisfaction retain competitive advantage hire and retain the best business professionals
Porter's Five Forces Model analyzes the competitive forces within the environment in which a company operates to assess the potential for profitability in a(n) _________.
industry
In the _________ age infinite quantities of facts are widely available to anyone who can use a computer.
information
The person responsible for (1) overseeing all uses of MIS and (2) ensuring that MIS strategically aligns with business goals and objectives is the Chief ________ Officer.
information
____________ ethics govern the ethical and moral issues arising from the development and use of information technologies, as well as the creation, collection, duplication, distribution, and processing of information itself.
information
The extent to which a system generates the correct results when executing the same transaction numerous times.
information accuracy
What governs the ethical and moral issues arising from the development and use of information technologies, as well as the creation, collection, duplication, distribution, and processing of information itself?
information ethics
What is a method or system of government for information management or control?
information governance
Data that is entered in a computer
input
What is intangible creative work that is embodied in physical form and includes copyrights, trademarks, and patents?
intellectual property
What measures advertising effectiveness by counting visitor interactions with the target ad?
interactivity
What are agents, software, or businesses that provide a trading infrastructure to bring buyers and sellers together?
intermediaries
A massive network that connects computers all over the world and allows them to communicate with one another.
internet
A(n) _________ service provider is a company that provides access to the Internet for a monthly fee.
internet
A(n) _________ use policy contains general principles to guide the proper use of the Internet.
internet
____________ Corporation for Assigned Names and Numbers is a nonprofit organization that has assumed the responsibility for Internet Protocol (IP) address space allocation, protocol parameter assignment, domain name system management, and root server system management functions previously performed under U.S. government contract.
internet
What occurs when a government attempts to control Internet traffic, thus preventing some material from being viewed by a country's citizens?
internet censorship
Which policy contains general principles to guide the proper use of the Internet?
internet use policy
What features full-time monitoring tools that search for patterns in network traffic to identify intruders?
intrusion detection software
Return on _________ indicates the earning power of a project.
investment
Which of the following are types of Internet monitoring technology? (Check all that apply.)
key logger clickstream web log adware anti-spam policy
What is a word used in a performing a search?
keyword
Given the unexpected financial issues caused by the storms and the interest rate hike we will offer a discount on purchase in November and December to ensure sales levels increase by 10 percent.
knowledge
The person responsible for collecting, maintaining, and distributing company knowledge is the Chief __________ Officer.
knowledge
What includes the skills, experience, and expertise, coupled with information and intelligence, that creates a person's intellectual resources?
knowledge
_________ includes the skills, experience, and expertise, coupled with information and intelligence, that creates a person's intellectual resources.
knowledge
__________ management involves capturing, classifying, evaluating, retrieving, and sharing information assets in a way that provides context for effective decisions and actions.
knowledge
Knowledge facilitators help harness the wealth of knowledge in the organization. Knowledge facilitators help acquire and catalog the __________ in an organization.
knowledge assets
What are the human, structural, and recorded resources available to the organization?
knowledge assets
What are the two names for the assets that reside within the minds of members, customers, and colleagues and include physical structures and recorded media?
knowledge assets intellectual capital
What are the two names for the assets that reside within the minds of members, customers, and colleagues and include physical structures and recorded media? Multiple select question. - Knowledge workers - Knowledge assets - Knowledge facilitators - Intellectual capital
knowledge assets intellectual capital
What supports the capturing, organization, and dissemination of knowledge (i.e., know-how) throughout an organization?
knowledge management system
Who are individuals valued for their ability to interpret and analyze information?
knowledge workers
Determining what is ethical can sometimes be difficult because certain actions can be justified or condemned depending on how you view the relationship between which of the following terms? (Choose two.)
legal ethical
Select the area where you want to operate in terms of the intersection between what is ethical and what is legal.
legal and ethical
Which of the following are included in each of the four quadrants between acting ethically and acting legally? (Check all that apply.)
legal behavior illegal behavior unethical behavior ethical behavior
Chris Anderson, editor-in-chief of Wired magazine, describes niche-market ebusiness strategies as capturing the ______ tail, referring to the tail of a typical sales curve.
long
What rewards customers based on their spending?
loyalty programs
What refers to devices that connect directly to other devices?
machine to machine (M2M)
The extent to which a machine can differentiate between objects.
machine vision resolution
The ability of a machine to see in dim light or to detect weak impulses at invisible wavelengths.
machine vision sensitivity
What is created by a machine without human intervention?
machine-generated data
What sends a massive amount of email to a specific person or system that can cause that user's server to stop functioning?
mail bomb
Includes a variety of threats such as viruses, worms, and Trojan horses.
malicious code
Scareware is a type of ________ designed to trick victims into giving up personal information to purchase or download useless and potentially dangerous software.
malware
Information ___________ examines the organizational resource of information and regulates its definitions, uses, value, and distribution ensuring it has the types of data/information required to function and grow effectively.
management
MIS is a business function, like accounting or sales, which moves information about people, products, and processes across the company to facilitate decision making and problem solving. What does MIS stand for?
management information system
What is a business function that moves information about people, products, and processes across the company to facilitate decision making and problem solving?
management information systems
At the __________ level, employees are continuously evaluating company operations to hone the firm's abilities to identify, adapt to, and leverage change.
managerial
__________ business processes are semidynamic, semiroutine, monthly business processes such as resource allocation, sales strategy, or manufacturing process improvements.
managerial
A ______ is a simplified representation or abstraction of reality.
model
How can a spreadsheet program, such as Microsoft Office Excel, help managers make decisions?
modeling relationships
An outlier is a data value that is numerically distant from ________ of the other data points in a set of data?
most
______ advertising is an online marketing concept in which the advertiser attempts to gain attention by providing content in the context of the user's experience in terms of its content, format, style, or placement.
native
What is an online marketing concept in which the advertiser attempts to gain attention by providing content in the context of the user's experience?
native advertising
Which of the following are included as part of the four overview areas for artificial intelligence? (Check all that apply.)
natural language processing natural language understanding knowledge representation knowledge planning
A social __________ is an application that connects people by matching profile information.
network
What gathers an organization's computer network traffic patterns to identify unusual or suspicious operations?
network behavior analysis
What describes how products in a network increase in value to users as the number of users increases?
network effect
_________ network is a category of AI that attempts to emulate the way the human brain works.
neural
Information transmitted without encryption and includes information collected from public records, phone books, corporate directories, websites, etc.
nonsensitive PII
What is one of the guidelines an organization can follow when creating an information privacy policy?
notice and disclosure
At which level do employees develop, control, and maintain core business activities required to run the day-to-day operations?
operational level
Manufacturing data, distribution data, production data
operations management
Ordering inventory, Creating production schedules, Manufacturing goods
operations management
Which of the following are data mining modeling techniques for predictions? (Check all that apply.)
optimization model forecasting model regression model
The unpaid entries in a search engine results page that were derived based on their contents relevance to the keyword query.
organic search
A user can opt ______ of receiving emails by choosing to deny permission to incoming emails.
out
Distributes goods and services to customers. Distributes goods and services to customers.
outbound logistics
What is a data value that is numerically distant from most of the other data points in a dataset?
outlier
What is a data value that is numerically distant from most of the other data points in a set of data?
outlier
Forecasts, simulations, ad hoc reports
output
Generating payroll reports, creating paychecks
output
the resulting information from the computer program
output
What occurs when a machine learning model matches the training data so closely that the model fails to make correct predictions on new data?
overfitting
Consists of altering the contents of packets as they travel over the Internet or altering data on computer disks after penetrating a network.
packet tampering
Links a company paid to have displayed based on a users keyword search.
paid search
What are links a company paid to have displayed based on a user's keywords?
paid search
What occurs when a new radical form of business enters the market that reshapes the way companies and organizations behave?
paradigm shift
Reliable contracts, ethical materials handling Reliable contracts, ethical materials handling
partners/suppliers
A(n) _________ is an exclusive right to make, use, and sell an invention and is granted by a government to the inventor.
patent
What is an exclusive right to make, use, and sell an invention and is granted by a government to the inventor?
patent
How can websites generate revenue? (Check all that apply.)
pay-per-call pay-per-click pay-per-conversion
Generates revenue each time a user clicks on a link to a retailer's website.
pay-per-click
Generates revenue each time a website visitor is converted to a customer.
pay-per-conversion
Generates revenue each time a user clicks on a link that takes the user directly to an online agent waiting for a call.
pay=per-call
Authentication and authorization
people
Which of the following are examples of key performance indicators? (Check all that apply.)
percentage of help desk calls answered number of product returns turnover rates of employees
A stakeholder is a ______ or group that has an interest or concern in an organization.
person
__________ occurs when a company knows enough about a customer's likes and dislikes that it can fashion offers more likely to appeal to that person, say by tailoring its website to individuals or groups based on profile information, demographics, or prior transactions.
personalization
Imagine you accidently mistype the URL for your bank and you are redirected to a fake website that collects your information. You have just been a victim of ________ identity theft.
pharming
What reroutes requests for legitimate websites to false websites?
pharming
What uses a zombie farm, often by an organized crime association, to launch a massive phishing attack?
pharming attack
What is a technique to gain personal information for the purpose of identity theft, usually by means of fraudulent emails that look as though they came from legitimate businesses?
phishing
_________ security is tangible protection such as alarms, guards, fireproof doors, fences, and vaults.
physical
A _____ chart is a type of graph in which a circle is divided into sectors that each represent a proportion of the whole.
pie
What rotates data to display alternative presentations of the data?
pivot
What converts an audio broadcast to a digital music player?
podcasting
___________ converts an audio broadcast to a digital music player.
podcasting
Viruses and worms change their form as they propagate.
polymorphic viruses
What is a small web page containing an advertisement that appears outside of the current website loaded in the browser?
pop-up ad
Operate central website for users to access specialized content and other services.
portals
Which of the following are examples of unplanned downtime? (Check all that apply.)
power outages tornados network failures
________ is a statement about what will happen or might happen in the future; for example, predicting future sales or employee turnover.
prediction
Choice, Techniques that extract information from data and uses it to predict future trends and identify behavioral patterns. Techniques that extract information from data and uses it to predict future trends and identify behavioral patterns.
predictive analytics
Which of the following is a result of training data that is influenced by cultural or other stereotypes?
prejudice bias
Techniques that create models indicating the best decision to make or course of action to take.
prescriptive analytics
What type of analytics would take past purchasing data as inputs into a model and then recommend the best pricing strategy for maximizing revenue?
prescriptive analytics
Define the problem as clearly and precisely as possible
problem identification
Update employee records, calculate payroll, summarize benefits
process
What-if, sensitivity, goal-seeking, optimization
process
computer program that processes the data
process
Purchases inputs such as raw materials, resources, equipment, and supplies.
procurement
What is the process where a business takes raw materials and processes them or converts them into a finished product for its goods or services?
production
What is the rate at which goods and services are produced based upon total output given total inputs?
productivity
What is a temporary activity a company undertakes to create a unique product, service, or result?
project
Information _________ is an ethical issue that focuses on who owns information about individuals and how information can be sold and exchanged.
property
Intellectual ___________ is intangible creative work that is embodied in physical form and includes copyrights, trademarks, and patents.
property
Which of the following is a challenge of sustaining technology?
provides a more expensive product for current customers
What uses two keys: a public key that everyone can have and a private key for only the recipient?
public key encryption
A business that operates on the Internet only without a physical store. Example: Google
pure-play
What is a business that operates on the Internet only without a physical store?
pure-play (virtual) business
What occurs when a system updates information at the same rate it receives it?
real-time communication
What is a data mining algorithm that analyzes a customer's purchases and actions on a website and then uses the data to recommend complementary products?
recommendation engine
What occurs when a task or activity is unnecessarily repeated?
redundancy
Business process __________ is the analysis and redesign of workflow within and between enterprises.
reengineering
What is the training of machine learning models to make a sequence of decisions?
reinforcement learning
In __________ steps are added to the value chain as new players find ways to add value to the business process.
reintermediation
Which of the following statements are examples of structured or operational level decisions? (Check all that apply.)
reordering inventory creating the employee weekly staffing schedule creating the employee weekly production schedule determining payroll issues
What is a document containing data organized in a table, matrix, or graphical format allowing users to easily comprehend and understand information?
report
A(n) ________ system is where buyers post feedback on sellers.
reputation
What is a place where buyers post feedback on sellers?
reputation system
The time it takes to respond to user interactions such as a mouse click.
response time
Spoofing is the forging of the ________ address on an email so that the email message appears to come from someone other than the actual sender.
return
Select the two benefits a business that sold hamburgers would experience if it could produce a hamburger with less expensive inputs or produce more hamburgers with the same inputs. Multiple select question. - Rise in productivity - A likely increase in profits - A likely decrease in profits - Fall in productivity
rise in productivity a likely increase in profits
What is the use of software with artificial intelligence (AI) and machine learning capabilities to handle high-volume, repeatable tasks that previously required a human to perform?
robotic process automation
What is a pivot analysis?
rotates data to display alternative presentations of the data
Potential customer data, sales report data, commission data, customer support data
sales
Which of the following do not represent the fundamental building blocks that protect organizational information? (Check all that apply.)
sales human resources click-fraud threats
What is a problem with using incorrect training data to train a machine?
sample bias
What are two sources of unstructured data? Multiple select question. - Gaming data - Satellite images - Point-of-sale data - Social media data
satellite images social media data
A data __________ extracts knowledge from data by performing statistical analysis, data mining, and advanced analytics on big data to identify trends, market changes, and other relevant information.
scientist
Find hacking code on the Internet and click-and-point their way into systems to cause damage or spread viruses.
script kiddies
What combines art with science to determine how to make URLs more attractive to search engines, resulting in higher search engine ranking?
search engine optimization
What evaluates variables that search engines use to determine where a URL appears on the list of search results?
search engine ranking
Information __________ is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity.
secrecy
Information ________ is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization.
security
The person responsible for ensuring the security of business systems and developing strategies and safeguards against attacks by hackers and viruses is the Chief _________ Officer.
security
A(n) _______ is a self-photograph placed on a social media website.
selfie
What is a component of Web 3.0 that describes things in a way that computers can understand?
semantic web
___________-structured decisions occur in situations in which a few established processes help to evaluate potential solutions, but not enough to lead to a definite recommended decision.
semi
Information transmitted with encryption and, when disclosed, results in a breach of an individual's privacy and can potentially cause the individual harm.
sensitive PII
What is the study of the impact on other variables when one variable is changed repeatedly?
sensitivity analysis
Provides customer support after the sale of goods and services
service
Provide services such as photo sharing, video sharing, online backup and storage.
service providers
Maximize profits, grow market share, high return on investment
shareholders/investors
What is software used to make a website's product catalog available for online ordering whereby visitors may select, view, add/delete, and purchase merchandise?
shopping cart
What is software used to make a website's product catalog available for online ordering, whereby visitors may select, view, add/delete, and purchase merchandise?
shopping cart
What was one of the primary drivers of ebusiness?
shopping carts
A sparkline is a small embedded line graph that illustrates a _____________ trend. Sparklines are often used in reports, presentations, dashboards, and scoreboards.
single
________-factor authentication is the traditional security process, which requires a user name and password.
single
What is the type of authentication that requires a username and password?
single-factor authentication
What is knowledge?
skills, experience, and expertise, coupled with information and intelligence, which create a person's intellectual resources
__________ is the ability to look at information from different perspectives, such as analyzing total product sales during a given promotion versus the sales of a single product across all promotions.
slice-and-dice
A(n) _______ card is a device about the size of a credit card, containing embedded technologies that can store information and small amounts of software to perform some limited processing.
smart
What is content that is designed to be easy for readers to consume and to share?
snackable content
Which of the following relies on social skills to trick people into revealing access credentials or other valuable information?
social engineering
What refers to websites that rely on user participation and user-contributed content, such as Facebook, YouTube, and Digg?
social media
Who is a person within the organization who is trusted to monitor, contribute, filter, and guide the social media presence of a company, individual, product, or brand?
social media manager
What is the process of monitoring and responding to what is being said about a company, individual, product, or brand?
social media monitoring
To find out your company policy regarding such websites as YouTube, Facebook, and Twitter, you would have to refer to the ________ policy.
social media policy
Which policy outlines the corporate guidelines or principles governing employee online communications?
social media policy
What is the practice of expanding your business and/or social contacts by constructing a personal network?
social networking
What is the use of a false identity to artificially stimulate demand for a product, brand, or service?
sock puppet marketing
Evaluate solutions in terms of feasibility (can it be completed?), suitability (is it a permanent or a temporary fix?), and acceptability (can all participants form a consensus?).
solution test
Open ________ refers to any software whose source code is made available free for any third party to review and modify.
source
_______ documents are the original transaction record.
source
What is unsolicited email that plagues employees at all levels and clogs email systems?
spam
What is a phishing expedition in which the emails are carefully designed to target a particular person or organization?
spear phising
Fake blogs created solely to raise the search engine rank of affiliated websites.
splogs (spam blogs)
The forging of the return address on an email so that the message appears to come from someone other than the actual sender.
spoofing
Structured data has a defined length, type, and format and includes numbers, dates, or strings such as Customer Address. Which two sources typically store structured data?
spreadsheet relational database
Software that comes hidden in free downloadable software and tracks online movements.
spyware
________ is a special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission.
spyware
_________ is a special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission.
spyware
throwing a rock in the air
static process
A report is a document containing data organized in a table, matrix, or graphical format allowing users to easily comprehend and understand information. What are the two common types of reports?
static reports dynamic reports
Which of the following best describes Web 1.0?
static text-based information websites
Website name ____________ is the theft of a website's name that occurs when someone, posing as a site's administrator, changes the ownership of the domain name assigned to the website to another website owner.
stealing
What measures the amount of time visitors spend on a website or application?
stickiness
At the _________ level, managers develop overall business strategies, goals, and objectives as part of the company's strategic plan.
strategic
________ decisions involve higher level issues concerned with the overall direction of the organization; these decisions define the organization's overall goals and aspirations for the future.
strategic
What are dynamic, nonroutine, long-term business processes such as financial planning, expansion strategies, and stakeholder interactions?
strategic business processes
What type of decision is the following: How will new technology laws impact the business?
strategic decision
________ improve(s) business process efficiencies simplifying or eliminating unnecessary steps.
streamlining
___________ improves business process efficiencies by simplifying or eliminating unnecessary steps.
streamlining
Refers to the field of artificial intelligence that works toward providing brain-like powers to AI machines; in effect, it works to make machines as intelligent as the humans.
strong AI
Operational decisions are considered __________ decisions, which arise in situations where established processes offer potential solutions.
structured
What has a defined length, type, and format and includes numbers, dates, or strings such as Customer Address?
structured data
Which data type has a defined length, type, and format and includes numbers, dates, or strings such as Customer Address?
structured data
Training a model from input data and its corresponding labels.
supervised machine learning
What are the three types of machine learning?
supervised machine learning unsupervised machine learning transfer machine learning
High because there are limited plane and engine manufacturers to choose from
supplier power
What is the suppliers' ability to influence the prices they charge for supplies (including materials, labor, and services)?
supplier power
________ is the suppliers' ability to influence the prices they charge for supplies (including materials, labor, and services).
supplier power
A ______ chain consists of all parties involved, directly or indirectly, in obtaining raw materials or a product.
supply
What consists of all parties involved, directly or indirectly, in obtaining raw materials or a product?
supply chain
________ consists of all parties involved, directly or indirectly, in obtaining raw materials or a product.
supply chain
What includes firm infrastructure, human resource management, technology development, and procurement?
support value activities
Produces an improved product customers are eager to buy, such as a faster car or larger hard drive.
sustaining technology
What produces an improved product customers are eager to buy, such as a faster car or larger hard drive?
sustaining technology
A(n)_______ lane layout arranges the steps of a business process into a set of rows depicting the various elements.
swim
________ are costs that make customers reluctant to switch to another product or service.
switching costs
_________ communication, or communications that occur at the same time such as IM or chat.
synchronous
Real Simple ________ is a web format used to publish frequently updated works, such as blogs, news headlines, audio, and video, in a standardized format.
syndication
An open ________ consists of nonproprietary hardware and software based on publicly known standards that allows third parties to create add-on products to plug into or interoperate with the system.
system
What is a collection of parts that link to achieve a common purpose?
system
________ knowledge is the knowledge contained in people's heads.
tacit
What is the knowledge contained in people's heads?
tacit knowledge
Social _________ describes the collaborative activity of marking shared online content with keywords or tags as a way to organize it for future navigation, filtering, or search.
tagging
Many social media websites use ________ or specific keywords or phrases incorporated into website content for means of classification or taxonomy.
tags
________ are specific keywords or phrases incorporated into website content for means of classification or taxonomy.
tags
What is a well-planned strategy that ensures the search and navigation functions are easy to use and user-friendly on a website?
taxonomy
What is the scientific classification of organisms into groups based on similarities of structure or origin?
taxonomy
The person responsible for ensuring the speed, accuracy, availability, and reliability of the MIS is the Chief _______ Officer.
technology
Applies MIS to processes to add value.
technology development
____________ is an antispamming approach where the receiving computer launches a return attack against the spammer, sending email messages back to the computer that originated the suspected spam.
teergrubing
Competitive advantages are typically ___________.
temporary
Identifying competitive advantages can be difficult, which explains why they are typically
temporary
Evaluates industry attractiveness
the five forces model
What discusses how established companies can take advantage of disruptive technologies without hindering existing relationships with customers, partners, and stakeholders?
the innovator's dilemma
_________ is a massive network that connects computers all over the world and allows them to communicate with one another.
the internet
What is a world where interconnected, Internet-enabled devices or "things" can collect and share data without human intervention?
the internet of things (IoT)
What is an act or object that poses a danger to assets?
threat
High because new airlines are continuously entering the market
threat of new entrants
________ is high when there are many alternatives to a product or service and low when there are few alternatives from which to choose.
threat of substitute products and services
High because of alternatives, such as videoconferencing and virtual meetings
threat of substitute products or services
New entrants, substitute products, shrinking markets New entrants, substitute products, shrinking markets
threats
The amount of information that can travel through a system at any point in time.
throughput
__________ bombs are computer viruses that wait for a specific date before executing their instructions.
time
_______ process models show the results of applying change improvement opportunities to the current process model.
to-be
What are small electronic devices that change user passwords automatically?
token
What is the basic business system that serves the operational level (analysts) and assists in making structured decisions?
transaction processing system
The amount of time a system takes to perform a transaction.
transaction speed
What type of information encompasses all the information contained within a single business process or unit of work, and its primary purpose is to support the performance of daily operational or structured decisions?
transactional information
Transferring information from one machine learning task to another.
transfer machine learning
Hides inside other software, usually as an attachment or a downloadable file.
trojan-horse virus
True or false: A cyborg anthropologist is an individual who studies the interaction between humans and technology, observing how technology can shape humans' lives.
true
True or false: A time-series chart is a chart is a graphical representation showing change of a variable over time. Time-series charts are used for data that changes continuously, such as stock prices.
true
True or false: Analytics is the science of fact-based decision making.
true
True or false: Artificial intelligence simulates human thinking and behavior, such as the ability to reason and learn. Its ultimate goal is to build a system that can mimic human intelligence.
true
True or false: Big data is a collection of large, complex data sets, including structured and unstructured data, which cannot be analyzed using traditional database methods and tools.
true
True or false: Continuously measuring MIS projects against benchmarks provides feedback so managers can control the system.
true
True or false: Decisions in organizations range from routine choices, such as how many items to order or how many people to hire, to unexpected ones such as what to do if a key employee suddenly quits or needed materials do not arrive.
true
True or false: One of the biggest benefits of ebusiness is a reduction in costs including communication costs, travel costs, and start-up costs.
true
True or false: Rule 41 is the part of the United States Federal Rules of Criminal Procedure that covers the search and seizure of physical and digital evidence. Rule 41 originally granted a federal judge magistrate the authority to issue a warrant to search and seize a person or property located within that judge's district if the person or property is part of a criminal investigation or trial.
true
True or false: The HIPAA Security Rule ensures national standards for securing patient data that is stored or transferred electronically. The HIPAA Security Rule requires the placement of both physical and electronic safeguards on sensitive PII health information.
true
True or false: The Internet and the World Wide Web are not synonymous. The WWW is just one part of the Internet, and its primary use is to correlate and disseminate information. The Internet includes the WWW and also other forms of communication systems such as email.
true
Digital ___________ is the measure of consumer, partner, and employee confidence in an organization's ability to protect and secure data and the privacy of individuals.
trust
_______-factor authentication requires the user to provide two means of authentication, what the user knows (password) and what the user has (security token).
two
What is a problem that occurs when someone registers purposely misspelled variations of well-known domain names?
typosquatting
Select all the factors used to appraise supplier power in an industry.
uniqueness of supplier services availability of substitute products number of suppliers
Contains the address of a file or resource on the web.
universal resource locator
What are decisions that occur in situations in which no procedures or rules exist to guide decision makers toward the correct choice?
unstructured
What is not defined and does not follow a specified format and is typically free-form text such as emails, Twitter tweets, and text messages?
unstructured data
Training a model to find patterns in a dataset, typically an unlabeled dataset.
unsupervised machine learning
The ease with which people perform transactions and/or find information.
usability
What are prescriptive analytics?
use techniques that create models indicating the best decision to make or course of action to take
A value chain analysis views a firm as a series of business processes that each add ________ to the product or service.
value
Choice, Executes business strategy Executes business strategy
value chain analysis
Which of the following executes the business strategy?
value chain analysis
A(n) ________ is a data characteristic that stands for a value that changes or varies over time.
variable
In terms of big data, what includes the uncertainty of data, including biases, noise, and abnormalities?
veracity
Which big data term describes the uncertainty of data, including biases, noise, and abnormalities?
veracity
A(n) ___________ allows people at two or more locations to interact via two-way video and audio transmissions simultaneously as well as share documents, data, computer displays, and whiteboards.
videoconferencing
______ marketing is a marketing phenomenon that facilitates and encourages people to pass along a marketing message.
viral
Machine ______ is the ability of a computer to "see" by digitizing an image, processing the data it contains, and taking some kind of action.
vision
__________ produces graphical displays of patterns and complex relationships in large amounts of data.
visualization
What is a set of measurable characteristics of a human voice that uniquely identifies an individual?
voiceprint
What is another name for a bug bounty program?
vulnerability rewards program
Select two examples of services. Multiple select question. - Manufacturing automobiles - Waiting tables - Groceries - Cutting hair
waiting tables cutting hair
Machines that can still make their own decisions based on reasoning and past sets of data.
weak AI
Lack of strategic direction, obsolete technologies, outdated product line Lack of strategic direction, obsolete technologies, outdated product line
weaknesses
What is a term to refer to the World Wide Web during its years of operation between 1991 and 2003?
web 1.0
What is the next generation of Internet use—a more mature, distinctive communications platform characterized by new qualities such as collaboration sharing, and free?
web 2.0
What is the theft of a website's name that occurs when someone, posing as a site's administrator, changes the ownership of the domain name assigned to the website to another website owner?
website name stealing
What is the DSS analysis that checks the impact of a change in a variable or assumption on the model?
what-if analysis