Computer Fundamentals For Business

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Michelle runs a shop on Etsy. One month, she spends $2,800 to promote her shop on Etsy and other social media sites. In that month, she gains 50 new customers. What is her customer acquisition cost for that month?

$56

What if any difference is there between a Trojan horse and a regular computer virus?

A Trojan horse does not self-replicate.

What is a cloud deployment model?

A cloud deployment model defines the framework of a cloud environment.

What is the difference between a cloud service and a web service?

A cloud service provides users with increased computing power and data management, whereas a web service provides the software tools needed for devices and systems to communicate with each other.

Which of the following scenarios represents a customer acquisition cost of $100?

A company spends $100,000 on advertising and marketing in one month. They gain 1,000 new customers in that month.

Which of the elements of the CIA triad does properly maintaining all hardware serve?

Availability

What is a key difference between business-to-government (B2G) transactions and other types of e-commerce?

B2G transactions involve prenegotiated contracts.

Why is a denial-of-service attack (DoS attack) a threat to data availability?

By flooding a system with incoming messages, a DoS attack forces the system to shut down, rendering it inaccessible to the users who legitimately have access to it.

How do CRM systems make troubleshooting customer problems easier?

CRMs store information about customer purchases and interactions.

What is the key reason to implement cloud computing into one's personal and/or business data and information processing?

Cloud computing diminishes the need to store files and software on a local drive.

Which of the following is the clearest definition of a computer virus?

Code-created malware that, when executed, damages programs and performance.

How does the cybersecurity goal of preserving data integrity relate to the goal of authenticating users?

Data integrity is more easily preserved if users must be authorized to access data and make changes.

What is the correct term for the small computer within a smartphone that analyzes the sounds entering your phone through the analog/digital converter?

Digital Signal Processor

In addition to overall digital flexibility, technological savings, and increased collaboration, computing in the cloud provides organizations with

Disaster recovery

Which privacy law governs the transfer of personal data outside of the geographic location the law was written in?

Europe's General Data Protection Regulation

Makoto and Rebecca want to hire a nanny for their 6-month-old baby. Before allowing someone into their home to watch their child, they are planning on running a comprehensive background check, including a credit check. Which law specifies whether Makoto and Rebecca are legally allowed to access potential candidate's credit information?

Fair Credit Reporting Act

How does a cybersecurity exploit threaten the safety of a system?

It is a tool or technique for taking advantage of a system vulnerability to cause harm.

Of the following statements, which one specifically applies to the CRM integration of platforms such as Facebook, YouTube, and TikTok?

Organizations can various platforms and integrate them. A variety of social media should be used.

Why are probable loss calculations important?

Organizations have limited funds to use toward system protections.

A corporation that was recently the victim of hacking that was caused by a high-level employee falling for a phishing scheme institutes a required, annual, self-paced training module that alerts employees to the most common recent phishing attacks. The institution of this new training requirement represents which phase of the plan-protect-respond cycle?

Respond

Which of the following is the term for CRM analytics that provides information about where data erosion occurs and how the erosion can be minimized?

Standardized Data Collection Processes

Explain the purpose of the National Institute of Standards Technology (NIST) Cybersecurity Framework.

The NIST Cybersecurity Framework is a voluntary guide that helps organizations understand and protect themselves against cybersecurity risks.

A company is trying to determine why users are deleting or no longer engaging with their app on a regular basis. Which of the below is an example of how the company could use CRM to make this determination?

The company could use CRM to determine what part of the app users who deleted it were in right before the app was deleted.

Which is the best explanation of how the World Wide Web (WWW) differs from the Internet?

The web is only one of many applications that runs on and is accessed through the Internet.

Why is it important to preserve the integrity of data, information, and systems?

These assets lose their usefulness and value if their consistency, accuracy, or dependability is compromised.

Which is the most common characteristic of social engineering cybersecurity attacks?

They are conducted via emails that offer a reward in exchange for clicking a given link.

How do businesses ultimately benefit from using a CRM to identify the highest revenue customers in a target market, before developing a marketing campaign?

They save time and money by targeting this precise segment of the market.

How does VPN software ensure that people accessing a network are authorized to do so?

VPN software authenticates users.

Why would a vendor agreement be a disadvantage of cloud computing?

Vendor agreements make it difficult to switch services.

Why is establishing authentication procedures a common cybersecurity goal?

Verifying that users are authorized to access systems, data, and resources is fundamental to preventing their unauthorized use.

Software-based keyloggers often infect a system through

a malicious email or link opened by an unsuspecting user.

Share of wallet is also known as share of

customer

When a user has determined their destination, GIS can assist in providing directions. This is called

route information.

Which Web 2.0 feature utilizes application programming interfaces (APIs) to automate web content and/or processes?

software as a service (SaaS)

What is the second criteria necessary for adding a block to the blockchain?

transaction verification

Manuel runs a small business that paints residential interiors. He has decided most of his current customers can best be reached by sending out a seasonal email newsletter. He will target new customers by placing ads on Facebook targeted at people located within 20 miles of his business who have searched for house painters. Where would he place this information on an e-commerce presence map?

type of presence

E-commerce ________ is the ability of an organization to create a strong presence among consumers in many places, with minimal time constraints, to sell them products and services.

ubiquity

Online content that has been created and posted by unpaid contributors such as customers or fans of a product or service is referred to as

user-generated

Collaboration software is designed to increase collaboration and productivity primarily by enabling team members to

view, edit, and add shared information in real time, from anywhere.

Which type of cybersecurity breach can cause the most damage to an organization's systems, data, and information?

viruses

The NIST Cybersecurity Framework is a

voluntary guide for organizations.

It is especially important for startup companies to create and follow a well-designed e-commerce strategy. Which of the following is the first phase in a well-designed strategy?

web planning

On an e-commerce presence map, what is presence?

websites, email, social media sites, and offline media

In which situation should the origin of information be authenticated to protect data integrity?

when electronic votes are submitted during an election

To remain relevant in today's e-commerce landscape, many businesses use progressive ________ applications to undertake m-commerce.

wireless

Michelle runs a shop on Etsy. One month, she spends $2,800 to promote her shop on Etsy and other social media sites. In that month, she gains 50 new customers. All customers purchased products that cost $100, that were marked up 100 percent. What is the actual amount of revenue earned per customer, taking into account materials and promotional costs?

−$6.00

Which statement accurately describes the need to keep sensitive data, information, and systems confidential?

It is both a major goal and a requirement for cybersecurity.

An investment firm creates a network designed to facilitate information exchange between devices at its offices in New York City and New Haven, Connecticut. Which type of network would the company use to exchange information?

Wide Area Network (WAN)

What is the second step that occurs when placing a call on a cellular network?

Your voice is converted by your phone to an electrical signal that is transmitted via radio waves to the nearest cell tower.

Which of the following is one of the primary components that enable networks and individual devices to connect to the Internet?

a "backbone" of connected hardware and a suite of Internet protocol software

What is a cybersecurity threat?

an event or condition that can lead to IT asset loss and the negative consequences of such loss

How is quantitative data about a customer most accurately characterized?

as a record of how a customer interacts with a business.

What does business-to-consumer (B2C) e-commerce replace?

brick-and-mortar store locations

What is the MOST direct way in which customer relationship management (CRM) systems can help businesses increase their sales?

by helping them identify and attract prospective customers

How does using a CRM to track customer acquisition rates help organizations improve their future customer acquisition rates?

by revealing whether their marketing efforts are effective or require changes

Manufacturers of computers and other electronic devices follow the IEEE 802.3 protocol to ensure that their products

can be used to create a standard ethernet connection.

Spyware's basic function is to

capture the user's account data, passwords, keystrokes, and more.

Amazon, Kamatera, Salesforce, and Google are all examples of

cloud service providers.

A computer network must be connected to the Internet to support

communicating via email with people on other networks.

As e-commerce continues to develop, many retailers are likely to maintain some type of "brick-and-mortar" store or physical location primarily because

consumers expect integrated shopping experiences that include face-to-face options.

Sales managers must identify the customer leads that best fit the company's goals. CRM assists in this aspect of a company's sales process, which is known as

customer qualification.

The information needed to calculate share of customer is provided, in large part, by

customer relationship management systems.

What is one of the greatest risks of an organization storing customer data?

data breaches

The purpose of the application protocol layer of TCP/IP is to

define how email programs and other software communicate within and across networks.

A company has an excess of puffer jackets at the end of the season that it wants to sell quickly. In order to quickly sell this excess inventory, they send out emails to customers currently in their database. However, they want to determine what type of sale their customers find most motivating, so they send out three different emails with different discounts (BOGO free, 50% a purchase over $100, or free expedited shipping). The information gained during this campaign will be tracked, and customers who made purchases will receive similar email offers in the future. What type of CRM strategy is the company using?

demonstrating the value of CRM

The __________ is the interest rate that is actually earned or paid on an investment, loan, or other financial instrument due to the result of compounding interest over a given time period.

effective interest rate

An ordinary annuity is a series of __________ payments made at the end of consecutive periods over a fixed length of time.

equal

hich cryptocurrency offers a blockchain-based platform that can be used to develop decentralized applications?

ethereum

One benefit of using a CRM system to segment a market (rather than another type of market segmentation tool) is that a good CRM tool

facilitates using the company's own, collected data about customers.

Time Value of Money (TVM) is one of the most basic fundamentals in __________.

finance

The key feature of Web 2.0 that allows users to collectively classify information, such as by tagging websites and online images, is called

folksonomy

Vector and raster files are

geographic data

How do businesses ultimately benefit from using a CRM to identify the highest revenue customers in a target market, before developing a marketing campaign?

greater return on investment

Which level of share of wallet means that existing customers are spending more to purchase products or services from one organization than they are from direct or indirect competitors?

high share of wallet

A new app was released providing consumers with digital coupons for products the consumer indicates they frequently purchase. The app gives different users coupons with different values and shares purchasing as well as demographic information with the product manufacturer. Under what circumstances would the information sharing with product manufacturers be ethical?

if the app's terms of service indicated who they would be sharing information with and what information would be shared

According to research by Risk Based security, there were 2037 publicly reported data breaches

in the first half of 2020.

An educational startup has already written its proprietary "Homework Helper" code, using AI to help high school students with homework. While their data storage needs are currently small, they expect their needs to grow exponentially as they increase their user base. Which of the following could help them with this?

infrastructure as a service (IaaS)

An email that appears to be from a legitimate company is most likely to be a social engineering cybersecurity attack if

it contains a link to a free offer that seems too good to be true.

An online photo printing company can temporarily lose its e-commerce ubiquity if

its website crashes due to a coding error or attack by hackers.

One surveillance technology that relies on how the user enters data is a

keylogger.

The amount of time that passes between when a device is asked to perform and when it completes the task is known as

latency.

Descriptive data about a customer includes categories such as

lifestyle and career.

Built on real-time geodata and information provided from wireless mobile devices, ________ are widely used in m-commerce.

location-based services (LBS)

Ransomware basically holds a target hostage because it

makes the target's own data inaccessible.

What type of computer users are considered miners?

people who validate cryptocurrency transactions on the digital ledger

E-commerce ________ includes creating marketing messages that contain the individual's name, appeal to his/her interests, and take their purchase behavior into account.

personalization

The organizations likely to benefit the most from the global reach of e-commerce are those that

previously depended on foot traffic into one physical store to sell their products.

While using her phone's GPS to drive to her vacation destination, Siena needs to find a gas station. She enters into her phone's GPS that she is looking for a gas station that is no more than five miles away from the route she is currently on. What is this an example of?

proximity location

A cybersecurity exploit allows a hacker or intruder to

remotely access a network, gain privileges, and make unauthorized changes.

Which step in securing customer data ensures proper management of firewalls and routers?

server security

With Web 3.0, everyday devices connected to the Web will become

smarter and more capable, given the improved support for the Internet of Things (IoT).

If an organization's automated backup system is vulnerable to data loss or corruption, its cybersecurity vulnerability is a weakness or flaw in its

software

As of 2020, all legislation that has been passed to protect elections from cybersecurity threats are part of

state-specific cybersecurity laws.

For laptops and tablets to use a LAN to connect to the Internet wirelessly,

the LAN device hosting the ISP connection must act as a wireless access point.

The e-commerce company with the highest revenue is based in which country?

the U.S.


Ensembles d'études connexes

Chapter 15: Partly Developed States

View Set

chapter 6. cost-volume-profit relationships

View Set

AD Banker Life & Health Chapter 3

View Set

Geology Final (All tests combined)

View Set