PLS 21 Lecture Exam 2
What type of file does the (base) need to upload datasheet in RSTUDIO? .java .jpeg .png .csv
.csv
How many data points are necessary in order to use linear regression in predictive analytics? 10 20 30 as many as you want
30
How many stages of the data warehousing process are there? 1 3 5 7
5
Almost _________ percent of ransomware victims pay the ransom and hackers _________ decrypt the data as promised. 50; do not 95; do 50; do 95; do not
50; do
how many bits in a byte? 32 4 8 16
8
The 80/20 rule means that if the software meets _________ percent of the company's needs, then the company should modify _________ percent of its business processes to use the software. 20; 80 80; 20 80; 80 20; 20
80; 20
What is malware? Choose the best option. A malicious software A malicious software consisting of a program a friendly software A friendly software consisting of a program
A malicious software consisting of a program
_________ did not file comments with the FCC opposing Marriott's Wi-Fi blocking plan. Microsoft Google Amazon Consumer Electronics Association
Amazon
What is ERP? - An integrated approach to identifying, acquiring and maintaining customers. - A relational or multi-dimensional database that may consume hundreds of gigabytes or even terabytes of disk storage - Supports management-critical tasks through analytical investigation of complex data associations captured in data warehouses - client links to the application server which then initiates a second connection to the database server
An integrated approach to identifying, acquiring and maintaining customers
_________ comprises the vast majority of e-commerce by volume. B2C B2B B2E C2B
B2B
Analytical CRM systems provide ________ by analyzing customer behavior and perceptions. CIC ERP SFA BI
BI
What is not as essential stage of data warehousing process? Modeling data for the data warehouse Extracting data from operational databases Cleansing extracted data Backing up data to an offline server.
Backing up data to an offline server.
Which of the following is NOT a problem associated with Big Data? Big Data can be structured, unstructured, or semi-structured. Big Data can come from untrusted sources. Big Data lacks quality. Big Data changes.
Big Data can be structured, unstructured, or semi-structured
The most current form of ransomware demands payment in the form of _________. credit cards Bitcoins Paypal transactions cash
Bitcoins
________ is an approach that integrates various automated factory systems. CIM TPS MRP CRM
CIM
Which of the following statements concerning CRM is not true? - CRM builds sustainable long-term relationships with customers - CRM is designed for companies to interact with their customers as a group. - CRM helps companies acquire new customers. - CRMs help keep repeat customers
CRM is designed for companies to interact with their customers as a group.
Which of the following statements concerning CRM is not true? - CRM is designed for companies to interact with their customers as a group. - CRM builds sustainable long-term relationships with customers - CRMs help keep repeat customers - RM helps companies acquire new customers.
CRM is designed for companies to interact with their customers as a group.
What does batch processing do? - Processes data in batches - Collects data from transactions as they occur and places them into batches - Processes data as it comes - Processes data at the end of the day in batches
Collects data from transactions as they occur and places them into batches
________________ development is closely linked with the idea of web services and service-oriented architectures. Component-based Object-oriented Agile End-user
Component-based
Which of the following is NOT a reason Priceline.com moved to a new customer contact center? Customer growth Contact options Competition Cost
Cost
________ is the marketing of additional related products to customers based on a previous purchase. Bundling Cross-selling Downselling Upselling
Cross-selling
Which is NOT one of the four most common approaches to cost-benefit analysis? Net present value method return on investment Cumulative dollar method business case approach
Cumulative dollar method
What does CRM stand for? Central Relationship Managing Customer Real Management Customer Relationship Management Consumer Relationship Management
Customer Relationship Management
What does CRM stand for? Customer Relationship Management Consumer Relationship Management Consumer Retail Management Customer Retail Management
Customer Relationship Management
What is CRM? Customer Relationship Management Cost Relationship Management Cost Relationship Manner None of these above
Customer Relationship Management
What are the two major components of operational CRM systems ? - Customer-facing applications and customer-touching applications - customer service and support - none of these -products and services
Customer-facing applications and customer-touching applications
_________ refers to malicious acts in which attackers use a target's computer systems to cause physical, real-world harm or severe disruption, often to carry out a political agenda. A SCADA attack Espionage Identity theft Cyberterrorism
Cyberterrorism
Which of the following is NOT a role of DBMS? DBMS is the intermediary between the user and the database DBMS enables data to be shared DBMS integrates many users' views of the data DBMS stores data in private
DBMS stores data in private
Hackers would use a botnet to perform a _________. DDoS a Trojan horse a logic bomb virus
DDoS
A(n) _________ is located between two firewalls. spamware detector DMZ ERP anti-malware system
DMZ
Ashley Madison's data was first released on the _________ by ________. Web; Anonymous Dark Web; Anonymous Dark Web; The Impact Team Web; The Impact Team
Dark Web; The Impact Team
What is metadata? - Data about data; provides description of data characteristics and relationships in data - A system that controls data and access to data - Data kept by an organization regarding its staff - A collection of programs that organizes and sorts data
Data about data; provides description of data characteristics and relationships in data
What is not a core elements of On Line Transaction Processing Business Planning Logistics Data running Shop Floor Control
Data running
Which is NOT a problem of Non-ERP systems? - In-house design limits connectivity outside the company - Strategic decision-making not supported - Data warehouses must be created and maintained separately from the operational databases - Limits ability to engage in process reengineering
Data warehouses must be created and maintained separately from the operational databases
Which firm was the #1 PC vendor in 2000? Acer HP Huawei Dell
Dell
ERP systems that include administrative, sales, marketing, and HR processes are referred to as _________. ERP III ERP IV ERP I ERP II
ERP II
________ are designed to correct a lack of communication among _________. FAIS; TPS FAIS; ERP ERP; FAIS ERP; TPS
ERP; FAIS
_________ is an access control. Encryption A company gate A firewall RFID
Encryption
_________ is an approach in which the organization's end users develop their own applications with little or no formal assistance from the IT department. JAD RAD Agile development End-user development
End-user development
What does ERP stand for? Enterprise reports planing Enterprise resource planning Event-related potential Enterprise rewards planning
Enterprise resource planning
_________ occurs when an unauthorized individual attempts to gain illegal access to organizational information. Alien software Identity theft Espionage Information extortion
Espionage
_________ is the third step in the general framework for ethics. Act and reflect on the outcome of your decision Make a decision and test it Evaluate alternative actions Recognize an ethical issue Get the facts
Evaluate alternative actions
_________ costs are those costs that remain the same regardless of any change in the company's activity level. The CIO's salary is an example of a _________ cost. Variable; variable Variable; fixed Fixed; variable Fixed; fixed
Fixed; fixed
Which of the following data is NOT currently collected by usage-based car insurance companies? Mileage Speed GPS Time of day
GPS
What does GIS stands for? Graphic Interface Source Graphic Information System Geographic Interface Source Geographic Information System
Geographic Information System
Which of the following is an accuracy issue? - What information about oneself should an individual be required to reveal to others? - What information does a person or an organization have a right to obtain, under what conditions, and with what safeguards? - How should we handle illegally copying copyrighted software? - How can we ensure that the information will be processed properly and presented accurately to users?
How can we ensure that the information will be processed properly and presented accurately to users?
Which of the following is an accessibility issue? - How can we ensure that errors in databases, data transmissions, and data processing are accidental and not intentional? - What information about individuals should be kept in databases, and how secure is the information there? - Under what circumstances can one use proprietary databases? - How much should companies charge for permitting access to information in their databases?
How much should companies charge for permitting access to information in their databases?
Africa collaborated with ________ to stop the Ebola virus outbreak in 2013 and 2014. IBM Amazon Google Microsoft
IBM
The _________ consists of a clear set of projects that the IS department and the functional area managers will execute in support of the IT strategic plan. IT architecture organization strategic plan organization mission IS operational plan
IS operational plan
________ originally managed Priceline.com's customer management system. HR Product management IT Marketing
IT
The _________ is a set of long-range goals that describe the IT infrastructure and identify the major IT initiatives needed to achieve the organization's goals. IT strategic plan IT strategic plan IT status poll LR IT
IT strategic plan
How does a computer represent data? In the form of 0's and 1's. Exactly as the the data is written. As a series of numbers ranging from 0-9. In the form of -1's and 0's.
In the form of 0's and 1's.
Which of the following does NOT contribute to the increasing vulnerability of organizational information resources? - International organized crime taking over cybercrime - Smaller, faster, cheaper computers and storage devices - Lack of management support - Increasing skills necessary to be a computer hacker - Today's interconnected, interdependent, wirelessly networked business environment
Increasing skills necessary to be a computer hacker
Audits could provide assurance covering the areas of all of these EXCEPT process integrity application security Infraestructure security implementation integrity
Infraestructure security
Which of the following is an advantage of JAD? Bypasses the IS department and avoids delays Enforces quality by maintaining standards Involves many users in the development process Works wells for ill-defined problems
Involves many users in the development process
Which of the following is NOT an advantage of prototyping? Helps clarify user requirements Promotes close working relationship between systems developers and users Is practical with a very large number of users Helps verify the feasibility of the design
Is practical with a very large number of users
How can Hardware and Software be a basic security method? - By downloading them on your computer - It keeps your computer safe and sound - It contains firewall, limits router settings, antivirus, use group policies, and automatic updates - Makes storage for your files
It contains firewall, limits router settings, antivirus, use group policies, and automatic updates
________ is the customer's potential revenue stream over a number of years. Market capitalization Lifetime value Customer churn Customer life cycle
Lifetime value
What is an application portfolio? List of existing and potential IT applications a bunch of apps in a folder Apps you develop for a company all of the above
List of existing and potential IT applications
________ is the correct evolution of POM planning. ERP MRP MRP II MRP ARP ERP ERP ARP MRP MRP MRP II ERP
MRP MRP II ERP
________ is part of the ________ process and occurs when the company is trying to increase its inventory. Make-to-stock; production Make-to-stock; procurement Make-to-order; production Make-to-order; procurement
Make-to-stock; production
_____ is NOT a statistical tool used for predictive analytics. Data mining Linear regression Logistic regression Multidimensional analysis
Multidimensional analysis
Data marts and data warehouses typically use ________. RFID OLAP OLTP ERP
OLAP
If you analyze a data cube, this is an example of using data mining. DSS. OLAP. OLTP.
OLAP
Most organizations design TPS to process transactions as soon as they occur. This is called _________. OLAP OLTP source data processing batch processing
OLTP
________ CRM systems are hosted by an external vendor in the vendor's data center. On-demand Social On-premise Mobile
On-demand
What does OLAP stand for? Online Analytical Processing Online Access Point Online Assist Port Online Agent Processor
Online Analytical Processing
What does OLAP stand for? Online Learning Application Program Online Linguistic Analytical Processing Online Analytical Program Online Analytical Processing
Online Analytical Processing
What type of implementation introduces components of the new system, such as individual modules, in stages? Pilot conversion direct conversion Phased conversion systems conversion
Phased conversion
What is an underlying computer system on which application programs can run. Google Drive Microsoft word Platform
Platform
What did Moore's law predict - Predicted in 1965 that the processing power of silicon chips would double every 18 months - Predicted in 1965 that the processing power of silicon chips would triple every 18 months - Predicted in 1955 that the power of silicon chips would double every year - Predicted in 1965 that the processing power of silicon chips would double every 3 months
Predicted in 1965 that the processing power of silicon chips would double every 18 months
Which is Moore's law? - Predicted in 1965 that the processing power of silicon chips would double every 18 months - The value of a network grows roughly in line with the square of the number of its users - Geared for economics and business - Is often used for software application services
Predicted in 1965 that the processing power of silicon chips would double every 18 months
Which of the following is true of prescriptive analytics? - The statistical procedures involved in prescriptive analytics include linear and multiple regression. - Prescriptive analytics do not require any prior analytics or analysis. - Prescriptive analytics recommend one or more courses of action and show the likely outcome of each decision. - all of the above
Prescriptive analytics recommend one or more courses of action and show the likely outcome of each decision.
______ analytics require _______ analytics. Descriptive; predictive Descriptive; prescriptive Predictive; prescriptive Prescriptive; predictive
Prescriptive; predictive
Which is an advantage of prototyping? Promotes genuine user participation. System is built too quickly and results in low quality. May encourage inadequate problem analysis May generate confusion about the system.
Promotes genuine user participation.
_____ is a language and environment for statistical computing and graphics R excel IT Microsoft word
R
_______ is a decisional role. Analyzer Leader Liaison Resource allocator
Resource allocator
________ is the component of an operational CRM system that automatically records all of the components in a sales transaction process. CMA CIC SFA JIT
SFA
________ is the most popular query language used for interacting with a database. TPS RFID SQL ETL
SQL
________ is the best-known on-demand CRM vendor. SAP Microsoft Salesforce Oracle
Salesforce
________ is part of the ________ process and involves sending goods that are in the warehouse to customers. Sell-from-stock; fulfillment Configure-to-order; fulfillment Sell-from-stock; procurement Configure-to-order; procurement
Sell-from-stock; fulfillment
What are the 6S'? Software, Structure, Scale, Speed, Schedule, Story Speed, Simplicity, Standard, Scope, Structure, Story Speed, Simplicity, Scope, Schedule, Structure, Story None of the Above
Speed, Simplicity, Scope, Schedule, Structure, Story
_________ collects personal information about users without their consent. Spamware Adware Spyware Marketware
Spyware
Which is not an example of short-range wireless networks? Bluetooth Ultra-wideband Near-field communication Super Wifi
Super Wifi
________ is an extended ERP module. HR management Operations management Financial management Supply chain management
Supply chain management
_________ are IS professionals who specialize in analyzing and designing information systems. Users Technical specialists Systems analysts Programmers
Systems analysts
A URL that begins with https uses _________. TLS ERP VPN DMZ
TLS
What is information literacy? - Technical knowledge and skill in the use of computers and information technology. - The ability to use computers to gather data and/or information. - A series of applications that work together to meet a need, or to increase core productivity. - The applications and programs needed to start, run and perform tasks on your computer.
The ability to use computers to gather data and/or information.
________ refers to erratic shifts in orders up and down the supply chain. The bullwhip effect JIT VMI Vertical integration
The bullwhip effect
which one is not the Advantages of the buy options? - Many different types of off-the-shelf software are available. - The company can try out the software before purchasing it. - The company can save much time by buying rather than building. - The company can refund what it is getting after it fails to invests in the product.
The company can refund what it is getting after it fails to invests in the product.
The term "data rot" refers to: Data that are irrelevant or contain errors. The deterioration of the medium on which the data are stored. Data that no longer serve a purpose. All of these
The deterioration of the medium on which the data are stored.
What does TPS stand for? Transfer Processing System Transaction Processing System Transfer Protocol System none of the above
Transaction Processing System
TPS stands for... Transaction Processing Systems Transaction Progression System Tariff Processing System Transgression Project System
Transaction Processing Systems
Which one is not an essencial stage of the data warehousing? Cleansing extracted data Transforming data into the database model Loading the data into de data warehouse database Modeling data for the data warehouse
Transforming data into the database model
What is the function of a computer programming compiler? Exports completed code sequences Translates computer readable code to human readable code Translates human readable code to computer readable code Imports unreadable code from the cloud
Translates human readable code to computer readable code
John Hancock partnered with ________, a global wellness company. Vitality TotalWellness Weight Watchers Medifit
Vitality
Which of the following typically connects multiple LANs? WAN LAN Router SDN
WAN
_________ is the most recent example of ethical misbehavior in organizations. Enron Wells Fargo bank Tyco WorldCom
Wells Fargo bank
Which of the following is a privacy issue? - What information about individuals should be kept in databases, and how secure is the information there? - Under what circumstances can one use proprietary databases? - How can we ensure that errors in databases, data transmissions, and data processing are accidental and not intentional? - How much should companies charge for permitting access to information in their databases?
What information about individuals should be kept in databases, and how secure is the information there?
Data bases can not be classified according to number of users database location(s) Expected type and extent of use Workgroup and enterprise databases
Workgroup and enterprise databases
Which of these statements about worms is NOT true? Worms are self-replicating Worms are always attached to another non-malware program Worms do not need to be attached to another program Worms can transmit themselves across networks
Worms are always attached to another non-malware program
You get a new smartphone and throw your old one away without erasing all your data. This is _________ and is an _________ mistake. social engineering; unintentional a human error; unintentional social engineering; intentional a human error; intentional
a human error; unintentional
Which of the following was NOT used in the cyberattack on Ukraine? a logic bomb Spear-phishing a SCADA attack DoS
a logic bomb
What is master data? - a process that spans all organizational business processes and applications. - a set of core data, such as customer, product, employee, vendor, geographic location, and so on, that span the enterprise information systems. - an approach to managing information across an entire organization. - a collection of logically related records.
a set of core data, such as customer, product, employee, vendor, geographic location, and so on, that span the enterprise information systems.
Which of the following is not true about business analysis applications? - a.k.a. Online Transaction Processing (OLTP) - decision support tool for management-critical tasks through analytical investigation of complex data associations - includes decision support, modeling, information retrieval, ad-hoc reporting/analysis, and what-if analysis
a.k.a. Online Transaction Processing (OLTP)
Which is not a fundamental tenets of ethics? responsibility accountability accessibility liability
accessibility
_________ refers to determining who is responsible for actions that were taken. Accountability Answerability Liability Responsibility
accountability
You can check your credit report annually for free through TransUnion, Equifax, and Experian. This allows you to catch signs of identity theft early and note any problems in your credit reports. This is an example of an ethical issue that falls into the category of ________. accessibility property privacy accuracy
accuracy
Which of the following is not a type of report? drill-down comparative advanced key-indicator
advanced
What does the OS do? keeps track of what I/O hardware is attached prioritizes I/O activity communicates with the I/O devices via small programs all of the above
all of the above
The end product of the _________ stage is a set of system requirements. operation investigation design analysis
analysis
Auditing _________ the computer means verifying processing by checking for known outputs using specific inputs. around through into with
around
Overstock's chatbot, called Mila, _________. - automates the simple but time-consuming process of requesting sick leave - allows customers to describe what they are looking for instead of just choosing from standard options - provides a list of recommendations and enables customers to have a real-time dialogue with the bot - asks shoppers to input their skin type and then suggests beauty tips and products tailored to their needs
automates the simple but time-consuming process of requesting sick leave
You decide to purchase SAP but modify it to handle your specific business processes. This is an example of the ________ approach to ERP implementation. vanilla best-of-breed as-is custom
best-of-breed
Place the following members of the data hierarchy in the correct order:
bit - byte - field - record - file - database
Which wall in the management cockpit room projects the performance of internal processes and employees? white black blue red
blue
You are an executive working for a Fortune 500 company. You want to see how each factory floor worker is performing compared to every other worker. You would look at the ________ wall in the Management Cockpit. black blue red white
blue
What is the key feature of ERP? - Smooth and seamless flow of information across organizational boundaries - Standardized environment with shared database independent of applications and integrated applications - Help customers to manage their money more efficiently - both A and B
both A and B
Which of the follow is not a type of software attack? virus worm bug spear phishing
bug
Which is NOT one of the six keys in getting the most of your connectivity? management systems online reference business support collaborative workgroups
business support
A ________ is a group of eight ________. file; fields bit; bytes field; files byte; bits
byte; bits
________ refers to the maximum number of times an instance of one entity can be associated with an instance in the related entity. Data dictionary Business rules Modality Cardinality
cardinality
Data that is located at a single site is which type of database? operational database distributed database centralized database data warehouse
centralized database
Which type of these organizations do most of their sales in the physical world but also conduct e-commerce activities? brick-and-mortar virtual clicks-and-mortar e-government
clicks-and-mortar
When customers access a Web site and make purchases, they generate tracking cookies information clickstream data web data
clickstream data
A _________ site is the least expensive option. hot warm medium cold
cold
Your southern region is not doing very well. You want to know why, so you ask for a special report showing the numbers for the southern region compared to the northern, eastern, and western regions. This is a(n) ________ report. exception routine comparative drill-down
comparative
Which of the following is NOT a use for data mining? Comparing products Detecting fraudulent credit card transactions Forecasting bankruptcy Predicting sales
comparing products
The process for justifying IT investment involves assessing costs, assessing benefits and which third step? Align benefits with the organizations strategic plan Complete IT market research conduct cost-benefit analysis Modify IT strategic plan with daily goals
conduct cost-benefit analysis
________ is an advantage of cloud-based ERP systems. Control Cost Recovery Security
cost
Companies purchase digital dossiers to ________. evaluate the competition engage in electronic surveillance track their own reputations create customer intimacy
create customer intimacy
Amazon's recommender system is an example of ________. downselling cross-selling bundling upselling
cross-selling
A transaction is any business event that generates ________ worthy of being captured and stored in a database. wisdom information knowledge data
data
If you want to know what items customers typically buy together so that you can place them next to each other on the shelf, you would be using data mining. DSS. OLAP. OLTP.
data mining
Data reduction is the conversion of raw _______ into a smaller amount of more useful _______. data; information data; knowledge information; data information; knowledge
data; information
The _________ approach states that the morality of an action is based on whether the action itself is right or wrong under a series of rules, rather than based on the consequences of that action. common good fairness rights deontology utilitarian
deontology
____ are the first step in data reduction and summarizes what has happened in the past descriptive analytics predictive analytics prescriptive analytics structured decisions
descriptive analytics
GIS is a computer-based system for capturing, integrating, manipulating, and displaying data using analytics. dashboards. digitized maps. solar energy.
digitized maps
A _________ conversion involves shutting the old system off and turning the new system on at a certain point in time. pilot phased parallel direct
direct
You use FedEx and UPS to ship your products to customers. This is an example of a(n) ________ activity. upstream downstream irrelevant internal
downstream
You are looking at a sales report from last month. You notice one salesperson's numbers are much lower than the rest, so you click on that person's name to get more details on the products they sold last month. You are using the _______ feature of a dashboard. CSF drill down exception reporting trend analysis
drill down
What allows the user to see data in selective increasing levels of detail? slicing and dicing consolidation drill-down none of the above
drill-down
_________ feasibility determines whether the project is an acceptable financial risk and, if so, whether the organization has the necessary time and money to successfully complete the project. Behavioral Competitive Economic Technical
economic
The European Union's highest court ruled that ________. - court documents should be taken off the Internet after a certain time period - embarrassing material should be removed from search results when requested - publishers need to remove or alter all articles that are no longer relevant - people must remove revealing photographs from the web when requested
embarrassing material should be removed from search results when requested
What is NOT a key feature of ERP? - Smooth and seamless flow of information across organizational boundaries - standardized environment with shared database independent of applications and integrated applications - supported by multi-module application software that help a company manage the important parts of its business in an integrated fashion. - enables the user to examine data from different viewpoints often performed along a time axis to depict trends and patterns.
enables the user to examine data from different viewpoints often performed along a time axis to depict trends and patterns.
Dashboards evolved from enterprise resource planning systems. executive information systems. functional area information systems. transaction processing systems.
executive information systems.
Suppose you work for XYZ Corporation. You know you can contribute 6% of your salary to a 401K and the company will match that 100% after 6 years of service because it is in the employee handbook. This is an example of ________. tacit information explicit knowledge tacit knowledge explicit information
explicit knowledge
Which is not a segment of the supply chain? upstream internal downstream external
external
Which is NOT a type of computer & network security threat? worms rootkit fireware Phishing
fireware
Operational CRM systems support _________-office business processes or processes that _________. front; do not directly interact with customers back; directly interact with customers back; do not directly interact with customers front; directly interact with customers
front; directly interact with customers
Which of these is NOT one of the three characteristics separate Big Data from traditional data? high-volume high-variety high-visibility high-velocity
high-visibility
Answering the question "did this option work as proposed" occurs in the _____ phase of the IDC. choice design intelligence implementation
implementation
What are advantages of a DBMS? improved data sharing Decreased data security lower data integration Improved market integration
improved data sharing
Which of the following is NOT a common type of database? centralized database distributed database information base data warehouse
information base
Which of the following industries grew at more than double the rate of the economy in the early 2000s? informational technologies agriculture media all of these
informational technologies
All the information about you in your university's database is a(n) ________. database instance entity attribute
instance
What is a 4-bytes size of data type? character double integer float
integer
Packing, assembly, or manufacturing are ________ activities. internal irrelevant downstream upstream
internal
SCM systems are ________ systems. extraorganizational intraorganizational interorganizational extraorganizational
interorganizational
Systems _________ addresses the business problem or business opportunity by means of a feasibility study. operation design analysis investigation
investigation
A(n) ________ report summarizes the performance of critical activities. key indicator ad hoc drill-down comparative
key indicator
Which report summarizes the performance of critical activities? ad hoc (on demand) reports drill-down reports key-indicator reports comparative reports
key-indicator reports
Typing in your password to access a system is an example of something the user _________. is knows has does
knows
Organizations typically invest in cloud-based ERP systems because they are _________. more accessible more secure less expensive less error-prone
less expensive
_________ is a legal concept that gives individuals the right to recover the damages done to them by other individuals, organizations, or systems. Accountability Liability Responsibility Answerability
liability
The ________ component of SCM is the most metric-intensive part of the supply chain in which organizations measure quality levels, production output, and worker productivity. source return plan deliver make
make
Databases ________ inconsistency; this means ________. maximize; various copies of the data do not agree minimize; the same data are stored in multiple locations minimize; various copies of the data do not agree maximize; the same data are stored in multiple locations
minimize; various copies of the data do not agree
Normalization is a method for analyzing and reducing a relational database to its most streamlined form to ensure ________ redundancy, ________ data integrity, and optimal processing performance. minimum; minimum maximum; minimum maximum; maximum minimum; maximum
minimum; maximum
Data marts can be implemented ________ compared to data warehouses. more quickly It depends on the situation. at the same pace less quickly
more quickly
Above all, you want to implement the cheapest CRM system available. You are willing to accept any risks associated with this, so you would want to implement a(n) ________ CRM system. mobile open-source social on-premise
open-source
Europeans and privacy advocates prefer the _________ model of informed consent. sign-out opt-out opt-in sign-up
opt-in
The _________ model of informed consent permits the company to collect personal information until the customer specifically requests that the data not be collected. opt-in sign-out sign-up opt-out
opt-out
A circle with a "chicken leg" to the entity represents the ________ cardinality symbol. mandatory single optional single optional many mandatory many
optional many
A _________ conversion involves running the old and new systems at the same time. pilot direct phased parallel
parallel
A _________ conversion introduces components of the new system in stages. parallel phased direct pilot
phased
Organizations must have a strategy for managing all the resources that are involved in meeting customer demand for their product or service. This strategy is developed in the ________ component of SCM. make return plan deliver source
plan
A _______________ is an underlying computer system on which application programs can run. stage container virtual machine platform
platform
You would use optimization or simulation for ______ analytics. descriptive predictive prescriptive useful
prescriptive
Which of the following is not a characteristic of data warehouses or subject? integrated organized by business dimension or subject nonvolatile processed online as they occur
processed online as they occur
The ________ process originates in the warehouse department and ends in the accounting department. fulfillment production procurement marketing
procurement
The _________ represents the business users and any other stakeholders in the project. scrum master program developer team product owner
product owner
Southwest Airlines utilized a(n) ________ CRM system to rearrange a customer's flight schedule to get to her comatose son. real-time mobile open-source social
real-time
_________ is the first step in the general framework for ethics. Evaluate alternative actions Recognize an ethical issue Get the facts Make a decision and test it Act and reflect on the outcome of your decision
recognize an ethical issue
A ________ generally describes an entity. field byte record file
record
Database systems minimize ________. redundancy security integrity independence
redundancy
In the ________ component of SCM, supply chain managers create a responsive and flexible network for receiving defective, returned, or excess products back from their customers, as well as for supporting customers who have problems with delivered products. deliver plan source return make
return
Jana is a mobile startup designed to ________. - give app developers free access to other apps - charge users less money to use mobile data than they have to pay their telecommunication company - offer free smartphones to people who make less than 20 cents an hour in China - reward users with data in exchange for collecting their personal information when sampling apps
reward users with data in exchange for collecting their personal information when sampling apps
The pursuit of the "American dream" and our ability to choose our religious orientation is a reflection of the _________ approach. common good deontology utilitarian fairness rights
rights
Which of the following is NOT a risk-mitigation strategy? risk acceptance risk warranty risk limitation risk transference
risk warranty
You recently inherited an Alvin and The Chipmunks "A Chipmunk Christmas" record. Since you don't have a record player, you need to find a way to convert the record into a CD. This is an example of data ________. clickstreaming rot scattering degradation
rot
Customer relationship management (CRM), as an application that must be included in a true enterprise resource planning (ERP) product, includes ________. HR management capacity planning Cash management sales prospecting
sales prospecting
The fulfillment process originates in the ________ department and ends in the ________ department. accounting; sales warehouse; warehouse sales; accounting warehouse; accounting
sales; accounting
You are a jeweler who wants to make sure you have the maximum number of diamonds for sale. You notice that the number of diamonds available drops more when the size is relevant versus when the color is relevant. By comparing these factors, you are conducting a(n) _____ analysis. affinity goal-seeking sensitivity what-if
sensitivity
Legacy systems were developed as _________. DSS Integrating systems Silos ERP
silos
SaaS is a method of delivering _________ in which a vendor hosts the applications and provides them as a service to customers over a network, typically the internet. hardware a platform an architecture software
software
Which is not a characteristic of Big Data? variety structure volume velocity
structure
As a purchasing manager, you have to purchase widgets every week to replenish your inventory. This is a(n) ________ decision. midstructured semistructured structured unstructured
structured
You are an employee in Inside Sales. This means you take calls and address customer issues like entering orders, updating orders, and providing order status reports. This is a(n) _____ task and a(n) _______ decision. structured; management control structured; operational control unstructured; management control unstructured; operational control
structured; operational control
Out of the 6s in Powerpoint which one is false? speed story schedule successful
successful
________ is the cumulative store of subjective or experiential learning. Explicit knowledge Explicit information Tacit information Tacit knowledge
tacit knowledge
Capital One's insourcing initiative meant it had to build its reputation as a _________ company. marketing technology banking human resources
technology
Which of these is not a step in the decision making process? intelligence design choice testing
testing
You want to make sure your entire organization is using a single data warehouse instead of using a data mart for every department. This is an example of - the development of infrastructure to support enterprise-wide analytics. - the development of one or a few related analytics applications. - support for maintaining organizational strategy. - support for organizational transformation.
the development of infrastructure to support enterprise-wide analytics.
Data marts are typically associated with - the development of infrastructure to support enterprise-wide analytics. - the development of one or a few related analytics applications. - support for maintaining organizational strategy. - support for organizational transformation.
the development of one or a few related analytics applications.
Management is a process by which an organization achieves its goals (called ______) through the use of resources (called _______). the input; inputs the input; outputs the output; inputs the output; outputs
the output; inputs
Information is: raw facts data provided by database analysis the result of processing raw data building blocks of data
the result of processing raw data
A _________ is an intellectual work that is not based on public information. copyright trade secret patent trademark
trade secret
If you shift your risk by using other means to compensate for the loss like purchasing insurance, you have implemented a risk _________ strategy. acceptance avoidance transference limitation
transference
Industry experts estimate that 80-90 percent of data in an organization is ________. structured part-structured unstructured semi-structured
unstructured
Knowledge management is a process that helps organizations manipulate important knowledge that comprises part of the organization's memory, usually in a(n) ________ format. part-structured semi-structured structured unstructured
unstructured
If a company doesn't want to write any computer code, it would choose to ________. use a prewritten application outsource the application custom-write an entire application customize a prewritten application
use a prewritten application
Which ethical framework provides least harm? utilitarian fairness approach rightd approach common good approach
utilitarian
With the ________ approach to on-premise ERP implementation, a company implements a standard ERP package using the package's built-in configuration options. vanilla best-of-breed as-is custom
vanilla
What is the most important type of object in R? vectors matrices lists functions
vectors
What does VMI stand for? vendor‐managed inventory Very Modern Interaction Vertical Management IT Vex Major IT
vendor‐managed inventory
Containers are another step in the development of _________ technology. cloud computing architecture virtual customized
virtual
_________ is a remote attack requiring user action. A logic bomb A Trojan horse Virus DoS
virus
A _________ site typically does not include the actual application the company needs to get the business back up and running immediately. warm hot cold medium
warm