Computers in Tech Midterm 2

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Almost ______ percent of ransomware victims pay the ransom and hackers ______ decrypt the data as promised.

50; do

Analytical CRM systems provide _____ by analyzing customer behavior and perceptions.

BI

______ is an approach that integrates various automated factory systems.

CIM

Hackers would use a botnet to perform a

DDoS

Which of the following data is NOT currently collected by usage-based car insurance companies?

GPS

Africa collaborated with ________ to stop the Ebola virus outbreak in 2013 and 2014.

IBM

______ is the correct evolution of POM planning.

MRP MRP II ERP

_____ is the component of an operational CRM system that automatically records all of the components in a sales transaction process.

SFA

A URL that begins with https uses

TLS

______ is the cumulative store of subjective or experiential learning.

Tacit knowledge

______ is the most recent example of ethical misbehavior in organizations.

Wells Fargo bank

Which of the following was NOT used in the cyberattack on Ukraine?

a logic bomb

_____ did not file comments with the FCC opposing Marriott's Wi-Fi blocking plan.

amazon

The end product of the _____ stage is a set of system requirements.

analysis

Auditing _____ the computer means verifying processing by checking for known outputs using specific inputs.

around

Overstock's chatbot, called Mila,

automates the simple but time-consuming process of requesting sick leave

A ____ site is the least expensive option.

cold

If you want to know what items customers typically buy together so that you can place them next to each other on the shelf, you would be using

data mining

Data reduction is the conversion of raw _____ into a smaller amount of more useful ______.

data; information

_____ feasibility determines whether the project is an acceptable financial risk and, if so, whether the organization has the necessary time and money to successfully complete the project.

economic

_____ is an access control.

encryption

Operational CRM systems support ____ - office business processes or processes that ____

front; directly interact with customers

Which of the following is an accuracy issue?

how can we ensure that the information will be processed properly and presented accurately to users?

Which of the following is an accessibility issue?

how much should companies charge for permitting access to information in their databases?

You get a new smartphone and throw your old one away without erasing all your data. This is _____ and is an _____ mistake

human error; unintentional

Answering the question "did this option work as proposed" occurs in the _____ phase of the IDC

implementation

Packing, assembly, or manufacturing are ____ activities.

internal

SCM systems are ______ systems.

interorganizational

_____ is part of the _____ process and occurs when the company is trying to increase its inventory.

make-to-stock; production

Normalization is a method for analyzing and reducing a relational database to its most streamlines form to ensure ______ redundancy, _____ data integrity, and optimal processing performance.

minimum; maximum

Data marts can be implemented ________ compared to data warehouses.

more quickly

_____ is NOT a statistical tool used for predictive analytics.

multidimensional analysis

____ CRM systems are hosted by an external vendor in the vendor's data center.

on-demand

Above all, you want to implement the cheapest CRM system available. You are willing to accept any risks associated with this, so you would want to implement a(n) _____ CRM system.

open-source

Europeans and privacy advocates prefer the _____ model of informed consent.

opt-in

The ____ model of informed consent permits the company to collect personal information until the customer specifically requests that the data not be collected.

opt-out

A circle with a "chicken leg" to the entity represents the _______ cardinality symbol.

optional many

A ______ conversion involves running the old and new systems at the same time.

parallel

A _____ conversion introduces components of the new system in stages.

phased

Organizations must have a strategy for managing all the resources that are involved in meeting customer demand for their product or service. This strategy is developed in the ____ component of SCM.

plan

A _____ is an underlying computer system on which application programs can run.

platform

You would use optimization or simulation for ______ analytics.

prescriptive

______ analytics require ______ analytics.

prescriptive; predictive

The ______ process originates in the warehouse department and ends in the accounting department.

procurement

The _____ represents the business users and any other stakeholders in the project.

product owner

________ is the first step in the general framework for ethics.

recognize an ethical issue

A ______ generally describes an entity.

record

Database systems minimize

redundancy

______ is a decisional role.

resource allocator

In the _____ component of SCM, supply chain managers create a responsive and flexible network for receiving defective, returned, or excess products back from their customers, as well as for supporting customers who have problems with delivered products.

return

The pursuit of the "American dream" and our ability to choose our religious orientation is a reflection of the _____ approach.

rights

You recently inherited an Alvin and the Chipmunks "A Chipmunk Christmas" record. Since you don't have a record player, you need to find a way to convert the record into a CD. This is an example of data

rot

You are a jeweler who wants to make sure you have the maximum number of diamonds for sale. You notice that the number of diamonds available drops more when the size is relevant versus when the color is relevant. By comparing these factors, you are conducting a(n) _____ analysis.

sensitivity

Legacy systems were developed as

silos

SaaS is a method of delivering ______ in which a vendor hosts the applications and provides them as a service to customers over a network, typically the internet.

software

_____ collects personal information about users without their consent.

spyware

As a purchasing manager, you have to purchase widgets every week to replenish your inventory. This is a(n) ______ decision

structured

You are an employee in Inside Sales. This means you take calls and address customer issues like entering orders, updating orders, and providing order status reports. This is a(n) ____ task and a(n) _____ decision.

structured; operational control

Considering the following tables, _______ is a primary key.

student table: ID

_______ is an extended ERP module.

supply chain management

_____ are IS professionals who specialize in analyzing and designing information systems.

systems analysts

Captial One's insourcing initiative meant it had to build its reputation as a ______ company.

technology

_____ refers to erratic shifts in orders up and down the supply chain.

the bullwhip effect

You want to make sure your entire organization is using a single data warehouse instead of using a data mart for every department. This is an example of

the development of infrastructure to support enterprise-wide analytics

Data marts are typically associated with

the development of one or a few related analytics applications

Management is a process by which an organization achieves its goals (called ____) through the use of resources (called _____)

the output; inputs

A ______ is an intellectual work that is not based on public information.

trade secret

If you shift your risk by using other means to compensate for the loss like purchasing insurance, you have implemented a risk ______ strategy.

transference

Industry experts estimate that 80-90 percent of data in an organization is

unstructured

Knowledge management is a process that helps organizations manipulate important knowledge that comprises part of the organization's memory, usually in a(n) ________ format.

unstructured

If a company doesn't want to write any computer code, it would choose to ______

use a prewritten application

With the ______ approach to on-premise ERP implementation, a company implements a standard ERP package using the package's built-in configuration options.

vanilla

Containers are another step in the development of ____ technology.

virtual

______ is a remote attack requiring user action.

virus

John Hancock partnered with ____, a global wellness company.

vitality

A _____ site typically does not include the actual application the company needs to get the business back up and running immediately.

warm

Which of the following is a privacy issue?

what information about individuals should be kept in databases, and how secure is the information there?

The 80/20 rule means that if the software meets ____ percent of the company's needs, then the company should modify _____ percent of its business processes to use the software.

80; 20

A(n) ______ is located between two firewalls.

DMZ

ERP systems that include administrative, sales, marketing, and HR processes are referred to as _____.

ERP II

______ are designed to correct a lack of communication among ______.

ERP; FAIS

The _____ consists of a clear set of projects that the IS department and the functional area managers will execute in support of the IT strategic plan.

IS operational plan

_____ originally managed Priceline.com's customer management system.

IT

Data marts and data warehouses typically use

OLAP

If you analyze a data cube, this is an example of using

OLAP

Most organizations design TPS to process transactions as soon as they occur. This is called

OLTP

_______ is the most popular query language used for interacting with a database.

SQL

______ refers to determining who is responsible for actions that were taken.

accountability

You can check your credit report annually for free through TransUnion, Equifax, and Experian. This allows you to catch signs of identity theft early and note any problems in your credit reports. This is an example of an ethical issue that falls into the category of

accuracy

You decide to purchase SAP but modify it to handle your specific business processes. This is an example of the _______ approach to ERP implementation.

best-of-breed

Which of the following is NOT a problem associated with Big Data?

big data can be structured, unstructured, or semi-structured

The most current form of ransomware demands payment in the form of

bitcoins

You are an executive working for a Fortune 500 company. You want to see how each factory floor worker is performing compared to every other worker. You would look at the _______ wall in the Management Cockpit.

blue

A ______ is a group of eight _______.

byte; bits

______ refers to the maximum number of times an instance of one entity can be associated with an instance in the related entity.

cardinality

Your southern region is not doing very well. You want to know why, so you ask for a special report showing the numbers for the southern region compared to the northern, eastern, and western regions. This is a(n) ________ report.

comparative

Which of the following is NOT a use for data mining?

comparing products

_____ development is closely linked with the idea of web services and service-oriented architectures.

component-based

Which of the following is NOT a reason Priceline.com moved to a new customer contact center?

cost

______ is an advantage of cloud-based ERP systems.

cost

Companies purchase digital dossiers to

create customer intimacy

Amazon's recommender system is an example of

cross-selling

_____ is the marketing of additional related products to customers based on a previous purchase.

cross-selling

_____ refers to malicious acts in which attackers use a target's computer systems to cause physical, real-world harm or sever disruption, often to carry out a political agenda.

cyberterrorism

Ashley Madison's data was first released on the ____ by _____

dark web; the impact team

A transaction is any business event that generates _______ worthy of being captured and stored in a database.

data

The ____ approach states that the morality of an action is based on whether the action itself is right or wrong under a series of rules, rather than based on the consequences of that action.

deontology

GIS is a computer-based system for capturing, integrating, manipulating, and displaying data using

digitized maps

A _____ conversion involves shutting the old system off and turning the new system on at a certain point in time.

direct

You use FedEx and UPS to ship your products to customers. This is an example of a(n) _____ activity.

downstream

You are looking at a sales report from last month. You notice one salesperson's numbers are much lower than the rest, so you click on that person's name to get more details on the products they sold last month. You are using the ______ feature of a dashboard.

drill down

The European Union's highest court ruled that

embarrassing material should be removed from search results when requested

_____ is an approach in which the organization's end user develop their own applications with little or no formal assistance from the IT department.

end-user development

_____ occurs when an unauthorized individual attempts to gain illegal access to organizational information.

espionage

_____ is the third step in the general framework for ethics.

evaluate alternative actions

Dashboards evolved from

executive information systems

Suppose you work for XYZ Corporation. You know you can contribute 6% of your salary to a 401K and the company will match that 100% after 6 years of service because it is in the employee handbook. This is an example of

explicit knowledge

_____ costs are those costs that remain the same regardless of any change in the company's activity level. The CIO's salary is an example of a _____ cost.

fixed; fixed

Which of the following does NOT contribute to the increasing vulnerability of organizational information resources?

increasing skills necessary to be a computer hacker

All the information about you in your university's database is a(n)

instance

Systems ____ addresses the business problem or business opportunity by means of a feasibility study.

investigation

Which of the following is an advantage of JAD?

involves many users in the development process

A(n) _______ report summarizes the performance of critical activities

key indicator

Typing in your password to access a system is an example of something the user

knows

Organizations typically invest in cloud-based ERP systems because they are ______

less expensive

______ is a legal concept that gives individuals the right to recover the damages done to them by other individuals, organizations, or systems.

liability

______ is the customer's potential revenue stream over a number of years.

lifetime value

The _____ component of SCM is the most metric-intensive part of the supply chain in which organizations measure quality levels, production output, and worker productivity.

make

Databases ________ inconsistency; this means _________

minimize; various copies of the data do not agree

Southwest Airlines utilized a(n) ____ CRM system to rearrange a customer's flight schedule to get to her comatose son.

real-time

Jana is a mobile startup designed to

reward users with data in exchange for collecting their personal information when sampling apps

The fulfillment process originates in the _____ department and ends in the _____ department.

sales; accounting

_____ is the best-known on-demand CRM vendor.

salesforce

______ is part of the _____ process and involves sending goods that are in the warehouse to customers.

sell-from-stock; fulfillment


संबंधित स्टडी सेट्स

Unit 1 Square Roots and Squares Part1

View Set

FNBSLW 344 Final Exam (Ch 8,9,12)

View Set

3204: Interviewing and communication

View Set

Combo with CLEP American Literature 1 and 6 others

View Set

Chapter 73: Terrorism, Mass Casualty, and Disaster Nursing

View Set

World Civilization 2: Chapter 18 - European Power and Expansion

View Set