MIS module 1-8

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Which of the following statements refer to programs known as spiders, web crawlers, and bots? More than one answer may be correct.

"Good bots" have diverse functions and do not pose security risks. Internet robots are used for both legitimate and malicious purposes. Malicious bots create security risks by compromising a user's control of the computer.

The main tools used by data analysts include which 3 of the following?

- Databases and query languages - Data visualization tools - Spreadsheets

From the following options, identify the risks and challenges that social media information systems (SMISs) present. More than one answer may be correct.

- human resources (HR) risks that SMIS providers and sponsors encounter - challenges that occur due to fast-changing and diverse user communities

Select all of the following scenarios that show interaction between SMIS components. More than one answer may be correct

-A company's information systems (IS) group researches and chooses a program that can deliver content to several social media providers at the same time. -Every day, a social media specialist at a start-up checks the news, plans how and what to tweet, quickly messages a manager, and sends the approved tweets. -Social media providers rely on user data to better serve sponsor organizations.

What are questions a researcher seeks to answer in the study of consumer behavior. More than one answer may be correct.

-How do consumers react to marketing strategies? -How does the acquisition of products affect consumer self-image? -How do consumers make purchasing decisions?

From the following list, select all the primary considerations when developing the goals for a social media information system (SMIS).

-The organization's larger goals for its mission -The organization's purposes for using social media

Providers use SMISs to deliver which of the following kinds of user data to sponsors? More than one answer may be correct.

-content data from user interactions -connection data from user relationships with other sources -data that reveal user behavior and connection patterns

What parts do people play in social media information systems? More than one answer may be correct.

-employees and contributors -platform architects and data scientists

What are basic steps in an organization's use of social media to craft a target marketing strategy? More than one answer may be correct.

-obtain user data from social media platforms -use analytics tools provided by social media tools -create a marketing program that reaches social media users

Which amendment to the U.S. Constitution protects freedom of speech from government censorship?

1st

In order to make understanding and interpretation of SQL queries easier, users have the ability to add comments. The symbol(s) that will tell SQL that an entry is a comment and should not be used in the query is(are) ___.

2 dashes: "- -"

The next evolution in the development of the World Wide Web, Web ___ will include many features and tools that allow individuals to make better use of the billions of web pages on the Internet, the wide array of smartphone applications, and to make the best use of the Internet of Things (IoT).

3.0

In 1979, Professor Michael E. Porter published "How Competitive Forces Shape Strategy" in the Harvard Business Review. In this paper, he described factors that impact businesses. The became known as Porter's ______ forces.

5

The ethical concerns of the digital age can be divided into ___ dimensions

5

The ethical concerns of the digital age can be divided into ___ dimensions (categories).

5

The next generation of mobile connectivity that will provide faster data transfer speeds and enhanced connection reliability. Is called ___ G. It is the fifth-generation wireless technology for digital cellular networks that began wide deployment in 2019.

5

There are ___ basic principles of ethical conduct.

5

Which statement explains the difference between a database and a database management system (DBMS)?

A DBMS is a software program designed to organize and administer databases.

Select three circumstances that describe when one might use mainframe computers.

A company seeking better operational efficiency. An airline taking reservations. A warehouse restocking a recently published book.

User communities rely on web browsers to reach and interact with social media content. What are some types of software that social media providers use? More than one answer may be correct.

A database management system (DBMS) A program that allows access to the system itself Programs that can analyze data according to the site's requirements

A SWOT analysis examimes which 3 of the following?

A firm's internal weaknesses. A firm's external threats. A firm's internal strengths.

Which type of cookie is lost only if deleted or if is created with an expiration date?

A persistent cookie

Which of the following is an example of data in transit? More than one answer may be correct.

A person uses an app on their smartphone to pay a bill. A person transfers documents between their laptop and mobile device.

Which intellectual property is correctly matched with the legal device or tool that protects it?

A portrait that you paint can be copyrighted.

Which of the following is an example of why a database should be accessible through the web?

A small distributor with limited staffing wants customers to be able to track the status of their orders without having to contact a customer service representative. A company has recently scaled its operations so that it competes internationally and needs business partners all over the world to have access to its database. A large portion of a company's workforce are contract workers who work offsite, using their own devices to complete their work.

Why is a target market important to businesses and organizations?

A target market is the group of consumers most likely to purchase an organization's products and services.

What is the correct definition of a cybersecurity exploit?

A tool or technique for taking advantage of a cybersecurity vulnerability to break into a system and cause harm.

Which of the following tasks can businesses perform with the help of in-memory computing? More than one answer may be correct.

Alerting online customers that the desired item is out of stock, before the order is placed Predicting the impact of news on stock prices and conducting immediate transactions Mapping alternate driving routes to help truckers avoid bad weather and traffic jams

Which of the following are examples of an organization using big data and analyzing predictive behavior with the goal of creating new offerings? More than one answer may be selected.

Amazon tracks what people who viewed inflatable water slides ultimately put in their cart and purchased. Facebook tracks which news stories a user clicks on. The Gap tracks which promotional emails people cause people to go to their site and make a purchase.

Which of the following is an example of an organization analyzing predictive behavior with the goal of creating new offerings? More than one answer may be correct.

An in-home healthcare provider tracks the hospital readmission rates of elderly people who live alone after they received care for falling in their homes. Netflix tracks what users who viewed all three seasons of Stranger Things also had in their queues.

According to the CIA triad, in which of the following examples is an organization ensuring data integrity? More than one answer may be correct.

An organization has a formal policy for alerting the IT department when employees leave the company. A corporation backs up all of its data to a cloud server every night.

Someone who possesses the knowledge of processing software, business strategy, and analytical skill to deliver data and reports that guide management and executives as they create well-informed decision making is known as a data ___.

Analyst Data analysts are employed in a variety of fields including finance, e-commerce, healthcare, government, and science.

Curiosity, understanding context, having a technical mindset, data design, and data strategy are the 5 essential aspects of __ thinking and skills

Analytical

Protecting private or sensitive information by eliminating or encrypting information is the goal of data ___.

Anonymization

What is the purpose of an SQL statement?

Answer questions about the database Reason: Correct. SQL uses statements generated by the user to answer questions about the database.

What groups of people can Audience Insights generate information about? More than one answer may be correct.

Audiences based on demographics you specify. Facebook users who have indicated interest in an event publicized on Facebook. General Facebook users.

What groups of people can Audience Insights generate information about? More than one answer may be co

Audiences based on demographics you specify. General Facebook users. Facebook users who have indicated interest in an event publicized on Facebook.

Data analysts are likely to have achieved what education level when beginning their career?

Bachelor's degree

Select all options that describe the goals of the Respond (RS) function of the NIST Cybersecurity Framework

Be able to quickly analyze a detected cybersecurity issue Establish procedures that enable action in the event of a cybersecurity incident Be prepared to swiftly mitigate harm caused by a cybersecurity event

Methodologies that attempt to deal with the vast amount of complex information that accumulates at high, and accelerating, velocity use ___ data.

Big

Predicting the impact of weather phenomenon of transportation routes, allowing logisticians to anticipate risks and the associated expense involved, is an example of organizational use of ___.

Big data

Who is protected by California's SB-327 for IoT Security and who is accountable for ensuring the guidelines are met?

California's SB-327 for IoT Security helps to protect consumers; the responsibility lies with makers of devices that connect with the Internet.

Which type of database maintains the hardware and operating system offsite and is accessed via Internet-based applications?

Cloud database Reason: Correct. A Cloud database includes the hardware and server operating environment in an Internet-based datacenter.

Social media is used in which steps of the five-step process that marketing research follows? More than one answer may be correct.

Collect data and information Analyze data and information

The five categories of the Respond (RS) function of the NIST Cybersecurity Framework include planning, analysis, and mitigation. From the list below, select the remaining two categories.

Communication Improvements to cybersecurity response plans

What are two advantages that made mainframe-based POS stations among the first commercially available local area networks?

Communication between POS stations within a store Ongoing backup of data generated by each POS station

The process of taking components from data sources and analytics platforms to create a more user-friendly experience that makes finding critical insights easier is called _ data and analytics.

Composable

Which of the following statements explain why a computer virus is so named? More than one answer may be correct.

Computer viruses have the ability to reproduce themselves within a system. An invaded computer inadvertently plays host to the malware.

Small text files created by websites you visit that your web browser stores on your hard disk are called _____.

Cookies

Your gym provides child care during your spinning class. Can the care play a Disney movie for the toddlers?

Copyright and Intellectual property rights

How do managers use personal computers for their business needs?

Creating and using databases and spreadsheets Communicating via e-mail

The 3-step data visualization process consists of exploring the data sets for pattern, then planning for visuals, and finally ___.

Creating your visuals

Checking your FICO score from each different agency every four months and watching for unusual activity.

Credit monitoring

From the following list, select all of the ways in which cybersecurity helps preserve the integrity of data, information, and systems.

Cybersecurity policies and procedures are designed to protect the consistency, accuracy, and dependability of these assets. Cybersecurity tools such as user-access controls, file permission, and version controls help prevent unauthorized changes. Cybersecurity systems are designed to detect unauthorized or unanticipated changes to data that suggest a loss of integrity.

Which type of cybersecurity breach makes a computer, network, or online service malfunction or become unavailable to users?

DDOS attacks

______ are cybersecurity breaches that make a computer or online service unavailable to its users.

DDOS attacks

What element of a database field specifies the data in a field such as text, numeric, or date/time?

Data Type

he value of data analytics to an organization can be best summarized by which statement?

Data analytics is a capability that supports increased organizational performance by drawing meaning from large amounts of data.

Which of the following are reasons why states are making cybersecurity measures a high priority? More than one answer may be correct.

Data and technology continue to be at risk from cyber threats. New technologies continue to advance at a rapid rate.

How are data marts different from data warehouses?

Data marts focus on an individual department or business function and manage less data than a data warehouse.

Which of the following is considered a cybersecurity threat to data at rest? More than one answer may be correct.

Data will be altered by unauthorized users. Data will be viewed by unauthorized users.

SQL is quite useful when working with large data sets and is widely used in today's business environment. It allows the user to query the data contained in a ___.

Database

Which three of the following are key benefits of electronic point-of-sales (POS) stations?

Decreased customer wait time Increased information available to managers Increased accuracy

Relational database management systems (RDBMS) have a variety of tools that can be used to execute/run queries. One of these query tools is the ability to execute/run action queries. Which of the following are common types of action queries?

Delete query Append query Update query

Why should organizations identify their target markets when creating a social media information system (SMIS)? More than one answer choice may be correct.

Different social media platforms attract and cater to different markets. Social media marketing is more cost effective if it targets specific markets.

Having a customer fill out a survey

Direct inquiry

Which 3 of the following are major varieties of data formats?

Discrete data Unstructured data Structured data

What are three advantages of using personal computers in business?

Efficiency Flexibility of use Improved team communications

The Act that is important in specifically protecting email and VoIP communications is the

Electronic Communications Privacy Act.

Which three of the following can encourage ethical computer use in the workplace?

Employee monitoring software Remote desktop software Setting a good example

Which statement best describes common employer conditions or limits on flex-time policies?

Employees must be able to complete their work assignments and responsibilities, including those requiring in-person attendance.

Social media providers include which of the following web-based platforms?

Facebook, Instagram, and Twitter

Changing cookie settings in one browser (Chrome, for example) will automatically change your cookie settings in your other browsers (Safari, Firefox, Edge, for example).

False

Match these 5G concepts with their descriptions. Networks will support 500 mbps to 10 Gbps of download speed. Speeds vary by location and carrier. At the top end, that's over 100 times the speed of 4G. Allows for more high-demand devices to connect over single network. This means more people can transmit data at the same time. On 4G networks, the time that passes when a device is asked to perform a task to when it is completed is between 40-50 milliseconds. It is estimated 5G can reduce this by 75%.

Faster connection/data transfer speeds Greater capacity Lower latency

Which Act outlines a plan to protect government information and assets against cyberthreats?

Federal Information Security Management Act (FISMA)

There are four key features of Web 2.0. One key feature allows users to collectively determine the classification of information. For example, tagging of websites, images, videos, and links. This key feature is called:

Folksonomy

Which of the following statements correctly describes referential integrity?

For referential integrity to exist, data on both sides of the table relationship must be present. Referential integrity applies to data quality within the structure of a relational database.

An electrical company is considering opening a new location in North Idaho. In order to determine the size of the new location, it uses its HR management system to determine the number of employees to transfer from other locations, how many new employees it would like to hire for that location, and what each employees' role would be. What function is this HR management system helping the company perform?

Forecasting

Data transformation is the process of converting the __ of data.

Format

Place the 5 steps of an ethical analysis in order.

Getting all the pertinent facts Determining who is affected Searching for precedents Listing and researching options Making a decision and preparing for the consequences of the decision

Select the first step in the five steps of an ethical analysis.

Getting the facts

Which of the following are examples of Software as a Service (Saas)? More than one answer may be selected. Microsoft Azure Google apps Microsoft Office 365 Smartsheet

Google apps Microsoft Office 365 Smartsheet

Which is the best description of how computing can be "green"?

Green computing reduces the consumption of fossil fuels, paper, and other office supplies and resources.

A man-in-the-mobile and a man-in-the-middle attack have what similar qualities? More than one answer may be correct.

Harvesting personal information is the goal of each cyber intrusion. The user may not know the malware has infected the device.

The name "Blockchain" refers to how data are stored using this technology. Blockchain stores transaction data in blocks. Each block in the blockchain contains a _____ that is a digital fingerprint or unique identifier that helps to create secure transactions.

Hash

Which of the following is an example of a task that might be completed during the planning stage of the plan-protect-respond cycle? More than one answer may be correct.

Having an authorized user attempt to hack into the system to determine vulnerabilities. Determine the degree of vulnerability that exists. Determine what security flaws exist.

What is the main purpose of a decision support system?

Help manage processes involving a variety of quickly changing inputs

Examples of Internet of Things (IoT) devices include which of the following? More than one answer may be selected. Home Security Cameras Smart TVs GPS Devices Smart Speakers

Home Security Cameras Smart TVs Smart Speakers

Select all options that are questions a researcher seeks to answer in the study of consumer behavior.

How do consumers make purchasing decisions? How does the acquisition of products affect consumer self-image? How do consumers react to marketing strategies?

Which of the following are examples of information businesses get from social media to make more informed decisions? More than one answer may be correct.

How often consumers complete purchases after clicking on a sponsored post. What percentage of customers from a targeted demographic download a coupon after visiting a website linked from a sponsored tweet. What new websites females between the ages of 18 and 25 "like" on Facebook.

Because employee education and training are so critical in ensuring that all employees can participate in Lean manufacturing processes, ___ systems play a key role in Lean implementation.

Human Resources Management

Which of the following correctly describes a type of data mart?

Hybrid data marts combine data from a data warehouse and other collection systems. Dependent data marts extract data from a data warehouse when it is needed. Independent data marts are separate from a data warehouse and are created in order to collect data relating only to particular business functions.

The number that is assigned to all information technology devices (routers, modems, etc.) which identifies the device and allows the device the ability to communicate with each other on a computer network, including the Internet is called an Internet ___ address.

IP

Which function of the NIST Cybersecurity Framework involves an organization gaining deeper understanding of cybersecurity management in the context of their business needs and resources?

Identify (ID) function

A nationwide job search requires lengthy candidate interviews. A US content team works with an Indian graphics team. A publisher must train remotely located freelance editors. Why is videoconferencing a better choice than voice calls in all of these situations?

In addition to practicality, documents can be shown on a video call and nonverbal messages can be conveyed.

Which of these common social media goals focuses on raising the public profile of a business?

Increasing Band Awareness

An environmental organization's mission is to raise public awareness of environmental problems and possible solutions by increasing news coverage of these issues. Which social media goal is most directly aligned with this organization's mission?

Increasing the conversion rate of its social media posts to full news stories

Which social media goal directly aligns with an organization's mission to increase the public's environmental awareness by increasing news coverage of environmental issues?

Increasing the conversion rate of its social media posts to full news stories

Using cookies to follow a customer's search history

Indirect tracking

A company wants to begin monitoring the Internet usage of its office employees to ensure that their working hours are spent productively. What is the least that the company should do to respect its employees' rights to information privacy?

Inform employees of the monitoring and obtain their consent.

A friend calls and says she is interviewing a former employee of yours. She asked if he used many sick days. Can you provide this information?

Information privacy rights

A business is planning on using sponsored social media content for its new product. Its target audience is high school students. Which social media platform would likely reach the most members of this target audience? Multiple choice question.

Instagram

Select three correct statements regarding international Internet privacy laws

International laws on Internet privacy vary greatly. It is very difficult to get nations across the globe to agree on standardized Internet privacy laws. The European Union (EU) European Commission Data Protection Directive states that under EU law, personal data can only be gathered legally under strict conditions.

In the broadest sense, the ___ of Things refers to everything connected to the Internet. It allows billions of devices to be connected to the Internet and is increasingly being used to define objects connected to the Internet that talk to each other including sensors, wearable technology, and smartphones.

Internet

What is the purpose of the Twitter report card?

It highlights high-performing tweets. Correct. Influencers are introduced to their target audience through the Twitter report card.

Which of the following statements describes a keylogger most accurately?

It is surveillance malware that captures confidential information through keyboard input.

Select three correct statements regarding international Internet privacy laws.

It is very difficult to get nations across the globe to agree on standardized Internet privacy laws. International laws on Internet privacy vary greatly. The European Union (EU) European Commission Data Protection Directive states that under EU law, personal data can only be gathered legally under strict conditions.

Which of the following surveillance technologies relies on how data are entered into a system?

Keyloggers

Which of the following are considered a basic type of computer network? You may select more than one. Local area network (LAN) World Wide Web (WWW) Wide area network (WAN) Personal area network (PAN)

Local area network (LAN) Wide area network (WAN) Personal area network (PAN)

Applying for credit or even a mortgage online is a straightforward process. After creating an account with a unique user name and password, a customer reads a privacy statement, reviews the security policy, and accepts the terms of use. Then they proceed to log in and fill out an application, answering detailed questions about household income, employment, and more. What cybersecurity risk is particularly relevant to this process?

Man-in-the-middle (MitM) attack

Which of these steps in the data mining process most likely involves the actual "mining" or "Knowledge Discovery in Data"?

Model building and evaluation Reason: Correct. After the relevant data are prepared, mathematical algorithms are applied to segment the data, automatically discover patterns, and predict and evaluate the likelihood of future events.

Technology has brought about many ethical challenges. One of these technologies is Deepfake. Deepfake refers to ___.

Modifying images or video by replacing one person's likeness with that of another.

Which of the following are examples of data objects that a relational database management system (RDBMS) may include? More than one answer may be correct.

Names of customers and records of when merchandise was returned Addresses of the company's wholesalers and the number of items in a company's inventory

Which statement best describes why telecommuting is considered an employee benefit?

Not commuting to work adds flexibility to telecommuters' schedules.

Which of the following are correct statements regarding credit monitoring? More than one answer may be selected.

Ordering your FICO score from each major credit agency multiple times a year is an easy way to keep track of your credit score. Soft inquiries do not affect your credit rating. Credit monitoring and identity theft protection are the same thing.

Qualitative data that is not categorized is called nominal data. Qualitative data that is categorized (ranked, for example) is considered ___ data.

Ordinal

Why is it important for all organizations, no matter how small, to create and implement organizational information policies?

Organizational data are a critical asset; it is important to ensure its security. Reason: Correct. Organizational information policies are designed to protect an organization's data by defining how the data are structured and maintained, who has access to it, and how it is distributed.

Why are probable loss calculations important?

Organizations have limited funds to use toward system protections.

Managers use different methodologies and tools to evaluate external opportunities and threats. One popular process examines the political, economic, socio-cultural, technological, environmental, and legal issues facing an organization and is referred to as a ______ analysis.

PESTEL

Managers use different methodologies and tools to, evaluate external opportunities and threats. one popular process examines the political, economic, socio-cultural, technological, environmental, and legal issues facing an organization and is referred to as_____ analysis

PESTEL

What is the benefit to using a password manager? More than one answer may be selected.

Password managers should not be used since if they are hacked, all of your personal information would be available in one database. Password managers are able to prevent phishing attacks that are normally sent through email.

Spyware is software that collects information about your Internet surfing habits and behaviors. Spyware includes the collection of which three of the following?

Passwords Account numbers Keystrokes

Why include human beings as components in a technology-based business system? More than one answer may be correct.

People are valuable potential customers. Human capital is vital to operating SMISs.

Why is MitMo a growing security risk? More than one answer may be correct.

People use mobile devices in many of the same ways they use computers. Smartphones and other mobile devices are everywhere.

Cookies are stored on the hard drive and are not lost when the web browser is closed are called ___ cookies.

Persistent

According the Max Weber, which of the following characteristics are fundamental to capitalism? More than one answer may be correct.

Personal responsibility Ethical behavior Charity

When data is anonymized, the PII is eliminated or encrypted. PII includes names, social security numbers, addresses, and more and stands for ___ identifiable information.

Personally

Professor Michael E. Porter published "How Competitive Forces Shape Strategy" in the Harvard Business Review. In this paper, he described how all organizations must develop plans to deal with certain factors if they wish to succeed, or even continue to exist. These became known as ___.

Porter's 5 Forces

Microsoft's analytics software that allows for the processing, manipulation, and visualization of data is called Microsoft ___BI.

Power

Which of the following is a popular Microsoft data analytics program that offers business intelligence as well as data visualization?

Power BI

Select three steps you can take to help to safeguard your privacy in the digital age.

Practice safe online purchasing techniques Incorporate anti-virus protection Monitor your credit reports

The 6-step process analysts use to create data-driven decision making includes which 3 of the following?

Prepare Ask Analysis

Professor Michael E. Porter added to his five-forces model by highlighting basic strategies that businesses must follow if they wish to gain competitive advantage. He stated that these strategies fell into which two separate categories?

Price leadership Product differentiation

The principle that asks the decision maker to imagine the answer a highly moral person would have for the same question is the

Principle of virtue

Select three options that are examples of how client-server networks are used.

Printing from a shared computer Data backup Data storage

This keeps your computer from storing cookies, but doesn't securely hide your identity beyond the device because your IP address can still be tracked.

Private browsing

In the six-step process analysts use to create data-driven decisions, the step during which data cleansing occurs to ensure that high-quality data is ready for processing is the ____ step.

Process

Which function of the National Institute of Standards Technology (NIST) Cybersecurity Framework involves an organization analyzing cybersecurity risk and reducing potential damage to IT infrastructures?

Protect (PR) function

Which of the following is an example of event that may occur during the protect stage of the plan-protect-respond cycle? More than one answer may be correct.

Provide employees with information regarding the specific types of security threats their organization faces. Make sure resources are protected through routine maintenance. Limit remote access to sensitive data.

Why is data that is located in the RAM of a device considered data in transit?

RAM only holds data and instructions temporarily; nothing is permanently stored in RAM.

Which of these threats to cybersecurity can only come from an external source?

Ransomware

Web 3.0 is the next evolution in the development of the World Wide Web and is built to support a variety of applications and services including: (More than one answer may be selected.) Ubiquitous computing The Internet IoT Saas

Saas Ubiquitous computing IoT

A major trend in data analytics is the use of artificial intelligence to focus on small data which is more precise, using small datasets that are capable of impacting decisions in the present. This is known as __ AI.

Scalable Scalable AI is designed to be more responsive, smarter, and allows for better learning algorithms and shorter development times.

Select three of steps included in the 5 steps of an ethical analysis.

Searching for precedents. Determining who is affected. Getting all the pertinent facts.

From the following list, select all types of cybersecurity vulnerabilities.

Security weaknesses in an operating system or application software Weaknesses or flaws in system security control Weaknesses in system security procedures Weaknesses or flaws in a system's security design Weaknesses or flaws in system security implementation

There are an increasing number of collaboration software programs that are used in business. Three popular collaboration software programs are Smartsheet, Slack, and Trello. Match the collaboration software program to the correct definition. An online project management software solution. This software focuses on the collaborative aspects of project management. You can create web forms and sheets (similar to a spreadsheet). A collaboration hub that aims to replace email and make communication seamless. This software is composed of channels where teams and members of the organization can communicate. A collaboration tool that organizes projects into boards. This creates a visual representation of what's being worked on, who's doing the work, and where something is in a process.

Smartsheet Slack Trello

When discussing personally identifiable information (PII), which 3 of the following are usually anonymized?

Social security numbers Phone numbers Names

Which program is typically limited to one user at a time?

Spreadsheet

Apple uses Corning's glass products for all its devices, such as the Gorilla Glass 6 used in the iPhone 11 series. To ensure that it continue to have a strong relationship with this glass industry leader, Apple has invested nearly $500 million toward Corning's advanced glass research division. By building up this relationship, Apple seeks to maintain some control over which of Porter's 5 forces?

Suppliers

A manager receives word that a large portion of inventory is missing from a shipment to a channel partner. She analyzes the RFID tracking data and determines that this part of the shipment was delivered to the wrong channel partner. Which component of supply chain management experienced a breakdown in this scenario?

Supply chain logistics

Which of the following allows, but does not require, private companies to warn the U.S. government about cyber-security threats?

The Cybersecurity Information Sharing Act, signed into law in December 2015, allows companies to share threat information with the U.S. government.

Which of the following laws allows law enforcement to obtain information about online and offline communications related to terrorist activities without a warrant?

The USA PATRIOT Act/USA Freedom Act

The Act that signed into law to monitor terrorist activities and communications following the 9/11 attacks and the 2001 anthrax attack on Congress is the

The USA PATRIOT Act/USA Freedom Act.

The Act that protects person-to-person wire, oral, and electronic communications is ___.

The Wiretap Act

The federal law that protects person-to-person wire, oral, and electronic communications and also includes a variety of network crime statutes that include identity theft and unlawful access to stored communications is

The Wiretap Act

What metrics does the tweet activity dashboard provide on every tweet?

The number of users who have seen a tweet The number of retweets The number of users who have replied to a tweet

Which statement best explains why knowing an organization's value proposition is important for creating its social media information system (SMIS)?

The organization can increase its exposure and user engagement on social media by designing an SMIS that enables it to reinforce and build on its identified strengths.

Which three of the following ideas did Henri Fayol consider to be a guiding principle of management?

The organization's interests must take priority over the interests of individuals. Managers can expect subordinates to follow orders and discipline them if needed. Managers must have the power and the right to give orders to subordinates.

This federal law protects person-to-person wire, oral, and electronic communications.

The wiretap act

Which of these statements support the assertion that MitMo is a growing security risk? More than one answer may be correct.

The world is flooded with smartphones and other mobile devices. Mobile devices function in many of the same ways that computers do.

Which is the best explanation of the relationship between social media goals and social media metrics?

There are metrics that correspond to the most common social media goals and that serve as key-performance indicators (KPIs) for them.

Which is the most common characteristic of social engineering cybersecurity attacks?

They are conducted via emails that offer a reward in exchange for clicking a given link.

What do all cybersecurity threats have in common?

They are connected to the loss of information, software, or hardware.

Why should organizations determine their value proposition when creating their social media information system (SMIS)?

They can increase their exposure and user engagement on social media by designing an SMIS that enables them to reinforce and build on their identified strengths.

What is the goal of the planning phase of the plan-protect-respond cycle?

Understand common threats that an organization may face and determine how vulnerable they are to such threats.

What is the goal of the planning phase of the plan-protect-respond cycle?

Understand the steps needed to design effective information security architecture.

Select all options that describe what social media offers businesses eager to gain an understanding of their customers.

Unprecedented access to consumer data Insights analytics Social intelligence tools

Select all options that represent basic steps in an organization's use of social media to craft a target marketing strategy.

Use analytics tools provided by social media tools Obtain user data from social media platforms Create a marketing program that reaches social media users

What information does Instagram Insights offer?

Users' demographic information. Number of times paid content was viewed by a specific demographic. Number of times nonpaid content was viewed by a specific demographic.

What information does Instagram Insights offer? More than one answer may be correct.

Users' demographic information. Number of times paid content was viewed by a specific demographic. Number of times nonpaid content was viewed by a specific demographic.

How can organizations identify target markets before they have social media content and followers? Select all the correct answer options.

Using demographic and behavioral information to conduct market research Using public and purchased information to conduct competitor research Using existing customer information to conduct customer research

A corporate sales organization is hosting its annual regional meeting. It needs to book a hotel within the region where attendees will stay for three days and two nights. The hotel must have: 30 standard hotel rooms for its sales reps, 5 suites for the regional managers, and 5 conference rooms to hold training sessions. There also must be two restaurants within walking distance of the hotel that can accommodate a dinner reservation for 40 people. Which web mining technique would the organization use to narrow down the choices of hotels to those that fit these parameters?

Web content mining Reason: Correct. Web content mining is a good tool to extract specified information from a website. Data from the hotels' web pages will be extracted and analyzed to determine which hotels meet the specified criteria.

According to the Hawthorne effect, when do employees become more productive?

When they know their work is being monitored.

Which situation involves a computer ethics violation that you should report to your employer?

You pass a coworker's computer screen and see him surfing through child pornography

Which situation involves a computer ethics violation that you should report to your employer?

You pass a coworker's computer screen and see him surfing through child pornography.

From the following list, select all the concerns that fall into the quality of life category of ethical dimensions.

Your daughter's depression worsens as she spends more time on social media sites. You feel that a colleague who wastes time shopping online at work should be punished.

At the time cash registers were invented, "ringing up" a customer meant _____.

a cash register rang each time the cash drawer was opened, alerting a shop owner of register activity

Attributes that allow firms to provide goods and services with higher perceived values than their competitors are referred to as competitive ____________.

advantage

attributes that allow firms to provide goods and services with higher perceived values than their competitors are referred to as competitive_____

advantage

The second step in the five steps of an ethical analysis is to determine the

affected or impacted

Which of the following threats to cybersecurity come from internal sources? More than one answer may be correct.

an accidental erasure of data an attack by an authorized user the leakage of sensitive information

What is a cybersecurity threat?

an event or condition that can lead to IT asset loss and the negative consequences of such loss

Which of the following is an example of a tool that could be used to ensure data integrity? More than one answer may be correct.

backing up data to separate servers or to the cloud checksums are used to detect errors that are introduced during transmission or storage

The second of Porter's 5 forces refers to the ease with which a new competitor can enter the market. Strong ______ decrease the strength of this force.

barriers

According to Professors W. Chan Kim and Renee Mauborgne, Cirque d'Soleil used a_____ ocean strategy

blue

Using collaboration software people from across the organization, regardless of their physical location, people can share content in real-time including documents, spreadsheets, videos, and messages. This leads to better ___ , which is one of the benefits of using collaboration software.

collaboration

According to Mary Parker Follett, a successful business depends on ______.

competence and expertise

Porter's 5 Forces include existing competitors, new competitors, and which 3 of the following?

customers substitutes suppliers

A social media information system (SMIS) should primarily be designed and used to connect a company's ______.

customers on social media with its products and services on its website

One primary purpose or function of a company's social media information system (SMIS) is to connect the company's

customers on social media with its products and services on its website.

A Trojan horse achieves its purposes through ______.

deceptive access

Which browser settings should you consider adjusting?

deleting cookies deleting cookies blocking or customizing your cookie settings blocking or customizing your cookie settings deciding from which sites you want to allow cookies

An advertising campaign for a hair removal product placed ads on different websites. The ad on each website listed a unique URL where customers could go to buy the product; otherwise the content was the same. A marketing manager needs to place ad buys for the next quarter and wants to focus all of his advertising dollars on the previous quarter's top revenue-generating websites. He uses the company's marketing information system (MKIS) to determine which URLs generated the most revenue. This is an example of using an MKIS to ______.

evaluate the return on investment for each ad placement in a marketing

From the following list, select all the scenarios that illustrate the named dimension (category) of ethical behavior in the digital age.

information privacy rights: A friend calls and says she is interviewing a former employee of yours. She asked if he used many sick days. Can you provide this information? copyrights and intellectual property rights: Your gym provides childcare during your spinning class. Can the caregiver play a Disney movie for the toddlers? quality of life: As a manager, you are entitled to two PTO (paid time off) days per month. Can your boss ask you to check your work email once per day to answer employee questions?

An instant computing infrastructure composed of processing, data storage, and a variety of other computing resources provided by a Cloud vendor to assist in running an organization's information systems is referred to as __ as a Service.

infrastructure

Which of the following are steps you can take to protect your privacy? More than one answer may be selected.

install and keep up to date antivirus software on your computers use a password manager so that every site you visit has a different, strong password monitor your credit card bills for any unauthorized purchases

Because for many businesses, particularly in the retail and manufacturing sectors, this remains the largest operating expense, incremental improvements to ______ management can translate to huge overall savings

inventory

When making an ethical analysis, what is the last thing a manager should do before making a decision and preparing for the consequences?

listing options

Small, drive-up, coffee stands seem to be popping up on every street corner. Because of this, these coffee vendors have difficulty raising prices significantly higher than their competitors. This is because the coffee stand business has extremely ___.

low barriers to entry

Mechanical cash registers were first created to _______.

make it more difficult for employees to steal money

Which of the following are tactics that can be used to stay safe when browsing the Internet?

only entering personal information at sites that use a secure http protocol (designated as https://)

A checkbox may ask if you want to receive news and updates or participate in surveys from the site. When creating or browsing websites, this checkbox is referred to as an

opt-in and opt-out.

Your right to control what happens with personal information about you is centered around the right to

privacy

According to the National Institute of Standards and Technology (NIST) there are four Cloud computing deployment models. ___ Cloud is a Cloud deployment model where Cloud infrastructure is provisioned for exclusive use by a single organization comprising multiple consumers, e.g., business units). It may be owned, managed, and operated by the organization, a third party, or some combination of them, and may exist on or off premises.

private

In the six-step process, analysts use to create data-driven decisions, the step during which data cleansing occurs to ensure that high-quality data is ready for processing is the step.

process

The total value of a company is based on how much customers value its

products, services, and areas such as corporate philanthropy, social responsibility programs or policies, manufacturing processes, and brand attributes.

Bad actors seeking to create computer viruses primarily must know how to

program code

In his book, The Machine That Changed the World, Dr James Womack of M.I.T specified the five tenets of Lean manufacturing. These include, specifying the value of each product with precision, identifying how each product acquires its value and which 3 other principles?

relentlessly pursuing perfection ensuring that the value flows to the product without interruption allowing customers to pull increased value from the producer

MIS tools that analysts commonly use to determing the causes of variences include scatter diagrams, histograms and Pareto charts. For this reason, MIS are critical in the implementation of ___ techniques.

six sigma

The Identify (ID) function of the NIST Cybersecurity Framework focuses on organizational______.

understanding of how to manage cybersecurity risks

Select what's true about how 5G connectivity will support IoT. More than one answer may be selected. 5G connectivity will allow for greater data capacity. 5G connectivity will fully replace 4G connections. 5G connectivity will allow for faster connection speeds, greater data capacity, and lower latency. 5G connectivity will allow for lower latency.

5G connectivity will allow for greater data capacity. 5G connectivity will allow for faster connection speeds, greater data capacity, and lower latency. 5G connectivity will allow for lower latency.

DDDM refers to Data Driven ____Making.

decision

Common methods to connect a LAN to the Internet include which of the following? Coaxial cables Satellite signals Ethernet cables Fiber optic cables

Ethernet cables Fiber optic cables Coaxial cables

SQL allows users to isolate specific information contained in a database, as well as to aid in the selection, creation, addition, and extraction of data from a database. SQL stands for ___ query language.

Structured

There are many benefits of Cloud computing. One of the benefits is ___that enables organizations to communicate and share data/information more efficiently and is facilitated because multiple users can share and work on files at the same time.

collaboration

Because many business executives desire to create a data-driven decision making culture, which 3 of the following are competencies organizations invest in to support DDDM?

- Agility in analytics and data analysis - Data proficiency - Building a data-driven community

Select all that apply Uses of data analytics include which 3 of the following?

- Improved decision making - Improved patient experiences and internal procedures in healthcare - Improved customer service

Key skills required of data analysts include which 3 of the following?

- Technical writing skills - Experience with SQL and computer code - Oral communication skills

Select 3 critical factors to consider when determining the right data to select?

- What types of data do you need to solve a specific problem? - How will the data be collected? - How much data should be collected?

Characteristics of databases include which 3 of the following?

Fields Characters Records

Improving decision making, customer service, production and operations processes are just a few of the trends in data _.

analytics

Measurable and counted data that can have almost any numeric value is called ____ data.

continuous

The information technology (IT) architecture and infrastructure, software applications, programming languages, and storage technologies used for the collection, storage, analysis, and interpretation of meaningful data is referred to as the ______ecosystem.

data

There are a number of Cloud service vendors that provide a variety of Cloud services. Generally, Cloud computing services are classified in three ways: Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and __ as a Service (SaaS).

software

Select all that apply Analytical skills necessary for a data analyst include the characteristics and capabilities that allow for the observation, research, and interpretation of a problem or change in a desired state. According to Google, there are five essential aspects of analytical skills including which 3 of the following?

- Curiosity - Understanding context - Data strategy

Because many business executives desire to create a data-driven decision-making culture, which 3 of the following are competencies organizations invest in to support DDDM?

- Data proficiency - Agility in analytics and data analysis - Building a data-driven community

Match the type of network to the correct definition. 1. PAN 2. LAN 3. Internets 4. MAN

1. Connect devices around an individual. PANs typically involve laptops, tablets, and smartphones. 2. Connect a variety of devices at a single site such as an office or retail store. 3. Connect LANs, WANs, and other internets together. 4. Connect a variety of devices between two or more geographic locations.

In the statement: SELECT * FROM Customers, the asterisk (*) indicates that the user wants to extract all the columns of data FROM ___ the table.

Customers

In a database, data is organized in complex and meaningful collections specified by the database administrator. These collections are referred to as ___ .

Fields

This type of information system is focused on the capture, analysis, use, and management of spatial location information. It is rooted in the science of geography and seeks to integrate many types of data to create visualizations using maps and 3D scenes. This definition explains a ___ Information System.

Geographic

There are three main tools data analysts and other members of an organization use to analyze data. They are spreadsheets, databases, and query languages, and data ____tools.

Visualization

The process of investigating raw data of various types to uncover trends and correlations, and to answer specifically crafted questions is the role of data _.

analytics

SQL is quite useful when working with large data sets and is widely used in today's business environment. It allows the user to query the data contained in a___.

database

Match the the following terms associated with Internet Protocol (IP) addresses to the correct definition. 1. IP address that are permanently assigned. 2. Four-decimal notation such as 182.124.7.9. This allows for approximately 4 billion IPv4 addresses. 3. Uses a format such as 2001:0db8:85a3:0000:0000:8a2e:0370:7334 and can accommodate at least 340 undecillion addresses. 4. Allows IP addresses to be translated in to recognizable words which are much easier to remember than a set of numbers.

1. Static IP adress 2. IPv4 3. IPv6 4. DNS

Match each key term that is commonly used in the discussion about cellular communication to the correct definition. Transmits cell phone signals to the cellular system's mobile switching station. Controls all the transmissions between cellular phone towers and their base transceiver stations. Allow smartphones to receive an analog sound wave, such as a person's voice, and convert it to a digital signal that can be processed and stored by a computer. A small computer within your smartphone that analyzes the sounds entering your phone through the analog/digital converter.

BTS Mobile switching station ADC DSP

Select what is true about computer networks. More than one answer may be selected. Only selected types of computer networks can be linked together and supported by the Internet A network is a group of two or more devices/computers connected together Computer networks support many different software applications Networks range in size from small home networks to the Internet, which is the world's largest network

A network is a group of two or more devices/computers connected together. Computer networks support many different software applications. Networks range in size from small home networks to the Internet, which is the world's largest network.

Select the true statements about sending information on the Internet. Devices connect to the Internet or a network using network cables or wireless technologies. Internet Service Providers (ISPs) are not needed to bridge communications between devices on the Internet. Modems and routers are connected to the Internet via an Internet Service Provider (ISP). Each device connecting to the Internet or a network must have a network interface card (NIC) installed.

Devices connect to the Internet or a network using network cables or wireless technologies. Each device connecting to the Internet or a network must have a network interface card (NIC) installed. Modems and routers are connected to the Internet via an Internet Service Provider (ISP).

Select the potential applications/benefits of 5G networks. More than one answer may be selected. 5G networks may eventually allow for autonomous vehicles to safely interact with each other and their environment. 5G connectivity will greatly improve what businesses and individuals can do with connected devices. 5G connectivity will allow for faster communications, even faster than fiber optic connections. 5G connectivity has the potential to create truly connected cities.

5G networks may eventually allow for autonomous vehicles to safely interact with each other and their environment. 5G connectivity will greatly improve what businesses and individuals can do with connected devices. 5G connectivity has the potential to create truly connected cities.

Select all of the following scenarios that show interaction between SMIS components. More than one answer may be correct.

-A company's information systems (IS) group researches and chooses a program that can deliver content to several social media providers at the same time. -Every day, a social media specialist at a start-up checks the news, plans how and what to tweet, quickly messages a manager, and sends the approved tweets. -Social media providers rely on user data to better serve sponsor organizations.

For a specific advertisement, a social media platform allows a corporation to target male users who are between the ages of 18 and 25 and are currently attending college. This social media platform is assisting with which part of the market research process? More than one answer may be correct.

-Analysis of data and information -Data information and collection

How can a social media information system (SMIS) be used to directly facilitate meaningful connections for a company? More than one answer may be correct.

-Engaging content can be posted to encourage users to share posts with others. -Posts and paid advertisements on social media can link to the company's website. -Regular posts on social media can encourage platform users to follow the company.

Information provided by Instagram Insights informed an organization that their sponsored post had 1,000 impressions per day but an unsponsored post written by their new Social Media Director received 15,000 impressions that same day. Why might his information be valuable to the organization? More than one answer may be correct.

-If the new Social Media Director is able to recreate that level of engagement with more of her posts, the organization may be able to reduce the amount of sponsored content they place on Instagram. -The organization may be targeting the wrong audience with their sponsored posts; analyzing who's engaging with the Social Media Director's posts can provide the organization valuable information about their target audience.

Which of these statements best explain why humans are studied as components in a technology-based business system? More than one answer may be correct.

-People are valuable potential customers. -Human capital is vital to operating SMISs.

What groups of people can Audience Insights generate information about? More than one answer may be correct.

-People who speak a specific language. -All Facebook users. -Facebook users who have indicated interest in an event publicized on Facebook.

Of the following statements, choose all that describe the importance of hardware and software to SMIS. More than one answer may be correct.

-Social media information systems are built with computer and network technology. -Hardware and software options are numerous and varied, allowing users to customize according to their roles and business needs.

Select all of the following statements that explain why providers need appropriate SMIS procedures. More than one answer may be correct.

-System functioning and maintenance depend on correct procedures. -Security, appropriate site use, and data handling are all facilitated through procedures. -Procedures required of users protect privacy and uphold site policies

What metrics does the tweet activity dashboard provide on every tweet? More than one answer may be correct.

-The number of users who have seen a tweet -The number of users who have replied to a tweet -The number of users who have retweeted a tweet

How are smartphones and remote servers alike? More than one answer may be correct.

-They are SMIS hardware components. -Smartphone users and data server technicians both interact with SMIS through specific hardware.

If an organization does not yet have social media content and followers, what can it do to help identify its target markets? More than one answer may be correct.

-Use demographic and behavioral information to conduct market research -Use public and purchased information to conduct competitor research -Use existing customer information to conduct customer research

What information does Instagram Insights offer? More than one answer may be correct.

-Users' age range, gender, and location. -Length of engagement with a sponsored story for a specific demographic. -Number of impressions an unsponsored post received.

What demographic data are collected from social media users? More than one answer may be correct.

-Where a user is when they make a purchase initiated through a social media post. -Which advertisements users frequently engage with.

Describe what social media offers businesses eager to gain understanding of their customers. More than one answer may be correct.

-social intelligence tools -unprecedented access to consumer data -insights analytics

What are some types of software that social media providers use? More than one answer may be correct.

-software that allows the provider team to log on to the system -software that allows the provider team to log on to the system

What are some of the direct benefits of defining an organization's target market? More than one answer may be correct.

-stronger marketing messages -better understanding of customer needs -keener insights into the competition

When conducting a SWOT analysis, managers examine factors that impact their organization's internal strengths and weaknesses. These factors are sometimes refered to as the ______Ps

5

For the past 10 years, a restaurant has been running a customer loyalty program, rewarding customers with discounts and treats. Records of these rewards have been kept in odd notes and multiple spreadsheets used in different ways by various employees who have come and gone over the years. Because of this, some customers are not getting their rewards, while others are receiving rewards they have not earned. Overall, the restaurant is losing money and business with this program. How can a database management system (DBMS) help with this problem?

A DBMS will help the owners manage the data they already have to run their customer loyalty program more efficiently. Reason: Correct. A DBMS will help the owners eliminate multiple records per customer and family (data redundancy) and will help resolve any conflicting information between their notes and spreadsheet records (data inconsistency). This will allow them to reward customers fairly and avoid losing money on unearned rewards.

A corporation's Twitter report card indicates that engagement has dropped off in the past two months. What information from the tweet activity dashboard could they use to determine the cause of this drop off in engagement?

A change in demographics of the people who are engaging with their tweets.

Who performs probable maximum loss calculations?

A company's cybersecurity analysts

Which of the following are common methods of indirect tracking? More than one answer may be selected.

A cookie tracks your browser activity after you click on an ad in your Facebook newsfeed. Amazon tracks what products you view and what you actually purchase after clicking on an affiliate link from a blog. You fill out an online survey after chatting with a customer service bot on a website.

Which three of the following are examples of a business that would benefit from scheduling software?

A daycare center that is open Monday through Saturday from 7:00 am until 6:00 pm. There are six classrooms and each must have two teachers present at all times. No employee may work more than 40 hours per week. A national drugstore chain whose policy is that there must be two cashiers, one stock person, and one manager or assistant manager working per shift. A restaurant that is open for lunch and dinner and has a full bar staffed with a bartender. There are 50 tables in the restaurant and each server is responsible for no more than five tables at a time.

Given the Four V's of Big Data, which of the following organizations most likely uses Big Data?

A leading news website that uses data about its visitors' and followers' activities to shape its news coverage, customize news alerts, and gain advertisers and subscribers. Reason: Correct. The data that are automatically collected and used by an online media outlet with a large audience is likely to be of high volume, variety, velocity, and veracity.

Which two of the following organizations adhere to the principles described by Max Weber?

A local public relations firm specializes in promoting local businesses to tourists. While the firm is small, it boasts employees who spend their entire career there. The PR firm recruits interns from a local university, and hires those interns for entry-level positions if they demonstrate adeptness at serving clients. Promotions are based on annual reviews; employees with noted potential receive training to help them achieve the next step in their career. Employees are divided into different categories, based on the type of client they work with (i.e., lodgings, local activities; restaurants). A large, multinational pharmaceutical corporation has a standardized recruiting process for hiring scientists out of college. A minimum GPA is required, as is published research. Once hired, students are placed in entry-level research positions that focus on testing a specific new drug. All new hires are paid the same starting salary. They are managed by people who have 3-5 years seniority over them; these people are managed, in turn, by people who have had successful commercial launches of new drugs. New hires are trained in company policies and provided with management training after their first successful year. Employees with 3 years of exemplary performance reviews are invited to interview for positions managing the newest batch of college recruits.

Which two of the following problems may be solved with the capabilities of an ERP system?

A manufacturer must coordinate its new production line with elements of its supply chain. An apparel firm needs to know how directly its marketing and advertising efforts effect sales.

Select the scenarios below that show how Frederick Taylor's scientific management has influenced today's business decisions. More than one answer may be correct.

A political campaign director needs to hire paid workers and volunteers on all levels, from supervisors to canvassers. Instead of seeking mostly campaign veterans, the director recruits from groups who have shown great interest in "the cause." They'll be trained and supplied with what they need to do good work. Supervisors in a large warehouse notice that the robots are working faster than the humans. Employees scanning and sending items off to shipping are becoming frustrated and even physically hurt moving the items that the robots pick off the shelves. Management decides to recalibrate the robots' speed to coordinate with the humans' speed. In some urban school districts, teachers work in teams of two so less experienced teachers learn from seasoned co-teachers. In addition to their administrative responsibilities, the principal and assistant principal assign the teams and hold staff trainings throughout the year. These schools find that this system benefits both teachers and students.

How does a rootkit pose a cybersecurity threat? More than one answer may be correct.

A range of malicious actions is possible because the invader has the same access as the computer's owner or user. Installed on a computer's operating system, a rootkit bypasses security functions.

Which of the following sets of characteristics specifically apply to relational databases? More than one answer may be correct.

A relational database organizes data in tables composed of records or objects (the rows), and fields (the columns). Data tables in a relational database are linked by the fields they have in common.

To get to the bottom of the odd computer problems she was having, Priya listed these symptoms: files mysteriously disappearing, system configurations unexpectedly altered, and two icons showing up for applications she did not download. What malware could have been installed on Priya's computer?

A rootkit

Which two of the following are examples of managers using a decision support system?

A sales manager wants to know how customer responses to a large, multistate sales promotion affect each of his reps' sales in real time. A doctor evaluating a patient with complex, unusual symptoms tracks the patient's symptoms in the electronic health record (EHR) during the exam. The EHR analyzes the symptoms, suggesting possible illnesses related to the symptoms.

Which three of the following scenarios depict an employment situation that Elton Mayo believed would result in an employee becoming more engaged and productive?

A sales tracking report at a furniture store shows how each salesperson's daily sales help the store reach its quarterly quota. Managers at a software company have weekly meetings with their customer service staff. As a regular part of the agenda, managers report the number of customers who continued to use their product after the customer service department helped with a software malfunction or error. At a software company, project managers working on bringing new products to the market receive monthly updates on how past products are selling and helping the company achieve its goals.

Which of the following is an example of a web experience that could be improved by web mining?

A subscription learning app that targets kindergarten students wants to meaningfully update its lessons so that visually impaired children can use them. A travel company wants to know what amenities people search for before booking a hotel for a vacation so that the company can increase the coverage of those amenities on their website. A small online retailer has noticed that most people viewing products from its gaming pages browse for about 5 minutes and end up making purchases, but over 75 percent of people viewing products from its home goods pages leave within the first 30 seconds. It wants information on how the two pages are different.

Put In order to a new block to be added to the blockchain, four criteria must be met. Put the steps of adding a new block to the blockchain in the correct order. Adding a hash Transaction storage A transaction must take place Transaction verification

A transaction must take place Transaction verification Transaction storage Adding a hash

Which of the following is an example of what an information policy could specify? More than one answer may apply.

A user agreement on a website indicates that it will store the browsing history linked to the IP address for an indefinite amount of time and reserves the right to sell that information to interested parties. A large corporation grants access to salary information to the direct supervisors of employees and to members of the Human Resources department who administer payroll. A health insurance company stores data that patients self-report as inputs on its website, but does not link that data with information about the patient's search history.

There are a variety of Cloud service providers that are used by organizations to execute a number of different tasks. Match the Cloud services offered to the correct Cloud service provider. Offers a broad set of global Cloud-based products including compute, storage, databases, analytics, networking, mobile, developer tools, management tools, IoT, security, and enterprise solutions. Offers a suite of modular Cloud computing services including data storage, data analytics, computing, and machine learning. Google also offers serverless computing, IaaS, and PaaS. Offers a range of flexible Cloud infrastructure services including Cloud servers, cloud block storage, private cloud network, cloud firewall, and fully managed Cloud. Offers cloud solutions for Customer Relationship Management (CRM) and Enterprise Resource Planning (ERP).

AWS Google cloud Kamatera Salesforce

Which three of the following are components of supply chain management systems?

Ability to create and process purchase orders Manage inventory in real time Forecast future inventory needs

When employers deactivate former employees' username and passwords, they are using which tool that ensures confidentiality? More than one answer may be correct.

Access control Authentication

Spyware is software that collects information about your Internet surfing habits and behaviors. Spyware includes the collection of which three of the following?

Account numbers Passwords Keystrokes

A query is a request for information stored in a database. One of the benefits of using a database to store information is the ability to run a query. In relational database management systems (RDBMS), there are a variety of query tools that are used to execute and run queries. Which of the following are tools used to run queries in an RDBMS? More than one answer may be correct.

Action queries Crosstab queries SQL specific queries

From the following list, select all the examples of internal threats to cybersecurity.

An attack by an authorized user An accidental erasure of data The leakage of sensitive information

Which of the following would be a reason why an organization would use web usage mining?

An e-commerce business looking to improve the customer experience on its website to boost sales wants to know what types of sites users go to after visiting their website and putting items in their cart, but not completing a purchase. A new social media platform wants to increase engagement and is looking to know what content its most frequent users spend the most time engaging with.

What are the different types of cybersecurity threats? Select all the correct options.

An event or act that could cause the loss of IT assets. The negative consequences or impact of losing IT assets. A condition that could cause the loss of IT assets.

Which two of the following are examples of an organization using big data and analyzing predictive behavior with the goal of creating new offerings?

An in-home healthcare provider tracks the hospital readmission rates of elderly people who live alone after they received care for falling in their home. Netflix tracks what users who viewed all three seasons of Stranger Things also had in their queues.

In which three of the following situations would data analytics be most helpful?

An international automaker is producing a new line of vehicles in several locations and the production lines must run uniformly and smoothly. A healthcare firm has received a vast amount of information from drug companies and research entities and must finalize their policies and communication concerning several controversial treatments. A search engine continually adjusts its algorithms as more data enter its servers.

For a specific advertisement, a social media platform allows a corporation to target female users who are between the ages of 28 and 35 and have at least one child. This social media platform is assisting with which part of the market research process?

Analysis of data and information Data information and collection

What do the three categories of the Detect (DE) function of the NIST Cybersecurity Framework include?

Analysis, observation, detection

Working on data analytics teams to extract data from large data sets, creating reports that outline key findings, monitoring key performance indicators (KPIs) to identify success or failure, and analyzing data to identify trends are just a few of the responsibilities of a data .

Analyst

What is the final step in the six-step process of creating an SMIS?

Analyze the collected data

For which of the following tasks would it be more appropriate to use a NoSQL database than a SQL database?

Analyzing large volumes of data that are stored in the cloud Organizing user-generated comments from your company's Twitter, Facebook, and Instagram pages

These programs use a variety of techniques to identify and remove viruses and malware.

Anti-virus software

Who are the prime targets of MitM attacks? More than one answer may be correct.

Anyone who uses online financial applications Software as a source (SaaS) businesses Anyone who logs in to shop online

Which of the following are advantages of cloud databases over a traditional database? More than one answer may be correct.

Are maintained by an external provider, such as Amazon or Oracle Can be accessed through an application programming interface (API) Can support both SQL and NoSQL databases

Remote employees of a corporation are required to log into their company's virtual private network (VPN) before accessing files on the corporation's shared drive where corporate data are unreadable to unauthorized users. This is an example of which of the following tools that ensure confidentiality? More than one answer may be correct.

Authentication Encryption Access control

Collaboration software is increasingly used in a variety of business settings. There are a number of advantages that using collaboration software offers teams and organizations. Match the term to the most appropriate benefit of collaboration software. People from across the organization, regardless of their physical location, can share content in real-time including documents, spreadsheets, videos, and messages. Collaboration software allows project leads the ability to create the plan and schedule and share this with all members of the team. Engaging remote employees can be a challenge. Collaboration software helps to create engagement by allowing remote and organization-based employees the ability to exchange and interact. Scheduling activities can easily be added and updated in the software. Remote team members are actively engaged in workflow, duties, and processes due to the real-time nature of the software.

Better communication Project management capabilities Improved engagement Streamlined workflow

In analyzing transactions, Walmart discovered that many people who buy Children's Tylenol in their stores also buy orange juice in the same transaction. They used this information to discount Children's Tylenol but raise the price of orange juice during flu season. What is the name of the approach Walmart used to discover this information?

Big data

In analyzing transactions, Walmart discovered that many people who buy Children's Tylenol in their stores also buy orange juice in the same transaction. They used this information to discount Children's Tylenol but raise the price of orange juice during flu season. What is the name of the approach Walmart used to discover this information?

Big data Reason: Correct. Big data refers to an organization's ability to use analytics to uncover predictive behaviors.

In the settings area of each browser you should consider adjusting which three of the following?

Blocking or customizing your cookie settings Deleting cookies Deciding from which sites you want to allow cookies

Which of the following statements describe Internet robots, or bots? More than one answer may be correct.

Bots are used for both legitimate and malicious purposes. Malicious bots can compromise a user's control of the computer. "Good bots" have useful functions and do not pose security risks.

Match the term associated with the use of blockchain in today's business environment to the correct explanation of that term. Blockchain makes changing any information in a contract almost impossible. This proves to be advantageous for businesses that are dealing with multiple contracts. The encryption used in Blockchain makes it ideal for monetary transactions. Also, blockchain eliminates the need for banks to handle monetary transactions. Blockchain allows shippers and customers to verify with almost absolute certainty where items and goods are along the supply chain thus removing guesswork and inefficiencies. Blockchain can be used to trace mistakes and errors in manufacturing back to the point of origin.

Business contracts Monetary transactions Supply chain management Quality assurance

Select two ways managers encourage employees to act unethically.

By failing to act ethically themselves. By not enforcing strong ethical behavior.

How did Henri Fayol factor the welfare of employees into his guiding principles of management?

By requiring clear lines of authority and communication By requiring managers to encourage people to take initiative By requiring that all employees be fairly compensated By requiring managers to be fair and kind to employees

Select three privacy concerns associated with cookies.

Corporate and government entities can use cookies to monitor your surfing behavior. Websites can use cookies to track your surfing behavior and use this information to create specific user profiles. Websites that use cookies can collect information about surfing habits and sell that information to a variety of third-parties.

Select all options that describe the goals of the National Institute of Standards Technology (NIST) Cybersecurity Framework.

Create an atmosphere where organizations can effectively discuss cybersecurity risks internally and with those outside of the organization Help organizations develop appropriate policies and procedures to mitigate data breaches Give guidance to organizations who wish to understand potential security breaches

Because it is difficult to trace and it is accessible through any Internet connected device, cyber criminals often request payment in ___ .

Cryptocurrency

Because it is difficult to trace and it is accessible through any internet connected device, cyber criminals often request payment in ____

Cryptocurrency

If an increase in price results in a relatively large decrease in demand for the product, the firm cannot easily increase its profit margin. This demonstrates which of Porter's 5 forces?

Customers

Which of the following is prohibited by the Computer Fraud and Abuse Act? More than one answer may be correct

Cyber blackmail Intentionally destroying a computer

Which two of the following are examples of ethical concerns that have been created as a result of new technologies?

Cyber bullying and digital privacy

Which two of the following are examples of ethical concerns that have been created as a result of new technologies?

Cyberbullying Digital piracy

Why does it make sense to categorize data and procedures together as social media information system (SMIS) components? More than one answer may be correct.

Data and procedures are required to keep SMISs functioning. Procedures help providers properly collect, direct, protect, and regulate the use of data.

For a specific advertisement, a social media platform allows a corporation to target female users who are between the ages of 28 and 35 and have at least one child. This social media platform is assisting with which part of the market research process?

Data information and collection Analysis of data and information

How does the cybersecurity goal of preserving data integrity relate to the goal of authenticating users?

Data integrity is more easily preserved if users must be authorized to access data and make changes.

What term describes the process organizations use to discover meaningful relationships and patterns among the data sets it has collected?

Data mining Reason: Correct. Data mining is the process organizations use to find meaningful patterns and relationships within the data sets it has collected.

Brooks Accounting is no stranger to audits—for their customers. Managers discovered some issues in services and billing they suspected were linked to their database practices rather than to employee competence. Brooks hired an outside firm to perform a data quality audit. Which statement best describes how the audit process identified problems?

Data profiling analyzed the accounting firm's data sources. Reason: Correct. In examining internal and external data sources, problems in consistency, accuracy, and structure are revealed.

Determine which of the following is an example of data that has integrity.

Data that are used to set sales goals for account executives are stored on a secure server; managers are allowed read-only access to the sales data for the reps they directly manage.

Select the two statements that correctly explain the roles of data marts and data warehouses in a decision support system (DSS).

Data warehouses are used to analyze long-term, historical data for an organization's strategic purposes, because they store data from different time periods and subject areas. Data marts are used to analyze recent data that a department needs for operational troubleshooting and management, because they collect and measure data specific to that area.

Which statement best summarizes how organizations use data warehouses?

Data warehouses are used to store data from multiple sources for collective analysis. Reason: Correct. Once collected, the warehoused data can be more easily analyzed together and interpreted to help organizations make informed decisions.

Which statement most accurately describes the value of data integrity to an organization?

Databases and database management system (DBMS) with a high level of data integrity enable more efficient data maintenance in support of organizational goals. Reason: Correct. Reliability, accuracy, and alignment with business goals are the hallmarks of good data integrity.

Which of the following explains why a debit card is less secure than a credit card when shopping online? More than one answer may be selected.

Debit cards can give hackers direct access to your checking account. Debit cards do not have the level of encryption that credit cards do. Debit cards are actually more secure because you are required to enter a pin number when making purchases.

Which of the following is a task that data administration would be responsible for?

Deciding that the organization will begin collecting and storing users' locations upon the release of the next generation software for its mobile app. Determining that two-factor identification must be used to access data that the company has determined to be confidential. Defining policies stating that employees may not share data with people who are not employees of the organization.

What is the benefit to using social media for conducting market research?

Demographic data and market information is much easier to gather from social media sites than it was to previously collect.

What is the "DE" function in the National Institute of Standards Technology (NIST) Cybersecurity Framework?

Detect function

A sales manager receives weekly reports on each of the sales representatives they manage. Included in these reports are weekly sales by product, what percentage of the monthly quota the rep has achieved, and the sales ranking of reps compared to other reps in the company. These reports represent what function of a marketing information system (MKIS)?

Distributing sales and marketing information

It is common for sales representatives in information technology fields to receive commissions for the sales they make. At play in this case is the Principle of

Distributive Justice

Cloud services security policies vary by Cloud provider, so it's important to research policies before signing a service level agreement (SLA). Some important questions to ask a vendor about Cloud services security include which of the following? More than one answer may be selected. Does the vendor provide external hardware such as firewalls or servers? Does the vendor go through regular security audits? Does the vendor have any specific security certifications? What type of disaster plans are in place?*

Does the vendor go through regular security audits? Does the vendor have any specific security certifications? What type of disaster plans are in place?*

Meera loves her job, especially the fact that she can work both from home and in the office. Lately, however, being available and accountable 24/7 is starting to crowd her, and she feels her personal life slipping away. To improve her work-life balance, what are two strategies Meera should try?

During the day, she can take a break for informal chats with colleagues in person when she's in the office or over the phone when she's home. At the end of the day, Meera should give herself time to wind down and get the rest she needs. Meera should plan her day according to priorities that she's reasonably sure are achievable. The first step of her plan may include scheduling a specific time for responding to e-mails and calls.

Which statement best explains why traditional file systems have certain issues?

Each file is independent of another file in a traditional system.

Which of the following improvements might be the direct outcome of a data quality audit?

Elimination of redundant metadata and strengthened referential integrity Recommendations for a new data management design and prescriptions for preserving data quality Corrections in source data issues and ways to examine data over time

Which three of the following can encourage ethical computer use in the workplace?

Employee monitoring software, remote desktop software, and setting a good example

For what two reasons might a large organization choose to use remote desktop software rather than employee monitoring software?

Employee privacy concerns must be balanced with organizational needs. Detailed oversight of a large number of employees moment-by-moment may be problematic due to capacity.

What was the driving principle behind McGregor's Theory Y?

Employees are capable of working without constant supervision.

From the following list, select all the options that the main ways in which a social media information system (SMIS) can be used to facilitate meaningful connections for a company.

Engaging posts on social media posts can encourage users to share them with others. Regular posts on social media can encourage users to follow the company. Posts and paid advertisements on social media can link to the company's website.

What is the goal of the protect stage in the plan-protect-respond cycle? More than one answer may be correct.

Ensure critical infrastructure services can be delivered without interruption. Reduce the impact of an adverse cybersecurity event.

Which of the following are areas covered by state-specific cybersecurity laws? More than one answer may be correct

Ensuring state and local governments are protected from cybersecurity threats. Protecting elections from cyber threats. Addressing security needs of smart devices.

In his book, The Machine That Changed the World, Dr. James Womack of M.I.T. specified the five tenets of Lean manufacturing. These include, specifying the value of each product with precision, identifying how each product acquires its value (the value stream), and which 3 other principles?

Ensuring that the value flows to the product without interruption. Allowing customers to pull increased value from the producer. Relentlessly pursuing perfection.

Modern supply chain management systems access National Weather Service databases to track weather events that could impact logistics. This is an example of using MIS to monitor which element of a PESTEL analysis?

Environmental

Created in 2015, __ is the second most valuable cryptocurrency after Bitcoin. Its cryptocurrency is called an Ether.

Ethereum

Match the narrative to the appropriate cryptocurrency. Created in 2015, it is the second most valuable crypto A forked crypto from Bitcoin. A fork is when a crypto is split into two different cryptos Created in 2008, it remains the most widely traded and respected crypto. No one truly knows who created Bitcoin, but the creator goes by the pseudonym Satoshi Nakamoto.

Ethereum (ETH) Bitcoin Cash (BCH) Bitcoin (BTC)

Acting with high morals means you live a virtuous life, while your ___ provide a rational framework for your morals. Multiple choice question.

Ethics

Acting with high morals means you live a virtuous life, while your ___ provide a rationals framework for your morals

Ethics

The U.S. Constitution specifically protects freedom of speech from government censorship through the

First Amendment.

Select three options that describe benefits of cloud computing.

Flexibility of user devices Affordability for business use Access to applications software

Select the correct statements about Infrastructure as a Service (IaaS). IaaS is not scalable. Organizations have to pay regardless of how much of the services they use. IaaS is an instant computing infrastructure composed of processing, data storage, and a variety of other computing resources provided by a cloud vendor. Cloud computing service providers, such as Microsoft Office, work with organizations on the management of information systems infrastructure allowing them to focus on software purchase, installation, and configuring. IaaS helps organizations avoid the cost of acquiring and managing their own physical servers and datacenter architecture.

IaaS is an instant computing infrastructure composed of processing, data storage, and a variety of other computing resources provided by a cloud vendor. IaaS helps organizations avoid the cost of acquiring and managing their own physical servers and datacenter architecture.

Ethical Analysis 5 Steps

Identify the Issues, Determining the affected Search for precedent getting the facts Make a Decision.

Which is the best example of how a company benefits from having a social media information system (SMIS) that gathers and analyzes its social media data?

If the data show that a social media campaign is not attracting the desired attention or level of engagement, the company can change its campaign strategies.

Select three options that describe advancements made in point-of-sale (POS) system software in the 1990s (in addition to in-store sales and tax tracking).

Immediate communication with internal financial teams Across-chain sales and inventory tracking Stronger connection with customers

Which two of the following are reasons why employee scheduling software was originally developed?

Improve the quality of employee performance Make the execution of management policies more consistent

In order to connect to the Internet and other computers on a network, each device must have a network ____ card (NIC) installed.

Interface

Why is online analytical processing (OLAP) software included in many business intelligence (BI) software applications? More than one answer may be correct.

It allows reports and analytics to be exported to more user-friendly, front-end tools. It allows for sophisticated data and trend analysis, data modeling, and forecasting. It allows users to view data from different perspectives or angles and gain new insights.

A digital music streaming company is promoting its service in a new country with a special discount for residents. How can the company use authentication to help prevent people from exploiting or abusing the deal? More than one answer may be correct.

It can verify that the customer lives in the correct country. It can verify that the customer is new to the company or service. It can grant the customer access only to the music included in the deal.

Which of the following is true of structured data? More than one answer may be selected.

It has a defined length, type, and format. It can include numbers and dates. It contains confidential information such as passwords.

What are two characteristics of cryptocurrency? It has a fluctuating price. It makes it easy to track transactions. It is not portable. It is backed by the U.S. government.

It has a fluctuating price. It is not portable.

Which of the following is a benefit of antivirus software that charges a fee? More than one answer may be selected.

It includes identity theft protection and parental controls. It is more effective than free antivirus software.

How does a cybersecurity exploit threaten the safety of a system?

It is a tool or technique for taking advantage of a system vulnerability to cause harm.

Which statement accurately describes the need to keep sensitive data, information, and systems confidential?

It is both a major goal and a requirement for cybersecurity.

What are the characteristics of cryptocurrency? Its value depends on a country's monetary or economic policy. It belongs to a specific country or geographical area. It is not backed by any assets. It is not issued by a central bank. Its value depends largely on the supply and demand for it.

It is not backed by any assets. It is not issued by a central bank. Its value depends largely on the supply and demand for it.

From the following list, select four typical characteristics of telecommuting.

It reduces the environmental impact of road traffic. It often places additional demands on employees' time. It requires reliable, high-speed Internet access. It allows employees to work from almost anywhere.

How does the structure of an online analytical processing (OLAP) database shape its core functionality?

Its use of data cubes allows users to conduct complex queries, analyses, and modeling by taking multiple dimensions of data (types or levels) into account and viewing data from multiple viewpoints or "slices" (such as by date and location).

select three characteristics of Just-in-Time manufacturing and inventory management

JIT faces significant challenges during supply disruptions such as those that occur during natural disasters parts, and even labor, are not purchased until the moment they are needed in the assembly process JIT requires an exceptionally smooth supply chains

Select three characteristics of Just-in-time (JIT) manufactoring and inventory management.

JIT requires exceptionally smooth supply chains. Parts, and often even labor, are not purchased until the moment they are needed in the assembly process. JIT faces significant challenges during supply disruptions such as those that occur during natural disasters.

Because of its significant challenges during supply disruptions that occur during natural disasters (such as the COVID-19 pandemic), ___ has lost much of its popularity.

Just-in-time (JIT) manufacturing and inventory management

because of its significant challenges during supply disruptions that occur during natural disasters (such as Covid), _______ has lost much of its popularity

Just-in-time (JIT) manufacturing and inventory management

A type of network that connects devices at a single site within a limited geographic range is called a ___ area networks.

LAN

A starting point to investigate the complex topic of a society's ethics is first to understand the society's _ and the history behind the enacting of them.

Laws

Principles that focus on increasing efficiencies by improving supply lines and through creating a well-trained, highly knowledgeable workforce that assertively acts to minimize waste and maximize value in every process and product are referred to as ______ manufacturing principles.

Lean

Requiring a modern communications system, a process that actively encourages all employees to halt the manufacturing process if safety risks are observed is the __ process.

Lean

Actively encouraging any employee to halt production if a manufacturing error or safety risk is observed is part of the training associated with ___ .

Lean manufacturing

In a PESTEL analysis managers examine ___ factors.

Legal

Which of the following statements best illustrates why a rootkit is described as creating a back door?

Like an intruder coming through a back door, a rootkit allows an unknown user into an operating system.

Which of the following tasks are NoSQL databases designed to do? More than one answer may be correct.

Manage large datasets across different platforms Analyze nonstructured data Create queries from the data created from web apps

Along with the employee, which of the following is most responsible for an employee's ethical behavior?

Management

How have management information systems (MIS) changed the management of organizations? More than one answer may be correct.

Managers can have more information and data about the organization to help them make smarter decisions. Managers (and employees) can communicate different types of information in a greater variety of ways.

Collaboration software is designed to enhance the productivity of teams, groups, and organizations. Select the correct statements about collaboration software. Many of today's collaboration software programs are cloud-based, removing the need to users to have specific software download on a device. Dedicated workspaces are viewable and editable (based on assigned privileges) by users regardless of their physical location Allows for the creation of a dedicated workspace where users can add data and workflows. Changes to documents or spreadsheets must be saved and sent to the members of a team.

Many of today's collaboration software programs are cloud-based, removing the need to users to have specific software download on a device. Dedicated workspaces are viewable and editable (based on assigned privileges) by users regardless of their physical location Allows for the creation of a dedicated workspace where users can add data and workflows.

Which two of the following statements illustrate a potential drawback of management information system (MIS)?

Many workers find that a steady flow of business information, along with its demands, blurs the boundaries between work time and personal time. The temptation to work overtime or without breaks can lead to competition and stress.

How are social media metrics and social media goals related?

Metrics that correspond to social media goals can serve as key-performance indicators (KPIs) for them.

Which of the following is an example of the type of information data mining can yield?

Middle-aged males who are members of their local church bible study group are more inclined to vote than younger males who are also members of local bible study groups. The likelihood of a Gen-X female who makes $50,000 and is divorced with no children will take a trip within a year of her divorce being finalized

From the following list, select all types of events and conditions that are considered cybersecurity threats.

Misuse or abuse of IT assets Errors, weaknesses, or defects in IT assets Unintentional, accidental, and incidental events Intentional events Failure of IT assets

According to the National Institute of Standards and Technology (NIST) which of the following are characteristics of Cloud computing? More than one answer may be selected. On-demand self-service Broad network access Slow elasticity Resource pooling

On-demand self-service Broad network access Resource pooling

Why is setting social media metrics the second step in creating a social media information system (SMIS)?

Once an organization has defined its social media goals, it should adopt metrics to quantify its progress toward achieving these goals.

When reporting a coworker's computer ethics violations, which of these guidelines should you follow? More than one answer may be correct.

Only report incidences that you have personally witnessed. If in doubt, report the activity to ensure that it does not go unnoticed.

Data that offers free access, distribution, and usage is known as ___ data.

Open

Who is quoted as saying "Do what you do best and outsource the rest"?

Peter Drucker

Put the steps of cellular communication (placing a call on a cellular network) in the correct order, starting with placing a call

Place the call Your phone converts your voice Once the call is received by the nearest tower When the person on the other phone accepts

Select the true statements about Content Delivery Networks (CDN). PoPs include various caching servers that assist in delivering content to website visitors within its operational proximity. Content delivery networks are exclusively used in the United States to speed up web traffic. CDNs provide more efficient delivery of Internet and Web content because the closer the CDN server is to the user geographically, the faster the content will be delivered. CDNs are geographically distributed network server groups that work together to deliver web pages and other web content to users.

PoPs include various caching servers that assist in delivering content to website visitors within its operational proximity. CDNs provide more efficient delivery of Internet and Web content because the closer the CDN server is to the user geographically, the faster the content will be delivered. CDNs are geographically distributed network server groups that work together to deliver web pages and other web content to users.

Which of these defining components mitigate cybersecurity threats? Select all the correct options.

Policies, tools, and strategies used to reduce damage from threats. Security tools and oversight used to identify security threats. Policies and procedures used to protect systems and data.

According to the National Institute of Standards and Technology (NIST) there are four Cloud computing deployment models. Match the Cloud computing deployment model description to the correct Cloud deployment model term. Cloud infrastructure is provisioned for exclusive use by a single organization comprising multiple consumers, e.g., business units). The Cloud infrastructure is provisioned for open use by the general public. It may be owned, managed, and operated by a business, academic, or government organization, or some combination of them. The Cloud infrastructure is a composition of two or more distinct Cloud infrastructures that remain unique entities but are bound together by standardized or proprietary technology. Cloud infrastructure for exclusive use by a specific community of consumers from organizations that have shared concerns (mission, security requirements, policy and compliance).

Private cloud Public cloud Hybrid cloud Community cloud

Which of the following services are often provided by Platform as a Service (PaaS) vendors. More than one answer may be selected. Provide mobile software development kits (SDKs) that assist in app development. Hosting of hardware and software Multi-language program development Provide hardware builds of systems.

Provide mobile software development kits (SDKs) that assist in app development. Hosting of hardware and software Multi-language program development

Which statement best describes the difference between social media providers and social media sponsors? Multiple choice question.

Providers are website platforms; sponsors are organizations that use these platforms to build awareness and communicate

The PATRIOT Act was enacted to monitor terrorist activities and communications following the 9/11 attacks and the 2001 Anthrax attack on Congress. PATRIOT stands for

Providing Appropriate Tools Required to Intercept and Obstruct Terrorism

When conducting a SWOT analysis, managers examine factors that impact their organization's internal strengths and weaknesses. These factors are sometimes refered to as the 5 Ps. The 5 Ps include which 3 of the following?

Purse Plant Personnel

As a manager, you are entitled to 2 PTO (paid time off) days per month. Your boss encourages to use this time off and only asks that you check your email once per day to answer employee questions.

Quality of life

A database provides the capability of conducting searches or asking questions. A question or search for information in a database is called a

Query

Which of the following statements describe the capabilities of relational database management system (RDBMS)? More than one answer may be correct.

RDBMS have features that support the quality and security of data. RDBMS allow users to view, add, revise, and remove data.

Which of the following statements best describes Follett's theory of management?

Receptivity to the flow of ideas from all levels of the organization leads to success.

A company uses an HR management system with artificial intelligence that scans resumes for specific colleges attended and previous employers that are known for breeding successful talent. Any resumes without these colleges or previous employers are not sent on to the HR manager to be contacted for an interview. What function is this HR management system helping the company perform?

Recruiting

This software allows managers to take control of an employee's computer remotely. This also can capture the employee's computer's mouse and keyboard entries.

Remote Desktop Software

This software allows managers to take control of an employee's computer remotely. This also can capture the employee's computer's mouse and keyboard entries.

Remote desktop software

For which task is a data mart more useful or appropriate than a data warehouse?

Resolving a current problem with a specific type of inventory, purchase transaction, or supply chain Reason: Correct. Data marts assist with the analysis of specific operational data for a particular department or business area.

In which function of the NIST Cybersecurity Framework does an organization's cybersecurity team take quick action to mitigate damage to systems?

Respond (RS) function

Which of the following is a task that an SQL statement would be expected to perform?

Retrieve data Reason: Correct. One of the tasks that SQL statements are used to perform is the retrieval of data, also known as a query.

Common SQL terms include which 3 of the following?

SELECT WHERE FROM

Why is it important that a company's social media information system (SMIS) be designed to gather and analyze social media data? Multiple choice question.

SMIS data about the company's activities and audience on social media can be used to improve its social media strategies and business decisions.

What is the role of social media information systems (SMIS) in consumer behavior?

SMIS provide user data and analytics tools that help inform consumer behavior researchers.

What is the role of social media information systems (SMIS) in consumer behavior?

SMIS provide user data and analytics tools to consumer behavior researchers.

What is the role of social media information systems (SMIS) in consumer behavior? Multiple choice question.

SMIS provide user data and analytics tools to consumer behavior researchers.

Which type of cookie is not stored on your computer's hard drive but instead just resides in memory while you visit a website?

Session cookie

What type of cookie is stored in temporary memory and is lost when the web browser is closed?

Session cookies are also called transient cookies because they are not stored, but just held in temporary memory.

Which of the following is not one of the steps included in the 5 steps of an ethical analysis?

Setting a strong example.

Data-driven decision making (DDDM) can be facilitated through a 6-step processes of Ask, Prepare, Process, Analysis, Share, and Act. Which of these steps refers to creating visualizations and presentations for key stakeholders?

Share

The Cybersecurity Information ___ Act, passed in December 2015, allows private companies to share threat warnings with the U.S. government.

Sharing

Modern inventory management systems help to ensure a number of critical advantages, including which 3 of the following?

Shelf-space optimization Stock-obsolescence minimization Timely re-ordering

Which three of these practices increase both an organization's sustainability and "green" credentials?

Shifting to a shorter, four-day workweek. Encouraging employees to telecommute. Using teleconferencing for meetings.

Which of the following browsing situations may reveal that adware is at work? More than one answer may be correct.

Shortly after you buy and download a writing enhancement program, you begin seeing ads for special keyboards, styluses, and other assistive technology. You have been looking for a new winter coat, and three out of five ads popping up on your browser currently show the type of coat you have been considering. In searching the term database management, the first item you see in the results list is an ad for a particular online database.

Because of its focus on reducing variation to eliminate product defects, which process methodology relies most heavily upon data analysis?

Six Sigma

During the Measure and Analyze steps of the ___ procedure, collecting data and using data analytics are essential.

Six Sigma

because of its focus of reducing variation to eliminate product defects, which process methodology relies most heavily upon data analytics?

Six Sigma; refers to the sets of processing techniques that seem to reduce variance in output to less than 3.4 errors per 1,000,000 manufacturing steps

Vidya needs a password for a new app she downloaded on her phone. Which of the following passwords is the most secure?

Sj49?zT$

Suppose you are a company whose target market is identified as homeowners who live in suburban regions of the American Midwest. From the list below, choose the product you are most likely selling.

Snow blowers

Your college has a database with a Students table. Which two of the following could be a primary key in the table?

Social Security Number Student number

How has social media changed the way businesses measure consumer behavior?

Social media makes it easier to collect the kind of data that are meaningful to businesses.

How has social media changed the way businesses measure consumer behavior?

Social media makes it easier to collect the kind of data that is meaningful to businesses.

How has social media changed the way businesses measure consumer behavior? Multiple choice question.

Social media makes it easier to collect the kind of data that is meaningful to businesses.

Of the following statements, choose the one that most accurately distinguishes social media providers from social media sponsors.

Social media providers build and host website platforms and sponsors invest in these platforms to enhance their social media presence.

Select all options that describe the benefits of an organization using social media to help create a target marketing strategy.

Social media provides companies with a rich collection of user data and personalized content. Social media provides companies with analytics tools to identify top consumers. Social media, as part of a target marketing strategy, often results in sales increases.

By improving communications throughout the organization, as well as gaining better perceptions of consumers' opinions using CRM software, managers are able to monitor which PESTEL factor?

Socio-cultural

Which of the following statements accurately describes spyware? More than one answer may be correct.

Spyware captures private information by monitoring how users interact online. Downloading software or documents from unvetted sources is one way spyware can be installed.

Of the following statements, which apply to spyware? More than one answer may be correct.

Spyware harvests private information by monitoring how users interact online. Downloads from unvetted websites can be a vector for spyware.

Will the decision impact the privacy or property rights of any individuals or corporations? This question should be asked in which step of the 5 steps of an ethical analysis.

Step 2 - Determining the affected.

Will the decision impact the privacy or property rights of any individuals or corporations? This question should be asked in which step of the 5 steps of an ethical analysis.

Step 2 Determining the affected

The first two steps of the six-step process in creating a social media information system (SMIS) involve developing social media goals and setting metrics. What are the third and fourth steps of the process?

Step 3: identify the organization's target market; Step 4: determine and integrate into the SMIS design traits valued by the target market.

In which of the following scenarios is a learning management system (LMS) being used to document student activity?

Students have a semester-long project that they are required to submit in stages through their LMS.

Frederick Taylor's four principles of scientific management can be described as ______.

Task measurement, employee development, worker-manager collaboration, and management training

The PATRIOT Act was enacted to monitor terrorist activities and communications following the 9/11 attacks and the 2001 Anthrax attack on Congress. PATRIOT stands for Providing Appropriate Tools Required to Intercept and Obstruct .

Terrorism

Which Act, signed into law in December 2015, allows companies to share cyber-security threat information with the U.S. government?

The Cybersecurity Information Sharing Act

Which of the following allows, but does not require, private companies to warn the U.S. government about cyber-security threats?

The Cybersecurity Information Sharing Act

The laws that were created to update copyright laws dealing with the issues of regulating digital material in accordance with World Intellectual Property Organization treaties is called:

The Digital Millennium Copyright Act (DMCA)

Which law or set of laws implements two World Intellectual Property Organization (WIPO) treaties and was created to update copyright laws dealing with the issues of regulating digital material.

The Digital Millennium Copyright Act (DMCA) was signed into law by President Clinton in 1998.

Which Act protects email and VoIP communications by making it illegal to intercept calls or messages without a warrant.

The Electronic Communications Privacy Act

Which law, passed in 1986, protects email and VoIP communications by making it illegal to intercept calls or messages without a warrant.

The Electronic Communications Privacy Act

The law passed in 1986 that protects email and VoIP communications by making it illegal to intercept calls or messages without a warrant is

The Electronic Privacy Communications Act.

This Act outlines a plan to protect government information and assets against cyber threats. It requires each federal agency to develop a plan for information security. This Act outlines a plan to protect government information and assets against cyber threats. It requires each federal agency to develop a plan for information security. drop zone empty.

The Federal Information Security Management Act

Which Act outlines a plan to protect government information and assets against cyber threats.

The Federal Information Security Management Act (FISMA)

What is the National Institute of Standards Technology (NIST) Cybersecurity Framework?

The NIST Cybersecurity Framework is a voluntary guide that helps organizations understand and protect themselves against cybersecurity risks

Which provision of the USA PATRIOT Act was not renewed after it expired in 2015 nor covered by the subsequent USA Freedom Act?

The National Security Agency may not collect mass phone data from United States residents and citizens.

There are five basic ethical principles that we can look to when facing an ethical dilemma. Select the three ethical principles from the choices offered.

The Principle of Distributive Justice The Principle of Moral Rights The Principle of Virtue

Which principle of ethical conduct states that there exist certain moral values that should always be upheld or never be violated.

The Principle of Moral Rights

Which principle of ethical conduct states that there exist certain moral values that should always be upheld or never be violated?

The Principle of Moral Rights

There are five basic ethical principles that we can look to when facing an ethical dilemma

The Principle of Virtue The Principle of Moral Rights The Principle of Distributive Justice The Universal Principle The utilitarian principle

Accessing the communications of an organization without authorization was made a criminal violation by which federal cybersecurity law?

The Stored Communications Act

How does Twitter make current influencers known to its audience?

The Twitter report card introduces influencers to specific networks.

Which law, passed after the 9/11 attacks allowed law enforcement to obtain information about online and offline communications related to terrorist activities without a warrant.

The US PATRIOT Act/USA Freedom Act

What are the advantages of videoconferencing in today's business environment?

The ability to observe nonverbal cues improves the accuracy of communication. Organizations can save on travel time and expenses.

From the following list, select all of the examples of a relationship that an entity-relationship diagram (ERD) could be used to describe.

The courses a student is taking Products a customer has ordered The employees who report to a specific manager in an organizational chart

Which of the following statements correctly describes a defining characteristic of Big Data?

The data are from structured and unstructured sources and exist in multiple forms. The data are measured in terabytes (trillions of bytes) or even larger units.

Barriers to entry can protect existing firms from which of Porter's 5 forces?

The force of new competitors

In 1998, the Child Online Protection Act of was sponsored by both Democrats and Republicans, passed by both houses of Congress, and signed into law by President Clinton. Why can't an offender be punished today for violating this law?

The law was later found unconstitutional for violating the First Amendment (freedom of speech).

For a cybersecurity plan to succeed, which of the following must remain confidential? Select all correct answer options.

The logins and passwords of authorized users The organization's digital or computer systems Private or sensitive data and information

Which would organizations be interested in the information on interactions and preferences that social media sites can provide?

The more an organization knows about users' interactions and preferences, the more strategic their targeting can be.

What must you consider when developing the goals for an organization's social media information system (SMIS)? More than one answer choice may be correct.

The organization's larger goals for its mission The organization's purposes for using social media

What must you consider when developing the goals for an organization's social media information system (SMIS)?

The organization's purposes for using social media The organization's larger goals for its mission

Which statement best summarizes how a data governance (DG) plan is created?

The plan is tailored to the organization's specific goals, objectives, and activities. Reason: Correct. There is no one-size-fits-all DG plan, given the many differences between organizations' business data and how they use it.

Which statement encompasses the third step of the five-step process of an ethical analysis?

There is an extremely good chance that other managers, perhaps in your own organization, have faced similar dilemmas.

Select two options that are point-of-sale (POS) station output devices.

Thermal printer Speaker

Why is it important to preserve the integrity of data, information, and systems?

These assets lose their usefulness and value if their consistency, accuracy, or dependability is compromised.

Why must database administrators (DBA) be trained or experienced in using an organization's specific database platform?

They must troubleshoot or solve problems with the database when necessary.

Members of a project team at a mid-size company are trained in online safety, and their network is protected by a firewall. But the worst-case scenario has happened: a competitor has obtained protected information, possibly directly from a member's computer. George, the firm's system manager, sees some evidence of a Trojan horse that was engineered to steal passwords. What first steps should he and his security team take to uncover the source? More than one answer may be correct.

They should comb through e-mails with an eye to a message with a clickable link. The security team should examine everyone's activity log, looking for any downloaded files or programs.

Breanna, IS manager at a mid-size service firm, picks up some evidence that a Trojan horse engineered to steal passwords has accessed the system. All members of project teams are trained in online safety, and their network is protected by a firewall. But the worse-case scenario has happened: a competitor has received protected information, possibly directly from a member's computer. What first steps should Breanna and the security team take to solve the problem? More than one answer may be correct.

They should review everyone's activity log, looking for any downloaded files or programs. The security group should sift through emails for a message with clickable links.

Select two ways telecommuting managers will most likely be affected by improvements in management information systems (MIS) and other technologies?

They will face additional work demands on their personal time. They will be able to do additional tasks on their mobile phones.

Buying a list of potential customers from an outside agency

Third party data purchase

Select three common methods in which organizations collect data.

Third-party data purchase Direct inquiry Indirect tracking

How does spyware potentially harm the individual user?

This malware steals confidential information from the user.

Select the three major titles of the Digital Millennium Copyright Act (DMCA) that impact digital copyright protection.

Title 2 - This act protects Internet Service Providers (ISPs) from being sued for copyright infringement when the ISP's user wrongfully copies items from the Internet. Title 1 - This act requires that measures be taken to make it difficult to copy analog video recordings. Title 4 - This act facilitates distance learning by allowing educational institutions latitude with regard to the use of copyrighted material.

What is the primary role of a database administrator (DBA)?

To monitor the database and ensure that it functions when needed Reason: Correct. DBA also fulfill this role by troubleshooting problems with the database when they occur.

What is the key role of a client-server network in business?

To provide personal computer users secured access to shared data.

Describe qualifications necessary to obtain a patent on an invention. More than one answer may be correct.

To qualify for a patent, the invention must be novel, or different, from other similar inventions. To qualify for a patent, the invention must be non-obvious, meaning that a skilled artisan would find the invention surprising or unexpected. A patent will only be granted for something that is useful.

The process of converting the format of data from one form to another is called data ___.

Transformation

Which of the following is an example of an advantage of being able to access a database via the web? More than one answer may be correct.

Turnover among telephone customer service representatives at your company is high and they receive only brief training before they interact with customers. Reps need to be able to access your sales database to assist customers who call. Your company needs suppliers in all countries to be able to access your inventory database. Your product is primarily sold in developing countries where most of your suppliers are small business owners who access the Internet via a mobile device instead of a computer.

Virtual Private Networks (VPNs) are commonly used by organizations to securely send communications. Select the correct statements about VPNs. Used by organizations whose employees need access to a company network remotely. A VPN creates a secure connection between two computers. These networks utilize a file server to receive incoming connections. VPN software authenticates the users and establishes a secure connection.

Used by organizations whose employees need access to a company network remotely. A VPN creates a secure connection between two computers. VPN software authenticates the users and establishes a secure connection.

two important considerations for managing cookies.

Users should be aware that cookie settings must be adjusted in each browser. Users should determine what cookie settings is appropriate for your browser use and privacy protection.

What are important considerations for managing cookies? More than one answer may be correct

Users should determine what cookie settings is appropriate for your browser use and privacy protection. Users should be aware that cookie settings must be adjusted in each browser. Most users appreciate third-party cookies and the value they bring to browsing.

How can organizations identify target markets before they have social media content and followers?

Using existing customer information to conduct customer research Using demographic and behavioral information to conduct market research Using public and purchased information to conduct competitor research

What are the two major types of patents?

Utility and desgin

Virtual Private Networks (VPNs) are commonly used by organizations to securely send communications. Select the correct statements about VPNs. These networks utilize a file server to receive incoming connections. VPN software authenticates the users and establishes a secure connection. A VPN creates a secure connection between two computers. Used by organizations whose employees need access to a company network remotely.

VPN software authenticates the users and establishes a secure connection. A VPN creates a secure connection between two computers. Used by organizations whose employees need access to a company network remotely.

Why is establishing authentication procedures a common cybersecurity goal?

Verifying that users are authorized to access systems, data, and resources is fundamental to preventing their unauthorized use.

In which two of the following situations would an executive support system (ESS) be most helpful?

Vice-presidents require detailed reports from all divisions for a merger decision. R&D must provide sales with clear information about a new product.

When working in Tableau, users can assume which 3 roles?

Viewers Creators Explorers

This essentially hides your IP address to outside websites by running your communications through a secure network.

Virtual private network (VPN)

Which of the following are considered cybersecurity breaches? More than one option may be correct.

Viruses Impersonation Distributed Denial of Service (DDOS) Spyware

Which of the following are correct statements about web services? More than one answer may be selected. Web services are a set of software technologies that are able to exchange information with each other using standardized web communication protocols and languages. Web services allow for the exchange of information between two systems and are not tied to any one operating system or programming language. HTTP is commonly used to create web services. Web services can be used to create apps that link different systems of different organizations and to build open-standard based web applications.

Web services are a set of software technologies that are able to exchange information with each other using standardized web communication protocols and languages. Web services allow for the exchange of information between two systems and are not tied to any one operating system or programming language. Web services can be used to create apps that link different systems of different organizations and to build open-standard based web applications.

Describe privacy concerns associated with cookies. More than one answer may be correct.

Websites that use cookies can collect information about surfing habits and sell that information to a variety of third parties. Websites can use cookies to track your surfing behavior and use this information to create specific user profiles. Corporate and government entities can use cookies to monitor your surfing behavior.

What information does the Facebook tool Audience Insights provide to organizations?

What regions of the country members of a target audience reside in. What websites members of a target audience interact with most frequently. The purchase behavior of people who have not "liked" your Facebook page, but who have attended events hosted by your organization.

What information does the Facebook tool Audience Insights provide to organizations? More than one answer may be correct.

What websites members of a target audience interact with most frequently. What regions of the country members of a target audience reside in. The purchase behavior of people who have not "liked" your Facebook page, but who have attended events hosted by your organization.

From the following list, select all situations that lead you to suspect the presence of adware.

When looking up information on the Dallas Cowboys, you notice an ad for a Dallas Cowboys jersey. You have been looking for a car bike rack, and four out of five ads popping up on your browser show types of racks and other sporting gear. After you buy and download a drawing program, you begin seeing ads for interactive drawing games and other creative technology.

Which 2 of the following statements accurately reflect Frederick Taylor's foundational beliefs?

When the company is successful, its employees are successful. Helping workers become more productive leads to jobs for more workers.

A university's network was severely compromised by a systemwide attack that made accessing records impossible. All files were encrypted and the tech team didn't have the key. Administrators received what was essentially a ransom note: the network would be restored after they paid a million dollars to an unknown actor. Which factors most strongly influenced university administrators' decision whether or not to comply? More than one answer may be correct.

Whether the university's tech support team could decrypt the files themselves. Whether law enforcement could be identified and force the bad actor to decrypt the files.

What demographic data are collected from social media users?

Which online stores a user frequents. Where a user is when they post a photo.

The federal law that protects person-to-person wire, oral, and electronic communications and also includes a variety of network crime statutes that include identity theft and unlawful access to stored communications is The ___ Act.

Wiretap

The Act that comprises a variety of crime statutes including identity theft and unlawful access to stored communications is the

Wiretap Act

From the following list, select all the situations that involve information privacy rights.

Your neighbor has a history of abusing children. Do you and others living in the neighborhood (or about to move in) have a right to know this? You allow an employee to take two-hour lunch breaks because her daughter is receiving chemotherapy. Can you tell her colleagues why she is getting the special treatment? One of your new hires has a large Twitter following under a pseudonym. Should you let your boss know?

select all the situations that involve information privacy rights.

Your neighbor has a history of abusing children. Do you and others living in the neighborhood (or about to move in) have a right to know this? You allow an employee to take two-hour lunch breaks because her daughter is receiving chemotherapy. Can you tell her colleagues why she is getting the special treatment? One of your new hires has a large Twitter following under a pseudonym. Should you let your boss know?

A social media information system (SMIS) should be designed to gather and analyze social media data because

a company can use platforms' data about its activities and audience to improve its social media strategies and business decisions.

Each time a user clicks or interacts on a social media website

a data point that can be analyzed is recorded.

The Universalist Principle states that

a decision must be fair for all involved.

a SWOT analysis examines which three of the following?

a firms external threats a firms internal weaknesses a firms internal strengths

Software-based keyloggers often infect a system through

a malicious email or link opened by an unsuspecting user.

Data mining is best described as ______.

a research and analysis technique in which data analysts employ mathematical tools and artificial intelligence (AI) to search large volumes of data and discover less-obvious patterns and trends

Conrad was disturbed to find evidence of applications he did not download, system configurations unexpectedly altered, and files mysteriously that disappeared and moved. Which cybersecurity threat best explains the problems he was having?

a rootkit

In terms of the Internet, a cookie is

a small text file stored on a user's hard disk.

Which of the following is an example of data in process? More than one answer may be correct.

a username that has been submitted for authentication a password that has been submitted for authentication a company's organizational chart

The deactivation of access to corporate systems and documents after an employee leaves a company is an example of which tool that ensures confidentiality? More than one answer may be correct.

access control authentication

An effective social media information system (SMIS) collects and analyzes data about the organization's

activities and audience on social media and its own website(s).

Database management system (DBMS) make it easier to secure data and information because they ______.

allow for the creation of access constraints

The primary advantage of mainframes computers is that they ______.

allow modifications to system capacity while the system is in use

Which of the following would be prohibited under the Electronic Communications Protection Act?

an employee leaking confidential emails they were not authorized to receive

Which of the following names a type of cybersecurity threat? More than one answer may be correct.

an event or act that may lead to asset loss a condition that may lead to asset loss a harmful result or consequence of asset loss

A business uses enterprise resource planning (ERP) systems to achieve ______.

an integrated MIS system that will strengthen its position in a competitive marketplace

Which type of event or condition may represent a cybersecurity threat? More than one answer may be correct.

an intentional event or action that damages computer hardware an unintentional or accidental event that deletes important network data or information the incorrect use or abuse of a computer assets an error, flaw, or weakness in a network asset

What are the three categories of the detect (DE) function of the NIST Cybersecurity Framework?

analysis, observation, detection

What is the final step in the six-step process of creating an SMIS?

analyze the collected data

"Cybersecurity threat mitigation" includes all of the policies, procedures, and tools that help organizations

anticipate and counter threats from security vulnerabilities or incidents and reduce their impact.

Which of the following are true about privacy protection techniques? More than one answer may be selected.

antivirus software uses a variety of techniques to identify and remove viruses and malware a virtual private network (VPN) hides your IP address by running communications through a secure network credit monitoring includes watching your monthly bills to look for fraudulent charges

California's SB-327 for IoT Security mandates that security features of Internet-ready devices must be ________. More than one answer may be correct.

appropriate to the intended use of the device suitable for the type of data the device will contain and relay constructed to protect the device and any data it stores

A high-end jewelry designer creates several different brands of jewelry for women of different ages and tastes. To gain the greatest exposure to her potential customers on social media, her SMIS should be designed to use the platforms that

are most used by the target markets for each jewelry line or brand.

Social engineering is used to target people whom

are not cautious about giving out confidential or sensitive information.

Which of the following is an example of direct inquiry?

asking a customer to fill out a survey after calling customer service

The four steps in a data quality audit are ______.

assessment, design, transformation, and monitoring Reason: Correct. Assessing the quality of source data, designing quality processes, creating maps that correct or transform data, and checking data over a given time period are the four steps of a data audit.

Which of the following is an example of an activity that would be useful during the planning stage of the plan-protect-respond cycle?

attempting to exploit flaws from the outside, simulating attacks that a hacker would try

Most organizations require employees to login in to view files that are posted to a shared drive, allowing different access to the files based on employee position within the organization and preventing unauthorized employees or other people from accessing all files. This is an example of which of the following tools that ensure confidentiality? More than one answer may be correct.

authentication encryption access control

Which of the elements of the CIA triad does properly maintaining all hardware serve?

availability

the second of Porter's 5 forces refers to the ease with which a new competitor can enter the market. Strong______ to entry decrease the strength of this force

barriers

the second of Porter's five forces refers to the ease with which a new competitor can enter the market. strong_____ to entry decrease the strength of this force

barriers

Referential integrity states that structural relationships in relational databases must ______.

be consistent: a foreign key field that references a primary key field must agree with that primary key Reason: Correct. The foreign key must refer to the primary key to create referential integrity.

In analyzing transactions, Target discovered that many people who buy diapers also buy milk in the same transaction. They use this information to discount the diapers, but raise the price of milk. What is the name of the approach Target used to discover this information?

big data

Predicting the impact of weather phenomenon of transportation routes, allowing logisticians to anticipate risks and the associated expense involved, is an example of organizational use of ___.

big data

What is predicting the impact of a hurricane that is predicted to make landfall in New Orleans on a trucking route that goes from Houston, TX to Miami, FL an example of?

big data

Allowing people to share a digital ledger across a network of computers, ___ uses computer code to create concatenated (linked together) blocks of transactions.

blockchain

Serving as the technology behind cryptocurrencies such as Bitcoin, ___ provides a level playing field for all users.

blockchain

Software and technologies that uses computer code that creates concatenated (linked together) blocks of transactions ____ allows people to share a digital ledger across a network of computers. There is no need for a central source of control because no single entity has the ability to tamper with the records.

blockchain

According to Professors W. Chan Kim and Renee Mauborgne creating an entirely new market is an example of a_______ ocean strategy

blue

According to Professors W. Chan Kim and Renee Mauborgne, creating an entirely new market is an example of a _______ ocean strategy.

blue

Match the term associated with the use of blockchain in today's business environment to the correct explanation of that term. Blockchain makes changing any information in a contract almost impossible. This proves to be advantageous for businesses that are dealing with multiple contracts. The encryption used in Blockchain makes it ideal for monetary transactions. Also, blockchain eliminates the need for banks to handle monetary transactions. Blockchain allows shippers and customers to verify with almost absolute certainty where items and goods are along the supply chain thus removing guesswork and inefficiencies. Blockchain can be used to trace mistakes and errors in manufacturing back to the point of origin.

business contracts monetary transactions supply chain management quality assurance

Managers can encourage employees to act less than ethically through which of the following ways? More than one answer may be correct.

by acting unethically themselves by not enforcing strong ethical behavior

The purpose of spyware is to ______.

capture the user's account data, passwords, key strokes, and more

Spyware's basic function is to

capture the user's account data, passwords, keystrokes, and more.

A _______is a computer connected to a network that relies on a server to provide access to resources.

client

Also referred to as Cloud security, ___ services security includes policies, procedures, controls, and hardware that work together to ensure cloud-based systems are secure. Measures put into place to ensure the Cloud service is secure include data protection, regulatory compliance, customer privacy protection, and authentication rules for users and devices.

cloud

Designed to enhance the productivity of teams, groups, and organizations. ___ software allows for the creation of a dedicated workspace where users can add data and workflows.

collaboration

Direct inquiry, indirect tracking, and 3rd party data purchase are three common methods of ___ data.

collecting, gathering, getting, obtaining, or finding

In addition to planning, analysis, and mitigation, select the remaining two categories of the respond (RS) function of the NIST Cybersecurity Framework from the list below.

communication improvements to cybersecurity response plans

attributes that follow firms to provide goods and services with higher perceived values than their competitors are referred to as _____

competitive advantage

Management Information Systems allow managers to build upon an organization's existing strengths to create

competitive advantages

management information systems allow managers to build upon an organizations existing strength to create

competitive advantages

the ability for a firm to enjoy significant profit margins decreases as the number of______ offering essentially the same products or services increases

competitors

When facing a moral dilemma, it is useful to be aware of the five principles of ethical

conduct

In the context of California's SB-327 for IoT Security, an "Internet-connected device" ________. More than one answer may be correct.

connects to the Internet has a Bluetooth address has an Internet Protocol (IP) address

Geographically distributed network server groups that work together to deliver more efficient delivery of Internet and Web content are called__ Delivery Networks (CDN).

content

Management information systems (MIS) for communication have

continued to improve and become more widely used each year

The essential function of malicious bots is to ______.

control an individual computer by self-replicating and connecting to a central server

A bank clerk has inappropriately used a customer's personal email address. The branch manager reprimands the employee and withholds an expected promotion. Which dimension of ethical behavior in the digital age is demonstrated by this disciplinary action?

control and accountability

A state requires all visitors to online cannabis shops to be at least 21 years old. However, it is unclear who should screen the website visitors and who should be responsible for any violations. Which dimension (category) of ethical behavior does this issue fall under?

control and accountability

What are the core actions of the protect (PR) function?

controlling access to systems and preventing unauthorized access

This is a small text file of information created by websites you visit that your web browser stores on your hard disk.

cookie

Small text files created by websites you visit that your web browser stores on your hard disk are called

cookies

The purpose of programs that analyze connection data is to

create information about user behavior and patterns to benefit a sponsor.

What is the first step in the six-step process of creating an SMIS?

create system goals that align with the goals of the organization

A typical flex-time policy allows employees to ______.

create their own work schedules: they can change when they start and stop their workday

Which of the following determines the interest rate you'll be charged when you want to borrow money?

credit report

Which of the following points is part of the fifth, or final, step in an ethical analysis?

cultivating the ability to defend your decision

An organization learns from a social media site that less than 10 percent of users who visit their page engage with the video that is pinned to the top. This is an example of what type of information?

customer interaction

Porters 5 Forces include existing competitors, new competitors, and which 3 of the following?

customers, substitutes, suppliers

Insurance companies use big ___ in actuarial analysis in order to more accurately estimate risk, often lowering the cost of their services.

data

Raw facts that describe the characteristics of an event, object, or set of information that can be entered into a computer is.

data

Establishing how an organization manages its data and making sure the organization adheres to these methods is a function called

data administration Reason: Correct. Data administration is responsible for developing data policies and procedures, and ensuring that they are followed.

Data integrity is increased when ______.

data are centralized Reason: Correct. Storing data in one place is vital to increasing data integrity.

Organizing data so that data are in simple tables without any redundancies is known as __________.

data normalization Reason: Correct. Data normalization is an organized approach to simplifying tables to eliminate redundancy and undesirable characteristics.

A Trojan horse succeeds through

deceptive access

When conducting an ethical analysis, what is the last step you should take?

deciding and preparing for consequences

Lean manufacturing techniques seek to eliminate waste in the production process, in contrast, Six Sigma seeks to eliminate ________.

defects

lean manufacturing techniques seek to eliminate waste in the production process, in contrast, Six Sigma seeks to eliminate____

defects

Which browser settings should you consider adjusting? More than one answer may be correct.

deleting cookies blocking or customizing your cookie settings deciding from which sites you want to allow cookies

What is the "DE" function in the National Institute of Standards Technology (NIST) Cybersecurity Framework?

detect function

Using technology to transform a market or to create an entirely new market is called creating a _______ innovation.

disruptive

Using technology to transform a market or to create an entirely new market is called creating a________

disruptive

Karl Benz invented the internal combustion automobile in 1885. Adam Smith described the efficiencies of division of labor (the assembly line) in 1776. However, when Henry Ford combined these two to produce an inexpensive automobile with the Model T in 1908, he transformed the personal transportation market. Professor Clayton Christensen called this a ___.

disruptive innovation

Karl Benz invented the internal combustion automobile in 1885. More than a century before, Adam Smith had described how division of labor creates efficiencies. When Henry Ford set up Model T production on an assembly line in 1908, he combined technology and efficiency to produce an inexpensive automobile. Ford transformed the personal transportation market. Christensen called this process

disruptive innovation

Sears, which revolutionized catalog (mail order) sales, failed to make the online leap and while Amazon capitalized on this technology, Amazon successfully used ___

disruptive innovation

Which of the following actions would violate an organization's prohibitions on the personal use of company computers as well as the law in most countries?

distributing company-owned software without authorization

While there are many benefits of Cloud computing, there are also some disadvantages. One of the disadvantages is __ . This can occur because of maintenance, system/mechanical failure, natural disasters, and outside intrusions/attacks.

downtime

data mining information from the Bureau or Labor Statistics can provide insight into regional employment figures. this illustrates how data analysis can be used to examine which factors of the PESTEL analysis?

economic

How quickly consumer demand changes with a change in price is referred to as_____ of demand

elasticity

how quickly consumer demand changes with a change in prices is referred to as_____ of demand

elasticity

Ransomware basically holds a target hostage because it ___ .

encrypts the victim's data

The primary goal of a company's social media strategy is to

engage potential customers.

The practice of data scrubbing is a vital part of data quality management because it ______.

ensures ongoing data validity by identifying and then fixing data errors Reason: Correct. The purpose of data scrubbing is to regularly detect and clean up data mistakes such as syntax errors, duplicate records, and misspellings.

modern supply chain management systems access national weather service databases to track weather events that could impact logistics. this is an example of using MIS to monitor which element of PESTEL analysis?

environmental; tracking weather events and other environmental factors to ensure smoother logistics can give a firm a competitive advantage

Which dimension of ethical behavior in the digital age includes the question of how much time employees are allowed to spend browsing social media?

establishing standards

A religious leader might instruct you on how to uphold high morals, but the reasons for acting morally are based on your ___.

ethics

The U.N. General Assembly adopted resolution 68/167 in December 2013 that affirms that the rights held by people offline must also be protected online, and it called upon all Member States (nations) to respect and protect the right to privacy in digital communication. This means that ___

even though it sounds good, Internet users should be aware that digital privacy is not honored by many on the Internet.

The main characteristics that define cybersecurity threats are ______.

events that can lead to IT asset loss, conditions that can lead to IT asset loss, and the consequences of such loss

The First Amendment to the U.S. Constitution affects Internet privacy because it

extends freedom of speech protection to the Internet, which means government does little filtering of content.

Organizations use data warehouses mainly to ______.

facilitate the analysis of data from multiple sources Reason: Correct. Warehoused data can be more easily analyzed together and then interpreted to help organizations make informed decisions.

Getting all the pertinent ___ is the first step in an ethical analysis

facts

Chinese and Nigerian manufactures have been notably successful in adopting a strategy of, rather than creating an innovative product, offering a competing product rapidly enough so that early majority adopters have a choice when purchasing the product for the first time. This is referred to as a ___.

fast-follower strategy

Chinese and Nigerian manufactures have been notably successful in adopting a strategy of, rather than creating an innovative product, offering a competing product rapidly enough so that early majority adopters have a choice when purchasing the product for the first time. this is referred to as a_____

fast-follower strategy

From the following list, select all the types of problems that create a cybersecurity vulnerability.

faulty procedures for upholding system security flaws in the design of system security poor setup or implementation of system security insufficient control or management of system security

Which of these online functions are most susceptible to MitM attacks? More than one answer may be correct.

financial applications e-commerce

That employees will learn from experience how to use technologies to develop a product, gaining a "head start" over any competition that attempts to enter the market is considered a ___.

first-mover advantage

that employees will learn from experience how to use technologies to develop a product, gaining a "head start" over any competition that attempts to enter the market is considered a_____

first-mover advantage

the employees will learn from experience how to use technologies to develop a product, gaining a "head start" over any competition that attempts to enter the market is considered a_____

first-mover advantage

in 1979, Professor Michael E. Porter published "How Competitive Forces Shape Strategy" in the Harvard Business Review. In this paper, he described factors that impact businesses. The became known as Porter's__________ forces

five

There are many benefits of Cloud computing. One benefit of cloud computing is _____ that allows for the access of data, files, and programs when you are off-site or at home via web-enabled devices.

flexibility

Over 50% of all innovative products fail in the market, while over 80% of the successors to the products succeed. This is a key tenet of the fast-__________ strategy.

follower

Over 50% of all innovative products fall in the market, while over 80% of the successors to the products succeed. this is a key tenet of the fast_____ strategy

follower

To control how information is entered into a database, programmers and database administrators create ___ to help ensure data integrity.

forms

Organizations perform data quality audits in order to ______.

gain an overall assessment of the strengths and weaknesses of their data Reason: Correct. A data quality audit will reveal the state of data quality and any actions that should be taken to improve it.

Which of the following is the first of the five steps in an ethical analysis?

getting the facts

When conducting a five-step ethical analysis, the first step in the process is

getting the facts.

Describe the goals of the National Institute of Standards Technology (NIST) Cybersecurity Framework. More than one answer may be correct.

give guidance to organizations who wish to understand potential security breaches help organizations develop appropriate policies and procedures to mitigate data breaches create an atmosphere where organizations can effectively discuss cybersecurity risks internally and with those outside of the organization

The term "cybersecurity threat mitigation" refers to all of the policies, procedures, and tools used to ______.

guard against threats such as security incidents, data breaches, and unauthorized network access, and reduce any harm they cause

A mid-sized independent hardware store has recently merged with a large national chain. The local owners have long used a reliable database to manage inventory. Their database has been essential in balancing orders for seasonal merchandise with the problem of limited shelf space. The merger will soon entail managing many more types of data, as the national chain has approved lists of suppliers, precise requirements for recording transactions, specific human resources procedures, and more. Which statement best summarizes what the local managers will be able to do for the first time when they start using the parent company's database management system (DBMS)?

he managers will be able to create, edit, and store data in a secure manner across all data types required by the parent company. Reason: Correct. Because a DBMS allows management and manipulation of data in databases, the owners will have access to organized information supplied by the parent company for their use.

The primary purpose of a business intelligence (BI) system is to ______.

help a business make strategic decisions based on its own data Reason: Correct. Businesses use BI systems to gain an accurate, comprehensive picture of their past, current, and future operations, which helps them make better informed decisions.

In cybersecurity, the probable maximum loss (PML) is used to______.

help determine spending needed to adequately secure an organization's IT infrastructure

In cybersecurity risk analysis, PML (probable maximum loss) is used to

help determine spending needed to adequately secure an organization's IT infrastructure.

A database management system (DBMS) is a computer program that is used to ______.

help organize the data found in a database

The goal of the NIST Cybersecurity Framework Protect (PR) function is to ______.

help protect an organization's IT infrastructure from security breaches by offering guidelines on IT infrastructure protection

Businesses use business intelligence (BI) systems to ___.

help them make decisions that are informed by business data and facts Reason: Correct. BI systems support strategic decision making by providing businesses with an accurate, comprehensive picture of their past, current, and future operations.

Why do large, data-driven companies use analytic platforms?

hey generate vast amounts of organizational data and need to be able to rapidly analyze and interpret this information to make informed business decisions. Reason: Correct. Data-driven companies are committed to basing their decisions on data analysis; analytic platforms can search and analyze large data sets at high speeds.

Which of the following concerns falls under the dimension of establishing standards in the digital age? More than one answer may be correct.

how an increase in the time employees spend on social media affects their mental health

What does the General Data Protection Regulation (GDPR) regulate?

how companies protect personal data

Which of the NIST Cybersecurity Framework functions investigates an organization's cybersecurity management in the context of their business needs and resources?

identify (ID) function

Describe the purpose of a cybersecurity risk analysis. More than one answer may be correct.

identify a company's assets calculate potential loss due to security threats determine how to respond to a potential loss

What does the Wiretap Act aim to protect against?

identity theft and unlawful access to stored communications

A company's periodic web mining exercise to determine its best-selling products resulted in the discovery that a product sold in conjunction with a movie released 10 years ago has recently become coveted by nostalgia fans. The company redesigned its website so that interested consumers can purchase the product right on the homepage. This company has used web mining to ______.

improve site usability Reason: Correct. The company's redesign of the website made it easier for consumers to buy the product they were searching for. This is an example of improved site usability.

If an organization wants to increase user engagement on social media, it wants to

increase the conversion rate of its social media posts to interactions with users.

An appropriate social media goal for a business that wishes to raise its public profile is

increasing brand awareness.

Which of the following are areas covered by state-specific cybersecurity laws? More than one answer may be correct

increasing cybersecurity at the state and local level addressing security needs of mobile devices protecting critical infrastructure from cyber threats

A wi-fi tracker following a shopper's path within a store is an example of what kind of data collection?

indirect tracking

A hiring manager wants to check job applicants' posts on social media before deciding whom to hire, to ensure the person will represent the company with professionalism and maturity. Which dimension of ethical behavior in the digital age does this situation represent?

information privacy rights

To address the ethical concerns surrounding ________, many employee handbooks state that the organization must use data responsibly and always respect privacy.

information privacy rights

The dimensions (categories) of ethical dilemmas raised by the use of information systems include challenges in which of these areas? More than one answer may be correct.

information privacy rights copyright and intellectual property rights quality of life honesty of content

Forms structure data input to help ensure data ------- meaning the information entered is accurate, timely, and useful.

integrity or accuracy

Music files and video games are examples of what kind of property in the eyes of the law?

intellectual property

Information management systems that help to ensure that a minimal number of product touches occur from product creation to customer purchase are known as ___ systems.

inventory management

information management systems that help to ensure that a minimal number of product touches occur from product creation to customer purchase are known as_____ systems

inventory management

information management systems that help to ensure that a minimal number of product touches occur from product creation to customer purchases are known as_____ systems

inventory management

Businesses can use in-memory computing to conduct or support almost any task that ______.

involves the near-instantaneous processing and analysis of huge volumes of data Reason: Correct. In-memory computing enables enormous amounts of data to be rapidly processed and analyzed for real-time analytics and results.

The need to keep sensitive data, information, and systems confidential ______.

is both a major goal and a requirement for cybersecurity

An email that appears to be from a legitimate company is most likely to be a social engineering cybersecurity attack if

it contains a link to a free offer that seems too good to be true.

With regard to Internet privacy, the First Amendment to the U.S. Constitution is relevant because ___

it provides freedom of speech protection that extends to the Internet which means there is little government filtering of content.

In order to gain market share, the firm must differentiate itself from

its competitors

in order to gain market share, the firm must differentiate itself from

its competitors

The difference between a company's fundamental value and its total value is that

its fundamental value is what customers and stakeholder's value about its product or service, while its total value includes the value added by other aspects of the business.

Which is the best explanation of the difference between a company's fundamental value and its total value?

its fundamental value is what customers and stakeholders value about its product or service, while its total value includes the value added by other aspects of the business.

A manufacturing and inventory management practice that gained popularity in the 1980s was known as _______-in-time (JIT) manufacturing and inventory management.

just

a manufacturing and inventory management practice that gained popularity in the 1980's was known as_____ -in- time (JIT) manufacturing and inventory management

just

To properly authenticate, or verify, the identity of authorized users and protect assets from unauthorized users, it is essential to

keep user logins and passwords confidential.

One surveillance technology that relies on how the user enters data is a

keylogger

A form of spyware that records all actions typed on a keyboard is called a

keystroke logger

Which of the following is prohibited by the Computer Fraud and Abuse Act? More than one answer may be correct

knowingly transmitting a virus that causes damage to a computer accessing information on a computer that has been left unattended

A starting point to investigate the complex topic of a society's ethics is first to understand the society's __ and the history behind the enacting of them.

laws

requiring a modern communications system, a process that actively encourages all employees to halt the manufacturing process if safety risks are observed is the______ process

lean

technologies that focus on continual employee training and on developing efficient supply lines and creating relationships with suppliers to continually smooth these lines to minimize excess inventory or delays as well as to minimize waste are referred to as______ techniques

lean

principles that focus on increasing efficiencies by improving supply lines and through creating a well-trained, highly knowledgeable workforce that assertively acts to minimize waste and maximize value in every process and product are referred to as____ manufacturing principles

lean/ lean six stigma

In a PESTEL analysis managers examine____ factors

legal

small, drive-up, coffee stands seem to be popping up on every street corner. because of this, these coffee vendors have difficulty raising prices significantly higher than their competitors. this is because the coffee stand business has extremely_____

low barriers to entry

Ransomware basically holds a target hostage because it

makes the target's own data inaccessible.

Which of the following is a goal of confidentiality as defined by the CIA triad?

making sure the right people have access to secure information

What are causes of the costs estimated included during a risk analysis? More than one answer may be correct.

malware attacks system downtime security breaches

The cybersecurity risks known as Man-in-the-mobile (MitMo) are realized when ______.

malware infects smartphones and other mobile devices

A computer virus is______.

malware that, when executed, adversely affects performance or damages programs

Adrian and Frank began the online process of applying for a short-term loan for their business. They created an account with a username and password, looked over the privacy statement, reviewed the security policy, and accepted the terms of use. After logging on, however, they became increasingly uncomfortable answering so many detailed questions about income, employment, and more. What specific risk might they have remembered from studying cybersecurity?

man-in-the-middle (MitM)

In his text, "The Human Side of Enterprise," Douglas McGregor focused on ________.

manager attitudes toward their employees

Which of the following acts is an example of social engineering?

manipulating people in order to obtain and misuse their personal information

Web services are a set of software technologies that are able to exchange information with each other using standardized web communication protocols and languages. One of the technologies on which web services are based is XML. XML stands for Extensible __Language

markup

Some popular social media management systems are becoming more difficult to manage because

millions of diverse users across the globe are active participants.

Deepfake technology raises questions about the ethics of

modifying images or video by replacing one person's likeness with another's.

Management can discourage the inappropriate use of business computers by publicly announcing that their organization uses employee ___ software or remote desktop software.

monitoring

According to Professor Porter, a business must differentiate itself from its competitors. One method is to encourage customers to believe that an organization provides higher quality goods or better service, then the organization can charge a premium, or gain market share, or (ideally) both. For example, by placing a swoop icon on a sweatshirt, Nike is able to charge a higher price. This methodology is called ___.

monopolistic competition

Professors Marvin B. Lieberman and David B. Montgomery of UCLA's Anderson School of Management examined the advantages and disadvantages of being the first firm to enter a product into the market. They coined this the first-_____ advantage.

mover

Professors Marvin B. Lieberman and David B. Montgomery of UCLA'S Anderson School of Management examined the advantages and disadvantages of being the first firm to enter a product into the market. they coined this the first-________ advantage

mover/movers

How have businesses reduced the likelihood of experiencing a data breach?

moving data storage to a cloud service provider such as Amazon Web Services

Which of the following are examples of the direct inquiry method of data collection? More than one answer may be selected.

ordering food delivery via a smartphone app registering an account for a new social media platform tracking the click-through rate of email promotions

In contrast to computerized systems, traditional file management systems can create issues with ______.

organization, repetition, and lack of consistency Reason: Correct. Traditional file management programs and processes can create these three issues.

What does the identify (ID) function of the NIST Cybersecurity Framework focus on?

organizational understanding of how to manage cybersecurity risks

Which of the following is a goal of an information technology disaster recovery plan (IT DRP)?

outline specific recovery times for information technology to resume after an issue occurs

Cookies that are created by a website other than the one you are currently visiting and are used to track your surfing habits are called third- ___ cookies. These cookies are considered an invasion of privacy.

party

Describe categories of intellectual property rights. More than one answer may be correct.

patents, copyrights, trade secrets

A social media information system (SMIS) is composed of three parts, which are

people, data and procedures, and hardware and software.

Which type of cookie is lost only if deleted or if is created with an expiration date?

persistant cookie

Cookies stored on your device's hard drive and remain even if your computer has been restarted are called ___ cookies.

persistent

Cookies that are stored on the hard drive and are not lost when the web browser is closed are called

persistent cookies

managers often use an organizations human resource management system to evaluate the relative strength or weakness of its______

personnel (workforce); an HRM system can provide managers with significant information regarding an organizations workforce

In the relationship shown in the image, the Owners table is linked to the Pets table by a one-to-many relationship. This means that each entry in the OwnerID field can be linked to many ___.

pets

when conducting a SWOT analysis, managers examine factors that impact their organization internal strengths and weaknesses. these factors are sometimes referred to as the 5 P's. the 5 P's include which 3 of the following?

plant, purse, personnel

A Cloud-based computing model where Cloud service providers offer hardware and software tools need for application/software development via the Internet is called__as a Service. These vendors host the hardware and software needed for development on their own infrastructure that removes the need for developers to install this on their own devices.

platform

From the following list, select all the primary components of cybersecurity threat mitigation.

policies and procedures for threat prevention tools and procedures for threat identification policies, tools, and strategies for threat "curing" or minimization

The third step in the five-step process of conducting an ethical analysis is searching for

precedents

Adware specifically functions to ______.

present advertisements to users based on their browsing behaviors

Professor Michael E. Porter added to his five-forces model by highlighting basic strategies that businesses must follow if they wish to gain competitive advantage. He stated that these strategies fell into which two separate categories?

price leadership product differentiation

In a relational database, an important field that contains a unique value that identifies each record as individual is the ------- key.

primary

A wide-ranging term that refers to a variety of considerations including; how data and information is used, who has access to data and information, the techniques and technologies used to protect sensitive and private data, communications, and preferences is Internet ___.

privacy

Employees and organization stakeholders rely on managers to protect their online

privacy

Managers must protect the online ___ of employees and organization stakeholders.

privacy

Software used by social media information systems websites include

programs that analyze data.

What part of the plan-protect-respond cycle is occurring when an organization limits access to sensitive documents on a server to only those with the required security clearance?

protect

Which of the National Institute of Standards Technology (NIST) Cybersecurity Framework functions entails an analysis of cybersecurity risk and reduction of potential damage to IT infrastructures?

protect (PR) function

The Important goals of data governance (DG) are to ______.

protect data from risk, misuse, regulatory noncompliance, and quality and cost issues Reason: Correct. These goals all help to guarantee the quality, usability, and security of an organization's data.

Which of the following statements encapsulates the purpose of the Federal Information Security Management Act?

protect government assets against cybersecurity events

What is the key action called for in the detect (DE) function of the NIST Cybersecurity Framework?

quick identification of a cybersecurity threat

Analytic platforms are designed to ______.

quickly gather and analyze specific organizational data to provide information that guides decision making Reason: Correct. Data-driven companies need analytic platforms to help ensure that they base their decisions on what their current performance data show or suggest.

Malware that encrypts the victims data files and then demands that a payment is made to the hacker is called ___

ransomware

Which threat to cybersecurity can only come from outside an organization?

ransomware

In a relational database, such as Microsoft Access, a collection of related fields in a data file is called a

record

Which NIST Cybersecurity Framework function involves correcting an organization's cybersecurity plans due to a cybersecurity event?

recover (RC) function

Which function of the NIST Cybersecurity Framework calls for an organization to implement plans for resilience?

recover (RC) function

When competitors seek to gain competitive advantage through price leadership or by making product improvements, Professors W. Chan Kim and Renee Mauborgne would say they are using a ___.

red ocean strategy

when competitors seek to gain competitive advantage through price leadership or by making product improvements, Professor W. Chan Kim and Renee Mauborgne would say they are using a____

red ocean strategy: the term "red" refers to an ocean filled with predators and the blood of their prey

A link between tables in a relational database that defines how the data are related is called a _____.

relationship

In the business landscape, social media information systems are

relatively new and increasing in importance.

A cybersecurity exploit allows a hacker or intruder to

remotely access a network, gain privileges, and make unauthorized changes.

How is information artfully extracted from a database? (Drag the correct response to the empty box) Forms allow data to go into a database, ___ displays information coming out of a database.

reports

To display or distribute information from a database, programmers or database administrators create ___.

reports

A corporation that was recently the victim of hacking that was caused by a high-level employee falling for a phishing scheme institutes a required, annual, self-paced training module that alerts employees to the most common recent phishing attacks. The institution of this new training requirement represents which phase of the plan-protect-respond cycle?

respond

In what stage of the plan-protect-respond cycle forensic analysis conducted?

responding stage

Describe the categories of the Recover (RC) function of the NIST Cybersecurity Framework. More than one answer may be correct.

restoration of impaired systems improvements to cybersecurity plans communication with all stakeholders

The principle of ethical conduct that states that some decisions are either morally right or morally wrong is called the principle of moral

rights

The ability for a firm to enjoy significant profit margins decreases as the number of ______ offering essentially the same products or services increases.

rivals

A company regularly honors its employee-of-the-month with a congratulatory post on its social media pages. Which standards should the company establish and enforce to best protect the privacy rights of these employees?

rules of conduct for how social media followers and visitors respond to the posts

Walmart uses economies of _______ to pressure suppliers to lower their prices, allowing Walmart to offer lower prices to its customers and decrease competition.

scale

Walmart uses economies of___ to pressure suppliers to lower their prices, allowing Walmart to offer lower prices to its customers and decrease competition

scale

With price leadership, an organization seeks to offer a product to a large market at the lowest possible price by maximizing efficiencies and using economies of ______.

scale

with price leadership, an organization seeks to offer a product to a large market at the lowest possible price by maximizing efficiencies using economies of___

scale

What is an example of something that may be copyrighted?

sculptures and choregraphy

Because prior management decisions might provide guidance on your current situation, the third step of an ethical analysis is to ___ .

search for precedents

Which step of an ethical analysis is designed to enable a manager to obtain guidance or insights from other managers?

searching for precedents

Which of the following are common techniques used by antivirus software to identify malware? More than one answer may be selected.

searching for the specific set of data that makes up a virus' signature examining files for suspicious characteristics without an exact signature match quarantining all emails that are sent by someone who is not in the user's contact list

The ________ step of an ethical analysis involves asking whether the decision will impact the privacy or property rights of any individuals or corporations.

second

For which type of cybersecurity vulnerability do organizations maintain and share databases of known problems?

security weaknesses in operating systems or application software

A Cloud-based service offered by vendors and hosted on a vendor's cloud that allows users to access a software application using a web browser and Internet connection is referred to as Software as a

service

A type of cookie, sometimes called a transient cookie, that is not stored but just kept in memory when a user visits a website is called a ___ cookie.

session

What type of cookie is stored in temporary memory and is lost when the web browser is closed?

session

A relational database management system (RDBMS) is a type of DBMS whose primary function is to ______.

show how data are connected through relationships Reason: Correct. An RDBMS uses a tabular structure to organize data to define and identify relationships.

Because its techniques rely so heavily on statistical data to ensure quality control and to minimize process and product variance, management information systems are integral to the success of any Six _______ initiative.

sigma

Because its technologies rely so heavily on statistical data to ensure quality control and to minimize process and product variance, management information systems are integral to the success of any Six_____ initiative

sigma

Techniques that seek to reduce variance in output to less than 3.4 errors per 1,000,000 manufacturing steps are referred to as ___.

six sigma

During the measure and analyze steps of the____ procedure, collecting data and using data analytics are essential

six stigma

because of its focus on reducing variation to eliminate product defects. which process methodology relies most heavily upon data analysis?

six stigma

A collaboration hub that aims to replace email and make communication seamless, ___ is composed of channels where teams and members of the organization can communicate.

slack

What are third-party cookies?

small text files created by websites other than those visited by web customers

Of the listed methods of collecting demographic information, which is the most effective for organizations defining their target market?

social media

Adding a dedicated group to your Facebook account allows you to meet online and keep in touch with others who share your interest. You can post relevant media, such as photos, articles, and videos. Which role in a social media information system (SMIS) does your group fit into?

social media community

Managers often use the PESTEL analysis to examine the political, economic, environmental, legal and which 2 other issues facing an organization?

socio-cultural technological

by improving communications throughout the organization, as well as gaining better perceptions of consumer opinions using CRM software, managers are able to monitor which PESTEL factor?

sociocultural

If an organization's automated backup system is vulnerable to data loss or corruption, its cybersecurity vulnerability is a weakness or flaw in its

software

From the following list, select the activities that are both violations of workplace computer ethics and illegal.

software piracy using an employer's computer network computer scams launched from work computers

As management information systems (MIS) technology improves, managers' jobs will likely change because ______.

some tasks will be performed by online services and staff using collaboration tools

Keystroke loggers and packet analyzers (sniffers) are two common types of ___.

spyware

modern inventory management systems help to ensure a number of critical advantages, including which three of the following?

stock-obsolescence minimization shelf space optimization timely re-ordering

The primary characteristic of a relational database is that it ______

stores and allows access to data objects that are related to one another Reason: Correct. A relational database structures data and create relationships between objects. The data may be stored and accessed in different ways.

Data that is typically used in commercially available relational databases, where the data resides in a fixed field and can easily be queried, is

structure data

Data that has a defined length, type, and format, including items as numbers, dates, or strings such as a customer profile is referred to as ___ data.

structured

A business must not only look at its direct competitors, but also must contend with those firms that offer a product that a consumer might alternatively choose. For example, McDonald's and Burger King can be considered competitors and if one firm raises prices the other firm might gain its customers. However, if both firms raise their prices, customers may choose to purchase pizza instead. Porter refers to this as the force of _______ in the market.

substitutes

Coca-Cola and PepsiCo dominate the soft drink market. However, during the 2000s, many customers switched from soft drinks to water, causing Coca-Cola and PepsiCo to develop Dasani and Aquafina. The ability of customers to switch from one product to an alternate product illustrates what Porter called the strength of __.

substitutes

If Mcdonald and Burger Kind raise prices too high, customers may switch from burgers to tacos. this illustrates Porter's force of____

substitution

Apple uses Corning's glass products for all its devices, such as the Gorilla Glass 6 used in the iPhone 11 series. To ensure that it continues to have a strong relationship with this glass industry leader, Apple has invested nearly $500 million toward Corning's advanced glass research division. By building up this relationship, Apple seeks to maintain some control over which of Porter's 5 forces?

suppliers

During the 1950s, the United Auto Workers union (UAW) exercised considerable control over the labor ___. This meant that automobile manufacturers had little control over labor costs.

supply

during the 1950's, the united auto workers union (UAW) exercised considerable control over the labor____. this meant that automobile manufactures had little control over labor costs

supply

The purpose of executive support systems (ESS) is to ______.

support decision making by compiling and organizing data into clear, usable reports

managers often use the PESTEL analysis to examine the political, economic, environmental, legal, and which 2 other issues facing an organization?

technological, socio-cultural

A keylogger can be accurately described as ______.

technology that captures keyboard input on several types of devices to glean confidential information

Where are session cookies stored?

temporary memory

The Act that specifically requires all pornographic sites to include some sort of age verification is

the Children's Internet Protection Act of 2000 (CIPA).

Which law or set of laws was created to implement two World Intellectual Property Organization (WIPO) treaties and to update copyright laws regulating digital material?

the Digital Millennium Copyright Act (DMCA)

Which principle of ethical conduct calls for allocating rewards equitably according to individuals' productivity?

the Principle of Distributive Justice

When facing an ethical decision regarding how to act, which three basic principles provide guidance?

the Principle of Distributive Justice the Principle of Virtue the Principle of Moral Rights

Of the following principles, which states that a manager must attempt to determine if a decision is fair for all employees involved?

the Universalist Principle

Of the principles of ethical conduct, one is said to be similar to a cost-benefit analysis. Which of the following principles does this description fit?

the Utilitarian Principle

The Act that protects person-to-person wire, oral, and electronic communications is

the Wiretap act

in the 1980's, Professors Marvin B. Lieberman and David B. Montgomery of UCLA'S Anderson School of Management examined the advantages and disadvantages of being the first firm to enter a product into the market. three advantages they described included were:

the firms' employees will learn from experience how to use technologies and processes to develop the product the first firm to enter the market has an opportunity to secure important raw materials and to develop necessarily logistics lines ahead of any other competitors consumers often become accustomed to products that they adopt and a firm that attempts to compete must create......

barriers to entry can protect existing firms from which of porters five forces?

the force of new competitors

In his theories of management, Peter Drucker placed special emphasis on ______.

the importance of involving employees in the decision-making process

Even though the Child Online Protection Act of 1998 was sponsored by both Democrats and Republicans and was passed by both Houses of Congress and signed into law by President Clinton, you cannot be punished for violating law because ___ .

the law violated the 1st Amendment (freedom of speech) rights and was found unconstitutional.

Which of the following must remain confidential to achieve cybersecurity goals? More than one answer may be correct.

the logins and passwords of authorized users private or sensitive data and information the specifications of the organization's IT systems

A cybersecurity exploit is ______.

the means by which a hacker capitalizes on a cybersecurity vulnerability to gain access to and harm a system

A fast food chain wants to use social media platforms to help grow its business. It plans to post links to coupons on its website and encourage people to scan the coupon redemption codes at restaurant cash registers. The best social media information system (SMIS) metrics to track the success of these promotions are

the sales statistics linked to the coupon redemption codes

A fast food chain wants to use social media platforms to help grow its business. It plans to post links to coupons on its website and encourage people to scan the coupon redemption codes at restaurant cash registers. The best social media information system (SMIS) metrics to track the success of these promotions are ______.

the sales statistics linked to the coupon redemption codes

To increase sales, a sportswear chain is designing a promotional campaign for social media. It plans to post links to coupons on its website and have its sales personnel scan the coupon redemption codes at store registers. Which are the best social media information system (SMIS) metrics to track the success of this promotion?

the sales statistics linked to the coupon redemption codes

What do most companies use as their main conduit for reaching and connecting with customers?

their website

Cookies that are created by a website other than the one you are currently visiting and are used to track your surfing habits are known as ___ cookies.

third party

Cookies that are created by a website other than the one you are currently visiting and are used to track your surfing habits are known as ________ cookies.

third-party

What is a company that purchases consumer behavior information from other organizations engaged in?

third-party data purchase

You own a pool installation business and need a list of high-income houses with large backyards. You buy the list from a data marketing company. What is this called?

third-party data purchase

A SWOT analysis attempts to identify, an organization's (or an individual's) internal strengths and weaknesses and examines external opportunities and _______.

threat

A SWOT analysis attempts to identify, an organization's ( or an individuals) internal strengths and weaknesses and examines external opportunities and______

threats

When external opportunities match with internal strengths, managers should choose an aggressive strategy, particularly when facing weak external ___.

threats

Which of the following describes why a credit institution would use big data? More than one answer may be selected.

to anticipate the likelihood of loan default to accurately report credit ratings to sell to other corporations

What does the General Data Protection Regulation (GDPR) strive to achieve?

to ensure EU companies protect the privacy and personal data of EU citizens

What is antivirus software used for?

to scan files to identify and remove computer viruses and other malicious programs

A network administrator uses employee monitoring software to _______.

track computer use of all employees from a central location in real time

How does the structure of an online analytical processing (OLAP) database shape its core functionality?

ts use of data cubes allows users to conduct complex queries, analyses, and modeling by taking multiple dimensions of data (types or levels) into account and viewing data from multiple viewpoints or "slices" (such as by date and location).

According to the identify (ID) function of the NIST Cybersecurity Framework, what allows an organization to prioritize its efforts where cybersecurity risk is involved?

understanding of its business environment and resources

Making an ethical decision will most likely result in

unintended consequences

Cloud computing can best be described as ______.

using the Internet to store and access resources

What are the two major types of patents?

utility, and design

A type of network that creates a secure connection between two computers is a __ private network that allows for encrypted communications using the Internet for data transmission and communication.

virtual

Which type of cybersecurity breach can cause the most damage to an organization's systems, data, and information?

viruses

From the following list, select all the examples of different cybersecurity breaches.

viruses spyware impersonation Distributed Denial of Service (DDOS)

When a large number of buyers seek to purchase a firm's products even when prices increase, Porter's force of customers can be said to have ___. This tends to strengthen the firm's profitability.

weakened

when a large number of buyers seeking to purchase a firm's products even when prices increase, Porter's force of customers can be said to have______. this tends to strengthen the firm's profitability

weakened

A benign Internet robot that gathers data is called a(n)

web crawler

In which situation should the origin of information be authenticated to protect data integrity?

when electronic votes are submitted during an election

A manager must conduct an ethical analysis to decide whether an employee is abusing the company's flextime policy. When determining whom will be affected by her decision, it is important that the manager also consider

whether she might personally benefit or be harmed by it.

Ransomware is typically introduced into a network by a ________ and to an individual computer by a Trojan horse.

worm

Trying to answer questions such as, "what happened?" or, "what is occurring?" or "what was the ROI?", is the role of ___.

Descriptive analytics . Descriptive analytics seeks to uncover historical trends in data sets.

Select what's true about Geographic Information Systems (GIS). More than one answer may be selected. GIS allows for the analysis of spatial data (including geospatial data and geographic information) that is used for more informed decision making. GIS systems are still being tested and are not quite ready for widespread commercial use. GIS are built on a foundation provided by the Global Positioning System (GPS). GIS permits organizations and users the ability to store, view, and analyze geographic and geographic data in the form of multidimensional charts and maps.

GIS allows for the analysis of spatial data (including geospatial data and geographic information) that is used for more informed decision making. GIS permits organizations and users the ability to store, view, and analyze geographic and geographic data in the form of multidimensional charts and maps. GIS are built on a foundation provided by the Global Positioning System (GPS).

While there are many benefits of Cloud computing, there are also some disadvantages. One of the disadvantages is __. Cloud infrastructure is owned, managed, controlled, and monitored by the Cloud service provider. This means the customer often has little control over Cloud service processes and procedures.

Limited control

SQL, usually pronounced "sequel", is quite useful when working with large data sets. The Q in SQL stands for ___.

Query

Collections of related fields in a database are referred to as ___.

Records

The graphical and structured representation of data is known as data___.

Visualization

Entry-level data analysts frequently start with no prior ______ , but go through extensive on-the-job training that teaches them how to apply information learned in college as well as training on organizational policies and procedures.

experience

Data that has been collected internally by the organization is known as ___ -party data.

first

A group of two or more devices/computers connected together to allow for the exchange of information and for the sharing of resources is call a

network

Large and small businesses find they can ___ their reliance on internal IT infrastructure and reduce cost by utilizing Cloud-based technologies.

reduce

Using the correct syntax allows the user to extract data from multiple fields found in data tables. In order to extract information from multiple tables, the ___ command is used to indicate multiple fields in conjunction with FROM and WHERE to narrow the search and get specific results.

select

Characteristics of spreadsheets include which 2 of the following?

- Information is organized into cells - Data is structured in rows and columns

Data analysts must blend facts and data with knowledge about the ___.

Business or organization

There are three main tools data analysts and other members of an organization use to analyze data. They are spreadsheets, databases and query languages, and data ___tools.

Visualization

For data to be considered open data, it must have what 3 characteristics?

- Datasets must have access rights that allow them to be reused and redistributed. - Datasets must be universally available so that anyone can use the data. - The public must have access and datasets must be available for use.

Providing the ability to explore and analyze data in seconds using a drag and drop interface as well as natural language processing which allows for the presentation of questions are major attributes of ___ , which offers licenses for Creators, Explorers, and Viewers.

Tableau

Select all of the characteristics of that explain how the Internet works. Data on the Internet is usually stored on specialized computers called servers. Information sent over the Internet is transferred in small groupings called segments. The connections points in the Internet are called nodes. Data is transferred from one network to another network through hardware called routers.

The connections points in the Internet are called nodes. Data on the Internet is usually stored on specialized computers called servers. Data is transferred from one network to another network through hardware called routers.

A computing model where processing, storage, software, applications, and a variety of services are provided over a network, mainly access via the Internet is called___computing

cloud

A SQL statement is used to ask a question or communicate a request of the ____ _ management system.

database

Questions that data analysts often ask include which 3 of the following?

- Who will receive the information and analysis? - What are the time constraints for the project? - What overall outcomes and results that are needed?

Select all of the correct statements about Transmission Control Protocol/Internet Protocol. TCP/IP is split into a suite of three distinct layers Covers how software applications communicate across networks and how data packets are assembled and reassembled once they reach their destination Used as a private network communications protocol for private networks including intranets and extranets A suite of communication protocols (standards/rules/guidelines) used to connect devices to the Internet

A suite of communication protocols (standards/rules/guidelines) used to connect devices to the Internet Covers how software applications communicate across networks and how data packets are assembled and reassembled once they reach their destination Used as a private network communications protocol for private networks including intranets and extranets

Which of the following functions are provided by an Internet Service Provider (ISP)? More than one answer may be selected. Provide access or a gateway to the resources on the Internet Your ISP pays for access to the Internet Provide an Internet Protocol (IP) address You do not need an ISP to connect to the Internet.

Provide access or a gateway to the resources on the Internet Provide an Internet Protocol (IP) address Your ISP pays for access to the Internet

One way to visualize a data ecosystem is to apply it to the data project life cycle. The Data Science Ready project outlines the 5 steps of the data project life cycle. The final stage in this life cycle is ___.

Storage Data storage involves hardware, software, and procedures for securing, maintaining, and accessing data.

Click and drag on elements in order Put these steps in the proper order to explain communication over the interenet.

Assemble the data packet. Correct domain name is identified. Look up IP address. IP address is added to the packet. Transmission Control Protocol. Message is sent/shipped using a variety of different carriers (ISPs).

Working on data analytics teams to extract data from large data sets, creating reports that outline key findings, monitoring key performance indicators (KPIs) to identify success or failure, and analyzing data to identify trends are just a few of the responsibilities of a data ____ .

analyst

Match the TCP/IP layers to their correct definition. 1. Handles the physical parts of sending and receiving data. Data can be sent via wireless networks, Ethernet cable, network interface cards (NIC), etc. 2. Controls the movement of packets throughout the network 3. Divides data into packets and acknowledges the packets have been received 4. The group of applications that require network communication and are used by people to facilitate communication. These include email and messaging applications

1. Datalink 2. Internet 3. Transport 4. Application

Select what's true about Cloud computing in today's business environment. More than one answer may be selected. 70% of global businesses backup some portion of their data using a Cloud service provider. In the United States, 96% of all organizations use the Cloud in one form or another. Large and small businesses find that the use of Cloud-based technologies increases their reliance on internal IT infrastructure and increases IT costs. 93% of small businesses backup some portion of their data using a Cloud provider.

70% of global businesses backup some portion of their data using a Cloud service provider. In the United States, 96% of all organizations use the Cloud in one form or another. 93% of small businesses backup some portion of their data using a Cloud provider.

Geographic Information Systems (GIS) are focused on the capture, analysis, use, and management of spatial location information. GIS is rooted in the science of geography and seeks to integrate many types of data to create visualizations using maps and 3D scenes. Which of the following are applications of GIS? More than one answer may be selected. The government uses GIS to help position satellites for communications. Organizations use GIS combined with data analytics to better determine customer needs and wants. The retail sector uses GIS information to place certain products based on regional demand preferences. Telecommunications providers use GIS to map out cell tower placement.

Organizations use GIS combined with data analytics to better determine customer needs and wants. The retail sector uses GIS information to place certain products based on regional demand preferences. Telecommunications providers use GIS to map out cell tower placement.

In computer programming, a set of rules and guidelines that define a specific computer language is referred to as the language's ___.

matches Choice Syntax

Match each use of a Geographic Information System (GIS) to the correct definition. With a location specified, the GIS finds targets within the defined area. This can include gas stations, hospitals, and retail stores. When a user has determined their destination, GIS can assist in providing directions GIS can map population densities based on a standardized unit of measure (kilometers). This can assist decision making related to increased police presence or mapping of delivery routes. GIS can provide information related to how many businesses are present in a certain geographic area. This can help businesses to make more informed decisions about where to open their next store.

Proximity location Route info Density maps Quantity maps


संबंधित स्टडी सेट्स

Topic 10: Reactions of Alkanes, alkenes, alcohols

View Set

APUSH Chapter 14 (Civil War; 1861 - 1865)

View Set

Geometry (Grade 9) Midterm Review (True and False)

View Set

CFA Level 1 - Section 2: Quantitative Methods - Reading 12: Hypothesis Testing

View Set

Child Abuse Prevention and Investigation

View Set