CIS 205 Exam Review

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Government

Adhere to regulations/laws, increase employment

__________ are mathematical formulas placed in software that performs an analysis on a dataset.

Algorithm

Select three Business 2.0 communication and collaboration tools.

Blog, Wiki and Mashup

What was the original term for a company operating on the Internet?

Dot-com

What is a magazine published only in electronic form on a computer network?

Ezine

What is an artificial intelligence system that mimics the evolutionary, survival-of-the-fittest process to generate increasingly better solutions to a problem?

Genetic algorithm

______ is the Internet protocol web browsers use to request and display web pages using universal resource locators.

HTTP

What is another name for the deep web?

Invisible web

What involves capturing, classifying, evaluating, retrieving, and sharing information assets in a way that provides context for effective decisions and actions?

Knowledge management

What sends a massive amount of email to a specific person or system that can cause that user's server to stop functioning?

Mail bomb

______ advertising is an online marketing concept in which the advertiser attempts to gain attention by providing content in the context of the user's experience in terms of its content, format, style, or placement.

Native

Partner/Supplier

Reliable contracts, ethical materials handling

______ analysis is the study of the impact on other variables when one variable is changed repeatedly.

Sensitivity

_______-factor authentication requires the user to provide two means of authentication, what the user knows (password) and what the user has (security token).

Two

What is a marketing phenomenon that facilitates and encourages people to pass along a marketing message?

Viral marketing

Social networking _________ maps group contacts (personal and professional) identifying who knows each other and who works together.

analysis

In __________ steps are added to the value chain as new players find ways to add value to the business process.

reintermediation

Competitive advantages are typically

temporary

When does the first-mover advantage occur

when a company can significantly increases its market share by being first with a new competitive advantage.

A(n) ________ spreads itself not only from file to file but also from computer to computer.

worm

In BPMN what represents anything that happens during the course of a business process?

BPMN event

In BPMN notation what display the path in which the process flows?

BPMN flows

In BPMN notation what is used to control the flow of a process?

BPMN gateway

________ process modeling is the activity of creating a detailed flowchart or process map of a work process that shows its inputs, tasks, and activities in a structured sequence.

Business

___________ -facing processes are invisible to the external customer but essential to the effective management of the business.

Business

Select two terms representing the next generation of Internet use—a more mature, distinctive communications platform characterized by new qualities such as collaboration sharing, and free.

Business 2.0 Web 2.0

What is a graphical notation that depicts the steps in a business process?

Business process model and notation

What is the analysis and redesign of workflow within and between enterprises?

Business process reengineering

What are invisible to the external customer but essential to the effective management of the business?

Business-facing processes

What protects a specific set of procedures for conducting a particular business activity?

Business-process patent

What applies to businesses buying from and selling to each other over the Internet?

Business-to-business

What can observe the exact pattern of a consumer's navigation through a site?

Clickstream data

What type of attack is identity theft?

Cyberattacks

What is the electronic defacing of an existing website?

Cybervandalism

Select three steps to improve business processes.

Establish measures, Follow process, Document as-is process

Which of the following links documents via hypertext, allowing users to move from one to another simply by clicking on a hot spot or link?

HTML

What is intangible creative work that is embodied in physical form and includes copyrights, trademarks, and patents?

Intellectual property

Which policy contains general principles to guide the proper use of the Internet?

Internet use policy

What are measurements that evaluate results to determine whether a project is meeting its goals?

Metrics

first-mover advantage

Occurs when an organization can significantly impact its market share by being first to market with a competitive advantage

What occurs when a new radical form of business enters the market that reshapes the way companies and organizations behave?

Paradigm shift

Phishing ________ is a masquerading attack that combines spam with spoofing.

expedition

What is a chart displaying a graphical representation of the change of a variable over time?

time-series chart

True or false: A time-series chart is a chart is a graphical representation showing change of a variable over time. Time-series charts are used for data that changes continuously, such as stock prices.

true

True or false: With machine learning, machines are able to act without human programs detailing how to perform tasks.

true

The National Institute of Standards and Technology (NIST) introduced an ________________ designed to keep government information secure.

(AES) Advanced Encryption Standard

What is a set of tools that supports the work of teams or groups by facilitating the sharing and flow of information?

A collaboration system

Business Strategy

A leadership plan that achieves a specific set of goals or objectives

Which epolicy requires a user to agree to follow it to be provided access to corporate email, information systems, and the Internet?

Acceptable use policy

_______ are keywords that advertisers choose to pay for and appear as sponsored links on the Google results pages.

Adwords

Which of the following allows a business to generate commissions or royalties from an Internet site?

Affiliate Program

What allows a business to generate commissions or referral fees when a customer visiting its website clicks a link to another merchant's website?

Affiliate programs

What consists of nonproprietary hardware and software based on publicly known standards that allows third parties to create add-on products to plug into or interoperate with the system?

An open system

__________ information encompasses all organizational information, and its primary purpose is to support the performance of managerial analysis or semistructured decisions.

Analytical

Which policy simply states that email users will not send unsolicited emails?

Anti-spam policy

What scans and searches hard drives to prevent, detect, and remove known viruses, adware, and spyware?

Antivirus software

What is a set of routines, protocols, and tools for building software applications?

Application programming interface (API)

What simulates human thinking and behavior, such as the ability to reason and learn?

Artificial intelligence

What represents the current state of the operation that has been mapped, without any specific improvements or changes to existing processes?

As-Is process models

What allows a business to generate commissions or referral fees when a customer visiting its website clicks on a link to another merchant's website?

Associate program

is the practice of artificially stimulating online conversation and positive reviews about a product, service, or brand.

Astroturfing

Which form of communication do the message and the response not occur at the same time?

Asynchronous communication

What is a method for confirming users' identities?

Authentication

__________ is the process of computerizing manual tasks, making them more efficient and effective and dramatically lowering operational costs.

Automation

What is a robot capable of making its own decisions and perform an action accordingly?

Autonomous robotics

What applies to any business that sells its products or services directly to consumers online?

B2C (business to customer)

What is a box running across a website that advertises the products and services of another business, usually another ebusiness?

Banner ad

What is the identification of a user based on a physical characteristic, such as a fingerprint, iris, face, voice, or handwriting?

Biometrics

What occurs when resources reach full capacity and cannot handle any additional demands; they limit throughput and impede operations?

Bottlenecks

What applies to customers offering goods and services to each other on the Internet?

C2C (consumer to consumer)

What is a method whereby new problems are solved based on the solutions from similar cases solved in the past?

Case-based reasoning

What is a trusted third party, such as VeriSign, that validates user identities by means of digital certificates?

Certificate authority

What is the process of organizing data into categories or groups for its most effective and efficient use?

Classification Analysis

What is the practice of artificially inflating traffic statistics for online advertisements?

Click fraud

What is the abuse of pay-per-click, pay-per-call, and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser?

Click-fraud

What is a count of the number of people who visit one site and click on an advertisement that takes them to the site of the advertiser?

Click-through

What is the process of collecting, analyzing and reporting aggregate data about which pages a website visitor visits—and in what order?

Clickstream analytics

_______ source is any proprietary software licensed under exclusive legal right of the copyright holder.

Closed

__________ intelligence is collaborating and tapping into the core knowledge of all employees, partners, and customers.

Collective

What is a computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link?

Competitive click-fraud

What is the assurance that messages and information remain available only to those authorized to view them?

Confidentiality

What is the aggregation of data from simple roll-ups to complex groupings of interrelated information?

Consolidation

________ is the aggregation of data from simple roll-ups to complex groupings of interrelated information.

Consolidation

What is an ebusiness model where companies build, market, sell, and ship their products themselves, without relying on traditional stores or intermediaries?

Consumer-to-Consumer

Select three ways that companies duplicate competitive advantages.

Copy business operations, Hire key employees and Acquire new technology

__________ is the legal protection afforded an expression of an idea, such as a song, book, or video game.

Copyright

What processes are business processes, such as manufacturing goods, selling products, and providing service, that make up the primary activities in a value chain?

Core processes

_________ software is software that is manufactured to look like the real thing and sold as such.

Counterfeit

A static process uses a systematic approach in an attempt to improve business effectiveness and efficiency continuously. Managers constantly attempt to optimize static process. Which of the following are examples of static processes?

Creating financial statements, Calculating taxes, Payroll

__________ success factors are the crucial steps companies perform to achieve their goals and objectives and implement their strategies.

Critical

What sources capital for a project by raising many small amounts from a large number of individuals, typically via the Internet?

Crowdfunding

___________ refers to the wisdom of the crowd.

Crowdsourcing

What is the science that studies encryption, which is the hiding of messages so that only the sender and receiver can read them?

Cryptography

What results in a product or service received by an organization's external customer?

Customer-facing processes

_________ includes threats, negative remarks, or defamatory comments transmitted via the Internet or posted on the website.

Cyberbulling

Who includes governments that are after some form of information about other governments?

Cyberespionage

What refers to the creation of new kinds of intermediaries that simply could not have existed before the advent of ebusiness, including comparison-shopping sites such as Kelkoo and bank account aggregation services such as Citibank?

Cybermediation

____________ refers to the creation of new kinds of intermediaries that simply could not have existed before the advent of ebusiness, including comparison-shopping sites such as Kelkoo and bank account aggregation services such as Citibank.

Cybermediation

What involves prevention, detection, and response to cyberattacks that can have wide-ranging effects on the individual, organization, community, and at the national level?

Cybersecurity

What is the use of computer and networking technologies against persons or property to intimidate or coerce governments, individuals, or any segment of society to attain political, religious, or ideological goals?

Cyberterrorism

Who is an individual who studies the interaction between humans and technology, observing how technology can shape humans' lives?

Cyborg anthropologist

_____ time is the time required to process an order.

Cycle

What analyzes all current data along with identifying any data quality issues?

Data Understanding

Select the three main drivers of the DTC sales channel.

Data collection Customer experience Reduced costs

What is the process of analyzing data to extract information not offered by the raw data alone?

Data mining

What uses a variety of techniques to find patterns and relationships in large volumes of information that predict future behavior and guide decision making?

Data mining tools

What is the process of collecting statistics and information about data in an existing source?

Data profiling

What is the process of sharing information to ensure consistency between multiple data sources?

Data replication

______ support systems model information using OLAP, which provides assistance in evaluating and choosing among different courses of action.

Decision

Select the system that models information using OLAP, which provides assistance in evaluating and choosing among different courses of action?

Decision support system

What decodes information and is the opposite of encrypt?

Decrypt

What is the large part of the Internet that is inaccessible to conventional search engines, such as email messages, chat messages, private content on social media sites, and electronic bank statements?

Deep web

What are malicious agents designed by spammers and other Internet attackers to farm email addresses off websites or deposit spyware on machines?

Destructive agents

__________ Darwinism implies that organizations that cannot adapt to the new demands placed on them for surviving in the information age are doomed to extinction.

Digital

What implies that organizations that cannot adapt to the new demands placed on them for surviving in the information age are doomed to extinction?

Digital Darwinism

What is a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution?

Digital rights management

__________ is the automation of existing manual and paper-based processes and workflows to a digital format.

Digitization

What occurs when a business sells directly to the customer online and cuts out the intermediary?

Disintermediation

What is a new way of doing things that initially does not meet the needs of existing customers?

Disruptive technology

What refers to a period of time when a system is unavailable?

Downtime

_______ enables users to view details, and details of details, of information.

Drill-down

a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network.

Drive-by hacking

What is continuously changing and provides business solutions to ever-changing business operations?

Dynamic process

__________ includes ecommerce along with all activities related to internal and external business operations such as servicing customer accounts, collaborating with partners, and exchanging real-time information.

Ebusiness

What is a plan that details how a company creates, delivers, and generates revenues specifically on the Internet?

Ebusiness model

What is the buying and selling of goods and services over the Internet?

Ecommerce

__________ is the buying and selling of goods and services over the Internet.

Ecommerce

Select the two terms that refer to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry.

Electronic discovery, Ediscovery

Select three purposes of a business process model.

Encourage conciseness and accuracy in describing the process model, Expose process detail gradually and in a controlled manner, Focus attention on the process model interfaces

__________ scrambles information into an alternative form that requires a key or password to decrypt.

Encryption

Which of the following are policies and procedures that address information management along with the ethical use of computers and the Internet in the business environment?

Epolicies

Select the three reasons why organizations should develop written epolicies.

Establish employee guidelines Establish organizational rules Establish employee procedures

What determines values for an unknown continuous variable behavior or estimated future value?

Estimation Analysis

Select three epolicies.

Ethical computer use policy, Acceptable use policy, Social media policy

What are the principles and standards that guide our behavior toward other people?

Ethics

The five forces forces model

Evaluates industry attractiveness

What analyzes the trends and patterns to assess the potential for solving the business problem?

Evaluation

What is a specialized DSS that supports senior-level executives and unstructured, long-term, nonroutine decisions requiring judgment, evaluation,and insight?

Executive information system

________ systems are computerized advisory programs that imitate the reasoning processes of experts in solving difficult problems.

Expert

What are computerized advisory programs that imitate the reasoning processes of experts in solving difficult problems?

Expert systems

_________ knowledge consists of anything that can be documented, archived, and codified, often with the help of MIS.

Explicit

True or false: The choices made by MIS should dictate the business processes of a company.

False

______ is similar to taxonomy except that crowdsourcing determines the tags or keyword-based classification system.

Folksonomy

What is a legal framework that sets guidelines for the collection and processing of personal information of individuals within the European Union(EU)?

General Data Protection Regulation (GDPR)

__________ -seeking analysis finds the inputs necessary to achieve a goal such as a desired level of output.

Goal

What finds the inputs necessary to achieve a goal such as a desired level of output?

Goal-seeking analysis

_________ refers to the level of detail in the model or the decision-making process.

Granularity

What delivers everything from animation to graphics and music to movies; it can also be used to build complicated web applications and works across platforms, including a PC, tablet, smartphone, or smart TV?

HTML 5

What are experts in technology who use their knowledge to break into computers and computer networks, either for profit or just motivated by the challenge?

Hackers

What is a keyword or phrase used to identify a topic and is preceded by a hash or pound sign (#)?

Hashtag

Which of the following is used to create the illusion that a large number of potential customers are clicking the advertiser's links, when in fact there is no likelihood that any of the clicks will lead to profit for the advertiser?

Hitbots

_________ markup language links documents, allowing users to move from one to another simply by clicking on a hot spot or link.

Hypertext

What is the Internet protocol web browsers use to request and display web pages using universal resource locators?

Hypertext transport protocol (HTTP)

__________ theft is the forging of someone's identity for the purpose of fraud.

Identity

What is the act of conforming, acquiescing, or yielding information?

Information compliance

What governs the ethical and moral issues arising from the development and use of information technologies, as well as the creation, collection, duplication, distribution, and processing of information itself?

Information ethics

What examines the organizational resource of information and regulates its definitions, uses, value, and distribution ensuring it has the types of data/information required to function and grow effectively?

Information management

Which epolicy contains general principles regarding information privacy?

Information privacy policy

What measures the number of people a firm can communicate with all over the world?

Information richness

What refers to the depth and breadth of details contained in a piece of textual, graphic, audio, or video information?

Information richness

What is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity?

Information secrecy

What is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization?

Information security

___________ are legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident.

Insiders

What is a service that enables instant or real-time communication between people?

Instant messaging

What measures advertising effectiveness by counting visitor interactions with the target ad?

Interactivity

What are agents, software, or businesses that provide a trading infrastructure to bring buyers and sellers together?

Intermediaries

____________ are agents, software, or businesses that provide a trading infrastructure to bring buyers and sellers together.

Intermediaries

What is a massive network that connects computers all over the world and allows them to communicate with one another?

Internet

What is a scripting language developed by Netscape and used to create interactive websites, a big driver of Business 2.0?

JavaScript

What are the quantifiable metrics a company uses to evaluate progress toward critical success factors?

Key performance indicators

What is a type of artificial intelligence that enables computers to both understand concepts in the environment, and also to learn?

Machine learning

What is the ability of a computer to "see" by digitizing an image, processing the data it contains, and taking some kind of action?

Machine vision

What is software that is intended to damage or disable computers and computer systems?

Malware

________ decisions concern how the organization should achieve the goals and objectives set by its strategy, and they are usually the responsibility of mid-level management.

Managerial

__________ business processes are semidynamic, semiroutine, monthly business processes such as resource allocation, sales strategy, or manufacturing process improvements.

Managerial

What type of decisions concern how the organization should achieve the goals and objectives set by its strategy, and they are usually the responsibility of mid-level management?

Managerial Decisions

At which level do employees are continuously evaluating company operations to hone the firm's abilities to identify, adapt to, and leverage change?

Managerial level

What evaluates such items as websites and checkout scanner information to detect customers' buying behavior and predict future behavior by identifying affinities among customers' choices of products and services?

Market basket analysis

What is the proportion of the market that a firm captures?

Market share.

A ___________ is a website or web application that uses content from more than one source to create a completely new product or service.

Mashup

Which of the following is a what-you-see-is-what-you-get (WYSIWYG) tool?

Mashup editor

What is the ability of an organization to tailor its products or services to the customers' specifications?

Mass customization

What is a problem caused by using collected data that skews the data in one direction?

Measurement bias

What is the practice of sending brief posts (140 to 200 characters) to a personal blog, either publicly or to a private group of subscribers who can read the posts as IMs or as text messages?

Microblogging

_____ authentication requires more than two means of authentication such as what the user knows (password), what the user has (security token), and what the user is (biometric verification).

Multifactor

What is the process within a genetic algorithm of randomly trying combinations and evaluating the success (or failure) of the outcome?

Mutation

What describes how products in a network increase in value to users as the number of users increases?

Network effect

_________ network is a category of AI that attempts to emulate the way the human brain works.

Neural

What are the two types of personally identifiable information?

Nonsensitive PII and Sensitive PII

What is the capture of transaction and event information using technology to (1) process the information according to defined business rules, (2) store the information, and (3) update existing information to reflect the new information?

Online Transaction Processing

At the _________ level do employees develop, control, and maintain core business activities required to run the day-to-day operations.

Operational

What are static, routine, daily business processes such as stocking inventory, checking out customers, or daily opening and closing processes?

Operational business processes

At which level do employees develop, control, and maintain core business activities required to run the day-to-day operations?

Operational level

Which type of analysis finds the optimum value for a target variable by repeatedly changing other variables, subject to specified constraints?

Optimization analysis

Identify the two types of results that occur when you use a search engine.

Organic search and Paid search (sponsored)

What occurs when a machine learning model matches the training data so closely that the model fails to make correct predictions on new data?

Overfitting

Which of the following key terms defines a new radical form of business that enters the market and reshapes the way companies and organizations behave?

Paradigm Shift

What occurs when a company knows enough about a customer's likes and dislikes that it can fashion offers more likely to appeal to that person, for instance, by tailoring its website to individuals or groups based on profile information?

Personalization

__________ occurs when a company knows enough about a customer's likes and dislikes that it can fashion offers more likely to appeal to that person, say by tailoring its website to individuals or groups based on profile information, demographics, or prior transactions.

Personalization

__________ reroutes requests for legitimate websites to false websites.

Pharming

__________ is a technique to gain personal information for the purpose of identity theft, usually by means of fraudulent emails that look as though they came from legitimate businesses.

Phishing

What is tangible protection such as alarms, guards, fireproof doors, fences, and vaults?

Physical security

_________ software is the unauthorized use, duplication, distribution, or sale of copyrighted software.

Pirated

What is a statement about what will happen or might happen in the future; for example, predicting future sales or employee turnover?

Prediction

What is the right to be left alone when you want to be, to have control over your personal possessions, and not to be observed without your consent?

Privacy

_______ is the right to be left alone when you want to be, to have control over your personal possessions, and not to be observed without your consent.

Privacy

_________ key encryption uses two keys: a public key that everyone can have and a private key for only the recipient.

Public

_______ engine is a data mining algorithm that analyzes a customer's purchases and actions on a website and then uses the data to recommend complementary products.

Recommendation

What occurs when a task or activity is unnecessarily repeated?

Redundancy

What occurs when steps are added to the value chain as new players find ways to add value to the business process?

Reintermediation

What is a place where buyers post feedback on sellers?

Reputation system

________ process automation is the use of software with artificial intelligence (AI) and machine learning capabilities to handle high-volume, repeatable tasks that previously required a human to perform.

Robotic

What is the use of software with artificial intelligence (AI) and machine learning capabilities to handle high-volume, repeatable tasks that previously required a human to perform?

Robotic process automation

What is the part of the United States Federal Rules of Criminal Procedure that covers the search and seizure of physical and digital evidence?

Rule 41

What is a component of Web 3.0 that describes things in a way that computers can understand?

Semantic web

___________-structured decisions occur in situations in which a few established processes help to evaluate potential solutions, but not enough to lead to a definite recommended decision.

Semi

What types of decisions occur in situations in which a few established processes help to evaluate potential solutions, but not enough to lead to a definite recommended decision?

Semistructured decisions

What is the study of the impact on other variables when one variable is changed repeatedly?

Sensitivity analysis

What is software used to make a website's product catalog available for online ordering, whereby visitors may select, view, add/delete, and purchase merchandise?

Shopping cart

What is the traditional security process, which requires a user name and password?

Single-factor authentication

__________ is the ability to look at information from different perspectives, such as analyzing total product sales during a given promotion versus the sales of a single product across all promotions.

Slice-and-Dice

What is the digital dashboard analytical capability that allows users to look at information from different perspectives, such as viewing all product sales during a single promotion vs. a single product's sales across multiple promotions?

Slice-and-dice

What is content that is designed to be easy for readers to consume and to share?

Snackable content

Who is a person within the organization who is trusted to monitor, contribute, filter, and guide the social media presence of a company, individual, product, or brand?

Social media manager

What is the process of monitoring and responding to what is being said about a company, individual, product, or brand?

Social media monitoring

Which of the following is an application that connects people by matching profile information?

Social network

What is the practice of expanding your business and/or social contacts by constructing a personal network?

Social networking

What maps group contacts (personal and professional) identifying who knows each other and who works together?

Social networking analysis

What is the use of a false identity to artificially stimulate demand for a product, brand, or service?

Sock puppet marketing

What contains instructions written by a programmer specifying the actions to be performed by computer software?

Source code

What is the original transaction record?

Source document

What is unsolicited email?

Spam

___________ phishing is a phishing expedition in which the emails are carefully designed to target a particular person or organization.

Spear

What measures the amount of time visitors spend on a website or application?

Stickiness

At the _________ level, managers develop overall business strategies, goals, and objectives as part of the company's strategic plan.

Strategic

________ decisions involve higher level issues concerned with the overall direction of the organization; these decisions define the organization's overall goals and aspirations for the future.

Strategic

___________ business processes are dynamic, nonroutine, long-term business processes such as financial planning, expansion strategies, and stakeholder interactions.

Strategic

What types of decisions involve higher level issues concerned with the overall direction of the organization; these decisions define the organization's overall goals and aspirations for the future?

Strategic decisions

At what level do managers develop overall business strategies, goals, and objectives as part of the company's strategic plan?

Strategic level

___________ improves business process efficiencies by simplifying or eliminating unnecessary steps.

Streamlining

What produces an improved product customers are eager to buy, such as a faster car or larger hard drive?

Sustaining technology

Which layout arranges the steps of a business process into a set of rows depicting the various elements?

Swim lanes

_________ communication, or communications that occur at the same time such as IM or chat.

Synchronous

What is the knowledge contained in people's heads?

Tacit knowledge

________ are specific keywords or phrases incorporated into website content for means of classification or taxonomy.

Tags

What is an antispamming approach where the receiving computer launches a return attack against the spammer, sending email messages back to the computer that originated the suspected spam?

Teergrubing

_________ is a massive network that connects computers all over the world and allows them to communicate with one another.

The Internet

Which of the following are the three conditions that indicate the time is right to initiate a business process change?

The company is markedly below industry benchmarks on its core processes, To regain competitive advantages, the company must leapfrog competition on key dimensions, There has been a pronounced shift in the market the process was designed to serve

What describes niche-market ebusiness strategies that capture the tail of a typical sales curve?

The long tail

What is an act or object that poses a danger to assets?

Threat

__________ bombs are computer viruses that wait for a specific date before executing their instructions.

Time

_______ process models show the results of applying change improvement opportunities to the current process model.

To-Be

_________ are small electronic devices that change user passwords automatically.

Tokens

What is the basic business system that serves the operational level (analysts) and assists in making structured decisions?

Transaction processing system

_______ data encompasses all raw facts contained within a single process and its purpose is to support daily operational tasks.

Transactional

True or false: A cyborg anthropologist is an individual who studies the interaction between humans and technology, observing how technology can shape humans' lives.

True

What is a problem that occurs when someone registers purposely misspelled variations of well-known domain names?

Typosquatting

What is created and updated by many users for many users?

User-contributed content

Select the four characteristics of Web 2.0.

User-contributed content, Collaboration inside the organization, Collaboration outside the organization, Content sharing through open sourcing

Select two terms for content created and updated by many users for many users.

User-generated content User-contributed content

Which attackers grant themselves a higher access level such as administrator, allowing the attacker to perform illegal actions such as running unauthorized code or deleting data?

Vertical privilege escalation

What is a technique that induces websites or users to pass on a marketing message to other websites or users, creating exponential growth in the message's visibility and effect?

Viral Marketing

________ is a phone scam that attempts to defraud people by asking them to call a bogus telephone number to confirm their account information.

Vishing

What produces graphical displays of patterns and complex relationships in large amounts of data?

Visualization

__________ produces graphical displays of patterns and complex relationships in large amounts of data.

Visualization

Review the following eras. During which era were the first forms of ebusiness created?

Web 1.0

Select the term that refers to the World Wide Web during its first years of operation.

Web 1.0

What is the next generation of Internet use—a more mature, distinctive communications platform characterized by new qualities such as collaboration sharing, and free?

Web 2.0

What is a locally stored URL or the address of a file or Internet page saved as a shortcut?

Website bookmark

Which DDS analysis technique checks the impact of a single change in a variable or assumption on the model?

What-if analysis

What is a type of collaborative web page that allows users to add, remove, and change content, which can be easily organized and reorganized as required?

Wiki

______ includes the tasks, activities, and responsibilities required to execute each step in a business process.

Workflow

What monitors processes to ensure tasks, activities, and responsibilities are executed as specified?

Workflow control systems

What tracks people's activities by such measures as number of keystrokes, error rate, and number of transactions processed?

Workplace MIS monitoring

What provides access to Internet information through documents including text, graphics, audio, and video files that use a special formatting language called HTML?

World Wide Web

What is an international community that develops open standards to ensure the long-term growth of the Web?

World Wide Web Consortium

________ is a program that secretly takes over another computer for the purpose of launching attacks on other computers.

Zombie

competitive advantage

a feature of a product or service on which customers place a greater value than they do on similar offerings from competitors

Business Strategy

a leadership plan that achieves a specific set of goals or objectives

Stakeholders

a person or group that has an interest or concern in an organization

Porter's Five Forces Model

analyzes the competitive forces within the environment in which a company operates to assess the potential for profitability in an industry

Data _________ occurs when adding additional training examples by transforming existing examples.

augmentation

Market ________ analysis evaluates such items as websites and checkout scanner information to detect customers' buying behavior and predict future behavior by identifying affinities among customers' choices of products and services.

basket

A ________ is an online journal that allows users to post their own comments, graphics, and video.

blog

Social __________ allows users to share, organize, search, and manage bookmarks.

bookmarking

A _______ process patent protects a specific set of procedures for conducting a particular business activity.

business

A(n) ________ process model is a graphic description of a process, showing the sequence of process tasks, which is developed for a specific purpose and from a selected viewpoint.

business

Business-to-________ applies to businesses buying from and selling to each other over the Internet.

business

Internet _________ is government attempts to control Internet traffic, thus preventing some material from being viewed by a country's citizens.

censorship

The ________ Online Protection Act was passed to protect minors from accessing inappropriate material on the Internet.

child

A(n)__________ system is a set of tools that supports the work of teams or groups by facilitating the sharing and flow of information.

collaboration

Real-time _________ occurs when a system updates information at the same rate it receives it.

communication

The World Wide Web _________ is an international community that develops open standards to ensure the long-term growth of the Web.

consortium

Workflow ________ systems monitor processes to ensure tasks, activities, and responsibilities are executed as specified.

control

________ processes are business processes, such as manufacturing goods, selling products, and providing service, that make up the primary activities in a value chain.

core

Mass ___________ is the ability of an organization to tailor its products or services to the customers' specifications.

customization

A(n) ___________ is an organized attempt by a country's military to disrupt or destroy information and communication systems for another country.

cyberwar

Bring your own ________ policy allows employees to use their personal mobile devices and computers to access enterprise data and applications.

device

The introduction of ebusiness brought about ________, which occurs when a business sells directly to the customer online and cuts out the intermediary.

disintermediation

A(n) ___________ technology is a new way of doing things that initially does not meet the needs of existing customers.

disruptive

A(n) __________ privacy policy details the extent to which email messages may be read by others.

email

A(n) ____________ monitoring policy stating explicitly how, when, and where the company monitors its employees.

employee

A search ________ is website software that finds other pages based on keyword matching similar to Google.

engine

A privilege _______ is a network intrusion attack that takes advantage of programming errors or design flaws to grant the attacker elevated access to the network and its associated data and applications.

escalation

A(n) _________ computer use policy contains general principles to guide computer user behavior.

ethical

SWOT analysis

evaluates an organization's strengths, weaknesses, opportunities, and threats to identify significant influences that work for or against business strategies

BPMN _______ is anything that happens during the course of a business process, including customer requests, time requests, and the end of the process.

event

Value Chain Analysis

executes business strategy

A(n) ________ information system is a specialized DSS that supports senior-level executives and unstructured, long-term, nonroutine decisions requiring judgment, evaluation,and insight.

executive

Employees

fair compensation, job security, ethical conduct/ treatment

Content ____________ occurs when organizations use software that filters content, such as emails, to prevent the accidental or malicious transmission of unauthorized information.

filtering

BPMN ________ display the path in which the process flows.

flows

BPMN _________ is used to control the flow of a process

gateway

Information ___________ is a method or system of government for information management or control.

governance

Social _______ represent the interconnection of relationships in a social network.

graphs

A(n) ______ is a two-dimensional representation of data in which values are represented by colors.

heat map

What is a two-dimensional representation of data in which values are represented by colors?

heat map

What is a graphical display of data using bars of different heights?

histogram

Business process __________ attempts to understand and measure the current process and make performance improvements accordingly.

improvement

A user can opt _____ to receive emails by choosing to allow permissions to incoming emails.

in

Click fraud is the practice of artificially ________ traffic statistics for online advertisements.

inflating

An __________ is a representation of information in a graphic format designed to make the data easily understandable at a glance.

infographic

What is a representation of information in a graphic format designed to make the data easily understandable at a glance?

infographic

Return on _________ indicates the earning power of a project.

investment

__________ performance indicators are the quantifiable metrics a company uses to evaluate progress toward critical success factors.

key

Shareholders/investors

maximize profits, grow market share, high return on investment

A social ________ policy outlines the corporate guidelines or principles governing employee online communications.

media

Social _________ refers to websites that rely on user participation and user-contributed content, such as Facebook, YouTube, and Digg.

media

Data ______ is the process of analyzing data to extract information not offered by the raw data alone.

mining

A ______ is a simplified representation or abstraction of reality.

model

A contractual stipulation which ensures that ebusiness participants do not deny their online actions is called a __________ clause.

nonrepudiation

Search engine ________ combines art along with science to determine how to make URLs more attractive to search engines resulting in higher search engine ranking.

optimization

A user can opt ______ of receiving emails by choosing to deny permission to incoming emails.

out

A(n) _________ shift occurs when a new radical form of business enters the market that reshapes the way companies and organizations behave.

paradigm

A(n) _________ is an exclusive right to make, use, and sell an invention and is granted by a government to the inventor.

patent

What is a temporary activity a company undertakes to create a unique product, service, or result?

project

Search engine __________ evaluates variables that search engines use to determine where a URL appears on the list of search results.

ranking

Information _________ measures the number of people a firm can communicate with all over the world.

reach

Case-based _________ is a method whereby new problems are solved based on the solutions from similar cases solved in the past.

reasoning

Business process __________ is the analysis and redesign of workflow within and between enterprises.

reengineering

A sparkline is a small embedded line graph that illustrates a _____________ trend. Sparklines are often used in reports, presentations, dashboards, and scoreboards.

single

Open ________ refers to any software whose source code is made available free for any third party to review and modify.

source

Website name ____________ is the theft of a website's name that occurs when someone, posing as a site's administrator, changes the ownership of the domain name assigned to the website to another website owner.

stealing

Which decisions arise in situations where established processes offer potential solutions?

structured

A(n) ____________ technology produces an improved product customers are eager to buy, such as a faster car or larger hard drive.

sustaining

A(n)_______ lane layout arranges the steps of a business process into a set of rows depicting the various elements.

swim

Real Simple ________ is a web format used to publish frequently updated works, such as blogs, news headlines, audio, and video, in a standardized format.

syndication

An open ________ consists of nonproprietary hardware and software based on publicly known standards that allows third parties to create add-on products to plug into or interoperate with the system.

system

Social _________ describes the collaborative activity of marking shared online content with keywords or tags as a way to organize it for future navigation, filtering, or search.

tagging

Buyer Power

the ability of buyers to affect the price they must pay for an item

competitive intelligence

the process of gathering information about the competitive environment, including competitors' plans, activities, and products, to improve a company's ability to succeed

Digital ___________ is the measure of consumer, partner, and employee confidence in an organization's ability to protect and secure data and the privacy of individuals.

trust

A(n) ________ is software written with malicious intent to cause annoyance or damage.

virus

Machine ______ is the ability of a computer to "see" by digitizing an image, processing the data it contains, and taking some kind of action.

vision

A(n) __________ is a set of measurable characteristics of a human voice that uniquely identifies an individual.

voiceprint

What is another name for a bug bounty program?

vulnerability rewards program


Set pelajaran terkait

Social Studies (The Spanish American War and Florida (mid 1800s))

View Set

Entrepreneurship Unit 4 Study Guide

View Set

First Trimester Chapter 49 part 1

View Set

Supply Chain Chapter 10: Global Logistics

View Set

4.3 Right Triangle Trigonometry - Day 1 Notes

View Set

Chapter 6. Environmental Hazards in Real Estate.

View Set

Finance II - Multiple choice (First Half)

View Set