CIS 205 Exam Review
Government
Adhere to regulations/laws, increase employment
__________ are mathematical formulas placed in software that performs an analysis on a dataset.
Algorithm
Select three Business 2.0 communication and collaboration tools.
Blog, Wiki and Mashup
What was the original term for a company operating on the Internet?
Dot-com
What is a magazine published only in electronic form on a computer network?
Ezine
What is an artificial intelligence system that mimics the evolutionary, survival-of-the-fittest process to generate increasingly better solutions to a problem?
Genetic algorithm
______ is the Internet protocol web browsers use to request and display web pages using universal resource locators.
HTTP
What is another name for the deep web?
Invisible web
What involves capturing, classifying, evaluating, retrieving, and sharing information assets in a way that provides context for effective decisions and actions?
Knowledge management
What sends a massive amount of email to a specific person or system that can cause that user's server to stop functioning?
Mail bomb
______ advertising is an online marketing concept in which the advertiser attempts to gain attention by providing content in the context of the user's experience in terms of its content, format, style, or placement.
Native
Partner/Supplier
Reliable contracts, ethical materials handling
______ analysis is the study of the impact on other variables when one variable is changed repeatedly.
Sensitivity
_______-factor authentication requires the user to provide two means of authentication, what the user knows (password) and what the user has (security token).
Two
What is a marketing phenomenon that facilitates and encourages people to pass along a marketing message?
Viral marketing
Social networking _________ maps group contacts (personal and professional) identifying who knows each other and who works together.
analysis
In __________ steps are added to the value chain as new players find ways to add value to the business process.
reintermediation
Competitive advantages are typically
temporary
When does the first-mover advantage occur
when a company can significantly increases its market share by being first with a new competitive advantage.
A(n) ________ spreads itself not only from file to file but also from computer to computer.
worm
In BPMN what represents anything that happens during the course of a business process?
BPMN event
In BPMN notation what display the path in which the process flows?
BPMN flows
In BPMN notation what is used to control the flow of a process?
BPMN gateway
________ process modeling is the activity of creating a detailed flowchart or process map of a work process that shows its inputs, tasks, and activities in a structured sequence.
Business
___________ -facing processes are invisible to the external customer but essential to the effective management of the business.
Business
Select two terms representing the next generation of Internet use—a more mature, distinctive communications platform characterized by new qualities such as collaboration sharing, and free.
Business 2.0 Web 2.0
What is a graphical notation that depicts the steps in a business process?
Business process model and notation
What is the analysis and redesign of workflow within and between enterprises?
Business process reengineering
What are invisible to the external customer but essential to the effective management of the business?
Business-facing processes
What protects a specific set of procedures for conducting a particular business activity?
Business-process patent
What applies to businesses buying from and selling to each other over the Internet?
Business-to-business
What can observe the exact pattern of a consumer's navigation through a site?
Clickstream data
What type of attack is identity theft?
Cyberattacks
What is the electronic defacing of an existing website?
Cybervandalism
Select three steps to improve business processes.
Establish measures, Follow process, Document as-is process
Which of the following links documents via hypertext, allowing users to move from one to another simply by clicking on a hot spot or link?
HTML
What is intangible creative work that is embodied in physical form and includes copyrights, trademarks, and patents?
Intellectual property
Which policy contains general principles to guide the proper use of the Internet?
Internet use policy
What are measurements that evaluate results to determine whether a project is meeting its goals?
Metrics
first-mover advantage
Occurs when an organization can significantly impact its market share by being first to market with a competitive advantage
What occurs when a new radical form of business enters the market that reshapes the way companies and organizations behave?
Paradigm shift
Phishing ________ is a masquerading attack that combines spam with spoofing.
expedition
What is a chart displaying a graphical representation of the change of a variable over time?
time-series chart
True or false: A time-series chart is a chart is a graphical representation showing change of a variable over time. Time-series charts are used for data that changes continuously, such as stock prices.
true
True or false: With machine learning, machines are able to act without human programs detailing how to perform tasks.
true
The National Institute of Standards and Technology (NIST) introduced an ________________ designed to keep government information secure.
(AES) Advanced Encryption Standard
What is a set of tools that supports the work of teams or groups by facilitating the sharing and flow of information?
A collaboration system
Business Strategy
A leadership plan that achieves a specific set of goals or objectives
Which epolicy requires a user to agree to follow it to be provided access to corporate email, information systems, and the Internet?
Acceptable use policy
_______ are keywords that advertisers choose to pay for and appear as sponsored links on the Google results pages.
Adwords
Which of the following allows a business to generate commissions or royalties from an Internet site?
Affiliate Program
What allows a business to generate commissions or referral fees when a customer visiting its website clicks a link to another merchant's website?
Affiliate programs
What consists of nonproprietary hardware and software based on publicly known standards that allows third parties to create add-on products to plug into or interoperate with the system?
An open system
__________ information encompasses all organizational information, and its primary purpose is to support the performance of managerial analysis or semistructured decisions.
Analytical
Which policy simply states that email users will not send unsolicited emails?
Anti-spam policy
What scans and searches hard drives to prevent, detect, and remove known viruses, adware, and spyware?
Antivirus software
What is a set of routines, protocols, and tools for building software applications?
Application programming interface (API)
What simulates human thinking and behavior, such as the ability to reason and learn?
Artificial intelligence
What represents the current state of the operation that has been mapped, without any specific improvements or changes to existing processes?
As-Is process models
What allows a business to generate commissions or referral fees when a customer visiting its website clicks on a link to another merchant's website?
Associate program
is the practice of artificially stimulating online conversation and positive reviews about a product, service, or brand.
Astroturfing
Which form of communication do the message and the response not occur at the same time?
Asynchronous communication
What is a method for confirming users' identities?
Authentication
__________ is the process of computerizing manual tasks, making them more efficient and effective and dramatically lowering operational costs.
Automation
What is a robot capable of making its own decisions and perform an action accordingly?
Autonomous robotics
What applies to any business that sells its products or services directly to consumers online?
B2C (business to customer)
What is a box running across a website that advertises the products and services of another business, usually another ebusiness?
Banner ad
What is the identification of a user based on a physical characteristic, such as a fingerprint, iris, face, voice, or handwriting?
Biometrics
What occurs when resources reach full capacity and cannot handle any additional demands; they limit throughput and impede operations?
Bottlenecks
What applies to customers offering goods and services to each other on the Internet?
C2C (consumer to consumer)
What is a method whereby new problems are solved based on the solutions from similar cases solved in the past?
Case-based reasoning
What is a trusted third party, such as VeriSign, that validates user identities by means of digital certificates?
Certificate authority
What is the process of organizing data into categories or groups for its most effective and efficient use?
Classification Analysis
What is the practice of artificially inflating traffic statistics for online advertisements?
Click fraud
What is the abuse of pay-per-click, pay-per-call, and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser?
Click-fraud
What is a count of the number of people who visit one site and click on an advertisement that takes them to the site of the advertiser?
Click-through
What is the process of collecting, analyzing and reporting aggregate data about which pages a website visitor visits—and in what order?
Clickstream analytics
_______ source is any proprietary software licensed under exclusive legal right of the copyright holder.
Closed
__________ intelligence is collaborating and tapping into the core knowledge of all employees, partners, and customers.
Collective
What is a computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link?
Competitive click-fraud
What is the assurance that messages and information remain available only to those authorized to view them?
Confidentiality
What is the aggregation of data from simple roll-ups to complex groupings of interrelated information?
Consolidation
________ is the aggregation of data from simple roll-ups to complex groupings of interrelated information.
Consolidation
What is an ebusiness model where companies build, market, sell, and ship their products themselves, without relying on traditional stores or intermediaries?
Consumer-to-Consumer
Select three ways that companies duplicate competitive advantages.
Copy business operations, Hire key employees and Acquire new technology
__________ is the legal protection afforded an expression of an idea, such as a song, book, or video game.
Copyright
What processes are business processes, such as manufacturing goods, selling products, and providing service, that make up the primary activities in a value chain?
Core processes
_________ software is software that is manufactured to look like the real thing and sold as such.
Counterfeit
A static process uses a systematic approach in an attempt to improve business effectiveness and efficiency continuously. Managers constantly attempt to optimize static process. Which of the following are examples of static processes?
Creating financial statements, Calculating taxes, Payroll
__________ success factors are the crucial steps companies perform to achieve their goals and objectives and implement their strategies.
Critical
What sources capital for a project by raising many small amounts from a large number of individuals, typically via the Internet?
Crowdfunding
___________ refers to the wisdom of the crowd.
Crowdsourcing
What is the science that studies encryption, which is the hiding of messages so that only the sender and receiver can read them?
Cryptography
What results in a product or service received by an organization's external customer?
Customer-facing processes
_________ includes threats, negative remarks, or defamatory comments transmitted via the Internet or posted on the website.
Cyberbulling
Who includes governments that are after some form of information about other governments?
Cyberespionage
What refers to the creation of new kinds of intermediaries that simply could not have existed before the advent of ebusiness, including comparison-shopping sites such as Kelkoo and bank account aggregation services such as Citibank?
Cybermediation
____________ refers to the creation of new kinds of intermediaries that simply could not have existed before the advent of ebusiness, including comparison-shopping sites such as Kelkoo and bank account aggregation services such as Citibank.
Cybermediation
What involves prevention, detection, and response to cyberattacks that can have wide-ranging effects on the individual, organization, community, and at the national level?
Cybersecurity
What is the use of computer and networking technologies against persons or property to intimidate or coerce governments, individuals, or any segment of society to attain political, religious, or ideological goals?
Cyberterrorism
Who is an individual who studies the interaction between humans and technology, observing how technology can shape humans' lives?
Cyborg anthropologist
_____ time is the time required to process an order.
Cycle
What analyzes all current data along with identifying any data quality issues?
Data Understanding
Select the three main drivers of the DTC sales channel.
Data collection Customer experience Reduced costs
What is the process of analyzing data to extract information not offered by the raw data alone?
Data mining
What uses a variety of techniques to find patterns and relationships in large volumes of information that predict future behavior and guide decision making?
Data mining tools
What is the process of collecting statistics and information about data in an existing source?
Data profiling
What is the process of sharing information to ensure consistency between multiple data sources?
Data replication
______ support systems model information using OLAP, which provides assistance in evaluating and choosing among different courses of action.
Decision
Select the system that models information using OLAP, which provides assistance in evaluating and choosing among different courses of action?
Decision support system
What decodes information and is the opposite of encrypt?
Decrypt
What is the large part of the Internet that is inaccessible to conventional search engines, such as email messages, chat messages, private content on social media sites, and electronic bank statements?
Deep web
What are malicious agents designed by spammers and other Internet attackers to farm email addresses off websites or deposit spyware on machines?
Destructive agents
__________ Darwinism implies that organizations that cannot adapt to the new demands placed on them for surviving in the information age are doomed to extinction.
Digital
What implies that organizations that cannot adapt to the new demands placed on them for surviving in the information age are doomed to extinction?
Digital Darwinism
What is a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution?
Digital rights management
__________ is the automation of existing manual and paper-based processes and workflows to a digital format.
Digitization
What occurs when a business sells directly to the customer online and cuts out the intermediary?
Disintermediation
What is a new way of doing things that initially does not meet the needs of existing customers?
Disruptive technology
What refers to a period of time when a system is unavailable?
Downtime
_______ enables users to view details, and details of details, of information.
Drill-down
a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network.
Drive-by hacking
What is continuously changing and provides business solutions to ever-changing business operations?
Dynamic process
__________ includes ecommerce along with all activities related to internal and external business operations such as servicing customer accounts, collaborating with partners, and exchanging real-time information.
Ebusiness
What is a plan that details how a company creates, delivers, and generates revenues specifically on the Internet?
Ebusiness model
What is the buying and selling of goods and services over the Internet?
Ecommerce
__________ is the buying and selling of goods and services over the Internet.
Ecommerce
Select the two terms that refer to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry.
Electronic discovery, Ediscovery
Select three purposes of a business process model.
Encourage conciseness and accuracy in describing the process model, Expose process detail gradually and in a controlled manner, Focus attention on the process model interfaces
__________ scrambles information into an alternative form that requires a key or password to decrypt.
Encryption
Which of the following are policies and procedures that address information management along with the ethical use of computers and the Internet in the business environment?
Epolicies
Select the three reasons why organizations should develop written epolicies.
Establish employee guidelines Establish organizational rules Establish employee procedures
What determines values for an unknown continuous variable behavior or estimated future value?
Estimation Analysis
Select three epolicies.
Ethical computer use policy, Acceptable use policy, Social media policy
What are the principles and standards that guide our behavior toward other people?
Ethics
The five forces forces model
Evaluates industry attractiveness
What analyzes the trends and patterns to assess the potential for solving the business problem?
Evaluation
What is a specialized DSS that supports senior-level executives and unstructured, long-term, nonroutine decisions requiring judgment, evaluation,and insight?
Executive information system
________ systems are computerized advisory programs that imitate the reasoning processes of experts in solving difficult problems.
Expert
What are computerized advisory programs that imitate the reasoning processes of experts in solving difficult problems?
Expert systems
_________ knowledge consists of anything that can be documented, archived, and codified, often with the help of MIS.
Explicit
True or false: The choices made by MIS should dictate the business processes of a company.
False
______ is similar to taxonomy except that crowdsourcing determines the tags or keyword-based classification system.
Folksonomy
What is a legal framework that sets guidelines for the collection and processing of personal information of individuals within the European Union(EU)?
General Data Protection Regulation (GDPR)
__________ -seeking analysis finds the inputs necessary to achieve a goal such as a desired level of output.
Goal
What finds the inputs necessary to achieve a goal such as a desired level of output?
Goal-seeking analysis
_________ refers to the level of detail in the model or the decision-making process.
Granularity
What delivers everything from animation to graphics and music to movies; it can also be used to build complicated web applications and works across platforms, including a PC, tablet, smartphone, or smart TV?
HTML 5
What are experts in technology who use their knowledge to break into computers and computer networks, either for profit or just motivated by the challenge?
Hackers
What is a keyword or phrase used to identify a topic and is preceded by a hash or pound sign (#)?
Hashtag
Which of the following is used to create the illusion that a large number of potential customers are clicking the advertiser's links, when in fact there is no likelihood that any of the clicks will lead to profit for the advertiser?
Hitbots
_________ markup language links documents, allowing users to move from one to another simply by clicking on a hot spot or link.
Hypertext
What is the Internet protocol web browsers use to request and display web pages using universal resource locators?
Hypertext transport protocol (HTTP)
__________ theft is the forging of someone's identity for the purpose of fraud.
Identity
What is the act of conforming, acquiescing, or yielding information?
Information compliance
What governs the ethical and moral issues arising from the development and use of information technologies, as well as the creation, collection, duplication, distribution, and processing of information itself?
Information ethics
What examines the organizational resource of information and regulates its definitions, uses, value, and distribution ensuring it has the types of data/information required to function and grow effectively?
Information management
Which epolicy contains general principles regarding information privacy?
Information privacy policy
What measures the number of people a firm can communicate with all over the world?
Information richness
What refers to the depth and breadth of details contained in a piece of textual, graphic, audio, or video information?
Information richness
What is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity?
Information secrecy
What is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization?
Information security
___________ are legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident.
Insiders
What is a service that enables instant or real-time communication between people?
Instant messaging
What measures advertising effectiveness by counting visitor interactions with the target ad?
Interactivity
What are agents, software, or businesses that provide a trading infrastructure to bring buyers and sellers together?
Intermediaries
____________ are agents, software, or businesses that provide a trading infrastructure to bring buyers and sellers together.
Intermediaries
What is a massive network that connects computers all over the world and allows them to communicate with one another?
Internet
What is a scripting language developed by Netscape and used to create interactive websites, a big driver of Business 2.0?
JavaScript
What are the quantifiable metrics a company uses to evaluate progress toward critical success factors?
Key performance indicators
What is a type of artificial intelligence that enables computers to both understand concepts in the environment, and also to learn?
Machine learning
What is the ability of a computer to "see" by digitizing an image, processing the data it contains, and taking some kind of action?
Machine vision
What is software that is intended to damage or disable computers and computer systems?
Malware
________ decisions concern how the organization should achieve the goals and objectives set by its strategy, and they are usually the responsibility of mid-level management.
Managerial
__________ business processes are semidynamic, semiroutine, monthly business processes such as resource allocation, sales strategy, or manufacturing process improvements.
Managerial
What type of decisions concern how the organization should achieve the goals and objectives set by its strategy, and they are usually the responsibility of mid-level management?
Managerial Decisions
At which level do employees are continuously evaluating company operations to hone the firm's abilities to identify, adapt to, and leverage change?
Managerial level
What evaluates such items as websites and checkout scanner information to detect customers' buying behavior and predict future behavior by identifying affinities among customers' choices of products and services?
Market basket analysis
What is the proportion of the market that a firm captures?
Market share.
A ___________ is a website or web application that uses content from more than one source to create a completely new product or service.
Mashup
Which of the following is a what-you-see-is-what-you-get (WYSIWYG) tool?
Mashup editor
What is the ability of an organization to tailor its products or services to the customers' specifications?
Mass customization
What is a problem caused by using collected data that skews the data in one direction?
Measurement bias
What is the practice of sending brief posts (140 to 200 characters) to a personal blog, either publicly or to a private group of subscribers who can read the posts as IMs or as text messages?
Microblogging
_____ authentication requires more than two means of authentication such as what the user knows (password), what the user has (security token), and what the user is (biometric verification).
Multifactor
What is the process within a genetic algorithm of randomly trying combinations and evaluating the success (or failure) of the outcome?
Mutation
What describes how products in a network increase in value to users as the number of users increases?
Network effect
_________ network is a category of AI that attempts to emulate the way the human brain works.
Neural
What are the two types of personally identifiable information?
Nonsensitive PII and Sensitive PII
What is the capture of transaction and event information using technology to (1) process the information according to defined business rules, (2) store the information, and (3) update existing information to reflect the new information?
Online Transaction Processing
At the _________ level do employees develop, control, and maintain core business activities required to run the day-to-day operations.
Operational
What are static, routine, daily business processes such as stocking inventory, checking out customers, or daily opening and closing processes?
Operational business processes
At which level do employees develop, control, and maintain core business activities required to run the day-to-day operations?
Operational level
Which type of analysis finds the optimum value for a target variable by repeatedly changing other variables, subject to specified constraints?
Optimization analysis
Identify the two types of results that occur when you use a search engine.
Organic search and Paid search (sponsored)
What occurs when a machine learning model matches the training data so closely that the model fails to make correct predictions on new data?
Overfitting
Which of the following key terms defines a new radical form of business that enters the market and reshapes the way companies and organizations behave?
Paradigm Shift
What occurs when a company knows enough about a customer's likes and dislikes that it can fashion offers more likely to appeal to that person, for instance, by tailoring its website to individuals or groups based on profile information?
Personalization
__________ occurs when a company knows enough about a customer's likes and dislikes that it can fashion offers more likely to appeal to that person, say by tailoring its website to individuals or groups based on profile information, demographics, or prior transactions.
Personalization
__________ reroutes requests for legitimate websites to false websites.
Pharming
__________ is a technique to gain personal information for the purpose of identity theft, usually by means of fraudulent emails that look as though they came from legitimate businesses.
Phishing
What is tangible protection such as alarms, guards, fireproof doors, fences, and vaults?
Physical security
_________ software is the unauthorized use, duplication, distribution, or sale of copyrighted software.
Pirated
What is a statement about what will happen or might happen in the future; for example, predicting future sales or employee turnover?
Prediction
What is the right to be left alone when you want to be, to have control over your personal possessions, and not to be observed without your consent?
Privacy
_______ is the right to be left alone when you want to be, to have control over your personal possessions, and not to be observed without your consent.
Privacy
_________ key encryption uses two keys: a public key that everyone can have and a private key for only the recipient.
Public
_______ engine is a data mining algorithm that analyzes a customer's purchases and actions on a website and then uses the data to recommend complementary products.
Recommendation
What occurs when a task or activity is unnecessarily repeated?
Redundancy
What occurs when steps are added to the value chain as new players find ways to add value to the business process?
Reintermediation
What is a place where buyers post feedback on sellers?
Reputation system
________ process automation is the use of software with artificial intelligence (AI) and machine learning capabilities to handle high-volume, repeatable tasks that previously required a human to perform.
Robotic
What is the use of software with artificial intelligence (AI) and machine learning capabilities to handle high-volume, repeatable tasks that previously required a human to perform?
Robotic process automation
What is the part of the United States Federal Rules of Criminal Procedure that covers the search and seizure of physical and digital evidence?
Rule 41
What is a component of Web 3.0 that describes things in a way that computers can understand?
Semantic web
___________-structured decisions occur in situations in which a few established processes help to evaluate potential solutions, but not enough to lead to a definite recommended decision.
Semi
What types of decisions occur in situations in which a few established processes help to evaluate potential solutions, but not enough to lead to a definite recommended decision?
Semistructured decisions
What is the study of the impact on other variables when one variable is changed repeatedly?
Sensitivity analysis
What is software used to make a website's product catalog available for online ordering, whereby visitors may select, view, add/delete, and purchase merchandise?
Shopping cart
What is the traditional security process, which requires a user name and password?
Single-factor authentication
__________ is the ability to look at information from different perspectives, such as analyzing total product sales during a given promotion versus the sales of a single product across all promotions.
Slice-and-Dice
What is the digital dashboard analytical capability that allows users to look at information from different perspectives, such as viewing all product sales during a single promotion vs. a single product's sales across multiple promotions?
Slice-and-dice
What is content that is designed to be easy for readers to consume and to share?
Snackable content
Who is a person within the organization who is trusted to monitor, contribute, filter, and guide the social media presence of a company, individual, product, or brand?
Social media manager
What is the process of monitoring and responding to what is being said about a company, individual, product, or brand?
Social media monitoring
Which of the following is an application that connects people by matching profile information?
Social network
What is the practice of expanding your business and/or social contacts by constructing a personal network?
Social networking
What maps group contacts (personal and professional) identifying who knows each other and who works together?
Social networking analysis
What is the use of a false identity to artificially stimulate demand for a product, brand, or service?
Sock puppet marketing
What contains instructions written by a programmer specifying the actions to be performed by computer software?
Source code
What is the original transaction record?
Source document
What is unsolicited email?
Spam
___________ phishing is a phishing expedition in which the emails are carefully designed to target a particular person or organization.
Spear
What measures the amount of time visitors spend on a website or application?
Stickiness
At the _________ level, managers develop overall business strategies, goals, and objectives as part of the company's strategic plan.
Strategic
________ decisions involve higher level issues concerned with the overall direction of the organization; these decisions define the organization's overall goals and aspirations for the future.
Strategic
___________ business processes are dynamic, nonroutine, long-term business processes such as financial planning, expansion strategies, and stakeholder interactions.
Strategic
What types of decisions involve higher level issues concerned with the overall direction of the organization; these decisions define the organization's overall goals and aspirations for the future?
Strategic decisions
At what level do managers develop overall business strategies, goals, and objectives as part of the company's strategic plan?
Strategic level
___________ improves business process efficiencies by simplifying or eliminating unnecessary steps.
Streamlining
What produces an improved product customers are eager to buy, such as a faster car or larger hard drive?
Sustaining technology
Which layout arranges the steps of a business process into a set of rows depicting the various elements?
Swim lanes
_________ communication, or communications that occur at the same time such as IM or chat.
Synchronous
What is the knowledge contained in people's heads?
Tacit knowledge
________ are specific keywords or phrases incorporated into website content for means of classification or taxonomy.
Tags
What is an antispamming approach where the receiving computer launches a return attack against the spammer, sending email messages back to the computer that originated the suspected spam?
Teergrubing
_________ is a massive network that connects computers all over the world and allows them to communicate with one another.
The Internet
Which of the following are the three conditions that indicate the time is right to initiate a business process change?
The company is markedly below industry benchmarks on its core processes, To regain competitive advantages, the company must leapfrog competition on key dimensions, There has been a pronounced shift in the market the process was designed to serve
What describes niche-market ebusiness strategies that capture the tail of a typical sales curve?
The long tail
What is an act or object that poses a danger to assets?
Threat
__________ bombs are computer viruses that wait for a specific date before executing their instructions.
Time
_______ process models show the results of applying change improvement opportunities to the current process model.
To-Be
_________ are small electronic devices that change user passwords automatically.
Tokens
What is the basic business system that serves the operational level (analysts) and assists in making structured decisions?
Transaction processing system
_______ data encompasses all raw facts contained within a single process and its purpose is to support daily operational tasks.
Transactional
True or false: A cyborg anthropologist is an individual who studies the interaction between humans and technology, observing how technology can shape humans' lives.
True
What is a problem that occurs when someone registers purposely misspelled variations of well-known domain names?
Typosquatting
What is created and updated by many users for many users?
User-contributed content
Select the four characteristics of Web 2.0.
User-contributed content, Collaboration inside the organization, Collaboration outside the organization, Content sharing through open sourcing
Select two terms for content created and updated by many users for many users.
User-generated content User-contributed content
Which attackers grant themselves a higher access level such as administrator, allowing the attacker to perform illegal actions such as running unauthorized code or deleting data?
Vertical privilege escalation
What is a technique that induces websites or users to pass on a marketing message to other websites or users, creating exponential growth in the message's visibility and effect?
Viral Marketing
________ is a phone scam that attempts to defraud people by asking them to call a bogus telephone number to confirm their account information.
Vishing
What produces graphical displays of patterns and complex relationships in large amounts of data?
Visualization
__________ produces graphical displays of patterns and complex relationships in large amounts of data.
Visualization
Review the following eras. During which era were the first forms of ebusiness created?
Web 1.0
Select the term that refers to the World Wide Web during its first years of operation.
Web 1.0
What is the next generation of Internet use—a more mature, distinctive communications platform characterized by new qualities such as collaboration sharing, and free?
Web 2.0
What is a locally stored URL or the address of a file or Internet page saved as a shortcut?
Website bookmark
Which DDS analysis technique checks the impact of a single change in a variable or assumption on the model?
What-if analysis
What is a type of collaborative web page that allows users to add, remove, and change content, which can be easily organized and reorganized as required?
Wiki
______ includes the tasks, activities, and responsibilities required to execute each step in a business process.
Workflow
What monitors processes to ensure tasks, activities, and responsibilities are executed as specified?
Workflow control systems
What tracks people's activities by such measures as number of keystrokes, error rate, and number of transactions processed?
Workplace MIS monitoring
What provides access to Internet information through documents including text, graphics, audio, and video files that use a special formatting language called HTML?
World Wide Web
What is an international community that develops open standards to ensure the long-term growth of the Web?
World Wide Web Consortium
________ is a program that secretly takes over another computer for the purpose of launching attacks on other computers.
Zombie
competitive advantage
a feature of a product or service on which customers place a greater value than they do on similar offerings from competitors
Business Strategy
a leadership plan that achieves a specific set of goals or objectives
Stakeholders
a person or group that has an interest or concern in an organization
Porter's Five Forces Model
analyzes the competitive forces within the environment in which a company operates to assess the potential for profitability in an industry
Data _________ occurs when adding additional training examples by transforming existing examples.
augmentation
Market ________ analysis evaluates such items as websites and checkout scanner information to detect customers' buying behavior and predict future behavior by identifying affinities among customers' choices of products and services.
basket
A ________ is an online journal that allows users to post their own comments, graphics, and video.
blog
Social __________ allows users to share, organize, search, and manage bookmarks.
bookmarking
A _______ process patent protects a specific set of procedures for conducting a particular business activity.
business
A(n) ________ process model is a graphic description of a process, showing the sequence of process tasks, which is developed for a specific purpose and from a selected viewpoint.
business
Business-to-________ applies to businesses buying from and selling to each other over the Internet.
business
Internet _________ is government attempts to control Internet traffic, thus preventing some material from being viewed by a country's citizens.
censorship
The ________ Online Protection Act was passed to protect minors from accessing inappropriate material on the Internet.
child
A(n)__________ system is a set of tools that supports the work of teams or groups by facilitating the sharing and flow of information.
collaboration
Real-time _________ occurs when a system updates information at the same rate it receives it.
communication
The World Wide Web _________ is an international community that develops open standards to ensure the long-term growth of the Web.
consortium
Workflow ________ systems monitor processes to ensure tasks, activities, and responsibilities are executed as specified.
control
________ processes are business processes, such as manufacturing goods, selling products, and providing service, that make up the primary activities in a value chain.
core
Mass ___________ is the ability of an organization to tailor its products or services to the customers' specifications.
customization
A(n) ___________ is an organized attempt by a country's military to disrupt or destroy information and communication systems for another country.
cyberwar
Bring your own ________ policy allows employees to use their personal mobile devices and computers to access enterprise data and applications.
device
The introduction of ebusiness brought about ________, which occurs when a business sells directly to the customer online and cuts out the intermediary.
disintermediation
A(n) ___________ technology is a new way of doing things that initially does not meet the needs of existing customers.
disruptive
A(n) __________ privacy policy details the extent to which email messages may be read by others.
A(n) ____________ monitoring policy stating explicitly how, when, and where the company monitors its employees.
employee
A search ________ is website software that finds other pages based on keyword matching similar to Google.
engine
A privilege _______ is a network intrusion attack that takes advantage of programming errors or design flaws to grant the attacker elevated access to the network and its associated data and applications.
escalation
A(n) _________ computer use policy contains general principles to guide computer user behavior.
ethical
SWOT analysis
evaluates an organization's strengths, weaknesses, opportunities, and threats to identify significant influences that work for or against business strategies
BPMN _______ is anything that happens during the course of a business process, including customer requests, time requests, and the end of the process.
event
Value Chain Analysis
executes business strategy
A(n) ________ information system is a specialized DSS that supports senior-level executives and unstructured, long-term, nonroutine decisions requiring judgment, evaluation,and insight.
executive
Employees
fair compensation, job security, ethical conduct/ treatment
Content ____________ occurs when organizations use software that filters content, such as emails, to prevent the accidental or malicious transmission of unauthorized information.
filtering
BPMN ________ display the path in which the process flows.
flows
BPMN _________ is used to control the flow of a process
gateway
Information ___________ is a method or system of government for information management or control.
governance
Social _______ represent the interconnection of relationships in a social network.
graphs
A(n) ______ is a two-dimensional representation of data in which values are represented by colors.
heat map
What is a two-dimensional representation of data in which values are represented by colors?
heat map
What is a graphical display of data using bars of different heights?
histogram
Business process __________ attempts to understand and measure the current process and make performance improvements accordingly.
improvement
A user can opt _____ to receive emails by choosing to allow permissions to incoming emails.
in
Click fraud is the practice of artificially ________ traffic statistics for online advertisements.
inflating
An __________ is a representation of information in a graphic format designed to make the data easily understandable at a glance.
infographic
What is a representation of information in a graphic format designed to make the data easily understandable at a glance?
infographic
Return on _________ indicates the earning power of a project.
investment
__________ performance indicators are the quantifiable metrics a company uses to evaluate progress toward critical success factors.
key
Shareholders/investors
maximize profits, grow market share, high return on investment
A social ________ policy outlines the corporate guidelines or principles governing employee online communications.
media
Social _________ refers to websites that rely on user participation and user-contributed content, such as Facebook, YouTube, and Digg.
media
Data ______ is the process of analyzing data to extract information not offered by the raw data alone.
mining
A ______ is a simplified representation or abstraction of reality.
model
A contractual stipulation which ensures that ebusiness participants do not deny their online actions is called a __________ clause.
nonrepudiation
Search engine ________ combines art along with science to determine how to make URLs more attractive to search engines resulting in higher search engine ranking.
optimization
A user can opt ______ of receiving emails by choosing to deny permission to incoming emails.
out
A(n) _________ shift occurs when a new radical form of business enters the market that reshapes the way companies and organizations behave.
paradigm
A(n) _________ is an exclusive right to make, use, and sell an invention and is granted by a government to the inventor.
patent
What is a temporary activity a company undertakes to create a unique product, service, or result?
project
Search engine __________ evaluates variables that search engines use to determine where a URL appears on the list of search results.
ranking
Information _________ measures the number of people a firm can communicate with all over the world.
reach
Case-based _________ is a method whereby new problems are solved based on the solutions from similar cases solved in the past.
reasoning
Business process __________ is the analysis and redesign of workflow within and between enterprises.
reengineering
A sparkline is a small embedded line graph that illustrates a _____________ trend. Sparklines are often used in reports, presentations, dashboards, and scoreboards.
single
Open ________ refers to any software whose source code is made available free for any third party to review and modify.
source
Website name ____________ is the theft of a website's name that occurs when someone, posing as a site's administrator, changes the ownership of the domain name assigned to the website to another website owner.
stealing
Which decisions arise in situations where established processes offer potential solutions?
structured
A(n) ____________ technology produces an improved product customers are eager to buy, such as a faster car or larger hard drive.
sustaining
A(n)_______ lane layout arranges the steps of a business process into a set of rows depicting the various elements.
swim
Real Simple ________ is a web format used to publish frequently updated works, such as blogs, news headlines, audio, and video, in a standardized format.
syndication
An open ________ consists of nonproprietary hardware and software based on publicly known standards that allows third parties to create add-on products to plug into or interoperate with the system.
system
Social _________ describes the collaborative activity of marking shared online content with keywords or tags as a way to organize it for future navigation, filtering, or search.
tagging
Buyer Power
the ability of buyers to affect the price they must pay for an item
competitive intelligence
the process of gathering information about the competitive environment, including competitors' plans, activities, and products, to improve a company's ability to succeed
Digital ___________ is the measure of consumer, partner, and employee confidence in an organization's ability to protect and secure data and the privacy of individuals.
trust
A(n) ________ is software written with malicious intent to cause annoyance or damage.
virus
Machine ______ is the ability of a computer to "see" by digitizing an image, processing the data it contains, and taking some kind of action.
vision
A(n) __________ is a set of measurable characteristics of a human voice that uniquely identifies an individual.
voiceprint
What is another name for a bug bounty program?
vulnerability rewards program