Info 360 final
Recently, TechJury compiled a list of cybersecurity statistics that show the impact of different malware and network attacks. What percentage of cyberattacks are aimed at small businesses?
43%
Which of the following is an example of an organization using knowledge gained from social media to make better strategic decisions.
An organization analyzes engagement with different sponsored posts to determine which ones generate the most engagement with their target audience.
Someone who possesses the knowledge of processing software, business strategy, and analytical skill to deliver data and reports that guide management and executives as they create well-informed decision making is known as a data
Analyst
Which stage of the project management process involves documenting the lessons learned during the project's execution?
Closure Stage
Forms are created using _____ software
DBMS
The acronym for Data Governance is
DG
what is gathering, storing, and searching relevant data known as?
Data Science
The Act that is important in specifically protecting email and VoIP communications is the
Electronic Communications Privacy Act.
What is the main benefit of having a social media information system (SMIS) that gathers and analyzes a company's social media data?
If the data show that a social media campaign is not attracting the desired attention or level of engagement, the company can change its campaign strategies.
A company wants to begin monitoring the Internet usage of its office employees to ensure that their working hours are spent productively. What is the least that the company should do to respect its employees' rights to information privacy?
Inform employees of the monitoring and obtain their consent.
How does a firewall work?
It determines what Internet traffic can leave or enter a network or computer.
What is the purpose of the Twitter report card?
It highlights high-performing tweets. Correct. Influencers are introduced to their target audience through the Twitter report card.
Which statement accurately describes the need to keep sensitive data, information, and systems confidential?
It is both a major goal and a requirement for cybersecurity.
What occurs during the process optimization step of business process management?
Managers adapt (modify) the process to enhance process performance.
Who is quoted "Do what you do best and outsource the rest"?
Peter Drucker
Which phase of the project management process involves feasibility studies?
Phase 1: initiation phase
Professor Michael E. Porter published "How Competitive Forces Shape Strategy" in the Harvard Business Review. In this paper, he described how all organizations must develop plans to deal with certain factors if they wish to succeed, or even continue to exist. These became known as
Porter's 5 Forces.
SQL usually pronounced "sequel" is quite useful when working with large data sets. the Q in SQL stands for
Query
Data-driven decision making (DDDM) can be facilitated through a six-step processes of Ask, Prepare, Process, Analysis, Share, and Act. Which of these steps refers to creating visualizations and presentations for key stakeholders?
Share
SQL allows users to isolate specific information contained in a database, as well as to aid in the selection, creation, addition, and extraction of data from a database. SQL stands for ______ query language.
Structured
Popular applications used by today's organizations in web mining included Google Analytics, Data Mining, and _____
Tableau
Which would organizations be interested in the information on interactions and preferences that social media sites can provide?
The more an organization knows about users' interactions and preferences, the more strategic their targeting can be.
Which statement best explains why knowing an organization's value proposition is important for creating its social media information system (SMIS)?
The organization can increase its exposure and user engagement on social media by designing an SMIS that enables it to reinforce and build on its identified strengths.
Why is it important to preserve the integrity of data, information, and systems?
These assets lose their usefulness and value if their consistency, accuracy, or dependability is compromised.
What is a characteristic shared by all devices that can be infected by a computer virus?
They are connected to the Internet.
In 2013 the U.N. General Assembly adopted a resolution affirming that the rights held by people offline must also be protected online, calling for its member nations to respect the right to privacy in digital communication. Which of the following statements applies to the real-life impact of this resolution?
This sounds good, but users should be aware that digital privacy is not honored by many on the Internet.
As reported by Andrei Ene, one of the worst malware attacks in the last 10 years is the TBT, or
Tiny Banker Trojan.
The Act that signed into law to monitor terrorist activities and communications following the 9/11 attacks and the 2001 anthrax attack on Congress is the
USA PATRIOT Act/USA Freedom Act.
Why is establishing authentication procedures a common cybersecurity goal?
Verifying that users are authorized to access systems, data, and resources is fundamental to preventing their unauthorized use.
The Stored Communications Act prohibits which activity?
accessing the communications of an organization without authorization
In addition to advancements in computer hardware, what drove improvements to POS ( point-of-sale) system in the 1990's?
an increasingly diverse group of users and their needs
What is the final step in the six-step process of creating an SMIS?
analyze the collected data
Which of the following is an example of an activity that would be useful during the planning stage of the plan-protect-respond cycle?
attempting to exploit flaws from the outside, simulating attacks that a hacker would try
a common, basic condition for most flextime policies is the requirement that employees must
be able to fulfill their work responsibilities, including attending certain meetings or events in-person
What does business-to-consumer (B2C) e-commerce replace?
brick-and-mortar store locations
data analysts must blend facts and data with knowledge about the
business or organization
Management information systems allow managers to build upon an organization's existing strengths to create
competitive advantages.
Online marketplaces where one consumer sells to another consumer are called
consumer-to-consumer (C2C).
As e-commerce continues to develop, many retailers are likely to maintain some type of "brick-and-mortar" store or physical location primarily because
consumers expect integrated shopping experiences that include face-to-face options.
the 3-step data visualization process consist of exploring the data sets for patter, then planning for visuals and finally
creating your visuals
A sales associate has been hired to write blog posts that will be regularly published on a blog about new beauty products. The blog posts are designed to include the SEO terms that relate to the company's newest skin care product, using the keywords that will also be used in their advertising campaigns. What part of the e-commerce timeline would this be a part of?
implementation
The ultimate purpose of a customer relationship management system (CRM) is to
increase sales, market share, and profit.
If an organization wants to increase user engagement on social media, it wants to
increase the conversion rate of its social media posts to interactions with users.
When competitors seek to gain competitive advantage through price leadership or by making product improvements, Professors W. Chan Kim and Renee Mauborgne would say they are using a(n)
red ocean strategy.
in order to be considered open data, databases must provide access rights so that they can be
redistributed
mainframes were originally developed for their
reliability of handling transactions.
One reason to create database policies is to specify the ____ used in database design ( how the data is structured)
rules
Most new laptop computers come with how much storage?
256 GB - 1 TB
Researchers at IBM are on the verge of using machine learning and artificial intelligence technologies to identify patterns in human speech that may be predictive of an eventual diagnosis of Alzheimer's disease. The system can produce data and conclusions within only a couple of minutes with an accuracy rate of ________, which is far better than the test currently used today.
71%
In which of the following scenarios would an executive benefit from the insights provided by operations management systems software?
An executive wants to know why it is taking longer to manufacture their product.
One of the first computer aided design programs ever developed was also among the first to be integrated into ERP systems. This popular program is
AutoCAD
Headquartered in Toronto, ________ has developed a software application that serves as an early warning system for identifying pandemics.
BlueDot
A technology called ________ may change the way doctors treat HIV, cancer, and antibiotic resistant bacterial infections.
CRISPR
Many project managers create a flowchart before creating a
Gantt chart.
ERP software integrates several software packages into a single platform. Which of the following software packages stores employee compensation and performance information?
HRM software
Researchers at ________ are on the verge of using machine learning and AI technologies to identify patterns in human speech that may be predictive of an eventual diagnosis of Alzheimer's disease.
IBM
Which of the following is a benefit to using a Monte Carlo simulation to determine the likelihood of a project completion date?
It forces the project manager to realistically evaluate critical tasks' duration.
Windows OS is owned and maintained by ________.
Microsoft
Project managers create a Gantt chart not just to illustrate the project schedule but also to use it as a framework for developing a
PERT network chart.
Which company was formed after Elon Musk's X.com and Peter Thiel's Confinity Inc. merged, when the software that allowed Palm Pilot users to transfer funds to each other had evolved to allow payment transfers over the Internet?
PayPal
Of the following statements, which one specifically applies to the CRM integration of platforms such as Facebook, YouTube, and TikTok?
Social media platforms provide targeted customer information.
Which of the following is not a presentation software term?
Speaker Image
Which company was formed by Jack Dorsey, cofounder and CEO of Twitter, to provide small business owners with aggregator services and a credit card payment system they could operate through their iPhones?
Square
Which software company has expanded its credit card payment processing products to also sell point-of-sale (POS) stations?
Stripe
Integrating a business software module into an ERP has several advantages. Which of the following business software modules includes customer payment information?
TPS software
How can picturing a long series of "if-then" statements best explain how the model of a decision support system works?
The DSS model adapts its processes based on the success of every prior decision.
How do businesses ultimately benefit from using a CRM to identify the highest revenue customers in a target market, before developing a marketing campaign?
They save time and money by targeting this precise segment of the market.
What is the term for a CRM that tracks the type of sale that is most likely to make a person purchase an item that they have previously viewed on an e-commerce site?
User Experience
A gigabyte equals approximately one ________ bytes.
billion
How does earned value management (EVM) track what is called the project "triangle" of scope, time, and cost?
by multiplying the percentage of completion of each activity on the PERT network chart by the total value of the completed activity
A key component, and major advantage, of an ERP is its
centralized database.
A digital device that accepts input, processes and stores the input, and provides output is a ________.
computer
Which of the following processes would operations management systems software be used for in a manufacturing firm?
creating bedroom furniture from lumber
Sales managers must identify the customer leads that best fit the company's goals. CRM assists in this aspect of a company's sales process, which is known as
customer qualification.
Which business computer application system is focused on helping managers to maintain the business's focus on the individual customer by developing a lasting relationship that promote long-term buying?
customer relationship management (CRM) system
A ________ is committed when a computer is the object of the crime or a computer is used to commit a criminal offense.
cybercrime
What is one of the greatest risks of an organization storing customer data?
data breaches
Because so much information regarding voters' political attitudes is available online, campaign managers increasingly rely on
data mining.
Reports offer a way to view, format, and summarize the information in a ____
database
Executive information system (EIS) software is a version of
decision support system (DSS) software.
Using technology to transform a market or to create an entirely new market is called creating a(n) ________ innovation.
disruptive
If a customer segmentation tool supports integration, what is it able to do?
efficiently link data from various sources and platforms
Because accurate tracking of employee performance will always be critical to good management, most firms invest in a software that manages
employee evaluation.
A manager is using the organization's ERP software to generate a report that links its human resources data to its overall financial performance. What is one type of HR data that the ERP accounting module could factor into this report?
employees' payroll and benefits
The primary goal of a company's social media strategy is to
engage potential customers.
Search engine optimization (SEO) can be _________ through the information gained by web mining
enhanced
An executive wants to know what would happen to company profits at the one-year, two-year, and five-year point if she reduced spending on manufacturing but increased spending on marketing and customer outreach. What system would she use to model this?
enterprise resource planning system
Which dimension of ethical behavior in the digital age includes the question of how much time employees are allowed to spend browsing social media?
establishing standards
While a religious leader may provide guidance on how to uphold high morals, ________ provide the reasons for acting morally.
ethics
Have you ever misplaced your purse or wallet? This may be a thing of the past since some companies are developing personal identification purchasing capability using ________ software.
facial recognition
One benefit of using a CRM system to segment a market (rather than another type of market segmentation tool) is that a good CRM tool
facilitates using the company's own, collected data about customers.
How many dimensions or categories can the ethical concerns of the digital age be divided into?
five
Project management software systems can be used to map out a project in different ways according to its complexity. Which of the following statements lists software results according to low-to-high project complexity?
flow chart, Gantt chart, PERT chart
By allowing viewers to see the project's progress, project managers can reduce the anxiety caused by apparent inaction. For this reason, PMs often provide simple
flowcharts
While ERP systems offer many competitive advantages to users, particularly those in upper management, a significant disadvantage is their
high costs.
Which level of share of wallet means that existing customers are spending more to purchase products or services from one organization than they are from direct or indirect competitors?
high share of wallet
What does the General Data Protection Regulation (GDPR) regulate?
how companies protect personal data
A new app was released providing consumers with digital coupons for products the consumer indicates they frequently purchase. The app gives different users coupons with different values and shares purchasing as well as demographic information with the product manufacturer. Under what circumstances would the information sharing with product manufacturers be ethical?
if the app's terms of service indicated who they would be sharing information with and what information would be shared
What is the overarching goal of organizations choosing to adopt an enterprise resource planning (ERP) system?
increase operational efficiency
With the increasing presence of Internet e-commerce sites, the force of customers has
increased
During which phases of a project is project management software used to increase the efficiency of all team members?
initiation, planning, execution, and closure
Adding software to a digital device, or adding hardware components to a digital device is called ________.
installing
Data marts are used to track ____, purchase transactions, and the supply chain.
inventories
How are data in process different from data at rest or data in storage?
it is held in the device's RAM until it can be processed by the CPU or GPU
Coffee vendors who operate small, drive-up coffee stands find it difficult to charge significantly higher prices than their many competitors do. What aspect of the coffee stand business makes raising prices difficult?
its low barriers to entry
The essential function of resource leveling is to
keep the project moving toward completion by reassigning resources.
Database reports are useful in many ways; one way a report is used is to provide details about individual records and to create _____
labels
Under what type of system are employees encouraged to halt the manufacturing process in the event of a manufacturing error or safety risk?
lean manufacturing system
Users often find it difficult to implement or even comprehend a new ERP system without significant training because of ERPs' steep
learning curves.
Along with salary, human resources (HR) managers typically need to track employee hiring dates, marital status, number of dependents, and benefits choices and usage. To ensure this is done correctly, nearly all firms use a system that
manages benefits.
An electronic element that stores data by changing its resistance based on the current that has passed through it (similar to RRAM) is called a
memristor
According to Professor Porter, a business must differentiate itself from its competitors. One method is to encourage customers to believe that an organization provides higher quality goods or better service, then the organization can charge a premium, or gain market share, or (ideally) both. For example, by placing a swoop icon on a sweatshirt, Nike is able to charge a higher price. This methodology is called
monopolistic competition.
Which of the following is a strength of the Android platform?
most widely used OS for smartphones and tablets
employee monitoring software
observes computer use of all employees from a central location.
Fayol's principles for structuring organizational roles and authority emphasize
order and unity, so that employees understand their roles and report to only one person.
qualitative data that is not.categorized is called nominal data. Qualitative data that is categorized (ranked for example) is considered ____ data
ordinal
the DBMS (Database Management System) is designed to administer and ___ a database
organize
What type of firewall would filter messages coming from a specific, predefined IP address to a spam filter?
packet filter
When data is anonymized, the PII is eliminated or encrypted. PII includes names, social security numbers, address,and more and stands for ____ identifiable information
personal
A long standing company is expanding their existing workforce. what, in all likelihood, would they invest in terms of computing capabilities?
personal computers
E-commerce ________ includes creating marketing messages that contain the individual's name, appeal to his/her interests, and take their purchase behavior into account.
personalization
The security firewall serving Vantage's email program catches an impressive number of both irrelevant and illegitimate messages, to the point where employees usually do not even see them. Occasionally, however, an unsolicited message will catch managing partner Carl's eye. Because one new message looks to come from a potential new client, he's interested but careful, aware that the boutique consulting firm has a very targeted marketing system and clients usually do not appear out of thin air. What type of security concern is causing Carl's suspicion?
phishing
The organizations likely to benefit the most from the global reach of e-commerce are those that
previously depended on foot traffic into one physical store to sell their products.
The U.S. Census Bureau is using differential ________ to make census data secure and private.
privacy
Which type of employee in a project management firm works directly with the client in the early stages of a project?
project planner
Focusing on project scheduling and sequencing to optimize the progress of all of the projects in a firm's portfolio is the role of a
project planner.
Which type of touchscreen uses a single metallic-coated panel and uses electricity to calculate touch points?
projective capacitive
What aspect of today's business environment is central to the need for robust transaction management processing systems?
proliferation of e-commerce-based organizations
What part of the plan-protect-respond cycle is occurring when an organization limits access to sensitive documents on a server to only those with the required security clearance?
protect
Which of the following statements encapsulates the purpose of the Federal Information Security Management Act?
protect government assets against cybersecurity events
One version of this type of malware encrypts a victim's data until a payment is made. Another version threatens to make public a 'victim's personal data unless a payment is made. This type of malware is called
ransomware.
In the initiation phase of project management, the client and project manager determine if the project is SMART. What does the R in SMART refer to?
realistic
Collections of related fields in a database are referred to as
records
A company regularly honors its employee-of-the-month with a congratulatory post on its social media pages. Which standards should the company establish and enforce to best protect the privacy rights of these employees?
rules of conduct for how social media followers and visitors respond to the posts
Which step of an ethical analysis is designed to enable a manager to obtain guidance or insights from other managers?
searching for precedents
For which type of cybersecurity vulnerability do organizations maintain and share databases of known problems?
security weaknesses in operating systems or application software
Of the listed methods of collecting demographic information, which is the most effective for organizations defining their target market?
social media
A business must not only look at its direct competitors, but also must contend with those firms that offer a product that a consumer might alternatively choose. For example, McDonald's and Burger King can be considered competitors and if one firm raises prices the other firm might gain its customers. However, if both firms raise their prices, customers may choose to purchase pizza instead. Porter refers to this as the force of
substitutes.
Intel's XE-HP GPU, built in a collaboration between Intel, Hewlett Packard, and the Argonne National Laboratory is designed to support the Aurora
supercomputer
Apple uses Corning's glass products for all its devices, such as the Gorilla Glass 6 used in the iPhone 11 series. To ensure that it continues to have a strong relationship with this glass industry leader, Apple has invested nearly $500 million toward Corning's advanced glass research division. By building up this relationship, Apple seeks to maintain some control over which of Porter's 5 forces?
suppliers
A logistician for an oil company receives an alert from the software she uses that a supertanker has been delayed. In addition, she receives a choice of reasonable actions to take. What software is she likely using?
supply chain management software
relational database organize data into ____ based on structured data groupings.
tables
Why is the meeting between all project stakeholders and key players scheduled as the final step in the planning phase?
the budgets and timelines need to be finalized before stakeholders and key players can understand the scope of the projects and their role within the project
In addition to the probable outcome, what other information does modern business intelligence software provide?
the degree of likelihood of the outcome
To calculate an organization's customer equity (CE) value we first determine
the future lifetime revenue the organization's customers will generate.
what function of a micro-networked POS system is responsible for increased accuracy of employees when ringing up customer purchases?
the total button which automatically added up the amount owned for items.
What distinguishes the two main types of cybercrimes?
their frequency (how often they are committed)
What do most companies use as their main conduit for reaching and connecting with customers?
their website
M-commerce is a subset of
traditional e-commerce.
A terabyte equals approximately one ________ bytes?
trillion
A program that appears to be legitimate but executes an unwanted activity when activated is called a
trojan.
the main function of executive support system (ESSs) is to
turn data information to support high-level decision making.
Manuel runs a small business that paints residential interiors. He has decided most of his current customers can best be reached by sending out a seasonal email newsletter. He will target new customers by placing ads on Facebook targeted at people located within 20 miles of his business who have searched for house painters. Where would he place this information on an e-commerce presence map?
type of presence
E-commerce ________ is the ability of an organization to create a strong presence among consumers in many places, with minimal time constraints, to sell them products and services.
ubiquity
Tiffany has purchased a new laptop. She noticed many unwanted programs came pre installed on her laptop. She wants to ________ the programs from her device so they do not take up storage space.
uninstall
Online content that has been created and posted by unpaid contributors such as customers or fans of a product or service is referred to as
user-generated.
cloud computing can best be described as
using the Internet to store and access resources
The NIST Cybersecurity Framework is a
voluntary guide for organizations.
5G cellular technology offers the promise of download speeds as high as 20 Gbps. This will likely require more antenna arrays with each antenna sending out ________ microwave signals.
weaker
The practice of human resources management originated
with or before the ancient Egyptians, who had many scribes and priests dedicated to organizing workforces.