Info 360 final

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Recently, TechJury compiled a list of cybersecurity statistics that show the impact of different malware and network attacks. What percentage of cyberattacks are aimed at small businesses?

43%

Which of the following is an example of an organization using knowledge gained from social media to make better strategic decisions.

An organization analyzes engagement with different sponsored posts to determine which ones generate the most engagement with their target audience.

Someone who possesses the knowledge of processing software, business strategy, and analytical skill to deliver data and reports that guide management and executives as they create well-informed decision making is known as a data

Analyst

Which stage of the project management process involves documenting the lessons learned during the project's execution?

Closure Stage

Forms are created using _____ software

DBMS

The acronym for Data Governance is

DG

what is gathering, storing, and searching relevant data known as?

Data Science

The Act that is important in specifically protecting email and VoIP communications is the

Electronic Communications Privacy Act.

What is the main benefit of having a social media information system (SMIS) that gathers and analyzes a company's social media data?

If the data show that a social media campaign is not attracting the desired attention or level of engagement, the company can change its campaign strategies.

A company wants to begin monitoring the Internet usage of its office employees to ensure that their working hours are spent productively. What is the least that the company should do to respect its employees' rights to information privacy?

Inform employees of the monitoring and obtain their consent.

How does a firewall work?

It determines what Internet traffic can leave or enter a network or computer.

What is the purpose of the Twitter report card?

It highlights high-performing tweets. Correct. Influencers are introduced to their target audience through the Twitter report card.

Which statement accurately describes the need to keep sensitive data, information, and systems confidential?

It is both a major goal and a requirement for cybersecurity.

What occurs during the process optimization step of business process management?

Managers adapt (modify) the process to enhance process performance.

Who is quoted "Do what you do best and outsource the rest"?

Peter Drucker

Which phase of the project management process involves feasibility studies?

Phase 1: initiation phase

Professor Michael E. Porter published "How Competitive Forces Shape Strategy" in the Harvard Business Review. In this paper, he described how all organizations must develop plans to deal with certain factors if they wish to succeed, or even continue to exist. These became known as

Porter's 5 Forces.

SQL usually pronounced "sequel" is quite useful when working with large data sets. the Q in SQL stands for

Query

Data-driven decision making (DDDM) can be facilitated through a six-step processes of Ask, Prepare, Process, Analysis, Share, and Act. Which of these steps refers to creating visualizations and presentations for key stakeholders?

Share

SQL allows users to isolate specific information contained in a database, as well as to aid in the selection, creation, addition, and extraction of data from a database. SQL stands for ______ query language.

Structured

Popular applications used by today's organizations in web mining included Google Analytics, Data Mining, and _____

Tableau

Which would organizations be interested in the information on interactions and preferences that social media sites can provide?

The more an organization knows about users' interactions and preferences, the more strategic their targeting can be.

Which statement best explains why knowing an organization's value proposition is important for creating its social media information system (SMIS)?

The organization can increase its exposure and user engagement on social media by designing an SMIS that enables it to reinforce and build on its identified strengths.

Why is it important to preserve the integrity of data, information, and systems?

These assets lose their usefulness and value if their consistency, accuracy, or dependability is compromised.

What is a characteristic shared by all devices that can be infected by a computer virus?

They are connected to the Internet.

In 2013 the U.N. General Assembly adopted a resolution affirming that the rights held by people offline must also be protected online, calling for its member nations to respect the right to privacy in digital communication. Which of the following statements applies to the real-life impact of this resolution?

This sounds good, but users should be aware that digital privacy is not honored by many on the Internet.

As reported by Andrei Ene, one of the worst malware attacks in the last 10 years is the TBT, or

Tiny Banker Trojan.

The Act that signed into law to monitor terrorist activities and communications following the 9/11 attacks and the 2001 anthrax attack on Congress is the

USA PATRIOT Act/USA Freedom Act.

Why is establishing authentication procedures a common cybersecurity goal?

Verifying that users are authorized to access systems, data, and resources is fundamental to preventing their unauthorized use.

The Stored Communications Act prohibits which activity?

accessing the communications of an organization without authorization

In addition to advancements in computer hardware, what drove improvements to POS ( point-of-sale) system in the 1990's?

an increasingly diverse group of users and their needs

What is the final step in the six-step process of creating an SMIS?

analyze the collected data

Which of the following is an example of an activity that would be useful during the planning stage of the plan-protect-respond cycle?

attempting to exploit flaws from the outside, simulating attacks that a hacker would try

a common, basic condition for most flextime policies is the requirement that employees must

be able to fulfill their work responsibilities, including attending certain meetings or events in-person

What does business-to-consumer (B2C) e-commerce replace?

brick-and-mortar store locations

data analysts must blend facts and data with knowledge about the

business or organization

Management information systems allow managers to build upon an organization's existing strengths to create

competitive advantages.

Online marketplaces where one consumer sells to another consumer are called

consumer-to-consumer (C2C).

As e-commerce continues to develop, many retailers are likely to maintain some type of "brick-and-mortar" store or physical location primarily because

consumers expect integrated shopping experiences that include face-to-face options.

the 3-step data visualization process consist of exploring the data sets for patter, then planning for visuals and finally

creating your visuals

A ________ is committed when a computer is the object of the crime or a computer is used to commit a criminal offense.

cybercrime

Reports offer a way to view, format, and summarize the information in a ____

database

Using technology to transform a market or to create an entirely new market is called creating a(n) ________ innovation.

disruptive

Because accurate tracking of employee performance will always be critical to good management, most firms invest in a software that manages

employee evaluation.

The primary goal of a company's social media strategy is to

engage potential customers.

Search engine optimization (SEO) can be _________ through the information gained by web mining

enhanced

Which dimension of ethical behavior in the digital age includes the question of how much time employees are allowed to spend browsing social media?

establishing standards

While a religious leader may provide guidance on how to uphold high morals, ________ provide the reasons for acting morally.

ethics

How many dimensions or categories can the ethical concerns of the digital age be divided into?

five

What does the General Data Protection Regulation (GDPR) regulate?

how companies protect personal data

A sales associate has been hired to write blog posts that will be regularly published on a blog about new beauty products. The blog posts are designed to include the SEO terms that relate to the company's newest skin care product, using the keywords that will also be used in their advertising campaigns. What part of the e-commerce timeline would this be a part of?

implementation

The ultimate purpose of a customer relationship management system (CRM) is to

increase sales, market share, and profit.

If an organization wants to increase user engagement on social media, it wants to

increase the conversion rate of its social media posts to interactions with users.

With the increasing presence of Internet e-commerce sites, the force of customers has

increased

Data marts are used to track ____, purchase transactions, and the supply chain.

inventories

How are data in process different from data at rest or data in storage?

it is held in the device's RAM until it can be processed by the CPU or GPU

Coffee vendors who operate small, drive-up coffee stands find it difficult to charge significantly higher prices than their many competitors do. What aspect of the coffee stand business makes raising prices difficult?

its low barriers to entry

Database reports are useful in many ways; one way a report is used is to provide details about individual records and to create _____

labels

Under what type of system are employees encouraged to halt the manufacturing process in the event of a manufacturing error or safety risk?

lean manufacturing system

Along with salary, human resources (HR) managers typically need to track employee hiring dates, marital status, number of dependents, and benefits choices and usage. To ensure this is done correctly, nearly all firms use a system that

manages benefits.

According to Professor Porter, a business must differentiate itself from its competitors. One method is to encourage customers to believe that an organization provides higher quality goods or better service, then the organization can charge a premium, or gain market share, or (ideally) both. For example, by placing a swoop icon on a sweatshirt, Nike is able to charge a higher price. This methodology is called

monopolistic competition.

employee monitoring software

observes computer use of all employees from a central location.

Fayol's principles for structuring organizational roles and authority emphasize

order and unity, so that employees understand their roles and report to only one person.

qualitative data that is not.categorized is called nominal data. Qualitative data that is categorized (ranked for example) is considered ____ data

ordinal

the DBMS (Database Management System) is designed to administer and ___ a database

organize

What type of firewall would filter messages coming from a specific, predefined IP address to a spam filter?

packet filter

When data is anonymized, the PII is eliminated or encrypted. PII includes names, social security numbers, address,and more and stands for ____ identifiable information

personal

A long standing company is expanding their existing workforce. what, in all likelihood, would they invest in terms of computing capabilities?

personal computers

E-commerce ________ includes creating marketing messages that contain the individual's name, appeal to his/her interests, and take their purchase behavior into account.

personalization

The security firewall serving Vantage's email program catches an impressive number of both irrelevant and illegitimate messages, to the point where employees usually do not even see them. Occasionally, however, an unsolicited message will catch managing partner Carl's eye. Because one new message looks to come from a potential new client, he's interested but careful, aware that the boutique consulting firm has a very targeted marketing system and clients usually do not appear out of thin air. What type of security concern is causing Carl's suspicion?

phishing

The organizations likely to benefit the most from the global reach of e-commerce are those that

previously depended on foot traffic into one physical store to sell their products.

What part of the plan-protect-respond cycle is occurring when an organization limits access to sensitive documents on a server to only those with the required security clearance?

protect

Which of the following statements encapsulates the purpose of the Federal Information Security Management Act?

protect government assets against cybersecurity events

One version of this type of malware encrypts a victim's data until a payment is made. Another version threatens to make public a 'victim's personal data unless a payment is made. This type of malware is called

ransomware.

Collections of related fields in a database are referred to as

records

When competitors seek to gain competitive advantage through price leadership or by making product improvements, Professors W. Chan Kim and Renee Mauborgne would say they are using a(n)

red ocean strategy.

in order to be considered open data, databases must provide access rights so that they can be

redistributed

mainframes were originally developed for their

reliability of handling transactions.

One reason to create database policies is to specify the ____ used in database design ( how the data is structured)

rules

A company regularly honors its employee-of-the-month with a congratulatory post on its social media pages. Which standards should the company establish and enforce to best protect the privacy rights of these employees?

rules of conduct for how social media followers and visitors respond to the posts

Which step of an ethical analysis is designed to enable a manager to obtain guidance or insights from other managers?

searching for precedents

For which type of cybersecurity vulnerability do organizations maintain and share databases of known problems?

security weaknesses in operating systems or application software

Of the listed methods of collecting demographic information, which is the most effective for organizations defining their target market?

social media

A business must not only look at its direct competitors, but also must contend with those firms that offer a product that a consumer might alternatively choose. For example, McDonald's and Burger King can be considered competitors and if one firm raises prices the other firm might gain its customers. However, if both firms raise their prices, customers may choose to purchase pizza instead. Porter refers to this as the force of

substitutes.

Apple uses Corning's glass products for all its devices, such as the Gorilla Glass 6 used in the iPhone 11 series. To ensure that it continues to have a strong relationship with this glass industry leader, Apple has invested nearly $500 million toward Corning's advanced glass research division. By building up this relationship, Apple seeks to maintain some control over which of Porter's 5 forces?

suppliers

relational database organize data into ____ based on structured data groupings.

tables

Why is the meeting between all project stakeholders and key players scheduled as the final step in the planning phase?

the budgets and timelines need to be finalized before stakeholders and key players can understand the scope of the projects and their role within the project

In addition to the probable outcome, what other information does modern business intelligence software provide?

the degree of likelihood of the outcome

what function of a micro-networked POS system is responsible for increased accuracy of employees when ringing up customer purchases?

the total button which automatically added up the amount owned for items.

What distinguishes the two main types of cybercrimes?

their frequency (how often they are committed)

What do most companies use as their main conduit for reaching and connecting with customers?

their website

M-commerce is a subset of

traditional e-commerce.

A program that appears to be legitimate but executes an unwanted activity when activated is called a

trojan.

the main function of executive support system (ESSs) is to

turn data information to support high-level decision making.

Manuel runs a small business that paints residential interiors. He has decided most of his current customers can best be reached by sending out a seasonal email newsletter. He will target new customers by placing ads on Facebook targeted at people located within 20 miles of his business who have searched for house painters. Where would he place this information on an e-commerce presence map?

type of presence

E-commerce ________ is the ability of an organization to create a strong presence among consumers in many places, with minimal time constraints, to sell them products and services.

ubiquity

Online content that has been created and posted by unpaid contributors such as customers or fans of a product or service is referred to as

user-generated.

cloud computing can best be described as

using the Internet to store and access resources

The NIST Cybersecurity Framework is a

voluntary guide for organizations.

The practice of human resources management originated

with or before the ancient Egyptians, who had many scribes and priests dedicated to organizing workforces.


Set pelajaran terkait

Module 7: Finance- TVM and Multiple Cash Flows

View Set

MRKT 640 Consumer Behavior Module 3

View Set

Unit 4 - Matter & Energy Study Guide

View Set