IS PRACTICE EXAM

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

The overall cost of ERP software can be prohibitive for some organizations. ERP software packages, including licensing, can exceed _____. ERP systems often have a steep learning curve. Due to the variety of capabilities included in many software packages, it can be difficult to implement, comprehend, and utilize a new ERP system. The costs associated with ongoing maintenance of an ERP system need to considered. Maintenance costs include personnel required to do software training, additional IT personnel, and consultants.

$100,000

Email, social media, and traditional mail are sources of

CRM customer interaction data.

Users often find it difficult to implement or even comprehend a new ERP system without significant training because of

ERP's steep learning curves

Software that businesses use to manage activities in both the internal and external operational environment is known as

Enterprise Resource Planning (ERP).

Of the following, select the reasons why up-to-date inventory management systems are highly efficient. More than one answer may be correct

Estimates of reordering points are highly accurate.Estimates of reordering points are highly accurate. Forecasts of order quantity levels are much improved.Forecasts of order quantity levels are much improved. Adherence to Equal Employment Opportunity legislation is stricter.Adherence to Equal Employment Opportunity legislation is stricter. Average CAMELS ratings have risen substantially.

Online analytical processing (OLAP)

is a key advanced technology behind CRM analytics.

Customized communication

or properly matching messages to the customer, results in less wasted communication, more sincere communication, and effectiveness.

What is Jira and GanttPro examples of?

project management software

Recruiting and hiring management software helps HR managers use both internal and external data to determine

what staff the organization will need and how it can obtain them.

What is the primary reason that businesses use CRM systems to help them identify MQLs and SQLs during the customer acquisition process?

Different engagement is needed to turn each type of lead into a customer.

Accounting systems that record ledger journaling and billing, as well as perform a variety of other financial calculations and tasks, are commonly being integrated with

ERP Systems

What occurs during the process optimization step of business process management?

Managers adapt (modify) the process to enhance process performance.

Describe the functions of project management software. More than one answer may be correct.

Organize project management tasks.Organize project management tasks. Enable collaboration among project stakeholders.Enable collaboration among project stakeholders. Provide project management security. make job assignments

A new app wants to use CRM to analyze whether a new feature would generate reliable income. Which of the following could be used to determine this? More than one answer may be correct.

The company uses the CRM to track how many users access this new feature and how much time they spend using it.The company uses the CRM to track how many users access this new feature and how much time they spend using it. The company uses the CRM to track how much more or less time users who access that feature spend in the app overall. The company uses the CRM to track which sections of the app most frequently crash for customers.

From the following list, select all the sales prospecting tools that are most often integrated with CRM systems

ZoominfoZoominfo LinkedIn Sales Navigator Clearbit Prospector

Which of the following data types are qualitative data? More than one answer may be correct.

attitude and opinionattitude and opinion motivation to purchasemotivation to purchase education

During the fifth step in business process management,

called process optimization, managers and decision makers modify the process to further improve performance. Once changes have been made, the process is again executed and analyzed. This recurring review and feedback activity allow managers to create a continually improving process.

A database management system

can store and categorize inventory data, allowing managers to look up items and create inventory reports.

A key component, and major advantage, of an ERP is its

centralized database.

What is one of the greatest risks of an organization storing customer data?

data breaches

Smaller firms may rely on software packages such Kronos Workforce Ready, BambooHR, PerformancePro for services related to

employee evaluation.

Apple has a very high customer equity (CE) value. Apple has gained this high CE value due to

extreme customer loyalty.

Customer surveys, social media, and analytics are used to

gather data on current customers, which helps inform possible future patterns.

Descriptive data about a customer includes categories such as

lifestyle and career.

Descriptive data includes

lifestyle, career, family status, and education. This data type provides additional information about the customer base.

Describe the cost benefits of using a cloud-based ERP compared to an on-premise system. More than one answer may be correct.

lower IT infrastructure expenses lower maintenance costs reduced IT labor expenses reduced vendor support costs

Data breaches

remain one of the biggest threats to storing customer information. CRM systems store large volumes of information from customers and employees and are often the target of cybercriminals.

HR management systems include

software for benefits administration (enrolling, maintaining, managing, and discontinuing benefits for employees and their dependents), evaluating and/or tracking the performance of employees, and strategically compensating employees.

From the following list, select the two resources that organizations can track using accounting management software.

tangible assets intangible assets customer relationships supply chain resources

The concept of "share of customer" focuses on getting

the most business from the fewest customers.

What business software applications are commonly integrated with an enterprise resource planning (ERP) system as modules? Select all of the correct answer options.

CRM PM BI

Online analytical processing (OLAP) is the technology behind many business intelligence applications. Of the following, what three facts about OLAP and CRM are true?

CRM analytics are considered a form of online analytical processing (OLAP).CRM analytics are considered a form of online analytical processing (OLAP). OLAP includes predictive what-if analysis, report generation, and forecasting.OLAP includes predictive what-if analysis, report generation, and forecasting. CRM systems incorporate data mining through online analytical processing.CRM systems incorporate data mining through online analytical processing. Correct Online analytical processing (OLAP) is separate from data discovery and analysis.

This company is trying to determine the viability of their new feature. This can be done by using the

CRM to track consumption trends and usage behaviors such as how much time is spent engaging with that feature and with the app overall.

Describe benefits of cloud-based ERP systems over on-premises ERP solutions. More than one answer may be correct.

Cloud-based ERP systems allow organizations to access reports from remote locations. Cloud-based ERP systems have lower IT infrastructure expenses. Organizations using cloud-based ERP systems have reduced IT labor expenses. Organizations using cloud-based ERP systems have reduced IT labor expenses. Cloud-based options provide more control over on-premises ERP solutions.

Software that businesses use to manage activities in both the internal and external operational environment is known as Enterprise Resource

Planning

Of the following statements, which one specifically applies to the CRM integration of platforms such as Facebook, YouTube, and TikTok?

Social media platforms provide targeted customer information.

The first two steps in business process management (BPM) are examining the design of the process and modeling the process. What are the third and fourth steps of the process?

Step 3: running the process; Step 4: monitoring the process

Integrating a business software module into an ERP has several advantages. Which of the following business software modules includes customer payment information?

TPS Software

A company is trying to determine why their CRM software is not generating better leads and asks you to analyze their process. Which of the following could be reasons why their CRM is not successfully generating leads? More than one answer may be correct.

The company only has a presence on Facebook—it has no social media presence on any other platform.The company only has a presence on Facebook—it has no social media presence on any other platform. The CRM is not set up to track which emails potential customers are clicking on to get to their e-commerce site.The CRM is not set up to track which emails potential customers are clicking on to get to their e-commerce site. The company has not placed any ads using Google AdWords.The company has not placed any ads using Google AdWords. The CRM tracks user preferences as they navigate the company's website, keeping track of which special offers generate more users to complete purchases.

Which of the following is an example of how the project communications piece of project management software could be used when integrated with enterprise resource planning software? More than one answer may be correct.

The visual project completion map is automatically updated as phases are completed. The visual project completion map is automatically updated as phases are completed .The client is able to access information about all phases of the project in one place, reducing the need for individual status reports.The client is able to access information about all phases of the project in one place, reducing the need for individual status reports. A team lead is able to reassign a phase of the project when the project becomes too much work for the originally assigned staff.

From the following list, select all the ways in which CRM systems assist businesses in targeting a market segment.

They are used to identify a target market and provide insights into the profiles of these customers.They are used to identify a target market and provide insights into the profiles of these customers. They help identify the common characteristics of target market members, including geographic location, demographic and psychographic backgrounds, and income level.They help identify the common characteristics of target market members, including geographic location, demographic and psychographic backgrounds, and income level. They provide analysis of customer characteristics, which is an important part of the target market identification process.They provide analysis of customer characteristics, which is an important part of the target market identification process. They collect important transactional data that users can then manually sort, interpret, and use in target marketing identification.

Which component of a business management system can help a manager check and report on the company's current inventory?

a database management system (DBMS)

In a Gantt chart,

a project is broken down into its component tasks, some of which can be done at the same time, while other tasks are dependent upon the completion of preceding tasks. Each task is depicted on the chart, a horizontal bar chart, displaying an estimate of its time requirement.

Cloud-based ERP systems allow organizations to

access data and reports from remote locations at any hour of the day. Cloud-based ERP systems often have a lower price point when compared to on-premise options. IT support services provided by the cloud-based ERP organization result in reduced IT labor expenses.

What type of software can be integrated with ERP software to record ledger journaling and billing in the same platform as other, related data?

accounting

Share of customer,

also known as share of wallet, focuses on getting as much business as possible from fewer customers.

In the second step in business process management

analysts use flowcharts and other tools to depict the workflow, the sequence of operations, and the decision points. This is called the process modeling step.

Organizations that use an on-premises business management system

are also responsible for maintaining, updating, and securing the system.

By 2021, customer relationship management systems

as predicted by the Gartner IT Services company, will be the single largest revenue area of spending in enterprise software.

The integration of e-commerce and ERP ensures that data is

collected from e-commerce operations, including customer information, order history, shipping information, and customer satisfaction measures.

Transaction processing software (TPS) includes

customer payment information, among other resources.

The business software applications that are commonly integrated with an ERP system include

customer relationship management (CRM), project management (PM), and business intelligence (BI) modules.

Apple has a high CE value due to the extreme customer loyalty exhibited by their customers. This loyalty leads to

customers who purchase many Apple products including phones, tablets, wearables, and other devices. Additionally, Apple spends very little on their customer acquisition costs and even less on their customer retention costs.

Most HRM modules provide a structured dashboard that managers can access for information. Which of the following information types are included? More than one answer may be correct.

employee absences or leaves employee compensation employee performance review status employee environmental controls

Radio frequency identification (RFID) technology

has allowed faster (real-time) inventory tracking and management. The adoption of the universal product code (UPC) as the standard barcode marked the modern era of inventory management systems.

Describe difficulties in implementing an ERP system. More than one answer may be correct.

high costs steep learning curve maintenance costs poor access to data

Because some tasks can be done concurrently while other tasks are dependent upon the completion of preceding tasks, Gantt charts are constructed using a

horizontal bar chart

Along with salary, human resources (HR) managers typically need to track employee hiring dates, marital status, number of dependents, and benefits choices and usage. To ensure this is done correctly, nearly all firms use a system that

manages benefits.

Customized communication is best described as

matching the message to the individual customer.

Ensuring that the system is maintained, updated, and secured is a major drawback to

on-premises systems.

What is a key advanced technology behind CRM analytics?

online analytical processing

CRM analytics are often considered a form of

online analytical processing (OLAP). OLAP is the technology behind many business intelligence applications and is used for data discovery and analysis including predictive what-if analysis, report generation, and forecasting. Often, CRM systems use data mining to extract information from a customer database.

In order to reduce security risk and facilitate collaboration among project stakeholders, most project management (PM) software is

or located on the internet.

Project management software offers the ability to

organize and track scheduling, forecasting, resource allocation, tracking, task management, budgeting, and execution. In addition, project management software enhances collaboration and communication between all project stakeholders and contractors. With access rights and permissions enabled, project management software secures the details and information pertaining to a project.

During the fifth step optimization process step of business process management, what are two key things manager look for in the process?

potential slowdowns and savings opportunities

Organizations create and consume many different types of data that are generated from the internal and external operating environment. These include

production, inventory, accounting/financial, and human resources. ERP systems are used to consolidate this data in a central location for access and retrieval, which cuts down on data redundancy and access time.

Jira and GanttPro are two examples of

project management software. These two types of software are commonly used by small businesses.

CRM software provides which of the following important customer qualification benefits? More than one answer may be correct.

the ability to make distinctions between true prospects and unrealistic sales opportunities the ability to make distinctions between true prospects and unrealistic sales opportunities the opportunity to create customized sales funnels based on specific organizational needs and sales characteristics

Describe the factors associated with maintenance costs incurred by employing an enterprise resource planning (ERP) system. More than one answer may be correct.

time costsincreased IT PersonnelSoftware Consultants

In order for a CRM to be effective, it needs to

track quality data from a variety of sources. Having a presence on only one social media site limits the demographics of the data collected. Similarly, the company should be collecting the data regarding which emails are generating leads versus which ones get deleted before they are read.

A benefits management system

tracks employee hiring dates, marital status, number of dependents, and benefits choices.

In the fourth step of business process management, managers measure the performance of the engine. This is called the process monitoring step.

true In the fourth step of business process management, managers measure the performance of the engine by tracking both individual process components and the process as a whole. This is called the process monitoring step.

The overall cost of ERP software can be prohibitive for some organizations. ERP software packages, including licensing, can exceed

$100,000

Two key benefits of an HRM module within an ERP system are

(1) a centralized location for data access and analysis and (2) enhanced opportunities for decision making.

Currently apps that run on the cloud are slow compared to apps that run on local machines

(the edge)

List characteristics of computer viruses. More than one answer may be correct.

A computer virus is software that infects computers and is created using computer code.A computer virus is software that infects computers and is created using computer code. Viruses can destroy programs or alter the operations of a computer or network.

Select three accurate statements that use correct terminology to describe the process denial-of-service (DoS) attacks.

A hacker uses software to infect computers, including laptops, desktops, tablets, and Internet of Things (IoT) devices, turning each computer into a zombie. A denial-of-service (DoS) attack takes place when a hacker gains unauthorized access to and control of a network of Internet-connected computers When an IP address is targeted, each zombie computer simultaneously sends requests to that IP address; this can cause the targeted server to slow or even shut down.

Why is an organization's chief financial officer more likely to have an accurate picture of its total cash flow if the organization has ERP software that integrates its financial management system? More than one answer may be correct.

A single cash flow report can be generated for the entire organization.A single cash flow report can be generated for the entire organization.Real-time cash flow information can be generated quickly, at any time.The ERP system is probably easy to implement, comprehend, and utilize.

Which of the following is a situation that UEBA would flag for review? More than one answer may be correct.

A user normally spends less than an hour accessing a secure server. One day, she spends almost all of her time accessing the data on that server. A user who normally sends between 50 and 100 emails a day sends over 1,000 emails one day.

Starship was launched by Sky co-founders

Ahti Heinla and Janus Friis.

The world's first concept for zero-emission commercial aircraft was recently discussed by

Airbus

Violet is a 4-foot 7-inch robot with a humanoid appearance that was developed by ________, an Irish startup that specializes in designing artificially intelligent helpers for the healthcare industry. The goal is to help overburdened hospitals better cope with the challenges they are currently facing due to COVID-19.

Akara

The infection of a digital device by a computer virus happens in stages. What is the second step in this process?

An action such as running or opening a file activates the virus.

Which of the following are examples of spear phishing?

An email is sent to employees at a specific company, instructing them to click on a link. That link deploys malware to their device.

Alyssa says that no one would risk selling operable or effective malware programs, even on the Dark Web. Why is she wrong?

Criminal hackers do make money by selling actual malware.

Which of the following statements about sources of customer data are correct?

Customer surveys collect feedback from customers.Customer surveys collect feedback from customers. Data collection from social media platforms can be integrated within a CRM platform.Data collection from social media platforms can be integrated within a CRM platform. Analytics are used to uncover trends in the collected data.

One of Google's companies that is investigating AI and Machine Learning is called

DeepMind

A hacker launches an attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests. This would be considered a _________ attack.

DoS

From the following list, select all the actions that are considered cyberattacks.

DoS attacks DDoS attacks information theft

Which of the following are examples of cryptocurrencies?

Ethereum Bitcoin Litecoin

Which of the following would be included in a risk assessment executive summary that was prepared to help executives make informed decisions about security? More than one answer may be correct.

If a cyberattack were able to breach our security, the medical information and social security numbers of all of patients would be available. Because our organization has multiple government contracts, we need to worry about threats from other countries' governments who seek to gain sensitive information regarding the U.S. government. All employees are required to go through biannual cybersecurity training. Additional training is required when new threats that could affect our organization become known.

Why might a government choose to get involved in state-sponsored cyberwarfare? More than one answer may be correct.

It is relatively inexpensive compared to traditional warfare.It is relatively inexpensive compared to traditional warfare. It is often difficult to trace and identify.It is often difficult to trace and identify. It can cause widespread damage to IT infrastructure.

Which of the following statements are true about the Brain-Computer Interface?

It uses optical imaging to scan your brain one hundred times per second to detect how you are speaking silently in your head. Brain-Computer Interface is a project being developed by Google Labs.Brain-Computer Interface is a project being developed by Google Labs. The goal is for the system to allow humans to type even faster than with their physical hands. It allows for the user to communicate with a computer using only thoughts.

Which two of the following statements describe key benefits of an integrated computer-assisted design (CAD) module within an ERP system?

Managers can track processes that use computer-assisted design throughout an entire manufacturing cycle. Managers can monitor the use of materials, machines and labor, and level of completion within CAD processes. Managers can follow transaction-based business processes throughout the organization's entire network. Managers can monitor all critical relationships that have been developed with both customers and suppliers.

Plans to put a 4G network on the moon were announced by Nokia and

NASA.

________ was launched in 2014 by Skype co-founders, Ahti Heinla and Janus Friis. The company's vision is to revolutionize food and package deliveries across the globe. Starship robots can carry items within a 4-mile radius.

Starship

What is the only way to guarantee that computers and networks are safe from cyberattacks?

Take them offline.

Sally runs a shop on Etsy that has become quite popular after one of her Instagram posts went viral. She'd like to capitalize on her viral fame and is considering purchasing CRM software to assist with this. What are some of the ways a CRM would help Sally achieve this goal? More than when answer may be correct.

The CRM could target new customers that have a similar profile to her existing customers. The CRM could inform her existing customers of additional, similar products available in her shop. The CRM can assist in manufacturing her products as demand increases.

nanorobots

These machines are not meant to stay in the patient forever and must be able to make their way out of the host.

As reported by Andrei Ene, one of the worst malware attacks in the last 10 years is the TBT, or

Tiny Banker Trojan.

Explain how trojans are designed and used. More than one answer may be correct.

Trojans are commonly used by hackers to gain access to systems and devices. Trojans are designed using some sort of social engineering tactic. Hackers use trojans to create a backdoor that bypasses security.

The ________ Hyperloop, created by Richard Branson, recently completed the world's first hyperloop ride with passengers on board.

Virgin

Software that uses artificial intelligence to analyze millions of clinical and imaging records to create high-performance algorithms that automatically detect conditions is being developed by

Zebra Med

In a denial-of-service (DoS) attack

a hacker gains unauthorized access and control of a network of computers. It spreads software that infects each computer and turns it into a zombie, or bot. When activated, zombie computers flood a targeted IP address with requests.

A keystroke logger in the form of hardware is

a physical device, such as a USB device, that records keyboard actions. We might not notice such an external device on public computers; whereas, we'd certainly notice such a device on a home computer. Therefore, it's more likely that we'd be subjected to a hardware keystroke logger in a public place.

Over the recent elections in the United States, the use of data mining has become

a valuable tool for political candidates.

Trojans give hackers the ability to

access the victim's system, which allows them to spy on computer activities and steal, delete, block, modify, and copy sensitive data. Trojans can also be used to interrupt network communication and to negatively affect computer performance.

Risk assessment executive summaries

are designed to inform decision makers at an organization about how their organization would manage, control, and mitigate cyber risk across the organization.

White-hat hackers

are nonmalicious computer security experts who test the security measures of an organization's information systems to ensure that the organization is protected against malicious intrusions.

Allowing people to share a digital ledger across a network of computers, ________ uses computer code to create concatenated (linked together) blocks of transactions.

blockchain

A UEBA is designed to

create a map of normal behavior and report any activity that is not considered normal for that organization. Given that people often don't login to work while on vacation or may be allowed to login remotely, these behaviors would not trigger a UEBA to flag behavior for review.

Bitcoin, Ethereum, and LiteCoin all use blockchain algorithms to control quantity and verify the validity of transactions. They are referred to as

cryptocurrency.

Governments may develop cyberwarfare plans because

cyberwarfare is a cost-effective means of causing major damage to critical IT infrastructure, as well as difficult to detect and track back to the government or entity that initiated it.

Because of the significant information it can reveal about the electorate, ________ mining has become increasingly important to campaign managers.

data

Different types of cyberattacks include

denial-of-service (DoS) attacks, distributed denial-of service (DDoS) attacks, and information theft.

A company can ethically share your user data with third parties as long as they

disclose it to you in some way—generally within the terms of service agreement.

Which type of ERP module collects data such as customer information, order history, shipping information, and customer satisfactions measures?

e-commerce operations

Customer interaction encompasses all communication between a customer and an organization. A customer relationship management system (CRM) captures interactions from which three of the following sources?

emailemail social mediasocial media traditional mail

Which of the following represents a type of HR management system? More than one answer may be correct.

employee benefits administration softwareemployee benefits administration software employee evaluation softwareemployee evaluation software compensation management softwarecompensation management software customer relationship management software

Major corporations mainly use employee compensation software that is included in an

enterprise planning resource (ERP) suite.

Gartner IT Services company predicts that by 2021, customer relationship management systems will be the single largest revenue area of spending in

enterprise software.

The value that the future lifetime revenue an organization's customers will generate minus customer acquisition costs and customer retention costs is called customer

equity.

The five steps of business process management (BPM) in order are:

examining the design of the process, modeling the process, running the process, monitoring the process, and initiating process improvements.

Who has not suffered the embarrassment of a misplaced debit card? Some companies allow consumers in China to make purchases without cards or cash. The system uses

facial recognition.

In the second step in business process management, analysts use flowcharts and other tools to depict the workflow, the sequence of operations, and the decision points. This is called the process monitoring step.

false

Major corporations often manage their employee compensation plans through web-based services.

false

Normally in a company's overall compensation strategy, employee salary is more important than employee benefits.

false Along with pay, employee benefits make up a critical part of an overall compensation strategy.

Trojans are often used by hackers to

gain unauthorized access to networks and digital devices. Social engineering tactics are often used to get trojans inside a digital device. Hackers use trojans to create a backdoor into a user's system which allows them to spy on the computer's activities.

More antennae sending out weaker signals will lead to

greater speeds.

Nokia and NASA

have plans to put a 4G network on the moon.

Which of the following statements are true about Nanorobots?

have the capacity to carry medication or miniature tools are intended to stay in the patient forever used to constantly monitor our bodies for maladies and other symptoms can build and manipulate things precisely where components are at a scale of a nanometer

CRM software is used to identify and attract potential customers and maintain engagement among existing customers. It cannot

help her with manufacturing or determining what social media posts will go viral.

While ERP systems offer many competitive advantages to users, particularly those in upper management, a significant disadvantage is their

high costs

CRM software helps businesses

identify which leads are MQL and which are SQL so that the businesses can properly engage both groups and turn them into customers.

A new app was released providing consumers with digital coupons for products the consumer indicates they frequently purchase. The app gives different users coupons with different values and shares purchasing as well as demographic information with the product manufacturer. Under what circumstances would the information sharing with product manufacturers be ethical?

if the app's terms of service indicated who they would be sharing information with and what information would be shared

The popular prospecting tools

include Zoominfo, LinkedIn Sales Navigator, Clearbit Prospector.

Qualitative data

includes categories for attitude, opinion, and motivation to purchase.

The proliferation of e-commerce-based organizations today has

increased the need for more robust transaction management processing systems and encouraged their integration into ERP systems.

CRM systems provide users with

information that helps them identify good prospective customers and create customized sales funnels.

A benefit of integrating project management software into enterprise resource planning software is that it

integrates all of the project data in a central location. This allows for better communication, including visual maps and the reduced need for individual status reports.

Recruiting and hiring management software can help HR managers evaluate how their organization's future staffing needs are influenced by

internal factors such as employee turnover and external factors such as public demand for the organization's products.

A trojan, sometimes called a Trojan horse

is a program that appears legitimate but executes an unwanted activity when activated. Trojans often accompany music and app downloads.

BCI

is a project currently being worked on by Facebook's AR/VR labs (formerly known as Building 8).

Airbus

is actively working on a zero-emission aircraft that could revolutionize the airline industry.

Facial recognition

is being used for a variety of applications, including to support debit and credit card transactions.

Differential privacy

is being used to make census and other types of governmental data secure.

Spear phishing

is email attacks that are targeted to specific people or companies and designed to steal data and possibly install malicious software on a user's device.

Ransomware

is malware that makes a computers data inaccessible until a ransom is paid

The CFO

is more likely to have accurate cash flow information with this type of ERP system because she/he can quickly generate a single cash flow report for the entire organization, using real-time data from across its operational areas, at any time.

Zebra-Med

is on the leading edge of using AI to assist in patient diagnoses.

Akara

is one of the leaders in the development of artificially intelligent healthcare helpers.

Blockchain

is the technological basis for cryptocurrency such as Bitcoin.

Customer equity

is the value that the future lifetime revenue an organization's customers will generate minus customer acquisition costs and customer retention costs.

Malware developers make money by either

launching the malware on their own or by selling it on the Dark Web, to those who want to conduct cyberextortion, cyberterrorism, cyberstalking, or protest.

Users often find it difficult to implement or even comprehend a new ERP system without significant training because of ERPs' steep

learning curves

Where would you expect to encounter a hardware keystroke logger? More than one answer may be correct.

library computer school computer work computer

Under development at MIT, photonic crystals allow solar panels to be twice as efficient by absorbing and converting the sun's

light

The Imaging Analytics Engine developed by Zebra-Med can be used to uncover which of the following conditions that may be present in CT scans?

liver disease lung conditions

Cost benefits of using cloud-based ERP systems as compared to on-premise systems include:

lower IT infrastructure expenses; lower maintenance costs; and reduced expenses for IT personnel due to the IT support services provided by cloud-based ERP vendors.

With a CAD module in an ERP, managers can track processes that use computer-assisted design throughout the entire manufacturing cycle. They can also

monitor the use of materials, machines and labor, and level of completion.

The U.S. Census Bureau is using differential ________ to make census data secure and private.

privacy

Because they remain hot, solar panels would continue to

produce electricity after sunset.

What aspect of today's business environment is central to the need for robust transaction management processing systems?

proliferation of e-commerce-based organizations

Select two technologies that have advanced the efficiency of inventory management systems.

radio frequency identification (RFID)radio frequency identification (RFID) universal product codes (UPC)universal product codes (UPC) magnetic resonance imaging (MRI)magnetic resonance imaging (MRI) reduced vertical separation minima (RVSM)

One version of this type of malware encrypts a victim's data until a payment is made. Another version threatens to make public a 'victim's personal data unless a payment is made. This type of malware is called

ransomware

Andrei Ene

reported that the Tiny Banker Trojan (TBT) is one of the worst trojan malware attacks in the last 10 years, infecting at least 24 major U.S. banks.

The Virgin Hyperloop could

revolutionize travel.

Otto and other companies hope to have _______ on interstate highways within 5 years!

self-driving trucks

Pulsed laser technology called LIDAR to detect and monitor the environment is an integral part of

self-driving trucks.

The two main types of cybercrimes are

single-event attacks and ongoing series of events attacks.

Currently, apps that run on the Cloud are ________ as compared to apps that run on local machines. Edge computing is a method of optimizing cloud computing systems by performing data processing at the edge of the network, near the source of the data and it is possible that cloud computing may take a back seat to edge computing.

slower

This is not a practical solution, but cyberattacks are

staged from the Internet and cannot occur if the computer or network is inaccessible.

A denial-of-service (DoS) attack

takes place when a hacker gains unauthorized access and control of a network of computers that are connected to the Internet.

Organizations can use accounting systems and software to track

tangible assets (such as land, equipment, and inventory) and intangible assets (such as good will, brand equity, intellectual property, patents, and trademarks).

Of the following benefits, which two can managers access through an integrated HRM software module included in an ERP system?

the ability to retrieve and analyze human resources data in a centralized location the ability to retrieve and analyze human resources data in a centralized location a presentation that supports decision making through the efficient use of employee dataa presentation that supports decision making through the efficient use of employee data a function that processes computer-assisted design records in real timea function that processes computer-assisted design records in real time the ability to create, store, and report financial transactions accurately

The costs associated with ongoing maintenance need to be considered when employing an ERP. Maintenance costs include

the time and personnel required to do software training, additional IT personnel, and consultants.

First in the process of infection,

the virus is delivered to the digital device via email attachment or a file download. The virus can also be delivered through an infected website. Next, an action such as running or opening a file on the device activates the virus.

What distinguishes the two main types of cybercrimes?

their frequency (how often they are committed)

Why do computer hackers use trojans to invade devices? More than one answer may be correct.

to spy on the victim's computer activities to steal the victim's confidential data to interrupt network connections

A program that appears to be legitimate but executes an unwanted activity when activated is called a

trojan

Machines were not used to assist in employee management until the late 1800s, when businesses began tracking employee work hours with time clocks and punch cards.

true

The Imaging Analytics Engine developed by Zebra-Med can be used to

uncover liver disease and lung conditions.

CRM systems are

useful in the identification of an organization's target market, the common characteristics of diverse target markets and their members, and the definition and analysis of key customer characteristics for target marketing.

From the following list, select the common types of malware used today.

viruses, worms, and trojans.

5G cellular technology offers the promise of download speeds as high as 20 Gbps. This will likely require more antenna arrays with each antenna sending out ________ microwave signals.

weaker

Which computer experts help an organization ensure that its information system is protected against intrusions by testing the system's security measures?

white-hat hackers


Set pelajaran terkait

Business 1305: Module 4 Computer Concepts Skills Training

View Set

Physics Final Part II (Second Semester)

View Set

punctuation- comma splice and comma use!

View Set

Ch.10 Lesson 3 Nonmetals and Metalloids

View Set

The Exploration and Settlement of Colonial America

View Set