Leveraging IS in Business Practice Exam 2
All the following are intangible assets of a firm except its A. brand B. reputation C. information technology D. knowledge
C
Which of the following is not a step required in business process management? A. Monitoring B. Modeling C. Acquisition D. Optimization
C
__________ is a type of security threat that exploits IoT devices. A. Denial-of-service attack B. Denial-of-sleep attack C. Man-in-the-middle attack D. Social engineering
C
eBay is an example of: A. B2C e-commerce B. B2B e-commerce C. C2C e-commerce D. C2B e-commerce
C
Distribution and delivery of products to retailers is part of the: A. downstream portion of the supply chain B. upstream portion of the supply chain C. supplier's internal supply chain D. customer relationship management
A
Which of the following would produce issues related to data bias? A. Randomly selecting participants from your list of friends on Facebook B. A study conducted in China containing mostly Chinese participants. C. Excluding men from a study aimed to evaluate morning sickness during pregnancy. D. Randomly selecting active Facebook users about their social networking habits.
A
________ is malware that hijacks a user's computer and demands payment in return for giving back access A. Ransomware B. Spyware C. A virus D. A Trojan horse
A
Bounded rationality is where individuals are limited by the information they have. T or F
T
In machine learning, semantic analysis seeks to mimic human ability and understand the meaning of text. T or F
T
The biggest threat to your informational assets are employees within the organization. T or F
T
Blockchain's consensus mechanism for verifying available funds when purchasing products impacts which phase of the customer service life cycle? A. Ownership B. Acquisition C. Ordering D. Security
B
Neural Networks are a subdivision of artificial intelligence related to __________. A. Natural Language Processing B. Machine Learning C. Expert Systems D. Autonomous Systems
B
What course of action should be taken when there is a high probability of an attack but low impact. A. Prevent B. Contain and control C. Ignore D. Insurance
B
When did e-commerce begin? A. 1969 B. 1995 C. 1998 D. 2000
B
Which development methodology consists of building an experimental system rapidly with users actively involved? A. Systems analysis and design B. Prototyping C. DevOps D. Waterfall Method
B
Which of the following provides a suite of integrated software modules for finance and accounting, human resources, manufacturing and production, and sales and marketing that allows data to be used by multiple functions and business processes? A. CRM software B. ERP systems C. Supply chain management systems D. Decision Support Systems
B
In a parallel conversion strategy, the new system: A. is slowly converted from the old system. B. is introduced only to a limited area first. C. replaces the old one on an appointed day. D. and the old are run together for a time.
D
In eCommerce, which of the following is not an example of digital products? A. photography B. fonts C. music D. broadcast tv
D
Blockchain exchanges used to trade cryptocurrencies are unhackable. T or F
F
The Prototyping development methodology is focused on continuous delivery with highquality. T or F
F