BADM 7050
A hacker uses a network of compromised devices to attack your corporate network. What type of attack is this?
Distributed Denial of Service
When a firm describes how they will distribute their products, what aspect of the business model canvas captures this idea?
Distribution channel
Business process design has historical origins in:
Division of labor paradigm
Software and sometimes hardware-based filter prevent or allow outside traffic from
Firewall
In the digital revolution...
Firms nurtured the agility and nimbleness of networks
You work for a company that has decided to collaborate together on the new product development. What type of role is IT playing in the supply chain?
Planning and control supply chain integration
Safeguards to ensure delivery of critical infrastructure services
Protect
As you analyze the risks to your network, you decide that you will use a control to remove or reduce an impact of a threat. What type of approach are you using?
Risk mitigation
With regards to evaluation, outcome controls are predominant. Focus is on performing well on algorithmically-derived goals and subjective customer ratings
Algorithmic approach
An exabyte is
10^18 bytes
When was Era I of information usage in organizations?
1960s
When was Era V of information usage in organizations?
2000s
They break in for their own gain or to wreak havoc on a firm
Black hat hackers
This is a plan articulating where a business seeks to go and how it expects to get there
Business strategy
You need to find information about a customer. What type of IT system would you look to in order to find this information?
CRM (Customer Relationship Management)
The individual at the helm of the analytics activities of an organization
Chief analytics officer
Which of the following is NOT a critical success factor for a BPM project?
Create your own customized process management approach
You are in charge of data management inside of your company and you need to define who is responsible for accuracy, accessibility, consistency, and completeness of data. What aspect of data and information management is this?
Data governance
The process of analyzing data warehouses and other sources for "gems" that can be used in management decision making
Data mining
You work for a grocery store chain and your boss asks you to use some software to look for products that your consumers are purchasing and you find that they are purchasing diapers and beer together between 4 and 6 PM everyday. What approach did you use to discover this relationship?
Data mining
You want to ensure that your data is clean and non-tainted. What aspect of data and information management is this?
Data quality management
This is a collection of data designed to support management decision making
Data warehouses
The technology and business capability to pave the way for developing and implementing digital innovations
Digital service platform
The structure set up to ensure coordination among all units within the organization; reflects allocation of decision rights
Formal reporting relationships
The characteristics of this organizational structure are division of labor, specialization, span of control, unity of command, and formalization
Hierarchical
Who makes decisions regarding security policy?
IT and business leaders
With the increasing availability of networks, web tools, social media, videoconferencing, apps, mobile devices, cloud-based computing, and the Internet, in general, managers can now design work for employees who come to the office or who work remotely
Where will the work be performed?
Security policies provide guidelines for the organization's activities, both technical and organizational, to increase cyber resiliance
Information security policy
Identifying customer demographics such as age, gender, location, and other trends to foster closer relationships with the community
Learning who is in the community
Answers "How should we respond?" by automatically linking analytics with other systems, creating continuous updates from business intelligence tools that automatically are understood by operational tools and trigger events as needed
Level 5: Prescriptive
Which of the following is not a detriment to remote work?
Need to live close to office
These include such physical manifestations as type of dress, symbols in art, acronyms, awards, myths and stories told about the group
Observable Artifacts
Which revenue model is the following: Customers make purchases
Selling products or services
The capacity allows a firm to see signs of the change in their environment and ferret out opportunities
Sensing
You are consulting with a company that has stopped acquiring new customers and their growth has plateaud. What phenomenon are you observing?
Strategic inflection point
The level of the organization responsible for providing the organization with overall direction and guidance is:
Strategic level
SAS describes four types of machine learning.
Supervised, semi-supervised, unsupervised, & reinforcement learning
System sends a warning when it detects unusual activity in the logs such as multiple failed login attempts or large files being transferred out
System alerts
These data sources have information embedded in them, but work needs to be done to extract the useful information
Unstructured data
Sometimes the work can be automated, or even performed by a robot or artificially intelligent system
Who is going to do the work?
