Connect: CH2, Connect Ch:3, BPI02, CH:4, CH: 5, BPI06, BPI07, CIS CH:6, CIS CH:7, CIS: CH 8

Ace your homework & exams now with Quizwiz!

Rule ______ is the part of the U.S. Federal Rules of Criminal Procedure that covers the search and seizure of physical and digital evidence.

41

Who is a business analytics specialist who uses visual tools to help people understand complex data?

A data artist

Lead Account Contact Sales opportunity

A person or company that is unknown to your business. ----- An existing business relationship exists and can include customers, prospects, partners, and competitors. ----- Specific individual representing the account. ----- An opportunity exists for a potential sale of goods or services related to an account or contact.

Elevation of privilege Hoaxes Malicious code Packet tampering Sniffer Spoofing Splogs Spyware

A process by which a user misleads a system into granting unauthorized rights, usually for the purpose of compromising or destroying the system. ----- Attack computer systems by transmitting a virus hoax, with a real virus attached. ----- Includes a variety of threats such as viruses, worms, and Trojan horses. ----- Consists of altering the contents of packets as they travel over the Internet or altering data on computer disks after penetrating a network. ----- A program or device that can monitor data traveling over a network. ----- The forging of the return address on an email so that the message appears to come from someone other than the actual sender. ----- Fake blogs created solely to raise the search engine rank of affiliated websites. ----- Software that comes hidden in free downloadable software and tracks online movements.

Key logger Cookie Adware Spyware Clickstream

A program that records every keystroke and mouse click. ----- A small file deposited on a hard drive by a website containing information about customers and their web activities. ----- Software that generates ads that install themselves on a computer when a person downloads some other program from the Internet. ----- Software that comes hidden in free downloadable software and tracks online movements. ----- Records information about a customer during a web surfing session such as what websites were visited.

______ use policy requires a user to agree to follow it to be provided access to corporate email, information systems, and the Internet.

ACCEPTABLE

BPMN ______ is a task in a business process.

ACTIVITY

The National Institute of Standards and Technology (NIST) introduced an ________________ designed tokeep government information secure.

AES

______ policy simply states that email users will not send unsolicited emails.

ANTI-SPAM

Select three common website metrics.

Abandoned shopping carts Page exposures Unique visitors

Inbound logistics ------ Operations ------ Outbound logistics ----- Marketing and sales ----- Service

Acquires raw materials and resources and distributes to manufacturing as required. ----- Transforms raw materials or inputs into goods and services. ----- Distributes goods and services to customers. ----- Promotes, prices, and sells products to customers. ----- Provides customer support after the sale of goods and services

What is software that, while purporting to serve some useful function and often fulfilling that function, also allows Internet advertisers to display advertisements without the consent of the computer user?

Adware

Common data repository Module software design

Allows every department of a company to store and retrieve information in real-time allowing information to be more reliable and accessible. ----- Divides the system into a set of functional units (named modules) that can be used independently or combined with other modules for increased business flexibility.

Select two items typically contained in an employee monitoring policy.

Always enforce the policy the same for everyone. State the consequences of violating the policy.

______ paralysis occurs when the user goes into an emotional state of over-analysis (or over-thinking) a situation so that a decision or action is never taken, in effect paralyzing the outcome.

Analysis

What occurs when the user goes into an emotional state of over-analysis (or over-thinking) a situation so that a decision or action is never taken, in effect paralyzing the outcome?

Analysis paralysis

______ data encompasses all organizational data, and its primary purpose is to support the performance of managerial analysis or semistructured decisions.

Analytical

______ process models represent the current state of the operation that has been mapped, without any specific improvements or changes to existing processes.

As-Is

What is the practice of artificially stimulating online conversation and positive reviews about a product, service or brand?

Astroturfing

3 goals or objectives that a leadership plan might include to achieve a solid business strategy.

Attracting new customers Decreasing costs Increasing sales

Select the three terms for the data elements associated with an entity.

Attributes Fields Columns

What is the process of providing a user with permission including access levels and abilities such as file access, hours of access, and amount of allocated storage space?

Authorization

What is the process of computerizing manual tasks, making them more efficient and effective, and dramatically lowering operational costs?

Automation

______ is the process of computerizing manual tasks, making them more efficient and effective, and dramatically lowering operational costs.

Automation

What is the identification of a user based on a physical characteristic, such as a fingerprint, iris, face, voice, or handwriting?

BIOMETRICS

A mail ______ sends a massive amount of email to a specific person or system that can cause that user's server to stop functioning.

BOMB

What in BPMN notation is a task in a business process?

BPMN activity

In BPMN what represents anything that happens during the course of a business process?

BPMN event

A(n) ______ process model is a graphic description of a process, showing the sequence of process tasks, which is developed for a specific purpose and from a selected viewpoint.

BUSINESS

What is a management system, as well as a measurement system, that a firm uses to translate business strategies into executable tasks?

Balanced scorecard

What is a process of continuously measuring system results, comparing those results to optimal system?

Benchmarking

______ is a process of continuously measuring system results, comparing those results to optimal system.

Benchmarking

Regardless of what process is measured, how it is measured, and whether it is performed for the sake of efficiency or effectiveness, managers must set ______, or baseline values the system seeks to attain.

Benchmarks

What are baseline values the system seeks to attain?

Benchmarks

What are the most successful solutions or problem solving methods that have been developed by a specific organization or industry?

Best practices

______ is a type of digital currency in which a record of transactions is maintained and new units of currency are generated by the computational solution of mathematical problems and which operates independently of a central bank.

Bitcoin

What is a type of distribution ledger, consisting of blocks of data that maintain a permanent and tamper-proof record of transactional data?

Blockchain

What is a data structure containing a hash, previous hash, and data?

Blocks

______ occurs when resources reach full capacity and cannot handle any additional demands they limit throughput and impede operations.

Bottlenecks

Which policy allows employees to use their personal mobile devices and computers to access enterprise data and applications?

Bring your own device policy

______ -facing processes are invisible to the external customer but essential to the effective management of the business.

Business

______ process modeling is the activity of creating a detailed flowchart or process map of a work process that shows its inputs, tasks, and activities in a structured sequence.

Business

is a technology-driven process for analyzing data and delivering actionable information that helps executives, managers and workers make informed business decisions.

Business intelligence (BI)

What tracks corporate metrics such as critical success factors and key performance indicators and include advanced capabilities such as interactive controls allowing users to manipulate data for analysis?

Business intelligence dashboards

What attempts to understand and measure the current process and make performance improvements accordingly?

Business process improvement

What is a graphic description of a process, showing the sequence of process tasks, which is developed for a specific purpose and from a selected viewpoint?

Business process model

What is the activity of creating a detailed flowchart or process map of a work process that shows its inputs, tasks, and activities in a structured sequence?

Business process modeling

What is the analysis and redesign of workflow within and between enterprises?

Business process reengineering

What defines how a company performs certain aspects of its business and typically results in either a yes/no or true/false answer?

Business rule

What enforces business rules vital to an organization's success and often require more insight and knowledge than relational integrity constraints?

Business-critical integrity constraints

What are invisible to the external customer but essential to the effective management of the business?

Business-facing processes

_______ power is the ability of buyers to affect the price they must pay for an item.

Buyer

What is the ability of buyers to affect the price they must pay for an item?

Buyer power

What helps an organization segment their customers into categories such as best and worst customers?

CRM analysis technologies

What is a trusted third party, such as VeriSign, that validates user identities by means of digital certificates?

Certificate authority

Select the three things a supplier can do to take advantage in an industry if it has high supplier power.

Charging higher prices Limiting quality or services Shifting costs to industry participants

Who is responsible for overseeing all uses of MIS and ensuring that MIS strategically aligns with business goals and objectives? (Please use the acronym.)

Chief Information Officer

Who manages and defends intellectual property, copyrights, and patents?

Chief Intellectual Property Officer

Who is responsible for collecting, maintaining, and distributing company knowledge?

Chief Knowledge Officer

Who is responsible for ensuring the security of business systems and developing strategies and safeguards against attacks by hackers and viruses?

Chief Security Officer

______-fraud is the abuse of pay-per-click, pay-per-call, and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser.

Click

What can compare two or more data sets to identify patterns and trends?

Comparative analysis

______ click-fraud is a computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link.

Competitive

What occurs when a company keeps tabs of its competitor's activities on the web using software that automatically tracks all competitor website activities such as discounts and new products?

Competitive monitoring

What is the assurance that messages and information remain available only to those authorized to view them?

Confidentiality

What occurs when organizations use software that filters content, such as emails, to prevent the accidental or malicious transmission of unauthorized information?

Content filtering

Select three ways that companies duplicate competitive advantages.

Copy business operations Hire key employees Acquire new technology

______ software is software that is manufactured to look like the real thing and sold as such.

Counterfeit

Select the four functions that a database management system can perform on data in a database?

Create data Read data Update data Delete data

Which are critical success factors?

Create high-quality products Retain competitive advantages Reduce product costs

______ success factors are the crucial steps companies perform to achieve their goals and objectives and implement their strategies.

Critical

What are the crucial steps companies perform to achieve their goals and objectives and implement their strategies?

Critical success factors

What is the science that studies encryption, which is the hiding of messages so that only the sender and receiver can read them?

Cryptography

______ analytics involves gathering, classifying, comparing, and studying customer data to identify buying trends, at-risk customers, and potential future opportunities.

Customer

______-facing processes result in a product or service received by an organization's external customer.

Customer

What involves gathering, classifying, comparing, and studying customer data to identify buying trends, at-risk customers, and potential future opportunities?

Customer analytics

Select three common supply chain management metrics.

Customer order promised cycle time Inventory turnover Customer order actual cycle time

Which is used by Amazon for creating differentiation to reduce rivalry?

Customer profiling

Select the four primary strategic initiatives for competitive advantages.

Customer relationship management Supply chain management Business process reengineering Enterprise resource planning

What includes governments that are after some form of information about other governments?

Cyber-espionage

______ includes individuals who seek notoriety or want to make a social or political point such as WikiLeaks.

Cyber-vigilantes

______ includes threats, negative remarks, or defamatory comments transmitted via the Internet or posted on the website.

Cyberbullying

______ involves prevention, detection, and response to cyberattacks that can have wide-ranging effects on the individual, organizations, community, and at the national level.

Cybersecurity

What organization builds the national capacity to defend against cyberattacks and works with the federal government to provide cybersecurity tools, incident response services, and assessment capabilities to safeguard the ".gov" networks that support the essential operations of partner departments and agencies?

Cybersecurity and Infrastructure Security Agency

______ is the electronic defacing of an existing website.

Cybervandalism

______ is an organized attempt by a country's military to disrupt or destroy information and communication systems for another country.

Cyberwar

Which of the following are the three areas of information security?

DATA: prevention and resistance ATTACKS: detection and response PEOPLE: authentication and authorization

Data-driven _______ management is an approach to business governance that values decisions that can be backed up with verifiable data.

DECISION

What is a process that weeds out and fixes or discards inconsistent, incorrect, or incomplete information?

Data cleansing or scrubbing

What is the common term for the representation of multidimensional data?

Data cube

What compiles all of the metadata about the data elements in the data model?

Data dictionary

Select a term that is a synonym for data element, the smallest or basic unit of data in a database.

Data field

What occurs when a company examines its data to determine if it can meet business expectations, while identifying possible data gaps or where missing data might exist?

Data gap analysis

What refers to the extent of detail within the data?

Data granularity

What occurs when the same data element has different values?

Data inconsistency

What is a measure of the quality of data?

Data integrity

What is the time it takes for data to be stored or retrieved?

Data latency

What are logical data structures that detail the relationships among data elements using graphics or pictures?

Data models

What determines the accuracy and completeness of its data?

Data quality audit

Select the statement that accurately describes a situation in which there is too much data to properly understand or make use of it.

Data rich and information poor

Who is responsible for ensuring the policies and procedures are implemented across the organization and acts as a liaison between the MIS department and the business?

Data steward

What is the management and oversight of an organization's data assets to help provide business users with high-quality data that is easily accessible in a consistent manner?

Data stewardship

Select the four primary traits of the value of data.

Data type Data timeliness Data quality Data governance

What includes the tests and evaluations used to determine compliance with data governance polices to ensure correctness of data?

Data validation

What describes technologies that allow users to "see" or visualize data to transform information into a business perspective?

Data visualization

What maintains data about various types of objects (inventory), events (transactions), people (employees), and places (warehouses)?

Database

Select three items contained in a typical Internet use policy.

Describes the Internet services available to users. States the ramifications if the policy is violated. Describes user responsibility for citing sources.

______ agents are malicious agents designed by spammers and other Internet attackers to farm email addresses off websites or deposit spyware on machines.

Destructive

What are malicious agents designed by spammers and other Internet attackers to farm email addresses off websites or deposit spyware on machines?

Destructive agents

Select the four primary reasons low-quality data occurs in a system.

Different systems have different data entry standards and formats. Third-party and external data contains inconsistencies and errors. Data-entry personnel enter abbreviated data to save time. Online customers intentionally enter inaccurate data to protect their privacy.

________ rights management is a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution.

Digital

______ computing processes and manages algorithms across many machines in a computing environment.

Distributed

Processing and managing algorithms across many machines in a computing environment is known as ______

Distributed computing

_________-by hacking is a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network.

Drive

What is continuously changing and provides business solutions to ever-changing business operations?

Dynamic process

BPMN ______ is anything that happens during the course of a business process, including customer requests, time requests, and the end of the process.

EVENT

What refers to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry?

Ediscovery

Select the two terms that refer to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry.

Ediscovery Electronic discovery

______ MIS metrics measure the impact MIS has on business processes and activities, including customer satisfaction and customer conversion rates.

Effectiveness

Which metrics measure the impact MIS has on business processes and activities, including customer satisfaction and customer conversion rates?

Effectiveness MIS metrics

______ MIS metrics measure the performance of MIS itself, such as throughput, transaction speed, and system availability.

Efficiency

______ focuses on the extent to which a firm is using its resources in an optimal way, while effectiveness focuses on how well a firm is achieving its goals and objectives.

Efficiency MIS metrics

Which privacy policy details the extent to which email messages may be read by others?

Email privacy policy

Which policy stating explicitly how, when, and where the company monitors its employees?

Employee monitoring policy

What scrambles information into an alternative form that requires a key or password to decrypt?

Encryption

______ scrambles information into an alternative form that requires a key or password to decrypt.

Encryption

______ Resource Planning integrates all departments and functions throughout an organization into a single IT system (or integrated set of IT systems) so employees can make decisions by viewing enterprise wide information about all business operations.

Enterprise

What stores data about a person, place, thing, transaction, or event?

Entity

______ are policies and procedures that address information management along with the ethical use of computers and the Internet in the business environment.

Epolicies

Select the three reasons why organizations should develop written epolicies.

Establish organizational rules Establish employee guidelines Establish employee procedures

Which policy contains general principles to guide computer user behavior?

Ethical computer use policy

Select three epolicies.

Ethical computer use policy Social media policy Acceptable use policy

What are the two fundamental blocks on which organizations base their businesses?

Ethics and security

Select three purposes of a business process model.

Expose process detail gradually and in a controlled manner Focus attention on the process model interfaces Encourage conciseness and accuracy in describing the process model

______, transformation, and loading is a process that extracts information from internal and external databases, transforms it using a common set of enterprise definitions, and loads it into a data warehouse.

Extraction

A BPMN ____ display the path in which the process flows.

FLOWS

______ information practices is a general term for a set of standards governing the collection and use of personal data and addressing issues of privacy and accuracy.

Fair

What is a general term for a set of standards governing the collection and use of personal data and addressing issues of privacy and accuracy?

Fair information practices

True or false: There is only one force that Michael Porter identified as a potential profitability of a company.

False

What is hardware and/or software that guard a private network by analyzing incoming and outgoing information for the correct markings?

Firewall

Occurs when an organization can significantly impact its market share by being first to market with a competitive advantage.

First-mover advantage

Select the three generic business strategies Porter identified for entering a new market.

Focused strategy Broad cost leadership Broad differentiation

What is a primary key of one table that appears as an attribute in another table and acts to provide a logical relationship between the two tables?

Foreign key

Select three examples of analytical data.

Future growth projections Market projections Sales trends

What is the first block created in the blockchain?

Genesis block

A(n) ______ is a function that converts an input of letters and numbers into an encrypted output of a fixed length.

HASH

What is a function that converts an input of letters and numbers into an encrypted output of a fixed length?

Hash

Buyer power ----- Supplier power ----- Threat of substitute products or services ----- Threat of new entrants ----- Rivalry among existing competitors

High because customers have many airlines to choose from ----- High because there are limited plane and engine manufacturers to choose from ----- High because of alternatives, such as videoconferencing and virtual meetings ----- High because new airlines are continuously entering the market ----- High because of the existence of websites such as Travelocity.com that force competition based solely on price

When considering the interrelationships between efficiency and effectiveness where does a company ideally want to operate?

High efficiency, high effectiveness

What occurs when attackers grant themselves the same access levels they already have but assume the identity of another user?

Horizontal privilege escalation

A(n) ______ security plan details how an organization will implement the information security policies.

INFORMATION

Potential Internal Strengths ----- Potential Internal Weaknesses ------ Potential External Opportunities ----- Potential External Threats

Identify new or innovative services and special expertise or experience ----- Identify all key areas that require improvement ----- Identify new markets, additional customer groups, and innovative technologies ------ Identify new market entrants, substitute products, and adverse changes in regulations

What is a broad administrative area that deals with identifying individuals in a system (such as a country, a network, or an enterprise) and controlling their access to resources within that system by associating user rights and restrictions with the established identity?

Identity management

______ is the ability for a blockchain ledger to remain a permanent, indelible, and unalterable history of transactions.

Immutability

What simply means unchangeable?

Immutable

Select three primary value activities.

Inbound logistics Outbound logistics Marketing and sales

firm infrastructure ----- Human resource management ------ Technology development ------ Procurement

Includes the company format or departmental structures, environment, and systems. ----- Provides employee training, hiring, and compensation. ----- Applies MIS to processes to add value. ----- Purchases inputs such as raw materials, resources, equipment, and supplies.

Select two ways an effective and efficient supply chain management system impacts Porter's Five Forces.

Increase its supplier power Create entry barriers to reduce the threat of new entrants.

Data levels Data formats Data granularities

Individual, department, enterprise ----- Documents, presentations, spreadsheets, database ----- Detail, summary, aggregate

____________ ethics govern the ethical and moral issues arising from the development and use of information technologies, as well as the creation, collection, duplication, distribution, and processing of information itself.

Information

Which epolicy contains general principles regarding information privacy?

Information privacy policy

What is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity?

Information secrecy

What is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization?

Information security

What details how an organization will implement the information security policies?

Information security plan

Nonsensitive PII

Information transmitted without encryption and includes information collected from public records, phone books, corporate directives, and websites.

______ are legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident.

Insiders

What is intangible creative work that is embodied in physical form and includes copyrights, trademarks, and patents?

Intellectual property

What occurs when a government attempts to control Internet traffic, thus preventing some material from being viewed by a country's citizens?

Internet censorship

Which policy contains general principles to guide the proper use of the Internet?

Internet use policy

What features full-time monitoring tools that search for patterns in network traffic to identify intruders?

Intrusion detection software

Accurate Complete Consistent Timely Unique

Is there an incorrect value in the data? Is a value missing from the data? Is aggregate or summary data in agreement with detailed data? Is the data current with respect to business needs? Is each transaction and event represented only once in the data?

What is the primary difference between KPIs and CSFs?

KPIs are far more specific than CSFs

__________ performance indicators are the quantifiable metrics a company uses to evaluate progress toward critical success factors.

Key

What are the quantifiable metrics a company uses to evaluate progress toward critical success factors?

Key performance indicators

A data ______ is a storage repository that holds a vast amount of raw data in its original format until the business needs it.

LAKE

What focuses on how individual users logically access data to meet their own particular business needs?

Logical view of data

A data ______ contains a subset of data warehouse data.

MART

A social Blank______ policy outlines the corporate guidelines or principles governing employee online communications.

MEDIA

What sends a massive amount of email to a specific person or system that can cause that user's server to stop functioning?

Mail bomb

______ is software that is intended to damage or disable computers and computer systems.

Malware

______ business processes are semidynamic, semiroutine, monthly business processes such as resource allocation, sales strategy, or manufacturing process improvements.

Managerial

What are semidynamic, semiroutine, monthly business processes such as resource allocation, sales strategy, or manufacturing process improvements?

Managerial business processes

______ share is the proportion of the market that a firm captures.

Market

What is the proportion of the market that a firm captures?

Market share

______ data management is the practice of gathering data and ensuring that it is uniform, accurate, consistent, and complete, including such entities as customers, suppliers, products, sales, employees, and other critical entities that are commonly integrated across organizational system.

Master

______ provides details about data.

Metadata

________ are measurements that evaluate results to determine whether a project is meeting its goals.

Metrics

Which company is using a broad market and high cost strategy?

Neiman Marcus

What gathers an organization's computer network traffic patterns to identify unusual or suspicious operations?

Network behavior analysis

Select three items typically found in an acceptable use policy.

Not attempting to break the security of any computer network or user. Not performing any nonrepudiation. Not using the service as part of violating any law.

Select three common customer relationship management metrics.

Number of marketing campaigns Number of new customers Number of sales calls

Select the key performance indicators.

Number of new customers Number of product returns Average customer spending Turnover rates of employees Percentage of help desk calls answered in the first minute

Backdoor program Trojan-horse virus Polymorphic virus Denial-of-service attack

Opens a way into the network for future attacks. ----- Hides inside other software, usually as an attachment or a downloadable file. ----- Viruses and worms change their form as they propagate. ----- Floods a website with so many requests for service that it slows down or crashes the site.

What are static, routine, daily business processes such as stocking inventory, checking out customers, or daily opening and closing processes?

Operational business processes

Choose three reasons why operational systems are not appropriate for business analysis.

Operational systems are not integrated Information from other operational applications is not included Operational information is mainly current

Customer-facing processes Industry-specific facing processes Business-facing processes

Order processing, Customer service, Sales process, Customer billing, Order shipping ----- Banking—Loan processing, Insurance—Claims processing, Government—Grant allocation, Hotel—Reservation handling, Airline—Baggage handling ----- Strategic planning, Tactical planning, Budget forecasting, Training, Purchasing raw materials

______ is a technique to gain personal information for the purpose of identity theft, usually by means of fraudulent emails that look as though they came from legitimate businesses.

PHISHING

A data ______ is an individual item on a graph or a chart.

POINT

What is a form of social engineering in which one individual lies to obtain confidential data about another individual?

PRETEXTING

Sock ______ marketing is the use of a false identity to artificially stimulate demand for a product, brand, or service.

PUPPET

______ is a string of alphanumeric characters used to authenticate a user and provide access to a system.

Password

Which company is using a narrow market and low cost strategy?

Payless Shoes

What is any data that could potentially identify a specific individual?

Personally identifiable information

What reroutes requests for legitimate websites to false websites?

Pharming

What is a technique to gain personal information for the purpose of identity theft, usually by means of fraudulent emails that look as though they came from legitimate businesses?

Phishing

______ security is tangible protection such as alarms, guards, fireproof doors, fences, and vaults.

Physical

What is tangible protection such as alarms, guards, fireproof doors, fences, and vaults?

Physical security

What deals with the physical storage of data on a storage device?

Physical view of data

What is the unauthorized use, duplication, distribution, or sale of copyrighted software?

Pirated software

What analyzes the competitive forces within the environment in which a company operates to assess the potential for profitability in an industry?

Porter's Five Forces Model

What are generic business strategies that are neither organization nor industry specific and can be applied to any business, product, or service?

Porter's three generic strategies

Plan Source Make Deliver Return

Prepare to manage all resources required to meet demand ----- Build relationships with suppliers to procure raw materials ----- Manufacture products and create production schedules ----- Plan for transportation of goods to customers ----- Support customers and product returns

If buyer power is high, customers can force a company and its competitors to compete on ______, which typically drives prices down.

Price

What is a field that uniquely identifies a given record in a table?

Primary key

What acquires raw materials to manufacture, deliver, market, sell, and provide after-sales services?

Primary value activities

_______ is the right to be left alone when you want to be, to have control over your personal possessions, and not to be observed without your consent.

Privacy

What occurs when a company develops unique differences in its products or services with the intent to influence demand?

Product differentiation

What is a way to validate transactions and achieve a distributed consensus?

Proof-of-stake

What is a requirement to define an expensive computer calculation, also called mining, that needs to be performed in order to create a new group of trustless transactions (blocks) on the distributed ledger or blockchain?

Proof-of-work

What uses two keys: a public key that everyone can have and a private key for only the recipient?

Public key encryption

Which tool helps users graphically design the answer to a question against a database?

Query-by-example

What is a form of malicious software that infects your computer and asks for money?

Ransomware

What are the three components of the RFM formula?

Recency, frequency, and monetary value

Select the three accurate statements reflecting the business advantages of a relational database.

Reduced data redundancy Increased data integrity Increased data security

What occurs when a task or activity is unnecessarily repeated?

Redundancy

______ integrity constraints are rules that enforce basic and fundamental information-based constraints.

Relational

Which system allows users to create, read, update, and delete data in a relational database?

Relational database management system

Which of the following are rules that enforce basic and fundamental information-based constraints, such as not creating an order for a nonexistent customer?

Relational integrity constraints

Which of the following are part of the five basic supply chain activities? (Select five)

Return Make Deliver Source Plan

What indicates the earning power of a project?

Return on investment

Financial performance Damaged reputation Revenue Other expenses

Revenue recognition, cash flow, credit rating, stock price ----- Customers, suppliers, banks, business partners ----- Lost future revenue, billing losses, investment losses, lost productivity ----- Temporary employees, equipment rentals, overtime costs, travel expenses, legal obligations

What is high when competition is fierce in a market and low when competitors are more complacent?

Rivalry among existing competitors

What is the use of software with artificial intelligence and machine learning capabilities to handle high-volume, repeatable tasks that previously required a human to perform?

Robotic process automation

What is the management of information flows between and among activities in a supply chain to maximize total supply chain effectiveness and corporate profitability?

SCM

A data ______ is an organized collection of data.

SET

What is unsolicited email?

SPAM

Select the four common tools managers use to analyze competitive intelligence and develop competitive advantages.

SWOT Analysis Value Chain Analysis The Three Generic Strategies The Five Forces Model

______ analytics involves gathering, classifying, comparing, and studying company sales data to analyze product cycles, sales pipelines, and competitive intelligence.

Sales

What involves gathering, classifying, comparing, and studying company sales data to analyze product cycles, sales pipelines, and competitive intelligence?

Sales analytics

Transactional data Analytical data

Sales receipt, Airline ticket, Packing slip ----- Sales projections, Product statistics, Future growth and trends

What is designed to trick victims into giving up personal information to purchase or download useless and potentially dangerous software?

Scareware

What information is transmitted with encryption and when disclosed, results in a breach of an individual's privacy and can potentially cause the individual harm?

Sensitive PII

Select the factors used to assess buyer power.

Sensitivity to price Number of customers Size of orders Differences between competitors Availability of substitute products

What is a device about the size of a credit card, containing embedded technologies that can store information and small amounts of software to perform some limited processing?

Smart card

Select three categories of authentication and authorization.

Something the user has, such as a smart card or token. Something that is part of the user, such as a fingerprint or voice signature. Something the user knows, such as a user ID and password.

What identifies the primary location where data is collected?

Source data

______ phishing is a phishing expedition in which the emails are carefully designed to target a particular person or organization.

Spear

What is a special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission?

Spyware

What are dynamic, nonroutine, long-term business processes such as financial planning, expansion strategies, and stakeholder interactions?

Strategic business processes

______ improves business process efficiencies by simplifying or eliminating unnecessary steps.

Streamlining

What is the tool that consists of lines of code (in contrast to a graphical design) for answering questions against a database?

Structured query language

Select the pressures that Michael Porter identified as potential profitability of a company.

Substitute products can steal customers. Influential suppliers can drive down profits by charging higher prices for supplies. New market entrants can steal potential investment capital. Knowledgeable customers can force down prices by pitting rivals against each other Competition can steal customers

What is the suppliers' ability to influence the prices they charge for supplies (including materials, labor, and services)?

Supplier power

___________ chain management is the management of information flows between and among activities in a supply chain to maximize total supply chain effectiveness and corporate profitability.

Supply

What consists of all parties involved, directly or indirectly, in obtaining raw materials or a product?

Supply chain

What includes firm infrastructure, human resource management, technology development, and procurement?

Support value activities

What are costs that make customers reluctant to switch to another product or service?

Switching costs

______ is an act or object that poses a danger to assets.

THREAT

True or false: Infographics (information graphics) present the results of data analysis, displaying the patterns, relationships, and trends in a graphical format.

TRUE

Select two competitive advantage decisions a company can make after completing a value chain analysis.

Target low value-adding activities to increase their value Target high value-adding activities to further enhance their value

Select the support value activities.

Technology development Firm infrastructure Human resource management Procurement

______ is an antispamming approach where the receiving computer launches a return attack against the spammer, sending email messages back to the computer that originated the suspected spam.

Teergrubing

throughput transaction speed system availability information accuracy response time

The amount of information that can travel through a system at any point in time. ----- The amount of time a system takes to perform a transaction. ----- The number of hours a system is available for users. ----- The extent to which a system generates the correct results when executing the same transaction numerous times. ----- The time it takes to respond to user interactions such as a mouse click.

Information secrecy Information management Information property Information compliance Information governance

The category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity. ----- Examines the organizational resource of information and regulates its definitions, uses, value, and distribution, ensuring that it has the types of data/information required to function and grow effectively. ----- An ethical issue that focuses on who owns information about individuals and how information can be sold and exchanged. ----- The act of conforming, acquiescing, or yielding information. ----- A method or system of government for information management or control.

Select the factors not associated with the appraisal of supplier power in an industry.

The color of the product sold The size of the product sold

usability customer satisfaction conversion rates financial

The ease with which people perform transactions and/or find information. ----- Measured by satisfaction surveys, percentage of existing customers retained, and increases in revenue dollars per customer. ----- The number of customers an organization "touches" for the first time and persuades to purchase its products or services. ----- Such as return on investment (the earning power of an organization's assets), cost benefit analysis (the comparison of projected revenues and costs including development, maintenance, fixed, and variable), and break even analysis (the point at which constant revenues equal ongoing costs).

Internal rate of return (IRR) Return on investment (ROI) Payback method Break-even analysis

The rate at which the net present value of an investment equals zero. ----- Indicates the earning power of a project and is measured by dividing the benefits of a project by the investment. ----- Number of years to recoup the cost of an initiative based on projected annual net cash flow. ----- Determines the volume of business required to make a profit at the current prices charged for the products or services

What is high when it is easy for new competitors to enter a market and low when there are significant entry barriers to joining a market?

Threat of new entrants

What characteristic is high when there are many alternatives to a product or service and low when there are few alternatives from which to choose?

Threat of substitute products or services

Select the two characteristics that are high when there are many alternatives to a product or service and low when there are few alternatives from which to choose.

Threat of substitute services Threat of substitute products

What are the strategies for entering a new market including broad cost leadership, broad differentiation, and focused strategy?

Three generic business strategies

Which company is using a narrow market and high cost strategy?

Tiffany & Co.

______ process models show the results of applying change improvement opportunities to the current process model.

To-Be

What are small electronic devices that change user passwords automatically?

Tokens

______ data encompasses all raw facts contained within a single process and its purpose is to support daily operational tasks.

Transactional

Business-critical integrity constraints tend to mirror the very rules by which an organization achieves success.

True

True or false: Competitive advantages are typically temporary.

True

True or false: Continuously measuring MIS projects against benchmarks provides feedback so managers can control the system.

True

True or false: The chief data officer (CDO) is responsible for determining the types of information the enterprise will capture, retain, analyze, and share.

True

______ (one word) is a problem that occurs when someone registers purposely misspelled variations of well-known domain names.

Typosquatting

Select two accurate statements relating to an ethical computer use policy.

Users need to consent to following the rules Users need to be informed of the rules

What views a firm as a series of business processes that each add value to the product or service?

Value chain analysis

Why does a database offer increased information security?

Various security features of databases ensure that individuals have only certain types of access to certain types of information.

Which company is using a broad market and low cost strategy?

Walmart

What is the theft of a website's name that occurs when someone, posing as a site's administrator, changes the ownership of the domain name assigned to the website to another website owner?

Website name stealing

Reporting Predicting Analyzing

What are the current inventory levels? ----- Which products will the customers buy? ----- Why was revenue so high?

What is a crowdsourcing initiative that rewards individuals for discovering and reporting software bugs?

What is a crowdsourcing initiative that rewards individuals for discovering and reporting software bugs?

Reporting Predicting Analyzing

What is the total revenue by customer? Asking what happened ----- Which customers are at risk of leaving? Asking what will happen ------ Why was production so low? Asking why it happened

Select the statement below that accurately reflects a database.

While a database has only one physical view, it can easily support multiple logical views that provides for flexibility.

White-hat hacker Script kiddies Cyberterrorist Cracker

Work at the request of the system owners to find system vulnerabilities and plug the holes. ----- Find hacking code on the Internet and click-and-point their way into systems to cause damage or spread viruses. ----- Seek to cause harm to people or to destroy critical systems or information and use the Internet as a weapon of mass destruction. ----- Have criminal intent when hacking.

______ includes the tasks, activities, and responsibilities required to execute each step in a business process.

Workflow

What monitors processes to ensure tasks, activities, and responsibilities are executed as specified?

Workflow control systems

______ MIS monitoring tracks people's activities by such measures as number of keystrokes, error rate, and number of transactions processed.

Workplace

What tracks people's activities by such measures as number of keystrokes, error rate, and number of transactions processed?

Workplace MIS monitoring

What is a program that secretly takes over another computer for the purpose of launching attacks on other computers?

ZOMBIE

A competitive ___ is a feature of a product or service on which customers place a greater value than they do on similar offerings from competitors.

advantage

Data ______ is the collection of data from various sources for the purpose of data processing.

aggregation

The ___________ scorecard is a management system, as well as a measurement system, that a firm uses to translate business strategies into executable tasks.

balanced

Network ______ analysis gathers an organization's computer network traffic patterns to identify unusual or suspicious operations.

behavior

What is a type of digital currency in which a record of transactions is maintained and new units of currency are generated by the computational solution of mathematical problems and which operates independently of a central bank?

bitcoin

A blockchain is formed by linking ______, data structures containing a hash, previous hash, and data.

blocks

What is a type of malware that causes a collection of connected devices to be controlled by a hacker?

botnets

The problem of being data rich and information poor results from an inability to turn business data into

business intelligence

What is a leadership plan that achieves a specific set of goals or objectives?

business strategy

A supply ________ consists of all parties involved, directly or indirectly, in obtaining raw materials or a product.

chain

A value _____ analysis views a firm as a series of business processes that each add value to the product or service.

chain

Who determines if a person or business process can be replaced by a robot or software?

chief automation officer

The ________ Online Protection Act was passed to protect minors from accessing inappropriate material on the Internet.

child

BI can help managers with Blank______ monitoring where a company keeps tabs of its competitor's activities on the web using software that automatically tracks all competitor website activities such as discounts and new products.

competitive

Integrity ______ are rules that help ensure the quality of data.

constraits

Workflow ______ systems monitors processes to ensure tasks, activities, and responsibilities are executed as specified.

control

In business, supplier power is the ability suppliers have to ______

control the prices they charge customers.

What is the legal protection afforded an expression of an idea, such as a song, book, or video game?

copyright

What are business processes, such as manufacturing goods, selling products, and providing service, that make up the primary activities in a value chain?

core processes

______ are malicious attempts to access or damage a computer system.

cyberattacks

Business intelligence ______ track corporate metrics such as critical success factors and key performance indicators and include advanced capabilities such as interactive controls allowing users to manipulate data for analysis.

dashboards

What is the smallest or basic unit of data?

data element

What is an organized collection of data?

data set

What is an approach to business governance that values decisions that can be backed up with verifiable data?

data-driven decision management

A(n) ________ maintains data about various types of objects (inventory), events (transactions), people (employees), and places (warehouses).

database

What creates, reads, updates, and deletes data in a database while controlling access and security?

database management system

To ______ information is to decode it and is the opposite of encrypt.

decrypt

A data _____ compiles all of the metadata about the data elements in the data model.

dictionary

Product _____ occurs when a company develops unique differences in its products or services with the intent to influence demand.

differentiation

What is a data file that identifies individuals or organizations online and is comparable to a digital signature?

digital certificate

What is erroneous or flawed data?

dirty data

Proof-of-stake is a way to validate transactions and achieve a ______ consensus.

distributed

______ refers to a period of time when a system is unavailable.

downtime

Through social ______, hackers use their social skills to trick people into revealing access credentials or other valuable information.

engineering

A feature of a product or service that customers have come to expect and entering competitors must also offer is a(n)

entry barrier

A feature of a product or service that customers have come to expect and entering competitors must also offer is a(n) _____

entry barrier

A(n) ______ computer use policy contains general principles to guide computer user behavior.

ethical

An _______ hacker is a person who hacks into a computer system to find vulnerabilities to help a company test its security.

ethical

Phishing ______ is a masquerading attack that combines spam with spoofing.

expedition

Select the components in a SWOT analysis. (Select all that apply)

external threats internal weaknesses external opportunities internal strengths

True or false: There does not exist a relationship between KPI's and CSFs.

false

Content _____ occurs when organizations use software that filters content, such as emails, to prevent the accidental or malicious transmission of unauthorized information.

filtering

Broad strategies reach a large market segment, whereas _____ stategies target a niche or unique market.

focused

Broad strategies reach a large market segment, whereas ______ strategies target a niche or unique market.

focused

Customer-facing processes which includes fulfilling orders, communicating with customers, and sending out bills and marketing information, are also called ______-_______ processes.

front office

A data ______ analysis occurs when a company examines its data to determine if it can meet business expectations, while identifying possible data gaps or where missing data might exist.

gap

BPMN _____ is used to control the flow of a process.

gateway

Data ___________ refers to the overall management of the availability, usability, integrity, and security of company data.

governance

If buyer power is ______, customers can force a company and its competitors to compete on price, which typically drives prices down.

high

Rivalry among existing competitors is _____ when competition is fierce in a market and ______ when competitors are more complacent.

high; low

The threat of new entrants is ______ when it is easy for new competitors to enter a market and ______ when there are significant entry barriers to joining a market.

high; low

Data ___________ occurs when the same data element has different values.

inconsistency

Porter's Five Forces Model analyzes the competitive forces within the environment in which a company operates to assess the potential for profitability in a(n) _____

industry

Information _________ is a measure of the quality of information.

integrity

Competitive __________ is the process of gathering information about the competitive environment, including competitors' plans, activities, and products, to improve a company's ability to succeed.

intelligence

Return on _________ indicates the earning power of a project.

investment

The person responsible for collecting, maintaining, and distributing company knowledge is the chief __________ officer.

knowledge

A(n) ______ records classified and summarized transactional data.

ledger

______ view of information focuses on how individual users logically access information to meet their own particular business needs.

logical

Scareware is a type of _____ designed to trick victims into giving up personal information to purchase or download useless and potentially dangerous software.

malware

A data _______ is a technique for establishing a match, or balance, between the source data and the target data warehouse.

map

What is the practice of gathering data and ensuring that it is uniform, accurate, consistent, and complete, including such entities as customers, suppliers, products, sales, employees, and other critical entities that are commonly integrated across organizational system?

master data management

authentication requires more than two means of authentication such as what the user knows (password), what the user has (security token), and what the user is (biometric verification).

multifactor

A contractual stipulation which ensures that ebusiness participants do not deny their online actions is called a ______ clause.

nonrepudiation

Select all the factors used to appraise supplier power in an industry.

number of suppliers uniqueness of supplier services availability of substitute products

One primary goal of a database is to eliminate data redundancy by recording each piece of data in _____ place(s) in the database.

only one

What makes analytics part of a business process?

operationalized analytics

What is an exclusive right to make, use, and sell an invention and is granted by a government to the inventor?

patent

Select the three roles the chief intellectual property officer manages and defends.

patents intellectual property copyright

Organizations address security risks through two lines of defense; the first is ______ and the second is ______.

people, technology

The ______ view of data deals with the physical storage of data on a storage device.

physical

______ software is the unauthorized use, duplication, distribution, or sale of copyrighted software.

pirated

Best ______ are the most successful solutions or problem solving methods that have been developed by a specific organization or industry.

practices

CRM ______ technologies help organizations predict customer behavior, such as which customers are at risk of leaving.

predicting

A(n) ______ key is a field (or group of fields) that uniquely identifies a given record in a table.

primary

The person responsible for ensuring the ethical and legal use of information within a company is the chief ______ officer.

privacy

______ escalation is a network intrusion attack that takes advantage of programming errors or design flaws to grant the attacker elevated access to the network and its associated data and applications.

privilege

A(n ______ is a temporary activity a company undertakes to create a unique product, service, or result.

project

Intellectual ______ is intangible creative work that is embodied in physical form and includes copyrights, trademarks, and patents.

property

______ -by-example tool helps users graphically design the answer to a question against a database.

query

What is data that has not been processed for use?

raw data

What means immediate, up-to-date data?

real-time data

A(n) ________ is a collection of related data elements.

record

What is a collection of related data elements?

record

Data ______ is the duplication of data, or the storage of the same data in multiple places.

redundancy

Business process ______ is the analysis and redesign of workflow within and between enterprises.

reengineering

______ database management system allows users to create, read, update, and delete data in a relational database.

relational

______ database model stores data in the form of logically related two-dimensional tables.

relational

CRM ______ technologies help organizations identify their customers across other applications.

reporting

Information ________ is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization.

security

The person responsible for ensuring the security of business systems and developing strategies and safeguards against attacks by hackers and viruses is the chief _________ officer.

security

-factor authentication requires only a username and password.

single

The number of customers and their sensitivity to price and Blank______ of orders are factors used to assess buyer power.

size

MIS ________ gap is the difference between existing MIS workplace knowledge and the knowledge required to fulfill the business goals and strategies.

skills

What is the process of monitoring and responding to what is being said about a company, individual, product, or brand?

social media monitoring

The most common example of unintentional information reuse is the ______.

social security number

Companies can reduce buyer power with loyalty programs, which reward customers based on their _______.

spendings

A(n) ___________ is a person or group that has an interest or concern in an organization.

stakeholder

A(n) ____ process uses a systematic approach in an attempt to improve business effectiveness and efficiency continuously.

static

A data _______ is responsible for ensuring the policies and procedures are implemented across the organization and acts as a liaison between the MIS department and the business.

steward

Data __________ is the management and oversight of an organization's data assets to help provide business users with high-quality data that is easily accessible in a consistent manner.

stewardship

A(n) __________ query language asks users to write lines of code to answer questions against a database.

structured

A(n) _____ chain consists of all parties involved, directly or indirectly, in obtaining raw materials or a product.

supply

______ officer will oversee the corporation's "environmental" programs, such as helping adapt to climate change and reducing carbon emissions.

sustainability

Real-time __________ provide real-time information in response to requests.

systems

The person responsible for ensuring the speed, accuracy, availability, and reliability of the MIS is the Chief _______ Officer.

technology

Porter's Blank______ strategies are generic business strategies that are neither organization nor industry specific and can be applied to any business, product, or service.

three generic

Digital ______ is the measure of consumer, partner, and employee confidence in an organization's ability to protect and secure data and the privacy of individuals.

trust

Chief ______ experience officer will create the optimal relationship between user and technology.

user

Data _______ includes the tests and evaluations used to determine compliance with data governance polices to ensure correctness of data.

validation

What occurs when attackers grant themselves a higher access level such as administrator, allowing the attacker to perform illegal actions such as running unauthorized code or deleting data?

vertical privilege escalation

What is a phone scam that attempts to defraud people by asking them to call a bogus telephone number to "confirm" their account information?

vishing

Data ______ describes technologies that allow users to "see" or visualize data to transform information into a business perspective.

visualization

Data ______ tools move beyond Excel graphs and charts into sophisticated analysis techniques such as pie charts, controls, instruments, maps, time-series graphs, and more.

visualization

What is another name for a bug bounty program?

vulnerability rewards program

A data ______ is a logical collection of data, gathered from many different operational databases, that supports business analysis activities and decision-making tasks.

warehouse

What spreads itself not only from file to file but also from computer to computer?

worm


Related study sets

PassPoint: Pharmacology and Medication Management

View Set

Cost Accounting Exam #1 MC (Conceptual)

View Set

Intro to Marketing Exam 1 (University of Iowa, Nancy Abrams)

View Set

NASM Chapter 20: Developing a Successful Personal Training Business

View Set