Info 360 final

Ace your homework & exams now with Quizwiz!

Recently, TechJury compiled a list of cybersecurity statistics that show the impact of different malware and network attacks. What percentage of cyberattacks are aimed at small businesses?

43%

Which of the following is an example of an organization using knowledge gained from social media to make better strategic decisions.

An organization analyzes engagement with different sponsored posts to determine which ones generate the most engagement with their target audience.

Someone who possesses the knowledge of processing software, business strategy, and analytical skill to deliver data and reports that guide management and executives as they create well-informed decision making is known as a data

Analyst

Which stage of the project management process involves documenting the lessons learned during the project's execution?

Closure Stage

Forms are created using _____ software

DBMS

The acronym for Data Governance is

DG

what is gathering, storing, and searching relevant data known as?

Data Science

The Act that is important in specifically protecting email and VoIP communications is the

Electronic Communications Privacy Act.

What is the main benefit of having a social media information system (SMIS) that gathers and analyzes a company's social media data?

If the data show that a social media campaign is not attracting the desired attention or level of engagement, the company can change its campaign strategies.

A company wants to begin monitoring the Internet usage of its office employees to ensure that their working hours are spent productively. What is the least that the company should do to respect its employees' rights to information privacy?

Inform employees of the monitoring and obtain their consent.

How does a firewall work?

It determines what Internet traffic can leave or enter a network or computer.

What is the purpose of the Twitter report card?

It highlights high-performing tweets. Correct. Influencers are introduced to their target audience through the Twitter report card.

Which statement accurately describes the need to keep sensitive data, information, and systems confidential?

It is both a major goal and a requirement for cybersecurity.

What occurs during the process optimization step of business process management?

Managers adapt (modify) the process to enhance process performance.

Who is quoted "Do what you do best and outsource the rest"?

Peter Drucker

Which phase of the project management process involves feasibility studies?

Phase 1: initiation phase

Professor Michael E. Porter published "How Competitive Forces Shape Strategy" in the Harvard Business Review. In this paper, he described how all organizations must develop plans to deal with certain factors if they wish to succeed, or even continue to exist. These became known as

Porter's 5 Forces.

SQL usually pronounced "sequel" is quite useful when working with large data sets. the Q in SQL stands for

Query

Data-driven decision making (DDDM) can be facilitated through a six-step processes of Ask, Prepare, Process, Analysis, Share, and Act. Which of these steps refers to creating visualizations and presentations for key stakeholders?

Share

SQL allows users to isolate specific information contained in a database, as well as to aid in the selection, creation, addition, and extraction of data from a database. SQL stands for ______ query language.

Structured

Popular applications used by today's organizations in web mining included Google Analytics, Data Mining, and _____

Tableau

Which would organizations be interested in the information on interactions and preferences that social media sites can provide?

The more an organization knows about users' interactions and preferences, the more strategic their targeting can be.

Which statement best explains why knowing an organization's value proposition is important for creating its social media information system (SMIS)?

The organization can increase its exposure and user engagement on social media by designing an SMIS that enables it to reinforce and build on its identified strengths.

Why is it important to preserve the integrity of data, information, and systems?

These assets lose their usefulness and value if their consistency, accuracy, or dependability is compromised.

What is a characteristic shared by all devices that can be infected by a computer virus?

They are connected to the Internet.

In 2013 the U.N. General Assembly adopted a resolution affirming that the rights held by people offline must also be protected online, calling for its member nations to respect the right to privacy in digital communication. Which of the following statements applies to the real-life impact of this resolution?

This sounds good, but users should be aware that digital privacy is not honored by many on the Internet.

As reported by Andrei Ene, one of the worst malware attacks in the last 10 years is the TBT, or

Tiny Banker Trojan.

The Act that signed into law to monitor terrorist activities and communications following the 9/11 attacks and the 2001 anthrax attack on Congress is the

USA PATRIOT Act/USA Freedom Act.

Why is establishing authentication procedures a common cybersecurity goal?

Verifying that users are authorized to access systems, data, and resources is fundamental to preventing their unauthorized use.

The Stored Communications Act prohibits which activity?

accessing the communications of an organization without authorization

In addition to advancements in computer hardware, what drove improvements to POS ( point-of-sale) system in the 1990's?

an increasingly diverse group of users and their needs

What is the final step in the six-step process of creating an SMIS?

analyze the collected data

Which of the following is an example of an activity that would be useful during the planning stage of the plan-protect-respond cycle?

attempting to exploit flaws from the outside, simulating attacks that a hacker would try

a common, basic condition for most flextime policies is the requirement that employees must

be able to fulfill their work responsibilities, including attending certain meetings or events in-person

What does business-to-consumer (B2C) e-commerce replace?

brick-and-mortar store locations

data analysts must blend facts and data with knowledge about the

business or organization

Management information systems allow managers to build upon an organization's existing strengths to create

competitive advantages.

Online marketplaces where one consumer sells to another consumer are called

consumer-to-consumer (C2C).

As e-commerce continues to develop, many retailers are likely to maintain some type of "brick-and-mortar" store or physical location primarily because

consumers expect integrated shopping experiences that include face-to-face options.

the 3-step data visualization process consist of exploring the data sets for patter, then planning for visuals and finally

creating your visuals

A sales associate has been hired to write blog posts that will be regularly published on a blog about new beauty products. The blog posts are designed to include the SEO terms that relate to the company's newest skin care product, using the keywords that will also be used in their advertising campaigns. What part of the e-commerce timeline would this be a part of?

implementation

The ultimate purpose of a customer relationship management system (CRM) is to

increase sales, market share, and profit.

If an organization wants to increase user engagement on social media, it wants to

increase the conversion rate of its social media posts to interactions with users.

When competitors seek to gain competitive advantage through price leadership or by making product improvements, Professors W. Chan Kim and Renee Mauborgne would say they are using a(n)

red ocean strategy.

in order to be considered open data, databases must provide access rights so that they can be

redistributed

mainframes were originally developed for their

reliability of handling transactions.

One reason to create database policies is to specify the ____ used in database design ( how the data is structured)

rules

Most new laptop computers come with how much storage?

256 GB - 1 TB

Researchers at IBM are on the verge of using machine learning and artificial intelligence technologies to identify patterns in human speech that may be predictive of an eventual diagnosis of Alzheimer's disease. The system can produce data and conclusions within only a couple of minutes with an accuracy rate of ________, which is far better than the test currently used today.

71%

In which of the following scenarios would an executive benefit from the insights provided by operations management systems software?

An executive wants to know why it is taking longer to manufacture their product.

One of the first computer aided design programs ever developed was also among the first to be integrated into ERP systems. This popular program is

AutoCAD

Headquartered in Toronto, ________ has developed a software application that serves as an early warning system for identifying pandemics.

BlueDot

A technology called ________ may change the way doctors treat HIV, cancer, and antibiotic resistant bacterial infections.

CRISPR

Many project managers create a flowchart before creating a

Gantt chart.

ERP software integrates several software packages into a single platform. Which of the following software packages stores employee compensation and performance information?

HRM software

Researchers at ________ are on the verge of using machine learning and AI technologies to identify patterns in human speech that may be predictive of an eventual diagnosis of Alzheimer's disease.

IBM

Which of the following is a benefit to using a Monte Carlo simulation to determine the likelihood of a project completion date?

It forces the project manager to realistically evaluate critical tasks' duration.

Windows OS is owned and maintained by ________.

Microsoft

Project managers create a Gantt chart not just to illustrate the project schedule but also to use it as a framework for developing a

PERT network chart.

Which company was formed after Elon Musk's X.com and Peter Thiel's Confinity Inc. merged, when the software that allowed Palm Pilot users to transfer funds to each other had evolved to allow payment transfers over the Internet?

PayPal

Of the following statements, which one specifically applies to the CRM integration of platforms such as Facebook, YouTube, and TikTok?

Social media platforms provide targeted customer information.

Which of the following is not a presentation software term?

Speaker Image

Which company was formed by Jack Dorsey, cofounder and CEO of Twitter, to provide small business owners with aggregator services and a credit card payment system they could operate through their iPhones?

Square

Which software company has expanded its credit card payment processing products to also sell point-of-sale (POS) stations?

Stripe

Integrating a business software module into an ERP has several advantages. Which of the following business software modules includes customer payment information?

TPS software

How can picturing a long series of "if-then" statements best explain how the model of a decision support system works?

The DSS model adapts its processes based on the success of every prior decision.

How do businesses ultimately benefit from using a CRM to identify the highest revenue customers in a target market, before developing a marketing campaign?

They save time and money by targeting this precise segment of the market.

What is the term for a CRM that tracks the type of sale that is most likely to make a person purchase an item that they have previously viewed on an e-commerce site?

User Experience

A gigabyte equals approximately one ________ bytes.

billion

How does earned value management (EVM) track what is called the project "triangle" of scope, time, and cost?

by multiplying the percentage of completion of each activity on the PERT network chart by the total value of the completed activity

A key component, and major advantage, of an ERP is its

centralized database.

A digital device that accepts input, processes and stores the input, and provides output is a ________.

computer

Which of the following processes would operations management systems software be used for in a manufacturing firm?

creating bedroom furniture from lumber

Sales managers must identify the customer leads that best fit the company's goals. CRM assists in this aspect of a company's sales process, which is known as

customer qualification.

Which business computer application system is focused on helping managers to maintain the business's focus on the individual customer by developing a lasting relationship that promote long-term buying?

customer relationship management (CRM) system

A ________ is committed when a computer is the object of the crime or a computer is used to commit a criminal offense.

cybercrime

What is one of the greatest risks of an organization storing customer data?

data breaches

Because so much information regarding voters' political attitudes is available online, campaign managers increasingly rely on

data mining.

Reports offer a way to view, format, and summarize the information in a ____

database

Executive information system (EIS) software is a version of

decision support system (DSS) software.

Using technology to transform a market or to create an entirely new market is called creating a(n) ________ innovation.

disruptive

If a customer segmentation tool supports integration, what is it able to do?

efficiently link data from various sources and platforms

Because accurate tracking of employee performance will always be critical to good management, most firms invest in a software that manages

employee evaluation.

A manager is using the organization's ERP software to generate a report that links its human resources data to its overall financial performance. What is one type of HR data that the ERP accounting module could factor into this report?

employees' payroll and benefits

The primary goal of a company's social media strategy is to

engage potential customers.

Search engine optimization (SEO) can be _________ through the information gained by web mining

enhanced

An executive wants to know what would happen to company profits at the one-year, two-year, and five-year point if she reduced spending on manufacturing but increased spending on marketing and customer outreach. What system would she use to model this?

enterprise resource planning system

Which dimension of ethical behavior in the digital age includes the question of how much time employees are allowed to spend browsing social media?

establishing standards

While a religious leader may provide guidance on how to uphold high morals, ________ provide the reasons for acting morally.

ethics

Have you ever misplaced your purse or wallet? This may be a thing of the past since some companies are developing personal identification purchasing capability using ________ software.

facial recognition

One benefit of using a CRM system to segment a market (rather than another type of market segmentation tool) is that a good CRM tool

facilitates using the company's own, collected data about customers.

How many dimensions or categories can the ethical concerns of the digital age be divided into?

five

Project management software systems can be used to map out a project in different ways according to its complexity. Which of the following statements lists software results according to low-to-high project complexity?

flow chart, Gantt chart, PERT chart

By allowing viewers to see the project's progress, project managers can reduce the anxiety caused by apparent inaction. For this reason, PMs often provide simple

flowcharts

While ERP systems offer many competitive advantages to users, particularly those in upper management, a significant disadvantage is their

high costs.

Which level of share of wallet means that existing customers are spending more to purchase products or services from one organization than they are from direct or indirect competitors?

high share of wallet

What does the General Data Protection Regulation (GDPR) regulate?

how companies protect personal data

A new app was released providing consumers with digital coupons for products the consumer indicates they frequently purchase. The app gives different users coupons with different values and shares purchasing as well as demographic information with the product manufacturer. Under what circumstances would the information sharing with product manufacturers be ethical?

if the app's terms of service indicated who they would be sharing information with and what information would be shared

What is the overarching goal of organizations choosing to adopt an enterprise resource planning (ERP) system?

increase operational efficiency

With the increasing presence of Internet e-commerce sites, the force of customers has

increased

During which phases of a project is project management software used to increase the efficiency of all team members?

initiation, planning, execution, and closure

Adding software to a digital device, or adding hardware components to a digital device is called ________.

installing

Data marts are used to track ____, purchase transactions, and the supply chain.

inventories

How are data in process different from data at rest or data in storage?

it is held in the device's RAM until it can be processed by the CPU or GPU

Coffee vendors who operate small, drive-up coffee stands find it difficult to charge significantly higher prices than their many competitors do. What aspect of the coffee stand business makes raising prices difficult?

its low barriers to entry

The essential function of resource leveling is to

keep the project moving toward completion by reassigning resources.

Database reports are useful in many ways; one way a report is used is to provide details about individual records and to create _____

labels

Under what type of system are employees encouraged to halt the manufacturing process in the event of a manufacturing error or safety risk?

lean manufacturing system

Users often find it difficult to implement or even comprehend a new ERP system without significant training because of ERPs' steep

learning curves.

Along with salary, human resources (HR) managers typically need to track employee hiring dates, marital status, number of dependents, and benefits choices and usage. To ensure this is done correctly, nearly all firms use a system that

manages benefits.

An electronic element that stores data by changing its resistance based on the current that has passed through it (similar to RRAM) is called a

memristor

According to Professor Porter, a business must differentiate itself from its competitors. One method is to encourage customers to believe that an organization provides higher quality goods or better service, then the organization can charge a premium, or gain market share, or (ideally) both. For example, by placing a swoop icon on a sweatshirt, Nike is able to charge a higher price. This methodology is called

monopolistic competition.

Which of the following is a strength of the Android platform?

most widely used OS for smartphones and tablets

employee monitoring software

observes computer use of all employees from a central location.

Fayol's principles for structuring organizational roles and authority emphasize

order and unity, so that employees understand their roles and report to only one person.

qualitative data that is not.categorized is called nominal data. Qualitative data that is categorized (ranked for example) is considered ____ data

ordinal

the DBMS (Database Management System) is designed to administer and ___ a database

organize

What type of firewall would filter messages coming from a specific, predefined IP address to a spam filter?

packet filter

When data is anonymized, the PII is eliminated or encrypted. PII includes names, social security numbers, address,and more and stands for ____ identifiable information

personal

A long standing company is expanding their existing workforce. what, in all likelihood, would they invest in terms of computing capabilities?

personal computers

E-commerce ________ includes creating marketing messages that contain the individual's name, appeal to his/her interests, and take their purchase behavior into account.

personalization

The security firewall serving Vantage's email program catches an impressive number of both irrelevant and illegitimate messages, to the point where employees usually do not even see them. Occasionally, however, an unsolicited message will catch managing partner Carl's eye. Because one new message looks to come from a potential new client, he's interested but careful, aware that the boutique consulting firm has a very targeted marketing system and clients usually do not appear out of thin air. What type of security concern is causing Carl's suspicion?

phishing

The organizations likely to benefit the most from the global reach of e-commerce are those that

previously depended on foot traffic into one physical store to sell their products.

The U.S. Census Bureau is using differential ________ to make census data secure and private.

privacy

Which type of employee in a project management firm works directly with the client in the early stages of a project?

project planner

Focusing on project scheduling and sequencing to optimize the progress of all of the projects in a firm's portfolio is the role of a

project planner.

Which type of touchscreen uses a single metallic-coated panel and uses electricity to calculate touch points?

projective capacitive

What aspect of today's business environment is central to the need for robust transaction management processing systems?

proliferation of e-commerce-based organizations

What part of the plan-protect-respond cycle is occurring when an organization limits access to sensitive documents on a server to only those with the required security clearance?

protect

Which of the following statements encapsulates the purpose of the Federal Information Security Management Act?

protect government assets against cybersecurity events

One version of this type of malware encrypts a victim's data until a payment is made. Another version threatens to make public a 'victim's personal data unless a payment is made. This type of malware is called

ransomware.

In the initiation phase of project management, the client and project manager determine if the project is SMART. What does the R in SMART refer to?

realistic

Collections of related fields in a database are referred to as

records

A company regularly honors its employee-of-the-month with a congratulatory post on its social media pages. Which standards should the company establish and enforce to best protect the privacy rights of these employees?

rules of conduct for how social media followers and visitors respond to the posts

Which step of an ethical analysis is designed to enable a manager to obtain guidance or insights from other managers?

searching for precedents

For which type of cybersecurity vulnerability do organizations maintain and share databases of known problems?

security weaknesses in operating systems or application software

Of the listed methods of collecting demographic information, which is the most effective for organizations defining their target market?

social media

A business must not only look at its direct competitors, but also must contend with those firms that offer a product that a consumer might alternatively choose. For example, McDonald's and Burger King can be considered competitors and if one firm raises prices the other firm might gain its customers. However, if both firms raise their prices, customers may choose to purchase pizza instead. Porter refers to this as the force of

substitutes.

Intel's XE-HP GPU, built in a collaboration between Intel, Hewlett Packard, and the Argonne National Laboratory is designed to support the Aurora

supercomputer

Apple uses Corning's glass products for all its devices, such as the Gorilla Glass 6 used in the iPhone 11 series. To ensure that it continues to have a strong relationship with this glass industry leader, Apple has invested nearly $500 million toward Corning's advanced glass research division. By building up this relationship, Apple seeks to maintain some control over which of Porter's 5 forces?

suppliers

A logistician for an oil company receives an alert from the software she uses that a supertanker has been delayed. In addition, she receives a choice of reasonable actions to take. What software is she likely using?

supply chain management software

relational database organize data into ____ based on structured data groupings.

tables

Why is the meeting between all project stakeholders and key players scheduled as the final step in the planning phase?

the budgets and timelines need to be finalized before stakeholders and key players can understand the scope of the projects and their role within the project

In addition to the probable outcome, what other information does modern business intelligence software provide?

the degree of likelihood of the outcome

To calculate an organization's customer equity (CE) value we first determine

the future lifetime revenue the organization's customers will generate.

what function of a micro-networked POS system is responsible for increased accuracy of employees when ringing up customer purchases?

the total button which automatically added up the amount owned for items.

What distinguishes the two main types of cybercrimes?

their frequency (how often they are committed)

What do most companies use as their main conduit for reaching and connecting with customers?

their website

M-commerce is a subset of

traditional e-commerce.

A terabyte equals approximately one ________ bytes?

trillion

A program that appears to be legitimate but executes an unwanted activity when activated is called a

trojan.

the main function of executive support system (ESSs) is to

turn data information to support high-level decision making.

Manuel runs a small business that paints residential interiors. He has decided most of his current customers can best be reached by sending out a seasonal email newsletter. He will target new customers by placing ads on Facebook targeted at people located within 20 miles of his business who have searched for house painters. Where would he place this information on an e-commerce presence map?

type of presence

E-commerce ________ is the ability of an organization to create a strong presence among consumers in many places, with minimal time constraints, to sell them products and services.

ubiquity

Tiffany has purchased a new laptop. She noticed many unwanted programs came pre installed on her laptop. She wants to ________ the programs from her device so they do not take up storage space.

uninstall

Online content that has been created and posted by unpaid contributors such as customers or fans of a product or service is referred to as

user-generated.

cloud computing can best be described as

using the Internet to store and access resources

The NIST Cybersecurity Framework is a

voluntary guide for organizations.

5G cellular technology offers the promise of download speeds as high as 20 Gbps. This will likely require more antenna arrays with each antenna sending out ________ microwave signals.

weaker

The practice of human resources management originated

with or before the ancient Egyptians, who had many scribes and priests dedicated to organizing workforces.


Related study sets

Chapter 6: Crime and Criminal Justice

View Set

Module 7: Finance- TVM and Multiple Cash Flows

View Set

MRKT 640 Consumer Behavior Module 3

View Set

Unit 4 - Matter & Energy Study Guide

View Set