info 360 - missed test questions

Ace your homework & exams now with Quizwiz!

Which social media goal directly aligns with an organization's mission to increase the public's environmental awareness by increasing news coverage of environmental issues?

Increasing the conversion rate of its social media posts to full news stories

How does a Network Address Translation (NAT) type of firewall work?

It hides internal IP address

The information in ________ is dumped when a computer is shut down

RAM

The type of storage that retains data and information when the power is turned off is called ________

ROM ( read only memory)

packet filter

What type of firewall would filter messages coming a specific, predefined IP address to a spam?

The model of a decision support system (DSS), or business intelligence (BI) system, typically adapts its processes based on the degree of accuracy of each prior decision. This type of processing can be called

artificial intelligence (AI)

Data flows between different computer parts via ________

buses

Sales managers must identify the customer leads that best fit the company's goals. CRM assists in this aspect of a company's sales process, which is known as

customer qualification

The purpose of the application protocol layer of TCP/IP is to

define how email programs and other software communicate within and across networks.

What is the second step in the decision-making process created by Herbert Simpson?

design

If a customer segmentation tool supports integration, what is it able to do?

efficiently link data from various sources and platforms

Which type of MIS report pinpoints outliers that vary from the norm, such as when a production quota falls below forecasted levels?

exception reports

A server is a group of two or more devices/computers that are connected to allow them to exchange information and share resources.

false

Authenticating the identity of a user, process, or device serves one purpose: to prevent unauthorized access to an organization's assets or resources.

false

E-commerce individualization is the adjustment of an organization's product or service offerings based on an individual's preferences or past buying behavior.

false

Organizations and individuals use a SWOT analysis to help them identify their internal strengths and weaknesses and examine external opportunities and technologies.

false

Specialized hardware or software tools that capture viruses transmitted over a network are called packet sniffers.

false

The Gantt chart is a multilevel timeline that has become the most widely used tool in project management, because it illustrates how some tasks in a project can be done concurrently while other tasks are dependent upon the completion of preceding tasks

false

The project manager outlines and documents the requirements of the project and analyzes the project's costs during the planning phase.

false

The two major categories of computer ethics violations are personal activities and organizational policy violations.

false

Traditional hard drives have no moving parts.

false

White-hat testing" refers to paying hackers to hack into one's own private networks and applications

false

Which of the following is generally not protected by an organization's network firewall?

files stored in a cloud-based system, such as Dropbox or Google drive

What does the Wiretap Act aim to protect against?

identity theft and unlawful access to stored communications

Which outcome of the balanced scorecard framework measures how efficiently a business is operating

internal business processes

Economies of scale means using

large production or purchasing power.

The organizations likely to benefit the most from the global reach of e-commerce are those that

previously depended on foot traffic into one physical store to sell their products.

A cybersecurity exploit allows a hacker or intruder to

remotely access a network, gain privileges, and make unauthorized changes.

What portion of a firm's executive information system would be responsible for automatically restocking a necessary manufacturing component once it went below a predetermined level?

supply chain management

Providing managers with increased visibility of the entire logistics process so that they can improve the efficiency of the entire system is the primary function of any

supply chain management system

Random access memory (RAM) does not store data when the computer is shut down.

true

To remain relevant in today's e-commerce landscape, many businesses use progressive ________ applications to undertake m-commerce.

web

On an e-commerce presence map, what is presence?

websites, email, social media sites and offline media


Related study sets

AP Chinese Cultural Presentations 4

View Set

Music 13personalizing the Conversation: Beethoven and the Classical Sonata

View Set

17. Local and humoral control of tissue blood flow

View Set

Citi Trainings: Research Involving Human Subjects (RCR-Basic)

View Set