Midterm 2

Ace your homework & exams now with Quizwiz!

Which of the following is an accuracy issue? What information about oneself should an individual be required to reveal to others? How can we ensure that the information will be processed properly and presented accurately to users? What information does a person or an organization have a right to obtain, under what conditions, and with what safeguards? How should we handle illegally copying copyrighted software?

How can we ensure that the information will be processed properly and presented accurately to users?

Which of the following is an accessibility issue? How can we ensure that errors in databases, data transmissions, and data processing are accidental and not intentional? Under what circumstances can one use proprietary databases? What information about individuals should be kept in databases, and how secure is the information there? How much should companies charge for permitting access to information in their databases?

How much should companies charge for permitting access to information in their databases?

_______ originally managed Priceline.com's customer management system. Marketing HR Product management IT

IT

Which of the following does NOT contribute to the increasing vulnerability of organizational information resources? Increasing skills necessary to be a computer hacker International organized crime taking over cybercrime Lack of management support Smaller, faster, cheaper computers and storage devices Today's interconnected, interdependent, wirelessly networked business environment

Increasing skills necessary to be a computer hacker

_________ are IS professionals who specialize in analyzing and designing information systems. Users Technical specialists Programmers Systems analysts

Systems analysts

You are an executive working for a Fortune 500 company. You want to see how each factory floor worker is performing compared to every other worker. You would look at the ________ wall in the Management Cockpit. black blue red white

blue

Data reduction is the conversion of raw _______ into a smaller amount of more useful _______. data; information data; knowledge information; data information; knowledge

data; information

The European Union's highest court ruled that ________. court documents should be taken off the Internet after a certain time period people must remove revealing photographs from the web when requested embarrassing material should be removed from search results when requested publishers need to remove or alter all articles that are no longer relevant

embarrassing material should be removed from search results when requested

Dashboards evolved from enterprise resource planning systems. executive information systems. functional area information systems. transaction processing systems.

executive information systems.

Operational CRM systems support _________-office business processes or processes that _________. front; directly interact with customers back; directly interact with customers front; do not directly interact with customers back; do not directly interact with customers

front; directly interact with customers

Systems _________ addresses the business problem or business opportunity by means of a feasibility study. analysis design operation investigation

investigation

You would use optimization or simulation for ______ analytics. descriptive predictive prescriptive useful

prescriptive

Correct answer iconYour answer is correct. The _________ represents the business users and any other stakeholders in the project. scrum master team program developer product owner

product owner

Southwest Airlines utilized a(n) ________ CRM system to rearrange a customer's flight schedule to get to her comatose son. open-source real-time mobile social

real-time

In the ________ component of SCM, supply chain managers create a responsive and flexible network for receiving defective, returned, or excess products back from their customers, as well as for supporting customers who have problems with delivered products. make plan deliver source return

return

As a purchasing manager, you have to purchase widgets every week to replenish your inventory. This is a(n) ________ decision. midstructured semistructured structured unstructured

structured

You are an employee in Inside Sales. This means you take calls and address customer issues like entering orders, updating orders, and providing order status reports. This is a(n) _____ task and a(n) _______ decision. structured; management control structured; operational control unstructured; management control unstructured; operational control

structured; operational control

You want to make sure your entire organization is using a single data warehouse instead of using a data mart for every department. This is an example of the development of infrastructure to support enterprise-wide analytics. the development of one or a few related analytics applications. support for maintaining organizational strategy. support for organizational transformation.

the development of infrastructure to support enterprise-wide analytics.

Data marts are typically associated with the development of infrastructure to support enterprise-wide analytics. the development of one or a few related analytics applications. support for maintaining organizational strategy. support for organizational transformation.

the development of one or a few related analytics applications.

Management is a process by which an organization achieves its goals (called ______) through the use of resources (called _______). the input; inputs the input; outputs the output; inputs the output; outputs

the output; inputs

If a company doesn't want to write any computer code, it would choose to ________. use a prewritten application custom-write an entire application customize a prewritten application outsource the application

use a prewritten application

Containers are another step in the development of _________ technology. architecture cloud computing customized virtual

virtual

A _________ site typically does not include the actual application the company needs to get the business back up and running immediately. hot warm cold medium

warm

Almost _________ percent of ransomware victims pay the ransom and hackers _________ decrypt the data as promised. 95; do not 95; do 50; do not 50; do

50; do

The 80/20 rule means that if the software meets _________ percent of the company's needs, then the company should modify _________ percent of its business processes to use the software. 20; 20 20; 80 80; 80 80; 20

80; 20

_________ refers to determining who is responsible for actions that were taken. Liability Answerability Accountability Responsibility

Accountability

_________ did not file comments with the FCC opposing Marriott's Wi-Fi blocking plan. Google Amazon Microsoft Consumer Electronics Association

Amazon

Analytical CRM systems provide ________ by analyzing customer behavior and perceptions. ERP SFA BI CIC

BI

The most current form of ransomware demands payment in the form of _________. Paypal transactions credit cards cash Bitcoins

Bitcoins

________ is an approach that integrates various automated factory systems. CRM CIM MRP TPS

CIM

Which of the following is NOT a use for data mining? Comparing products Detecting fraudulent credit card transactions Forecasting bankruptcy Predicting sales

Comparing products

________________ development is closely linked with the idea of web services and service-oriented architectures. Component-based Object-oriented End-user Agile

Component-based

Which of the following is NOT a reason Priceline.com moved to a new customer contact center? Customer growth Competition Contact options Cost

Cost

________ is the marketing of additional related products to customers based on a previous purchase. Cross-selling Bundling Downselling Upselling

Cross-selling

_________ refers to malicious acts in which attackers use a target's computer systems to cause physical, real-world harm or severe disruption, often to carry out a political agenda. Cyberterrorism Espionage Identity theft A SCADA attack

Cyberterrorism

Hackers would use a botnet to perform a _________. DDoS a Trojan horse virus a logic bomb

DDoS

A(n) _________ is located between two firewalls. spamware detector anti-malware system DMZ ERP

DMZ

If you want to know what items customers typically buy together so that you can place them next to each other on the shelf, you would be using data mining. DSS. OLAP. OLTP.

DSS

Ashley Madison's data was first released on the _________ by ________. Dark Web; The Impact Team Web; Anonymous Dark Web; Anonymous Web; The Impact Team

Dark Web; The Impact Team

_________ feasibility determines whether the project is an acceptable financial risk and, if so, whether the organization has the necessary time and money to successfully complete the project. Behavioral Technical Competitive Economic

Economic

_________ is an access control. A firewall Encryption RFID A company gate

Encryption

_________ is an approach in which the organization's end users develop their own applications with little or no formal assistance from the IT department. End-user development RAD JAD Agile development

End-user development

_________ occurs when an unauthorized individual attempts to gain illegal access to organizational information. Identity theft Espionage Information extortion Alien software

Espionage

_________ is the third step in the general framework for ethics. Get the facts Make a decision and test it Act and reflect on the outcome of your decision Evaluate alternative actions Recognize an ethical issue

Evaluate alternative actions

_________ costs are those costs that remain the same regardless of any change in the company's activity level. The CIO's salary is an example of a _________ cost. Fixed; variable Variable; fixed Variable; variable Fixed; fixed

Fixed; fixed

Which of the following data is NOT currently collected by usage-based car insurance companies? Speed GPS Mileage Time of day

GPS

The _________ consists of a clear set of projects that the IS department and the functional area managers will execute in support of the IT strategic plan. organization mission IT architecture organization strategic plan IS operational plan

IS operational plan

Which of the following is an advantage of JAD? Involves many users in the development process Works wells for ill-defined problems Enforces quality by maintaining standards Bypasses the IS department and avoids delays

Involves many users in the development process

_________ is a legal concept that gives individuals the right to recover the damages done to them by other individuals, organizations, or systems. Liability Answerability Responsibility Accountability

Liability

________ is the customer's potential revenue stream over a number of years. Customer churn Customer life cycle Market capitalization Lifetime value

Lifetime value

________ is the correct evolution of POM planning. ERP ARP MRP MRP ARP ERP MRP MRP II ERP ERP MRP MRP II

MRP MRP II ERP

_____ is NOT a statistical tool used for predictive analytics. Data mining Linear regression Logistic regression Multidimensional analysis

Multidimensional analysis

If you analyze a data cube, this is an example of using data mining. DSS. OLAP. OLTP.

OLAP

Most organizations design TPS to process transactions as soon as they occur. This is called _________. OLTP source data processing batch processing OLAP

OLTP

________ CRM systems are hosted by an external vendor in the vendor's data center. Social On-demand Mobile On-premise

On-demand

______ analytics require _______ analytics. Descriptive; predictive Descriptive; prescriptive Predictive; prescriptive Prescriptive; predictive

Prescriptive; predictive

_________ is the first step in the general framework for ethics. Get the facts Recognize an ethical issue Act and reflect on the outcome of your decision Make a decision and test it Evaluate alternative actions

Recognize an ethical issue

_______ is a decisional role. Analyzer Leader Liaison Resource allocator

Resource allocator

________ is the component of an operational CRM system that automatically records all of the components in a sales transaction process. JIT SFA CMA CIC

SFA

________ is the best-known on-demand CRM vendor. Oracle SAP Salesforce Microsoft

Salesforce

_________ collects personal information about users without their consent. Adware Spyware Spamware Marketware

Spyware

A URL that begins with https uses _________. TLS VPN DMZ ERP

TLS

________ refers to erratic shifts in orders up and down the supply chain. VMI The bullwhip effect JIT Vertical integration

The bullwhip effect

_________ is a remote attack requiring user action. A Trojan horse DoS A logic bomb Virus

Virus

John Hancock partnered with ________, a global wellness company. TotalWellness Medifit Vitality Weight Watchers

Vitality

_________ is the most recent example of ethical misbehavior in organizations. Tyco Enron WorldCom Wells Fargo bank

Wells Fargo bank

Which of the following is a privacy issue? How can we ensure that errors in databases, data transmissions, and data processing are accidental and not intentional? How much should companies charge for permitting access to information in their databases? What information about individuals should be kept in databases, and how secure is the information there? Under what circumstances can one use proprietary databases?

What information about individuals should be kept in databases, and how secure is the information there?

You get a new smartphone and throw your old one away without erasing all your data. This is _________ and is an _________ mistake. a human error; unintentional social engineering; unintentional social engineering; intentional a human error; intentional

a human error; unintentional

Which of the following was NOT used in the cyberattack on Ukraine? a logic bomb a SCADA attack Spear-phishing DoS

a logic bomb

You can check your credit report annually for free through TransUnion, Equifax, and Experian. This allows you to catch signs of identity theft early and note any problems in your credit reports. This is an example of an ethical issue that falls into the category of ________. property privacy accuracy accessibility

accuracy

The end product of the _________ stage is a set of system requirements. design investigation analysis operation

analysis

Auditing _________ the computer means verifying processing by checking for known outputs using specific inputs. through around into with

around

Overstock's chatbot, called Mila, _________. automates the simple but time-consuming process of requesting sick leave provides a list of recommendations and enables customers to have a real-time dialogue with the bot asks shoppers to input their skin type and then suggests beauty tips and products tailored to their needs allows customers to describe what they are looking for instead of just choosing from standard options

automates the simple but time-consuming process of requesting sick leave

A _________ site is the least expensive option. warm hot cold medium

cold

Your southern region is not doing very well. You want to know why, so you ask for a special report showing the numbers for the southern region compared to the northern, eastern, and western regions. This is a(n) ________ report. routine comparative drill-down exception

comparative

Companies purchase digital dossiers to ________. evaluate the competition track their own reputations create customer intimacy engage in electronic surveillance

create customer intimacy

Amazon's recommender system is an example of ________. upselling downselling bundling cross-selling

cross-selling

A transaction is any business event that generates ________ worthy of being captured and stored in a database. information knowledge data wisdom

data

The _________ approach states that the morality of an action is based on whether the action itself is right or wrong under a series of rules, rather than based on the consequences of that action. fairness rights deontology utilitarian common good

deontology

GIS is a computer-based system for capturing, integrating, manipulating, and displaying data using analytics. dashboards. digitized maps. solar energy.

digitized maps.

A _________ conversion involves shutting the old system off and turning the new system on at a certain point in time. parallel phased pilot direct

direct

You use FedEx and UPS to ship your products to customers. This is an example of a(n) ________ activity. upstream internal downstream irrelevant

downstream

You are looking at a sales report from last month. You notice one salesperson's numbers are much lower than the rest, so you click on that person's name to get more details on the products they sold last month. You are using the _______ feature of a dashboard. CSF drill down exception reporting trend analysis

drill down

Answering the question "did this option work as proposed" occurs in the _____ phase of the IDC. choice design intelligence implementation

implementation

Packing, assembly, or manufacturing are ________ activities. upstream irrelevant internal downstream

internal

Typing in your password to access a system is an example of something the user _________. has is knows does

knows

The ________ component of SCM is the most metric-intensive part of the supply chain in which organizations measure quality levels, production output, and worker productivity. deliver return plan make source

make

Above all, you want to implement the cheapest CRM system available. You are willing to accept any risks associated with this, so you would want to implement a(n) ________ CRM system. on-premise social open-source mobile

open-source

Europeans and privacy advocates prefer the _________ model of informed consent. opt-out sign-out sign-up opt-in

opt-in

The _________ model of informed consent permits the company to collect personal information until the customer specifically requests that the data not be collected. sign-up opt-out sign-out opt-in

opt-out

A _________ conversion involves running the old and new systems at the same time. direct phased parallel pilot

parallel

A _________ conversion introduces components of the new system in stages. parallel phased direct pilot

phased

Organizations must have a strategy for managing all the resources that are involved in meeting customer demand for their product or service. This strategy is developed in the ________ component of SCM. source return deliver make plan

plan

A _______________ is an underlying computer system on which application programs can run. platform virtual machine stage container

platform

The pursuit of the "American dream" and our ability to choose our religious orientation is a reflection of the _________ approach. common good rights deontology fairness utilitarian

rights

You are a jeweler who wants to make sure you have the maximum number of diamonds for sale. You notice that the number of diamonds available drops more when the size is relevant versus when the color is relevant. By comparing these factors, you are conducting a(n) _____ analysis. affinity goal-seeking sensitivity what-if

sensitivity

SaaS is a method of delivering _________ in which a vendor hosts the applications and provides them as a service to customers over a network, typically the internet. a platform hardware software an architecture

software

Capital One's insourcing initiative meant it had to build its reputation as a _________ company. banking technology human resources marketing

technology

A _________ is an intellectual work that is not based on public information. patent trademark copyright trade secret

trade secret

If you shift your risk by using other means to compensate for the loss like purchasing insurance, you have implemented a risk _________ strategy. limitation transference avoidance acceptance

transference


Related study sets

Structure & Stereochemistry of Alkanes (Ch. 3)

View Set

Part 3- Saunders NCLEX Cardiovascular

View Set

Chapter 1: Nursing Past & Present

View Set

3.5 Average revenue, total revenue and profit.

View Set

Chapter 7 and 8 Criminal Justice

View Set