PLS 21 Exam #2

Ace your homework & exams now with Quizwiz!

What kinds of risks come with bluetooth-equipped devices?

-Bluejacking is when anonymous text messages are sent to mobile phones -Bluespamming is when a phone's contacts are secretly sent text messages -Bluesnarfing is when hackers gain access to a mobile phone's contacts -Bluebugging is when hackers have access to a handset's commands

How to secure your wireless network?

-Change the device password to something unique -Turn SSID off -Enable encryption such as WPA

What are some reasons for studying file systems?

-Complexity of database design is easier to understand -Understanding file system problems helps to avoid problems with DBMS systems -Knowledge of file system is useful for converting file system to a database system

Which is an advantage and role of a Database Management System?

-DBMS is the intermediary between the user and the database (Database structure stored as file collection) (Can only access files through the DBMS) -DBMS enables data to be shared -DBMS integrates many users' views of the data

what is the difference between of the data and information?

-Data are raw facts -Information is the result of processing raw data to reveal the meaning -Information requires context to reveal the meaning -Raw data must be formatted for storage, processing, and presentation -Data are the foundation of information, which is the bedrock of knowledge

If you think your computer has been infected, what are the recommended after action steps?

-Disconnect your computer from the Internet. -Make sure your anti-virus signatures are up-to-date. If possible, don't download updates using the computer you think is compromised, but use another computer (e.g. a friend's computer). This is important: if your computer is infected and you connect to the Internet, a malicious program may send important information to a remote hacker, or send itself to people whose e-mail addresses are stored on your computer. .

What are basic threat securities?

-Download known content from trusted sites -Only open email attachments from trusted sources -Set your browser to discard passwords immediately

Which of the following are problems with Non-ERP systems?

-In-house design limits connectivity outside the company -Tendency toward separate IS's within a firm lack of integration limits communication within the company -Strategic decision-making not supported -Long-term maintenance costs high -Limits ability to engage in process reengineering

What is a disadvantage of managing a database system?

-Increased costs -Management complexity -Maintaining currency -Vendor dependence -Frequent upgrade/replacement cycles

Which statement about malware is correct?

-Malicious Software -consists of programming (code, scripts, active content, and other software) -designed to disrupt or deny operation, gather the information that leads to loss of privacy or exploitation, gain unauthorized access to system resources, and other abusive behavior. -general term used by computer professionals to mean a variety of forms of hostile, intrusive, or annoying software or program code.

Databases can be classified according to which of the following?

-Number of users -Database location(s) -Expected type and extent of use

Which of the following is a basic element of a computer program?

-Variables & Assignments -Arithmetic -Logic (if-statement)

What are symptoms of an infection?

-Your computer behaves strangely, i.e. in a way that you haven't seen before. -You see unexpected messages or images. -You hear unexpected sounds, played at random. -Programs start unexpectedly. -Your personal firewall tells you that an application has tried to connect to the Internet (and it's not a program that you ran). -Your friends tell you that they have received e-mail messages from your address and you haven't sent them anything. -Your computer 'freezes' frequently, or programs start running slowly. -You get lots of system error messages. -The operating system will not load when you start your computer. -You notice that files or folders have been deleted or changed. -You notice hard disk access (shown by one of the small flashing lights)

Which of the following is true regarding worms?

-also self-replicating -does not need to attach itself to another program; -can transmit itself across networks harm can come in two ways: destroyed files (like viruses) - consumption of bandwidth of the network as part of the repeated transmissions "DoS" attack = "denial-of-service" attack - network ports are so consumed with the data transmission of the worm that no-one can get any work done

What is true about computer virus?

-it is always attached (or inserted) into some other (non-malware) software -may or may not take some other bad action on the computer (e.g. file erasure, file corruption,etc) without knowledge or permission of computer owner -many times the user notices no symptoms -when damage occurs: destroyed files or folders

What is the correct order of the programming work-flow?

1. Write code in an editor program 2. Compile the code, which produces an executable file 3. Run the program (executable file)

Metcalfe's Law: A growth from 3 to 6 users would show a ___ fold increase

4

Almost _________ percent of ransomware victims pay the ransom and hackers _________ decrypt the data as promised.

50; do

The 80/20 rule means that if the software meets _________ percent of the company's needs, then the company should modify _________ percent of its business processes to use the software.

80 ; 20

What is a worm?

A worm is a computer program that replicates, but does not infect other files. Instead, it installs itself once on a computer and then looks for a way to spread to other computers.

_________ refers to determining who is responsible for actions that were taken.

Accountability

What is needed to make a good decision?

Accurate, relevant, timely information is the key to good decision making

What is a well-defined, ordered set of steps for defining a problem?

Algorithms

_________ did not file comments with the FCC opposing Marriott's Wi-Fi blocking plan.

Amazon

a set of rules to be followed in performing some operation or task.

An algorithms

What is syntax?

An entire sequence of instruction

Which is NOT a limitations of file system data management?

Analyst must review and update file systems frequently

which of the following statements is true about animations in powerpoint?

Animations = lot of time unless good PowerPoint skills Animations = problems with mouse during presentation (Murphy's law I) Animations = PC & mouse far from you during presentation (Murphy's law II) Animations = 'show', not 'facts'

Analytical CRM systems provide ________ by analyzing customer behavior and perceptions.

BI

Which of the following is NOT a problem associated with Big Data?

Big Data can be structured, unstructured, or semi-structured.

Which of the following is NOT a risk resulting from the use of Bluetooth in the context on security?

Bluejacking

Which bluetooth threat allows hackers to gain access to a mobile phone's contacts?

Bluesnarfing

Which of these modern settings involve data management?

Business, Research, & Administration

________ is an approach that integrates various automated factory systems.

CIM

________ refers to the maximum number of times an instance of one entity can be associated with an instance in the related entity.

Cardinality

which one of the following translates human-reable code into computer-reable instructions

Code complier

what is a computer code?

Collection of a computer instructions written in a human-reable programming language, usually as plain text.

________________ development is closely linked with the idea of web services and service-oriented architectures.

Component based

What three keys you need to press to apply Array Formula?

Control(Command)+ Shift+ Enter

What is one of the ERP Applications?

Core Applications

Which of the following is NOT a reason Priceline.com moved to a new customer contact center?

Cost

________ is an advantage of cloud-based ERP systems.

Cost

________ is the marketing of additional related products to customers based on a previous purchase.

Cross-selling

What is the short-key for "Save"?

Ctrl+S

What is CRM?

Customer Relationship Management

Which of the following is NOT a product of ERP?

D.J. Edwards

Hackers would use a botnet to perform a _________.

DDoS

A(n) _________ is located between two firewalls.

DMZ

Which is not an example of a security threat?

Danger warning

Ashley Madison's data was first released on the _________ by ________.

Dark Web; The Impact Team

What are the building blocks of information?

Data

Which of the following is NOT an advantage of DBMS?

Data redundancy

Data is managed most efficiently when stored in a...

Database

What does DBMS stand for?

Database management system

What company was unable to adapt to changing technology?

Dell

The _________ approach states that the morality of an action is based on whether the action itself is right or wrong under a series of rules, rather than based on the consequences of that action.

Deontology

The internet is designed to aid with the following

Discovery, Communication, Collaboration

ERP systems that include administrative, sales, marketing, and HR processes are referred to as _________.

ERP II

________ are designed to correct a lack of communication among _________.

ERP; FAIS

_________ feasibility determines whether the project is an acceptable financial risk and, if so, whether the organization has the necessary time and money to successfully complete the project.

Economic

_________ is an approach in which the organization's end users develop their own applications with little or no formal assistance from the IT department.

End-user development

Which one is not the common programming language?

English

What does the acronym ERP stand for?

Enterprise Resource Planning Systems

_________ is the third step in the general framework for ethics.

Evaluate alternative actions

What does XML mean?

Extensible Markup Language

_________ costs are those costs that remain the same regardless of any change in the company's activity level. The CIO's salary is an example of a _________ cost.

Fixed ; fixed

Which of the following is not a setting databases are used?

For Facebook use

Which of the following data is NOT currently collected by usage-based car insurance companies?

GPS

Which of the following is NOT required software in the database system environment?

Hardware

What are the 5 major parts of a database system

Hardware, Software, People, Procedures, Data

What US Government agency is dedicated to cyber security?

Homeland Security

Which of the following is an accuracy issue?

How can we ensure that the information will be processed properly and presented accurately to users?

Which of the following is an accessibility issue?

How much should companies charge for permitting access to information in their databases?

Africa collaborated with ________ to stop the Ebola virus outbreak in 2013 and 2014.

IBM

The _________ consists of a clear set of projects that the IS department and the functional area managers will execute in support of the IT strategic plan.

IS operational plan

________ originally managed Priceline.com's customer management system.

IT

Which of the following is NOT an impact of IT on organizations?

IT can be the solution to anything

Which of the following is not an example of an advantage of a DBMS?

Improve datum's appearance

Which of the following is the problem with NON-ERP Systems?

In-house design limits connectivity outside the company Tendency toward separate IS's within firm lack of integration limits communication within the company Strategic decision-making not supported Long-term maintenance costs high Limits ability to engage in process reengineering

Which of the following are NOT advantages of a DBMS?

Increased money in our lawmakers pockets

CRM leads to all of the following benefits except:

Increases employees salaries.

Which of the following does NOT contribute to the increasing vulnerability of organizational information resources?

Increasing skills necessary to be a computer hacker

Data Management is understood to focus on the proper generation, storage and retrieval of data; therefore, all of the following are significant in this process EXCEPT:

Information and data have no role in data management

Which of the following is an advantage of JAD?

Involves many users in the development process

________ is a legal concept that gives individuals the right to recover the damages done to them by other individuals, organizations, or systems.

Liability

________ is the customer's potential revenue stream over a number of years.

Lifetime value

Which of the following is NOT a desirable attribute of a good presentation slide?

Long and wordy body

________ is the correct evolution of POM planning.

MRP MRP II ERP

What to look for in CRM software

Make sure the primary goal (ie: customer service) is standard in the software. Customization is very expensive. ezinearticles.com Be able to integrate smoothly and flawlessly. ezinearticles.com Make sure the program doesn't offer more then you need. ezinearticles.com Compare with other companies of equivalently the same size who have purchased the same CRM software and examine their results.

________ is part of the ________ process and occurs when the company is trying to increase its inventory.

Make-to-stock; production

Which of the following is one of the six keys to getting the most out of your Connectivity?

Management Systems Timely information accessible across platforms and time i.e. sales reports, inventory, etc... Collaborative Workgroups Stay connected with similar professionals within your organization Connecting cross functional teams Online Reference Access to the information your workers need to empower them to be productive Interactive Communication Get feedback immediately Sign up for a workshop and get email confirmation before the browser tab is closed Training Fast, easy, secure and time-independent way to get new information out to the group...

Which one is NOT an advantaged of a database management system (DBMS)?

Maximized data inconsistency

Can you use internet pictures for professional powerpoint?

No you can not use internet pictures

what are the important aspects of an algorithm?

Non-ambiguity, finite

Which of the following is best suited for PowerPoint Presentations?

Normal pictures

Data marts and data warehouses typically use ________.

OLAP

If you analyze a data cube, this is an example of using

OLAP

Most organizations design TPS to process transactions as soon as they occur. This is called _________.

OLTP

________ CRM systems are hosted by an external vendor in the vendor's data center.

On-demand

What are some ERP products?

Oracle, PeopleSoft, and Baan

What are some risk Associated with ERP Implementation?

Pace of Implementation, Opposition to Changes to the Businesses Culture, Choosing the Wrong ERP, Choosing the Wrong Consultant, High Cost and Cost Overruns, Disruptions to Operations

A _________ conversion involves running the old and new systems at the same time.

Parallel

It refers to the act of attempting to acquire sensitive information

Phishing

Which of the following is not an essential stage of data warehousing process?

Put the data on a external hard drive

_________ is the first step in the general framework for ethics.

Recognize an ethical issue

what is benefit of CRM?

Research has shown that companies that create satisfied, loyal customers have more repeat business, lower customer-acquisition costs and stronger brand value.

The following are safe anti-virus systems except?

Rootkit

What links vendors, carriers, third-party logistics companies, and information systems providers?

SCM

________ is the component of an operational CRM system that automatically records all of the components in a sales transaction process.

SFA

Which one of these is not an example of new photography?

SLR

________ is the most popular query language used for interacting with a database.

SQL

________ is the best-known on-demand CRM vendor.

Salesforce

________ is part of the ________ process and involves sending goods that are in the warehouse to customers.

Sell-from-stock; fulfillment

Which of the following answer is not a right way to minimize the risk of threat?

Set your browser to remember your passwords

Legacy systems were developed as _________.

Silos

Which of the following is not included in the 'Content' of the slide?

Simplicity

Which key features does ERP include?

Smooth and seamless flow of information across organizational boundaries Standardized environment with shared database independent of applications and integrated applications

Which of the following is NOT an example of a threat to computer security?

Spartan

Which of following is not one of 6S PowerPoint Summary?

Specific--make your audience understand you

The following are types of threats to computer and network security except for?

Spider

which following is not one of 6S of PowerPoint?

Sport

Try not to use...

Standard Table option

Which one of the following is not apart of the 6S's of success for powerpoint?

Strength

Considering the following tables, ________ is a primary key.

Student Table: ID

________ is an extended ERP module.

Supply chain management

What is not a basic element of a computer program?

Syntax

_________ are IS professionals who specialize in analyzing and designing information systems.

Systems analysts

A URL that begins with https uses _________.

TLS

________ is the cumulative store of subjective or experiential learning.

Tacit knowledge

What is Metcalfe's Law?

The value of a network grows roughly in line with the square of the number of its users

Which Tier is the application layer on?

Tier 2

Where are some areas with high costs regarding Enterprise Resource Planning Systems?

Training Testing and Integration Database Conversion

Which of the following is NOT the essential stage of data warehousing process?

Transforming data out of the warehouse model

Which threat may appear to perform a desirable function but actually performs undisclosed malicious functions?

Trojan

Threats are a serious deal and comprises our safety. Which of the following are examples of threats?

Trojan, Worms, Malware

Data must be processed in order to produce information

True

How to minimize the risk of most threats?

Use a firewall

John Hancock partnered with ________, a global wellness company.

Vitality

Which one does NOT belong to the 4 rules in access?

We need to double check the color of header.

_________ is the most recent example of ethical misbehavior in organizations.

Wells Fargo bank

What fonts should you use in typical powerpoints?

What fonts should you use in typical powerpoints?

Which of the following is a privacy issue?

What information about individuals should be kept in databases, and how secure is the information there?

What background color is best for most presentations?

White

You get a new smartphone and throw your old one away without erasing all your data. This is _________ and is an _________ mistake.

a human error; unintentional

Which of the following was NOT used in the cyberattack on Ukraine?

a logic bomb

What is an algorithm?

a set of rules to be followed in performing some operation or task.

You can check your credit report annually for free through TransUnion, Equifax, and Experian. This allows you to catch signs of identity theft early and note any problems in your credit reports. This is an example of an ethical issue that falls into the category of ________.

accuracy

The end product of the _________ stage is a set of system requirements.

analysis

which one of the following should we avoid to use if possible when making powerpoint?

animations

Auditing _________ the computer means verifying processing by checking for known outputs using specific inputs.

around

Overstock's chatbot, called Mila, _________.

automates the simple but time-consuming process of requesting sick leave

Which of the following is NOT a computer threat?

bacteria

You decide to purchase SAP but modify it to handle your specific business processes. This is an example of the ________ approach to ERP implementation.

best-of-breed

The most current form of ransomware demands payment in the form of _________.

bitcoins

You are an executive working for a Fortune 500 company. You want to see how each factory floor worker is performing compared to every other worker. You would look at the ________ wall in the Management Cockpit.

blue

A ________ is a group of eight ________.

byte; bits

malware consist of what type of programming?

codes, scripts, active content

A _________ site is the least expensive option.

cold

Your southern region is not doing very well. You want to know why, so you ask for a special report showing the numbers for the southern region compared to the northern, eastern, and western regions. This is a(n) ________ report.

comparative

Which of the following is NOT a use for data mining?

comparing products

Which short-key is for Re-do?

control + y

Companies purchase digital dossiers to ________.

create customer intimacy

What is the biggest threat faced by computers?

crimeware

Amazon's recommender system is an example of ________.

cross-selling

_________ refers to malicious acts in which attackers use a target's computer systems to cause physical, real-world harm or severe disruption, often to carry out a political agenda.

cyberterrorism

A transaction is any business event that generates ________ worthy of being captured and stored in a database.

data

What is metadata?

data about data

If you want to know what items customers typically buy together so that you can place them next to each other on the shelf, you would be using

data mining

Data reduction is the conversion of raw _______ into a smaller amount of more useful _______.

data; information

All of the following describe the advantages of Database Management Systems except:

decrease in productivity

What is malicious software?

designed to disrupt or deny operation, gather information that leads to loss of privacy or exploitation, gain unauthorized access to system resources, and other abusive behavior.

GIS is a computer-based system for capturing, integrating, manipulating, and displaying data using

digitized maps

A _________ conversion involves shutting the old system off and turning the new system on at a certain point in time.

direct

You use FedEx and UPS to ship your products to customers. This is an example of a(n) ________ activity.

downstream

You are looking at a sales report from last month. You notice one salesperson's numbers are much lower than the rest, so you click on that person's name to get more details on the products they sold last month. You are using the _______ feature of a dashboard.

drill down

The European Union's highest court ruled that ________.

embarrassing material should be removed from search results when requested

_________ is an access control.

encryption

_________ occurs when an unauthorized individual attempts to gain illegal access to organizational information.

espionage

Dashboards evolved from

executive information systems.

Suppose you work for XYZ Corporation. You know you can contribute 6% of your salary to a 401K and the company will match that 100% after 6 years of service because it is in the employee handbook. This is an example of ________.

explicit knowledge

Data management focuses on?

focuses on proper generation, storage, and retrieval of data

Operational CRM systems support _________-office business processes or processes that _________.

front; directly interact with customers

What is the name for the physical components of a computer?

hardware

Which type of text may be formatted to print at the top of every page?

header

Answering the question "did this option work as proposed" occurs in the _____ phase of the IDC.

implementation

Which one is the full name of IT?

information technology

All the information about you in your university's database is a(n) ________.

instance

Packing, assembly, or manufacturing are ________ activities.

internal

SCM systems are ________ systems.

interorganizational

Systems _________ addresses the business problem or business opportunity by means of a feasibility study.

investigation

A(n) ________ report summarizes the performance of critical activities.

key indicator

Typing in your password to access a system is an example of something the user _________.

knows

Organizations typically invest in cloud-based ERP systems because they are _________.

less expensive

For an hour long presentation, the presenter should have prepared a powerpoint with

less than 25 slides

The ________ component of SCM is the most metric-intensive part of the supply chain in which organizations measure quality levels, production output, and worker productivity.

make

Message authentication is a service beyond

message integrity

Databases ________ inconsistency; this means ________.

minimize; various copies of the data do not agree

Normalization is a method for analyzing and reducing a relational database to its most streamlined form to ensure ________ redundancy, ________ data integrity, and optimal processing performance.

minimum; maximum

Which one is not a customer support?

money

Data marts can be implemented ________ compared to data warehouses.

more quickly

_____ is NOT a statistical tool used for predictive analytics.

multidimensional analysis

How to start a new file script in Rstudio?

open a new rscript

Above all, you want to implement the cheapest CRM system available. You are willing to accept any risks associated with this, so you would want to implement a(n) ________ CRM system.

open-source

All of the following are types of computer hardware, Except:

operating system

Europeans and privacy advocates prefer the _________ model of informed consent.

opt-in

The _________ model of informed consent permits the company to collect personal information until the customer specifically requests that the data not be collected.

opt-out

A circle with a "chicken leg" to the entity represents the ________ cardinality symbol.

optional many

A _________ conversion introduces components of the new system in stages.

phased

Organizations must have a strategy for managing all the resources that are involved in meeting customer demand for their product or service. This strategy is developed in the ________ component of SCM.

plan

A _______________ is an underlying computer system on which application programs can run.

platform

You would use optimization or simulation for ______ analytics.

prescriptive

______ analytics require _______ analytics.

prescriptive; predictive

The ________ process originates in the warehouse department and ends in the accounting department.

procurement

The _________ represents the business users and any other stakeholders in the project.

product owner

What language allows us to use words instead of numbers?

programming language

Which of these is NOT a major component of hardware?

programs

which of the following is one of the four basic programming concepts?

programs

What is data?

raw facts

What is End-user data?

raw facts of interest to end user

What is the definition of End-user data?

raw facts of interest to end user

Southwest Airlines utilized a(n) ________ CRM system to rearrange a customer's flight schedule to get to her comatose son.

real-time

A ________ generally describes an entity.

record

Database systems minimize ________.

redundancy

What is a lookup value?

requires only one cell

which step is not the true to resize a shape?

resize shape with "red diamond"

_______ is a decisional role.

resource allocator

In the ________ component of SCM, supply chain managers create a responsive and flexible network for receiving defective, returned, or excess products back from their customers, as well as for supporting customers who have problems with delivered products.

return

Jana is a mobile startup designed to ________.

reward users with data in exchange for collecting their personal information when sampling apps

The pursuit of the "American dream" and our ability to choose our religious orientation is a reflection of the _________ approach.

rights

You recently inherited an Alvin and The Chipmunks "A Chipmunk Christmas" record. Since you don't have a record player, you need to find a way to convert the record into a CD. This is an example of data ________.

rot

The fulfillment process originates in the ________ department and ends in the ________ department.

sales; accounting

Which does NOT fit into the category of "types of Businesses & IT presence"

satellite television

Which of the following is consider a hardware?

screen

You are a jeweler who wants to make sure you have the maximum number of diamonds for sale. You notice that the number of diamonds available drops more when the size is relevant versus when the color is relevant. By comparing these factors, you are conducting a(n) _____ analysis.

sensitivity

What is database?

shared, integrated computer structure that stores a collection of: End-user data: raw facts of interest to end user Metadata: data about data Provides description of data characteristics and relationships in data Complements and expands value of data

What are the mandatory elements on all slides?

slide number

Which one of the following do NOT belong to "6S" rule?

soccer

SaaS is a method of delivering _________ in which a vendor hosts the applications and provides them as a service to customers over a network, typically the internet.

software

_________ collects personal information about users without their consent.

spyware

As a purchasing manager, you have to purchase widgets every week to replenish your inventory. This is a(n) ________ decision.

structured

You are an employee in Inside Sales. This means you take calls and address customer issues like entering orders, updating orders, and providing order status reports. This is a(n) _____ task and a(n) _______ decision.

structured; operational control

Capital One's insourcing initiative meant it had to build its reputation as a _________ company.

technology

________ refers to erratic shifts in orders up and down the supply chain.

the bullwhip effect

You want to make sure your entire organization is using a single data warehouse instead of using a data mart for every department. This is an example of

the development of infrastructure to support enterprise-wide analytics

Data marts are typically associated with

the development of one or a few related analytics applications

Management is a process by which an organization achieves its goals (called ______) through the use of resources (called _______).

the output; inputs

A _________ is an intellectual work that is not based on public information.

trade secret

If you shift your risk by using other means to compensate for the loss like purchasing insurance, you have implemented a risk _________ strategy.

transference

The complier is the

translator

Industry experts estimate that 80-90 percent of data in an organization is ________.

unstructured

Knowledge management is a process that helps organizations manipulate important knowledge that comprises part of the organization's memory, usually in a(n) ________ format.

unstructured

If a company doesn't want to write any computer code, it would choose to ________.

use a prewritten application

With the ________ approach to on-premise ERP implementation, a company implements a standard ERP package using the package's built-in configuration options.

vanilla

Containers are another step in the development of _________ technology.

virtual

_________ is a remote attack requiring user action.

virus

A _________ site typically does not include the actual application the company needs to get the business back up and running immediately.

warm

Which kind of threat is self-replicating?

worms


Related study sets

Finance chapter 6 conceptual questions

View Set

Capitales de Sudamérica, España y Guinea Ecuatorial-OLD

View Set