PLS midterm2

Ace your homework & exams now with Quizwiz!

Almost _________ percent of ransomware victims pay the ransom and hackers _________ decrypt the data as promised. 95; do 50; do 95; do not 50; do not

50; do

_________ refers to determining who is responsible for actions that were taken. Accountability Liability Answerability Responsibility

Accountability

_________ did not file comments with the FCC opposing Marriott's Wi-Fi blocking plan. Google Consumer Electronics Association Amazon Microsoft

Amazon

Which of the following is NOT a problem associated with Big Data? Big Data can be structured, unstructured, or semi-structured. Big Data can come from untrusted sources. Big Data lacks quality. Big Data changes.

Big Data can be structured, unstructured, or semi-structured.

The most current form of ransomware demands payment in the form of _________. Bitcoins cash credit cards Paypal transactions

Bitcoins

________ is an approach that integrates various automated factory systems. MRP CIM TPS CRM

CIM(Computer-integrated manufacturing)

________ refers to the maximum number of times an instance of one entity can be associated with an instance in the related entity. Business rules Modality Data dictionary Cardinality

Cardinality

Which of the following is NOT a use for data mining? Comparing products Detecting fraudulent credit card transactions Forecasting bankruptcy Predicting sales

Comparing products

________ is an advantage of cloud-based ERP systems. Cost Recovery Control Security

Cost

________ is the marketing of additional related products to customers based on a previous purchase. Cross-selling Upselling Bundling Downselling

Cross-selling

_________ refers to malicious acts in which attackers use a target's computer systems to cause physical, real-world harm or severe disruption, often to carry out a political agenda. A SCADA attack Identity theft Cyberterrorism Espionage

Cyberterrorism

Hackers would use a botnet to perform a _________. DDoS a Trojan horse a logic bomb virus

DDoS (distributed denial-of-service)

A(n) _________ is located between two firewalls. ERP DMZ anti-malware system spamware detector

DMZ (demilitarized zone)

Ashley Madison's data was first released on the _________ by ________. Web; Anonymous Dark Web; Anonymous Web; The Impact Team Dark Web; The Impact Team

Dark Web; The Impact Team

ERP systems that include administrative, sales, marketing, and HR processes are referred to as _________. ERP III ERP IV ERP II ERP I

ERP II

________ are designed to correct a lack of communication among _________. ERP; TPS FAIS; TPS FAIS; ERP ERP; FAIS

ERP(enterprise resource planning); FAIS(Functional Area Information Systems)

_________ is an access control. Encryption A company gate RFID A firewall

Encryption

_________ occurs when an unauthorized individual attempts to gain illegal access to organizational information. Espionage Alien software Information extortion Identity theft

Espionage

_________ is the third step in the general framework for ethics. Recognize an ethical issue Evaluate alternative actions Make a decision and test it Act and reflect on the outcome of your decision Get the facts

Evaluate alternative actions

Which of the following data is NOT currently collected by usage-based car insurance companies? GPS Speed Time of day Mileage

GPS

Which of the following is an accuracy issue? What information about oneself should an individual be required to reveal to others? How can we ensure that the information will be processed properly and presented accurately to users? What information does a person or an organization have a right to obtain, under what conditions, and with what safeguards? How should we handle illegally copying copyrighted software?

How can we ensure that the information will be processed properly and presented accurately to users?

Which of the following is an accessibility issue? How can we ensure that errors in databases, data transmissions, and data processing are accidental and not intentional? What information about individuals should be kept in databases, and how secure is the information there? How much should companies charge for permitting access to information in their databases? Under what circumstances can one use proprietary databases?

How much should companies charge for permitting access to information in their databases?

Africa collaborated with ________ to stop the Ebola virus outbreak in 2013 and 2014. Google IBM Microsoft Amazon

IBM

Which of the following does NOT contribute to the increasing vulnerability of organizational information resources? Increasing skills necessary to be a computer hacker Smaller, faster, cheaper computers and storage devices Today's interconnected, interdependent, wirelessly networked business environment Lack of management support International organized crime taking over cybercrime

Increasing skills necessary to be a computer hacker

_________ is a legal concept that gives individuals the right to recover the damages done to them by other individuals, organizations, or systems. Responsibility Liability Answerability Accountability

Liability

________ is the customer's potential revenue stream over a number of years. Customer churn Lifetime value Market capitalization Customer life cycle

Lifetime value

________ is the correct evolution of POM planning. ERP ARP MRP MRP ARP ERP ERP MRP MRP II MRP MRP II ERP

MRP MRP II ERP

________ is part of the ________ process and occurs when the company is trying to increase its inventory. Make-to-stock; production Make-to-order; procurement Make-to-order; production Make-to-stock; procurement

Make-to-stock; production

_____ is NOT a statistical tool used for predictive analytics. Data mining Linear regression Logistic regression Multidimensional analysis

Multidimensional analysis

Data marts and data warehouses typically use ________. RFID OLAP OLTP ERP

OLAP (Online Analytical Processing)

If you analyze a data cube, this is an example of using data mining. DSS. OLAP. OLTP.

OLAP. (Online analytical processing)

Most organizations design TPS to process transactions as soon as they occur. This is called _________. batch processing OLAP OLTP source data processing

OLTP (Online Transactional Processing)

______ analytics require _______ analytics. Descriptive; predictive Descriptive; prescriptive Predictive; prescriptive Prescriptive; predictive

Prescriptive; predictive

_________ is the first step in the general framework for ethics. Evaluate alternative actions Make a decision and test it Recognize an ethical issue Get the facts Act and reflect on the outcome of your decision

Recognize an ethical issue

_______ is a decisional role. Analyzer Leader Liaison Resource allocator

Resource allocator

________ is the component of an operational CRM system that automatically records all of the components in a sales transaction process. SFA CMA CIC JIT

SFA (Sales force automation)

________ is the most popular query language used for interacting with a database. RFID ETL SQL TPS

SQL

________ is part of the ________ process and involves sending goods that are in the warehouse to customers. Sell-from-stock; fulfillment Configure-to-order; procurement Sell-from-stock; procurement Configure-to-order; fulfillment

Sell-from-stock; fulfillment

Legacy systems were developed as _________. Silos ERP Integrating systems DSS

Silos

_________ collects personal information about users without their consent. Spyware Marketware Spamware Adware

Spyware

Considering the following tables, ________ is a primary key. Class Table: PID Student Table: Expected Graduation Year Professor Table: Name Student Table: ID

Student Table: ID

________ is an extended ERP module. HR management Financial management Operations management Supply chain management

Supply chain management

A URL that begins with https uses _________. ERP TLS DMZ VPN

TLS (Transport Layer Security)

________ is the cumulative store of subjective or experiential learning. Explicit knowledge Explicit information Tacit knowledge Tacit information

Tacit knowledge

_________ is a remote attack requiring user action. DoS A Trojan horse Virus A logic bomb

Virus

John Hancock partnered with ________, a global wellness company. TotalWellness Medifit Weight Watchers Vitality

Vitality

_________ is the most recent example of ethical misbehavior in organizations. Wells Fargo bank Tyco Enron WorldCom

Wells Fargo bank

Which of the following is a privacy issue? How can we ensure that errors in databases, data transmissions, and data processing are accidental and not intentional? How much should companies charge for permitting access to information in their databases? What information about individuals should be kept in databases, and how secure is the information there? Under what circumstances can one use proprietary databases?

What information about individuals should be kept in databases, and how secure is the information there?

You get a new smartphone and throw your old one away without erasing all your data. This is _________ and is an _________ mistake. social engineering; unintentional social engineering; intentional a human error; unintentional a human error; intentional

a human error; unintentional

Which of the following was NOT used in the cyberattack on Ukraine? a SCADA attack a logic bomb DoS Spear-phishing

a logic bomb

You can check your credit report annually for free through TransUnion, Equifax, and Experian. This allows you to catch signs of identity theft early and note any problems in your credit reports. This is an example of an ethical issue that falls into the category of ________. property privacy accuracy accessibility

accuracy

Auditing _________ the computer means verifying processing by checking for known outputs using specific inputs. through with into around

around

You decide to purchase SAP but modify it to handle your specific business processes. This is an example of the ________ approach to ERP implementation. custom best-of-breed vanilla as-is

best-of-breed

You are an executive working for a Fortune 500 company. You want to see how each factory floor worker is performing compared to every other worker. You would look at the ________ wall in the Management Cockpit. black blue red white

blue

A ________ is a group of eight ________. byte; bits file; fields bit; bytes field; files

byte; bits

A _________ site is the least expensive option. medium cold hot warm

cold

Your southern region is not doing very well. You want to know why, so you ask for a special report showing the numbers for the southern region compared to the northern, eastern, and western regions. This is a(n) ________ report. comparative routine drill-down exception

comparative

Companies purchase digital dossiers to ________. engage in electronic surveillance track their own reputations create customer intimacy evaluate the competition

create customer intimacy

A transaction is any business event that generates ________ worthy of being captured and stored in a database. information wisdom data knowledge

data

If you want to know what items customers typically buy together so that you can place them next to each other on the shelf, you would be using data mining. DSS. OLAP. OLTP.

data mining.

Data reduction is the conversion of raw _______ into a smaller amount of more useful _______. data; information data; knowledge information; data information; knowledge

data; information

The _________ approach states that the morality of an action is based on whether the action itself is right or wrong under a series of rules, rather than based on the consequences of that action. common good deontology utilitarian fairness rights

deontology

GIS is a computer-based system for capturing, integrating, manipulating, and displaying data using analytics. dashboards. digitized maps. solar energy.

digitized maps.

You are looking at a sales report from last month. You notice one salesperson's numbers are much lower than the rest, so you click on that person's name to get more details on the products they sold last month. You are using the _______ feature of a dashboard. CSF drill down exception reporting trend analysis

drill down

The European Union's highest court ruled that ________. publishers need to remove or alter all articles that are no longer relevant court documents should be taken off the Internet after a certain time period people must remove revealing photographs from the web when requested embarrassing material should be removed from search results when requested

embarrassing material should be removed from search results when requested

Dashboards evolved from enterprise resource planning systems. executive information systems. functional area information systems. transaction processing systems.

executive information systems.

Suppose you work for XYZ Corporation. You know you can contribute 6% of your salary to a 401K and the company will match that 100% after 6 years of service because it is in the employee handbook. This is an example of ________. tacit knowledge tacit information explicit information explicit knowledge

explicit knowledge

Operational CRM systems support _________-office business processes or processes that _________. back; do not directly interact with customers back; directly interact with customers front; directly interact with customers front; do not directly interact with customers

front; directly interact with customers

Answering the question "did this option work as proposed" occurs in the _____ phase of the IDC. choice design intelligence implementation

implementation

All the information about you in your university's database is a(n) ________. entity instance database attribute

instance

SCM systems are ________ systems. interorganizational extraorganizational extraorganizational intraorganizational

interorganizational

A(n) ________ report summarizes the performance of critical activities. drill-down key indicator comparative ad hoc

key indicator

Typing in your password to access a system is an example of something the user _________. knows does has is

knows

Organizations typically invest in cloud-based ERP systems because they are _________. less error-prone more secure more accessible less expensive

less expensive

Databases ________ inconsistency; this means ________. maximize; various copies of the data do not agree minimize; various copies of the data do not agree maximize; the same data are stored in multiple locations minimize; the same data are stored in multiple locations

minimize; various copies of the data do not agree

Normalization is a method for analyzing and reducing a relational database to its most streamlined form to ensure ________ redundancy, ________ data integrity, and optimal processing performance. minimum; minimum minimum; maximum maximum; maximum maximum; minimum

minimum; maximum

Data marts can be implemented ________ compared to data warehouses. at the same pace It depends on the situation. less quickly more quickly

more quickly

Europeans and privacy advocates prefer the _________ model of informed consent. sign-out opt-out opt-in sign-up

opt-in

The _________ model of informed consent permits the company to collect personal information until the customer specifically requests that the data not be collected. sign-up opt-out opt-in sign-out

opt-out

A circle with a "chicken leg" to the entity represents the ________ cardinality symbol. mandatory many optional many mandatory single optional single

optional many

You would use optimization or simulation for ______ analytics. descriptive predictive prescriptive useful

prescriptive

The ________ process originates in the warehouse department and ends in the accounting department. production fulfillment procurement marketing

procurement

A ________ generally describes an entity. byte record file field

record

Database systems minimize ________. integrity independence redundancy security

redundancy

Jana is a mobile startup designed to ________. offer free smartphones to people who make less than 20 cents an hour in China give app developers free access to other apps charge users less money to use mobile data than they have to pay their telecommunication company reward users with data in exchange for collecting their personal information when sampling apps

reward users with data in exchange for collecting their personal information when sampling apps

The pursuit of the "American dream" and our ability to choose our religious orientation is a reflection of the _________ approach. rights fairness deontology common good utilitarian

rights

You recently inherited an Alvin and The Chipmunks "A Chipmunk Christmas" record. Since you don't have a record player, you need to find a way to convert the record into a CD. This is an example of data ________. rot clickstreaming degradation scattering

rot

The fulfillment process originates in the ________ department and ends in the ________ department. sales; accounting accounting; sales warehouse; warehouse warehouse; accounting

sales; accounting

You are a jeweler who wants to make sure you have the maximum number of diamonds for sale. You notice that the number of diamonds available drops more when the size is relevant versus when the color is relevant. By comparing these factors, you are conducting a(n) _____ analysis. affinity goal-seeking sensitivity what-if

sensitivity

As a purchasing manager, you have to purchase widgets every week to replenish your inventory. This is a(n) ________ decision. midstructured semistructured structured unstructured

structured

You are an employee in Inside Sales. This means you take calls and address customer issues like entering orders, updating orders, and providing order status reports. This is a(n) _____ task and a(n) _______ decision. structured; management control structured; operational control unstructured; management control unstructured; operational control

structured; operational control

You want to make sure your entire organization is using a single data warehouse instead of using a data mart for every department. This is an example of the development of infrastructure to support enterprise-wide analytics. the development of one or a few related analytics applications. support for maintaining organizational strategy. support for organizational transformation.

the development of infrastructure to support enterprise-wide analytics.

Data marts are typically associated with the development of infrastructure to support enterprise-wide analytics. the development of one or a few related analytics applications. support for maintaining organizational strategy. support for organizational transformation.

the development of one or a few related analytics applications.

Management is a process by which an organization achieves its goals (called ______) through the use of resources (called _______). the input; inputs the input; outputs the output; inputs the output; outputs

the output; inputs

A _________ is an intellectual work that is not based on public information. trade secret copyright patent trademark

trade secret

If you shift your risk by using other means to compensate for the loss like purchasing insurance, you have implemented a risk _________ strategy. transference limitation acceptance avoidance

transference

Industry experts estimate that 80-90 percent of data in an organization is ________. unstructured semi-structured part-structured structured

unstructured

Knowledge management is a process that helps organizations manipulate important knowledge that comprises part of the organization's memory, usually in a(n) ________ format. structured part-structured unstructured semi-structured

unstructured

With the ________ approach to on-premise ERP implementation, a company implements a standard ERP package using the package's built-in configuration options. best-of-breed vanilla custom as-is

vanilla

A _________ site typically does not include the actual application the company needs to get the business back up and running immediately. cold medium warm hot

warm


Related study sets

CIS 100 Chapter 7 :End - of - Chapter Quiz

View Set

Smart Book Chapter 4 Accounting 2110

View Set

Abeka Health 9th Grade Reading Quiz L

View Set

Business Law Chapter 22 (minimum)

View Set

biology semester 2 multiple choice

View Set