PLS midterm2
Almost _________ percent of ransomware victims pay the ransom and hackers _________ decrypt the data as promised. 95; do 50; do 95; do not 50; do not
50; do
_________ refers to determining who is responsible for actions that were taken. Accountability Liability Answerability Responsibility
Accountability
_________ did not file comments with the FCC opposing Marriott's Wi-Fi blocking plan. Google Consumer Electronics Association Amazon Microsoft
Amazon
Which of the following is NOT a problem associated with Big Data? Big Data can be structured, unstructured, or semi-structured. Big Data can come from untrusted sources. Big Data lacks quality. Big Data changes.
Big Data can be structured, unstructured, or semi-structured.
The most current form of ransomware demands payment in the form of _________. Bitcoins cash credit cards Paypal transactions
Bitcoins
________ is an approach that integrates various automated factory systems. MRP CIM TPS CRM
CIM(Computer-integrated manufacturing)
________ refers to the maximum number of times an instance of one entity can be associated with an instance in the related entity. Business rules Modality Data dictionary Cardinality
Cardinality
Which of the following is NOT a use for data mining? Comparing products Detecting fraudulent credit card transactions Forecasting bankruptcy Predicting sales
Comparing products
________ is an advantage of cloud-based ERP systems. Cost Recovery Control Security
Cost
________ is the marketing of additional related products to customers based on a previous purchase. Cross-selling Upselling Bundling Downselling
Cross-selling
_________ refers to malicious acts in which attackers use a target's computer systems to cause physical, real-world harm or severe disruption, often to carry out a political agenda. A SCADA attack Identity theft Cyberterrorism Espionage
Cyberterrorism
Hackers would use a botnet to perform a _________. DDoS a Trojan horse a logic bomb virus
DDoS (distributed denial-of-service)
A(n) _________ is located between two firewalls. ERP DMZ anti-malware system spamware detector
DMZ (demilitarized zone)
Ashley Madison's data was first released on the _________ by ________. Web; Anonymous Dark Web; Anonymous Web; The Impact Team Dark Web; The Impact Team
Dark Web; The Impact Team
ERP systems that include administrative, sales, marketing, and HR processes are referred to as _________. ERP III ERP IV ERP II ERP I
ERP II
________ are designed to correct a lack of communication among _________. ERP; TPS FAIS; TPS FAIS; ERP ERP; FAIS
ERP(enterprise resource planning); FAIS(Functional Area Information Systems)
_________ is an access control. Encryption A company gate RFID A firewall
Encryption
_________ occurs when an unauthorized individual attempts to gain illegal access to organizational information. Espionage Alien software Information extortion Identity theft
Espionage
_________ is the third step in the general framework for ethics. Recognize an ethical issue Evaluate alternative actions Make a decision and test it Act and reflect on the outcome of your decision Get the facts
Evaluate alternative actions
Which of the following data is NOT currently collected by usage-based car insurance companies? GPS Speed Time of day Mileage
GPS
Which of the following is an accuracy issue? What information about oneself should an individual be required to reveal to others? How can we ensure that the information will be processed properly and presented accurately to users? What information does a person or an organization have a right to obtain, under what conditions, and with what safeguards? How should we handle illegally copying copyrighted software?
How can we ensure that the information will be processed properly and presented accurately to users?
Which of the following is an accessibility issue? How can we ensure that errors in databases, data transmissions, and data processing are accidental and not intentional? What information about individuals should be kept in databases, and how secure is the information there? How much should companies charge for permitting access to information in their databases? Under what circumstances can one use proprietary databases?
How much should companies charge for permitting access to information in their databases?
Africa collaborated with ________ to stop the Ebola virus outbreak in 2013 and 2014. Google IBM Microsoft Amazon
IBM
Which of the following does NOT contribute to the increasing vulnerability of organizational information resources? Increasing skills necessary to be a computer hacker Smaller, faster, cheaper computers and storage devices Today's interconnected, interdependent, wirelessly networked business environment Lack of management support International organized crime taking over cybercrime
Increasing skills necessary to be a computer hacker
_________ is a legal concept that gives individuals the right to recover the damages done to them by other individuals, organizations, or systems. Responsibility Liability Answerability Accountability
Liability
________ is the customer's potential revenue stream over a number of years. Customer churn Lifetime value Market capitalization Customer life cycle
Lifetime value
________ is the correct evolution of POM planning. ERP ARP MRP MRP ARP ERP ERP MRP MRP II MRP MRP II ERP
MRP MRP II ERP
________ is part of the ________ process and occurs when the company is trying to increase its inventory. Make-to-stock; production Make-to-order; procurement Make-to-order; production Make-to-stock; procurement
Make-to-stock; production
_____ is NOT a statistical tool used for predictive analytics. Data mining Linear regression Logistic regression Multidimensional analysis
Multidimensional analysis
Data marts and data warehouses typically use ________. RFID OLAP OLTP ERP
OLAP (Online Analytical Processing)
If you analyze a data cube, this is an example of using data mining. DSS. OLAP. OLTP.
OLAP. (Online analytical processing)
Most organizations design TPS to process transactions as soon as they occur. This is called _________. batch processing OLAP OLTP source data processing
OLTP (Online Transactional Processing)
______ analytics require _______ analytics. Descriptive; predictive Descriptive; prescriptive Predictive; prescriptive Prescriptive; predictive
Prescriptive; predictive
_________ is the first step in the general framework for ethics. Evaluate alternative actions Make a decision and test it Recognize an ethical issue Get the facts Act and reflect on the outcome of your decision
Recognize an ethical issue
_______ is a decisional role. Analyzer Leader Liaison Resource allocator
Resource allocator
________ is the component of an operational CRM system that automatically records all of the components in a sales transaction process. SFA CMA CIC JIT
SFA (Sales force automation)
________ is the most popular query language used for interacting with a database. RFID ETL SQL TPS
SQL
________ is part of the ________ process and involves sending goods that are in the warehouse to customers. Sell-from-stock; fulfillment Configure-to-order; procurement Sell-from-stock; procurement Configure-to-order; fulfillment
Sell-from-stock; fulfillment
Legacy systems were developed as _________. Silos ERP Integrating systems DSS
Silos
_________ collects personal information about users without their consent. Spyware Marketware Spamware Adware
Spyware
Considering the following tables, ________ is a primary key. Class Table: PID Student Table: Expected Graduation Year Professor Table: Name Student Table: ID
Student Table: ID
________ is an extended ERP module. HR management Financial management Operations management Supply chain management
Supply chain management
A URL that begins with https uses _________. ERP TLS DMZ VPN
TLS (Transport Layer Security)
________ is the cumulative store of subjective or experiential learning. Explicit knowledge Explicit information Tacit knowledge Tacit information
Tacit knowledge
_________ is a remote attack requiring user action. DoS A Trojan horse Virus A logic bomb
Virus
John Hancock partnered with ________, a global wellness company. TotalWellness Medifit Weight Watchers Vitality
Vitality
_________ is the most recent example of ethical misbehavior in organizations. Wells Fargo bank Tyco Enron WorldCom
Wells Fargo bank
Which of the following is a privacy issue? How can we ensure that errors in databases, data transmissions, and data processing are accidental and not intentional? How much should companies charge for permitting access to information in their databases? What information about individuals should be kept in databases, and how secure is the information there? Under what circumstances can one use proprietary databases?
What information about individuals should be kept in databases, and how secure is the information there?
You get a new smartphone and throw your old one away without erasing all your data. This is _________ and is an _________ mistake. social engineering; unintentional social engineering; intentional a human error; unintentional a human error; intentional
a human error; unintentional
Which of the following was NOT used in the cyberattack on Ukraine? a SCADA attack a logic bomb DoS Spear-phishing
a logic bomb
You can check your credit report annually for free through TransUnion, Equifax, and Experian. This allows you to catch signs of identity theft early and note any problems in your credit reports. This is an example of an ethical issue that falls into the category of ________. property privacy accuracy accessibility
accuracy
Auditing _________ the computer means verifying processing by checking for known outputs using specific inputs. through with into around
around
You decide to purchase SAP but modify it to handle your specific business processes. This is an example of the ________ approach to ERP implementation. custom best-of-breed vanilla as-is
best-of-breed
You are an executive working for a Fortune 500 company. You want to see how each factory floor worker is performing compared to every other worker. You would look at the ________ wall in the Management Cockpit. black blue red white
blue
A ________ is a group of eight ________. byte; bits file; fields bit; bytes field; files
byte; bits
A _________ site is the least expensive option. medium cold hot warm
cold
Your southern region is not doing very well. You want to know why, so you ask for a special report showing the numbers for the southern region compared to the northern, eastern, and western regions. This is a(n) ________ report. comparative routine drill-down exception
comparative
Companies purchase digital dossiers to ________. engage in electronic surveillance track their own reputations create customer intimacy evaluate the competition
create customer intimacy
A transaction is any business event that generates ________ worthy of being captured and stored in a database. information wisdom data knowledge
data
If you want to know what items customers typically buy together so that you can place them next to each other on the shelf, you would be using data mining. DSS. OLAP. OLTP.
data mining.
Data reduction is the conversion of raw _______ into a smaller amount of more useful _______. data; information data; knowledge information; data information; knowledge
data; information
The _________ approach states that the morality of an action is based on whether the action itself is right or wrong under a series of rules, rather than based on the consequences of that action. common good deontology utilitarian fairness rights
deontology
GIS is a computer-based system for capturing, integrating, manipulating, and displaying data using analytics. dashboards. digitized maps. solar energy.
digitized maps.
You are looking at a sales report from last month. You notice one salesperson's numbers are much lower than the rest, so you click on that person's name to get more details on the products they sold last month. You are using the _______ feature of a dashboard. CSF drill down exception reporting trend analysis
drill down
The European Union's highest court ruled that ________. publishers need to remove or alter all articles that are no longer relevant court documents should be taken off the Internet after a certain time period people must remove revealing photographs from the web when requested embarrassing material should be removed from search results when requested
embarrassing material should be removed from search results when requested
Dashboards evolved from enterprise resource planning systems. executive information systems. functional area information systems. transaction processing systems.
executive information systems.
Suppose you work for XYZ Corporation. You know you can contribute 6% of your salary to a 401K and the company will match that 100% after 6 years of service because it is in the employee handbook. This is an example of ________. tacit knowledge tacit information explicit information explicit knowledge
explicit knowledge
Operational CRM systems support _________-office business processes or processes that _________. back; do not directly interact with customers back; directly interact with customers front; directly interact with customers front; do not directly interact with customers
front; directly interact with customers
Answering the question "did this option work as proposed" occurs in the _____ phase of the IDC. choice design intelligence implementation
implementation
All the information about you in your university's database is a(n) ________. entity instance database attribute
instance
SCM systems are ________ systems. interorganizational extraorganizational extraorganizational intraorganizational
interorganizational
A(n) ________ report summarizes the performance of critical activities. drill-down key indicator comparative ad hoc
key indicator
Typing in your password to access a system is an example of something the user _________. knows does has is
knows
Organizations typically invest in cloud-based ERP systems because they are _________. less error-prone more secure more accessible less expensive
less expensive
Databases ________ inconsistency; this means ________. maximize; various copies of the data do not agree minimize; various copies of the data do not agree maximize; the same data are stored in multiple locations minimize; the same data are stored in multiple locations
minimize; various copies of the data do not agree
Normalization is a method for analyzing and reducing a relational database to its most streamlined form to ensure ________ redundancy, ________ data integrity, and optimal processing performance. minimum; minimum minimum; maximum maximum; maximum maximum; minimum
minimum; maximum
Data marts can be implemented ________ compared to data warehouses. at the same pace It depends on the situation. less quickly more quickly
more quickly
Europeans and privacy advocates prefer the _________ model of informed consent. sign-out opt-out opt-in sign-up
opt-in
The _________ model of informed consent permits the company to collect personal information until the customer specifically requests that the data not be collected. sign-up opt-out opt-in sign-out
opt-out
A circle with a "chicken leg" to the entity represents the ________ cardinality symbol. mandatory many optional many mandatory single optional single
optional many
You would use optimization or simulation for ______ analytics. descriptive predictive prescriptive useful
prescriptive
The ________ process originates in the warehouse department and ends in the accounting department. production fulfillment procurement marketing
procurement
A ________ generally describes an entity. byte record file field
record
Database systems minimize ________. integrity independence redundancy security
redundancy
Jana is a mobile startup designed to ________. offer free smartphones to people who make less than 20 cents an hour in China give app developers free access to other apps charge users less money to use mobile data than they have to pay their telecommunication company reward users with data in exchange for collecting their personal information when sampling apps
reward users with data in exchange for collecting their personal information when sampling apps
The pursuit of the "American dream" and our ability to choose our religious orientation is a reflection of the _________ approach. rights fairness deontology common good utilitarian
rights
You recently inherited an Alvin and The Chipmunks "A Chipmunk Christmas" record. Since you don't have a record player, you need to find a way to convert the record into a CD. This is an example of data ________. rot clickstreaming degradation scattering
rot
The fulfillment process originates in the ________ department and ends in the ________ department. sales; accounting accounting; sales warehouse; warehouse warehouse; accounting
sales; accounting
You are a jeweler who wants to make sure you have the maximum number of diamonds for sale. You notice that the number of diamonds available drops more when the size is relevant versus when the color is relevant. By comparing these factors, you are conducting a(n) _____ analysis. affinity goal-seeking sensitivity what-if
sensitivity
As a purchasing manager, you have to purchase widgets every week to replenish your inventory. This is a(n) ________ decision. midstructured semistructured structured unstructured
structured
You are an employee in Inside Sales. This means you take calls and address customer issues like entering orders, updating orders, and providing order status reports. This is a(n) _____ task and a(n) _______ decision. structured; management control structured; operational control unstructured; management control unstructured; operational control
structured; operational control
You want to make sure your entire organization is using a single data warehouse instead of using a data mart for every department. This is an example of the development of infrastructure to support enterprise-wide analytics. the development of one or a few related analytics applications. support for maintaining organizational strategy. support for organizational transformation.
the development of infrastructure to support enterprise-wide analytics.
Data marts are typically associated with the development of infrastructure to support enterprise-wide analytics. the development of one or a few related analytics applications. support for maintaining organizational strategy. support for organizational transformation.
the development of one or a few related analytics applications.
Management is a process by which an organization achieves its goals (called ______) through the use of resources (called _______). the input; inputs the input; outputs the output; inputs the output; outputs
the output; inputs
A _________ is an intellectual work that is not based on public information. trade secret copyright patent trademark
trade secret
If you shift your risk by using other means to compensate for the loss like purchasing insurance, you have implemented a risk _________ strategy. transference limitation acceptance avoidance
transference
Industry experts estimate that 80-90 percent of data in an organization is ________. unstructured semi-structured part-structured structured
unstructured
Knowledge management is a process that helps organizations manipulate important knowledge that comprises part of the organization's memory, usually in a(n) ________ format. structured part-structured unstructured semi-structured
unstructured
With the ________ approach to on-premise ERP implementation, a company implements a standard ERP package using the package's built-in configuration options. best-of-breed vanilla custom as-is
vanilla
A _________ site typically does not include the actual application the company needs to get the business back up and running immediately. cold medium warm hot
warm