Practice Exam 3 Flashcards

(50 cards)

1
Q

Social networking procedures are more informal for social media (SM) sponsors than they are for social networking users.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Faulty service excludes problems that result due to incorrect data modification.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

It is better to have data with too coarse a granularity than too fine.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Social CRM supports those customers who are likely to generate the most business.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Dynamic reports are business intelligence (BI) documents that are updated at the time they are requested.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Social media has been widely used in businesses-to-consumer (B2C) relationships to market product to end users.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

7) Usurpation occurs when computer criminals invade a computer system and replace legitimate programs with their own unauthorized ones.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The three primary activities in the business intelligence (BI) process are to acquire data, perform analysis, and publish results.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Cookies enable an individual to access Web sites without having to sign in every time.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Capital is defined as the investment of resources for future profit.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Technical safeguards involve the hardware and software components of an information system.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

When a person attends a business function for the purpose of meeting people and reinforcing relationships, he or she is investing in his or her social capital.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Mobile ad clicks are more effective, on average, than PC clicks.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Natural disasters present the largest risk for infrastructure loss.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

In supervised data mining technique, a model is developed after the analysis.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Data acquisition is the process of creating business intelligence.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Knowledge management was done only after the advent of social media.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

When problematic content causes an organization to do something positive as a result, it is best for the organization to ignore the issue without responding to the content.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

FRM analysis considers how recently (R) a customer ordered, how fast (F) the order was delivered, and how much margin (M) the company made on the order.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A drawback associated with OLAP reports is their inability to let users drill down into the data.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

One of the personal security safeguards is to use https at trusted, reputable vendors.

22
Q

Encryption is an example of a technical safeguard.

23
Q

A Trojan horse is a virus that masquerades as a useful program or file.

24
Q

Total sales, average sales, and average cost are examples of dimensions used in an OLAP report.

25
Neural networks are popular unsupervised data mining techniques used to predict values and make classifications.
False
26
Name a dynamic, social media-based CRM process.
Social CRM
27
Social CRM is a _____ process
unstructured and uncontrolled
28
_______ is a technique for intercepting computer communications through a physical connection to a network or without a physical connection in the case of wireless networks.
Sniffing
29
_______ activities are supported by structured process.
Operations and manufacturing
30
Name a significant risk of using social media for inbound and outbound logistics?
loss of privacy
31
Name a likely result of hacking.
an unauthorized transaction from a user's credit card
32
Problematic operational data is termed as ________.
dirty data
33
A student invests money and time in a business administration course. In this example, the student invests in ________.
human capital
34
Surveys suggest that some organizations do not report all their computer crime losses, and some will not report such losses at all.
True
35
Purchased operational data often contains missing elements.
True
36
equation that represents the value of social capital.
Number of Relationships × Relationship Strength × Entity Resources
37
________ are small files that enables a browser to access Web sites without having to sign in every time.
cookies
38
Most ads on social media generate revenue only when customers click on them.
True
39
Removing and disabling ________ that may contain sensitive security data presents an excellent example of the trade-off between improved security and cost.
cookies
40
Metrics that don’t improve one’s decision making skills are commonly referred to as ________ metrics.
vanity
41
A ________ takes data from the data manufacturers, cleans and processes the data, and locates the data on the shelves.
data warehouse
42
In information security,Organizations should implement safeguards that balance the trade-off between risk and cost.
True
43
Reporting applications refer to business applications that input data from one or more sources and applies reporting operations to that data to produce business intelligence.
True
44
what is used for bio-metric authentication?
facial features
45
U.S. Steel Corp. is a well-known steel manufacturing company. SAMCROW, one of the customers of U.S. Steel Corp. holds an RFM score of 111. Which of the following characteristics relates SAMCROW with its RFM score?
SAMCROW has ordered recently and orders frequently, and it orders the most expensive goods.
46
A sales team should attempt to up-sell more expensive products to a customer who has an RFM score of ________.
113
47
what accurately defines a dimension in an OLAP report?
It is a characteristic of a measure.
48
A ________ is a hierarchical arrangement of criteria that predict a classification or a value
decision tree
49
Knowledge management (KM) benefits organizations because it ________.
improves process quality and increases team strength
50
________ are information systems that support the management and delivery of documents including reports, Web pages, and other expressions of employee knowledge.
Content Management Systems (CMS)