Practice Exam 3 Flashcards
Social networking procedures are more informal for social media (SM) sponsors than they are for social networking users.
False
Faulty service excludes problems that result due to incorrect data modification.
False
It is better to have data with too coarse a granularity than too fine.
False
Social CRM supports those customers who are likely to generate the most business.
False
Dynamic reports are business intelligence (BI) documents that are updated at the time they are requested.
True
Social media has been widely used in businesses-to-consumer (B2C) relationships to market product to end users.
True
7) Usurpation occurs when computer criminals invade a computer system and replace legitimate programs with their own unauthorized ones.
True
The three primary activities in the business intelligence (BI) process are to acquire data, perform analysis, and publish results.
True
Cookies enable an individual to access Web sites without having to sign in every time.
True
Capital is defined as the investment of resources for future profit.
True
Technical safeguards involve the hardware and software components of an information system.
True
When a person attends a business function for the purpose of meeting people and reinforcing relationships, he or she is investing in his or her social capital.
True
Mobile ad clicks are more effective, on average, than PC clicks.
False
Natural disasters present the largest risk for infrastructure loss.
True
In supervised data mining technique, a model is developed after the analysis.
False
Data acquisition is the process of creating business intelligence.
False
Knowledge management was done only after the advent of social media.
False
When problematic content causes an organization to do something positive as a result, it is best for the organization to ignore the issue without responding to the content.
False
FRM analysis considers how recently (R) a customer ordered, how fast (F) the order was delivered, and how much margin (M) the company made on the order.
False
A drawback associated with OLAP reports is their inability to let users drill down into the data.
False
One of the personal security safeguards is to use https at trusted, reputable vendors.
True
Encryption is an example of a technical safeguard.
True
A Trojan horse is a virus that masquerades as a useful program or file.
True
Total sales, average sales, and average cost are examples of dimensions used in an OLAP report.
False
Neural networks are popular unsupervised data mining techniques used to predict values and make classifications.
False
Name a dynamic, social media-based CRM process.
Social CRM
Social CRM is a _____ process
unstructured and uncontrolled
_______ is a technique for intercepting computer communications through a physical connection to a network or without a physical connection in the case of wireless networks.
Sniffing
_______ activities are supported by structured process.
Operations and manufacturing
Name a significant risk of using social media for inbound and outbound logistics?
loss of privacy
Name a likely result of hacking.
an unauthorized transaction from a user’s credit card
Problematic operational data is termed as ________.
dirty data
A student invests money and time in a business administration course. In this example, the student invests in ________.
human capital
Surveys suggest that some organizations do not report all their computer crime losses, and some will not report such losses at all.
True
Purchased operational data often contains missing elements.
True
equation that represents the value of social capital.
Number of Relationships × Relationship Strength × Entity Resources
________ are small files that enables a browser to access Web sites without having to sign in every time.
cookies
Most ads on social media generate revenue only when customers click on them.
True
Removing and disabling ________ that may contain sensitive security data presents an excellent example of the trade-off between improved security and cost.
cookies
Metrics that don’t improve one’s decision making skills are commonly referred to as ________ metrics.
vanity
A ________ takes data from the data manufacturers, cleans and processes the data, and locates the data on the shelves.
data warehouse
In information security,Organizations should implement safeguards that balance the trade-off between risk and cost.
True
Reporting applications refer to business applications that input data from one or more sources and applies reporting operations to that data to produce business intelligence.
True
what is used for bio-metric authentication?
facial features
U.S. Steel Corp. is a well-known steel manufacturing company. SAMCROW, one of the customers of U.S. Steel Corp. holds an RFM score of 111. Which of the following characteristics relates SAMCROW with its RFM score?
SAMCROW has ordered recently and orders frequently, and it orders the most expensive goods.
A sales team should attempt to up-sell more expensive products to a customer who has an RFM score of ________.
113
what accurately defines a dimension in an OLAP report?
It is a characteristic of a measure.
A ________ is a hierarchical arrangement of criteria that predict a classification or a value
decision tree
Knowledge management (KM) benefits organizations because it ________.
improves process quality and increases team strength
________ are information systems that support the management and delivery of documents including reports, Web pages, and other expressions of employee knowledge.
Content Management Systems (CMS)