Practice Exam 3 Flashcards

1
Q

Social networking procedures are more informal for social media (SM) sponsors than they are for social networking users.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Faulty service excludes problems that result due to incorrect data modification.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

It is better to have data with too coarse a granularity than too fine.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Social CRM supports those customers who are likely to generate the most business.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Dynamic reports are business intelligence (BI) documents that are updated at the time they are requested.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Social media has been widely used in businesses-to-consumer (B2C) relationships to market product to end users.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

7) Usurpation occurs when computer criminals invade a computer system and replace legitimate programs with their own unauthorized ones.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The three primary activities in the business intelligence (BI) process are to acquire data, perform analysis, and publish results.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Cookies enable an individual to access Web sites without having to sign in every time.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Capital is defined as the investment of resources for future profit.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Technical safeguards involve the hardware and software components of an information system.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

When a person attends a business function for the purpose of meeting people and reinforcing relationships, he or she is investing in his or her social capital.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Mobile ad clicks are more effective, on average, than PC clicks.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Natural disasters present the largest risk for infrastructure loss.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

In supervised data mining technique, a model is developed after the analysis.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Data acquisition is the process of creating business intelligence.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Knowledge management was done only after the advent of social media.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

When problematic content causes an organization to do something positive as a result, it is best for the organization to ignore the issue without responding to the content.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

FRM analysis considers how recently (R) a customer ordered, how fast (F) the order was delivered, and how much margin (M) the company made on the order.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A drawback associated with OLAP reports is their inability to let users drill down into the data.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

One of the personal security safeguards is to use https at trusted, reputable vendors.

A

True

22
Q

Encryption is an example of a technical safeguard.

A

True

23
Q

A Trojan horse is a virus that masquerades as a useful program or file.

A

True

24
Q

Total sales, average sales, and average cost are examples of dimensions used in an OLAP report.

A

False

25
Q

Neural networks are popular unsupervised data mining techniques used to predict values and make classifications.

A

False

26
Q

Name a dynamic, social media-based CRM process.

A

Social CRM

27
Q

Social CRM is a _____ process

A

unstructured and uncontrolled

28
Q

_______ is a technique for intercepting computer communications through a physical connection to a network or without a physical connection in the case of wireless networks.

A

Sniffing

29
Q

_______ activities are supported by structured process.

A

Operations and manufacturing

30
Q

Name a significant risk of using social media for inbound and outbound logistics?

A

loss of privacy

31
Q

Name a likely result of hacking.

A

an unauthorized transaction from a user’s credit card

32
Q

Problematic operational data is termed as ________.

A

dirty data

33
Q

A student invests money and time in a business administration course. In this example, the student invests in ________.

A

human capital

34
Q

Surveys suggest that some organizations do not report all their computer crime losses, and some will not report such losses at all.

A

True

35
Q

Purchased operational data often contains missing elements.

A

True

36
Q

equation that represents the value of social capital.

A

Number of Relationships × Relationship Strength × Entity Resources

37
Q

________ are small files that enables a browser to access Web sites without having to sign in every time.

A

cookies

38
Q

Most ads on social media generate revenue only when customers click on them.

A

True

39
Q

Removing and disabling ________ that may contain sensitive security data presents an excellent example of the trade-off between improved security and cost.

A

cookies

40
Q

Metrics that don’t improve one’s decision making skills are commonly referred to as ________ metrics.

A

vanity

41
Q

A ________ takes data from the data manufacturers, cleans and processes the data, and locates the data on the shelves.

A

data warehouse

42
Q

In information security,Organizations should implement safeguards that balance the trade-off between risk and cost.

A

True

43
Q

Reporting applications refer to business applications that input data from one or more sources and applies reporting operations to that data to produce business intelligence.

A

True

44
Q

what is used for bio-metric authentication?

A

facial features

45
Q

U.S. Steel Corp. is a well-known steel manufacturing company. SAMCROW, one of the customers of U.S. Steel Corp. holds an RFM score of 111. Which of the following characteristics relates SAMCROW with its RFM score?

A

SAMCROW has ordered recently and orders frequently, and it orders the most expensive goods.

46
Q

A sales team should attempt to up-sell more expensive products to a customer who has an RFM score of ________.

A

113

47
Q

what accurately defines a dimension in an OLAP report?

A

It is a characteristic of a measure.

48
Q

A ________ is a hierarchical arrangement of criteria that predict a classification or a value

A

decision tree

49
Q

Knowledge management (KM) benefits organizations because it ________.

A

improves process quality and increases team strength

50
Q

________ are information systems that support the management and delivery of documents including reports, Web pages, and other expressions of employee knowledge.

A

Content Management Systems (CMS)