Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
79 Cards in this Set
- Front
- Back
Which of the following statements is a feature of social media providers? |
They use elastic, cloud-based servers to host a social media presence |
|
Being linked to a network of highly regarded contacts is a form of what? |
Social credential |
|
Which of the following indicates of risk of social media and human resources? |
Connection data |
|
What indicates a risk of using social media in human resources |
Making errors in forming conclusions about employees do social media |
|
Since it's inception, social media has been widely used to market products to end-users in what? |
Business-to-consumer relationships |
|
What refers to data and responses to data that are contributed by users and social media sponsors? |
Content data |
|
What is a dynamic social media process of employing users to participate in product design or product redesign? |
Crowdsourcing |
|
Social media_____are formed based on mutual interests and transcend familial, geographic, and organizational boundaries. |
Communities |
|
A_______is a statement that delineates employees rights and responsibilities in an organization. |
Social media policy |
|
Value chains determine_____. |
Structured business processes |
|
A person gain social capital by____. |
Adding more friends |
|
That forms that enabled the creation of social networks, or social relationships among people with common interests, are offered by social media_____. |
Providers |
|
Patronizing responses to comments from content contributors can generate a___. |
Strong backlash |
|
What is a use of social media in human resources? |
It is used for recruiting candidates |
|
Which of the following statements is true of using social media to advance organizational strategies? |
Identifying the target audience helps organizations focus it's marketing efforts |
|
____Indicate whether an organization has achieved its goals. |
Success metrics |
|
A___refers to a content structure employed by enterprise social networks (ESNs) that emerges from the processing of many user tags. |
Folksonomy |
|
The process of creating value from intellectual capital and sharing that knowledge with employees, managers, suppliers, customers, and others who need it is called ____. |
Knowledge management |
|
What statement is true of the content management application alternatives? |
Organizations develop an in-house system to track machine maintenance procedures |
|
____Is the process of delivering business intelligence to users without any requests from the users. |
Push publishing |
|
What is true of BigData? |
BigData refers to data sets that are at least petabyte in size |
|
A____is designed to extract data from operational systems and other sources, clean the data, and store and catalog that data for processing by business intelligence tools. |
Data warehouse |
|
What problem is particularly common for data that has been gathered overtime? |
Lack of consistency |
|
The goal of___, a type of business intelligence analysis, is to create information about past performance. |
Reporting analysis |
|
The____ of business intelligence servers maintains metadata about the authorized allocation of business intelligence results to uses |
Management function |
|
What is true of unsupervised Data mining? |
Analysts create hypotheses only after performing an analysis |
|
What is true of data granularity? |
It can be to fine or two corse and also have the wrong granularity |
|
Users in data mart obtain data that pertain to a particular business function from a___. |
Data warehouse |
|
The more attributes there are in a sample data, the easier it is to build a model that fits the sample data, but that is worthless as a predictor. What explains this phenomenon? |
The curse of dimensionality |
|
_____Is an unsupervised data mining technique in which statistical techniques identify groups of entities that have similar characteristics. |
Cluster analysis |
|
The source, format, assumptions and constraints, and other facts concerning certain data are called_____. |
Metadata |
|
____Are user requests for particular business intelligence results on a particular schedule or response to particular events. |
Subscriptions |
|
The results generated in the map phase are combined in the_____phase. |
Reduce |
|
___Reports are business intelligence documents that are updated at the time they're requested. |
Dynamic |
|
____Is an open source program supported by the Apache foundation that manages thousands of computers in the implements mapreduce |
Hadoop |
|
What is true of a data warehouse? |
A data warehouse is larger than a Data mart |
|
What is true of business intelligence (BI) systems? |
Business intelligence systems analyzing organizations past performance to make predictions |
|
_____Are business intelligence documents that are fixed at the time of creation and do not change |
Static reports |
|
_______Requires users to request business intelligence results |
Pool publishing |
|
____Are small files that browsers store on users computers when they visit web sites |
Cookies |
|
An_____ includes how employees should react to security problems, whom they should contact, the reports they should make, and steps they can take to reduce further loss |
Incident- response plan |
|
____A site means to take extraordinary measures to reduce systems vulnerability |
Hardening |
|
Every information system today should require users to sign on with a username and a password. In this case, which of the following functions is performed by the users password? |
Authentication |
|
_____Refers to an organization wide function that is in charge of developing data policies and enforcing data standards |
Data administration |
|
What is true of financial losses due to computer crimes? |
All studies on the costs of computer crimes are based on surveys |
|
Davian, a professional hacker, tries every possible combination of characters to crack his victims email password. Using this technique, he can crack a six character password either upper or lower case letters in about five minutes. What technique is this to gain access to his victims email? |
Brute force attack |
|
Most secure communications over the Internet use a protocol called_______. |
HTTPS |
|
A person calls the Stark residence and pretends to represent a credit card company. He asked Ms. Stark to confirm her credit card number. This is an examples of ______. |
Pretexting |
|
A_____examines the source address, destination address, and other data of a message and determines whether to let that message pass |
Packet filtering firewall |
|
Which of the following is a technical safeguard against security threats? |
Firewall |
|
A____sits outside an organizational network and is the first device the Internet traffic encounters |
Perimeter firewall |
|
What is sure of symmetric encryption? |
It uses the same key for both encoding and decoding |
|
What encryption type is used by the secure sockets layer protocol? |
Public key encryption |
|
Thomas is responsible for creating backup copies of information in the system. He also works along with IT personnel to ensure that the backups are valid and that effective member procedures exist. Thomas is involved in establishing___. |
Data safeguards |
|
What is a synonym for phishing? |
Email spoofing |
|
The procedure of entrusting a party with a copy of an encryption key that can be used in case the actual key is lost or destroyed is called_____. |
Key escrow |
|
____occurs when computer criminals invade a computer System and replace legitimate programs with their own unauthorized ones |
Usurpation |
|
What is considered a personal security safeguard? |
Removing high-value assets for computers |
|
With HTTPS, data are encrypted using the protocol called the____. |
Secure sockets layer (SSL) |
|
What is a right of a user of information systems (I S)? |
Contributing to requirements for a new system features and functions |
|
Which of the following is an advantage of outsourcing information systems? |
It can be an easy way to gain expertise otherwise not known |
|
The______groups purpose is to protect information assets by establishing standards and management practices and policies |
Data administration |
|
Which of the following staff function is at the top most level of typical senior-level reporting relationship? |
Chief operating officer |
|
In_____, hardware and both operating system and application software are leased |
Software as a service (SaaS) |
|
What is true of the alignment between information systems and organizational strategies? |
Information systems must evolve with changes made in organizational strategies |
|
A_______ Committee is a group of senior managers from the major business functions that works with the chief information officer to set information systems (IS) priorities and decide major IS projects and alternatives |
Steering |
|
_______Refers to the leasing of hardware with preinstalled operating systems |
Platform as a service (PaaS) |
|
What is a risk of outsourcing information systems? |
Vendors can gain access to critical knowledge of the outsourcing company |
|
The_______group investigates new information systems and determines how the organization can benefit from them |
Technology |
|
An organization that wishes to leverage the power of social media and elastic cloud opportunities to help accomplish its goals and objectives should ideally turn to the________ Group within its IT department for information |
Technology |
|
What is true of the development group of companies information systems department? |
The size and structure of the group depends on the whether programs are developed in-house or outsourced |
|
In organizations that operate significant non-accounting information systems, such as manufacturers, and reporting arrangement wherein the chief information officer reports to the_______ is more common and effective |
Chief executive officer |
|
In organizations were primary information systems support only accounting activities, a reporting arrangement wherein the chief information officer reports to the______ is practical |
Chief financial officer |
|
The_____ Group within the information systems department manages the process of creating new information systems as well as maintaining existing information system |
Development |
|
Which of the following is true of the development group if the company's information systems department is primarily by programmers, test engineers, technical writers, and other development personnel? |
The company develops in-house |
|
A_______designs and writes computer codes |
Programmer |
|
Which of the following is a responsibility of an information systems user? |
Following security and back up procedures |
|
In order to accomplish organizational goals and objectives, an organizations information systems must be in line with its_____. |
Competitive strategy |
|
A________ performs a wide range of activities such as programming, testing, database design, communications and networks, project management, and is required to have an entrepreneurial attitude |
Consultant |