• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/79

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

79 Cards in this Set

  • Front
  • Back

Which of the following statements is a feature of social media providers?

They use elastic, cloud-based servers to host a social media presence

Being linked to a network of highly regarded contacts is a form of what?

Social credential

Which of the following indicates of risk of social media and human resources?

Connection data

What indicates a risk of using social media in human resources

Making errors in forming conclusions about employees do social media

Since it's inception, social media has been widely used to market products to end-users in what?

Business-to-consumer relationships

What refers to data and responses to data that are contributed by users and social media sponsors?

Content data

What is a dynamic social media process of employing users to participate in product design or product redesign?

Crowdsourcing


Social media_____are formed based on mutual interests and transcend familial, geographic, and organizational boundaries.

Communities

A_______is a statement that delineates employees rights and responsibilities in an organization.

Social media policy

Value chains determine_____.

Structured business processes


A person gain social capital by____.


Adding more friends

That forms that enabled the creation of social networks, or social relationships among people with common interests, are offered by social media_____.

Providers

Patronizing responses to comments from content contributors can generate a___.

Strong backlash

What is a use of social media in human resources?

It is used for recruiting candidates

Which of the following statements is true of using social media to advance organizational strategies?

Identifying the target audience helps organizations focus it's marketing efforts

____Indicate whether an organization has achieved its goals.

Success metrics

A___refers to a content structure employed by enterprise social networks (ESNs) that emerges from the processing of many user tags.

Folksonomy

The process of creating value from intellectual capital and sharing that knowledge with employees, managers, suppliers, customers, and others who need it is called ____.

Knowledge management

What statement is true of the content management application alternatives?

Organizations develop an in-house system to track machine maintenance procedures

____Is the process of delivering business intelligence to users without any requests from the users.

Push publishing

What is true of BigData?

BigData refers to data sets that are at least petabyte in size

A____is designed to extract data from operational systems and other sources, clean the data, and store and catalog that data for processing by business intelligence tools.

Data warehouse

What problem is particularly common for data that has been gathered overtime?

Lack of consistency

The goal of___, a type of business intelligence analysis, is to create information about past performance.

Reporting analysis

The____ of business intelligence servers maintains metadata about the authorized allocation of business intelligence results to uses

Management function

What is true of unsupervised Data mining?

Analysts create hypotheses only after performing an analysis

What is true of data granularity?

It can be to fine or two corse and also have the wrong granularity

Users in data mart obtain data that pertain to a particular business function from a___.

Data warehouse

The more attributes there are in a sample data, the easier it is to build a model that fits the sample data, but that is worthless as a predictor. What explains this phenomenon?

The curse of dimensionality

_____Is an unsupervised data mining technique in which statistical techniques identify groups of entities that have similar characteristics.

Cluster analysis

The source, format, assumptions and constraints, and other facts concerning certain data are called_____.

Metadata

____Are user requests for particular business intelligence results on a particular schedule or response to particular events.

Subscriptions

The results generated in the map phase are combined in the_____phase.

Reduce

___Reports are business intelligence documents that are updated at the time they're requested.

Dynamic

____Is an open source program supported by the Apache foundation that manages thousands of computers in the implements mapreduce

Hadoop

What is true of a data warehouse?

A data warehouse is larger than a Data mart

What is true of business intelligence (BI) systems?

Business intelligence systems analyzing organizations past performance to make predictions

_____Are business intelligence documents that are fixed at the time of creation and do not change

Static reports

_______Requires users to request business intelligence results

Pool publishing

____Are small files that browsers store on users computers when they visit web sites

Cookies

An_____ includes how employees should react to security problems, whom they should contact, the reports they should make, and steps they can take to reduce further loss

Incident- response plan

____A site means to take extraordinary measures to reduce systems vulnerability

Hardening

Every information system today should require users to sign on with a username and a password. In this case, which of the following functions is performed by the users password?

Authentication

_____Refers to an organization wide function that is in charge of developing data policies and enforcing data standards

Data administration

What is true of financial losses due to computer crimes?

All studies on the costs of computer crimes are based on surveys

Davian, a professional hacker, tries every possible combination of characters to crack his victims email password. Using this technique, he can crack a six character password either upper or lower case letters in about five minutes. What technique is this to gain access to his victims email?

Brute force attack

Most secure communications over the Internet use a protocol called_______.

HTTPS

A person calls the Stark residence and pretends to represent a credit card company. He asked Ms. Stark to confirm her credit card number. This is an examples of ______.

Pretexting

A_____examines the source address, destination address, and other data of a message and determines whether to let that message pass

Packet filtering firewall

Which of the following is a technical safeguard against security threats?

Firewall

A____sits outside an organizational network and is the first device the Internet traffic encounters

Perimeter firewall

What is sure of symmetric encryption?

It uses the same key for both encoding and decoding

What encryption type is used by the secure sockets layer protocol?

Public key encryption

Thomas is responsible for creating backup copies of information in the system. He also works along with IT personnel to ensure that the backups are valid and that effective member procedures exist. Thomas is involved in establishing___.

Data safeguards

What is a synonym for phishing?

Email spoofing

The procedure of entrusting a party with a copy of an encryption key that can be used in case the actual key is lost or destroyed is called_____.

Key escrow

____occurs when computer criminals invade a computer System and replace legitimate programs with their own unauthorized ones

Usurpation

What is considered a personal security safeguard?

Removing high-value assets for computers

With HTTPS, data are encrypted using the protocol called the____.

Secure sockets layer (SSL)

What is a right of a user of information systems (I S)?

Contributing to requirements for a new system features and functions

Which of the following is an advantage of outsourcing information systems?

It can be an easy way to gain expertise otherwise not known

The______groups purpose is to protect information assets by establishing standards and management practices and policies

Data administration

Which of the following staff function is at the top most level of typical senior-level reporting relationship?

Chief operating officer

In_____, hardware and both operating system and application software are leased

Software as a service (SaaS)

What is true of the alignment between information systems and organizational strategies?

Information systems must evolve with changes made in organizational strategies

A_______ Committee is a group of senior managers from the major business functions that works with the chief information officer to set information systems (IS) priorities and decide major IS projects and alternatives

Steering

_______Refers to the leasing of hardware with preinstalled operating systems

Platform as a service (PaaS)

What is a risk of outsourcing information systems?

Vendors can gain access to critical knowledge of the outsourcing company

The_______group investigates new information systems and determines how the organization can benefit from them

Technology

An organization that wishes to leverage the power of social media and elastic cloud opportunities to help accomplish its goals and objectives should ideally turn to the________ Group within its IT department for information

Technology

What is true of the development group of companies information systems department?

The size and structure of the group depends on the whether programs are developed in-house or outsourced

In organizations that operate significant non-accounting information systems, such as manufacturers, and reporting arrangement wherein the chief information officer reports to the_______ is more common and effective

Chief executive officer

In organizations were primary information systems support only accounting activities, a reporting arrangement wherein the chief information officer reports to the______ is practical

Chief financial officer

The_____ Group within the information systems department manages the process of creating new information systems as well as maintaining existing information system

Development

Which of the following is true of the development group if the company's information systems department is primarily by programmers, test engineers, technical writers, and other development personnel?

The company develops in-house

A_______designs and writes computer codes

Programmer

Which of the following is a responsibility of an information systems user?

Following security and back up procedures

In order to accomplish organizational goals and objectives, an organizations information systems must be in line with its_____.

Competitive strategy

A________ performs a wide range of activities such as programming, testing, database design, communications and networks, project management, and is required to have an entrepreneurial attitude

Consultant