• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/110

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

110 Cards in this Set

  • Front
  • Back

Which of the following is a dynamic, social media-based CRM process?

social CRM

Which of the following revenue models for social media is most likely followed by companies providing Web 2.0 services?

pay-per-click

The characteristics of McAfee's Enterprise 2.0 model are given by the acronym SLATES; L in SLATES stands for ________.

links

According to Henk Flap, the ________ is determined by the number of relationships in a social network, by the strength of those relationships, and by the resources controlled by those related.

value of social capital

Which of the following best represents the value of social capital?

Number of Relationships × Relationship Strength × Entity Resources

Success metrics are also known as ________.

key performance indicators (KPI)

The storage of ________ differentiates social media information systems (SMIS) from Web site applications.

connection data

________ is the investment in social relations with the expectation of returns in the marketplace.

Social capital

_______ is the dynamic social media process of employing users to participate in product design or product redesign.

Crowdsourcing

Which of the following components of McAfee's Enterprise 2.0 Model involves the creation of enterprise content via blogs, wikis, discussion groups, presentations, and other social media platforms?

author

The ________ revenue model successfully emerged on PC devices where there is plenty of space for lots of ads.

ad click

To an organization, the ________ is the likelihood that an entity in a relationship will do something that benefits the organization.

strength of a relationship

________ is the use of information technology to support the sharing of content among networks of users.

Social media

Social ________ provide platforms that enable the creation of social networks, or social relationships among people with common interests

media providers

The first step that any organization should take to manage the risk of employee communication is to develop and publicize a(n) ________ policy.

social media

A ________ is an information system that supports the sharing of content among networks of users.

social media information system (SMIS)

A(n) ________ is an inducement to social media users for passing communications along through different tiers of communities in social media.

viral hook

________ are measurements used to track performance of an organization.

Metrics

________, which refers to the matter on a social media (SM) site that is contributed by users, is the essence of SM relationships.

User-generated content

Most social media companies rely on ________ for revenue.

advertising

The primary risk of peer-to-peer support in the context of social media and customer service is ________.

loss of control

According to Nan Lin, which of the following types of capital adds value through information, influence, and personal reinforcement?

social capital

The characteristics of McAfee's Enterprise 2.0 model are given by the acronym SLATES; A in SLATES stands for ________.

authoring

Which of the following is a significant risk of using social media for inbound and outbound logistics?

loss of privacy

According to Nan Lin, social networks provide four forms of value: information, social credentials, personal reinforcement, and ________.

influence

Knowledge management (KM) benefits organizations because it ________.

improves process quality and increases team strength

Which of the following observations about RFM and OLAP reports is true?

OLAP reports are more dynamic than RFM reports.

Problematic operational data is termed as ________.

dirty data

RFM analysis is used to analyze and rank customers according to their ________.

purchasing patterns

Which of the following statements is true about business intelligence (BI) publishing alternatives?

BI servers extend alert/RSS functionality to support user subscriptions

Which of the following statements is true about reporting applications?

Reporting applications refer to business applications that input data from one or more sources and apply reporting operations to that data to produce business intelligence.

________ is a technique for harnessing the power of thousands of computers working in parallel.

MapReduce

A data ________ is a data collection, smaller than the data warehouse, that addresses the needs of a particular department or functional area of the business.

mart

In ________, statistical techniques can identify groups of entities that have similar characteristics.

cluster analysis

In ________, data miners develop a model prior to the analysis and apply statistical techniques to data to estimate parameters of the model.

supervised data mining

Which of the following statements is true about unsupervised data mining?

Analysts do not create a model or hypothesis before running the analysis

A sales report that is current at the time the user accessed it on a Web server, is an example of a(n) ________.

dynamic report

U.S. Steel Corp. is a well-known steel manufacturing company. SAMCROW, one of the customers of U.S. Steel Corp., holds an RFM score of 111. Which of the following characteristics relates SAMCROW with its RFM score?

SAMCROW has ordered recently and orders frequently, and it orders the most expensive goods.

In market-basket terminology, ________ describes the probability that two items will be purchased together.

support

Which of the following statements is true of source data for a business intelligence (BI) system?

It refers to data that the organization purchases from data vendors.

A ________ takes data from the data manufacturers, cleans and processes the data, and locates the data on the shelves.

data warehouse

Which of the following techniques determines sales patterns?

market-basket analysis

________ is the process of obtaining, cleaning, organizing, relating, and cataloging source data.

Data acquisition

How should a sales team respond to a customer who has an RFM score of 545?

The sales team should let go of this customer, for the loss will be minimal

The sales team should let go of this customer, for the loss will be minimal

cross-selling

A sales team should attempt to up-sell more expensive products to a customer who has an RFM score of ________.

113

________ is the application of social media and related applications for the management and delivery of organizational knowledge resources.

Hyper-social knowledge management

Which of the following terms is used as a synonym for data mining?

knowledge discovery in databases (KDD)

Which of the following statements is true about operational data?

Purchased operational data often contains missing elements.

Which of the following phenomena states that the more attributes there are, the easier it is to build a model that fits the sample data?

curse of dimensionality

In a Business Process Modeling Notation (BPMN) diagram, a ________ represents an activity

rectangle

In a business process, ________ are defined as collections of related tasks that receive inputs and produce outputs.

activities

________ is a standard set of terms and graphical notations for documenting business processes.

Business Process Modeling Notation (BPMN

In the system implementation phase of the systems development life cycle (SDLC), with the ________ installation, the organization installs the next piece of the system only after the previous piece works.

phased

The first phase of the systems development life cycle (SDLC) is ________.

defining the system

During the system implementation phase of the systems development life cycle (SDLC), once a system has passed testing, the organization installs the new system. Which of the following terms is used to refer to this activity?

system conversion

The situation that occurs when the addition of resources creates inefficiencies is known as ________.

diseconomies of scale

Control Objectives for Information and related Technology (COBIT) is often used in the ________ stage of the business process management (BPM) cycle.

assessment

In the context of the system implementation phase of the systems development life cycle (SDLC), a ________ installation is the riskiest because the old system is shut down and the new system is introduced.

plunge

Rapid application development, the unified process, extreme programming, and scrum have led to ________.

agile development

The final work breakdown structure (WBS) plan shows planned tasks, dependencies, durations, and resource assignments. It is denoted as ________ WBS.

baseline

The ________ phase of the systems development life cycle (SDLC) involves determining hardware and program specifications, designing the database and procedures, and creating job definitions.

component design

A(n) ________ is a formal description of a system's response to use and misuse scenarios.

test plan

Tasks in the ________ phase of the systems development life cycle (SDLC) are to build and test system components, and to convert users to the new system.

system implementation

Which of the following is true of paired programming?

Two programmers share the same computer to write a computer program together

Which of the following are the dimensions of feasibility?

cost, schedule, technical, and organizational feasibility

________ are information systems (IS) professionals who understand both business and information technology.

Systems analysts

________ set the stage for the requirements for any information systems and applications that need to be created or adapted.

Business process models

Which of the following are the steps in the business process management (BPM) cycle?

model processes; create components; implement processes; assess results

Which of the following statements is true of information systems?

Every information system has at least one application

The project plan which results from defining the system is the input to ________, which is the second phase of the SDLC.

requirements analysis

In a business process, an inventory or a database is an example of a ________.

repository

In the system implementation phase of the systems development life cycle (SDLC), with ________ installation, the new system runs alongside the old one until it has been tested and is fully operational.

parallel

A ________ involves balancing three critical factors: requirements, cost, and time.

trade-off

In a business process, resources are ________.

people or computer applications that are assigned to roles

In asymmetric encryption, each site has a ________ for encoding messages.

public key

________ a Web site means to take extraordinary measures to reduce a system's vulnerability using special versions of the operating system.

Hardening

The process of hardening a Web site is a ________ safeguard.

technical

________ are small files that enable a browser to access Web sites without having to sign in every time.

Cookies

________ is a technique for intercepting computer communications through a physical connection to a network or without a physical connection, in the case of wireless networks.

Sniffing

Which of the following statements is true about losses due to computer security threats?

Surveys suggest that some organizations do not report all their computer crime losses, and some will not report such losses at all.

Nonword passwords are vulnerable to a ________ attack in which the password cracker tries every possible combination of characters.

brute force

________ occurs when someone deceives by pretending to be someone else.

Pretexting

Which of the following is considered a computer crime?

hacking of information systems

Which of the following usually happens in a malicious denial-of-service attack?

A hacker floods a Web server with millions of bogus service requests

________ involves breaking into a network to steal data such as customer lists, product inventory data, employee data, and other proprietary and confidential data.

Hacking

Which of the following statements is true about biometric identification?

It often faces resistance from users for its invasive nature

With ________, the sender and receiver transmit a message using different keys

asymmetric encryption

________ protect databases and other organizational data.

Data safeguards

________ take computers with wireless connections through an area and search for unprotected wireless networks, and then monitor and intercept wireless traffic on unsecured wireless networks.

Drive-by sniffers

A ________ examines each part of a message and determines whether to let that part pass

packet-filtering firewall

________ are the primary means of authentication for a user's computer and other networks and servers to which the user may have access.

Passwords

A ________ is a type of virus that self-propagates using the Internet or other computer network.

worm

Which of the following is used for biometric authentication?

facial features

A ________ pretends to be a legitimate company and sends an email requesting confidential data, such as account numbers, Social Security numbers, account passwords, and so forth.

phisher

________ is a function pertaining to a particular database that develops procedures and practices to control and protect the database.

Database administration

________ is similar to spyware in that it is installed without the user's permission and that it resides in the background and observes user behavior.

Adware

A ________ is a number used to encrypt data.

key

Which of the following is considered a threat caused by human error?

an employee inadvertently installing an old database on top of the current one

Which of the following was passed to give individuals the right to access their own health data created by doctors and other healthcare providers?

the HIPAA of 1996

Packet filtering firewalls _______

can filter both inbound and outbound

Secure Socket Layer is a protocol that is restricted to asymmetric encryption

False

A _______is content structure that has emerged from the processing of many user tags in social media

folksonomy

______which refers to the matter on a social media site that is contributed by users, is the essence of SM relationships

User Generated Content

T or F Social CRM supports those customers who are likely to generate the most business.

False

T or F In expert systems the programs that process a set of rules are called expert systems shells

T

T or F Brooks law states that adding more people to a late project reduces the need for coordination.

F

OLAP stands for

online analytical processing



In market-basket terminology, ____describes the probability that two items will be purchased together.

Support

The _____ is a sequence of activities that determine the earliest date by which a project can be completed.

critical path