Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
110 Cards in this Set
- Front
- Back
Which of the following is a dynamic, social media-based CRM process? |
social CRM |
|
Which of the following revenue models for social media is most likely followed by companies providing Web 2.0 services? |
pay-per-click |
|
The characteristics of McAfee's Enterprise 2.0 model are given by the acronym SLATES; L in SLATES stands for ________. |
links |
|
According to Henk Flap, the ________ is determined by the number of relationships in a social network, by the strength of those relationships, and by the resources controlled by those related. |
value of social capital |
|
Which of the following best represents the value of social capital? |
Number of Relationships × Relationship Strength × Entity Resources |
|
Success metrics are also known as ________. |
key performance indicators (KPI) |
|
The storage of ________ differentiates social media information systems (SMIS) from Web site applications. |
connection data |
|
________ is the investment in social relations with the expectation of returns in the marketplace. |
Social capital |
|
_______ is the dynamic social media process of employing users to participate in product design or product redesign. |
Crowdsourcing |
|
Which of the following components of McAfee's Enterprise 2.0 Model involves the creation of enterprise content via blogs, wikis, discussion groups, presentations, and other social media platforms? |
author |
|
The ________ revenue model successfully emerged on PC devices where there is plenty of space for lots of ads. |
ad click |
|
To an organization, the ________ is the likelihood that an entity in a relationship will do something that benefits the organization. |
strength of a relationship |
|
________ is the use of information technology to support the sharing of content among networks of users. |
Social media |
|
Social ________ provide platforms that enable the creation of social networks, or social relationships among people with common interests |
media providers |
|
The first step that any organization should take to manage the risk of employee communication is to develop and publicize a(n) ________ policy. |
social media |
|
A ________ is an information system that supports the sharing of content among networks of users. |
social media information system (SMIS) |
|
A(n) ________ is an inducement to social media users for passing communications along through different tiers of communities in social media. |
viral hook |
|
________ are measurements used to track performance of an organization. |
Metrics |
|
________, which refers to the matter on a social media (SM) site that is contributed by users, is the essence of SM relationships. |
User-generated content |
|
Most social media companies rely on ________ for revenue. |
advertising |
|
The primary risk of peer-to-peer support in the context of social media and customer service is ________. |
loss of control |
|
According to Nan Lin, which of the following types of capital adds value through information, influence, and personal reinforcement? |
social capital |
|
The characteristics of McAfee's Enterprise 2.0 model are given by the acronym SLATES; A in SLATES stands for ________. |
authoring |
|
Which of the following is a significant risk of using social media for inbound and outbound logistics? |
loss of privacy |
|
According to Nan Lin, social networks provide four forms of value: information, social credentials, personal reinforcement, and ________. |
influence |
|
Knowledge management (KM) benefits organizations because it ________. |
improves process quality and increases team strength |
|
Which of the following observations about RFM and OLAP reports is true? |
OLAP reports are more dynamic than RFM reports. |
|
Problematic operational data is termed as ________. |
dirty data |
|
RFM analysis is used to analyze and rank customers according to their ________. |
purchasing patterns |
|
Which of the following statements is true about business intelligence (BI) publishing alternatives? |
BI servers extend alert/RSS functionality to support user subscriptions |
|
Which of the following statements is true about reporting applications? |
Reporting applications refer to business applications that input data from one or more sources and apply reporting operations to that data to produce business intelligence. |
|
________ is a technique for harnessing the power of thousands of computers working in parallel. |
MapReduce |
|
A data ________ is a data collection, smaller than the data warehouse, that addresses the needs of a particular department or functional area of the business. |
mart |
|
In ________, statistical techniques can identify groups of entities that have similar characteristics. |
cluster analysis |
|
In ________, data miners develop a model prior to the analysis and apply statistical techniques to data to estimate parameters of the model. |
supervised data mining |
|
Which of the following statements is true about unsupervised data mining? |
Analysts do not create a model or hypothesis before running the analysis |
|
A sales report that is current at the time the user accessed it on a Web server, is an example of a(n) ________. |
dynamic report |
|
U.S. Steel Corp. is a well-known steel manufacturing company. SAMCROW, one of the customers of U.S. Steel Corp., holds an RFM score of 111. Which of the following characteristics relates SAMCROW with its RFM score? |
SAMCROW has ordered recently and orders frequently, and it orders the most expensive goods. |
|
In market-basket terminology, ________ describes the probability that two items will be purchased together. |
support |
|
Which of the following statements is true of source data for a business intelligence (BI) system? |
It refers to data that the organization purchases from data vendors. |
|
A ________ takes data from the data manufacturers, cleans and processes the data, and locates the data on the shelves. |
data warehouse |
|
Which of the following techniques determines sales patterns? |
market-basket analysis |
|
________ is the process of obtaining, cleaning, organizing, relating, and cataloging source data. |
Data acquisition |
|
How should a sales team respond to a customer who has an RFM score of 545? |
The sales team should let go of this customer, for the loss will be minimal |
|
The sales team should let go of this customer, for the loss will be minimal |
cross-selling |
|
A sales team should attempt to up-sell more expensive products to a customer who has an RFM score of ________. |
113 |
|
________ is the application of social media and related applications for the management and delivery of organizational knowledge resources. |
Hyper-social knowledge management |
|
Which of the following terms is used as a synonym for data mining? |
knowledge discovery in databases (KDD) |
|
Which of the following statements is true about operational data? |
Purchased operational data often contains missing elements. |
|
Which of the following phenomena states that the more attributes there are, the easier it is to build a model that fits the sample data? |
curse of dimensionality |
|
In a Business Process Modeling Notation (BPMN) diagram, a ________ represents an activity |
rectangle |
|
In a business process, ________ are defined as collections of related tasks that receive inputs and produce outputs. |
activities |
|
________ is a standard set of terms and graphical notations for documenting business processes. |
Business Process Modeling Notation (BPMN |
|
In the system implementation phase of the systems development life cycle (SDLC), with the ________ installation, the organization installs the next piece of the system only after the previous piece works. |
phased |
|
The first phase of the systems development life cycle (SDLC) is ________. |
defining the system |
|
During the system implementation phase of the systems development life cycle (SDLC), once a system has passed testing, the organization installs the new system. Which of the following terms is used to refer to this activity? |
system conversion |
|
The situation that occurs when the addition of resources creates inefficiencies is known as ________. |
diseconomies of scale |
|
Control Objectives for Information and related Technology (COBIT) is often used in the ________ stage of the business process management (BPM) cycle. |
assessment |
|
In the context of the system implementation phase of the systems development life cycle (SDLC), a ________ installation is the riskiest because the old system is shut down and the new system is introduced. |
plunge |
|
Rapid application development, the unified process, extreme programming, and scrum have led to ________. |
agile development |
|
The final work breakdown structure (WBS) plan shows planned tasks, dependencies, durations, and resource assignments. It is denoted as ________ WBS. |
baseline |
|
The ________ phase of the systems development life cycle (SDLC) involves determining hardware and program specifications, designing the database and procedures, and creating job definitions. |
component design |
|
A(n) ________ is a formal description of a system's response to use and misuse scenarios. |
test plan |
|
Tasks in the ________ phase of the systems development life cycle (SDLC) are to build and test system components, and to convert users to the new system. |
system implementation |
|
Which of the following is true of paired programming? |
Two programmers share the same computer to write a computer program together |
|
Which of the following are the dimensions of feasibility? |
cost, schedule, technical, and organizational feasibility |
|
________ are information systems (IS) professionals who understand both business and information technology. |
Systems analysts |
|
________ set the stage for the requirements for any information systems and applications that need to be created or adapted. |
Business process models |
|
Which of the following are the steps in the business process management (BPM) cycle? |
model processes; create components; implement processes; assess results |
|
Which of the following statements is true of information systems? |
Every information system has at least one application |
|
The project plan which results from defining the system is the input to ________, which is the second phase of the SDLC. |
requirements analysis |
|
In a business process, an inventory or a database is an example of a ________. |
repository |
|
In the system implementation phase of the systems development life cycle (SDLC), with ________ installation, the new system runs alongside the old one until it has been tested and is fully operational. |
parallel |
|
A ________ involves balancing three critical factors: requirements, cost, and time. |
trade-off |
|
In a business process, resources are ________. |
people or computer applications that are assigned to roles |
|
In asymmetric encryption, each site has a ________ for encoding messages. |
public key |
|
________ a Web site means to take extraordinary measures to reduce a system's vulnerability using special versions of the operating system. |
Hardening |
|
The process of hardening a Web site is a ________ safeguard. |
technical |
|
________ are small files that enable a browser to access Web sites without having to sign in every time. |
Cookies |
|
________ is a technique for intercepting computer communications through a physical connection to a network or without a physical connection, in the case of wireless networks. |
Sniffing |
|
Which of the following statements is true about losses due to computer security threats? |
Surveys suggest that some organizations do not report all their computer crime losses, and some will not report such losses at all. |
|
Nonword passwords are vulnerable to a ________ attack in which the password cracker tries every possible combination of characters. |
brute force |
|
________ occurs when someone deceives by pretending to be someone else. |
Pretexting |
|
Which of the following is considered a computer crime? |
hacking of information systems |
|
Which of the following usually happens in a malicious denial-of-service attack? |
A hacker floods a Web server with millions of bogus service requests |
|
________ involves breaking into a network to steal data such as customer lists, product inventory data, employee data, and other proprietary and confidential data. |
Hacking |
|
Which of the following statements is true about biometric identification? |
It often faces resistance from users for its invasive nature |
|
With ________, the sender and receiver transmit a message using different keys |
asymmetric encryption |
|
________ protect databases and other organizational data. |
Data safeguards |
|
________ take computers with wireless connections through an area and search for unprotected wireless networks, and then monitor and intercept wireless traffic on unsecured wireless networks. |
Drive-by sniffers |
|
A ________ examines each part of a message and determines whether to let that part pass |
packet-filtering firewall |
|
________ are the primary means of authentication for a user's computer and other networks and servers to which the user may have access. |
Passwords |
|
A ________ is a type of virus that self-propagates using the Internet or other computer network. |
worm |
|
Which of the following is used for biometric authentication? |
facial features |
|
A ________ pretends to be a legitimate company and sends an email requesting confidential data, such as account numbers, Social Security numbers, account passwords, and so forth. |
phisher |
|
________ is a function pertaining to a particular database that develops procedures and practices to control and protect the database. |
Database administration |
|
________ is similar to spyware in that it is installed without the user's permission and that it resides in the background and observes user behavior. |
Adware |
|
A ________ is a number used to encrypt data. |
key |
|
Which of the following is considered a threat caused by human error? |
an employee inadvertently installing an old database on top of the current one |
|
Which of the following was passed to give individuals the right to access their own health data created by doctors and other healthcare providers? |
the HIPAA of 1996 |
|
Packet filtering firewalls _______ |
can filter both inbound and outbound |
|
Secure Socket Layer is a protocol that is restricted to asymmetric encryption |
False |
|
A _______is content structure that has emerged from the processing of many user tags in social media |
folksonomy |
|
______which refers to the matter on a social media site that is contributed by users, is the essence of SM relationships |
User Generated Content |
|
T or F Social CRM supports those customers who are likely to generate the most business. |
False |
|
T or F In expert systems the programs that process a set of rules are called expert systems shells |
T |
|
T or F Brooks law states that adding more people to a late project reduces the need for coordination. |
F |
|
OLAP stands for |
online analytical processing |
|
In market-basket terminology, ____describes the probability that two items will be purchased together. |
Support |
|
The _____ is a sequence of activities that determine the earliest date by which a project can be completed. |
critical path |