________ is the use of information technology to support the sharing of content among networks of users.
Social Media
A(n) ________ is an inducement to social media users for passing communications along through different tiers of communities in social media.
Viral Hook
Which of the following social media (SM) providers has the largest number of users?
Alisha's startup has another record month. She posts pictures of her best selling handbag to Facebook and Instagram. Her friends and customers leave her positive comments. Alisha's post and her friends' comments are an example of ________.
Content Data
Facebook, Twitter, LinkedIn, and Google are all social media providers.
True
Which of the following is a dynamic, social media-based CRM process?
social CRM
________ is the investment in social relations with the expectation of returns in the marketplace.
Social Capital
Sasha spends considerable time and money getting a project management certification. In this example, Sasha invests in ________.
Human Capital
When a person attends a business function for the purpose of meeting people and reinforcing relationships, he or she is investing in his or her social capital
True
The ________ revenue model offers users a basic service for free, and then charges a premium for upgrades or advanced features.
freemium
Most social media companies rely on ________ for revenue.
advertising
Which of the following revenue models for social media is most likely followed by companies providing Web 2.0 services?
pay-per-click
The first step in developing a social media information system (SMIS) is to ________.
define the goals of the organization
________, which refers to the matter on a social media (SM) site that is contributed by users, is the essence of SM relationships.
User-generated content
Stanley Courier Services faced major criticism on Twitter for misplacing important customer documents on multiple occasions, especially when a single customer's negative feedback snowballed into a wave of condemnation within days. Which of the following a
leave it
________ is defined as information containing patterns, relationships, and trends of various forms of data.
Business intelligence
Business intelligence (BI) systems have five standard components called hardware, software, data, procedures and people.
True
Which of the following is a fundamental category of business intelligence (BI) analysis?
data mining
________ delivers business intelligence to users without any request from the users.
Push publishing
________ requires the user to request business intelligence (BI) results.
Pull publishing
The three primary activities in the business intelligence (BI) process are to acquire data, perform analysis, and publish results.
True
Problematic operational data is termed as ________.
dirty data
________ is a term that refers to the level of detail represented by the data.
Granularity
Capturing customers' clicking behavior is referred to as ________.
Clickstream data
A ________ takes data from the data manufacturers, cleans and processes the data, and locates the data on the shelves.
data warehouse
A data ________ is a data collection, smaller than the data warehouse that addresses the needs of a particular department or functional area of the business.
mart
________ analysis is a way of analyzing and ranking customers according to their purchasing patterns.
RFM
Ajax Inc. is one of the customers of a well-known linen manufacturing company. Ajax has not ordered linen in some time, but when it did order in the past it ordered frequently, and its orders were of the highest monetary value. Under the given circumstanc
155
In ________, data miners develop a model prior to the analysis and apply statistical techniques to data to estimate parameters of the model.
supervised data mining
Which of the following techniques determine sales patterns?
market-basket analysis
A ________ is a person or an organization that seeks to obtain or alter data or other IS assets illegally, without the owner's permission and often without the owner's knowledge.
threat
Which of the following is considered a threat caused by human error?
an employee inadvertently installing an old database on top of the current one
Which of the following is considered a computer crime?
hacking of information systems
In the context of security threats, pretexting, sniffing, spoofing, and phishing are all examples of ________.
unauthorized data disclosure
Email spoofing is a synonym for ________.
phishing
________ present(s) the largest risk for an organization's infrastructure loss.
Natural disasters
________ are small files that enables a browser to access Web sites without having to sign in every time.
Cookies
Which of the following is a critical security function that should be addressed by the senior management of an organization?
establishing the security policy
Which of the following was passed to give individuals the right to access their own health data created by doctors and other healthcare providers?
the HIPAA of 1996
Which of the following is used for biometric authentication?
facial features
Layla is purchasing a new laptop from an online vendor. Which of the following will be displayed in the address bar of his browser that will let her know that the online retailer is using the Secure Sockets Layer (SSL) protocol?
https
________ is a broad category of software that includes viruses, spyware, and adware.
Malware
When an employee is terminated, IS administrators should receive advance notice so that they can ________.
remove the user account and password
________ involve the people and procedure components of information systems.
Human safeguards
The computers that run the DBMS and all devices that store database data should reside in locked, controlled-access facilities. This is done to ________.
provide physical security
Which of the following is a responsibility of a chief information officer (CIO)?
serving as the principal manager of the IS department
In the information system (IS) department, the ________ group manages the process of creating new information systems as well as maintaining existing information systems.
development
A ________ works with users to determine system requirements, designs and develops job descriptions and procedures, and helps determine test plans.
systems analyst
A ________ manages security for all of the organization's assets: physical plant and equipment, employees, intellectual property, and digital.
chief security officer
The responsibilities of a tech support engineer include ________.
helping users solve problems and providing training
A ________ monitors, maintains, fixes, and tunes computer networks.
network administrator
A(n) ________ is a group of senior managers from the major business functions that works with the chief information officer (CIO) to set the information systems (IS) priorities and decide among major IS projects and alternatives.
steering committee
Which of the following statements is TRUE about outsourcing?
It saves both direct and indirect management time.
Which of the following is a form of outsourcing hardware infrastructure?
Infrastructure as a service (IaaS) cloud hosting
Which of the following is an outsourcing alternative in which hardware and both operating system and application software are leased?
Software as a Service (SaaS)
Which of the following statements is TRUE of information systems?
Every information system has at least one application
A ________ is a person who is well versed in an organization's strategy and focuses on ensuring that business processes and information systems meet the organization's competitive strategies.
business analyst
________ are information system (IS) professionals who understand both business and information technology.
Systems analysts
A ________ is a network of activities, repositories, roles, resources, and flows that interact to accomplish a business function.
business process
In a business process, a ________ is defined as a collection of something.
repository
In a business process, a ________ shows the movement of data among activities and repositories.
data flow
In business process management (BPM), an as-is model ________.
documents the existing business process
________ is a standard set of terms and graphical notations for documenting business processes.
Business Process Modeling Notation (BPMN)
Which of the following statements is TRUE of the swim-lane layout used for modeling business processes?
It draws attention to the interactions among components of the diagram.
The traditional process for developing information systems is ________.
the systems development life cycle