CIS #3

________ is the use of information technology to support the sharing of content among networks of users.

Social Media

A(n) ________ is an inducement to social media users for passing communications along through different tiers of communities in social media.

Viral Hook

Which of the following social media (SM) providers has the largest number of users?

Facebook

Alisha's startup has another record month. She posts pictures of her best selling handbag to Facebook and Instagram. Her friends and customers leave her positive comments. Alisha's post and her friends' comments are an example of ________.

Content Data

Facebook, Twitter, LinkedIn, and Google are all social media providers.

True

Which of the following is a dynamic, social media-based CRM process?

social CRM

________ is the investment in social relations with the expectation of returns in the marketplace.

Social Capital

Sasha spends considerable time and money getting a project management certification. In this example, Sasha invests in ________.

Human Capital

When a person attends a business function for the purpose of meeting people and reinforcing relationships, he or she is investing in his or her social capital

True

The ________ revenue model offers users a basic service for free, and then charges a premium for upgrades or advanced features.

freemium

Most social media companies rely on ________ for revenue.

advertising

Which of the following revenue models for social media is most likely followed by companies providing Web 2.0 services?

pay-per-click

The first step in developing a social media information system (SMIS) is to ________.

define the goals of the organization

________, which refers to the matter on a social media (SM) site that is contributed by users, is the essence of SM relationships.

User-generated content

Stanley Courier Services faced major criticism on Twitter for misplacing important customer documents on multiple occasions, especially when a single customer's negative feedback snowballed into a wave of condemnation within days. Which of the following a

leave it

________ is defined as information containing patterns, relationships, and trends of various forms of data.

Business intelligence

Business intelligence (BI) systems have five standard components called hardware, software, data, procedures and people.

True

Which of the following is a fundamental category of business intelligence (BI) analysis?

data mining

________ delivers business intelligence to users without any request from the users.

Push publishing

________ requires the user to request business intelligence (BI) results.

Pull publishing

The three primary activities in the business intelligence (BI) process are to acquire data, perform analysis, and publish results.

True

Problematic operational data is termed as ________.

dirty data

________ is a term that refers to the level of detail represented by the data.

Granularity

Capturing customers' clicking behavior is referred to as ________.

Clickstream data

A ________ takes data from the data manufacturers, cleans and processes the data, and locates the data on the shelves.

data warehouse

A data ________ is a data collection, smaller than the data warehouse that addresses the needs of a particular department or functional area of the business.

mart

________ analysis is a way of analyzing and ranking customers according to their purchasing patterns.

RFM

Ajax Inc. is one of the customers of a well-known linen manufacturing company. Ajax has not ordered linen in some time, but when it did order in the past it ordered frequently, and its orders were of the highest monetary value. Under the given circumstanc

155

In ________, data miners develop a model prior to the analysis and apply statistical techniques to data to estimate parameters of the model.

supervised data mining

Which of the following techniques determine sales patterns?

market-basket analysis

A ________ is a person or an organization that seeks to obtain or alter data or other IS assets illegally, without the owner's permission and often without the owner's knowledge.

threat

Which of the following is considered a threat caused by human error?

an employee inadvertently installing an old database on top of the current one

Which of the following is considered a computer crime?

hacking of information systems

In the context of security threats, pretexting, sniffing, spoofing, and phishing are all examples of ________.

unauthorized data disclosure

Email spoofing is a synonym for ________.

phishing

________ present(s) the largest risk for an organization's infrastructure loss.

Natural disasters

________ are small files that enables a browser to access Web sites without having to sign in every time.

Cookies

Which of the following is a critical security function that should be addressed by the senior management of an organization?

establishing the security policy

Which of the following was passed to give individuals the right to access their own health data created by doctors and other healthcare providers?

the HIPAA of 1996

Which of the following is used for biometric authentication?

facial features

Layla is purchasing a new laptop from an online vendor. Which of the following will be displayed in the address bar of his browser that will let her know that the online retailer is using the Secure Sockets Layer (SSL) protocol?

https

________ is a broad category of software that includes viruses, spyware, and adware.

Malware

When an employee is terminated, IS administrators should receive advance notice so that they can ________.

remove the user account and password

________ involve the people and procedure components of information systems.

Human safeguards

The computers that run the DBMS and all devices that store database data should reside in locked, controlled-access facilities. This is done to ________.

provide physical security

Which of the following is a responsibility of a chief information officer (CIO)?

serving as the principal manager of the IS department

In the information system (IS) department, the ________ group manages the process of creating new information systems as well as maintaining existing information systems.

development

A ________ works with users to determine system requirements, designs and develops job descriptions and procedures, and helps determine test plans.

systems analyst

A ________ manages security for all of the organization's assets: physical plant and equipment, employees, intellectual property, and digital.

chief security officer

The responsibilities of a tech support engineer include ________.

helping users solve problems and providing training

A ________ monitors, maintains, fixes, and tunes computer networks.

network administrator

A(n) ________ is a group of senior managers from the major business functions that works with the chief information officer (CIO) to set the information systems (IS) priorities and decide among major IS projects and alternatives.

steering committee

Which of the following statements is TRUE about outsourcing?

It saves both direct and indirect management time.

Which of the following is a form of outsourcing hardware infrastructure?

Infrastructure as a service (IaaS) cloud hosting

Which of the following is an outsourcing alternative in which hardware and both operating system and application software are leased?

Software as a Service (SaaS)

Which of the following statements is TRUE of information systems?

Every information system has at least one application

A ________ is a person who is well versed in an organization's strategy and focuses on ensuring that business processes and information systems meet the organization's competitive strategies.

business analyst

________ are information system (IS) professionals who understand both business and information technology.

Systems analysts

A ________ is a network of activities, repositories, roles, resources, and flows that interact to accomplish a business function.

business process

In a business process, a ________ is defined as a collection of something.

repository

In a business process, a ________ shows the movement of data among activities and repositories.

data flow

In business process management (BPM), an as-is model ________.

documents the existing business process

________ is a standard set of terms and graphical notations for documenting business processes.

Business Process Modeling Notation (BPMN)

Which of the following statements is TRUE of the swim-lane layout used for modeling business processes?

It draws attention to the interactions among components of the diagram.

The traditional process for developing information systems is ________.

the systems development life cycle