Exam 3

Exam 3

University

58 Qs

quiz-placeholder

Similar activities

Exam 1 Review

Exam 1 Review

University

63 Qs

FINAL EXAM 2022

FINAL EXAM 2022

University

62 Qs

Vocabulaire anglais entreprise 2

Vocabulaire anglais entreprise 2

University

53 Qs

REVISION FOR TEST

REVISION FOR TEST

University

55 Qs

#2 CIW Data Analyst - Certification Prep

#2 CIW Data Analyst - Certification Prep

9th Grade - University

54 Qs

Management Exam

Management Exam

11th Grade - University

63 Qs

Chapter 10-12 Investment Review

Chapter 10-12 Investment Review

10th Grade - University

61 Qs

Business Communications

Business Communications

University

60 Qs

Exam 3

Exam 3

Assessment

Quiz

Business

University

Easy

Created by

Joshua Pugh

Used 2+ times

FREE Resource

58 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Primary purposes of collaboration
Natural disasters (ex. a company's location experiences a flood and damages their infrastructure)
An information system that supports the sharing of content among networks of users
Become informed, make decisions, solve problems, manage projects
Firewall - a computing device that prevents unauthorized network access

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Constructive criticism
The process by which a group of people having the same skills work in parallel to shorten the time required to accomplish a job
A person or organization that seeks to obtain or alter data or other IS assets illegally, without the owner's permission and often without the owner's knowledge (ex. a hacker)
Both positive and negative advice given to improve an outcome
Internal firewall - inside the organizational network

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Groupthink
A malware computer program that replicates itself
A phenomenon where the desire for group cohesion leads to poor decision making
Two keys are used; one key encodes the message, and the other key decodes the message
A software platform that uses social media to facilitate cooperative work of people within an organization

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Characteristics of an effective collaborator
Speaks his/her mind even if it's an unpopular viewpoint, willing to enter into difficult conversations, skillful at giving/receiving negative feedback, willing to put forward unpopular ideas, brings different perspectives
Security problem in which users are not able to access an information system; can be caused by human errors, natural disaster, or malicious activity; A cybercriminal might flood a website with too many requests to cause it to not work for legitimate requests
Using computers with wireless connections to search for unprotected wireless networks
Become informed, make decisions, solve problems, manage projects

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Operational decisions
Two keys are used; one key encodes the message, and the other key decodes the message
Viruses that masquerade as useful programs or files. A typical Trojan horse appears to be a computer game, an MP3 music file, or some other useful, innocuous program
Decisions that concern the day-to-day activities of an organization
Advertising, Freemium (offers users a basic service for free and then charges a premium for upgrades or advanced features)

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Managerial decisions
Advertising, Freemium (offers users a basic service for free and then charges a premium for upgrades or advanced features)
False targets for computer criminals to attack, looks like a particularly valuable resource, such as an unprotected website, but in actuality the only site content is a program that determines the attacker's IP address
Decisions that concern the allocation and use of resources
Security problem in which users are not able to access an information system; can be caused by human errors, natural disaster, or malicious activity; A cybercriminal might flood a website with too many requests to cause it to not work for legitimate requests

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Strategic decisions
A person or organization that seeks to obtain or alter data or other IS assets illegally, without the owner's permission and often without the owner's knowledge (ex. a hacker)
Social CRM is dynamic and each customer crafts their own relationship with the company, a customer without a lot of money but is vocal can have more influence than a quiet rich customer; Traditional CRM is centered on lifetime value and customers likely to generate the most business get the most attention
Decisions that concern broad-scope, organizational issues
The process by which a group of people having the same skills work in parallel to shorten the time required to accomplish a job

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?