
Exam 3
Authored by Joshua Pugh
Business
University
Used 2+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
58 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Primary purposes of collaboration
Natural disasters (ex. a company's location experiences a flood and damages their infrastructure)
An information system that supports the sharing of content among networks of users
Become informed, make decisions, solve problems, manage projects
Firewall - a computing device that prevents unauthorized network access
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Constructive criticism
The process by which a group of people having the same skills work in parallel to shorten the time required to accomplish a job
A person or organization that seeks to obtain or alter data or other IS assets illegally, without the owner's permission and often without the owner's knowledge (ex. a hacker)
Both positive and negative advice given to improve an outcome
Internal firewall - inside the organizational network
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Groupthink
A malware computer program that replicates itself
A phenomenon where the desire for group cohesion leads to poor decision making
Two keys are used; one key encodes the message, and the other key decodes the message
A software platform that uses social media to facilitate cooperative work of people within an organization
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Characteristics of an effective collaborator
Speaks his/her mind even if it's an unpopular viewpoint, willing to enter into difficult conversations, skillful at giving/receiving negative feedback, willing to put forward unpopular ideas, brings different perspectives
Security problem in which users are not able to access an information system; can be caused by human errors, natural disaster, or malicious activity; A cybercriminal might flood a website with too many requests to cause it to not work for legitimate requests
Using computers with wireless connections to search for unprotected wireless networks
Become informed, make decisions, solve problems, manage projects
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Operational decisions
Two keys are used; one key encodes the message, and the other key decodes the message
Viruses that masquerade as useful programs or files. A typical Trojan horse appears to be a computer game, an MP3 music file, or some other useful, innocuous program
Decisions that concern the day-to-day activities of an organization
Advertising, Freemium (offers users a basic service for free and then charges a premium for upgrades or advanced features)
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Managerial decisions
Advertising, Freemium (offers users a basic service for free and then charges a premium for upgrades or advanced features)
False targets for computer criminals to attack, looks like a particularly valuable resource, such as an unprotected website, but in actuality the only site content is a program that determines the attacker's IP address
Decisions that concern the allocation and use of resources
Security problem in which users are not able to access an information system; can be caused by human errors, natural disaster, or malicious activity; A cybercriminal might flood a website with too many requests to cause it to not work for legitimate requests
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Strategic decisions
A person or organization that seeks to obtain or alter data or other IS assets illegally, without the owner's permission and often without the owner's knowledge (ex. a hacker)
Social CRM is dynamic and each customer crafts their own relationship with the company, a customer without a lot of money but is vocal can have more influence than a quiet rich customer; Traditional CRM is centered on lifetime value and customers likely to generate the most business get the most attention
Decisions that concern broad-scope, organizational issues
The process by which a group of people having the same skills work in parallel to shorten the time required to accomplish a job
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?