Question
Question 1 If you need to determine impacts on revenue resulting from an increase or decrease in prices and/or sales, the best option to use
Question 1
If you need to determine impacts on revenue resulting from an increase or decrease in prices and/or sales, the best option to use is a
Database
Spreadsheet
Question 2
True or false? The primary financial impact of a robust CRM system results from retaining current customers versus obtaining new customers.
A. True
B. False
Question 3
True or false? A data warehouse will typically contain the history of all previous interactions with specific users (including product use and transactions), but rarely includes other types of data.
A. True
B. False
Question 4
An e-mail message to all the members of your department asks each person to reply to the sender with data on his or her recent sales figures. This is data that is normally not shared with others in the department. You accidentally hit the Reply All button instead of replying to just the sender. Which of the following best describes the data issue at play in this situation?
A. Intentional data loss
B. Accidental data loss
C. Accidental data leak
D. Intentional data leakage
Question 5
Alejandra is using a flash drive that a friend gave to her to copy some financial records from the company database so she can complete a department presentation at home. She does not realize that the flash drive is infected with a virus that enables a malicious hacker to take control of her computer. This is a potential ____________ to the confidentiality of the data in the files.
Threat
Vulnerability
Question 6
True or false? A record can contain only character dataletters, numbers, or special symbols.
A. True
B. False
Question 7
What is the software called that allows the user to create, access, and manage a database?
A. DLP
B. DBMS
C. OO model
D. Relational model
Question 8
You have voluntarily resigned from your company where you were the database administrator. But you find that you still have access to the databases six months after leaving the company. Which threat best describes this database breach?
A. Exploiting weaknesses in an operating system or network
B. Unprotected personal hardware collection
C. Accidental breach resulting from incorrect (but not malicious) usage
D. Weak authentication
Question 9
You are frustrated to find that the only way to contact the customer service department is to make a phone call. The number listed would result in long distance charges to your phone bill. Which issue should be addressed by the company to keep its CRM in line with your expectations?
A. Mining the social media inputs
B. Cleaning up the data
C. Privacy
D. Customers expect more
Question 10
You receive an offer for a credit card that can be use to accrue points that apply to purchase of airline tickets. This comes from a bank that you currently do not use for any banking services. This is a form of CRM that is most typically used for ___________
acquiring new customers
promoting loyalty to the company
a special service for current customers
retention of customers.
Question 11
Which of the following would be an example of a loss of record integrity within a database?
A. Your bank statement is not reflecting a refund that you know was deposited in your account last week (your account balance does reflect the refund).
B. A faculty member posts the full names and final grades on the main page of the class's website.
C. Your online banking site tells you your password has expired and requests that you submit a new one to access your accounts.
D. You are denied a new credit card because the credit card company checked your credit score and found that it did not meet its minimum standards for new accounts. Your credit report does not show any invalid records.
Question 12
Fill in the blanks by selecting one option from each menu.
Are the following examples of social media viral marketing? Indicate your response by selecting yes or no for each example.
A company with an easily recognized product brand has a Facebook page where fans of the product can Friend or Like the page and post comments.
Yes
No
Each time a user sends a message via Twitter, another message is attached to the end advertising the availability of that tool.
Yes
No
When you sign onto your favorite social networking website, you get messages from friends who have seen a television show they thought was a must see!
Yes
No
When you sign on to your favorite social media website, a number of sponsored ads appear on your home page.
Yes
No
Question 13
True or false? Not all of the top database breaches in 2013 involved U.S. companies.
A. True
B. False
Question 14
True or false? In terms of database access, risk assessments should address those who have legitimate credentials for viewing, entering, updating, or removing data from the database and those who are restricted from accessing the database or who have limited rights.
A. True
B. False
Question 15
Which of the following database model choices would be best for storing video clips organized by various vacations you have taken?
A. Flat-file
B. Network
C. Hierarchical
D. Object-oriented
Question 16
True or false? You are traveling and use the free Wi-Fi unsecured internet connection in your hotel room. You successfully connect to your company's database using proper encryption software and passwords and work on some data you need for your next client meeting. You have successfully safeguarded your own PII.
A. True
B. False
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started