Chapter 6
Chapter 7
Chapter 8
Chapter 9
Excel
100

The graphical representation that summarizes the steps a consumer takes in making the decision to buy your product and become a customer is called _____

a conversion funnel

100

_____ knowledge is hard to measure and document and typically is not objective or formalized

Tacit

100

A scrum team usually consists of _________

less than a dozen people

100

Once a _____ is installed, the attacker can gain full access to the computer.

botnet

100

What is the computer shortcut to make an absolute cell reference?

F4

200

One of the goals of business intelligence is to _________.

present the results in an easy to understand manner

200

A _____ is a group of people with common interests who come together to create, store, and share knowledge of a specific topic.

community of practice

200

_____ is the process of analyzing systems to make sure they are operating as intended.

System review

200

A company's risk assessment process can include numerous threats to the computers and networks. Which of the following can be considered an adverse event?

A) Distributed denial-of-service attack
B) Email attachment with harmful worm
C) Harmful virus
D) All of the above

D) All of the above

200

What are the three components of an IF statement?

logic test, true value, false value

300

To analzye various alternative scenarios, a manager would use _______

 the spreadsheet's 'what-if' capability

300

Sophisticated computer systems require an extension of understanding visual images. This is called a _____ system.

perceptive

300

_____ requires unbiased and careful questioning of whether system elements are related in the most effective ways, considering new or different relationships among system elements, and possibly introducing new elements into the system.

Critical analysis

300

In a denial-of-service (DDoS) attack, the perpetrator ____

Instructs the zombie computers to send simple access requests to target computers

300

How do you make a PMT function a positive number?

*-1 OR -PMT

400

The coefficient of determination, r squared, is ____

a number that indicates how well data fits the statistical model

400

The _____ stores all relevant information, data, rules, cases, and relationships that an expert system uses.

knowledge base

400

Laura is carefully estimating the time required for each phase of a proposed system development project to see if her company can meet the client's desired time for completion. Laura is checking on ___________.

schedule feasibility

400

Your business has a web server that has suddenly become unresponsive. When you study the server's logs there are a huge number of requests from what appear to be legitimate computers. The problem is likely because of _____

a denial-of-service attack

400

What are the components of a VLOOKUP function?

lookup value, table array, col num, range lookup (TRUE/FALSE)

500

Which of the following is NOT a core process associated with data management?

A) process for obtaining data
B) process for certifying it fit for use
C) process for gathering BI requirements
D) process for storage

process for gathering BI requirements

500

Which of the following is NOT one of the factors that have caused many organizations to establish knowledge management programs? 

A) expansion of the services sector
B) economic fluctuations
C) emergence of new information technologies
D) globalization

B) economic fluctuations

500

Tara and Zach are leading a systems development project and they want the investigation phase to go smoothly and quickly. They decide to use _____ because it will also help with the analysis and design phases.

joint application development

500

These days, the biggest threats to IT security are from ________

organized groups that have ample resources, including money and sophisticated tools, to support their efforts

500

On the board

On the board