The graphical representation that summarizes the steps a consumer takes in making the decision to buy your product and become a customer is called _____
a conversion funnel
_____ knowledge is hard to measure and document and typically is not objective or formalized
Tacit
A scrum team usually consists of _________
less than a dozen people
Once a _____ is installed, the attacker can gain full access to the computer.
botnet
What is the computer shortcut to make an absolute cell reference?
F4
One of the goals of business intelligence is to _________.
present the results in an easy to understand manner
A _____ is a group of people with common interests who come together to create, store, and share knowledge of a specific topic.
community of practice
_____ is the process of analyzing systems to make sure they are operating as intended.
System review
A company's risk assessment process can include numerous threats to the computers and networks. Which of the following can be considered an adverse event?
A) Distributed denial-of-service attack
B) Email attachment with harmful worm
C) Harmful virus
D) All of the above
D) All of the above
What are the three components of an IF statement?
logic test, true value, false value
To analzye various alternative scenarios, a manager would use _______
the spreadsheet's 'what-if' capability
Sophisticated computer systems require an extension of understanding visual images. This is called a _____ system.
perceptive
_____ requires unbiased and careful questioning of whether system elements are related in the most effective ways, considering new or different relationships among system elements, and possibly introducing new elements into the system.
Critical analysis
In a denial-of-service (DDoS) attack, the perpetrator ____
Instructs the zombie computers to send simple access requests to target computers
How do you make a PMT function a positive number?
*-1 OR -PMT
The coefficient of determination, r squared, is ____
a number that indicates how well data fits the statistical model
The _____ stores all relevant information, data, rules, cases, and relationships that an expert system uses.
knowledge base
Laura is carefully estimating the time required for each phase of a proposed system development project to see if her company can meet the client's desired time for completion. Laura is checking on ___________.
schedule feasibility
Your business has a web server that has suddenly become unresponsive. When you study the server's logs there are a huge number of requests from what appear to be legitimate computers. The problem is likely because of _____
a denial-of-service attack
What are the components of a VLOOKUP function?
lookup value, table array, col num, range lookup (TRUE/FALSE)
Which of the following is NOT a core process associated with data management?
A) process for obtaining data
B) process for certifying it fit for use
C) process for gathering BI requirements
D) process for storage
process for gathering BI requirements
Which of the following is NOT one of the factors that have caused many organizations to establish knowledge management programs?
A) expansion of the services sector
B) economic fluctuations
C) emergence of new information technologies
D) globalization
B) economic fluctuations
Tara and Zach are leading a systems development project and they want the investigation phase to go smoothly and quickly. They decide to use _____ because it will also help with the analysis and design phases.
joint application development
These days, the biggest threats to IT security are from ________
organized groups that have ample resources, including money and sophisticated tools, to support their efforts
On the board
On the board