You are on page 1of 4

1.

In the early stages of a startup like Uber, valuation is based heavily on the company’s
________.

a. technology
b. present value
c. growth potential
d. assets

Answer: C

2. ________ are data visualizations that display the current status of key performance indicators
in easy-to-understand formats:

a. Predictions
b. Dashboards
c. Digital models
d. Real-time reports

Answer: B

3. The goal of _________ is to eliminate unnecessary non–value added processes, then to


simplify and automate the remaining processes to reduce cycle time, labor, and costs.

a. Strategic planning
b. Business process reengineering
c. Real-time information systems
d. Business Intelligence

Answer: B

4________ business models strive to create the best solution or experience for the customer.

a. Product-centric
b. Customer-centric
c. Profit-centric
d. Revenue-centric

Answer: B

5________ is the control of enterprise data through formal policies and procedures to help ensure
that data can be trusted and are accessible.

e. Data governance
f. Master data management
g. Business strategy
h. Data standardization

Answer: A

6________ is the use of IT tools and methods to collect, process, consolidate, store, and secure
data from sources that are often fragmented and inconsistent.

i. Information management
j. Data governance
k. IT strategy
l. IT development

Answer: A

7. Which of the following data management technologies store data that are generated by
business apps and operations?

a. Data marts
b. Data warehouses
c. Databases
d. Transaction-processing systems (TPS).

Answer: C

8. Which of the following about IPv4 is false?

a. It has been Internet protocol for over three decades.


b. It is easy to configure and to change ISP.
c. It has reached the limits of its design.
d. It is being replaced with IPv6.

Answer: B

9. Network capacity is measured in terms of its ________.

a. Protocol
b. Size
c. IP version
d. Bandwidth

Answer: D

10. Negative consequences of lax cybersecurity that companies tend to face include all of the
following except ________.
a. Damaged brands and reputations
b. Criminal charges
c. Financial penalties
d. Customer backlash

Answer: B

11. The main cause of data breaches is ________, which is so successful because of ________
when management does not do enough to defend against cyberthreats.

a. Hacking; highly motivated hackers


b. Hacking; negligence
c. Malware; BYOD
d. Malware; negligence

Answer: B

12. A person who attempts to find computer security vulnerabilities and exploit them for
personal financial gain or other malicious reasons.

a. White Hat hacker


b. Red Hat hacker
c. Black Hat Hacker
d. Gray Hat Hacker

Answer: C

13. Because businesses compete for our attention, they have a vested interest in maintaining a
high degree of visibility on _________.

a. search engine results pages


b. direct to consumer sales channels
c. organic search listings
d. search engine optimization

Answer: A

14. The most popular commercial search engines, Google and Bing, are based on ________
technology.

a. crawler
b. directory
c. meta-search
d. semantic
Answer: A
15. A major source of revenue for search engines Google and Yahoo is _______ , such as for
certain keywords.

a. Subscriptions
b. Licensing fees
c. Advertising
d. User fees

Answer: C

You might also like