Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

1. The primary financial impact of a robust CRM system results from retaining cu

ID: 3689481 • Letter: 1

Question

1. The primary financial impact of a robust CRM system results from retaining current customers versus obtaining new customers.

- True or False?

2. Paul has been working long hours. He is tired and distracted by family issues, so he has not been doing record updates regularly. There is a sudden power outage in the building and the last 15 records he has been working on have not been saved to the database. Which of the following best describes this data issue?

a. Malicious data loss

b. Accidental data leak

c. Accidental data loss

d. Malicious data leak

3. Cloud storage for database contents is more efficient in terms of easy access by employees anytime, anywhere. The updated information for the database is generated with real-time information sent to a central server within the company. Updates to the cloud are made every hour during normal working hours. This could be considered a potential database _______.

a. threat

b. vulnerability

4. What is the software called that allows the user to create, access, and manage a database?

a. DLP

b. DBMS

c. OO model

d. Relational model

5. You accidentally leave your iPhone in the back of a cab on the way to a meeting. This iPhone is company-owned and contains links to the company's databases. The next day it is discovered that data from the database has been downloaded by someone who does not have authorization to access that data. Which threat best describes this database breach?

a. Accidental breach resulting from incorrect (but not malicious) usage

b. Theft of database backup tapes or hard drives

c. Unauthorized access by insiders

d. Unprotected personal hardware collection

6. You make a phone call to your local electricity company with a question about your most recent bill. You are passed from department to department before finally getting to a representative who can address your concerns. Which of the following CRM components needs to be addressed in order to make your contact less time-consuming?

a. Privacy

b. Keeping valuable staff

c. Mining social media inputs

d. Cleaning up the data

7. Whether the focus is acquisition, loyalty, retention, or service, a company’s use of CRM results in greater profits for the company.

- True or False?

8. Which of the following would be an example of a loss of availability to records within a database?

a. Your favorite online shopping site suddenly begins displaying a different mailing address than the one you use. You know you have not made any changes to your account profile.

b. You are applying for a new credit card and the company indicates that they will be checking your credit score at one of the three primary credit reporting companies.

c. You do a lot of banking online. Today, when you attempted to log in to your account, your valid ID and password are denied, and you cannot get access to your accounts.

d. A classmate tells you that she could see your grades—not just her own—posted in the class’s roster.

9. Are the following examples of increasing brand awareness through groups or fans?

Your instant messaging service attaches a message to the bottom of each message inviting the recipient to sign up for this same service provider.

- Yes or No?

You "Friend" or "Like" a page on your favorite social media page that advertises a product you approve.

- Yes or No?

Your friends on a social media site receive messages from you that encourages them to start watching a television series that premiered this past week.

- Yes or No?

When you sign on to your favorite social media website, a number of sponsored ads appear on your home page.

- Yes or No?

10. The number of reported database breaches is not necessarily the total number of database breaches that occur.

- True or false?

11. In terms of database access, risk assessments should address those who have legitimate credentials for viewing, entering, updating, or removing data from the database and those who are restricted from accessing the database or who have limited rights.

- True or false?

12. Which database model is best used for data warehouses and data mining?

a. Multidimensional

b. Relational

c. Object-oriented

d. Hierarchical

13. You do not like the fact that your computer “times out” after 10 minutes of non-use and goes into a hibernation state (blank screen). You set the timeout period to 1 hour and allow it to activate without reentering a password. This would be considered a good practice for safeguarding your personally identifiable information.

- True or false?

Explanation / Answer

1. True

2. Accidental Data Loss

3. vulnerability

4. DBMS

5. Theft of database backup tapes or hard drives

6. Mining social media inputs

7. True

8.You do a lot of banking online. Today, when you attempted to log in to your account, your valid ID and password are denied, and you cannot get access to your accounts.

9.a. Yes b. Yes c. Yes d. Yes

10.True

11.True

12. Relational

13. False