If you need to determine impacts on revenue resulting from an increase or decrease in price and/ or sales, the best option to use is a A. database B. Spreadsheet All other issues, aside a customer is to do buisness or increase business with a company if a



If you need to determine impacts on revenue resulting from an increase or decrease in price and/ or sales, the best option to use is a A. database B. Spreadsheet All other issues, aside a customer is to do buisness or increase business with a company if a customer perceives that a service issue is not dealt with fairly. A. likely B. Not likely True or false? data warehousing and data mining mean the same thing when applied to CRM. A. true B. false Paul has been working long hours. He is tired and distracted by family issues, so he has not been doing record updates regularly. There is a sudden power outage in the building and the last 15 records he has been working on have not been saved to the database.Which of the following best describes this data issues?

 A. Malicious data loss B. accidental data leak C. malicious data leak D. accidental data loss 5. Your network administrator finds a virus in the network software. Fortunately, she was able to eliminate it before it resulted in a denial-of-service attack, which would have prevented legitimate users of the networked database from gaining access to the records needed. It turns out that the network software did not have adequate security protections in place. this could be considered. A. threat B. vulnerability 6. Which is the largest component found inside a field? A. bits B. characters C. records D. tables 7. What are procedures that help keep a database current? A. database query procedures B. report generation procedures C. File maintenance procedures D.Data entry procedures 8. You accidentally leave your Iphone in the back of a cab on the way to a meeting. This Iphone is company -owned and contains links to the company database. The next day it is discovered that data from the database has been downloaded by someone who does not have authorization to access that data. which threat best describes this database breach? A. unauthorized access by insiders B. unprotected personal hardware collection C. theft of database backup tapes or hard drives D. Accidental breach resulting from incorrect (but not malicious) usage 9. You make a phone call to your local electricity company with a question about your most recent bill. You are passed from department to department before finally getting to a representative who can address your concerns. Which of the following CRM components needs to be addressed in order to make your contact less-time consuming? A. keeping valuable staff B. cleaning up the data C. mining social media inputs D. privacy 10. you receive an offer for a credit card that can be use to accrue points that apply to purchase of airline tickets. This comes from a bank that you currently do not use for any banking services. This is a form of CRM that is most typically used for. A. acquiring new customer B. promoting loyalty to the company 

C. a special service for current customers D. retention of customers 11. which of the following would be an example of a loss of record integrity in a database? A. you enter the wrong password three times and find that you are locked out of the site you are trying to access. B. because the word ''mortgage'' appears in the subject line of an e-mail you sent to your son or daughter, you begin receiving unsolicited e-mail messages from mortgage companies C. You receive a notice from your favorite online shopping site that you have an outstanding balance for items that you did'nt order? D. Although you clicked the option to ''do'nt share information with any other companies or sites on the bookstores website, you are getting unsolicited e-mail messages from some of the companies that post ads on that site. 12. Are the following examples of increasing brand awareness through groups or fans? select yes or no for each option A. 

your instant messaging service attaches a message to the bottom of each message inviting the recipient to sign up for this same service provider. A. yes B. No You '' friend or ''like'' a page o your favorite social media page that advertises a product you approve. A. yes B. No your friends on a social media site receives messages from you that encourage them to start watching a television services that premiered this past week. A.yes B.no When you sign on to your favorite social media website, a number of sponsered ads appear on your home page. A. yes B.no 13. True or False? a database breach always involves PII. A.true B.false 14. true or false? because you have made it a practice to never access the internet while your personal database is open, you can rest assured that your database would likely not be vulnerable to any compromises. A. true B. false 15. true or false? a database is typically much less complex than a flat file, but it requires more memory for storage allocation. A. true B. false 16. true or false? It is just too challenging to have different password for every device you use and every online site that requires an id and password. It would be ok to use a very strong base word or phrase and change the same 2 or 3 characters in that word/phrase for each site. A.true B.false

Related Questions in business category

The ready solutions purchased from Library are already used solutions. Please do not submit them directly as it may lead to plagiarism. Once paid, the solution file download link will be sent to your provided email. Please either use them for learning purpose or re-write them in your own language. In case if you haven't get the email, do let us know via chat support.