Customer service issues

Assignment Help Database Management System
Reference no: EM13841620

Question 1: Fill in the blanks by selecting one option from each menu.

Suppose you need to store and manipulate all data related to customers: names, addresses, items purchased, total purchases for the past year, invoices sent and invoices paid, and shipment records. Your best option for handling this kind of data is a -(databasespreadsheet)

A. Database

B. B. Spreadsheet

Question 2: In terms of customer service issues, which of the following is the least likely reason for using a robust CRM?

A A CRM can provide a more rapid response to queries and concerns by forwarding the query to the right department.

B A CRM can provide a company's marketing department with information needed to identify and target new customers.

C A CRM can optimize the information shared among departments, resulting in better management of existing accounts.

D A CRM can enable members of pertinent departments to have access to all the relevant information, enabling them to answer queries and resolve problems quickly and easily.

Question 3: True or false?Data warehousing and data mining mean the same thing when applied to CRM.

A True

B False

Question 4: An e-mail message to all the members of your department asks each person to reply to the sender with data on his or her recent sales figures. This is data that is normally not shared with others in the department. You accidentally hit the Reply All button instead of replying to just the sender. Which of the following best describes the data issue at play in this situation?

A Accidental data loss

B Accidental data leak

C Intentional data loss

D Intentional data leakage

Question 5: Fill in the blanks by selecting one option from each menu.

Alejandra is using a flash drive that a friend gave to her to copy some financial records from the company database so she can complete a department presentation at home. She does not realize that the flash drive is infected with a virus that enables a malicious hacker to take control of her computer. This is a potential --threatvulnerability to the confidentiality of the data in the files.

A. Threat

B. Vulnerability

Question 6: True or false? Tables are composed of fields, and fields are composed of records.

A True

B False

Question 7: Fill in the blanks by selecting one option from each menu.

Part 1:

Part 2:

Part 3:

Part 4:

Which of the following database functions allows the user to enter or modify data in the records? Select Yes or No for each option.

Data entry form

--YesNo

Query

--YesNo

Report

--YesNo

Wizard

--YesNo

Question 8: You accidentally leave your iPhone in the back of a cab on the way to a meeting. This iPhone is company-owned and contains links to the company's databases. The next day it is discovered that data from the database has been downloaded by someone who does not have authorization to access that data. Which threat best describes this database breach?

A Unauthorized access by insiders

B Unprotected personal hardware collection

C Theft of database backup tapes or hard drives

D Accidental breach resulting from incorrect (but not malicious) usage

Question 9: You make a phone call to your local electricity company with a question about your most recent bill. You are passed from department to department before finally getting to a representative who can address your concerns. Which of the following CRM components needs to be addressed in order to make your contact less time-consuming?

A Mining social media inputs

B Keeping valuable staff

C Privacy

D Cleaning up the data

Question 10: True or false? Whether the focus is acquisition, loyalty, retention, or service, a company's use of CRM results in greater profits for the company.

A True

B False

Question 11: Which of the following would be an example of a loss of record integrity within a database?

A A faculty member posts the full names and final grades on the main page of the class's website.

B Your bank statement is not reflecting a refund that you know was deposited in your account last week (your account balance does reflect the refund).

C Your online banking site tells you your password has expired and requests that you submit a new one to access your accounts.

D You are denied a new credit card because the credit card company checked your credit score and found that it did not meet its minimum standards for new accounts. Your credit report does not show any invalid records.

Question 12: Fill in the blanks by selecting one option from each menu.

Part 1:

Part 2:

Part 3:

Part 4:

Are the following examples of increasing brand awareness through groups or fans? Select Yes or No for each option.

Your instant messaging service attaches a message to the bottom of each message inviting the recipient to sign up for this same service provider.

--YesNo

You "Friend" or "Like" a page on your favorite social media page that advertises a product you approve.

--YesNo

Your friends on a social media site receive messages from you that encourages them to start watching a television series that premiered this past week.

--YesNo

When you sign on to your favorite social media website, a number of sponsored ads appear on your home page.

--YesNo

Question 13: True or false? Hacking accounts for the least number of all reported database breaches in 2013.

A True

B False

Question 14: True or false? Because you have made it a practice to never access the internet while your personal database is open, you can rest assured that your database would likely not be vulnerable to any compromises.

A True

B False

Question 15: Which database model is best used for data warehouses and data mining?

A Object-oriented

B Relational

C Hierarchical

D Multidimensional

Question 16: True or false? You are traveling and use the free Wi-Fi unsecured internet connection in your hotel room. You successfully connect to your company's database using proper encryption software and passwords and work on some data you need for your next client meeting. You have successfully safeguarded your own PII.

True

False

Reference no: EM13841620

Questions Cloud

Specification of tables-attributes : Handle costumes & accessories by using subtypes/supertypes, and show the ERD from all information we have gathered for the KCT. Your design should include a specification of tables, attributes, primary keys, foreign keys, data types, and null/not ..
Calculate the own-wage elasticity of labor demand : Calculate the own-wage elasticity of labor demand as the wage changes from $5 to $6. How would your answer be different if the wage rose from $20 to $21 - How does the slope change as one moves up this labor demand curve? How does the elasticity c..
Design model below to complete : Use the KCT design model below to complete this case.CUSTOMER(CustomerID, FirstName, LastName, Street, City, State, Zip, Phone)RENTAL(RentalID, RentalDate, NumberOfDays,
Describe what is exchanged between the organisms : Describe what is exchanged between the organisms
Customer service issues : In terms of customer service issues, which of the following is the least likely reason for using a robust CRM?
What are the advantages and disadvantages of duel sourcing : If you were tasked to prepare an audit protocol to ensure senior management about the integrity of the supply chain, who would you audit and what elements would you audit them for. What are the advantages and disadvantages of duel sourcing (two sup..
Compute the marginal rate of substitution : Determine which of the labeled points are Pareto Efficient. Be sure to explain why you claim each point is or is not Pareto Efficient - Draw an indifference map representing
In what ways can a bond investor make money? : In what ways can a bond investor make money?
What is estate planning : What is estate planning

Reviews

Write a Review

Database Management System Questions & Answers

  Provide an unique example of a supertypesubtype

provide an unique example of a supertypesubtype relationship. be sure to describe the relationship and discuss if the

  Create a class called testsystem

Create a class called TestSystem and write atest method which tests your system using a scenario. In your report document, describe the testing scenario and the expected behaviour of your system. Provide screen shots of your system testing in your..

  Design visio diagram

Create a database diagram with the entities and attributes that the scenario identified (i.e., a college tracking students, courses, and instructors).

  Problem related pseudocode for a game application

Create the pseudocode for a game application that contains an array of five (5) multiple-choice questions related to your favorite hobby. Each question contains four answer choices - A..., B..., C..., D...

  Development of the database

As an alternative for development of the database, you are considering outsourcing the functions above. Research the Internet and other media sources for vendors who develop registrar and school management database systems

  Give an example of a view on emp that would be impossible to

Give an example of a view on Emp that would be impossible to update (auto- atically) and explain why your example presents theupdate problem that it does.

  Make a report that identifies the most expensive bicycles

Prepare a report that identifies the five most expensive bicycles. The report should list the bicycles in descending order from most expensive to lsit expensive, the quantity on hand for each, and the mark up percentage for each.

  Find name and membership number of members

Find the name and membership number of members who have borrowed more than five different books of that publisher.

  Compare the number of admissions in st mary

Using the Minnesota hospitals admission by care unit database for the year 2012, our topic is to compare the number of admissions in St. Mary's and the University of Minnesota hospital center. We chose these two organizations because of their impo..

  Verify the values inserted by using a query

Write INSERT statements for adding the following data to the new table: Verify the values inserted by using a query. Display each distinct agency (each agency only once)

  A motor vehicle maintenance center wants to enhance its

write a 200- to 300-word short-answer response for the followinga motor vehicle maintenance center wants to improve its

  Analyze the sql injection steps that susan used

Analyze the SQL injection steps that Susan used that enabled her to access the E-shopping4u.com database.  Describe at least two (2) tools that Susan could have used to assist her in the attack described within the case example, and suggest the key b..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd