MIS Exam 1

¡Supera tus tareas y exámenes ahora con Quizwiz!

Cloud computing can best be described as

using the Internet to store and access resources.

According to Henri Fayol, productivity and efficiency are increased when

workers specialize and become proficient in their assigned tasks.

What is the purpose of saving an Excel file as a .cvs (comma-separated format) file?

to share data with other spreadsheet users regardless of which spreadsheet program is being used

In an Excel file, if a label (such as the word "panda") is used in a formula, what will appear in the cell when the Enter key is pressed?

#VALUE!

You just had a great lunch at a nice restaurant and decide to leave a 15% tip on your $18 meal. What will be the total charge on your debit card?

$20.70

If you type =3+2^2*6 into a cell in a spreadsheet and then press Enter, what will appear in the cell?

27

The number 27 in the cell depicted above is a value, not a formula. If the user drags the cursor to the right, what will appear in the cell to the right?

27

Every time you go to the gas station you're amazed by how much prices have increased. At this time last year the price was $3.20 per gallon and now the price is $4.25 per gallon. Which of the following spreadsheet formulas correctly calculates the percentage change?

= ((4.25 - 3.20) / 3.20) * 100

Select the spreadsheet formula that would correctly calculate the average (mean) of the following values: 25, 50, and 75.

= (25 + 50 + 75) / 3

Select the spreadsheet formula that would correctly calculate the average (mean) of the following values: 3, 2, 6, and 8.

= (3 + 2 + 6 + 8) / 4

Select the spreadsheet formula that would correctly calculate the average (mean) of the following values: 4, 2, 5, and 5.

= (4 + 2 + 5 + 5) / 4

What was Weber's view on the use of physical force?

A police force overseen by a local government enforces laws within a community

Which is the best description of the relationship between "green computing" and management information systems (MIS)?

Advances in MIS technology will help make "green computing" easier and more widespread.

The acronym for a database administrator is ________.

DBA

The acronym for Data Governance is ________.

DG

Pivot tables provide a quick way to organize information. In most spreadsheet programs, click the ________ tab to create a pivot table.

Data

________ involves identifying errors in data sets and removing/correcting these errors to ensure the data is accurate.

Data scrubbing

Who espoused "Theory X" and "Theory Y"?

Douglas McGregor

What was the driving principle behind McGregor's Theory Y?

Employees are capable of working without constant supervision.

Which is the best description of a typical flextime policy?

Employees create their own work schedules: they can change when they start and stop their workday.

________ is software with processing capabilities outside of what the operating system of the consumer provides.

Middlewear

OLAP software allows users to perform multidimensional analysis of a wide range of business data, complex calculations, and trend analysis, as well as data modeling. What does OLEP stand for?

Online Analytical Processing

Which three of the following refer to the amount of money owed on a loan when it is first borrowed (excluding any origination fees).

Principal Balance Present Value (PV)

One of the most popular query languages is ________.

SQL

What is a main proposition or argument of John Locke's labor theory of property?

Since people own their own labor, they naturally own the products of their labor.

What is a main proposition or argument of John Locke's labor theory of property? Multiple ChoiceLaboring on natural resources does not make this shared property personal property.Since people own their own labor, they naturally own the products of their labor.CorrectProtecting personal property or wealth is the responsibility or job of the owner.People can only accumulate property or wealth by laboring together as a group.

Since people own their own labor, they naturally own the products of their labor.

What is one major distinction between telecommuting and flextime arrangements?

Telecommuters often must work during regular business hours.

Which of the following statements most clearly describes Mary Parker Follett's contribution to management theory?

The most important elements of an organization are relationships, informal processes, and communications.

Which of the following statements most clearly describes Mary Parker Follett's contribution to management theory? Organizational processes and societal processes can be studied through a common lens.Incorrect Resolution of conflict is best carried out by employees themselves, before involving managers. The most important elements of an organization are relationships, informal processes, and communications.Correct The true sources of power within an organization are planning and training.

The most important elements of an organization are relationships, informal processes, and communications.

What function of a micro-networked POS systems is responsible for increased accuracy of employees when ringing up customer purchases?

The total button which automatically added up the amount owed for items purchased`

Max Weber believed that organizations were best supported by which of the following strategies?

The use of specialization among employees.

Max Weber believed that organizations were best supported by which of the following strategies? Specific rules on behavior that allow little room for employees to work their own way.Incorrect The use of specialization among employees.Correct Frequent recruiting for senior level positions from outside the organization. Lack of discipline to encourage creativity.

The use of specialization among employees.

Why did Max Weber believe that personal responsibility, ethical behavior, and charity were fundamental to capitalism?

These are the basic principles of Protestantism.

A company uses an HR management system with artificial intelligence to deliver badges to the employees who have received the best scores in annual online training modules and let managers know which employees have not completed it as the deadline approaches. What function is this HR management system helping the company perform?

Training

John Locke's labor theory of property is applied to modern management theory because

it explains what motivates people to work: the desire to become personally wealthier.

Each loan payment is referred to as a(n)

period

Peter Drucker felt the most important responsibility of a corporation is to

serve its customers.

Peter Drucker felt the most important responsibility of a corporation is to serve its customers diversify its portfolio. make a profit hire from within.

serve its customers.

How might a professor use an LMS to keep track of attendance in a class that is held face to face?

At the beginning of each class period, students are required to use clickers to take a brief multiple-choice test to indicate they are present.

What type of system is used to assist with processes that rely on a large number of inputs that frequently change?

Decision support system

A marketing manager requests and receives a report on consumers who use a competing brand of laundry detergent. Included in this report is demographic information such as age, gender, and geographic location; frequency with which the product is purchased; estimated amount of revenue generated by this product per geographic location; and qualities that consumers rank as important to their purchasing decision. These reports represent what function of a marketing information system (MKIS)?

Gathering marketing data

To quickly show if the values in a column or row are greater than, less than, or equal to a certain value, use the ________ function.

IF

How are managers' jobs expected to change as management information system (MIS) technology and tools improve?

Managers will be freed from tasks performed by online services or staff using collaboration tools.

What did Peter Drucker mean by "decentralization"?

Organizations work at what they do best and have a comparative advantage and outsource the work at which they have no advantage.

Which system is able to create purchase orders, manage inventory, and forecast future inventory needs?

Supply chain management system

A manager wants to accurately predict how many light-up three-wheeled scooters they'll need to meet holiday demand. Which component of supply chain management would the manager be using to determine the appropriate number to produce?

Supply chain planning

Choose a phrase from below that pinpoints when in-person meetings may be a better choice than video conferencing.

a meeting's content is sensitive

To make a calculation always refer to a specific cell when copying it using the fill handle, make the cell a(n) ________ reference.

absolute

A common, basic condition for most flextime policies is the requirement that employees must

be able to fulfill their work responsibilities, including attending certain meetings or events in-person.

Select two common uses of spreadsheets.

budgeting finance

Online Analytical Processing (OLAP) is included in many Business Intelligence (BI) software applications. We use this OLAP for a range of ________ discovery activities, including report creation and analysis, analytical calculations, forecasting, budgeting, planning, and what-if predicative analysis.

data

When creating a field in a database, the field type specifies the type of ________ in the field.

data

A search engine continually adjusts its algorithms as more data enter its servers. This is an example of the use of

data analytics

When you enter a calculation into a spreadsheet, you start by entering a(n) ________ sign.

equal

Computing is considered "green" or environmentally responsible when

it reduces the consumption of natural resources and the associated environmental impact.

What are the two most common spreadsheet charts?

line graphs pie graphs

Bankers and other lenders refer to the initial amount of the loan (the principal) as the loan's

present value (PV)

A ________ key must contain a unique value.

primary

To set a primary key field in a database table, you must click the ________ key button.

primary

Mainframes were originally developed for their

reliability of handling transactions.

One reason to create database policies is to specify the ________ used in database design (how the data is structured)

rules

Programs such as Microsoft Excel, iWork's (Apple) Numbers, Google Sheets, and OpenOffice Calc, that allow users to arrange numerical data are called

spreadsheets.

The development and growing popularity of flextime arrangements can largely be attributed to

the spread of high-speed Internet and technologies such as telecommuting and teleconferencing.

What does the General Data Protection Regulation (GDPR) strive to achieve?

to ensure EU companies protect the privacy and personal data of EU citizens

A legend shows which items are being identified by the different colors, lines, bars, or pie segments.

true

In Apple iWork's Numbers the freeze options are located under the Table tab. In Microsoft Excel and Google sheets the freeze cells or panes options are found in the ________ menu.

view

One of the ways web mining improves web experiences is through site visibility. Site visibility includes how and ________ the website appears when queries are executed in a search engine.

when

In addition to advancements in computer hardware, what drove improvements to POS (point-of-sale) systems in the 1990s?

an increasingly diverse group of users and their needs

An enterprise resource planning (ERP) system is

an integrated MIS system for agility and a competitive edge.

Who are the users of an executive support systems (ESS)?

business leaders in charge of several functions or separate enterprises

Saving a spreadsheet file in .cvs format only saves the

cell values.

When data is stored in one place, it means it is ________.

centralized

To create a relationship between two tables, you must use a ________ field that is present in both tables.

common

Using multiple lists and data sources can lead to a(n) ________ in data integrity.

decrease

Relational databases use ________ called relationships between tables.

links

Database administrators ________ and troubleshoot the database (if needed) to ensure it is stable and usable when needed.

monitor

Employee monitoring software

observes computer use of all employees from a central location.

Fayol's principles for structuring organizational roles and authority emphasize

order and unity, so that employees understand their role and report to only one person.

Traditional file systems use ________, files, and documents.

paper

RAM storage and ________ processing are two main in-memory computing components.

parallel

A long-standing company is expanding their existing workforce. What, in all likelihood, will they invest in terms of computing capabilities?

personal computers

Because they make it easy to arrange, display, and calculate numerical data, ________ programs are commonly used in nearly every business setting.

spreadsheet

A database management system (DBMS) is a computer program that is used to create, process, and administer a ________.

database

Mary Parker Follett's theory of management is based on the principle that

success depends on the flow of ideas from all levels of an organization.

Data governance involves the staff, procedures, and technologies needed to ________ and protect the data and data properties of an entity.

supervise

Relational databases organize data into ________ based on structured data groupings.

tables

What is Frederick Taylor's four principles of scientific management?

task measurement, employee development, worker-manager collaboration, and management training

Data marts assist with the ________ of what data a user needs rather than focusing on existing data.

analysis

The Rule of 72 states that dividing 72 by the interest rate approximates the time for the investment to double. This calculates the ________ of the investment.

future value (FV)

To retain a row or column, but remove it from view, right-click on the row or column heading and select

hide

Database Management Systems (DBMS) assign users different access rules to protect the data and users from ________, data leaks, and the misuse of data.

identity theft

According to Frederick Taylor, the purpose of management is to

make the business as prosperous as possible.

In his text, "The Human Side of Enterprise," Douglas McGregor focused on

manager attitudes toward their employees.

Data mining is a means of ________ data that can help organizations find patterns and relationships within data sets.

analyzing

Sports analysts often use ________ to keep track of statistics, times, and scores of nearly every sporting event.

spreadsheets

Structured Query Language (SQL)-specific queries use specific SQL ________ to execute the query.

statements

A videoconference may be a better choice than a voice conference call because it allows

better communication through nonverbal cues.

SQL is used to communicate with a database. According to ANSI (American National Standards Institute), it is the ________ language for relational database management systems.

standard

When creating a relationship in a relational database management system (DBMS), which object is used?

table

A marketing manager wants to determine which marketing campaign for a specific product was the most successful as determined by the amount of revenue generated. She uses the company's MKIS to determine how much revenue was generated for each of the three major campaigns run that year to determine revenue generated as compared to the cost of the campaign. This is an example of using an MKIS to

assist with cost-benefit analysis.

A corporation's Twitter report card indicates that engagement has dropped off in the past two months. What information from the tweet activity dashboard could they use to determine the cause of this drop off in engagement?

A change in demographics of the people who are engaging with their tweets.

What is a cloud deployment model?

A cloud deployment model defines the framework of a cloud environment.

What is the difference between a cloud service and a web service, if any?

A cloud service provides users with increased computing power and data management, whereas a web service provides the software tools needed for devices and systems to communicate with each other.

Why is a target market important to businesses and organizations?

A target market is the group of consumers most likely to purchase an organization's products and services.

What is conducted in the process design step of business process management?

Activities are examined and divided into their individual components.

How does each additional block added to the blockchain strengthen the integrity of the entire chain?

Because each block contains information on recording time and sequence for both its transaction and the transaction immediately preceding it, with more blocks there is more transaction history information, making it difficult to falsify.

Why is a denial-of-service attack (DoS attack) a threat to data availability?

By flooding a system with incoming messages, a DoS attack forces the system to shut down, rendering it inaccessible to the users who legitimately have access to it.

What is the key reason to implement cloud computing into one's personal and/or business data and information processing?

Cloud computing eliminates the need to store files and software on a local drive.

Which of the following is the clearest definition of a computer virus?

Code-created malware that, when executed, damages programs and performance.

Which of the following is the clearest definition of a computer virus? Surveillance software introduced through a seemingly innocuous link. One of a class of cybersecurity threats that compromise a user's confidential information.Incorrect Malware that lives in the operating system and attacks system functionality. Code-created malware that, when executed, damages programs and performance.

Code-created malware that, when executed, damages programs and performance.

What is gathering, storing, and searching relevant data known as?

Data Science

What is used to convey meaning from Big Data Analytics to managers who need to make decisions based on this data?

Data Visualization

How does the cybersecurity goal of preserving data integrity relate to the goal of authenticating users?

Data integrity is more easily preserved if users must be authorized to access data and make changes.

Determine which of the following is an example of data that has integrity.

Data that are used to set sales goals for account executives are stored on a secure server; managers are allowed read-only access to the sales data for the reps they directly manage.

What typically happens during Step 3 of business process management just before the execution process is fully automated?

Decision makers compare engine output to previous business activity.

What is the benefit to using social media for conducting market research?

Demographic data and market information is much easier to gather from social media sites than it was to previously collect.

During a project, it is determined that some of the necessary equipment will arrive 1 week later than anticipated. In order to keep the project moving, the project manager decides to begin the second step of the project before the first step is completed. During what phase of the project management process would this occur in?

Execution Phase

Where is the headquarters of SAP, the recognized leader in the development of HRM software, located?

Germany

What is the goal of the process design step of business process management (BPM)?

Identify redundancies and inefficiencies in existing processes.

What is the main benefit of having a social media information system (SMIS) that gathers and analyzes a company's social media data?

If the data show that a social media campaign is not attracting the desired attention or level of engagement, the company can change its campaign strategies.

A doctor in a small, private practice is looking for a safe way to share and receive patient information with other doctors his patients go to for care. She wants to make sure that any system she uses guarantees her patients privacy and abides by all local, state, and federal regulations (including HIPPA). Her tech adviser recommends a system that uses blockchain. Why would this be a good system for this type of information?

In blockchain, each record of a patient's data would be encrypted as a secure "block" of data; only authorized users would be able to access it.

Which social media goal directly aligns with an organization's mission to increase the public's environmental awareness by increasing news coverage of environmental issues?

Increasing the conversion rate of its social media posts to full news stories

What is the purpose of the Twitter report card?

It highlights high-performing tweets. Correct. Influencers are introduced to their target audience through the Twitter report card.

How does a cybersecurity exploit threaten the safety of a system?

It is a tool or technique for taking advantage of a system vulnerability to cause harm.

Which statement accurately describes the need to keep sensitive data, information, and systems confidential?

It is both a major goal and a requirement for cybersecurity.

How are data in process different from data at rest or data in storage?

It is held in the device's RAM until it can be processed by the CPU or GPU.

Which of the following statements describes a keylogger most accurately?

It is surveillance malware that captures confidential information through keyboard input.

Which is the best definition of a cybersecurity exploit? It is the damage done by a hacker who breaks into a system and steals information. It is the vulnerability in security procedures or controls that opens a system to hackers. It is the means by which a hacker capitalizes on a cybersecurity vulnerability to do harm.Correct It is the unauthorized network access that a hacker steals from an authorized user.

It is the means by which a hacker capitalizes on a cybersecurity vulnerability to do harm.

Which of the following statements best illustrates why a rootkit is described as creating a back door?

Like an intruder coming through a back door, a rootkit allows an unknown user into an operating system.

Which phase of the project management process involves feasibility studies?

Phase 1: initiation phase

What is the goal of the modeling step of business process management?

Provide recommendations on handling labor and supply imbalances.

The first two steps of the six-step process in creating a social media information system (SMIS) involve developing social media goals and setting metrics. What are the third and fourth steps of the process?

Step 3: identify the organization's target market; Step 4: determine and integrate into the SMIS design traits valued by the target market.

The first two steps in business process management (BPM) are examining the design of the process and modeling the process. What are the third and fourth steps of the process?

Step 3: running the process; Step 4: monitoring the process

During which step of business process management are bottlenecks and excesses in the engine identified?

Step 4: process monitoring

Which step of business process management allows managers to create a continually improving process?

Step 5: process optimization

Explain the purpose of the National Institute of Standards Technology (NIST) Cybersecurity Framework.

The NIST Cybersecurity Framework is a voluntary guide that helps organizations understand and protect themselves against cybersecurity risks.

What occurs in the process execution step of business process management?

The business process execution language engine is run.

Which statement best describes the overall, long-term cost of a cloud-based business management system?

The cost is difficult to estimate because the cloud storage provider can raise its subscription fees multiple times.

Which statement best explains why knowing an organization's value proposition is important for creating its social media information system (SMIS)?

The organization can increase its exposure and user engagement on social media by designing an SMIS that enables it to reinforce and build on its identified strengths.

Which is the best explanation of how the World Wide Web (WWW) differs from the internet?

The web is only one of many applications that runs on and is accessed through the internet.

Which statement best describes the current landscape or state of human resource management software and/or service providers?

There are a variety of HRM companies that serve different business needs.

Which is the most common characteristic of social engineering cybersecurity attacks?

They are conducted via emails that offer a reward in exchange for clicking a given link.

What do all cybersecurity threats have in common?

They are connected to the loss of information, software, or hardware.

Why would a business choose to implement a business intelligence (BI) software system that their employees are already familiar with?

User familiarity will make the implementation easier and as seamless as possible.

How does VPN software ensure that people accessing a network are authorized to do so?

VPN software authenticates users.

Why would a vendor agreement be a disadvantage of cloud computing?

Vendor agreements make it difficult to switch services.

What is the second step that occurs when placing a call on a cellular network?

Your voice is converted by your phone to an electrical signal that is transmitted via radio waves to the nearest cell tower.

The internet has two primary components that enable it to connect networks and individual devices

a "backbone" of connected hardware and a suite of internet protocol software.

A social media information system (SMIS) should be designed to gather and analyze social media data because

a company can use platforms' data about its activities and audience to improve its social media strategies and business decisions.

Rana's employment agency is a startup with a one-person IT department, but it requires a business management system that can meet unique needs. Which type of business management system should she adopt?

a custom, cloud-based solution (PaaS or IaaS)

Troy has a customized business management system that he likes. However, it cannot easily scale up to meet his growing database storage needs, offers poor protection from hackers, and requires maintaining a large IT department. Troy should replace this system with

a custom, cloud-based solution (PaaS or IaaS).

Each time a user clicks or interacts on a social media website

a data point that can be analyzed is recorded.

Which component of a business management system can help a manager check and report on the company's current inventory?

a database management system (DBMS)

Software-based keyloggers often infect a system through

a malicious email or link opened by an unsuspecting user.

The business management system with the lowest initial or startup expenses is

a software as a service (SaaS) option.

Which type of business management system is best described as an "off-the-shelf" (OTS) or prepackaged system?

a software as a service (SaaS) system

Which of the four criteria is occurring when a network confirms that a transaction has not yet occurred on the blockchain?

a transaction is verified

What is a Gantt chart?

a visual timeline of project phases and tasks

The Stored Communications Act prohibits which activity?

accessing the communications of an organization without authorization

An effective social media information system (SMIS) collects and analyzes data about the organization's

activities and audience on social media and its own website(s).

If a company wants to create a secure computer network that can be accessed and used solely by its employees, it should create

an intranet.

Managers have the greatest degree of control over a new business management system that is implemented as

an on-premises solution.

Which type of business management system would best enable executives to quickly adapt to dynamic business environments by implementing their own changes?

an on-premises system

A high-end jewelry designer creates several different brands of jewelry for women of different ages and tastes. To gain the greatest exposure to her potential customers on social media, her SMIS should be designed to use the platforms that

are most used by the target markets for each jewelry line or brand.

Social engineering is used to target people whom

are not cautious about giving out confidential or sensitive information.

Which of the following is an example of an activity that would be useful during the planning stage of the plan-protect-respond cycle?

attempting to exploit flaws from the outside, simulating attacks that a hacker would try

Many managers, particularly in smaller firms, use companies such as Zenefits and BenefitFocus to manage their employees

benefits systems.

Malicious bots are cybersecurity risks because they

can reproduce and link to an outside server.

Amazon, Kamatera, Salesforce, and Google are all examples of

cloud service providers.

A company just received a government contract to provide onboarding services targeted towards people who want to sign up for Medicare. They will be handling sensitive information, including the users' Social Security numbers and home addresses and will host the login page where people will access their Medicare account online. What should this company subscribe to in order to ensure all of the sensitive information is kept safe?

cloud services security

A business is planning on using sponsored social media content for its new product, which is appropriate for people in different age demographics. Which generation would be best targeted by sponsored posts on Instagram?

college students

A computer network must be connected to the internet to support

communicating via email with people on other networks.

Recognizing that inappropriate and inconsistent pay can demotivate the strongest workforce, many firms use

compensation management software.

What is the first step in the six-step process of creating an SMIS?

create system goals that align with the goals of the organization

The understanding that retaining customers is more profitable than finding new ones is behind which business management system?

customer relationship management

Of these business management systems, which one is focused on how managers can develop a lasting relationship with individual customers that promotes long-term buying?

customer relationship management system

The business management system that collects customers' email, telephone, and social media data and adds information about their buying habits is a(n)

customer relationship management system.

One primary purpose or function of a company's social media information system (SMIS) is to connect the company's

customers on social media with its products and services on its website.

Which part of Business Intelligence (BI) software platforms displays an overview of the data that is presented?

dashboard presentation

A business management system includes three main components: a decision-making information system, a predictive information system, and a

database management system.

Integrating database management systems (DBMS) with predictive analytics to give managers a recommended course of action is the focus of

decision-making management information systems.

The purpose of the application protocol layer of TCP/IP is to

define how email programs and other software communicate within and across networks.

In addition to overall digital flexibility, technological savings, and increased collaboration, computing in the cloud provides organizations with

disaster recovery.

Smaller firms may rely on software packages such Kronos Workforce Ready, BambooHR, PerformancePro for services related to

employee evaluation.

The primary goal of a company's social media strategy is to

engage potential customers.

Benefits administration involves the human resource (HR) function of

enrolling, maintaining, managing, and discontinuing employee benefits.

Which cryptocurrency offers a blockchain-based platform that can be used to develop decentralized applications?

ethereum

The key feature of Web 2.0 that allows users to collectively classify information, such as by tagging websites and online images, is called

folksonomy.

Because some tasks can be done concurrently while other tasks are dependent upon the completion of preceding tasks, Gantt charts are constructed using a

horizontal bar chart.

An educational startup has already written its proprietary "Homework Helper" code, using AI to help high school students with homework. While their data storage needs are currently small, they expect their needs to grow exponentially as they increase their user base. Which of the following could help them with this?

infrastructure as a service (IaaS)

Recruiting and hiring management software can help HR managers evaluate how their organization's future staffing needs are influenced by

internal factors such as employee turnover and external factors such as public demand for the organization's products.

Calculating reordering points and order quantity levels are key advantages of modern

inventory management systems.

The main advantage of the IPv6 format for IP addresses is that

it can accommodate many more addresses than the IPv4 format.

The difference between a company's fundamental value and its total value is that

its fundamental value is what customers and stakeholder's value about its product or service, while its total value includes the value added by other aspects of the business.

To properly authenticate, or verify, the identity of authorized users and protect assets from unauthorized users, it is essential to

keep user logins and passwords confidential.

The amount of time that passes between when a device is asked to perform and when it completes the task is known as

latency.

Which of the following is a goal of confidentiality as defined by the CIA triad?

making sure the right people have access to secure information

A PaaS vendor offers its clients the ability to quickly build a customer loyalty app that allows customers to earn points for every purchase. The client chooses what features they'd like the app to have from a predetermined list of choices. What is this an example of?

mobile software development kit

Where are data in transit found?

on a cellular network

What is the second step in the six-step process of creating an SMIS?

outline measurements of success

What type of computer users are considered miners?

people who validate cryptocurrency transactions on the digital ledger

A social media information system (SMIS) is composed of three parts, which are

people, data and procedures, and hardware and software.

Which stage of the project management process involves meetings with project stakeholders to ensure everyone understands their role in the project?

planning

The project management (PM) process has four phases. What is the second phase of the process?

planning phase

Which of the following uses algorithms to determine likely outcomes given a set of inputs?

predictive analysis

The total value of a company is based on how much customers value its

products, services, and areas such as corporate philanthropy, social responsibility programs or policies, manufacturing processes, and brand attributes.

Bad actors seeking to create computer viruses primarily must know how to

program code.

What part of the plan-protect-respond cycle is occurring when an organization limits access to sensitive documents on a server to only those with the required security clearance?

protect

While using her phone's GPS to drive to her vacation destination, Siena needs to find a gas station. She enters into her phone's GPS that she is looking for a gas station that is no more than five miles away from the route she is currently on. What is this an example of?

proximity location

Which NIST Cybersecurity Framework function involves correcting an organization's cybersecurity plans due to a cybersecurity event?

recover (RC) function

Which function of the NIST Cybersecurity Framework calls for an organization to implement plans for resilience?

recover (RC) function

Which type of software helps HR managers calculate an organization's future workforce needs by taking many different variables into account?

recruiting and hiring software

In what stage of the plan-protect-respond cycle forensic analysis conducted?

responding stage

What is the correct term for when a GIS provides directions to a destination that a user has predetermined?

route information

Hubspot CRM, Zoho CRM, and Freshsales CRM are designed to meet the needs of

smaller businesses.

With Web 3.0, everyday devices connected to the Web will become

smarter and more capable, given the improved support for the Internet of Things (IoT).

Suppose you are a company whose target market is identified as homeowners who live in suburban regions of the American Midwest. From the list below, choose the product you are most likely selling.

snow blowers

Of the listed methods of collecting demographic information, which is the most effective for organizations defining their target market?

social media

Adding a dedicated group to your Facebook account allows you to meet online and keep in touch with others who share your interest. You can post relevant media, such as photos, articles, and videos. Which role in a social media information system (SMIS) does your group fit into?

social media community

Which Web 2.0 feature utilizes application programming interfaces (APIs) to automate web content and/or processes?

software as a service (SaaS)

As of 2020, all legislation that has been passed to protect elections from cybersecurity threats are part of

state-specific cybersecurity laws.

Components of a social media information system (SMIS) combine to

support a company's marketing strategy through social media.

The role of managing employee grievances, absences, sick days, and paid-time-off days belongs to

the HR manager.

What is the meaning of the term "social engineering" in the area of cybersecurity?

the act of manipulating or tricking people into sharing confidential, personal information

Why is the meeting between all project stakeholders and key players scheduled as the final step in the planning phase?

the budgets and timelines need to be finalized before stakeholders and key players can understand the scope of the projects and their role within the project

To increase sales, a sportswear chain is designing a promotional campaign for social media. It plans to post links to coupons on its website and have its sales personnel scan the coupon redemption codes at store registers. Which are the best social media information system (SMIS) metrics to track the success of this promotion?

the sales statistics linked to the coupon redemption codes

What are Big Data Analytics?

the technology and processes used to gain intelligent, usable information from applicable databases across the internet

What do most companies use as their main conduit for reaching and connecting with customers?

their website

What is the main purpose of content delivery networks (CDNs)?

to minimize the distance between website users and website servers

What is the second criteria necessary for adding a block to the blockchain?

transaction verification

Collaboration software is designed to increase collaboration and productivity primarily by enabling team members to

view, edit, and add shared information in real time, from anywhere.

Which type of cybersecurity breach can cause the most damage to an organization's systems, data, and information? spyware packet sniffers virusesCorrect DDOS attacks

viruses

A benign Internet robot that gathers data is called a(n)

web crawler.

An investment firm creates a network designed to facilitate information exchange between devices at its offices in New York City and New Haven, Connecticut. Which type of network would the company use to exchange information?

wide area network (WAN)

Ransomware is typically introduced into a network by a ________ and to an individual computer by a Trojan horse.

worm


Conjuntos de estudio relacionados

Ch 7 Legal Aspects/Professionalism

View Set

AP Euro: Unit 3 Absolutism Review

View Set

Rekenen breuken procenten kommagetallen

View Set

Political Globalization Midterm II

View Set

PY 361 Chapter 9: Internal Regulation

View Set