MIS Final Study Set
She runs a shop on Etsy one month she spends 2800 to provide her shop on Etsy and other social media sites and that month she gains 50 new customers what is your customer acquisition cost for that month?
$56
Which of the following of spear phishing
An email is sent to an employee at a specific company, instructing them to click on a link that link deploy malware to their device
What is the key difference between business to government B2G transactions and other types of e-commerce?
B2G transactions involve prenegotiated contracts.
Gigabyte equals approximately how many bytes
Billion
Which stage of the project management process involves documenting the lessons learned during the projects execution
Closure stage
Which of the following scenarios represents a customer acquisition cost of $100
Company spends 100,000 on advertising and marketing in one month they gain 1000 new customers in that month
Recognizing the inappropriate and inconsistent pay can demotivate the strongest workforce many firms use
Compensation management software
Which component of a business management system can help a manager check and report on the companies current inventory
Database management system DBMS
It is common for sales, representatives, and information technology fields to receive commissions for sales they make at play in this case is the principle of
Distributive justice
A hacker launches an attack on a network that is designed to interrupt or stop network by flooding it with too many requests this would be considered a
DoS attack
What is the acronym for end user licensing agreement?
EULA
Living a virtuous life involves acting with high morals that are logically defined our shaped
Ethics
Which which act outlines a plan to predict government information and assets against cyber threats
Federal information security management act FISMA
Which of the following is a strength of the Linux platform?
Free to download and use
Vector and raster files are
Geographic data
What is the goal of the process design step of business process management?
Identify redundancies and efficiencies and existing processes
The sales associate has been hired to write blog posts and regularly published on a blog about new beauty products. This block post are designed to include the SEO terms that relate to the companies, newest skincare product, using the keyword that will also be used in their advertising what part of the e-commerce timeline with this be a part of
Implementation
The ultimate purpose of a customer relationship management system is to
Increase sales market, share, and profit
A Wi-Fi tracker following a shoppers path within a store and example of what kind of data collection
Indirect tracking
How does a firewall work?
It determines what Internet traffic can leave or enter a computer or network
How does a network address translation type of firewall work?
It hides internal IP addresses
The following statements choose one that provides the underlying reason a company invest in a customer relationship management system
It is far less expensive to retain an existing customer to acquire a new one
An online photo printing company contemporarily lose its e-commerce ubiquity if
It's a website crashes due to a coding error or attacked by hackers
A criminal uses spyware to record all actions typed on a keyboard. This type of spyware is called a
Keystroke logger
Which of the following represents the least amount of storage
Kilobyte- 1000 bytes Megabyte- 1 million bytes Gigabyte- 1 billion bytes
A mobile hinge computer with an integrated keyboard that uses a full operating system Is it called a notebook or a___computer
Laptop
When making ethical analysis, what is the last thing you should do before making a decision and preparing for the consequences?
Listing options
Built on Realtime, Gio, data and information provided for wireless mobileDevices____are widely used in e-commerce.
Location based services LBS
If warm-up spyware, that reports all actions typed on a keyboard is called a key stroke
Logger
Which phrase of the project management process involves feasibility studies
Planning 1: initiation phase
The organizations likely to benefit the most from the global reach of commerce are those that
Previously dependent on foot traffic into one physical store to sell their products
Which type of touchscreen uses a single metallic coded panel and uses electricity to calculate touch points
Projective capacitive
Most tablets and phones use__ as their main storage device
SSD
The business management system with the lowest initial or startup expenses is
Software-as-a-Service (SaaS) Option
Which of the following is not a presentation software term?
Speaker image Terms are: speaker notes, slide master, and slide
Decision-making management information systems are necessary because
The amount of information available for exceeds any managers ability to use it
Which law or set of laws was created to implement to world intellect property organization WIPO treaties to update, copyright laws, regulating digital material
The digital millennium copyright act DMCA
The act that protects person to person wire, oral and electronic communication is
The wiretap act
Kilobyte is equal to approximately how many bytes
Thousand
Because accurate tracking of employee performance will always be critical to good management, most firms invest in software that manages
employee evaluation
An e-commerce presence map what is presence
websites, email, social media sites, and offline media
Michelle runs in at two shop in one month. She spends 2800 promoting her shop on Etsy and other social media sites gaining 50 new customers customers purchase products that cost $100 and the cost of her buying materials is 50% of the selling price, what is the actual profit or loss per customers taking into account materials and promotional cost?
-$6
When you buy a new laptop, how much ram should it come with?
4-8 GB
Recently techjury compiled a list of cyber security statistics that show the impact of different malware and network attacks what percentage of cyber attacks are aimed at small businesses
43%
What is the difference between a DDoS attack and a DoS attack?
A DoS is carried out with one source device and a DDoS attack is carried out with many source devices
Which type of business management system is best described as an off the shelf or prepackaged system
A software as a service system (SaaS)
All of the following are common reports that are included with laptop, computers, except
MIDI ports
Which statement best explains why rootkits can be difficult to detect
Many types of rootkits are designed to bypass installed security software
A megabyte equals approximately how many bytes
Million
What manages hardware and software supports the computers basic functions and runs programs
Operating system
What is a characteristic shared by all devices that can be infected by a computer virus
They are connected to the Internet
Organizations that use an on premises business management system
are also responsible for maintaining, updating, and securing the system.
Which of the following is generally not protected by an organizations network firewall
files stored in a cloud-based system, such as Dropbox or Google drive
M-commerce is a subset of
traditional e-commerce
What is the purpose of social engineering in conjunction with ransomware
tricks victims into allowing access to data
When should an organization answer the question is this the highest priority security risk?
Before data security strategies are created
Many managers, particularly in smaller firms, use companies such as Zenefits and benefit focus to manage their employees
Benefit systems
Which business management system seeks to streamline, an organizations activities to prevent backlogs and inefficiencies
Business process management BPM
A site on the windows operating system where you can uninstall programs adjust the settings and manage task is
Control panel
Which of the following determines the interest rate you'll be charged when you want to borrow money
Credit report
Alyssa says that no one would risk selling operable or effective malware programs even on the dark web. Why is she wrong?
Criminal hackers do make money by selling actual malware
Which of the following points is part of the fifth or final step in an ethical analysis?
Cultivating the ability to defend your decision
Saraiya runs a small café. She would like to start placing small ad buys on social media and hires an analytics firm to determine which platforms she should advertise on. What type of cost would this be considered?
Customer Acquisition Cost
Understanding that retaining customers is more profitable than finding new ones is behind which business management system
Customer relationship management
Deliberately modifies the normal operations of a computer network for the use of malicious code
Cyberattack
The act that is important and specifically protecting email in VoIP communication is
Electronic communications privacy act
Benefits administration involves a human resource function of
Enrolling maintaining management and discontinuing employee benefits
Which dimension of ethical behavior and digital age includes the question of how much time employees are allowed to spend time browsing social media
Establishing standards
A checkbox may I ask if you want to receive news and updates or participate in surveys from the site when creating our browsing websites this checkboxes referred to as an
Opt-in and opt-out
Many manufacturers have made___optional equipment when purchasing a new laptop computer
Optical drives
E-commerce__ includes creating marketing messages that contain the individuals name appeal to his or her interest and takes their purchase behavior into account
Personalization
The security firewall serving Vantage's email program catches an impressive number of both irrelevant and illegitimate messages, to the point where employees usually do not even see them. Occasionally, however, an unsolicited message will catch managing partner Carl's eye. Because one new message looks to come from a potential new client, he's interested but careful, aware that the boutique consulting firm has a very targeted marketing system and clients usually do not appear out of thin air. What type of security concern is causing Carl's suspicion?
Phishing
Sharon infected files and opening an infected email attachment are ways digital device users
Spread computer viruses
What is the only way to guarantee that computers and networks are safe from cyber attacks?
Take them off-line
How do breach and attack simulation, technologies help white hat, hackers test security
They execute thousands of attack techniques continuously to reveal weaknesses
What is a company that purchases compute consumer behavior information from other organizations engaged in
Third-party data purchase
As reported by Andrei Ene, one of the worst malware attacks in the last 10 years is the TBT or
Tiny banker Trojan
It's Terrifier equals approximately how many bytes?
Trillion
Manual runs a small business that pants residential in interiors. He has decided most of his current customers can be best to be reach by sending out a seasonal email newsletter. He will target new customers by placing ads on Facebook target at people located within 20 miles of his business who have search for house painters realplace information on commerce presence map
Type of presence
E-commere___ is the ability of an organization to create a strong presence among consumers in many places with minimal time constraints to sell them products and services
Ubiquity
Why would a business choose implement a business intelligence software system that their employees are already familiar with?
User familiarity will make the implementation easier as seamless as possible
Online content that has been created and posted by unpaid contributors, such as customers are fans of a product or service is referred to us
User-generated
A manager must conduct an ethical analysis to decide whether an employee is abusing the companies flexible policy, when determining whom will be affected by her decision. It is important that the manager also consider.
Whether she might personally benefit or be harmed by it
Managers have the greatest degree of control over a new business management system that is implemented as
an on-premises solution
What does business to consumer B2C e-commerce replace?
brick-and-mortar store locations
Of these business management systems, which one is focused on how managers can develop a lasting relationship with individual customers that promotes long-term buying
customer relationship management system
Adding software to a digital device or adding hardware components to a digital device is called
installing
What is the fourth step in a five step ethical analysis?
listing options
It is especially important for startup companies to create and follow a well-designed e-commerce strategy which of the following is the last phase in a well designed strategy
mobile platform planning and implementation
Which step of an ethical analysis is designed to enable a manager to obtain guidance or insights from other managers
searching for precedents
Hubspot CRM, Zoho CRM, and Freshsales CRM are designed to meet the needs of
smaller businesses
A computer that is highly mobile has a smaller OS and uses a touchscreen as the primary input method is called a
tablet
Where are session cookies stored
temporary memory