MIS Final Study Set

¡Supera tus tareas y exámenes ahora con Quizwiz!

She runs a shop on Etsy one month she spends 2800 to provide her shop on Etsy and other social media sites and that month she gains 50 new customers what is your customer acquisition cost for that month?

$56

Which of the following of spear phishing

An email is sent to an employee at a specific company, instructing them to click on a link that link deploy malware to their device

What is the key difference between business to government B2G transactions and other types of e-commerce?

B2G transactions involve prenegotiated contracts.

Gigabyte equals approximately how many bytes

Billion

Which stage of the project management process involves documenting the lessons learned during the projects execution

Closure stage

Which of the following scenarios represents a customer acquisition cost of $100

Company spends 100,000 on advertising and marketing in one month they gain 1000 new customers in that month

Recognizing the inappropriate and inconsistent pay can demotivate the strongest workforce many firms use

Compensation management software

Which component of a business management system can help a manager check and report on the companies current inventory

Database management system DBMS

It is common for sales, representatives, and information technology fields to receive commissions for sales they make at play in this case is the principle of

Distributive justice

A hacker launches an attack on a network that is designed to interrupt or stop network by flooding it with too many requests this would be considered a

DoS attack

What is the acronym for end user licensing agreement?

EULA

Living a virtuous life involves acting with high morals that are logically defined our shaped

Ethics

Which which act outlines a plan to predict government information and assets against cyber threats

Federal information security management act FISMA

Which of the following is a strength of the Linux platform?

Free to download and use

Vector and raster files are

Geographic data

What is the goal of the process design step of business process management?

Identify redundancies and efficiencies and existing processes

The sales associate has been hired to write blog posts and regularly published on a blog about new beauty products. This block post are designed to include the SEO terms that relate to the companies, newest skincare product, using the keyword that will also be used in their advertising what part of the e-commerce timeline with this be a part of

Implementation

The ultimate purpose of a customer relationship management system is to

Increase sales market, share, and profit

A Wi-Fi tracker following a shoppers path within a store and example of what kind of data collection

Indirect tracking

How does a firewall work?

It determines what Internet traffic can leave or enter a computer or network

How does a network address translation type of firewall work?

It hides internal IP addresses

The following statements choose one that provides the underlying reason a company invest in a customer relationship management system

It is far less expensive to retain an existing customer to acquire a new one

An online photo printing company contemporarily lose its e-commerce ubiquity if

It's a website crashes due to a coding error or attacked by hackers

A criminal uses spyware to record all actions typed on a keyboard. This type of spyware is called a

Keystroke logger

Which of the following represents the least amount of storage

Kilobyte- 1000 bytes Megabyte- 1 million bytes Gigabyte- 1 billion bytes

A mobile hinge computer with an integrated keyboard that uses a full operating system Is it called a notebook or a___computer

Laptop

When making ethical analysis, what is the last thing you should do before making a decision and preparing for the consequences?

Listing options

Built on Realtime, Gio, data and information provided for wireless mobileDevices____are widely used in e-commerce.

Location based services LBS

If warm-up spyware, that reports all actions typed on a keyboard is called a key stroke

Logger

Which phrase of the project management process involves feasibility studies

Planning 1: initiation phase

The organizations likely to benefit the most from the global reach of commerce are those that

Previously dependent on foot traffic into one physical store to sell their products

Which type of touchscreen uses a single metallic coded panel and uses electricity to calculate touch points

Projective capacitive

Most tablets and phones use__ as their main storage device

SSD

The business management system with the lowest initial or startup expenses is

Software-as-a-Service (SaaS) Option

Which of the following is not a presentation software term?

Speaker image Terms are: speaker notes, slide master, and slide

Decision-making management information systems are necessary because

The amount of information available for exceeds any managers ability to use it

Which law or set of laws was created to implement to world intellect property organization WIPO treaties to update, copyright laws, regulating digital material

The digital millennium copyright act DMCA

The act that protects person to person wire, oral and electronic communication is

The wiretap act

Kilobyte is equal to approximately how many bytes

Thousand

Because accurate tracking of employee performance will always be critical to good management, most firms invest in software that manages

employee evaluation

An e-commerce presence map what is presence

websites, email, social media sites, and offline media

Michelle runs in at two shop in one month. She spends 2800 promoting her shop on Etsy and other social media sites gaining 50 new customers customers purchase products that cost $100 and the cost of her buying materials is 50% of the selling price, what is the actual profit or loss per customers taking into account materials and promotional cost?

-$6

When you buy a new laptop, how much ram should it come with?

4-8 GB

Recently techjury compiled a list of cyber security statistics that show the impact of different malware and network attacks what percentage of cyber attacks are aimed at small businesses

43%

What is the difference between a DDoS attack and a DoS attack?

A DoS is carried out with one source device and a DDoS attack is carried out with many source devices

Which type of business management system is best described as an off the shelf or prepackaged system

A software as a service system (SaaS)

All of the following are common reports that are included with laptop, computers, except

MIDI ports

Which statement best explains why rootkits can be difficult to detect

Many types of rootkits are designed to bypass installed security software

A megabyte equals approximately how many bytes

Million

What manages hardware and software supports the computers basic functions and runs programs

Operating system

What is a characteristic shared by all devices that can be infected by a computer virus

They are connected to the Internet

Organizations that use an on premises business management system

are also responsible for maintaining, updating, and securing the system.

Which of the following is generally not protected by an organizations network firewall

files stored in a cloud-based system, such as Dropbox or Google drive

M-commerce is a subset of

traditional e-commerce

What is the purpose of social engineering in conjunction with ransomware

tricks victims into allowing access to data

When should an organization answer the question is this the highest priority security risk?

Before data security strategies are created

Many managers, particularly in smaller firms, use companies such as Zenefits and benefit focus to manage their employees

Benefit systems

Which business management system seeks to streamline, an organizations activities to prevent backlogs and inefficiencies

Business process management BPM

A site on the windows operating system where you can uninstall programs adjust the settings and manage task is

Control panel

Which of the following determines the interest rate you'll be charged when you want to borrow money

Credit report

Alyssa says that no one would risk selling operable or effective malware programs even on the dark web. Why is she wrong?

Criminal hackers do make money by selling actual malware

Which of the following points is part of the fifth or final step in an ethical analysis?

Cultivating the ability to defend your decision

Saraiya runs a small café. She would like to start placing small ad buys on social media and hires an analytics firm to determine which platforms she should advertise on. What type of cost would this be considered?

Customer Acquisition Cost

Understanding that retaining customers is more profitable than finding new ones is behind which business management system

Customer relationship management

Deliberately modifies the normal operations of a computer network for the use of malicious code

Cyberattack

The act that is important and specifically protecting email in VoIP communication is

Electronic communications privacy act

Benefits administration involves a human resource function of

Enrolling maintaining management and discontinuing employee benefits

Which dimension of ethical behavior and digital age includes the question of how much time employees are allowed to spend time browsing social media

Establishing standards

A checkbox may I ask if you want to receive news and updates or participate in surveys from the site when creating our browsing websites this checkboxes referred to as an

Opt-in and opt-out

Many manufacturers have made___optional equipment when purchasing a new laptop computer

Optical drives

E-commerce__ includes creating marketing messages that contain the individuals name appeal to his or her interest and takes their purchase behavior into account

Personalization

The security firewall serving Vantage's email program catches an impressive number of both irrelevant and illegitimate messages, to the point where employees usually do not even see them. Occasionally, however, an unsolicited message will catch managing partner Carl's eye. Because one new message looks to come from a potential new client, he's interested but careful, aware that the boutique consulting firm has a very targeted marketing system and clients usually do not appear out of thin air. What type of security concern is causing Carl's suspicion?

Phishing

Sharon infected files and opening an infected email attachment are ways digital device users

Spread computer viruses

What is the only way to guarantee that computers and networks are safe from cyber attacks?

Take them off-line

How do breach and attack simulation, technologies help white hat, hackers test security

They execute thousands of attack techniques continuously to reveal weaknesses

What is a company that purchases compute consumer behavior information from other organizations engaged in

Third-party data purchase

As reported by Andrei Ene, one of the worst malware attacks in the last 10 years is the TBT or

Tiny banker Trojan

It's Terrifier equals approximately how many bytes?

Trillion

Manual runs a small business that pants residential in interiors. He has decided most of his current customers can be best to be reach by sending out a seasonal email newsletter. He will target new customers by placing ads on Facebook target at people located within 20 miles of his business who have search for house painters realplace information on commerce presence map

Type of presence

E-commere___ is the ability of an organization to create a strong presence among consumers in many places with minimal time constraints to sell them products and services

Ubiquity

Why would a business choose implement a business intelligence software system that their employees are already familiar with?

User familiarity will make the implementation easier as seamless as possible

Online content that has been created and posted by unpaid contributors, such as customers are fans of a product or service is referred to us

User-generated

A manager must conduct an ethical analysis to decide whether an employee is abusing the companies flexible policy, when determining whom will be affected by her decision. It is important that the manager also consider.

Whether she might personally benefit or be harmed by it

Managers have the greatest degree of control over a new business management system that is implemented as

an on-premises solution

What does business to consumer B2C e-commerce replace?

brick-and-mortar store locations

Of these business management systems, which one is focused on how managers can develop a lasting relationship with individual customers that promotes long-term buying

customer relationship management system

Adding software to a digital device or adding hardware components to a digital device is called

installing

What is the fourth step in a five step ethical analysis?

listing options

It is especially important for startup companies to create and follow a well-designed e-commerce strategy which of the following is the last phase in a well designed strategy

mobile platform planning and implementation

Which step of an ethical analysis is designed to enable a manager to obtain guidance or insights from other managers

searching for precedents

Hubspot CRM, Zoho CRM, and Freshsales CRM are designed to meet the needs of

smaller businesses

A computer that is highly mobile has a smaller OS and uses a touchscreen as the primary input method is called a

tablet

Where are session cookies stored

temporary memory


Conjuntos de estudio relacionados

Chapter 25: Production and Growth

View Set

NWSCC BIO 220 Microbiology Test 4: Chapter 11-13 notes and quizzes

View Set

Learning Data Analytics Part 2: Extending and Applying Core Knowledge

View Set

If (by Rudyard Kipling) - meaning and vocabulary

View Set