IS Final, IS summer final exam

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Describe how 5G connectivity will support IoT. More than one answer may be correct.

1. 5G connectivity will allow for faster connection speeds, greater data capacity, and lower latency. 2. 5G connectivity will allow for greater data capacity. 3. 5G connectivity will allow for lower latency.

Which of the following is an example of an organization combining data analytics with GIS information? More than one answer may be correct.

1. A fitness center sends all new moms a complimentary one-month membership six weeks after they have given birth. 2. A clothing store texts a 25 percent off coupon to customers who have shopped in their store when they are within a two-mile radius of the store. 3. A restaurant uses the location of users when they enter key word searches that lead to their online menu to determine where they should focus advertisements on their new delivery options.

Which of the following are examples of cryptocurrencies?

1. Ethereum 2. Bitcoin 3. Litecoin

List examples of software as a service (SaaS). More than one answer may be correct.

1. Microsoft Office 365 2. Google Apps 3. Smartsheet

For the IoT to work properly, you must have which of the following?

1. Network 2. Device 3. Data

Select three true statements regarding labels.

1. usually a text or text+number combination 2. can be created by typing an apostrophe in front of a number 3. remain on the left side of a cell when entered

From the following list, select all the examples of different cybersecurity breaches.

1. viruses 2. spyware 3. impersonation 4. Distributed Denial of Service (DDOS)

Select the true statements about BlueDot's pandemic detection software.

1.The software scans over 100,000 worldwide media sources in over 65 different languages to determine outbreaks in real-time. 2. Serves as an early warning system for identifying pandemics. 3. The software uses artificial intelligence to predict pandemics.

Which of the following are ways Internet of Medical Things (IoMT) has been used during the pandemic?

1.self-screening at home 2. regional integration of health records 3. rapid COVID-19 screening

If you type =2 + 3 * 6 into a cell in a spreadsheet and then press Enter, what will appear in the cell?

20

If you type =3+2^2*6 into a cell in a spreadsheet and then press Enter, what will appear in the cell?

27

The number 27 in the cell depicted above is a value, not a formula. If the user drags the cursor to the right, what will appear in the cell to the right?

27

Stories in presentations should typically last for

30 seconds to one minute

In a blog post, you have ________ to draw your readers in.

5 to 15 seconds

Select the spreadsheet formula that would correctly calculate the average (mean) of the following values: 3, 2, 6, and 8.

= (3 + 2 + 6 + 8) / 4

Which statement about online presence is true?

A personal brand built through an online presence can help business professionals gain opportunities.

To make a calculation always refer to a specific cell when copying it using the fill handle, make the cell a(n) ________ reference.

Absolute

What function would you use to display how many entries are made in Column A above Cell A37?

COUNT

Which of the following is the clearest definition of a computer virus?

Code-created malware that, when executed, damages programs and performance.

How can you make sure that your business report meets the needs of the target audience?

Consider updating them about your progress in creating the report and involving them in the process.

When you log into most social software systems, you access a front page known as a

Dashboard

How does the cybersecurity goal of preserving data integrity relate to the goal of authenticating users?

Data integrity is more easily preserved if users must be authorized to access data and make changes.

One of Google's companies that is investigating AI and Machine Learning is called

DeepMind

Darius has to make a presentation at a fund-raising event. Which nonverbal behavior should Darius display during his presentation to build the audience's trust in him?

He should maintain eye contact with his audience.

Using refracted laser light to store data on a photoreceptive substrate is essentially how ________ storage works. Theoretically, this could store gigabytes of data within a cubic millimeter

Holographic

Ebony, the owner of One Hour Gym, wants to know how customers feel about the new strength and conditioning classes that she is offering. Which question should Ebony incorporate into her survey questionnaire?

How do you feel about the new strength and conditioning classes compared to the old ones?

What is the second step in the process of sending a message via the Internet?

Identify the correct domain name.

Which of the following statements best illustrates why a rootkit is described as creating a back door?

Like an intruder coming through a back door, a rootkit allows an unknown user into an operating system.

Ariel notices that her team's online discussion forum has become contentious. Which guideline should she follow in this situation?

Meet in real time.

Which statement about pie charts is true?

Pie slices should complete a whole, that is, add up to 100% of a data series.

Bankers and other lenders refer to the initial amount of the loan (the principal) as the loan's

Present Value (PV)

Which statement about primary research is true?

Primary research provides feedback directly related to an organization and its needs.

A qubit is a basic unit of information that is similar to the 0s and 1s (bits) that represent transistors in today's computers. Using qubits in processors and memory is called ___ computing.

Quantum

What do the deductive approach and inductive approach to structuring business messages have in common?

The arrangement of supporting ideas is important.

Which is the most common characteristic of social engineering cybersecurity attacks

They are conducted via emails that offer a reward in exchange for clicking a given link.

Which statement is true about visual learners?

They enjoy gestures and metaphors.

How does spyware potentially harm the individual user?

This malware steals confidential information from the user.

To ensure that the bar charts are formatted effectively, the bars should be about ________ the width of the space in between bars.

Two Times

Nate's boss has asked him to present a business report on "consumer shopping habits" in three days. Due to the time constraint, his boss wants him to use secondary research. In this situation, what should Nathan do?

Use data published in business journals.

Which tip is a helpful guideline for nonverbal communication during presentations?

Use facial expressions to connect with your audience and show enthusiasm for your topic.

Arturo opens his presentation with his two takeaway messages and a statement that frames them both in appealing terms. What did he forget to include in the preview of his presentation?

an attention-getter

The preview of a presentation should generally include a(n)

an attention-getter

In May 2017 the WannaCry ransomware attack struck British hospitals particularly hard. This was a type of cyberattack and shows how a nation with less military strength can level the field using technology. This is an example of ___ warfare.

asymmetric

Allowing people to share a digital ledger across a network of computers, ________ uses computer code to create concatenated (linked together) blocks of transactions

blockchain

Facts are statements that

can be relied on with a fair amount of certainty.

Hoda is skilled at reading the emotional signals of her audience and making quick, subtle adaptations to her presentation to connect with them. Hoda is good at showing her

caring

Blogs and wikis are

collaborative tools.

When Baruch joined his company, his manager encouraged him to use the company's digital platform to network with those who have shared professional interests and to join their groups. These groups are called

communities of practice.

Generally, bar charts are best suited for

comparing amounts or quantities.

During presentations, speakers show their ________ by knowing their content well.

competence

What are the core actions of the protect (PR) function?

controlling access to systems and preventing unauthorized access

Bitcoin, Ethereum, and LiteCoin all use blockchain algorithms to control quantity and verify the validity of transactions. They are referred to as

cryptocurrency

What has the greatest influence on the impact of social media in the workplace?

cultural norms and values

Your colleague Anuj has to give a presentation to the whole company. What tip should you give him about managing his nerves?

deep breathe to manage anxiety

The purpose of the application protocol layer of TCP/IP is to

define how email programs and other software communicate within and across networks.

When using a shared file platform, it is important to

discuss protocols for co-editing files.

Elmer is creating a table to show how the company has performed in the past year month by month. The most effective way to make the table easy to understand would be to

ensure that each grid line serves a distinct purpose.

If you want to draw the audience's attention to you during your presentation, you should

explain and elaborate on the content in your slides.

What does the General Data Protection Regulation (GDPR) regulate?

how companies protect personal data

Charlie has been assigned the task of creating an effective business message aimed at encouraging healthy habits in the workplace. He uses the AIM planning process. What should he do during the information gathering stage?

identify problems that prevent employees from making healthy choices

Which formatting method decreases the effectiveness of pie charts?

locating the smallest pie slice at 12 o'clock

In the course of creating an effective business message, excellent business thinkers are most likely to

make well-reasoned conclusions and solutions.

Analyzing a business problem typically involves

making conclusions based on facts.

Man-in-the-mobile (MitMo) occurs when

malware infects smartphones and other mobile devices.

What does the identify (ID) function of the NIST Cybersecurity Framework focus on?

organizational understanding of how to manage cybersecurity risks

A traditional 30-year mortgage has 12 monthly payments per year. This means the loan has a total of 360

payments

What type of computer users are considered miners?

people who validate cryptocurrency transactions on the digital ledger

The U.S. Census Bureau is using differential, to make census data secure and private.

privacy

A qubit is a basic unit of information that is similar to the 0s and 1s (bits) that represent transistors in today's computers. Using qubits in processors and memory is called ________ computing.

quantum

What is most likely to show that the writer of a business message has concern for the audience?

respecting the autonomy of the reader

In a spreadsheet, a horizontal line of cells is called a

row

For which type of cybersecurity vulnerability do organizations maintain and share databases of known problems?

security weaknesses in operating systems or application software

What is typically included in the writing stage of developing an effective business message?

setting a positive and other-oriented tone

Which action during a speech is most likely to result in your audience judging you as caring?

showing that you are interested in the needs of your audience

The evolution of the Internet from Web 1.0 to Web 2.0 platforms is the primary driver of the ________ Age.

social

Which Web 2.0 feature utilizes application programming interfaces (APIs) to automate web content and/or processes?

software as a service (SaaS)

Programs such as Microsoft Excel, iWork's (Apple) Numbers, Google Sheets, and OpenOffice Calc, that allow users to arrange numerical data are called

spreadsheets

was launched in 2014 by Skype co-founders, Ahti Heinla and Janus Friis. The company's vision is to revolutionize food and package deliveries across the globe. Starship robots can carry items within a 4-mile radius.

starship

What is a purpose of a positioning statement?

to demonstrate value to the audience

What is the purpose of saving an Excel file as a .cvs (comma-separated format) file?

to share data with other spreadsheet users regardless of which spreadsheet program is being used

What is a goal of the AIM planning process?

to unleash good ideas

An investment firm creates a network designed to facilitate information exchange between devices at its offices in New York City and New Haven, Connecticut. Which type of network would the company use to exchange information?

wide area network (WAN)

Machine-learning software is being used to explore databases of existing molecules (and their associated properties) to generate information that can be used to develop new drugs to treat a variety of conditions expeditiously and at lower costs. Firms at the forefront of this new strategy include

1. Atomwise 2. Insilico Medicine. 3. kebotix

In Google Sheets, what are two methods that allow a user to move data from one cell to another cell?

1. Drag the data to the desired cell when the cursor changes to a drag hand. 2. Right-click the cell and then cut and paste the data into the desired cell.

What is the goal of the protect stage in the plan-protect-respond cycle? More than one answer may be correct.

1. Ensure critical infrastructure services can be delivered without interruption. 2. Reduce the impact of an adverse cybersecurity event.

Which of the following applications or services will Web 3.0 be built to support? More than one answer may be correct

1. IoT 2. SaaS 3. ubiquitous computing

What are the two most common spreadsheet charts?

1. Line Graphs 2. Bar Graphs

Breanna, IS manager at a mid-size service firm, picks up some evidence that a Trojan horse engineered to steal passwords has accessed the system. All members of project teams are trained in online safety, and their network is protected by a firewall. But the worse-case scenario has happened: a competitor has received protected information, possibly directly from a member's computer. What first steps should Breanna and the security team take to solve the problem? More than one answer may be correct.

1. They should review everyone's activity log, looking for any downloaded files or programs. 2. The security group should sift through emails for a message with clickable links.

Which of the following is an example of data in process? More than one answer may be correct.

1. a username that has been submitted for authentication 2. a password that has been submitted for authentication 3. credit card information used to pay for an order placed on Amazon

Which of the following are features of virtual private networks (VPNS)? More than one answer may be selected.

1. allows for encrypted communications between computers 2. allows remote workers to connect to the company network when working from home 3. allows a security system to be implemented in cloud-based infrastructure

Select two common uses of spreadsheets.

1. budgeting 2. finance

Peyton wants to make his team's discussion forum more effective. Which strategy would best help him accomplish that?

Acknowledge teammates' ideas.

Learning platforms that use algorithms to adjust the content that each student sees in order to maximize learning efficiency is called ________ learning.

Adaptive

Which situation is an example of how social media can complicate professional relationships?

An employee blogs about an embarrassing incident involving his or her boss, who sees the post.

Which statement describes how writers should address the priorities of their targeted audience during the AIM planning process?

Assign importance to things, such as projects, goals, and tasks.

Which of the elements of the CIA triad does properly maintaining all hardware serve?

Availability

Which chart type can be used to compare many types of data and is thus the most versatile?

Bar Charts

Rhonda used data from a liberal political organization in her report on voting trends in the U.S. In terms of data quality, what is a potential problem with this source?

Bias

In the financial world, which color represents credits or profits?

Black

Headquartered in Toronto, ________ has developed a software application that serves as an early warning system for identifying pandemics.

BlueDot

Why is a denial-of-service attack (DoS attack) a threat to data availability?

By flooding a system with incoming messages, a DoS attack forces the system to shut down, rendering it inaccessible to the users who legitimately have access to it.

Gowan has been hired by Bailey's Automotive to assess whether the company should air television commercials in the local market. He is planning a study of the relationship between local television commercials and the sales of new vehicles. What is the best way for Gowan to establish a research objective that will address his research problem?

Determine how often television commercials result in purchases of new vehicles.

Stanley, a sales analyst for G&B Toys, is preparing a report for board members on the company's market share for action figures. Although G&B has retained its spot as the market leader, several competitors have captured a larger share of the market over the preceding year and appear likely to overtake G&B within the next three years. How should Stanley present his findings to the board?

Disclose the data fully to foster transparency in the organization

When you enter a calculation into a spreadsheet, you start by entering a(n) ________ sign

Equals

Which cryptocurrency offers a blockchain-based platform that can be used to develop decentralized applications?

Ethereum

Which statement about leading questions is true?

In surveys, leading questions produce unreliable and unusable information.

Sadiki included the question on a customer survey: "Do you prefer healthy, nutritious food, or food that is bad for you and will ruin your health?" The problem with that question is that it

Is Leading

How are data in process different from data at rest or data in storage?

It is held in the device's RAM until it can be processed by the CPU or GPU.

What is a disadvantage of conducting primary research into a business problem?

It is more time consuming than secondary research.

Which presenter is using the room to his or her advantage?

Jared positions himself slightly down the center aisle because the front rows are empty.

The Imaging Analytics Engine developed by Zebra-Med can be used to uncover which of the following conditions that may be present in CT scans?

Lung Condition Brain Condition Liver Disease

Natalie, assistant manager at Bright Gardens Restaurant, is preparing a questionnaire to help her evaluate customer satisfaction. She wants her survey to only include closed questions. Which question should Natalie use?

On a scale of 1 to 5, how would you rate your level of satisfaction with your most recent meal at Green Gardens?

To determine how much a recurring monthly payment would be for a car loan or a mortgage, use the ________ function.

PMT

A unique set of professional skills and attributes that others associate with you is called your

Personal Brand

Kelli gives a presentation to advocate that her employer, Services-R-Us, which offers services such as personal shopping and event planning to assist busy professionals, expand its offerings to include dog walking. She decides to use the PREP method of justifying this position. Which action is an example of the third step in the method?

She cites a personal services company in another city that increased its business by adding dog walking to its services.

Currently, apps that run on the Cloud are ________ as compared to apps that run on local machines. Edge computing is a method of optimizing cloud computing systems by performing data processing at the edge of the network, near the source of the data and it is possible that cloud computing may take a back seat to edge computing.

Slower

Sports analysts often use ________ to keep track of statistics, times, and scores of nearly every sporting event

Spreadsheets

For the past few months, Denver Framing has experienced high employee turnover. After investigating, human resource manager Kyle discovered that most employees are unhappy with their salaries and therefore unmotivated to work. Kyle plans to craft a message using the direct approach. How should he structure it?

State the primary message; lay out supporting reasons; conclude with a call to action.

5G cellular technology offers the promise of download speeds as high as 20 Gbps. This will likely require more antenna arrays with each antenna sending out ___ microwave signals.

Weaker

Which statement is one of Coca-Cola's social media guidelines?

You are responsible for your actions.

Kelly has to deliver a presentation to executives at a formal business meeting. Which outfit will help her project authority and competence?

a tailored business suit with a skirt and leather shoes

Which of the four criteria is occurring when a network confirms that a transaction has not yet occurred on the blockchain?

a transaction is verified

When you evaluate how well secondary research can be revised to address your specific business problem, you are considering its

adaptability.

Because the technology allows a robot arm to act more like a human's with regard to spatial recognition and safety awareness, while maintaining all of the advantages of a traditional industrial robot, ________ can make robots much more flexible and safer.

adaptive robotics

Use the AutoSUM function if you want to quickly ________ a series of values in a spreadsheet.

add

Which of the following would be prohibited under the Electronic Communications Protection Act?

an employee leaking confidential emails they were not authorized to receive

What is a cybersecurity threat?

an event or condition that can lead to IT asset loss and the negative consequences of such loss

What is typically included in the reviewing stage of writing an effective business message?

ensuring that the communication is fair

Aria wants to gather information on the sales potential for a new women's dietary supplement, and decides to purchase a report compiled by a research firm that is highly respected for its understanding of women's health issues. In this case, she is primarily evaluating data quality in terms of its

expertise.

What does "E" stand for in the SOFTEN model of nonverbal communication in presentations?

eye contact

Jaeger, the shipping manager at Durable Wear, writes a memo proposing that that they stop using RoadDog Trucking Company and ship everything by L.B. Haines. The reason he gives is that two of the accounts that have been shipping by L.B. Haines during the last year increased their orders by more than 10%, so he is certain that switching trucking firms will cause other accounts to grow too. The executives of the company do not accept Jaeger's suggestion. Why was his memo unconvincing?

faulty cause/effect argument

What is one of the purposes of the preview in a presentation?

generate interest among the audience members

Advertised as an annual percentage rate (APR), the amount of money a lender charges for a loan is the loan's

interest rate

Readers are more likely to react positively to a message if the writer

is clearly concerned about the issues discussed

Which type of attire should generally be avoided in business-related settings?

jeans and a collarless shirt

An electronic element that stores data by changing its resistance based on the current that has passed through it (similar to RRAM) is called a

memristor.

A status update is also known as a

microblog

Which action is most likely to result in your audience judging you as having character?

offering your views transparently

Which technique is most likely to make business messages more positive?

using constructive terms

When you specifically want your presentation to appeal to professionals with a blue motivational value system, you should focus on

using relationship-centered terms.

You and your coworker, Carla, sit through a presentation that Carla laughingly describes as "death by PowerPoint." When you discuss the presentation afterward, you can think of only one thing the presenter did correctly. Which characteristic of the presentation would have helped rather than hindered ease of processing?

using simple charts and diagrams

In Apple iWork's Numbers the freeze options are located under the Table tab. In Microsoft Excel and Google sheets the freeze cells or panes options are found in the ________ menu.

view

Chavez, a human resources manager of K8 Fabrics believes that the company can improve employee retention rates by improving employee benefits. In outlining his argument to the company's leadership team, he points out that a large technology firm had success with such a strategy. Chavez' message fails to convince K8's leadership team. What is the likely cause of their reaction?

weak analogy

5G cellular technology offers the promise of download speeds as high as 20 Gbps. This will likely require more antenna arrays with each antenna sending out ________ microwave signals.

weaker

Which of the following are correct regarding blockchain? More than one answer may be selected.

1. For business contracts, blockchain makes it almost impossible to change any information in a contract. This is advantageous for businesses that are dealing with multiple contracts. 2. In supply chain management, blockchain can verify with almost absolute certainty where items and goods are along the supply chain, thus removing guesswork and inefficiencies for shippers and customers. 3. Blockchain is ideal for audits because of the encryption used and because it eliminates the need for banks to handle audits.

Which of the following statements are true about Nanorobots?

1. have the capacity to carry medication or miniature tools 2. used to constantly monitor our bodies for maladies and other symptoms 3. can build and manipulate things precisely where components are at a scale of a nanometer

What are the advantages of software as a service (SaaS)? More than one answer may be correct.

1. instant access, downloads, and usability 2. frequent application updates offered 3. application accessed via the Internet only

Which of the following is a best practice for ensuring that data are available? More than one answer may be correct.

1. keeping current with all system upgrades 2. preventing bottlenecks

The basic types of computer networks include which of the following? More than one answer may be correct.

1. personal area network (PAN) 2. local area network (LAN) 3. wide area network (WAN)

From the following list, select the functions of an Internet Service Provider (ISP).

1. providing an Internet Protocol (IP) address 2. providing access or a gateway to the resources on the Internet 3. paying for their customers' access to the Internet

You just had a great lunch at a nice restaurant and decide to leave a 15% tip on your $18 meal. What will be the total charge on your debit card?

20.70

What is the first step in the AIM planning process?

analyzing your audience to make sure you are addressing their needs

Using cyberattacks, such as the May 2017 WannaCry ransomware attack which struck British hospitals particularly hard, is an example of how a nation with less military strength can level the field using technology. This is an example of ________ warfare.

asymmetric

To break out of the reputation of an inexperienced newcomer, a person should

attend a lot of meetings to get to know as many colleagues as possible.

During which step in the AIM planning process should you consider the constraints your readers face?

audience analysis

In content and form, a business message should typically

avoid any form of self-centeredness.

Which type of event or condition may represent a cybersecurity threat? More than one answer may be correct.

1. an intentional event or action that damages computer hardware 2. an unintentional or accidental event that deletes important network data or information 3. the incorrect use or abuse of a computer assets 4. an error, flaw, or weakness in a network asset

List disadvantages of cloud computing. More than one answer may be correct.

1. downtime 2. security risks 3. limited control

Describe the goals of the respond (RS) function of the NIST Cybersecurity Framework. More than one answer may be correct.

1. establish procedures that enable action in the event of a cybersecurity incident 2. be prepared to swiftly mitigate harm caused by a cybersecurity event 3. be able to quickly analyze a detected cybersecurity issue

Which of the following is a common method of connecting a LAN to the Internet? More than one answer may be correct

1. fiber optic cables 2. ethernet cables 3. coaxial cables


Kaugnay na mga set ng pag-aaral

Chapter 19: Documenting and Reporting

View Set

[Ch.16] Aggregate Supply and Aggregate Demand

View Set

High Risk OB: Hypertensive Disorders in Pregnancy

View Set

Chapter 1: The Political Culture, People, and Economy of Texas

View Set

POC 3 Head and Neck Anatomy and Physiology

View Set