IS Final (Part 4)

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Select all of the following scenarios that show interaction between SMIS components. More than one answer may be correct.

A company's information systems (IS) group researches and chooses a program that can deliver content to several social media providers at the same time, Every day, a social media specialist at a start-up checks the news, plans how and what to tweet, quickly messages a manager, and sends the approved tweets, and Social media providers rely on user data to better serve sponsor organizations

Which guideline increases the effectiveness of a bar chart?

A legend should be used only if the chart has two or more data series

Which statement about online presence is true?

A personal brand built through an online presence can help business professionals gain opportunities.

Which two of the following refer to the amount of money a lender charges for borrowing money (excluding any origination fees)?

APR and interest rate

Machine-learning software is being used to explore databases of existing molecules (and their associated properties) to generate information that can be used to develop new drugs to treat a variety of conditions expeditiously and at lower costs. Firms at the forefront of this new strategy include

Atomwise, Insilico Medicine, and Kebotix

Most organizations require employees to login in to view files that are posted to a shared drive, allowing different access to the files based on employee position within the organization and preventing unauthorized employees or other people from accessing all files. This is an example of which of the following tools that ensure confidentiality? More than one answer may be correct.

Authentication, encryption, and access control

In the financial world, which color represents credits or profits?

Black

Headquartered in Toronto, ________ has developed a software application that serves as an early warning system for identifying pandemics.

BlueDot

From the following list, select all of the ways in which cybersecurity helps preserve the integrity of data, information, and systems.

Cybersecurity policies and procedures are designed to protect the consistency, accuracy, and dependability of these assets, Cybersecurity tools such as user-access controls, file permission, and version controls help prevent unauthorized changes, and Cybersecurity systems are designed to detect unauthorized or unanticipated changes to data that suggest a loss of integrity

Which of the following statements explain why data and procedures are studied as one social media information system (SMIS) component? More than one answer may be correct.

Data and procedures are work together to keep SMISs functioning, and Procedures help providers properly collect, direct, protect, and regulate the use of data.

Clarise often posts on Facebook about her achievements, extensive travels, and business acumen. As such, she is most likely improving her online reputation.

FALSE

Computer viruses can be either chip technology or code.

FALSE

Most industry reports, especially the most reliable, are widely available for free or at little cost.

FALSE

Public relations is fundamentally about increasing the company's ability to earn profit off customers and the community

FALSE

Users in a social media information system can rely on providers to safeguard their personal information and profiles.

FALSE

Talib is creating a survey on customer satisfaction. An appropriate question to include would be "Please describe your ideal customer service experience and tell us whether your experience with Sailboat Hospitality lived up to your expectations."

FALSE (too long)

Jaeger, the shipping manager at Durable Wear, writes a memo proposing that that they stop using RoadDog Trucking Company and ship everything by L.B. Haines. The reason he gives is that two of the accounts that have been shipping by L.B. Haines during the last year increased their orders by more than 10%, so he is certain that switching trucking firms will cause other accounts to grow too. The executives of the company do not accept Jaeger's suggestion. Why was his memo unconvincing?

Faulty cause/effect

To retain a row or column, but remove it from view, right-click on the row or column heading and select

HIDE

In a press-release style message, the "story" is written in third person in a style often referred to as ________ style.

Inverted Pyramid

What is a disadvantage of conducting primary research into a business problem?

It's more time consuming than secondary research

Which formatting method decreases the effectiveness of pie charts?

Locating the smallest pie slice at 12 o'clock

Where are data in transit found?

On a cellular network

Select the two spreadsheet programs.

Open Office and Apple Numbers

When money is borrowed, the ________ value of the loan (the principal) is the initial amount of money borrowed.

PV

Which three of the following refer to the amount of money owed on a loan when it is first borrowed (excluding any origination fees).

Present Value, Principal, and Balance

Which type of reputation is affected by material a person posts to an online discussion forum that is accessed only by people in his or her company?

Professional and Private

Which of the National Institute of Standards Technology (NIST) Cybersecurity Framework functions entails an analysis of cybersecurity risk and reduction of potential damage to IT infrastructures?

Protect (PR) function

Which of the following is an example of an event that may occur during the protect stage of the plan-protect-respond cycle? More than one answer may be correct.

Provide employees with information regarding the specific types of security threats their organization faces, Make sure resources are protected through routine maintenance, and Limit remote access to sensitive data

In what stage of the plan-protect-respond cycle forensic analysis conducted?

Responding stage

Comma-separated format (.cvs) files are commonly used by those who are sending data but do not know what spreadsheet the recipient uses.

TRUE

Piers is using the story line approach in his presentation. He says that the coffee shop chain he works for faces the challenge of improving its customer service orientation. After telling the story of a sandwich chain that trained its workers in a particular customer service approach, he says, "Within six months, their complaints dropped by half, and their customer satisfaction increased by 18 percent." What aspect of a business story does that statement represent?

The moral or lesson

From the following list, select all the primary considerations when developing the goals for a social media information system (SMIS).

The organization's purposes for using social media, and The organization's larger goals for its mission

Select the true statements about BlueDot's pandemic detection software.

The software scans over 100,000 worldwide media sources in over 65 different languages to determine outbreaks in real-time, Serves as an early warning system for identifying pandemics, and The software uses artificial intelligence to predict pandemics

Which of these statements support the assertion that MitMo is a growing security risk? More than one answer may be correct.

The world is flooded with smartphones and other mobile devices, and Mobile devices function in many of the same ways that computers do

The Social Age is an era in which people engage in networked communication, collaborate across boundaries, and solve problems communally.

True (FALSE originally)

Which formatting guideline increases the effectiveness of all types of charts?

Use darker colors to represent the most important data series

What information does Instagram Insights offer? More than one answer may be correct.

Users' age range, gender, and location, Length of engagement with a sponsored story for a specific demographic, and Number of impressions an unsponsored post received.

What demographic data are collected from social media users? More than one answer may be correct.

Where a user is when they make a purchase initiated through a social media post, Which advertisements users frequently engage with, and What illness a person has had in their lifetime

Kelly has to deliver a presentation to executives at a formal business meeting. Which outfit will help her project authority and competence?

a tailored business suit with a skirt and leather shoes

Because the technology allows a robot arm to act more like a human's with regard to spatial recognition and safety awareness, while maintaining all of the advantages of a traditional industrial robot, ________ can make robots much more flexible and safer.

adaptive robotics

The main purpose of a social media information system (SMIS) is to

allow social network users to share content.

Malicious bots are cybersecurity risks because they

can reproduce and link with an outside server

When using a shared file platform, it is important to

discuss protocols for co-editing files.

Describe the goals of the respond (RS) function of the NIST Cybersecurity Framework. More than one answer may be correct.

establish procedures that enable action in the event of a cybersecurity incident, be able to quickly analyze a detected cybersecurity issue, and be prepared to swiftly mitigate harm caused by a cybersecurity event

Which of these online functions are most susceptible to MitM attacks? More than one answer may be correct

financial applications, and e-commerce

Which of the following statements are true about Nanorobots?

have the capacity to carry medication or miniature tools, used to constantly monitor our bodies for maladies and other symptoms, and can build and manipulate things precisely where components are at a scale of a nanometer

Using refracted laser light to store data on a photoreceptive substrate is essentially how ________ storage works. Theoretically, this could store gigabytes of data within a cubic millimeter.

holographic

The difference between the deductive approach and the inductive approach is

in the inductive approach, the supporting reasons are placed before the primary message.

The difference between a company's fundamental value and its total value is that

its fundamental value is what customers and stakeholder's value about its product or service, while its total value includes the value added by other aspects of the business.

Hardware and software, data and procedures, and people are the three components of SMIS.

just a fact

An electronic element that stores data by changing its resistance based on the current that has passed through it (similar to RRAM) is called a

memristor

Some popular social media management systems are becoming more difficult to manage because

millions diverse participants

Describe the compliance standards set forth by the General Data Protection Regulation (GDPR) for companies who handle individuals' data. More than one answer may be correct.

notify citizens of data breaches, make collected data anonymous, and hire a data protection officer

Software used by social media information systems websites include

programs that analyze data.

A qubit is a basic unit of information that is similar to the 0s and 1s (bits) that represent transistors in today's computers. Using qubits in processors and memory is called ________ computing.

quantum

Which NIST Cybersecurity Framework function involves correcting an organization's cybersecurity plans due to a cybersecurity event?

recover (RC) function

Jorge primarily used research from printed texts for his report. What is a potential problem with Jorge's research?

reliability

For which type of cybersecurity vulnerability do organizations maintain and share databases of known problems?

security weaknesses in operating systems or application software

Which of the following are ways Internet of Medical Things (IoMT) has been used during the pandemic?

self-screening at home, regional integration of health records, rapid COVID-19 screening

One major threat to productive discussions is inconsistency. Firstcomers to a forum discussion are most likely to cause problems by

stating their opinion but failing to take part as the conversation evolves.

Machine learning is the field of study that gives computers the ability to learn without being explicitly programmed. Which of the following are categories of machine learning?

supervised, unsupervised, and regression

To ensure that the bar charts are formatted effectively, the bars should be about ________ the width of the space in between bars.

two times

5G cellular technology offers the promise of download speeds as high as 20 Gbps. This will likely require more antenna arrays with each antenna sending out ________ microwave signals.

weaker

A meta message is

what people take away from a communication


Kaugnay na mga set ng pag-aaral

Principles of Marketing Chapter 6

View Set

CH. 2 Mycology, Virology, and Parasitology

View Set

FINAL MICROECONOMICS STUDY GUIDE

View Set

Immobility/Skin Integrity Adaptive Quizzing

View Set