MIS 2020 Midterm 2022 Ohio University
Which of the following scenarios represents a customer acquisition cost of $100?
A- A company spends $100,000 on advertising and marketing in one month. They gain 1,000 new customers in that month.
Learning platforms that use algorithms to adjust the content that each student sees in order to maximize learning efficiency is called ________ learning.
Adaptive
When competitors seek to gain competitive advantage through price leadership or by making product improvements, Professors W. Chan Kim and Renee Mauborgne would say they are using a(n)
Red ocean strategy
The primary goal of a company's social media strategy is to
engage potential customers.
Data analysts are likely to have achieved what education level when beginning their career
Bachelor's degree
Why is data that is located in the RAM of a device considered data in transit?
Because RAM is where the http or https request is sent to the server, it is the point where data is least secure
If an increase in price results in a relatively large decrease in demand for the product, the firm cannot easily increase its profit margin. This demonstrates which of Porter's 5 forces?
Customers
Which type of cybersecurity breach makes a computer, network, or online service malfunction or become unavailable to users?
DDOS attacks
One important ________ is that the firm's employees will learn to use technologies to develop the new product, providing a competitive boost.
First-mover advantage
Data transformation is the process of converting the _____ of data.
Format
What is the purpose of the Twitter report card?
It highlights high-performing tweets. Correct. Influencers are introduced to their target audience through the Twitter report card.
Plans to put a 4G network on the moon were announced by Nokia and
NASA
When data is anonymized, the PII is eliminated or encrypted. PII includes names, Social Security numbers, addresses, and more and stands for ______ identifiable information.
Personally
Which threat to cybersecurity can only come from outside an organization?
Ransomware
A major trend in data analytics is the use of artificial intelligence to focus on small data which is more precise, using small datasets that are capable of impacting decisions in the present. This is known as ______ AI.
Scalable
-Data-driven decision making (DDDM) can be facilitated through a six-step processes of Ask, Prepare, Process, Analysis, Share, and Act. Which of these steps refers to creating visualizations and presentations for key stakeholders?
Share
M-commerce is a subset of
Traditional e-commerce
Cloud-based components used by social media providers are hardware
True
Cybersecurity vulnerabilities can be intentionally exploited or accidentally allowed to compromise system security.
True
Data analysts must blend facts and data with knowledge about the
business or organization
What are the core actions of the protect (PR) function?
controlling access to systems and preventing unauthorized access
Over 50 percent of all innovative products fail in the market, while over 80 percent of the successors to the products succeed. This is a key tenet of _______ strategy
fast-follower
Coffee vendors who operate small, drive-up coffee stands find it difficult to charge significantly higher prices than their many competitors do. What aspect of the coffee stand business makes raising prices difficult?
its low barriers to entry
An online photo printing company can temporarily lose its e-commerce ubiquity if
its website crashes due to a coding error or attack by hackers.
An international automobile manufacturer is concerned about how its global operations will be impacted by changing government standards for auto emissions and fuel efficiency. Which component of a PESTEL analysis can best help the manufacturer evaluate any threats posed by these policy changes?
legal
Built on real-time geodata and information provided from wireless mobile devices, ________ are widely used in m-commerce.
location-based services (LBS)
A social media information system (SMIS) is composed of three parts, which are
people, data and procedures, and hardware and software.
Collections of related fields in a database are referred to as
records
For which type of cybersecurity vulnerability do organizations maintain and share databases of known problems
security weaknesses in operating systems or application software
As of 2020, all legislation that has been passed to protect elections from cybersecurity threats are part of.
state-specific cybersecurity laws
What is the benefit to using social media for conducting market research?
Demographic data and market information is much easier to gather from social media sites than it is to previously collect
A target market for an organization is the online audience that has demonstrated its interest in the organization's products, services, or activities by following or engaging with the organization on social media
False
Authenticating the identity of a user, process, or device serves one purpose; to prevent unauthorized access to an organization's assets or resources
False
Buying and selling of goods and services that are executed through wireless mobile devices (including smartphones and tablets) are known as C-commerce transactions
False
Conversations and interactions on social media are not part of the information provided to organizations.
False
Data and information collected on Instagram sites can only be analyzed by using the tools provided by Instagram.
False
The type of e-commerce transaction that allows consumers to interact with government or authoritative bodies for activities such as paying taxes, securing building permits, or paying tuition at a university, is referred to as a consumer-to-governance transaction.
False
While every election has its losers, one big winner in the 2016 U.S. presidential election was ________ media.
Social
If an organization's automated backup system is vulnerable to data loss or corruption, its cybersecurity vulnerability is a weakness or flaw in its
Software
Of the following statements, choose the one that most accurately distinguishes social media providers from social media sponsor
Sponsors are individuals who support social media through heavy usage, and providers are companies who invest through advertising
Which of the following is a popular data analytics program that offers business intelligence as well as data visualization?
Tableau
What do all cybersecurity threats have in common?
They are connected to the loss of information, software, or hardware.
When selecting the right data, it is important to be aware of the source of the data. For example, data that is sold by an entity that didn't actually collect the data is considered ______ data.
Third-party
For strategic planning, managers should choose an aggressive strategy if a SWOT analysis reveals that the organization faces weak external ________ and its external opportunities are matched with internal strengths.
Threats
A business-to-consumer transaction is considered to be the selling of products and services to individual consumers
True
Accelerated mobile pages (AMPs) support m-commerce by utilizing a scaled-down version of hypertext markup language (HTML) to create web pages that load quickly on mobile devices.
True
In e-commerce, the term "information density" refers to both the total amount of information available to all individuals in a market (including customers and stakeholders) and the quality of this information.
True
The type of e-commerce transaction where consumers are able to provide a service to a business often through a bidding or auction type of system is called consumer-to-business.
True
Which type of cybersecurity breach can cause the most damage to an organization's systems, data, and information?
Viruses
To remain relevant in today's e-commerce landscape, many businesses use progressive ______ applications to undertake m-commerce
Web
In which situation should the origin of information be authenticated to protect data integrity
When electronic votes are submitted during an election
Who is responsible for calculating probable maximum loss?
a company's cybersecurity analysts
Each time a user clicks or interacts on a social media website
a data point that can be analyzed is recorded.
On an e-commerce presence map, what is presence?
actions can be delivered through specific platforms including applications, affiliate advertising, searches, newsletters, information sharing, education, and branding
Using cyberattacks, such as the May 2017 WannaCry ransomware attack which struck British hospitals particularly hard, is an example of how a nation with less military strength can level the field using technology. This is an example of ________ warfare.
asymetric
Trying to answer questions such as "what happened?" or "what is occuring?" or "what was the ROI?" is the role of
descriptive analytics
The primary goal of a company's social media strategy is to
engage potential customers
Setting social media metrics is the second step in creating a social media information system (SMIS) because
metrics are needed to quantify the organization's progress toward achieving its social media goals.
Which of Porter's 5 forces is affected by high barriers to entry?
the force of new competitors