MIS 2020 Midterm 2022 Ohio University

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Which of the following scenarios represents a customer acquisition cost of $100?

A- A company spends $100,000 on advertising and marketing in one month. They gain 1,000 new customers in that month.

Learning platforms that use algorithms to adjust the content that each student sees in order to maximize learning efficiency is called ________ learning.

Adaptive

When competitors seek to gain competitive advantage through price leadership or by making product improvements, Professors W. Chan Kim and Renee Mauborgne would say they are using a(n)

Red ocean strategy

The primary goal of a company's social media strategy is to

engage potential customers.

Data analysts are likely to have achieved what education level when beginning their career

Bachelor's degree

Why is data that is located in the RAM of a device considered data in transit?

Because RAM is where the http or https request is sent to the server, it is the point where data is least secure

If an increase in price results in a relatively large decrease in demand for the product, the firm cannot easily increase its profit margin. This demonstrates which of Porter's 5 forces?

Customers

Which type of cybersecurity breach makes a computer, network, or online service malfunction or become unavailable to users?

DDOS attacks

One important ________ is that the firm's employees will learn to use technologies to develop the new product, providing a competitive boost.

First-mover advantage

Data transformation is the process of converting the _____ of data.

Format

What is the purpose of the Twitter report card?

It highlights high-performing tweets. Correct. Influencers are introduced to their target audience through the Twitter report card.

Plans to put a 4G network on the moon were announced by Nokia and

NASA

When data is anonymized, the PII is eliminated or encrypted. PII includes names, Social Security numbers, addresses, and more and stands for ______ identifiable information.

Personally

Which threat to cybersecurity can only come from outside an organization?

Ransomware

A major trend in data analytics is the use of artificial intelligence to focus on small data which is more precise, using small datasets that are capable of impacting decisions in the present. This is known as ______ AI.

Scalable

-Data-driven decision making (DDDM) can be facilitated through a six-step processes of Ask, Prepare, Process, Analysis, Share, and Act. Which of these steps refers to creating visualizations and presentations for key stakeholders?

Share

M-commerce is a subset of

Traditional e-commerce

Cloud-based components used by social media providers are hardware

True

Cybersecurity vulnerabilities can be intentionally exploited or accidentally allowed to compromise system security.

True

Data analysts must blend facts and data with knowledge about the

business or organization

What are the core actions of the protect (PR) function?

controlling access to systems and preventing unauthorized access

Over 50 percent of all innovative products fail in the market, while over 80 percent of the successors to the products succeed. This is a key tenet of _______ strategy

fast-follower

Coffee vendors who operate small, drive-up coffee stands find it difficult to charge significantly higher prices than their many competitors do. What aspect of the coffee stand business makes raising prices difficult?

its low barriers to entry

An online photo printing company can temporarily lose its e-commerce ubiquity if

its website crashes due to a coding error or attack by hackers.

An international automobile manufacturer is concerned about how its global operations will be impacted by changing government standards for auto emissions and fuel efficiency. Which component of a PESTEL analysis can best help the manufacturer evaluate any threats posed by these policy changes?

legal

Built on real-time geodata and information provided from wireless mobile devices, ________ are widely used in m-commerce.

location-based services (LBS)

A social media information system (SMIS) is composed of three parts, which are

people, data and procedures, and hardware and software.

Collections of related fields in a database are referred to as

records

For which type of cybersecurity vulnerability do organizations maintain and share databases of known problems

security weaknesses in operating systems or application software

As of 2020, all legislation that has been passed to protect elections from cybersecurity threats are part of.

state-specific cybersecurity laws

What is the benefit to using social media for conducting market research?

Demographic data and market information is much easier to gather from social media sites than it is to previously collect

A target market for an organization is the online audience that has demonstrated its interest in the organization's products, services, or activities by following or engaging with the organization on social media

False

Authenticating the identity of a user, process, or device serves one purpose; to prevent unauthorized access to an organization's assets or resources

False

Buying and selling of goods and services that are executed through wireless mobile devices (including smartphones and tablets) are known as C-commerce transactions

False

Conversations and interactions on social media are not part of the information provided to organizations.

False

Data and information collected on Instagram sites can only be analyzed by using the tools provided by Instagram.

False

The type of e-commerce transaction that allows consumers to interact with government or authoritative bodies for activities such as paying taxes, securing building permits, or paying tuition at a university, is referred to as a consumer-to-governance transaction.

False

While every election has its losers, one big winner in the 2016 U.S. presidential election was ________ media.

Social

If an organization's automated backup system is vulnerable to data loss or corruption, its cybersecurity vulnerability is a weakness or flaw in its

Software

Of the following statements, choose the one that most accurately distinguishes social media providers from social media sponsor

Sponsors are individuals who support social media through heavy usage, and providers are companies who invest through advertising

Which of the following is a popular data analytics program that offers business intelligence as well as data visualization?

Tableau

What do all cybersecurity threats have in common?

They are connected to the loss of information, software, or hardware.

When selecting the right data, it is important to be aware of the source of the data. For example, data that is sold by an entity that didn't actually collect the data is considered ______ data.

Third-party

For strategic planning, managers should choose an aggressive strategy if a SWOT analysis reveals that the organization faces weak external ________ and its external opportunities are matched with internal strengths.

Threats

A business-to-consumer transaction is considered to be the selling of products and services to individual consumers

True

Accelerated mobile pages (AMPs) support m-commerce by utilizing a scaled-down version of hypertext markup language (HTML) to create web pages that load quickly on mobile devices.

True

In e-commerce, the term "information density" refers to both the total amount of information available to all individuals in a market (including customers and stakeholders) and the quality of this information.

True

The type of e-commerce transaction where consumers are able to provide a service to a business often through a bidding or auction type of system is called consumer-to-business.

True

Which type of cybersecurity breach can cause the most damage to an organization's systems, data, and information?

Viruses

To remain relevant in today's e-commerce landscape, many businesses use progressive ______ applications to undertake m-commerce

Web

In which situation should the origin of information be authenticated to protect data integrity

When electronic votes are submitted during an election

Who is responsible for calculating probable maximum loss?

a company's cybersecurity analysts

Each time a user clicks or interacts on a social media website

a data point that can be analyzed is recorded.

On an e-commerce presence map, what is presence?

actions can be delivered through specific platforms including applications, affiliate advertising, searches, newsletters, information sharing, education, and branding

Using cyberattacks, such as the May 2017 WannaCry ransomware attack which struck British hospitals particularly hard, is an example of how a nation with less military strength can level the field using technology. This is an example of ________ warfare.

asymetric

Trying to answer questions such as "what happened?" or "what is occuring?" or "what was the ROI?" is the role of

descriptive analytics

The primary goal of a company's social media strategy is to

engage potential customers

Setting social media metrics is the second step in creating a social media information system (SMIS) because

metrics are needed to quantify the organization's progress toward achieving its social media goals.

Which of Porter's 5 forces is affected by high barriers to entry?

the force of new competitors


Kaugnay na mga set ng pag-aaral

Endocrinology Combined Practice Questions

View Set

week 11 carmen quiz: sampling distributions and confidence intervals for mean

View Set

Domain/Range of Trigonometric Functions

View Set

English Midterm 11 Study Guide -Unit 4

View Set

Math - Introduction to Functions

View Set

Global Sports and National Culture Exam 1

View Set

Programming Fundalmentals II — Test 4

View Set

ACCT 101 Ch. 12 THE STATEMENT OF CASH FLOWS 2017

View Set