MIS 2020: Practice Exam
When conducting a five-step ethical analysis, the first step in the process is
getting the facts.
Which law or set of laws was created to implement two World Intellectual Property Organization (WIPO) treaties and to update copyright laws regulating digital material?
the Digital Millennium Copyright Act (DMCA)
Which 1986 law makes it illegal to intercept calls or messages without a warrant?
the Electronic Communications Privacy Act
The Act that protects person-to-person wire, oral, and electronic communications is
the Wiretap Act.
To calculate an organization's customer equity (CE) value we first determine
the future lifetime revenue the organization's customers will generate.
Which type of event or condition may represent a cybersecurity threat? More than one answer may be correct.
- an intentional event or action that damages computer hardware -an unintentional or accidental event that deletes important network data or information -an error, flaw, or weakness in a network asset -the incorrect use or abuse of a computer assets
Of the companies listed below, which three are the most influential global e-commerce organization(s) in 2019, according to a graphic provided by Statista?
-Alibaba -JD.com -Amazon
Describe how business-to-business (B2B) e-commerce transactions work. More than one answer may be correct.
-Business-to-business (B2B) e-commerce is the selling of good and services between businesses. -B2B transactions often involve orders placed on a recurring basis. -B2B purchases often occur in large quantities and are directly shipped from one business to another.
Online analytical processing (OLAP) is the technology behind many business intelligence applications. Of the following, what three facts about OLAP and CRM are true?
-CRM analytics are considered a form of online analytical processing (OLAP). -CRM systems incorporate data mining through online analytical processing. -OLAP includes predictive what-if analysis, report generation, and forecasting.
Which of the following statements about sources of customer data are correct?
-Customer surveys collect feedback from customers. -Data collection from social media platforms can be integrated within a CRM platform. -Analytics are used to uncover trends in the collected data.
From the following list, select all of the ways in which cybersecurity helps preserve the integrity of data, information, and systems.
-Cybersecurity policies and procedures are designed to protect the consistency, accuracy, and dependability of these assets. -Cybersecurity tools such as user-access controls, file permission, and version controls help prevent unauthorized changes. -Cybersecurity systems are designed to detect unauthorized or unanticipated changes to data that suggest a loss of integrity.
We Are Social surveyed internet users aged 16-64 around the world, to learn about their e-commerce activities. What did the survey reveal about this demographic? More than one answer may be correct.
-Eighty percent searched online for a product or service to buy online. -Ninety percent visited an online store on the world wide web. -Seventy-four percent reported they had purchased a good or service online.
Which of the following services are often provided by platform as a service (PaaS) vendors? More than one answer may be selected.
-host hardware and software -build scalable apps without having to write any code -provide social media capabilities
Which of the following are correct regarding blockchain? More than one answer may be selected.
-In supply chain management, blockchain can verify with almost absolute certainty where items and goods are along the supply chain, thus removing guesswork and inefficiencies for shippers and customers. -For business contracts, blockchain makes it almost impossible to change any information in a contract. This is advantageous for businesses that are dealing with multiple contracts.
Which statement defines or explains a characteristic of information density? More than one answer may be correct.
-Information density is the total amount of information as well as the quality of information available to all individuals in a market, including customers and stakeholders. -Information density in e-commerce allows consumers to more easily find retail prices for goods or services (price transparency) and the wholesale costs a seller paid (cost transparency). -Information density in e-commerce allows consumers to more easily find retail prices for goods or services (price transparency) and the wholesale costs a seller paid (cost transparency).
Which of the following applications or services will Web 3.0 be built to support? More than one answer may be correct.
-IoT -SaaS -ubiquitous computing
A digital music streaming company is promoting its service in a new country with a special discount for residents. How can the company use authentication to help prevent people from exploiting or abusing the deal? More than one answer may be correct.
-It can verify that the customer lives in the correct country. -It can verify that the customer is new to the company or service. -It can grant the customer access only to the music included in the deal.
When reporting a coworker's computer ethics violations, which of these guidelines should you follow? More than one answer may be correct.
-Only report incidences that you have personally witnessed. -If in doubt, report the activity to ensure that it does not go unnoticed.
What groups of people can Audience Insights generate information about? More than one answer may be correct.
-People who speak a specific language. -Facebook users who have indicated interest in an event publicized on Facebook. -All Facebook users.
From the following list, select all the ways in which CRM systems assist businesses in targeting a market segment.
-They help identify the common characteristics of target market members, including geographic location, demographic and psychographic backgrounds, and income level. -They help identify the common characteristics of target market members, including geographic location, demographic and psychographic backgrounds, and income level. -They provide analysis of customer characteristics, which is an important part of the target market identification process.
If an organization does not yet have social media content and followers, what can it do to help identify its target markets? More than one answer may be correct.
-Use existing customer information to conduct customer research -Use demographic and behavioral information to conduct market research -Use public and purchased information to conduct competitor research
From the following list, select the companies that are leaders in the re-commerce market.
-Yerdle Re-commerce -thredUP -The RealReal
Which of the following threats to cybersecurity come from internal sources? More than one answer may be correct.
-an accidental erasure of data -an attack by an authorized user -the leakage of sensitive information
The deactivation of access to corporate systems and documents after an employee leaves a company is an example of which tool that ensures confidentiality? More than one answer may be correct.
-authentication -access control
Which of the following are common issues experienced by e-commerce-oriented businesses?
-data theft -unethical practices -challenges with competitor analysis
Of the following categories, which are identity data? More than one answer may be correct.
-date of birth -name and address
Which browser settings should you consider adjusting? More than one answer may be correct.
-deciding from which sites you want to allow cookies -blocking or customizing your cookie settings
Which of the following concerns falls under the dimension of establishing standards in the digital age? More than one answer may be correct.
-how much data employees use to stream audio and video over Wi-Fi while working -how often employees check their personal social media sites each day while working
Data redundancy can lead to which three of the following?
-increased storage fees -inefficient access times -inconsistent data
Which of the following is prohibited by the Computer Fraud and Abuse Act? More than one answer may be correct
-knowingly transmitting a virus that causes damage to a computer -accessing information on a computer that has been left unattended
What are characteristics of business-to-business (B2B) transactions? More than one answer may be correct.
-often transpire on a recurring basis -generally involve large quantities -often include direct shipment between businesses
What is an example of a business-to-business transaction? More than one answer may be correct.
-purchasing office supplies for a university -buying medical equipment for a pediatrician's office -purchasing food service items for a restaurant
Information in tables is stored in ________ called records and ________ called fields.
-rows -columns
Which of the following are reasons why states are making cybersecurity measures a high priority? More than one answer may be correct.
-the acceleration of new technologies -the proliferation of cyber threats to data and technologythe
The use of web mining by organizations can lead to improved website visibility, ________, and ________.
-usability -accessibility
In which customer interaction instances is automated messaging especially useful? More than one answer may be correct.
-when a customer transaction warrants an initial acknowledgment -when information about task scheduling needs to be conveyed -when the answer to a customer's question is not in FAQs
Which intellectual property is correctly matched with the legal device or tool that protects it?
A portrait that you paint can be copyrighted.
Instagram Insights only provides demographic and engagement information for paid activity.
False
Which of the following is an example of something that would occur during the Measure and Analyze steps of the Six Sigma process? More than one answer may be selected.
Determine the number of imperfect products that occurred at a manufacturing plant every month Compare the number of imperfect products produced at two different manufacturing plant locations and describe any procedural differences between the locations. Determine the different types of training that occur at different corporate locations.
Social media providers include which of the following web-based platforms?
Facebook, Instagram, and Twitter
A form of protection provided by the laws of the United States for "original works of authorship," including literary, dramatic, musical, architectural, cartographic, choreographic, pantomimic, pictorial, graphic, sculptural, and audiovisual creations is called a patent.
False
A large corporation purchases and sells consumer data. This is referred to as big data collecting.
False
Actively encouraging any employee to halt production if a manufacturing error or safety risk is observed is part of the training associated with the disruptive innovation model.
False
Conversations and interactions on social media are not part of the information provided to organizations.
False
ERD is a method of describing the architecture of databases structurally by using tables.
False
Generally, cloud computing services are classified in three ways: infrastructure as a service (IaaS), platform as a service (PaaS), and security as a service (SaaS).
False
Just-in-time manufacturing and inventory management gained popularity in the 1980s and sought to emulate the efficiencies of Korean automobile manufacturers.
False
Lean manufacturing techniques seek to eliminate waste in the production process; in contrast, Six Sigma seeks to eliminate disruption.
False
Supply chain management systems are business computer applications that support customer preferences and relationships.
False
The Children's Internet Protection Act of 2000 (CIPA) seeks to keep children off the Internet.
False
The practice of trading used, old, or obsolete products via the internet in exchange for other used or similar products is called re-commerce.
False
The software code of a particular computer virus is called the virus DNA.
False
To evaluate an organization's internal opportunities and threats, management can conduct a PESTEL (political, economic, sociocultural, technological, environmental, and legal) analysis.
False
Which Act requires all government agencies to have a plan in place in the event of a cyberattack?
Federal Information Security Management Act (FISMA)
A company wants to begin monitoring the Internet usage of its office employees to ensure that their working hours are spent productively. What is the least that the company should do to respect its employees' rights to information privacy?
Inform employees of the monitoring and obtain their consent.
Which of the following is an example of a benefit to using a scroll-over feature on a Business Intelligence (BI) dashboard?
It allows the user to see the details of the project right from the screen with overall summary of the project.
Which CRM-compatible sales prospecting tool utilizes the profiles and connections on a social media platform to generate prospects?
LinkedIn Sales Navigator
Which of the following is the term for CRM analytics that provides information about where data erosion occurs and how the erosion can be minimized?
Standardized Data Collection Processes
Which provision of the USA PATRIOT Act was not renewed after it expired in 2015 nor covered by the subsequent USA Freedom Act?
The National Security Agency may not collect mass phone data from United States residents and citizens.
Why is it important to preserve the integrity of data, information, and systems?
These assets lose their usefulness and value if their consistency, accuracy, or dependability is compromised.
How do businesses ultimately benefit from using a CRM to identify the highest revenue customers in a target market, before developing a marketing campaign?
They better understand their ideal customer for their product or service.
In 2013 the U.N. General Assembly adopted a resolution affirming that the rights held by people offline must also be protected online, calling for its member nations to respect the right to privacy in digital communication. Which of the following statements applies to the real-life impact of this resolution?
This sounds good, but users should be aware that digital privacy is not honored by many on the Internet.
A data mart is a division of a data warehouse explicitly built and constructed for individual departments or business functions.
True
Analytics can provide insight into how customers and members of the organization interact with the customer relationship management software. This information can be used to design data collection strategies that encourage interaction and use.
True
Because Business Intelligence (BI) and Big Data Analytics only has value if it can be effectively presented and interpreted, one of the most important features of a BI system are its data visualization tools.
True
Conducting a PESTEL analysis involves evaluating any external opportunities and threats to an organization by examining the political, economic, sociocultural, technological, environmental, and legal issues facing an organization.
True
Enterprise resource planning (ERP) software is a business application that integrates the management of almost all aspects of an organization.
True
In 1979, Professor Michael E. Porter published "How Competitive Forces Shape Strategy" in the Harvard Business Review. In this paper, he described factors (or forces) that impact businesses. These became known as Porter's 5 forces.
True
Many corporations integrate supply chain management (SCM) software into an enterprise response planning (ERP) suite of software.
True
Merchant account aggregators and merchant money aggregators support small businesses by allowing them to share merchant accounts.
True
One of the benefits of cloud computing is increased collaboration among corporate users.
True
The cash register was the primary transaction processing system for nearly 100 years.
True
To encourage reports about computer ethics violations, managers should ensure that a system exists in which employees can report such malfeasance anonymously.
True
Why would a business choose to implement a business intelligence (BI) software system that their employees are already familiar with?
User familiarity will make the implementation easier and as seamless as possible.
Each time a user clicks or interacts on a social media website
a data point that can be analyzed is recorded.
How is quantitative data about a customer most accurately characterized?
as a record of how a customer interacts with a business
What is the MOST direct way in which customer relationship management (CRM) systems can help businesses increase their sales?
by facilitating customers' transactions with the business
In order to gain market share, a business must differentiate itself from its
competitors.
A bank clerk has inappropriately used a customer's personal email address. The branch manager reprimands the employee and withholds an expected promotion. Which dimension of ethical behavior in the digital age is demonstrated by this disciplinary action?
control and accountability
A state requires all visitors to online cannabis shops to be at least 21 years old. However, it is unclear who should screen the website visitors and who should be responsible for any violations. Which dimension (category) of ethical behavior does this issue fall under?
control and accountability
It is far less expensive to retain an existing customer than it is to acquire a new customer. This is the concept behind the use of which business computer application systems?
customer relationship management systems
Share of wallet is also known as share of
customer.
Providing visibility means that the user interface of any SCM remains a critical component. Typically, a user interface comes in the form of a
dashboard.
Which element of a PESTEL analysis is represented by the use of data mining information from the Bureau of Labor Statistics to gain insight into regional employment figures?
economic
Which dimension of ethical behavior in the digital age includes the question of how much time employees are allowed to spend browsing social media?
establishing standards
The First Amendment to the U.S. Constitution affects Internet privacy because it
extends freedom of speech protection to the Internet, which means government does little filtering of content.
One benefit of using a CRM system to segment a market (rather than another type of market segmentation tool) is that a good CRM tool
facilitates using the company's own, collected data about customers.
Which EIS category would be responsible for tracking travel expenses incurred by regional sales representatives?
financial management
How many dimensions or categories can the ethical concerns of the digital age be divided into?
five
A new app was released providing consumers with digital coupons for products the consumer indicates they frequently purchase. The app gives different users coupons with different values and shares purchasing as well as demographic information with the product manufacturer. Under what circumstances would the information sharing with product manufacturers be ethical?
if the app's terms of service indicated who they would be sharing information with and what information would be shared
An appropriate social media goal for a business that wishes to raise its public profile is
increasing brand awareness.
The difference between a company's fundamental value and its total value is that
its fundamental value is what customers and stakeholder's value about its product or service, while its total value includes the value added by other aspects of the business.
Coffee vendors who operate small, drive-up coffee stands find it difficult to charge significantly higher prices than their many competitors do. What aspect of the coffee stand business makes raising prices difficult?
its low barriers to entry
The amount of time that passes between when a device is asked to perform and when it completes the task is known as
latency.
An international automobile manufacturer is concerned about how its global operations will be impacted by changing government standards for auto emissions and fuel efficiency. Which component of a PESTEL analysis can best help the manufacturer evaluate any threats posed by these policy changes?
legal
Which of these is the "L" factor that managers examine while conducting a PESTEL analysis?
legal considerations
With the increasing presence of Internet e-commerce sites, the force of customers has
leveled off.
What is the fourth step in a five-step ethical analysis?
listing options
Where are data in transit found?
on a cellular network
Which major category of executive information system application would focus on the process a software company used to launch a new application?
operations management
A checkbox may ask if you want to receive news and updates or participate in surveys from the site. When creating or browsing websites, this checkbox is referred to as an
opt-in and opt-out.
When conducting a SWOT analysis, an organization's human resource management system is used to evaluate the relative strength or weakness of its
personnel (workforce).
A branch manager for a national car rental company is in the process of conducting a SWOT analysis for her location. Which of the 5 Ps can she examine using the company's inventory management system for its rental fleet?
plant (physical attributes or resources)
The organizations likely to benefit the most from the global reach of e-commerce are those that
previously depended on foot traffic into one physical store to sell their products.
A branch manager for a national car rental company is in the process of conducting a SWOT analysis for her location. Which of the 5 Ps can she examine using the company's inventory management system for its rental fleet?
processes (activities that create value)
A ________ is also known as a question. A request for information from a database.
query
Entities in Diagrams of Entity Relationship (ERD) are the many business objects that make up the database. Such objects contain:
roles/people tangible business objects intangible business objects
A company regularly honors its employee-of-the-month with a congratulatory post on its social media pages. Which standards should the company establish and enforce to best protect the privacy rights of these employees?
rules of conduct for how social media followers and visitors respond to the posts
Of the listed methods of collecting demographic information, which is the most effective for organizations defining their target market?
surveys
Which of the following do modern inventory systems ensure? More than one answer may be selected.
shelf-space optimization, minimization of stock obsolescence,profitability of product lines
A business must not only look at its direct competitors, but also must contend with those firms that offer a product that a consumer might alternatively choose. For example, McDonald's and Burger King can be considered competitors and if one firm raises prices the other firm might gain its customers. However, if both firms raise their prices, customers may choose to purchase pizza instead. Porter refers to this as the force of
substitutes.
If McDonald's and Burger King raise prices too high, customers may switch from burgers to tacos. This illustrates Porter's force of
substitutes.
What is the correct term for systems that allow money to be exchanged for goods and services more efficiently?
transaction processing systems
Which type of cybersecurity breach can cause the most damage to an organization's systems, data, and information?
viruses
When a large number of buyers seek to purchase a firm's products even when prices increase, Porter's force of customers can be said to have
weakened.
User communities rely on which of these software components to engage with a social media information system (SMIS)? More than one answer may be correct.
web browsers applications that access content
A manager must conduct an ethical analysis to decide whether an employee is abusing the company's flextime policy. When determining whom will be affected by her decision, it is important that the manager also consider
whether she might personally benefit or be harmed by it.