MIS

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

How does the cybersecurity goal of preserving data integrity relate to the goal of authenticating users?

Data integrity is more easily preserved if users must be authorized to access data and make changes.

Trying to answer questions such as "what happened?" or "what is occurring?" or "what was the ROI?" is the role of

Descriptive Analytics

Karl Benz invented the internal combustion automobile in 1885. More than a century before, Adam Smith had described how division of labor creates efficiencies. When Henry Ford set up Model T production on an assembly line in 1908, he combined technology and efficiency to produce an inexpensive automobile. Ford transformed the personal transportation market. Christensen called this process

Distruptive Innovation

Which is the best explanation of why technology is highlighted in a PESTEL analysis?

Failing to keep up with advances in technology can harm an organization's competitiveness.

A target market for an organization is the online audience that has demonstrated its interest in the organization's products, services, or activities by following or engaging with the organization on social media.

False

Authenticating the identity of a user, process, or device serves one purpose: to prevent unauthorized access to an organization's assets or resources. Group starts

False

Data and information collected on Instagram sites can only be analyzed by using the tools provided by Instagram.

False

Hardware, software, data, and procedures are four of the five components of a social media information system (SMIS). Group starts

False

The practice of trading used, old, or obsolete products via the internet in exchange for other used or similar products is called re-commerce.

False

Users in a social media information system can rely on providers to safeguard their personal information and profiles.

False

Making use of the research and development conducted by the market innovator and then developing a competing product at a lower price is referred to as the ________ strategy.

Fast Follower

3 Components of SMIS

Hardware and software, data and procedures, and people

An international automobile manufacturer is concerned about how its global operations will be impacted by changing government standards for auto emissions and fuel efficiency. Which component of a PESTEL analysis can best help the manufacturer evaluate any threats posed by these policy changes?

Legal

Under development at MIT, photonic crystals allow solar panels to be twice as efficient by absorbing and converting the sun's

Light

How are social media metrics and social media goals related?

Metrics that correspond to social media goals can serve as key-performance indicators (KPIs) for them.

Qualitative data that is not categorized is called nominal data. Qualitative data that is categorized (ranked, for example) is considered _____ data.

Ordinal

What is the second step in the six-step process of creating an SMIS?

Outline Measurement of Success

When data is anonymized, the PII is eliminated or encrypted. PII includes names, Social Security numbers, addresses, and more and stands for ______ identifiable information.

Personally

Which of the following is a popular Microsoft data analytics program that offers business intelligence as well as data visualization?

Power BI

Data-driven decision making (DDDM) can be facilitated through a six-step processes of Ask, Prepare, Process, Analysis, Share, and Act. Which of these steps refers to creating visualizations and presentations for key stakeholders?

Share

The e-commerce company with the highest revenue is based in which country?

The United States

What do all cybersecurity threats have in common?

They are connected to the loss of information, software, or hardware.

For strategic planning, managers should choose an aggressive strategy if a SWOT analysis reveals that the organization faces weak external ________ and its external opportunities are matched with internal strengths.

Threats

Accelerated mobile pages (AMPs) support m-commerce by utilizing a scaled-down version of hypertext markup language (HTML) to create web pages that load quickly on mobile devices.

True

To properly authenticate, or verify, the identity of authorized users and protect assets from unauthorized users, it is essential to

keep user logins and passwords confidential.

Built on real-time geodata and information provided from wireless mobile devices, ________ are widely used in m-commerce.

location-based services (LBS)

E-commerce transactions that are executed using wireless mobile devices are known as Multiple Choice

m-commerce

What does the identify (ID) function of the NIST Cybersecurity Framework focus on?

organizational understanding of how to manage cybersecurity risks

Which threat to cybersecurity can only come from outside an organization?

ransomware

the practice of selling used, old, or obsolete products via the internet in exchange for a new product or a cash payout, not trading these products for other used products.

re-commerce

A target market is

the audience (online and/or offline) that is most likely to be interested in the organization's products, services, or activities, based on specific demographics and behaviors.

According to We Are Social, 90 percent of adult internet users (aged 16-64) around the world have visited an online retail store on the web.

true


Kaugnay na mga set ng pag-aaral

DOD Cyber Awareness 2022 Knowledge Check

View Set

Emergency Medicine Genitourinary

View Set

Bus 121: Employee Benefits Chapter 5

View Set

Microeconomics Unit 6 - Market Failures

View Set

International Environmental Politics Final

View Set

SAP Review -MAD, Mean, Median, Mode & Range

View Set