cis csu

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which statements are FALSE regarding the reasons managers should pay attention to Moore's Law? Check all that apply.

-Cost decreases often encourage governmental regulation of suppliers. -The rising power of minicomputers mitigates the need of outsourcing in many firms.

What is a key way that organizations use social media?

-HR management -data analytics -contests and promotions -knowledge sharing -viral marketing -customer engagement (all of these)

Which of the following best captures individuals' motivations for information security attacks?

-IP theft -cyberwarfare -pranking people -stealing personal or financial data -protest hacking (hacktivism) -revenge (disgruntled employee) all of these are correct

Organizations must be prepared to address and respond to the following situation(s) involving social media. Check all that apply.

-Individuals with no relationship with the organization posting harmful content about an organizational employee or the organization itself -Employees posting content that could damage the organization's reputation -Dissatisfied customers publishing negative feedback about the organization on social media -Employees making anonymous posts on social media promoting the organization and disparaging competitors

Which statement is TRUE about key performance indicators (KPIs)?

-KPIs measure progress toward a desired goal. -KPIs are measured using data. -KPIs involve setting targets (the desired level of performance). (all of these)

Use the dropdown menus to select the answers that correctly complete the sentence.

According to the lecture videos, ERP systems focus primarily on integrating business processes internal to the organization, whereas SRM, SCM, and CRM tend to focus on integrating business processes external to the organization.

What is an example of crowdsourcing, as described in your textbook? Select all that apply.

-St. Louis Cardinals baseball team: The club's One for the Birds contest calls for the fans to submit scouting reports on promising players, as the team hopes to broaden its recruiting radar beyond its classic recruiting pool of Division I colleges. -Mechanical Turk: An online marketplace where anyone with a task to be completed or problem to be solved can put it up for Amazon, setting their price for completion or solution. -Walmart: The company set up a contest, providing a sample of historical sales data with potential influencing factors, including promotions, clearance sales, and price roll backs. Candidates were asked to build models that use these factors to forecast sales across various departments.

Timing and technology alone will not yield sustainable competitive advantage. Moving first pays off when the time lead is used to create critical resources that are _______. Check all that apply.

-lacking in substitutes, valuable, tough to imitate, and rare

According to the lecture videos and textbook, machine learning involves the following: Select all that apply.

-learning through data and experience -use of algorithms

According to the lecture video, which AI tools do Apple's Siri and Android's Google Assistant rely on? Select all that apply

-natural language processing -machine learning

According to section 16.4 of your textbook, which statements are TRUE about net neutrality? Select all that apply.

- Internet service firms (e.g., Google, Netflix) say they create demand for broadband business from ISPs (e.g., Comcast, AT&T), while broadband firms (e.g., Comcast, AT&T) say Internet service firms (e.g., Google, Netflix) are ungrateful parasites that aren't sharing the wealth. - The Obama administration had largely supported Net neutrality, but the Trump administration removed most of these regulations. As a result, several states have attempted to enact their own rules favoring Net neutrality.

According to the textbook and lecture videos, what is a risk or challenge associated with use of AI? Select all that apply.

-Consumers and employees may feel their information privacy is compromised. -Insufficient and inconsistent data will inhibit AI use. -Employees may resist AI systems in the workplace because AI could significantly alter their jobs. -Potential for AI algorithms to yield biased predictions and results -Potential for negative unintended consequences of data misuse

The best way to thwart a would-be phishing attack is: Check all that apply.

-Don't click on login links shown in emails; login to the website directly. -Stay alert when interacting with email. -Don't open unexpected attachments or files.

According to the textbook, what are ways that FreshDirect achieved competitive advantage over rivals? Check all that apply.

-FreshDirect was a first mover in the online grocery market, allowing the firm to develop brand, scale, data, and other advantages that newcomers lack. -FreshDirect created an imitation-resistant value chain. Traditional grocers found it difficult to copy the firm's delivery business because this would have left them straddling two markets (low-margin storefront and high-margin delivery), unable to gain optimal benefits from either.

Drag/drop the definitions and examples to the corresponding type or category of software.

Enterprise software: applications that address the needs of multiple users throughout an organization or work group, enterprise resource planning, supply chain management, CRM Desktop/personal software: presentation software, computer games, social media apps, applications installed on a personal computing device, typically supporting tasks performed by a single user

Which of the following statements about Facebook and mobile is FALSE?

Facebook's was an early innovator and leader with mobile applications, out-competing Instagram in mobile photo sharing.

What is a TRUE statement about database management systems (DBMS)? Check all that apply.

-Although the DBMS is considered application software, using the layer cake analogy, it's useful to think of an organization's database systems as layered on top of the operating system layer but under the (enterprise) application layer. -A DBMS is sometimes referred to as database software, which is software for creating, maintaining, and manipulating data.

Which of the following are TRUE statements? Select all that apply. HINT: There are four true statements.

-Firms using SaaS products can dramatically lower several costs associated with the care and feeding of their information systems. -Most organizations do not opt for IT configurations that are purely in-house, packaged, or SaaS models. -A manager should take a vendor's reputation and financial position into consideration while making an IT outsourcing decision. -Firms that want significant control over the operating system and applications they put 'in the cloud' should choose an IaaS service over an SaaS offering.

Which of the following is a TRUE statement about websites, URLs, and phishing? Select all that apply.

-Phishing is one of the most common intrusion techniques used to spread malware. -One of the reasons one should be careful about clicking on any URL in an e-mail is that hackers can easily embed a redirection in e-mail links, rerouting a user to an alternate online destination. -Spear phishing attacks specifically target a given organization or group of users. -Hackers might infiltrate computer systems to enlist hardware for subsequent illegal acts.

Which statement is TRUE about cybersecurity within organizations? Check all that apply.

-Proactively avoiding a cybersecurity incident costs less than dealing with a security breach afterward. -The virtual shutdown of websites by way of overloading them with seemingly legitimate requests sent simultaneously from thousands of machines is termed a DDoS (distributed denial of service) attack. -A Red Team looks for weaknesses in security mechanisms, with a view to help plug the holes that might be exploited by cyber-criminals. -When defining a cybersecurity strategy, it is always a balancing act between risk and cost.

Which statements are TRUE about the Disney MagicBand? Select all that apply.

-The MagicBand allows Disney to collect various real-time data that it can use to personalize and improve services for guests. -MagicBand and supporting systems have increased revenues from guest spending and boosted efficiencies that resulted in serving thousands of additional guests per day. -Thanks to Moore's Law, while Disney initially incurred manufacturing costs of $35 per MagicBand, these costs are now below $5.

Which of the following is a risk associated with social media?

-The online social media activities of employees, whether in their personal or professional domains, can taint the image of the organizations they work for when the online content or behavior is perceived to be negative or controversial by the general public or key organizational stakeholders. -Online trolls can vandalize content published on social media or otherwise cause grief or mischief on social media. -Viral online outrage can harm the reputation of an organization, regardless of whether the organization uses social media. (all of these)

When creating an organizational cybersecurity strategy, which statement is FALSE? Check all that apply.

-Working from home does not change the cybersecurity plan for an organization. -Always hire Black Hat hackers to test vulnerabilities in your organization cybersecurity landscape. -The attack surface does not matter when creating a cybersecurity strategy.

According to this module, people cope with the psychological stress associated with paradoxical ideas through defensive strategies, such as:

-ignoring or denying the tensions -forming or joining subgroups that align with one of the viewpoints -blaming or scapegoating others for the tensions -resorting to understandings or actions that have provided comfort and security in the past all of these are correct

According to the module videos and textbook, which of the following is an example of how organizations can develop and deploy more ethical and less risk-prone information systems? Select all that apply.

-increase diversity in information systems development and management teams -create a systems review board -develop a code of tech ethics -hire ethicists

According to this video, a strategy you can use to resolve paradoxes (contradictory ideas and values) is the following:

-introduce new ideas that can resolve the paradox -account for context -clarify levels of analysis -account for time all of these are correct

Put the SDLC phases in order from start to finish.

-requirements -design -implementation -verification -maintenance

According to lessons in Module 2, the following solution(s) can help us overcome our unconscious biases. Select all answers that apply.

-set objective criteria to evaluate information -seek out and be open to contradictory and differing views -embed ourselves in diverse networks and embrace inclusive relationships

What are some of the novel technologies presented in Chapter 5? Select all that apply.

-smart diaper that sends a tweet when the sensor detects moisture -smart umbrella that receives weather reports wirelessly and flashes when rain is expected -smart license plate that contacts emergency services when a car crashes -artificial neurons placed on silicon chips that mimic neurons of the human nervous system and can be used to treat Alzheimer's disease and other neurological conditions

Messaging services are a form of social media known for the following characteristic(s). Check all that apply.

-some focus on specific media types (e.g., Instagram: photos, TikTok: videos) -often used on mobile devices

According to section 15.5 of your textbook, what is a characteristic of "data quality"? Check all that apply.

-the data is accurate, clean, complete, and reasonably free of errors -the data can be trusted

The reason unscrupulous individuals use the unsophisticated method of Phishing or Spear Phishing emails are: Select all that apply.

-to gain the login information of the targets (email recipients) -to obtain private information to sell on the Dark Web -to access the targets' (email recipients') financial credentials for financial gain -to get the most results for the least amount of effort

According to the lecture videos and your textbook, deep learning involves multiple layers of interconnections among data to identity patterns and predict results and uses _______________. Select all that apply.

-unstructured data -unlabeled data

According to the lecture videos and textbook, what are examples of artificial intelligence applications? Select all that apply.

-virtual backgrounds in conferencing apps like Zoom -voice analysis software to detect employees compassion fatigue -robo-journalists -IBM watson -iRobot roomba

According to the lessons in this module, our unconscious mind can determine

-who we choose to help -where we sit -who we turn to for advice -who we eat lunch with (all of these)

In 2020, Facebook had nearly ______________ monthly active users.

3 bil

Drag/drop the correct responses into the blanks to complete the sentence. (this is wrong so switch answers)

According to Michael Porter, the reason many firms perform poorly compared to their competitors is because they've defined themselves according to strategic positioning (performing the same tasks better than rivals) rather than operational effectiveness (performing different tasks than rivals or the same tasks in a different way).

Which of the following statements is TRUE?

Because Facebook is private, most of its content is on the deep Web, which is Internet content that can't be indexed by Google and other search engines.

According to lessons in this module, the following statement best describes careers in information systems.

Careers in information systems can fall on either business or technical tracks and often combine both business/soft and technical skills.

Drag/drop the definitions to the corresponding approaches to computing discussed in Chapter 5.

Cloud computing: refers to replacing traditional computing resources with services provided over the Internet Grid Computing: special software is installed on several computers enabling them to work together on a common problem. Massively parallel processing: a technique in which computers are designed with many microprocessors that work together, simultaneously, to solve problems Cluster computing: connecting server computers via software and networking so that their resources can be used to collectively solve computing tasks

According to a video in 11.5 of the textbook, the most dangerous type of false and misleading information that social media companies are trying to address is:

Content low in truth with a high intent to mislead (e.g., hoaxes, conspiracy theories)

Match the correct definition to each term.

Crowdsourcing: The act of taking a job traditionally performed by a designated agent (usually an employee) and outsourcing it to an undefined, generally large group of people in the form of an open call. Prediction market: Polling a diverse crowd and aggregating opinions in order to form a forecast of an eventual outcome. Collaborative consumption: When participants share access to products and services rather than having ownership. Shared resources can be owned by a central service provider (e.g., Zipcar) or provided by a community that pools available resources (e.g., Airbnb, Uber).

Which of the following statements is TRUE about cybersecurity?

Cybersecurity breaches can most often be traced back to personnel or procedural (process) factors.

Drag/drop the answer that correctly completes the statement.

Data is oftentimes considered a defensible source of competitive advantage; however, advantages based on capabilities and data that others can acquire will be short lived

Match each definition with the correct term.

Data mining: The process of using computers to identify hidden patterns and to build models from large data sets Data warehouse: A collection of databases structured for fast online queries and exploration, typically aggregating enormous amounts of data from many different operational systems Data cube: A special database used to store data in OLAP reporting Data mart: A database or databases focused on addressing the concerns of a specific problem or business unit

According to your textbook, how are artificial intelligence, machine learning and deep learning related?

Deep learning is a subcategory of machine learning, which is a subset of artificial intelligence.

Drag/drop the definitions and examples to the corresponding type or category of software. It's possible some definitions/examples do not match any software type/category and will remain unsorted.

Desktop software: presentation software, computer games, social media apps, applications installed on a personal computing device, typically supporting tasks performed by a single user Enterprise software: applications that address the needs of multiple users throughout an organization, enterprise resource planning, supply chain management, CRM Uncategorized: firmware, embedded systems

According to the lecture videos, research has shown that the link between (1) social media use and (2) negative responses and outcomes is the following:

Findings from existing studies are mixed; some show negative correlations and others show positive correlations.

Drag/drop the descriptions to their corresponding wave of computing (according to the textbook). The evolution of each wave is driven by Moore's Law.

First Wave (1960s): when there were massive mainframe computers that only large corporations and governments could afford Second Wave (1970s): when mini-computers became mainstream in organizations because they were affordable Third Wave 1980s: when PCs became more common in organizations Fourth Wave 90s: when Internet computing became more mainstream in organizations Fifth Wave 2000-2010: when mobile phones became more commonplace, leading to a smartphone revolution Sixth Wave 2010-now: when technologies became so fast and inexpensive that they are considered pervasive and ubiquitous

Drag/drop the cloud computing models to their corresponding descriptions.

In this scenario, the cloud firm usually manages the infrastructure (keeping the hardware and networking running), while the client has control over most other things (operating systems, storage, deployed applications, and perhaps even security and networking features like firewalls and security systems): Infrastructure as a Service IaaS In this scenario, the cloud firm usually manages the platform (hosting, hardware, and supporting software), while the client has control over the creation and deployment of their applications: Platform as a Service PaaS In this scenario, the cloud firm manages the creation and deployment of software applications that are delivered online, while also managing the platform and infrastructure: Software as a Service SaaS uncategorized: HaaS

Which of the following is a FALSE statement about information system security?

Information system security is fundamentally a technology problem.

Drag/drop the hardware examples to their corresponding function. It's possible some examples do not match any category and will remain unsorted.

Input: microphone, sensors on smart devices, touchpad Output: monitor or screen, speaker, printer Processing: central processing unit, microprocessor Storage: flash memory, hard drive, random access memory

According to lecture videos and your textbook, switching costs can help reduce some of Porter's five forces so that firms can remain competitive. Drag/drop the correct descriptions to match the corresponding source of switching costs.

Learning costs: Switching technologies may require an investment in learning a new interface and commands Information and data: Users may have to reenter data, convert files or databases, or even lose earlier contributions on incompatible systems Financial commitment: Can include investments in new equipment, the cost to acquire any new software, consulting, or expertise, and the devaluation of any investment in prior technologies no longer used Contractual commitments: Breaking contracts can lead to compensatory damages and harm an organization's reputation as a reliable partner Search costs: finding and evaluating a new alternative costs time and money Loyalty programs: Switching can cause customers to lose out on program benefits. Think frequent purchaser programs that offer "miles" or "points" (all enabled and driven by software).

Match each definition with the correct term.

Legacy systems: Outdated information systems that were not designed to share data, aren't compatible with newer technologies, and aren't aligned with the firm's current business needs Transaction processing systems: Systems that record a transaction (i.e., a form of business-related exchange), such as a cash register sale, ATM withdrawal, or product return Data lake: Systems that allow for the storage of data in both structured and unstructured ("raw," "unfiltered") formats Big data: The massive amounts of data available to today's managers, often unstructured and are too big and costly to easily work through use of conventional databases

Which is a best practice for physical security awareness?

Lock your computer screen and mobile devices every time you step away.

What is the relationship between Moore's Law and e-waste?

Moore's Law predicts the accelerated obsolescence of technology devices, which leads to increases in discarded hardware devices.

Which of these would be an example of a DDoS attack?

Overloading a popular social networking site with inbound messages in order to shut down access to the site

According to the lecture videos, which statements are TRUE regarding spreadsheets? Check all that apply.

Spreadsheets are useful for analyzing data Spreadsheets are not an effective tool to use to store large amounts of organizational data long term for decision making.

Drag/drop the descriptions and examples to their best matching corresponding category of data. All answers will be sorted, with none left unsorted. Each category should have an equal number of correct answers.

Structured data: data mart, data warehouse, relational database, SQL, data is stored in conventional formats Unstructured data: social media, approx 80% of corporate data, sensor data, email, more often associated with big data

According to the textbook, which of the following is true of United States environmental legislation regarding e-waste and recycling standards?

There is no U.S. federal legislation signed into law covering e-waste.

Match the scamming technique with the description or scenario that best illustrates the technique.

Vishing: A cyber rascal calls a company trying to get access to private personal and sometimes financial information to use for financial gain. It is a form of social engineering. Smishing: A person receives a text message from a familiar number with a link. If they click on the link, it will install a malicious software app on the phone. Ransomware: Malware that encrypts a user's files (or perhaps threatens to delete them) and demands that a user pay to regain control of their data and/or device. Spear phishing: Employees of a medical center received e-mails from the head office manager, indicating that the recipient was being laid off and offering a link to job counseling resources. The link really offered a software payload that recorded and forwarded the keystrokes on the victim's PC. Phishing: A bank customer receives a message, ostensibly from the bank's website, asking her to provide her login information but contains many misspellings and links that go to suspicious websites.

What is a cross-functional process?

a business process that spans multiple functional areas or units in an organization

What is a business process?

a series of steps taken to achieve a desired outcome or goal

The scalability of a software product is defined as the:

ability to be easily expanded to manage workload increases

According to the textbook, after the initial problematic roll-out of the Healthcare.gov app, a team of seasoned technologists and committed developers worked on fixing the system using a(n) ____________ methodology and led the web app to exceed enrollment projections.

agile

Which of the following is an example of a security threat resulting from malicious human activity?

an employee who intentionally destroys data or other system components

Technologies that measure and analyze human body characteristics for identification or authentication are known as ____________.

biometrics

Hordes of surreptitiously infiltrated computers, linked and controlled remotely, are known as zombie networks or:

botnets

Neural networks are statistical techniques commonly used in machine learning that are modeled off the following human biological system:

brain

According to the textbook, due to widespread access to simple, affordable handheld devices in East Africa's Somaliland, the country's economy is fast becoming:

cashless

When an organization creates its social media awareness and response team, it should:

create an interdisciplinary team from different functional areas, such as public relations, legal, marketing, customer support, human resources, and IT, among others

An attack on the U.S. power grid by terrorists or a foreign power is indicative of:

cyberwarfare

The below example is a type of business intelligence and analytics tool called a(n) _______________

dashboard (COVID)

Information silos arise as a result of ________________.

data being isolated in separated systems

Social media can be a key driver of "________" media, where consumers who are enthusiastic about products and services can help spread the word through social media and word of mouth.

earned

Who would be included as an employee cybersecurity threat?

employees who sometimes do not follow security practices

According to the lecture video, "Overview of Artificial Intelligence," one of the differences between data and information is the following:

facts versus risk reduction

Which of these is not a major type of cloud services?

hardware as a service

What is the root cause of almost every data breach?

human error

Which of the following is a benefit of in-house hosting (as compared to cloud hosting)?

in depth visibility of security and disaster preparedness for business continuity

In any organization,

information security is everybody's responsibility

According to the lecture videos, there is _______________ in the telecommunications industry (e.g., Verizon, AT&T) in the United States.

low threat of new entrants

The domain name service (DNS) is a distributed database that allows users to communicate with other computers by:

mapping host and domain names to IP addresses of computers.

A significant portion of Facebook's underlying technical infrastructure consists of ______________, which is software that is typically free and whose code can be accessed and potentially modified by anyone.

open source software

In cloud computing, resources are said to be "pooled" because ________.

organizations share the same physical hardware through virtualization

According to the textbook, which of the following is NOT a strategy used by a firm to achieve and maintain competitive advantage?

packaged software

According to the lecture videos, what contributes the most to the risk and challenges of implementing ERP systems?

people and processes

In the lecture videos, the Prada example shows that copying technology alone is not a guarantee of success. The firm would have benefited from a holistic understanding that Information Systems is comprised of the following components:

people, processes and technology (hardware, software, and data)

Two of the biggest considerations in the management of the facilities of a large data center include:

power and cooling

According to this module's lessons, systems thinking can help people think more critically about complex problems, as it helps explain the different components that work together to yield outcomes. When applying the information systems framework, which three components are most relevant? Select the three below.

processes tech people

In the United States, Section 230 of the Communications Decency Act defines social media companies like Facebook as a(n):

provider of content but not a publisher of content, releasing social media companies from liability for the user-generated content posted on their platforms.

According to this module, one of the conditions that has not been widely supported in existing research to establish a causal link between social media use and addictions or other mental health conditions is the following:

social media use precedes the development of addictions or other mental health conditions

open source software is

software that provides the source code for anyone to copy and use.

According to your textbook, a scrum team repeats or reiterates its efforts in ____________, which are short time-boxed increments, each increment usually lasting 1-6 weeks.

sprints

The assigned chapter discusses various sources of internal and external data that an organization collects, stores, and analyzes for strategic decision making. Which is an example of a data source discussed in the chapter?

transaction processing systems call center conversations enterprise systems surveys loyalty cards sensor data data aggregators (firms that collect and resell data) social media focus groups ALL OF THESE

A firm should be wary of adopting software packages or outsourcing portions of its value chain that are proprietary and a source of competitive advantage.

true

According to this module, some social media researchers express concerns that social media use is re-wiring our brains to shorten our attention spans, while other social media researchers caution that there is insufficient research to support these claims.

true

A(n) _____ is someone who uncovers computer weaknesses and reveals them to manufacturers or system owners, without exploiting these vulnerabilities.

white hat hacker

Match the following components in this web address (https://en.wikipedia.org/wiki/Web_address) with its description.

wikipedia.org: domain name with ".org" being the top level domain. wiki: the path that maps to the folder location where the file is stored under the filename "Web_address" en: host name indicating the computer hosting the website. https: application transfer protocol used in the Web address and stands for "hypertext transfer protocol secure."

According to the textbook and lecture videos, what is an example of positive outcomes associated with the use of AI?

-Use of AI can improve employee retention by uncovering patterns of those most likely to leave. -Use of AI can automate many tasks, providing convenience to consumers and cost savings for organizations. -Use of AI can predict cancer survival better than humans. (all of these)

What is the difference between on-premises enterprise software and cloud-based enterprise software?

Cloud-based enterprise software is hosted on the vendor's servers and accessed through a web browser, whereas on-premises enterprise software is installed locally, on a company's own computers and servers.

Complete the sentence by choosing the correct response from the drop-down list.

For some industries where the products are commodities, the Internet has afforded customers increased price transparency of these products, thereby increasing the bargaining power of buyers .

A budget is meant to summarize the saving and spending that has taken place over the past year.

The Facebook-backed Libra cryptocurrency seeks to serve the 100 million adults worldwide who do not have a bank account.

Match the correct definition to each term.

Griefer: An internet vandal and mischief maker; also sometimes referred to as a troll Sock puppet: A fake online persona created to promote a particular point of view, often in praise of a firm, product, or individual. Astroturfing: Engineering the posting of positive comments and reviews of a firm's product and services (or negative ones of a firm's competitors).

Facebook has been able to develop and maintain a competitive edge using a variety of strategies. Some of these critical competitive strategies are listed below. Match the definitions correctly to the terms.

Envelopment: A strategy whereby a firm with a significant customer base adds a feature to an existing product or service and eliminates the need for any rival, stand-alone platforms. Think Apple adding video to cameras, crushing the market for the Flip cam. Network effects: When the value of a product or service increases as its number of users expand. Also known as Metcalfe's Law, or network externalities. Switching costs: The cost a consumer incurs when moving from one product to another. It can involve money spent, investments in time, any data loss, etc. Platform bundling: A strategy whereby a firm offers products and services that allow for the integration of other software products and complementary goods, which creates an eco-system of value-added offerings.

Drag/drop the definitions/descriptions to their corresponding concept. All answers will be sorted, with none left unsorted. Each category should have an equal number of correct answers.

Data: raw facts and figures, comes before information and knowledge Information: data presented in context so that it can answer a question or support decision making, inferred from data and organized to have useful meaning Knowledge: combined with information to make stronger decisions, insight derived from experience and expertise

Drag/drop the descriptions and examples to their corresponding type of storage. It's possible some descriptions or examples do not match any category and will remain unsorted.

Volatile memory: Requires power to retain stored data or information. Short-term storage. RAM. Non-volatile memory: Does not require power to retain stored data or information. Solid State Drive. Long-term storage.

Drag/drop the descriptions to the corresponding type of social media.

Wikis: A website that anyone can edit directly from within the browser. All changes are attributed, and there is a revision history allowing for the roll back of changes to revert to earlier versions, Wikipedia Electronic Social Network: Facebook, Online community that allows users to establish a personal profile, link to other profiles (i.e., friends), share content, and communicate with members via messaging, posts. Most personal relationships are reciprocal (i.e., both parties agree to be "friends"). Microblogging: Twitter, Short, asynchronous messaging system. Users send messages to "followers" who aren't required to follow back. Messaging services: Snapchat, Communicate with individuals or groups of users using short-format text, graphics, and video. Most messaging is done using mobile devices.

A customer relationship management system is ________. Choose the best answer.

a system for managing all the interactions with the customer, from lead generation to customer service

In one of the videos, the guest speaker Greg Watkins referred to a stereotype that people who are "techies" or who are drawn to anime and video games are perceived to be most suitable for information systems careers. This stereotype is an example of: (choose the best answer choice)

prototype bias

Drag/drop the concepts that correspond to the advantages and disadvantages of ERP systems. NOTE: Two answers do not match either category and should be left unsorted.

Advantages of ERP Systems: "single source of truth" with data stored in a single, centralized database--allowing for powerful analytics and decision making, operational efficiency and effectiveness, increased visibility into an organization's business processes, standardization and integration of business processes, ERP software vendors tend to embed industry best practices into their software, easier to connect systems with external organizations, facilitating mergers and acquisitions Disadvantages of ERP systems: implementations can be costly and time consuming (sometimes spanning years), standardized processes in the commercial software means the processes are not unique and may not provide competitive advantage, customizations can be costly and difficult to maintain when upgrading the software, users tend to resist new implementations because these systems tend to substantially change their jobs, failed implementations can cost a company millions of dollars and sometimes bankrupts companies, implementations are often large-scale change projects because processes typically have to be modified to fit the software rather than customizing the software to fit existing processes Uncategorized: the implementation process is often simple because the the software has already been rigorously tested by the ERP software vendor, customizations are fast and cheap, allowing the organization to embed their unique business processes in these systems and upgrade the software easily

Net neutrality affects individuals, business, and Internet Service Providers. Categorize the arguments SUPPORTING net neutrality and the arguments AGAINST net neutrality. All arguments are used.

Arguments SUPPORTING Net Neutrality: No exclusion of content. Everything on the internet is available to everyone, No additional costs for content type whether you are streaming a video or gaming online, Small creators, such as YouTube channel creators, have a level playing field of having their content viewed, Freedom of Expression. ISPs won't censor the Internet, Startups have a greater chance of being successful with a web presence and having their content viewed. Arguments AGAINST Net Neutrality: If all Internet traffic is treated equally, it's easier for illicit (offensive, dangerous, illegal) content to be widely available and more difficult to remove, No new infrastructure. If ISPs can't charge more for their services, they will have less incentive and fewer resources to invest in their infrastructure, From the perspective of ISPs, net neutrality does not allow them to prioritize some Internet services to provide better service to customers, Tiresome regulations. Under net neutrality, the FCC must monitor the ISPs' compliance with these rules. This includes submitting reports twice a year, which can become costly for ISPs of any size, From the perspective of ISPs, net neutrality allows Internet service firms (e.g., Google, Netflix, etc.) to "free ride" and earn huge profits by using ISP networks and infrastructure without funneling any of these profits to the ISPs that provide this infrastructure.

Drag/drop the value chain components to their corresponding level of activity: primary or secondary.

Primary Components/Activities: Support—service, maintenance, and customer support, Inbound logistics—getting needed materials and other inputs into the firm from suppliers, Outbound logistics—delivering products or services to consumers, distribution centers, retailers, or other partners, Operations—turning inputs into products or services, Marketing and sales—customer engagement, pricing, promotion, and transaction Secondary Components: Technology / research and development—new product and process design, Human resource management—recruiting, hiring, training, and development, Procurement—sourcing and purchasing functions, Firm infrastructure—functions that support the whole firm, including general management, planning, IS, and finance

Drag/drop the strategies for personal cybersecurity hygiene to their corresponding categories. (NOTE: There are six correct answers for each category.)

Strategies that Strengthen Personal Cybersecurity Hygiene: Don't turn on risky settings, like unrestricted folder sharing, Pay attention when clicking links, Turn on software update features for your operating system and applications you use, Install security software (e.g., antivirus software, personal firewalls, malware scanners, etc.), Regularly backup your most important files practicing the 3-2-1 backup scheme, Don't give your password to anyone. Strategies that Weaken Personal Cybersecurity Hygiene: Click the "Remember me" or "Save password" settings on a public computer, Write your passwords down on a sticky note, Use public computers (libraries, coffee shops) when accessing sites that contain your financial data or other confidential information, Always trust an email with a link that states it's from your manager, Use the same password on many websites, Turn on browser settings that will auto-fill fields with your prior entries (e.g., usernames, passwords, phone numbers), especially on devices that you share with others.

Drag/drop the correct answer that completes the sentence.

The operating system controls the computer hardware and how computer resources are allocated and provides a means by which end users can interact with the computer.


Ensembles d'études connexes

Bloomberg Market Concepts Certification

View Set

Unit Exam 2: Real Estate Brokerage

View Set

Origins of the Cold War--Instruction--AL-World History: 1500 to the Present B

View Set

PEDIATRIC SUCCESS Cardiovascular Disorders chapter 6

View Set

Computer Concepts Module 4 QuickQuizzes

View Set

ACC 311 - Final Exam Study Q's - Chapter 4 (Self-Review)

View Set