INFO 360 Mid Term

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which of the following is true about geographic information systems (GIS)? More than one answer may be correct.

A GIS uses a global positioning system (GPS) powered by at least 24 satellites. Combined with GPS, GIS is used to guide the transport of goods to different locations. Spatial data generated from GIS is used by organizations to make better decisions.

A corporation's Twitter report card indicates that engagement has dropped off in the past two months. What information from the tweet activity dashboard could they use to determine the cause of this drop off in engagement?

A change in demographics of the people who are engaging with their tweets.

What is a cloud deployment model?

A cloud deployment model defines the framework of a cloud environment.

Which of the following statements accurately describes computer networks? More than one answer may be correct.

A network is a group of two or more devices/computers that are connected together. Networks range in size from small home networks to the Internet, the world's largest network. Networks support many different software applications and online or offline services.

Why is a target market important to businesses and organizations?

A target market is the group of consumers most likely to purchase an organization's products and services.

Which of the following is a benefit of collaboration software for business teams and organizations? More than one answer may be correct.

Better communication: team members can share content in real time, from any location. Better project management capabilities: leaders can easily share plans and schedules. Streamlined workflow: team members can easily add and update activities and duties.

Why is a denial-of-service attack (DoS attack) a threat to data availability?

By flooding a system with incoming messages, a DoS attack forces the system to shut down, rendering it inaccessible to the users who legitimately have access to it.

The essential RDBMS functions; create, read, update, and delete data is collectively referred to as which acronym?

CRUD

A cloud database is a type of database developed on a ________ platform and retrieved by a cloud platform

Cloud

Which of the following is the clearest definition of a computer virus?

Code-created malware that, when executed, damages programs and performance.

What is the server in a client-server network?

Computer Hardware

The acronym for Data Governance is ________.

DG

Using a traditional filing system (noncomputer) led to many problems like ________ and ________.

Data Redundancy, Inconsistency

Which of the following statements explain why data and procedures are studied as one social media information system (SMIS) component? More than one answer may be correct.

Data and procedures are work together to keep SMISs functioning. Procedures help providers properly collect, direct, protect, and regulate the use of data.

Which statement correctly defines the components of the World Wide Web (WWW)? More than one answer may be correct.

HTTP is a protocol for the transmission of hypermedia documents (such as HTML) and was designed for communication between web browsers and web servers. A URL is the address of a document or other content/resources found on the web. HTML is a language commonly used format for publishing web documents and content.

The primary key field cannot hold a ________ or ________ value.

Null, Duplicate

Most organizations do not develop their own DBMS; instead, they use DBMS created by which three of the following?

Oracle, Microsoft, IBM

Why are probable loss calculations important?

Organizations have limited funds to use toward system protections.

The basic types of computer networks include which of the following? More than one answer may be correct.

PAN, WAN, LAN

RAM storage and ________ processing are two main in-memory computing components.

Parallel

What is the benefit of Facebook's Audience Insights tool providing information about users who are already connected to an event hosted by your organization? More than one answer may be correct.

People who do not frequently interact with your brand may have attended your event; additional information allows you to target them for higher engagement with your organization. People who have attended an event hosted by your organization already have a connection to the organization; more information about those people can help strengthen the connection they feel to the organization.

Data administrators are responsible for the ________ and procedures used to handle the information of an organization. Large companies use/implement the data management policies and procedures most often.

Policies

A ________ key must contain a unique value.

Primary

Why is it important to preserve the integrity of data, information, and systems?

These assets lose their usefulness and value if their consistency, accuracy, or dependability is compromised.

How does VPN software ensure that people accessing a network are authorized to do so?

VPN software authenticates users.

Commonly used techniques to gain information in web mining include ________, ________,and ________.

WCM, WSM, WUM

Which of the following is a reason why farmers frequently use a DSS to determine appropriate fertilization and irrigation?

Weather patterns frequently change and cannot be predicted far in advance; therefore, the fertilization and irrigation needs are not consistent for a farmer's crops.

Frederick Taylor built scientific management on which of the following beliefs? More than one answer may be correct.

When workers are more productive, more employment opportunities arise. When the company is successful, its employees are successful.

In the context of California's SB-327 for IoT Security, an "Internet-connected device" ________. More than one answer may be correct.

connects to the Internet has a Bluetooth address has an Internet Protocol (IP) address

Providers use SMISs to deliver which of the following kinds of user data to sponsors? More than one answer may be correct.

content data from user interactions connection data from user relationships with other sources data that reveal user behavior and connection patterns

The purpose of programs that analyze connection data is to

create information about user behavior and patterns to benefit a sponsor.

What is the first step in the six-step process of creating an SMIS?

create system goals that align with the goals of the organization

Living a virtuous life involves acting with high morals that are logically defined or shaped by

ethics.

Describe the benefits 5G networks will provide cell phone carriers and users. More than one answer may be correct.

faster connections and data transfer speeds greater capacity lower latency

Describe the goals of the National Institute of Standards Technology (NIST) Cybersecurity Framework. More than one answer may be correct.

give guidance to organizations who wish to understand potential security breaches help organizations develop appropriate policies and procedures to mitigate data breaches create an atmosphere where organizations can effectively discuss cybersecurity risks internally and with those outside of the organization

Which of the following services are often provided by platform as a service (PaaS) vendors? More than one answer may be selected.

host hardware and software provide social media capabilities build scalable apps without having to write any code

To increase sales, a sportswear chain is designing a promotional campaign for social media. It plans to post links to coupons on its website and have its sales personnel scan the coupon redemption codes at store registers. Which are the best social media information system (SMIS) metrics to track the success of this promotion?

the sales statistics linked to the coupon redemption codes

The development and growing popularity of flextime arrangements can largely be attributed to

the spread of high-speed Internet and technologies such as telecommuting and teleconferencing.

Which of the following are true statements about cryptocurrencies? More than one answer may be selected.

A cryptocurrency only exists on a computer. You can create new cryptocurrency using a process called mining.

Which of the following organizations adhere to the principles described by Max Weber? More than one answer may be correct.

A medium-sized biotech company recruits for entry level positions at state colleges located in the organization's region. A minimum GPA is required, participation in extracurricular activities. All entry level positions support senior researchers and have the same starting salary. Senior researchers are people who have been promoted out of the entry level position; they are managed by people who have achieved their sales quotas in 7 of the last 10 years. New hires are trained in company policies and provided with management training after their first successful year. Employees with 2 years of exemplary performance reviews are invited to interview for positions managing the newest batch of college recruits. A local ad agencies firm specializes in SEO marketing for small, local clients. The ad agency typically hires 1-2 new employees every year from a small, local university; they must have completed a minor in Internet marketing. Promotions are based on annual reviews; employees who demonstrate potential are encouraged to take additional classes to further their career at the agency's expense. Employees are divided into different categories, based on the type of client they work with (i.e., retail; tourism; restaurant).

What was Weber's view on the use of physical force?

A police force overseen by a local government enforces laws within a community

Which of the following is an example of an organization combining data analytics with GIS information? More than one answer may be correct.

A restaurant uses the location of users when they enter key word searches that lead to their online menu to determine where they should focus advertisements on their new delivery options. A clothing store texts a 25 percent off coupon to customers who have shopped in their store when they are within a two-mile radius of the store.

Which of the following are examples of cloud-based management information systems support offered by mobile POS systems? More than one answer may be correct.

A system that keeps track of which required online training courses each employee has taken and makes new training available once prerequisites have been met. A system that alerts management when different items are selling faster than expected and need to be restocked. A system that works with payroll systems to keep track of how many hours an employee has worked and totals up their weekly paychecks.

How does supply chain visibility provided by a supply chain management system reduce the bullwhip effect?

Accurately predicting how many units of an item are expected to sell allows manufacturers to accurately source for the correct amount of raw materials and avoid overreacting to fluctuations in consumer demand.

Describe advancements made in point-of-sale (POS) system software in the 1990s, in addition to in-store sales and tax tracking. More than one answer may be correct.

Across-chain sales and inventory tracking Stronger connection with customers Immediate communication with internal financial teams

Data mining is a means of ________ data that can help organizations find patterns and relationships within data sets.

Analyzing

For a specific advertisement, a social media platform allows a corporation to target male users who are between the ages of 18 and 25 and are currently attending college. This social media platform is assisting with which part of the market research process? More than one answer may be correct.

Data information and collection Analysis of data and information

Reports offer a way to view, format, and summarize the information in a ________.

Database

How can a social media information system (SMIS) be used to directly facilitate meaningful connections for a company? More than one answer may be correct.

Engaging content can be posted to encourage users to share posts with others. Posts and paid advertisements on social media can link to the company's website. Regular posts on social media can encourage platform users to follow the company.

From the following list, select the various components of the World Wide Web (WWW).

HTTP, URL, HTML

A man-in-the-mobile and a man-in-the-middle attack have what similar qualities? More than one answer may be correct.

Harvesting personal information is the goal of each cyber intrusion. The user may not know the malware has infected the device.

In blockchain, transaction data is stored in blocks. Each block in the blockchain contains ________, which helps create secure transactions. More than one answer may be selected.

Hash, Digital Fingerprint, Unique Identifier

Which of the following statements about blockchain are true? More than one answer may be selected.

In blockchain, the previous hash links two blocks together, which prevents anyone from inserting a block where one should not be. At its inception, members of a newly created blockchain network must agree to the rules and guidelines that will govern their blockchain.

Which social media goal directly aligns with an organization's mission to increase the public's environmental awareness by increasing news coverage of environmental issues?

Increasing the conversion rate of its social media posts to full news stories

Data centralization is critical for increasing data ________.

Integrity

If a company wants to create a secure computer network that can be accessed and used solely by its employees, it should create

Intranet

A ________ is also known as a question. A request for information from a database.

Query

An electrical company has decided to open a new location in California. While it will be relocating a small percentage of executives to this new location, most employees will need to be hired from the local area. The company uses its human resource information system to sort resumes based on key words used to describe skills, college attended, and number of years' experience. Any resumes that do not fit within these parameters are not scheduled for in-person interviews. What function is this HR management system helping the company perform?

Recruiting

When a user has determined their destination, GIS can assist in providing directions. This is called

Route Information

Of the following statements, choose all that describe the importance of hardware and software to SMIS. More than one answer may be correct.

Social media information systems are built with computer and network technology. Hardware and software options are numerous and varied, allowing users to customize according to their roles and business needs.

How has social media changed the way businesses measure consumer behavior?

Social media makes it easier to collect the kind of data that are meaningful to businesses.

Of the following statements, choose the one that most accurately distinguishes social media providers from social media sponsors.

Social media providers build and host website platforms and sponsors invest in these platforms to enhance their social media presence.

What does the abbreviation SQL stand for?

Structured Query Language

An ERD requires the use of various ________ and ________ that help visualize two types of information: the entities within the system and the interrelationship among the entities.

Symbols, Connectors

What object is used to store information when creating a database?

Tables

What is one major distinction between telecommuting and flextime arrangements?

Telecommuters often must work during regular business hours.

Which of the following statements correctly defines a TCP/IP layer? More than one definition may be correct.

The network access layer handles the physical parts of sending and receiving data. The Internet protocol layer controls the movement of packets throughout the network. The transport protocol divides data into packets and acknowledges these have been received.

Which statement best explains why knowing an organization's value proposition is important for creating its social media information system (SMIS)?

The organization can increase its exposure and user engagement on social media by designing an SMIS that enables it to reinforce and build on its identified strengths.

From the following list, select all the ideas that Henri Fayol identified as a guiding principle of management.

The organization's interests must take priority over the interests of individuals. Managers can expect subordinates to follow orders and discipline them if needed. Managers must have the power and the right to give orders to subordinates.

From the following list, select all the primary considerations when developing the goals for a social media information system (SMIS).

The organization's larger goals for its mission The organization's purposes for using social media

Max Weber believed that organizations were best supported by which of the following strategies?

The use of specialization among employees.

Which is the most common characteristic of social engineering cybersecurity attacks?

They are conducted via emails that offer a reward in exchange for clicking a given link.

From the following list, select all the ways in which improvements in MIS technologies and tools are likely to affect managers who telecommute.

They will be able to do additional tasks on their mobile phones. They will face additional work demands on their personal time.

A social media information system (SMIS) should be designed to gather and analyze social media data because

a company can use platforms' data about its activities and audience to improve its social media strategies and business decisions.

Software-based keyloggers often infect a system through

a malicious email or link opened by an unsuspecting user.

Which of the following are features of virtual private networks (VPNS)? More than one answer may be selected.

allows for encrypted communications between computers allows remote workers to connect to the company network when working from home

What is a cybersecurity threat?

an event or condition that can lead to IT asset loss and the negative consequences of such loss

A common, basic condition for most flextime policies is the requirement that employees must

be able to fulfill their work responsibilities, including attending certain meetings or events in-person.

Who are the users of an executive support systems (ESS)?

business leaders in charge of several functions or separate enterprises

From the following list, select all the ways in which Henri Fayol's guiding principles of management address the welfare of employees.

by requiring that all employees be fairly compensated by requiring clear lines of authority and communication by requiring managers to be fair and kind to employees by requiring managers to encourage people to take initiative

An appropriate social media goal for a business that wishes to raise its public profile is

increasing brand awareness.

The main advantage of the IPv6 format for IP addresses is that

it can accommodate many more addresses than the IPv4 format.

To properly authenticate, or verify, the identity of authorized users and protect assets from unauthorized users, it is essential to

keep user logins and passwords confidential.

Database reports are useful in many ways; one way a report is used is to provide details about individual records and to create ________.

labels

Man-in-the-mobile (MitMo) occurs when

malware infects smartphones and other mobile devices

Telecommuting is considered an employee benefit because

not commuting to work adds flexibility to telecommuters' schedules.

Describe the compliance standards set forth by the General Data Protection Regulation (GDPR) for companies who handle individuals' data. More than one answer may be correct.

notify citizens of data breaches make collected data anonymous hire a data protection officer

What does the identify (ID) function of the NIST Cybersecurity Framework focus on?

organizational understanding of how to manage cybersecurity risks

A social media information system (SMIS) is composed of three parts, which are

people, data and procedures, and hardware and software.

Which of the following is an example of data at rest? More than one answer may be correct.

photos stored on a phone's memory card backup files stored on an offsite server

From the following list, select all the primary components of cybersecurity threat mitigation.

policies and procedures for threat prevention tools and procedures for threat identification policies, tools, and strategies for threat "curing" or minimization

What is the key action called for in the detect (DE) function of the NIST Cybersecurity Framework?

quick identification of a cybersecurity threat

A cybersecurity exploit allows a hacker or intruder to

remotely access a network, gain privileges, and make unauthorized changes.

What are some types of software that social media providers use? More than one answer may be correct.

software that allows the provider team to log on to the system any database management system

SQL is used to communicate with a database. According to ANSI (American National Standards Institute), it is the ________ language for relational database management systems.

standard

What is Frederick Taylor's four principles of scientific management?

task measurement, employee development, worker-manager collaboration, and management training

Which of the following must remain confidential to achieve cybersecurity goals? More than one answer may be correct.

the logins and passwords of authorized users private or sensitive data and information the specifications of the organization's IT systems

Cloud computing can best be described as

using the Internet to store and access resources.

Collaboration software is designed to increase collaboration and productivity primarily by enabling team members to

view, edit, and add shared information in real time, from anywhere.

The NIST Cybersecurity Framework is a

voluntary guide for organizations.


Ensembles d'études connexes

Markdown & Sale Price (Ch. 6 Review Part 2), Discount, Sale Price

View Set

Med Serg 1 Prep U Chapters 12, 13, & 19!

View Set

Fundamentals Exam #2 Practice questions

View Set

Chapter 34: Origin of Vertebrates

View Set