IS 2200

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

In an Excel file, if a label (such as the word "panda") is used in a formula, what will appear in the cell when the Enter key is pressed?

#VALUE!

You just had a great lunch at a nice restaurant and decide to leave a 15% tip on your $18 meal. What will be the total charge on your debit card?

$20.70

The stylist just did a great job and your hair is going to look good for weeks. The stylist charged $70 and you decide to add a 15% cash tip. How big is the tip?

10.50

Which person illustrates a characteristic of an excellent business thinker?

Barras uses a variety of sources such as journal articles and colleagues' expertise.

How can you make sure that your business report meets the needs of the target audience?

Consider updating them about your progress in creating the report and involving them in the process.

Gowan has been hired by Bailey's Automotive to assess whether the company should air television commercials in the local market. He is planning a study of the relationship between local television commercials and the sales of new vehicles. What is the best way for Gowan to establish a research objective that will address his research problem?

Determine how often television commercials result in purchases of new vehicles.

Social media providers include which of the following web based platforms?

Facebook, Instagram, and Twitter

Which statement about online research is true?

Industry sites list a variety of sources that may be more current than the information in business databases

Which guideline is suggested for fielding questions?

Pause before answering a question.

Auguste is mentoring Parul, a younger colleague, in how to be a better business writer. As Parul was writing her last memo, she did several things. Which one will Auguste tell her she needs to change?

She drew primarily on her own opinions and expertise.

Programs such as Microsoft Excel, iWork's (Apple) Numbers, Google Sheets, and OpenOffice Calc, that allow users to arrange numerical data are called

Spreadsheets

Which statement accurately describes microblogs?

They contain just a few sentences per entry.

Which statement is true about visual learners?

They enjoy gestures and metaphors.

From the following list, select all situations that lead you to suspect the presence of adware.

When looking up information on the Dallas Cowboys, you notice an ad for a Dallas Cowboys jersey.When looking up information on the Dallas Cowboys, you notice an ad for a Dallas Cowboys jersey. You have been looking for a car bike rack, and four out of five ads popping up on your browser show types of racks and other sporting gear.You have been looking for a car bike rack, and four out of five ads popping up on your browser show types of racks and other sporting gear. After you buy and download a drawing program, you begin seeing ads for interactive drawing games and other creative technology.

Software-based keyloggers often infect a system through

a malicious email or link opened by an unsuspecting user.

Arturo opens his presentation with his two takeaway messages and a statement that frames them both in appealing terms. What did he forget to include in the preview of his presentation?

an attention-getter

The beginning of your presentation is critical because

audience members form quick impressions about you and your message during this time.

Rafe, the sales manager at a national magazine, wants to compare sales of the magazine's spring issue on the West Coast to those in the Midwest and on the East Coast. This comparison will best be illustrated through a

bar chart.

In the financial world, which color represents credits or profits?

black

Spyware's basic function is to

capture the user's account data, passwords, keystrokes, and more.

During Kyle's presentation, one of the audience members asked for the names of additional sources of information about the topic. He promised to get it to her, looked up the sources as soon as he returned todesk, and emailed the information to her right away. Which of the three aspects of credibility is most demonstrated by Kyle's action?

caring

Industry publications tend to be

expensive

Which of these is least important when analyzing data related to a business problem?

focusing on tangential issues

If you wish to keep a column visible while you scroll through the rest of a spreadsheet file, you can use the ________ options.

freeze

The total amount of money (principal + interest) that lender receives from a borrower at the end of the loan is referred to as the loan's

future value (FV).

To determine how much a recurring monthly payment would be for a car loan or a mortgage, use the ________ function.

pmt

Bankers and other lenders refer to the initial amount of the loan (the principal) as the loan's

present value (PV).

The amount of money borrowed in a loan is often referred to as the loan's balance or the ________ of the loan.

principal

Which type of reputation is affected by material a person posts to an online discussion forum that is accessed only by people in his or her company

professional and private

Which threat to cybersecurity can only come from outside an organization?

ransomware

When displaying financial information, the accepted practice is that ________ indicates negative values.

red

Jorge primarily used research from printed texts for his report. What is a potential problem with Jorge's research?

reliability

A cybersecurity exploit allows a hacker or intruder to

remotely access a network, gain privileges, and make unauthorized changes.

Which of the NIST Cybersecurity Framework functions calls for quick action on the part of an organization's cybersecurity team to mitigate damage to systems?

respond (rs) function

A common method to delete a column or row in most spreadsheet programs is to ________ on the column or row heading, and then select Delete from the menu

right-click

Which action during a speech is most likely to result in your audience judging you as caring?

showing that you are interested in the needs of your audience

The evolution of the Internet from Web 1.0 to Web 2.0 platforms is the primary driver of the ________ Age.

social

Because they make it easy to arrange, display, and calculate numerical data, ________ programs are often used in budgeting, accounting, finance, grading, gambling houses, and even sports analysis.

spreadsheet

What is the first step of the PREP method of justifying your views in a presentation?

stating your position

During the Information Age, the role of public relations broadened, and it came to be seen as a key component of

the marketing mix.

You see ###### in a cell. This means that

this is not an error. The cell needs to be expanded in order to display the entire value.

What is a purpose of a positioning statement?

to demonstrate value to the audience

What is the purpose of saving an Excel file as a .cvs (comma-separated format) file?

to share data with other spreadsheet users regardless of which spreadsheet program is being used

Which type of event or condition may represent a cybersecurity threat? More than one answer may be correct.

an intentional event or action that damages computer hardwarean intentional event or action that damages computer hardware an unintentional or accidental event that deletes important network data or informationan unintentional or accidental event that deletes important network data or information the incorrect use or abuse of a computer assetsthe incorrect use or abuse of a computer assets an error, flaw, or weakness in a network asse

Describe steps in cybersecurity risk analysis. More than one answer may be correct.

assign value to assets assign value to assets estimate potential losses estimate potential losses estimate the likelihood of occurrence of threats

A public relations team's first step is to

clarify the company's brand.

The development of Web 2.0 tools has contributed to the development of more

collaborative networks

What are the core actions of the protect (PR) function?

controlling access to systems and preventing unauthorized access

controlling access to systems and preventing unauthorized access

controlling access to systems and preventing unauthorized access

Mason maintains an exhaustive database on his research sources and findings, which he shares with decision makers at Oriel Pharmaceuticals when presenting his report on the marketing approach for a new drug. This practice will increase the ________ of Mason's report.

credibility

Who is the primary audience for most business reports?

decision makers

The purpose of adware is to ________. More than one answer may be correct.

display ads to users based on their browsing behaviorsdisplay ads to users based on their browsing behaviors Correct redirect your search requests to advertising websitesredirect your search requests to advertising websites Incorrect collect marketing-type data about youcollect

The Primary goal of a companys social media strategy is to

engage potential customers

What is typically included in the reviewing stage of writing an effective business message?

ensuring that the communication is fair

In cybersecurity risk analysis, PML (probable maximum loss) is used to

help determine spending needed to adequately secure an organization's IT infrastructure.

In the context of dealing with business problems, what should ideally be the first step?

identifying

Pivot tables provide a quick way to organize information. In most spreadsheet programs, click the ________ tab to create a pivot table.

insert

When business professionals enter into primary research with preexisting assumptions or conclusions, they are likely to

interpret the data incorrectly.

Readers are more likely to react positively to a message if the writer

is clearly concerned about the issues discussed.

Sadiki included the question on a customer survey: "Do you prefer healthy, nutritious food, or food that is bad for you and will ruin your health?" The problem with that question is that it

is leading.

Which of the following statements describes a keylogger most accurately

is surveillance malware that captures confidential information through keyboard inputs

Which of the following is prohibited by the Computer Fraud and Abuse Act? More than one answer may be correct

knowingly transmitting a virus that causes damage to a computer knowingly transmitting a virus that causes damage to a computer accessing information on a computer that has been left unattended

In order to design your slides to facilitate ease of processing,

limit your text to ten words per line.

Which formatting method decreases the effectiveness of pie charts?

locating the smallest pie slice at 12 o'clock

Which of the following acts is an example of social engineering?

manipulating people in order to obtain and misuse their personal information

Which action is most likely to result in your audience judging you as having character?

offering your views transparently

Which of the following is a goal of an information technology disaster recovery plan (IT DRP)?

outline specific recovery times for information technology to resume after an issue occurs

A social media information system (SMIS) is composed of three parts, which are

people, data and procedures, and hardware and software.

Howard, a manager at ABN, has to prepare a report about the advantages of introducing a counseling program for employees in his company. In his report, he makes the claim that introducing a counseling program would reduce voluntary turnover because employees would be happier with their pay packages, but he offers no evidence linking counseling with pay. This report failed to effectively deliver the message that Howard had intended. What is the most likely reason for its failure?

unsupported generalization

User 2.0 is most likely to

use the Internet for social connection.

Wanda, the marketing manager at Royal Theatres, believes that employees should always act ethically and should also report instances of unethical behavior that they encounter. This belief held by Wanda is an example of a

value

In Apple iWork's Numbers the freeze options are located under the Table tab. In Microsoft Excel and Google sheets the freeze cells or panes options are found in the ________ menu.

view

Which is the best definition of a cybersecurity exploit?

It is the means by which a hacker capitalizes on a cybersecurity vulnerability to do harm.

The amount of money borrowed in a loan is often referred to as the loan's balance or the of the loan

Principal

What is a cybersecurity threat?

an event or condition that can lead to IT asset loss and the negative consequences of such loss

"Cybersecurity threat mitigation" includes all of the policies, procedures, and tools that help organizations

anticipate and counter threats from security vulnerabilities or incidents and reduce their impact.

Saving a spreadsheet file in .cvs format only saves the

cell values

Where are data in transit found?

cellular network

In the context of the AIM planning process, what tends to be the single most important planning step for many messages?

identifying reader benefits and constraints

If an organization wants to increase user engagement on social media, it wants to

increase the conversion rate of its social media posts to interactions with users.

Reports or guides that are issued by the government and organizations and that generally describe research about solving a particular issue are

white papers.

Ransomware is typically introduced into a network by a ________ and to an individual computer by a Trojan horse.

worm


Ensembles d'études connexes

series 66 - practice exam review

View Set

Chapter 32: Assessment of Hematologic Function and Treatment Modalities

View Set

Logical Reasoning - Chapter 13: Formal Logic

View Set

U.S. HISTORY 2 CHAPTER 16 America's Gilded Age,1870-1890 (1.PASTE in GOOGLE DOCS 2.Hit CTRL H,or CTRL F 3.PASTE Q from quiz) answer will appear fast if it desn't leave key words in the search

View Set