IS FINAL EVERYTHING

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which of the following statements refer to programs known as spiders, web crawlers, and bots? More than one answer may be correct.

"Good bots" have diverse functions and do not pose security risks. Malicious bots create security risks by compromising a user's control of the computer. Internet robots are used for both legitimate and malicious purposes.

Which two of the following would be effective transitions in a team presentation?

"Now, here's Samer to continue the discussion with a focus on achieving our sales goals." "Hakim will now share some ideas about how to improve student engagement."

In the Excel image, cell A3 contains a formula that subtracts A1 (Panda) from A2 (20). If the user hits the Enter key, what will appear in cell A3?

#VALUE!

Which of the following file formats can be opened using Microsoft Excel viewer?

.xlsx .csv

If you type = 8 / 2 * 4 + 1 into a cell in a spreadsheet and then press Enter, what will appear in the cell?

17

If you type =8/2*4+1 into a cell in a spreadsheet and then press Enter, what will appear in the cell?

17

If you type = 2 + 3 * 6 into a cell in a spreadsheet and then press Enter, what will appear in the cell?

20

If you type =3+2^2*6 into a cell in a spreadsheet and then press Enter, what will appear in the cell?

27

The number 27 in the cell depicted above is a value, not a formula. If the user drags the cursor to the right, what will appear in the cell to the right?

27

The number 27 in the cell depicted is a value, not a formula. If the user drags the cursor to the right, what will appear in the cell to the right?

27

Which of the following cell entries will result in 6?

=3*2 =6*1

To multiply the value in cell B3 times the value in cell E2, you could use the PRODUCT function. Alternatively, you could simply enter

=B3*E2

Which of the following IF function logical tests would show if a student scored above 60% in the 10-point quiz results shown above?

=IF(B2>6)

A corporation's Twitter report card indicates that engagement has dropped off in the past two months. What information from the tweet activity dashboard could they use to determine the cause of this drop off in engagement?

A change in demographics of the people who are engaging with their tweets.

Which of the following scenarios represents a customer acquisition cost of $100?

A company spends $100,000 on advertising and marketing in one month. They gain 1,000 new customers in that month.Correct

Who performs probable maximum loss calculations?

A company's cybersecurity analysts

In which of these situations would an enterprise resource planning system (ERP) be clearly helpful? More than one answer may be correct.

A hospitality brand, An international auto maker

Why is a target market important to businesses and organizations?

A target market is the group of consumers most likely to purchase an organization's products and services.

What is the correct definition of a cybersecurity exploit?

A tool or technique for taking advantage of a cybersecurity vulnerability to break into a system and cause harm.

During a business presentation, a speaker might have to incorporate changes quickly for which of the following situations? (Choose every correct answer.)

Audience members ask questions. Listeners make comments.

What are two disadvantages of distributing handouts during a business presentation? (Choose every correct answer.)

Audience members will begin to pay less attention to you. You lose control over which data audience members are looking at during the presentation.

In what ways can a question-and-answer session of a business presentation be a risk for the speaker? (Choose every correct answer.)

Audience members' questions may be difficult. The questions may throw the speaker off topic.

Fill-handle cross

Auto fills adjacent cells

Which of the following is a benefit to utilizing employee scheduling software? More than one answer may be correct

Automatically schedule employees, freeing up management for more important tasks, Automatically record and add up the number of hours employees are working

Which of the following is a benefit to utilizing employee scheduling software? More than one answer may be correct.

Automatically schedule employees, freeing up management for more important tasks, Automatically record and add up the number of hours employees are working

When downloading an Apple iCloud Numbers file, some Excel users prefer to download the file in the ___ format to avoid formatting issues.

CSV

As with all Microsoft Office products, using the shortcut ___ opens the print menu.

CTRL + P

Select two methods of opening the Print menu in Excel.

CTRL + P File > Print

Which statement about charts is true?

Charts should not require much mental effort for the reader.

Which of the following is an example of a company using social media during the marketing research process? More than one answer may be correct.

Collect data and information, Analyze data and information

Social media is primarily used in which step of the five-step process that marketing research follows?

Collecting data for analysis

What is the purpose of using color in spreadsheets?

Color makes data easier to read.

To avoid potential formatting issues, many Excel users choose to save or send spreadsheet files in the ___ format.

Comma-Separated Values (.csv)

Select all options that represent basic steps in an organization's use of social media to craft a target marketing strategy.

Create a marketing program that reaches social media users Use analytics tools provided by social media tools Obtain user data from social media platforms

Crystal believes that outsourcing the bookkeeping needs of her firm would save money. She researches various companies and runs the numbers for various scenarios to gather evidence of the potential savings that would result from using outside bookkeepers. Which of the following best defines Crystal's message structure?

Crystal is identifying causes and effects.

Which of the following is considered a cybersecurity threat to data at rest? More than one answer may be correct. Check All That Apply Data will be altered by unauthorized users. Data will be altered by unauthorized users. Data will be viewed by unauthorized users. Data will become irrelevant. Data will be intercepted by unauthorized users.

Data will be altered by unauthorized users. Data will be viewed by unauthorized users.

What is the "DE" function in the National Institute of Standards Technology (NIST) Cybersecurity Framework?

Detect function

What is the goal of the protect stage in the plan-protect-respond cycle? More than one answer may be correct. Check All That Apply Ensure critical infrastructure services can be delivered without interruption. Ensure critical infrastructure services can be delivered without interruption. Reduce the impact of an adverse cybersecurity event. Reduce the impact of an adverse cybersecurity event. Ensure that systems are impenetrable to security threats. Ensure that systems are impenetrable to security threats. Draft statements for the media to use in the event of a cybersecurity breach.

Ensure critical infrastructure services can be delivered without interruption. Reduce the impact of an adverse cybersecurity event.

For any formula or function in Excel, there should first be a(n) ___ sign in the cell.

Equal (=)

Of the following statements, choose the ones that correctly apply to issues in m-commerce.

Ethical issues, Due to similarities, Customer loyalty

Placing data labels on each slice of a pie chart makes it cluttered and difficult to interpret.

False

Researchers should state their objectives in general, broad, and achievable statements.

False

The bar chart, due to its limited forms, is less versatile than the pie chart or the line chart.

False

The practice of trading used, old, or obsolete products via the internet in exchange for other used or similar products is called re-commerce.

False

The type of e-commerce transaction where consumers are able to provide a service to a business often through a bidding or auction type of system is called consumer-to-business.

False

The type of e-commerce transactions that involve the selling of goods and services between businesses is vendor-to-vendor (V2V) e-commerce.

False

True or false: If adequately rehearsed, business presentations always go according to the speaker's plans.

False

True or false: If sentences in a business statement are composed in a nonassertive tone, they will always be read as nonassertive by readers.

False

True or false: The use of templates is required for creating business messages.

False

Use either/or logic to entrench your business positions.

False

Which of the following statements about nervousness and public speaking are true?

Feeling nervousness in public speaking can be a benefit. Experiencing nervousness in public speaking is normal. Nervousness can result in a more passionate presentation.

In the press-release style for a blog post, the first paragraph of the story should answer the basic questions of , , , where, and why.

Field 1: who Field 2: what Field 3: when

Which of the following are methods of opening the Print menu in Excel?

File > Print CTRL + P

What are questions a researcher seeks to answer in the study of consumer behavior. More than one answer may be correct.

How do consumers react to marketing strategies? How does the acquisition of products affect consumer self-image? How do consumers make purchasing decisions

An environmental organization's mission is to raise public awareness of environmental problems and possible solutions by increasing news coverage of these issues. Which social media goal is most directly aligned with this organization's mission?

Increasing the conversion rate of its social media posts to full news stories

Which social media goal directly aligns with an organization's mission to increase the public's environmental awareness by increasing news coverage of environmental issues?

Increasing the conversion rate of its social media posts to full news stories

What is the purpose of the Twitter report card?

It highlights high-performing tweets.

Which of the following are accurate descriptions of the meta message of a business communication? (Choose every correct answer.)

It is the overall message conveyed by the communication. It is conveyed as a combination of content and tone.

Which of the following are the effects of a positive workplace attitude?

It provides motivation. It enhances creativity. It improves work performance.

Taking a few deep breaths has which of the following effects before a presentation?

It quells nervousness.

Which of the following are advantages of secondary research in preparing a business report? (Choose every correct answer.)

It usually costs less than primary research. It is usually less time-consuming. It provides access to information that others have already researched.

Which is the best explanation of the difference between a company's fundamental value and its total value?

Its fundamental value is what customers and stakeholders value about its product or service, while its total value includes the value added by other aspects of the business.

Which statement about the SOFTEN model of nonverbal communication in presentations is true?

Keeping your arms to your sides or gesturing with palms up is more inviting to the audience.

Which of the following surveillance technologies relies on how data are entered into a system?

Keyloggers

From the following list, select all the ways in which management information systems (MIS) have changed the management of organizations.

Managers (and employees) can communicate different types of information in a greater variety of ways.Managers (and employees) can communicate different types of information in a greater variety of ways, Managers can have more information and data about the organization to help them make smarter decisions

How are managers' jobs expected to change as management information system (MIS) technology and tools improve?

Managers will be freed from tasks performed by online services or staff using collaboration tools

Which statements about workplace research projects are true?

Many companies have guidelines for using secondary research. Requests for research typically come from managers or clients. You usually have some ability to define the scope of your research project.

Which of the following statements about writing blog posts for external audiences are true?

Many professionals use blogs to facilitate personal branding. Blogs are an effective way to share the story of your organization with stakeholders.

Ariel notices that her team's online discussion forum has become contentious. Which guideline should she follow in this situation?

Meet in real time.

How are social media metrics and social media goals related?

Metrics that correspond to social media goals can serve as key-performance indicators (KPIs) for them.

Natalie, assistant manager at Bright Gardens Restaurant, is preparing a questionnaire to help her evaluate customer satisfaction. She wants her survey to only include closed questions. Which question should Natalie use?

On a scale of 1 to 5, how would you rate your level of satisfaction with your most recent meal at Green Gardens?

Why is setting social media metrics the second step in creating a social media information system (SMIS)?

Once an organization has defined its social media goals, it should adopt metrics to quantify its progress toward achieving these goals.

Select the two spreadsheet programs.

OpenOffice Calc Apple Numbers

Why are probable loss calculations important?

Organizations have limited funds to use toward system protections.

To determine how much a recurring monthly payment would be for a car loan or a mortgage, use the function.

PMT

An MICR reader is an example of a

POS input device

Which of the following methods is an approach to business communications designed to help presenters not make the mistake of presenting evidence without first stating a central position?

PREP

Which of these statements best explain why humans are studied as components in a technology-based business system? More than one answer may be correct.

People are valuable potential customers. Human capital is vital to operating SMISs.

Why is MitMo a growing security risk? More than one answer may be correct.

People use mobile devices in many of the same ways they use computers. Smartphones and other mobile devices are everywhere.

People are included in social information systems in what capacities? More than one answer may be correct.

Platform architects and data scientists Employees and contributors

Why does it make sense to categorize data and procedures together as social media information system (SMIS) components? More than one answer may be correct.

Procedures help providers properly collect, direct, protect, and regulate the use of data. Data and procedures are required to keep SMISs functioning.

Bad actors seeking to create computer viruses primarily must know how to

Program code.

What are key aspects of Security Behavior and Culture Programs in organizations?

Promoting secure employee behavior Enhancing overall security posture

Why is data that is located in the RAM of a device considered data in transit?

RAM only holds data and instructions temporarily; nothing is permanently stored in RAM.?

Malware that encrypts the victims data files and then demands that a payment is made to the hacker is called __.

Ransomware

Which of these threats to cybersecurity typically comes from an external source and usually request payment in return for a decryption program?

Ransomware

Row heading cross

Resizes the row to the left

______-clicking the row or column heading and then selecting Hide will hide the row or column.

Right

Which of the following are methods of moving the contents of one cell in Excel to another cell?

Right-click on the cell to open the context menu. Then select Cut. Right-click on the destination cell and select Paste. Click on the cell to make it active, then on the Home tab, in the Clipboard group, select Cut. Then click on the destination cell and click Paste.

In the image, which of the following two methods allow a user to move the data in cell C3 to another cell?

Right-click the cell and then cut and paste the data into the desired cell Drag the data to the desired cell since the drag-hand is already showing

What is the role of social media information systems (SMIS) in consumer behavior?

SMIS provide user data and analytics tools that help inform consumer behavior researchers.

Select two methods of selecting a range of adjoining cells in Excel.

Select the first cell in the range then hold down the shift key and select the last cell in the range. Select the first cell in the range and drag down to the last cell.

Cursor or large cross

Selects menu items or activates cells

Which of the following would be considered a benefit in a cost-benefit analysis? More than one answer may be correct.

Spending money to update the CRM database, A weekly blog that generates, Updating shipping tracking

Which of the following would be considered a benefit in a cost-benefit analysis? More than one answer may be correct.

Spending money, A weekly blog, Updating shipping tracking

Which of the following statements accurately describes spyware? More than one answer may be correct.

Spyware captures private information by monitoring how users interact online. Downloading software or documents from unvetted sources is one way spyware can be installed.

Which system is able to create purchase orders, manage inventory, and forecast future inventory needs?

Supply chain management system

Accessing the communications of an organization without authorization was made a criminal violation by which federal cybersecurity law?

The Stored Communications Act

Which of the following statements are true for most surveys?

The survey should be short.

To be effective, what qualities should survey questions have?

They should be non-leading. They should be exhaustive.

Breanna, IS manager at a mid-size service firm, picks up some evidence that a Trojan horse engineered to steal passwords has accessed the system. All members of project teams are trained in online safety, and their network is protected by a firewall. But the worse-case scenario has happened: a competitor has received protected information, possibly directly from a member's computer. What first steps should Breanna and the security team take to solve the problem? More than one answer may be correct.

They should review everyone's activity log, looking for any downloaded files or programs. The security group should sift through emails for a message with clickable links.

Which of the following describes the effect of good visual aids on a presentation?

They significantly improve the effectiveness of the presentation.

Which of the following is a common mistake made by speakers during a slide presentation?

They spend too much time with their backs to the audience.

What is the main concern when using white papers in research?

They tend to be biased.

From the following list, select all the ways in which improvements in MIS technologies and tools are likely to affect managers who telecommute.

They will be able to do additional tasks on their mobile phones, They will face additional work demands on their personal time.

Which of the following are means that business professionals employ to draw out superior ideas?

They write out notes. They brainstorm with team members. They draw diagrams.

What is the overall goal of the General Data Protection Regulation (GDPR)?

To ensure EU companies protect the privacy and personal data of EU citizens

is the overall evaluation that a reader perceives the writer to have toward the reader and the message content.

Tone

A business-to-consumer transaction is considered to be the selling of products and services to individual consumers. Group starts

True

In e-commerce, the term "information density" refers to both the total amount of information available to all individuals in a market (including customers and stakeholders) and the quality of this information.

True

In order to design your presentation slides for ease of processing, you should limit the amount of information on any given slide.

True

Information about an organization's most popular tweet is found in both the Twitter report card and the tweet activity dashboard.

True

JD.com is China's largest online retailer and the country's largest internet company by revenue. Its revenue eclipsed $70 billion in 2019.

True

Lorraine always tends to see business problems from the perspective of middle management. This is an example of a bias.

True

Providing distribution managers with real-time information about where products are in the logistics process is one of the ways a supply chain management system maximizes efficiency.

True

The first step in developing research-based business reports is identifying what decision makers want to accomplish.

True

There are various pointer functions included with most spreadsheet programs. It is important to check on the style of the pointer to ensure you are executing the correct command.

True

True or false: A good speaker will involve the audience as much as possible without taking too much time or straying from the speech topic.

True

True or false: A university library is an excellent resource when researching a business topic that requires access to expensive company and industry reports.

True

Nate's boss has asked him to present a business report on "consumer shopping habits" in three days. Due to the time constraint, his boss wants him to use secondary research. In this situation, what should Nathan do?

Use data published in business journals.

Which of the following scenarios shows interaction between SMIS components? More than one answer may be correct.

Users generate data that help providers adjust their sites to better serve sponsor organizations. A two-person marketing team at a start-up develops social media-ready messages, quickly clears them with a manager, and posts them. A firm has invested in a program that allows its servers to deliver curated content to several social media providers in real time.

What information does Instagram Insights offer? More than one answer may be correct.

Users' age range gender and location, length of engagement, number of impressions

Which of the following are examples of the key benefits of the first electronic point-of-sales (POS) stations? More than one answer may be correct.

Using images, Customers were able, New employees

Which of the following statements are true regarding labels?

Usually a text or text+number combination Can be created by typing an apostrophe in front of a number Remain on the left side of a cell when entered

A function that looks for a value in the leftmost column of a table, and then returns a value located in the same row as the first value, is called a

VLookup

Why is establishing authentication procedures a common cybersecurity goal?

Verifying that users are authorized to access systems, data, and resources is fundamental to preventing their unauthorized use.

When is it better to use a chart instead of a table? (Choose every correct answer.)

When the goal is to illustrate one main point or relationship When there is a relatively small amount of information being shown

What demographic data are collected from social media users? More than one answer may be correct.

Where a user is when they post a photo. Which online stores a user frequents.

Microblogs feature entries that are limited to ______.

a few sentences

Velma begins her presentation on vacation policy by asking, "Have you ever been so busy that you couldn't take all your vacation time in a given year?" What type of attention-getter is this?

a rhetorical question

Which of the following is the best choice for conveying a large amount of precise data?

a table

Kelly has to deliver a presentation to executives at a formal business meeting. Which outfit will help her project authority and competence?

a tailored business suit with a skirt and leather shoes

Which medium is most likely to hold all of a work group's communications, such as updates, progress reports, and discussions?

a team blog

Suppose an organization's system is vulnerable to losing information because its automated backup of data is insufficient or substandard. This type of cybersecurity vulnerability is ______.

a weakness in application software

When you make a presentation to colleagues, it offers a chance to improve your colleagues' opinions about your

abilities

If you want to make a numerical entry in Excel that will not interact with another cell, you can make it a label rather than a value. One way to turn a number into a label is to place a(n) Blank______ in front of the number when you enter it into the spreadsheet.

apostrophe (')

When audiences hear stories as part of a business presentation, they

are more likely to act based on what they hear. retain information included in stories.

A professional personal brand focuses on highlighting which of the following?

areas of proficiency professional characteristics credibility

If a hypothetical story is used in a business presentation, the story should be which of the following? (Choose every correct answer.)

believable applicable

Clicking Enter moves the active cell to the one ___ the cell in which the data was entered.

below

Of the following, the most effective way of telling external stakeholders the story about a company is through

blog posts.

colored border.

blue

The development of Web 2.0 tools has contributed to the development of more

collaborative networks.

A vertical line of cells in Excel is referred to as a

column

In the above Calc file, the user has selected D

column

The views you provide in a business speech are essentially attempts to convince audience members to

commit to some type of risk.

What rapidly changing factor has led to the Social Age in business?

communication technology

Mason maintains an exhaustive database on his research sources and findings, which he shares with decision makers at Oriel Pharmaceuticals when presenting his report on the marketing approach for a new drug. This practice will increase the ________ of Mason's report.

credibility

What has the greatest influence on the impact of social media in the workplace?

cultural norms and values.

A social media information system (SMIS) should primarily be designed and used to connect a company's ______.

customers on social media with its products and services on its website

A search engine continually adjusts its algorithms as more data enter its servers. This is an example of the use of

data analytics

Which of the following are common issues experienced by e-commerce-oriented businesses?

data theft, unethical practices, challenges with competitor analysis

Which of the following are components of the press-release style for blog posts? (Choose every correct answer.)

dateline headline contact information

A Trojan horse achieves its purposes through ______.

deceptive access

A Trojan horse succeeds through

deceptive access?

Which advance in MIS technology or tools could pose the greatest threat to a manager's job security?

decision-making software or apps

Most business messages are crafted using a(n) Blank______ approach.

deductive

When planning a research-based business report, you should talk with decision makers to

determine what they expect from the report understand their main business goals find out what they want the research to accomplish

Sadie, the expeditor at RingGro Manufacturing, writes a memo asking her manager to buy her a new computerized system for tracking customer orders. She claims that if she does not get this system, chronically late deliveries will ensue. Her manager turns down her request. Sadie made the mistake of using

either/or logic.

Compared to written proposals, speeches and presentations are better suited to capitalize on Blank______ appeals.

emotional

Which kinds of appeals should be made when giving speeches and presentations?

emotional analytical

Ransomware basically holds a target hostage because it ___ .

encrypts the victim's data

Professionals with green motivational value systems are most attracted to action-oriented and results-oriented language and logic.

false

Public relations is fundamentally about increasing the company's ability to earn profit off customers and the community.

false

The process of developing business messages involves three steps: planning, writing, and distributing.

false

Users in a social media information system can rely on providers to safeguard their personal information and profiles.

false

Wikipedia is a Web 1.0 communication tool.

false

You should avoid seeking the help of design specialists when developing a high-stakes presentation because they will make it too slick or glib.

false

The small black cross in the lower right corner of the active cell is called the ___. It allows the user to copy the contents of the active cell into adjoining cells.

fill handle

Which of the following is an appropriate use of business social network profiles?

finding the appropriate coworkers for a task

The term "cybersecurity threat mitigation" refers to all of the policies, procedures, and tools used to ______.

guard against threats such as security incidents, data breaches, and unauthorized network access, and reduce any harm they cause

Everett gives a presentation to propose that his company eliminate its traditional departments and replace them with flexible teams that will allow employees to move from project to project as needed. He decides to use the PREP method of justifying this position. Which action is an example of the second step in the method?

he explains that, with the current structure, employees in one department may be underutilized while other departments are overtaxed

The AIM process includes which of the following steps? (Choose every correct answer.)

information gathering message development audience analysis

CTRL+SHIFT+PLUS (+) is the shortcut for adding a row or column in Excel. Using the menu, to add a row, select the row below where you want to add a row, the click Home>Cells>

insert

The cost of borrowing money, quoted as an annual percentage rate (APR), is a loan's

interest

Which of the following are ways an audience member can show support to a speaker during a business presentation?

maintaining eye contact asking message-focused questionsCharo created a preview that demonstrated benefits to the audience and included an emotion-evoking statement. What did she forget to include?

Your goal in framing a business message is to

make it compelling while using rational and emotional appeal.

Mechanical cash registers were first created to

make it difficult for employees to steal money.

In the course of creating an effective business message, excellent business thinkers are most likely to

make well-reasoned conclusions and solutions.

The cybersecurity risks known as Man-in-the-mobile (MitMo) are realized when ______.

malware infects smartphones and other mobile devices

A computer virus is______.

malware that, when executed, adversely affects performance or damages programs

If you want to appeal to a professional with a hub MVS, you should focus on which two of the following?

option-oriented language benefits to clients and customers

What does the identify (ID) function of the NIST Cybersecurity Framework focus on?

organizational understanding of how to manage cybersecurity risks

Which of the following people can help with designing electronic slides used in important business presentations? (Choose every correct answer.)

outside professionals in-house specialists public relations experts

When giving an internal presentation, you should focus your presentation primarily on

persons who have the ability to put your ideas into action.

Which element is a typical Web 1.0 communication?

photos of a restaurant menu posted online

What is an example of a business-to-business transaction? More than one answer may be correct.

purchasing office supplies, buying medical equipment, purchasing food service items

Which guideline should be followed while reviewing a presentation for effectiveness?

put compelling pictures or simple charts on every slide?

Which threat to cybersecurity can only come from outside an organization?

ransomware

To demonstrate a can-do attitude in a business message, the writer should use

realistic assertions.

Which of the following actions will contribute to receiving a timely, desired response to a business message? (Choose every correct answer.)

recognizing others' individualism respecting the time of others

Strong analogies are important to the writing of business messages because they

reinforce arguments.

In effective business messages, any analogies should be rooted in

relevant similarities.

Mainframes were originally developed for their

reliability of handling transactions.

To delete a row in Excel, click on any cell in the row and SHIFT + Spacebar to select the row, then CTRL + Minus (−) to delete it. Alternatively, simply ___ on the row heading and select Delete from the context menu.

right-click

To delete a row in Excel, click on any cell in the row and Shift + Spacebar to select the row, then CTRL + Minus (-) to delete it. Alternatively, simply Blank______ on the row heading and select Delete from the context menu.

right-click

To delete column D, first click on the column heading and then ___ to open the menu and select Delete.

right-click

Adish is analyzing the benefits and feasibility of implementing a stress-reduction program on a fixed budget. Through research, Adish learns that the cost of a stress reduction program exceeds the proposed budget. He also learns that such programs are linked to increased employee health and morale. Adish then advises the company leadership to implement the program because it will be effective at improving the well-being of employees. Adish is guilty of

slanting the facts.

Which of the following commonly indicate that you lack confidence?

slouching lowered shoulders

Which of the following best helps you connect with your audience members and convey enthusiasm for your topic?

smiling

Of the listed methods of collecting demographic information, which is the most effective for organizations defining their target market?

social media

As of 2020, all legislation that has been passed to protect elections from cybersecurity threats are part of

state-specific cybersecurity laws.

One major threat to productive discussions is inconsistency. Firstcomers to a forum discussion are most likely to cause problems by

stating their opinion but failing to take part as the conversation evolves.

Components of a social media information system (SMIS) combine to

support a company's marketing strategy through social media

When writing a business message with an indirect approach, which of the following are presented first?

supporting reasons

A drawback of online databases is that they

take time to navigate.

To define research problems, the project's stated goals should be

targeted. achievable. specific.

Readers will usually interpret a business message containing the repeated use of the we-voice as

team-focused.

A keylogger can be accurately described as ______.

technology that captures keyboard input on several types of devices to glean confidential information

The e-commerce company with the highest revenue is based in which country?

the United States

A cybersecurity exploit is ______.

the means by which a hacker capitalizes on a cybersecurity vulnerability to gain access to and harm a system

If you enter a formula in a cell and Excel returns a series of hashmark symbols (####), this means that ___.

this is not an error value; it simply indicates that the cell's visible width cannot display the result

What is the goal of the NIST Cybersecurity Framework Protect (PR) function?

to help protect an organization's IT infrastructure from security breaches by offering guidelines on IT infrastructure protection

Corporate blogs are used for public relations, which in turn serves to build relationships with people. The primary reason for building such relationships is

to improve the corporation's reputation and credibility.

Using blogs and wikis in a business setting has which of the following objectives? (Choose every correct answer.)

to offer something of worth to others to enhance efficiency of working relationships

What is a goal of the AIM planning process?

to unleash good ideas

What does "T" stand for in the SOFTEN model of nonverbal communication in presentations?

tone

Which social media metric is probably the most useful for determining whether a company is increasing its brand awareness on social media?

total mentions of the company on social media

M-commerce is a subset of

traditional e-commerce

Creating an internal company blog with comment features is a good way for managers to increase

transparency

A company's value proposition is what its customers and stakeholder's value about its products, services, and other areas or aspects of the company.

true

A legend shows which items are being identified by the different colors, lines, bars, or pie segments.

true

An indirect approach is often effective for delivering bad news.

true

Manuel runs a small business that paints residential interiors. He has decided most of his current customers can best be reached by sending out a seasonal email newsletter. He will target new customers by placing ads on Facebook targeted at people located within 20 miles of his business who have searched for house painters. Where would he place this information on an e-commerce presence map?

type of presence

Which of the following are areas that are covered on an e-commerce presence map? More than one answer may be selected.

type of presence, the platform, the activity

When business thinkers are mentally flexible, they possess the ability to

understand contrasting views.

An early task to be accomplished when developing a presentation is to

understand the needs of your audience

In preparing a business report based on research, the first step is to

understand what the decision makers want the report to do

The Identify (ID) function of the NIST Cybersecurity Framework focuses on organizational______.

understanding of how to manage cybersecurity risks

According to the identify (ID) function of the NIST Cybersecurity Framework, what allows an organization to prioritize its efforts where cybersecurity risk is involved?

understanding of its business environment and resources

What is the first step in the AIM planning process?

understanding the needs of your audience

You ask your coworker to review your slides for a presentation, and he has trouble recognizing the most important ideas. To fix this, what should you change?

use bold or italics to highlight key ideas

User 1.0 is most likely to

use email as the main communication tool.

User 2.0 is most likely to

use the Internet for social connection.

On an e-commerce presence map, what is presence?

websites, email, social media sites, and offline media

When the tone of a business message is Blank______, there is an implied interest in the opinions and needs of the audience.

welcoming

Which of the following are fundamental to any successful presentation?

well-formed content structure

Web 2.0 introduced web pages that

were highly interactive.

In which of the following situations does remote desktop software have advantage over employee monitoring software? More than one answer may be correct.

when monitoring a large number of employees is not practical, when employee privacy is a serious concern

Framing the primary message involves presenting the message

within an overall theme.

If you receive an error value of #VALUE! after entering a formula in Excel, then this means that

the operation or function is not possible

If you type =3+12*6 into a cell in a spreadsheet and then press Enter, what will appear in the cell?

75

Simone posted a question on her company's forum about selecting a venue for the annual sales meeting. She noted that the venue would need to accommodate 200 people and include lodging in addition to conference rooms. Simone asked for input and ideas. Which of the following is the most appropriate response?

"I have heard great things about Skamania Lodge. They host a lot of conferences and can accommodate up to 500."

In the image, if the Enter key is pressed, what will appear in cell A3?

#DIV/0!

You treat a classmate for a coffee and decide to leave a 20% tip on your $12 bill. What will be the total charge on your debit card?

$14.40

You just had a great lunch at a nice restaurant and decide to leave a 15% tip on your $18 meal. What will be the total charge on your debit card?

$20.70

Michelle runs a shop on Etsy. One month, she spends $2,800 to promote her shop on Etsy and other social media sites. In that month, she gains 50 new customers. What is her customer acquisition cost for that month?

$56

Michelle runs a shop on Etsy. One month, she spends $2,800 to promote her shop on Etsy and other social media sites. In that month, she gains 50 new customers. All customers purchased products that cost $100, that were marked up 100 percent. What is the actual amount of revenue earned per customer, taking into account materials and promotional costs?

-$6.00

What demographic data are collected from social media users? More than one answer may be correct.

-Where a user is when they make a purchase initiated through a social media post. -Which advertisements users frequently engage with.

You created a simple spreadsheet in Google Sheets and wish to send the data to a friend. If you do not know what spreadsheet program your friend uses you should send it as a ___ file since it can be opened in any spreadsheet program.

.csv

Unfortunately, Excel does not offer a division function or shortcut. To divide two cell values, use the ___ symbol.

/

A man-in-the-mobile and a man-in-the-middle attack have what similar qualities? More than one answer may be correct.

1. Harvesting personal information is the goal of each cyber intrusion. 2. The user may not know the malware has infected the device. maybe?

Put the steps in order for opening Google Sheets. Instructions

1. Login to your google account 2. Click the Apps Launcher 3. Select Google Sheets

Place the steps for saving a spreadsheet file in Excel, Numbers, and Calc in correct order, placing the first step at the top. Instructions

1. Open the file menu 2. Name the file 3. Determine where the file shall be stored 4. Select Save (or Save As)

Order the following categories of attire according to their level of formality, with the most formal attire at the top and the least formal at the bottom. Instructions

1. formal business attire 2. business casual attire 3.casual attire

Order the following steps as they typically occur in developing sound business ideas, with the first step at the top and the last step at the bottom. Instructions

1. identification of questions and problems 2. research to gather information 3. making conclusions or finding solutions

For an effective frame, the primary business message should be approximately Blank______ words in length.

10 to 15

How long should it normally take for a reader to understand the key concepts depicted in a chart?

10 to 15 seconds

If the number 6 is in cell C4, and the number 5 is in cell D5, then the formula: =SUM(C4,D5) would result in

11

In a blog post, you have ________ to draw your readers in.

5 to 15 seconds

If you type = 3 + 12 * 6 into a cell in a spreadsheet and then press Enter, what will appear in the cell?

75

Every time you go to the gas station you're amazed by how much prices have increased. At this time last year the price was $3.20 per gallon and now the price is $4.25 per gallon. Which of the following spreadsheet formulas correctly calculates the percentage change?

= ((4.25 - 3.20) / 3.20) * 100

A friend asks if you want to go see the new Avengers movie but you say it's too expensive. "No it's not, tickets have only gone up $2.00 since last year," says your friend. You reply, "tickets went from $8 to $10 for a matinee. That is a large percentage increase. What formula would provide the percentage increase?

= (10 - 8) / 8 * 100

A friend asks if you want to go see the new Marvel movie, but you say it is too expensive. "No it is not, tickets have only gone up $2.00 since last year," says your friend. You reply, "Tickets went from $8 to $10 for a matinee. That is a large percentage increase." What formula would provide the percentage increase?

= (10 - 8) / 8 * 100

Select the spreadsheet formula that would correctly calculate the average (mean) of the following values: 4, 2, 5, and 5.

= (4 + 2 + 5 + 5) / 4

Select all of the following scenarios that show interaction between SMIS components. More than one answer may be correct.

A company's information systems (IS) group researches, Every day, a social media specialist at a start-up checks the news, Social media providers rely on user data

User communities rely on web browsers to reach and interact with social media content. What are some types of software that social media providers use? More than one answer may be correct.

A database management system (DBMS) Programs that can analyze data according to the site's requirements A program that allows access to the system itself

Which guideline increases the effectiveness of a bar chart?

A legend should be used only if the chart has two or more data series.

Which type of chart would be the best choice for showing the change in the amount of electricity consumed per capita in the United States since 1950?

A line chart

Which of the following is an example of a business that would benefit from scheduling software? More than one answer may be correct.

A local gym, A medi-spa, A library

Which of the following is an example of data in transit? More than one answer may be correct.

A person uses an app on their smartphone to pay a bill. A person transfers documents between their laptop and mobile device.

Which of the following is an example of data in transit? More than one answer may be correct.

A person uses an app on their smartphone to pay a bill., A person transfers documents between their laptop and mobile device.

To get to the bottom of the odd computer problems she was having, Priya listed these symptoms: files mysteriously disappearing, system configurations unexpectedly altered, and two icons showing up for applications she did not download. What malware could have been installed on Priya's computer?

A rootkit

Which of the following is an example of a primary function of human resource information system? More than one answer may be correct.

A small company, A large corporation, An independent bookstore

How can working with management information system (MIS) affect work-life balance? More than one answer may be correct.

A steady flow of business information, The temptation to work overtime

Which of the following are examples of cloud-based management information systems support offered by mobile POS systems? More than one answer may be correct.

A system that keeps track of which required online training courses each employee has taken, A system that alerts management when different items are selling faster, A system that works with payroll systems to keep track of how many hours an employee has worked

Which of the following are examples of cloud-based management information systems support offered by mobile POS systems? More than one answer may be correct.

A system that keeps track of which required online training courses, A system that alerts, A system that works

Which of the following statements are true regarding entering a value in Excel?

A value is data that can be used in a calculation. Values can include numbers, formulas, dates, and similar entries.

Which cell contains a value?

A2 Values can interact with other cells and by default are right-justified in the cell in most spreadsheet programs. A label is used to assist users in identifying data in a spreadsheet.

If you want to find the mean of the values in cells A1, A2, and A3, what function would you place in A4?

AVERAGE

If you want to quickly find the mean of the values in cells A1, A2, and A3, what function would you place in A4?

AVERAGE

When employers deactivate former employees' username and passwords, they are using which tool that ensures confidentiality? More than one answer may be correct.

Access control Authentication

Remote employees of a corporation are required to log into their company's virtual private network (VPN) before accessing files on the corporation's shared drive where corporate data are unreadable to unauthorized users. This is an example of which of the following tools that ensure confidentiality? More than one answer may be correct.

Access control Authentication Encryption

Describe advancements made in point-of-sale (POS) system software in the 1990s, in addition to in-store sales and tax tracking. More than one answer may be correct.

Across-chain sales and inventory tracking, Stronger connection with customers, Immediate communication with internal financial teams

Which of the following are areas covered by state-specific cybersecurity laws? More than one answer may be correct

Addressing security needs of smart devices. Protecting elections from cyber threats. Ensuring state and local governments are protected from cybersecurity threats.

Which is the best description of the relationship between "green computing" and management information systems (MIS)?

Advances in MIS technology will help make "green computing" easier and more widespread.

Of the companies listed below, which three are the most influential global e-commerce organization(s) in 2019, according to a graphic provided by Statista?

Amazon, Alibaba, JD.com

According to eMarketer, what are among the most popular B2C sites in the United States? More than one answer may be correct.

Amazon, Walmart

From the following list, select all the examples of internal threats to cybersecurity.

An attack by an authorized user The leakage of sensitive information An accidental erasure of data

Which situation is an example of how social media can complicate professional relationships?

An employee blogs about an embarrassing incident involving his or her boss, who sees the post.

Who can be considered an insider in terms of cybersecurity?

An employee who has access to company IT resources. A vendor who has developed products for the organization. A repair worker with a badge to access company areas.

Which of the following is an example of an organization using knowledge gained from social media to make better strategic decisions.

An organization analyzes engagement with different sponsored posts to determine which ones generate the most engagement with their target audience.

For a specific advertisement, a social media platform allows a corporation to target female users who are between the ages of 28 and 35 and have at least one child. This social media platform is assisting with which part of the market research process? More than one answer may be correct.

Analysis of data and information Data information and collection

What do the three categories of the Detect (DE) function of the NIST Cybersecurity Framework include?

Analysis, observation, detection

What is the final step in the six-step process of creating an SMIS?

Analyze the collected data

Who are the prime targets of MitM attacks? More than one answer may be correct.

Anyone who logs in to shop online Software as a source (SaaS) businesses Anyone who uses online financial applications

Which statement describes how writers should address the priorities of their targeted audience during the AIM planning process?

Assign importance to things, such as projects, goals, and tasks.

Which of the following is an example of data in transit? More than one answer may be correct.

At home, a person sends a photo taken on their smartphone to display on their smart TV. A person uses an app on their smartphone to check their bank balance.

In Excel, the sigma symbol represents the Blank______ function.

AutoSum

Talia posted the following message to a discussion forum at work: "Ralph, your late report cost us a shot at being team of the month." What team communication rule did she violate?

Avoid blaming.

Which person illustrates a characteristic of an excellent business thinker?

Barras uses a variety of sources such as journal articles and colleagues' expertise.

Bob, an art dealer, is writing a post for his own professional blog. His latest blog post is about a new mixed-media artist who will soon have a show at Bob's gallery. Which of the following should Bob be sure to include in his post to enhance his credibility? (Choose every correct answer.)

Bob should provide hyperlinks to provide additional information on the artist. Bob should provide information about the artist and the show at the beginning.

Which of the following are the common uses of spreadsheets?

Budgeting Finance

Describe how business-to-consumer (B2C) transactions work. More than one answer may be correct.

Business-to-consumer (B2C) e-commerce, The internet serves, B2C e-commerce

Column A shows the value of each sale for the day. If you want cell A37 to display the number of sales, you would use the __ function

COUNT

What function would you use to display how many entries are made in column A above cell A37?

COUNT

The online experience of User 2.0 individuals includes which of the following?

Communication tools are primarily peer-to-peer programs. Online content is created and modified. Internet connection is continuous.

Traditionally, most business blog posts were authored by one or a few individuals. Increasingly, however, who of the following are writing blogs? (Choose every correct answer.)

Company teams Professional groups

Which statement accurately summarizes the importance of hardware and software to social media information systems (SMIS)? More than one answer may be correct.

Computer and network technology form the basic architecture of SMIS. Providers, sponsors, and users can access SMIS benefits through several hardware and software options.

Which of the following statements explain why a computer virus is so named? More than one answer may be correct.

Computer viruses have the ability to reproduce themselves within a system. An invaded computer inadvertently plays host to the malware.

To access numerous management options for a column, row, or worksheet in Excel, you can just right-click on the associated header. This opens the ___ menu.

Context

To select non-adjoining cells in a spreadsheet, hold down the __ key while selecting cells.

Control (Ctrl)

The shortcut for saving a file in Excel (and nearly every Microsoft Office product) is

Ctrl + S

The shortcut to Save an Excel file is ___.

Ctrl + S

Which of the following are methods to Save an Excel file?

Ctrl + S File > Save

Which of the following is prohibited by the Computer Fraud and Abuse Act? More than one answer may be correct

Cyber blackmail Intentionally destroying a computer

How does cybersecurity help preserve the integrity of data, information, and systems? More than one answer may be correct.

Cybersecurity systems are designed to detect unauthorized or unanticipated changes to data that suggest a loss of integrity. Cybersecurity tools such as user-access controls, file permission, and version controls help prevent unauthorized changes. Cybersecurity threat mitigation includes measures to protect the consistency, accuracy, and dependability of these assets.

Which type of cybersecurity breach makes a computer, network, or online service malfunction or become unavailable to users?

DDOS attacks

______ are cybersecurity breaches that make a computer or online service unavailable to its users.

DDOS attacks

Which of the following statements best defines the purpose of data analytics?

Data analytics helps increase organizational performance by drawing meaning from large amounts of data.

Which of the following statements explain why data and procedures are studied as one social media information system (SMIS) component? More than one answer may be correct.

Data and procedures are work together to keep SMISs functioning, Procedures help provide properly collect, direct, protect, and regulate the use of data

Which of the following are reasons why states are making cybersecurity measures a high priority? More than one answer may be correct.

Data and technology continue to be at risk from cyber threats. New technologies continue to advance at a rapid rate.

Which of the following is an example of a tool that could be used to ensure data integrity? More than one answer may be correct.

Data are regularly backed up. Data correction codes are used to ensure the data retrieved are the same as when it was stored.

What kinds of data do SMISs deliver to sponsors? More than one answer may be correct.

Data gleaned from groups of users reveal behavior patterns and show connections through analysis of data points. Providers deliver content data from user interactions and connection data from relationships with other sources.

Determine which of the following is an example of data that has integrity.

Data that are used to set sales goals for account executives are stored on a secure server; managers are allowed read-only access to the sales data for the reps they directly manage.

Which of the following is considered a cybersecurity threat to data at rest? More than one answer may be correct.

Data will be viewed by unauthorized users. Data will be stolen.

What type of system is used to assist with processes that rely on a large number of inputs that frequently change?

Decision support system

CTRL + Minus (-) is the shortcut for deleting a row or column in Excel. Using the menu, to delete a row, select the row below where you want to remove a row, the click Home > Cells >

Delete

Gowan has been hired by Bailey's Automotive to assess whether the company should air television commercials in the local market. He is planning a study of the relationship between local television commercials and the sales of new vehicles. What is the best way for Gowan to establish a research objective that will address his research problem?

Determine how often television commercials result in purchases of new vehicles.

Which of the following is an example of an MKIS being used to evaluate industry trends within a market? More than one answer may be correct.

Determine if a decrease in sales, Determine if increased demand

From the following list, select all the reasons why organizations should identify their target markets when creating a social media information system (SMIS).

Different social media platforms attract and cater to different markets, Social media marketing is more cost-effective if it targets specific markets

Why should organizations identify their target markets when creating a social media information system (SMIS)? More than one answer choice may be correct.

Different social media platforms attract and cater to different markets. Social media marketing is more cost effective if it targets specific markets.

What is the correct term for the small computer within a smartphone that analyzes the sounds entering your phone through the analog/digital converter?

Digital Signal Processor (DSP)

Stanley, a sales analyst for G&B Toys, is preparing a report for board members on the company's market share for action figures. Although G&B has retained its spot as the market leader, several competitors have captured a larger share of the market over the preceding year and appear likely to overtake G&B within the next three years. How should Stanley present his findings to the board?

Disclose the data fully to foster transparency in the organization.

Which of the following are considered cybersecurity breaches? More than one option may be correct.

Distributed Denial of Service (DDOS) Impersonation Viruses Spyware

According to the CIA triad, in which of the following examples is an organization ensuring data integrity? More than one answer may be correct.

During an acquisition, logistics data are securely transferred to the acquiring company's servers. Access to important data is limited so that only certain employees are able to modify that data.

Which statement accurately describes the global reach of e-commerce? More than one answer may be correct.

E-commerce allows organizations to reach consumers across the globe, Using e-commerce, E-commerce technology

Which of the following statements about the goals and stages of writing effective business messages are true? (Choose every correct answer.)

Effective business writing is divided into three stages. The stages of business writing often overlap each other. The three stages of effective business writing are planning, writing, and reviewing.

Which of the following describe User 1.0 individuals on the Internet? (Choose every correct answer.)

Email is their primarily tool for online communication. They passively read web pages.

When presenting an audience with charts and tables and other numerical information, which of the following should be your primary concern?

Emphasizing the message that you want the audience to remember

In the context of writing business messages, which statement is true?

Emphasizing what products and services are, rather than what they are not, makes business messages more positive.

Select all options that describe the goals of the Respond (RS) function of the NIST Cybersecurity Framework.

Establish procedures that enable action in the event of a cybersecurity incident Be able to quickly analyze a detected cybersecurity issue Be prepared to swiftly mitigate harm caused by a cybersecurity event

What groups of people can Audience Insights generate information about? More than one answer may be correct.

Facebook users who have indicated interest in an event publicized on Facebook. General Facebook users. Audiences based on demographics you specify.

Social media providers include which of the following web-based platforms?

Facebook, Instagram, and Twitter

"Green computing" is another term for "telecommuting," given the many ways in which telecommuting helps to conserve resources and protect the environment.

False

A company that has created connections with its target markets on social media can depend on these followers to regularly engage with its posted content and create traffic to its website.

False

A cost-benefit analysis is a useful tool used to analyze the costs associated with implementing a project or set of activities and the benefits that would be achieved if the money was instead returned to the investors.

False

A target market for an organization is the online audience that has demonstrated its interest in the organization's products, services, or activities by following or engaging with the organization on social media.

False

An organization is said to have "e-commerce universality" if it has a strong online presence that enables it to quickly sell its products and/or services to almost anyone, regardless of the time or their location.

False

As a category of expenses for U.S. businesses, information technology (IT) costs are decreasing. Group starts

False

Buying and selling of goods and services that are executed through wireless mobile devices (including smartphones and tablets) are known as C-commerce transactions.

False

Conversations and interactions on social media are not part of the information provided to organizations.

False

Hardware, software, data, and procedures are four of the five components of a social media information system (SMIS).

False

In an e-commerce presence map, the activity includes the methods used to reach stakeholders and customers, including desktop and mobile platforms, social media sites such as Instagram or Facebook, blogs, magazines, radio stations, and TV stations?

False

Information about geographic locations that is stored in a geographic information system (GIS) is referred to as geoadvertising.

False

Input devices for POS (point-of-sale) stations include monitors, printers, and speakers.

False

Mainframe computers are known for their ability to handle numerous tasks involving application software.

False

Organizations can only use Facebook's Audience Insights to learn demographic information about people who have engaged with the organization by "liking" their page or attending an event hosted by the organization.

False

Output generated by an executive support system includes as much data and information on a topic as is available.

False

Payroll functionality was only added to human resource information systems once they became cloud-based.

False

From the following choices, select two methods to Save an Excel file.

File > Save Ctrl + S

Which of these online functions are most susceptible to MitM attacks? More than one answer may be correct. Check All That Apply financial applications e-commerce third-party financial services complex, multifunction networks

Financial applications E-commerce

If you do not see the Numbers icon on your iMac toolbar, you could go to the Launchpad to open the app. Alternatively, you could look for it through the __.

Finder

Fran is finishing up her portion of the team presentation and passes the speaking role to Maia. She says, "Maia will now discuss the benefits of core strength exercises on running. She'll share her personal story about how strengthening her core resulted in fewer running injuries and how this led to a personal best in the local marathon last year. She'll also demonstrate some of the exercises, such as the side plank and the bridge." Which of the following best explains the effect of this transition?

Fran took opportunities from Maia and prevented Maia from being able to showcase her main points.

A marketing manager requests and receives a report on consumers who use a competing brand of laundry detergent. Included in this report is demographic information such as age, gender, and geographic location; frequency with which the product is purchased; estimated amount of revenue generated by this product per geographic location; and qualities that consumers rank as important to their purchasing decision. These reports represent what function of a marketing information system (MKIS)?

Gathering marketing data

Which of the following statements about location-based services (LBS) are correct?

Geodata, Vector data, Raser data

When showing electronic slides in a business presentation, you should do which of the following? (Choose every correct answer.)

Give details about the slides. Add to the information on the slides.

Select all options that describe the goals of the National Institute of Standards Technology (NIST) Cybersecurity Framework.

Give guidance to organizations who wish to understand potential security breaches Create an atmosphere where organizations can effectively discuss cybersecurity risks internally and with those outside of the organization Help organizations develop appropriate policies and procedures to mitigate data breaches

Which 3 of the following are assets that can be impacted by a cybersecurity threat?

Hardware Information Software

In which scenario is the speaker acting advantageously?

Harvey stands just in front of the podium to seem more accessible.

Which of the following is an example of a task that might be completed during the planning stage of the plan-protect-respond cycle? More than one answer may be correct.

Having an authorized user attempt to hack into the system to determine vulnerabilities. Determine what security flaws exist. Determine the degree of vulnerability that exists.

Darius has to make a presentation at a fund-raising event. Which nonverbal behavior should Darius display during his presentation to build the audience's trust in him?

He should maintain eye contact with his audience.

The active cell in a spreadsheet is the cell into which the user can input data. In most spreadsheet programs the active cell can be identified by which of the following items?

Heavy border Highlighted column and row headings Name box (in the upper left corner of the sheet)

Select all options that describe standards set forth by the General Data Protection Regulation (GDPR) for compliance by companies who handle individuals' data.

Hire a data protection officer Make collected data anonymous Notify citizens of data breaches

Most users then use the shortcut, CTRL + F to open the Find and Replace dialog box. Alternatively, you could click Find in the dialog box in the editing group, that is located on the ___ tab.

Home

The MIN function displays the smallest value in a selected range. A shortcut to the MIN function is located in the AutoSum dropdown menu found in the Editing group of the ___ tab.

Home

Ebony, the owner of One Hour Gym, wants to know how customers feel about the new strength and conditioning classes that she is offering. Which question should Ebony incorporate into her survey questionnaire?

How do you feel about the new strength and conditioning classes compared to the old ones?

Select all options that are questions a researcher seeks to answer in the study of consumer behavior.

How does the acquisition of products affect consumer self-image? How do consumers react to marketing strategies? How do consumers make purchasing decisions?

Which of the following are examples of information businesses get from social media to make more informed decisions? More than one answer may be correct.

How often consumers complete purchases after clicking on a sponsored post. What new websites females between the ages of 18 and 25 "like" on Facebook. What percentage of customers from a targeted demographic download a coupon after visiting a website linked from a sponsored tweet.

Which survey question should be changed to allow for a simple answer?

How would you rate our food, conference rooms, and the recreational opportunities nearby?

What challenges are involved in the human component of social media information systems (SMISs)? More than one answer may be correct.

Human resources risks Management of diverse user communities

A business message that primarily relies on the ________ shows that the message is self-centered.

I-voice

Which function of the NIST Cybersecurity Framework involves an organization gaining deeper understanding of cybersecurity management in the context of their business needs and resources?

Identify (ID) function

Describe the purpose of a cybersecurity risk analysis. More than one answer may be correct.

Identify a company's assets. Calculate potential loss due to security threats. Determine how to respond to a potential loss.

Which two of the following are the most effectively stated research objectives?

Identify ways to provide advancement opportunities for our receptionists. Determine why 80% of our hotel guests post negative reviews online.

Why is preserving the integrity of data, information, and systems an important cybersecurity goal?

If the consistency, accuracy, or dependability of these assets has been compromised, they lose their usefulness and value.

What is the main benefit of having a social media information system (SMIS) that gathers and analyzes a company's social media data?

If the data show that a social media campaign is not attracting the desired attention or level of engagement, the company can change its campaign strategies.

Which is the best example of how a company benefits from having a social media information system (SMIS) that gathers and analyzes its social media data?

If the data show that a social media campaign is not attracting the desired attention or level of engagement, the company can change its campaign strategies.

Information provided by Instagram Insights informed an organization that their sponsored post had 1,000 impressions per day but an unsponsored post written by their new Social Media Director received 15,000 impressions that same day. Why might his information be valuable to the organization? More than one answer may be correct.

If the new Social Media Director is able to recreate that level of engagement with more of her posts, the organization may be able to reduce the amount of sponsored content they place on Instagram. The organization may be targeting the wrong audience with their sponsored posts; analyzing who's engaging with the Social Media Director's posts can provide the organization valuable information about their target audience.

Information provided by Instagram Insights informed an organization that their sponsored post had 1,000 impressions per day but an unsponsored post written by their new Social Media Director received 15,000 impressions that same day. Why might his information be valuable to the organization? More than one answer may be correct.

If the new Social Media Director is able to recreate that level of engagement, The organization may be targeting the wrong audience with their sponsored posts

In the formula =IF(C1>5,"Yes","No"), what does it mean in plain language?

If the number in cell C1 is greater than 5, then type "Yes," if not type "No."

In the Home tab and the Formula tab in Excel, where is a button for AVERAGE found?

In the AutoSum dropdown menu

Data at rest or storage can be found in which of the following places? More than one answer may be correct.

In the cloud On an external hard drive

Which of these common social media goals focuses on raising the public profile of a business?

Increasing brand awareness

Which statement defines or explains a characteristic of information density? More than one answer may be correct.

Information density is the total, Information density in e-commerce, Organizations benefit

A pivot table can quickly organize a spreadsheet's info.The pivot table creation options are located under the ___ tab.

Insert

CTRL + SHIFT + PLUS (+) is the shortcut for adding a row or column in Excel. Using the menu, to add a row, select the row below where you want to add a row, the click Home > Cells > ___.

Insert

Pivot tables provide a quick way to organize information.In most spreadsheet programs, click the __ tab to create a pivot table.

Insert

Select all options that describe what social media offers businesses eager to gain an understanding of their customers.

Insights analytics Social intelligence tools Unprecedented access to consumer data

A business is planning on using sponsored social media content for its new product. Its target audience is high school students. Which social media platform would likely reach the most members of this target audience?

Instagram

How does a rootkit pose a cybersecurity threat? More than one answer may be correct.

Installed on a computer's operating system, a rootkit bypasses security functions. A range of malicious actions is possible because the invader has the same access as the computer's owner or user.

From the following list, select all the key aspects of today's e-commerce landscape that organizations should consider when conducting business in this environment.

Internet of Things, integrated shopping experiences, m-commerce

Using an outline or diagram to form the logic of a business message typically leads to which two results?

Issues can be written about more effectively. Thinking about the issues becomes tighter.

A digital music streaming company is promoting its service in a new country with a special discount for residents. How can the company use authentication to help prevent people from exploiting or abusing the deal? More than one answer may be correct.

It can verify that the customer lives in the correct country., It can verify that the customer is new to the company or service., It can grant the customer access only to the music included in the deal.

The framing of the primary business message is important for which of the following reasons? (Choose every correct answer.)

It gives focus to an important argument. It highlights support for the message's key ideas. It emphasizes the message's premise.

Why is using a story line approach in business presentations effective? (Choose every correct answer.)

It helps audience members better remember the presented information. It creates an emotional connection for audience members.

Which of the following are benefits of pausing before answering questions in a business presentation? (Choose every correct answer.)

It helps make you feel more composed. It makes you seem more thoughtful It gives you time to contemplate a response.

What are two reasons why studying statistical and quantitative analysis is useful in the field of business communication?

It helps prevent flawed results during the analysis of survey data. It helps the researcher avoid skewing the results to accommodate preconceived ideas and biases.

What is the significance of an open stance in a business presentation?

It is a warm and inviting form of nonverbal communication.

Why should the following survey question for the customer of a bank be rewritten? "How satisfied were you with our customer service and the interest rate we offer? (very satisfied, somewhat satisfied, somewhat unsatisfied, very unsatisfied)"

It is asking about more than one idea.

Which statement accurately describes the need to keep sensitive data, information, and systems confidential?

It is both a major goal and a requirement for cybersecurity.

Which of the following statements are true regarding an active cell?

It is the cell where the user can input data. It can be identified by the heavy border around the cell. It will be identified by the Name Box.

Which of the following statements best illustrates why a rootkit is described as creating a back door?

Like an intruder coming through a back door, a rootkit allows an unknown user into an operating system.

What is the goal of the protect stage in the plan-protect-respond cycle? More than one answer may be correct.

Limit the impact of a security breach. Ensure uninterrupted delivery of vital services.

To display the highest value in a range quickly, use the __ function.

MAX

To quickly display the highest number of boxes of cookies purchased by one buyer (column B), use the

MAX

When experiencing a difference of opinion with others in a business social media context, which of the following actions should you take?

Maintain a pleasant attitude.

If all the audience members are sitting in back rows for a speech presentation, which of the following are recommended steps to take?

Make a point of moving closer to the audience members. Politely ask the audience members to move forward.

Which guidelines should you follow for a professional blog? (Choose every correct answer.)

Make certain that your content is accurate. Maintain a professional but fun and helpful tone.

Which of the following are formatting guidelines for any kind of chart? (Choose every correct answer.)

Make sure all text is horizontal. Avoid using many bright colors. Avoid unusual fonts.

Which two of the following are key strategies when creating slides for business presentations?

Make sure that the slide design is easy to process. Avoid making the slides too complicated.

Applying for credit or even a mortgage online is a straightforward process. After creating an account with a unique user name and password, a customer reads a privacy statement, reviews the security policy, and accepts the terms of use. Then they proceed to log in and fill out an application, answering detailed questions about household income, employment, and more. What cybersecurity risk is particularly relevant to this process?

Man-in-the-middle (MitM) attack

To quickly display the highest number of boxes of cookies purchased by one buyer (column B), use the ___ function.

Max

Some popular social media management systems are becoming more difficult to manage because

Millions of diverse users across the globe are active participants.

To display the smallest value in a selected range quickly, you could use the ___ function.

Min

Which of the following statements about business presentations using numerical data are generally true?

Most audiences will not remember a lot of statistics. The main message in such presentations will likely not be numerical.

Which of the following are the recommended levels and types of comments for high-performing teams on business social media platforms?

Most comments should be directly related to work, followed by about 15 to 20 percent supportive comments, and the remaining comments mostly social.

According to a 2014 survey of American adults by Geoffrey Brewer on Gallup Polls online, the fear of public speaking ranks even higher than which of the following sources of fear?

Needles and getting shots Spiders Flying on an airplane

Which 3 of the following arguments are usually entered when using the PMT function?

Nper Rate Pv

What information does Instagram Insights offer? More than one answer may be correct.

Number of times paid content was viewed by a specific demographic. Users' demographic information. Number of times nonpaid content was viewed by a specific demographic.

Which of the following items are used to identify a cell in the cell's address?

Number—Cell's row Letter—Cell's column

What are basic steps in an organization's use of social media to craft a target marketing strategy? More than one answer may be correct.

Obtain user data from social media platforms, Use analytics tools provided by social media tools, Create a marketing program that reaches social media users

Which of the following is a challenge faced by companies incorporating Web 2.0?

Older employees tend to be tied to Web 1.0 values.

Where are data in transit found?

On a cellular network

What is the benefit of Facebook's Audience Insights tool providing information about users who are already connected to an event hosted by your organization? More than one answer may be correct.

People who do not frequently interact with your brand may have attended your event, People who have attended an event hosted by your organization already have a connection to the organization

What groups of people can Audience Insights generate information about? More than one answer may be correct.

People who speak a specific language, All facebook users, Facebook users who have indicated interest in an event publicized on Facebook

What are reasons that documenting sources of information for business reports is essential?

People will be using the report to make high-stakes decisions. When you are writing the report, you might need to refer to the source document again. Accurate and complete documentation establishes that the report is credible.

Which of these defining components mitigate cybersecurity threats? Select all the correct options.

Policies and procedures used to protect systems and data. Policies, tools, and strategies used to reduce damage from threats. Security tools and oversight used to identify security threats.

When professionals with hub MVSs listen to business presentations, they respond best to which of the following? (Choose every correct answer.)

Presentations that hold clear business logic Language that presents several options

________ involve ranking or assigning importance to things, such as projects, goals, and tasks.

Priorities

Which of the following statements about workplace priorities is not true?

Priorities are more constant than values.

Businesses that use social media face which of the following risks?

Private information might be made public. Business hierarchy might be undermined by employees. Employee comments might negatively impact a company's reputation.

Which of the following are characteristics of the Social Age?

Problems are addressed by groups. Communication between people is networked. Teamwork is not limited by boundaries.

Which function of the National Institute of Standards Technology (NIST) Cybersecurity Framework involves an organization analyzing cybersecurity risk and reducing potential damage to IT infrastructures?

Protect (PR) function

From the following list, select all the statements that correctly describe the re-commerce segment of the e-commerce market.

Re-commerce, According to Yerdle, The growing practice

Which of the following conditions are met when a chart provides readers with sufficient information?

Readers can quickly grasp the meaning of what the chart is showing. Data values are provided at each point on the chart as needed. The units of measurement are clearly labeled.

What are recommended practices for documenting your research sources?

Record documentation systematically to avoid providing an incorrect source. Make documentation records immediately rather than going back later to find sources again.

An electrical company has decided to open a new location in California. While it will be relocating a small percentage of executives to this new location, most employees will need to be hired from the local area. The company uses its human resource information system to sort resumes based on key words used to describe skills, college attended, and number of years' experience. Any resumes that do not fit within these parameters are not scheduled for in-person interviews. What function is this HR management system helping the company perform?

Recruiting

From the following list, select all the options that the main ways in which a social media information system (SMIS) can be used to facilitate meaningful connections for a company.

Regular posts on social media can encourage users to follow the company. Posts and paid advertisements on social media can link to the company's website. Engaging posts on social media posts can encourage users to share them with others.

Which of the following should be verified when reviewing a business presentation?

Related technology is in working order. The electronic slides have been proofread. Supplementary materials are well prepared.

In the middle of his presentation, Leroy loses his train of thought. What should he do?

Repeat his last statement to regain his thought process.

Which of the following is an example of an event that may occur during the protect stage of the plan-protect-respond cycle? More than one answer may be correct.

Require all employees to attend training that outlines the different types of security threats their organization faces. Perform routine maintenance on organizational resources. Determine levels of access control.

What is the "RS" function in the National Institute of Standards Technology (NIST) Cybersecurity Framework?

Respond

In which function of the NIST Cybersecurity Framework does an organization's cybersecurity team take quick action to mitigate damage to systems?

Respond (RS) function

Which of the following statements about lengthy surveys are true?

Respondents who are paid are more careful in completing them. They commonly are left incomplete by impatient respondents.

___ clicking on the row heading for row 3 and selecting Insert will put a blank row above row 3.

Right

___ clicking on the row heading for row 3 and then selecting Delete will delete row 3.

Right

___ clicking the row or column heading and then selecting Hide will hide the row or column.

Right

In Google Sheets, what are two methods that allow a user to move data from one cell to another cell?

Right-click the cell and then cut and paste the data into the desired cell. Drag the data to the desired cell when the cursor changes to a drag hand.

Why is it important that a company's social media information system (SMIS) be designed to gather and analyze social media data?

SMIS data about the company's activities and audience on social media can be used to improve its social media strategies and business decisions.

What is the role of social media information systems (SMIS) in consumer behavior?

SMIS provide user data and analytics tools to consumer behavior researchers.

If you are using OpenOffice Calc and wish to send your spreadsheet to a colleague who uses Microsoft Excel, use the ___ feature.

Save As

If you want to change the name of a downloaded Excel file, it's often easiest to use the _____ option.

Save As

You created a spreadsheet in Calc and wish to send the data to a friend who only uses Excel. You can do this by using the ___ feature.

Save As

When removing and replacing unwanted characters from an Excel spreadsheet, you might use the Find & Blank______ menu, found in the Editing group on the Home tab.

Select

You need to add elements to your chart in Excel. Place the following steps in order with the first step at the top. Instructions

Select the chart If not already open, select design tab open the add chart element menu add the desired elements

What was a benefit of Square Inc. that differentiated it from the other POS systems that were available at the time it first launched? More than one answer may be correct.

Servers at restaurants were able to process customer payments right at the table, increasing the speed at which they could turn over tables., Smaller companies and individual vendors were able to accept credit and debit cards for payment since they didn't need to invest in expensive servers or infrastructure., Small businesses were able to afford to accept credit and debit card transactions because a flat fee was charged per transaction.

What was a benefit of Square Inc. that differentiated it from the other POS systems that were available at the time it first launched? More than one answer may be correct.

Servers at restaurants, Smaller companies, Small businesses

Why is it important to manage permissions and only let the correct people have access to shared files?

Shared files often contain sensitive or confidential information.

Auguste is mentoring Parul, a younger colleague, in how to be a better business writer. As Parul was writing her last memo, she did several things. Which one will Auguste tell her she needs to change?

She drew primarily on her own opinions and expertise.

Nancy is giving a presentation in a venue that she has never been to before. Which of the following is the most important thing she should do?

She should arrive at least an hour before the presentation.

Cindy has to write a research paper for a university class. Which of the following actions should she take during the planning process?

She should consider a topic that she would need to know more about in her first jobs out of college. She should consider a topic that will help her in her academic program.

Tiffany was given a research paper assignment in her class. She had two months to complete the assignment but was eager to get started. She picked her topic that afternoon, spent the next two days researching, then began writing. Which of the following should Tiffany have done?

She should have spent more time considering her options for a research topic.

What is a guideline for the effective use of electronic slides in a business presentation?

Show no more than one slide for every minute or two of a presentation.

Which of the following statements best explains why sleep is a factor in work-life balance?

Sleep is important to memory and brain health.

Suppose you are a company whose target market is identified as homeowners who live in suburban regions of the American Midwest. From the list below, choose the product you are most likely selling.

Snow blowers

The evolution of the Internet from Web 1.0 to Web 2.0 platforms is the primary driver of the ________ Age.

Social

Maura added a page to her Facebook account, named Dancing Squares, to keep in touch with people who enjoy social dance. Followers also share Instagram posts and occasionally load videos to YouTube. Which social media information system (SMIS) role does this group play?

Social media community

Of the following statements, choose all that describe the importance of hardware and software to SMIS. More than one answer may be correct.

Social media information systems are built with computer and network technology Hardware and software options are numerous and varied

How has social media changed the way businesses measure consumer behavior?

Social media makes it easier to collect the kind of data that is meaningful to businesses.

Describe the benefits of an organization using social media to help create a target marketing strategy. More than one answer may be correct.

Social media provides companies with a rich collection of user data and personalized content, Social media provides companies with analytics tools to identify top consumers, Social media as part of a target marketing strategy often results in sales increases

Select all options that describe the benefits of an organization using social media to help create a target marketing strategy.

Social media provides companies with analytical tools to identify top consumers. The usage of social media, as part of a target marketing strategy, often results in sales increases. Social media provides companies with a rich collection of user data.

If an organization's automated backup system is vulnerable to data loss or corruption, its cybersecurity vulnerability is a weakness or flaw in its

Software

Which of the following statements about numerical information in business are correct?

Some management experts consider communicating with numbers to be a core competency. Business operating expenses, budgets, and customer behavior are expressed with numbers.

Which statement about audience concerns is true?

Speakers can prepare for audience concerns by considering them beforehand.

To deal with the fear of speaking, it is useful to picture yourself doing which of the following? (Choose every correct answer.)

Speaking confidently Replying to audiences Interacting nonverbally with the audience

When showing slides for a business presentation in a room that allows you to dim only the lights next to the screen, you should remember to do which of the following?

Stand where you are in full light.

The first two steps of the six-step process in creating a social media information system (SMIS) involve developing social media goals and setting metrics. What are the third and fourth steps of the process?

Step 3: identify the organization's target market; Step 4: determine and integrate into the SMIS design traits valued by the target market.

What are recommended relaxation techniques for managing nervousness in preparation for a presentation? (Choose every correct answer.)

Stretching. Exercising a day or so before the event. Listening to music that you enjoy.

What are some of the direct benefits of defining an organization's target market? More than one answer may be correct.

Stronger marketing messages Better understanding of customer needs Keener insights into the competition

Sun's team is giving an important presentation on a new heart rate monitor. Pablo is energetic and charming but physically uncoordinated. Jisoo is an experienced yoga instructor who can lower or increase her heart rate by controlling her breath. Thorin is methodical, calm, and introverted. Sun has experience as a math tutor. Which two of the following would be appropriate roles for Sun or the members of his team to take?

Sun should explain any numerical information about the heart rate monitor. Jisoo should demonstrate how the heart rate monitor works.

A manager wants to accurately predict how many light-up three-wheeled scooters they'll need to meet holiday demand. Which component of supply chain management would the manager be using to determine the appropriate number to produce?

Supply chain planning

Select all of the following statements that explain why providers need appropriate SMIS procedures. More than one answer may be correct.

System functioning and maintenance, Security appropriate site use and data handling, procedures required of users protect privacy

Often, when importing content from a different program into Excel, extra blank spaces may be found. An easy way to remove these blank spaces is to use the Blank______ function.

TRIM

To remove trailing blank spaces from imported data sets, one quick method is to use the ___ function.

TRIM

Exaggeration adversely impacts readers' perception of the credibility of a business message.

TRUE

Which principle of finance states that a dollar in your hand today is worth more than a dollar you will receive in the future because a dollar in hand today can be invested to turn into more money in the future?

TVM

To enter data into a cell and then immediately go to the cell to the right, press the Blank______ key.

Tab

Your colleague Anuj has to give a presentation to the whole company. What tip should you give him about managing his nerves?

Take several deep breaths to alleviate your anxiety.

Cleo's team will be giving a group presentation. Which of the following should the team do to ensure a cohesive team presentation? (Choose every correct answer.)

Team members should be united in the team's key objectives and messages. Team members should communicate with each other about the objectives while preparing.

Explain the purpose of the National Institute of Standards Technology (NIST) Cybersecurity Framework.

The NIST Cybersecurity Framework is a voluntary guide that helps organizations understand and protect themselves against cybersecurity risks.

What is the National Institute of Standards Technology (NIST) Cybersecurity Framework?

The NIST Cybersecurity Framework is a voluntary guide that helps organizations understand and protect themselves against cybersecurity risks.

How does Twitter make current influencers known to its audience?

The Twitter report card introduces influencers to specific networks.

What do the deductive approach and inductive approach to structuring business messages have in common?

The arrangement of supporting ideas is important.

Which of the following statements about the framework of a deductive business message are accurate?

The concluding paragraph has a call to action. There are supporting paragraphs for each key point. It should be possible to scan the message to readily understand its main ideas.

What are some advantages of online surveys?

The data can be downloaded automatically into a spreadsheet. The surveys can reach a very large number of respondents. They are generally readily available to survey responders.

Which of the following statements are true about the fear of public speaking?

The fear is generally greater for important occasions. It is a common fear.

What is the central element that makes a chart effective and interesting?

The message that the chart conveys

Which would organizations be interested in the information on interactions and preferences that social media sites can provide?

The more an organization knows about users' interactions and preferences, the more strategic their targeting can be.

What metrics does the tweet activity dashboard provide on every tweet? More than one answer may be correct.

The number of retweets The number of users who have seen a tweet The number of users who have replied to a tweet

What metrics does the tweet activity dashboard provide on every tweet? More than one answer may be correct.

The number of users who have seen a tweet, the number of users who have replied to a tweet, the number of users who have retweeted a tweet

Data security and theft is a significant area of risk in m-commerce for what reasons? More than one answer may be correct.

The online nature of e-commerce, A business can lose great deal

Data security and theft is a significant area of risk in m-commerce for what reasons? More than one answer may be correct.

The online nature, A business can lose

Which statement best explains why knowing an organization's value proposition is important for creating its social media information system (SMIS)?

The organization can increase its exposure and user engagement on social media by designing an SMIS that enables it to reinforce and build on its identified strengths.

For a cybersecurity plan to succeed, which of the following must remain confidential? Select all correct answer options.

The organization's digital or computer systems Private or sensitive data and information The logins and passwords of authorized users

from the following list, select all the primary considerations when developing the goals for a social media information system (SMIS).

The organization's larger goals for its mission: The organization's purposes for using social media

When a business speech is about people, which of the following generally occur?

The presentation of any statistics becomes livelier. The audience becomes more confident in the speaker.

In terms of tone, which two of the following do readers respond to most positively?

The projection of positivity Concern for others

What information does the Facebook tool Audience Insights provide to organizations? More than one answer may be correct.

The purchase behavior of people who have not "liked" your Facebook page, but who have attended events hosted by your organization. What websites members of a target audience interact with most frequently. What regions of the country members of a target audience reside in.

Members of a project team at a mid-size company are trained in online safety, and their network is protected by a firewall. But the worst-case scenario has happened: a competitor has obtained protected information, possibly directly from a member's computer. George, the firm's system manager, sees some evidence of a Trojan horse that was engineered to steal passwords. What first steps should he and his security team take to uncover the source? More than one answer may be correct.

The security team should examine everyone's activity log, looking for any downloaded files or programs. They should comb through e-mails with an eye to a message with a clickable link.

Which of the following guidelines for various types of charts is correct?

The slices in a pie chart should complete a whole (add up to 100%).

Which of the following can occur if the lights are turned off during a slide presentation?

The slides become the focus of the presentation. Audience members can become sleepy.

It is beneficial for a speaker to take questions at a business presentation for which of the following reasons? (Choose every correct answer.)

The speaker will have a better chance to explain parts of the message. Audience members will feel that the speaker cares about addressing their needs.

Constance's team was organized and efficient. When the team learned it would be giving a team presentation at the annual meeting, its members immediately divided up the work equally. The members worked independently but did not need to check up on one another, since each member was reliable and would not do anything to let down the team. The presentation itself was not particularly effective, and audience members appeared distracted. Which of the following is the most likely reason the presentation was unsuccessful?

The team did not collaborate about the overall presentation.

Jacob's team is giving a presentation. Which of the following would be the best choice for presenting a united front?

The team should wear the same formality of attire and stand close to one another on the stage.

The term m-commerce was first coined in 1997 by Kevin Duffy. Since that time, a variety of organizations have taken advantage of the model, allowing m-commerce to grow tremendously. Which of the following statements about m-commerce are true?

The term refers to e-commerce transactions, It allows users to access online shopping platforms, M-commerce activities include mobile banking and mobile application of e-commerce sites

From the following list, select all the statements that correctly characterize or define e-commerce ubiquity.

The term refers, It is the ability, It gives customers

What function of a micro-networked POS systems is responsible for increased accuracy of employees when ringing up customer purchases?

The total button which automatically added up the amount owed for items purchased

Social media can assist business professionals in gaining regular knowledge about which of the following? (Choose every correct answer.)

Their field Their company Their industry

Which of the following is the likely result if team members continually check in with one another about key objectives and messages while preparing a team presentation?

Their presentation will be cohesive and more influential.

Which is the best explanation of the relationship between social media goals and social media metrics?

There are metrics that correspond to the most common social media goals and that serve as key-performance indicators (KPIs) for them.

Why is it important to preserve the integrity of data, information, and systems?

These assets lose their usefulness and value if their consistency, accuracy, or dependability is compromised.

Why is it important to preserve the integrity of data, information, and systems? Multiple Choice These assets can only lose integrity during transmissions, which also must be protected for other reasons. These assets lose their usefulness and value if their consistency, accuracy, or dependability is compromised. These assets are more vulnerable to hackers if they have been obtained in an unethical or illegal manner. These assets are more appealing to hackers if they are not adequately protected from unauthorized use or harm.

These assets lose their usefulness and value if their consistency, accuracy, or dependability is compromised.

During the Web 1.0 era, web pages on the Internet had which of the following qualities? (Choose every correct answer.)

They allowed limited to no user interaction. They were read-only.

In business social software, dashboards are useful for which of the following reasons?

They are customizable. They can provide information about your coworkers. They can increase work efficiency.

What are traits of messages that are most likely to gain the attention of listeners?

They are delivered by a reliable source. They are formed around the listeners' interests.

Why are scholarly business articles seldom useful for researching problems in the workplace? (Choose every correct answer.)

They are hard to understand. They focus on theoretical and abstract issues.

Which of the following are characteristics of effective and compelling business message frames?

They are memorable. They use rational and emotional appeal.

What are common problems with using business periodicals as sources?

They are not often applicable to specific problems and organizations. They often include anecdotal evidence.

When a business speaker has presence, audience members tend to respond in which two of the following ways?

They become motivated to take action. They admire the speaker's ideas.

Which statement is true about auditory learners?

They believe emotion is best conveyed through voice.

Why should organizations determine their value proposition when creating their social media information system (SMIS)?

They can increase their exposure and user engagement on social media by designing an SMIS that enables them to reinforce and build on their identified strengths.

Which statement about scholarly journals is true?

They contain business research that is extremely reliable.

Which statement accurately describes microblogs?

They contain just a few sentences per entry.

What are constraints that members of your audience might have that keep them from responding to your message as you hope? (Choose every correct answer.)

They do not have the necessary resources. They do not have the authority to make relevant decisions. They do not have enough time to act on your message.

How do audience members typically respond when they hear an inauthentic speaker make a business presentation?

They feel uncomfortable.

Which two of the following do speakers often do when they establish a presence during their business presentations?

They generate interest in their ideas. They gain the attention of listeners.

Which of the following are characteristics held by outstanding business thinkers? (Choose every correct answer.)

They have the ability to state important questions. They can solve complex problems.

Which statement best describes the impact of management information systems (MIS) for communication?

They have vastly improved organizations' ability to communicate effectively and efficiently.

Which of the following statements is true about leading questions in a survey?

They manipulate participants into responding in a preferred way.

Which statement is true about kinesthetic learners?

They need breaks about every 20 minutes.

Which of the following are mistakes that presenters make when they do not know the answer to a question from an audience member? (Choose every correct answer.)

They respond with exaggeration. They use excessive confidence to hide their lack of knowledge.

A company uses an HR management system with artificial intelligence to deliver badges to the employees who have received the best scores in annual online training modules and let managers know which employees have not completed it as the deadline approaches. What function is this HR management system helping the company perform?

Training

According to We Are Social, 90 percent of adult internet users (aged 16-64) around the world have visited an online retail store on the web.

True

Advances in MIS technology can help tech-savvy small businesses lure ambitious managers away from larger, more established businesses that are slow to adopt new technology. Group starts

True

Choosing to target single women over 40 who live in metro areas and frequently "like" cat memes on different social media sites is an example of an organization using data to make an informed business decision.

True

Cloud-based components used by social media providers are hardware

True

Customer acquisition cost (CAC) is a metric that is used by e-commerce companies and other sales related organizations to assess the costs associated with convincing a potential customer to purchase a service or product.

True

Identifying logistical problems is an important function of data analytics.

True

True or false: An important way of developing survey research skills is by conducting actual surveys.

True

True or false: Business messages can be strengthened to counteract issues concerning low credibility.

True

True or false: How audience members perceive a business presentation speaker's authenticity impacts how they regard the speaker's message.

True

True or false: In most companies that sponsor blogs or wikis, participation is fairly low.

True

True or false: Poorly designed electronic slides can have a negative impact on the effectiveness of business presentations.

True

True or false: Profiles as part of enterprise social software systems are similar to those on Facebook and LinkedIn.

True

True or false: When developing a presentation about a new product, you should plan to spend more time giving information about the product if the audience is unfamiliar with it.

True

Using employee monitoring software, an administrator can view real-time, time-lapsed, or intermittent computer screenshots of a large group of employees.

True

When you analyze data with other group members, you are less likely to inadvertently misinterpret the data.

True

While a decision support system can analyze and interpret a large amount of rapidly changing data, it cannot provide the analysis needed to ultimately make the decision.

True

The IF function uses logical tests. A logical test is any value that can be evaluated as:

True or False.

What is the goal of the planning phase of the plan-protect-respond cycle?

Understand common threats that an organization may face and determine how vulnerable they are to such threats.

What is the goal of the planning phase of the plan-protect-respond cycle?

Understand the steps needed to design effective information security architecture.

From the following list, select 3 types of events and conditions that are considered cybersecurity threats.

Unintentional, accidental, and incidental events Misuse or abuse of IT assets Intentional events

Which formatting guideline increases the effectiveness of all types of charts?

Use darker colors to represent the most important data series.

How can organizations identify target markets before they have social media content and followers? Select all the correct answer options.

Using demographic and behavioral information to conduct market research Using public and purchased information to conduct competitor research Using existing customer information to conduct customer research

Which of the following are examples of the key benefits of the first electronic point-of-sales (POS) stations? More than one answer may be correct.

Using images, Customers were able, New employees were

In Excel, the freeze cells or panes option is located in Windows group of the __ tab.

View

In OpenOffice Calc, the Freeze cells (panes) option is located in the Window menu. In Excel and Sheets the freeze cells or panes option is located in the menu.

View

If the computer you are using does not have Excel and you do not have a access to Microsoft 365, then you can download Microsoft's Excel Blank______ program.

Viewer

From the following list, select 2 types of cybersecurity vulnerabilities.

Weaknesses in system security procedures that could be intentionally compromised. Flaws in system security designs that could lead to an accidental compromise.

Which of the following is a reason why farmers frequently use a DSS to determine appropriate fertilization and irrigation?

Weather patterns frequently change and cannot be predicted far in advance; therefore, the fertilization and irrigation needs are not consistent for a farmer's crops

User communities rely on which of these software components to engage with a social media information system (SMIS)? More than one answer may be correct.

Web browsers Applications that access content

Although Miguel does not want to give up the option to work from both home and office, he's starting to feel his personal and work lives blending together, and not in a good way. What are some strategies he should try to improve his work-life balance? More than one answer may be correct.

When at the office, Miguel can break for informal chats with colleagues in person and on video chat or phone when he's home. At the end of the day, he should take time to wind down and get enough rest., Wherever he is, Miguel should plan his day according to achievable priorities. A first step may be scheduling a specific time for responding to messages and calls.

In the image, the user has placed the pointer between columns B and C. This will allow the user to adjusts the column __

Width

Which statement is one of Coca-Cola's social media guidelines?

You are responsible for your actions.

What are some benefits of using a remote control to advance slides during a business presentation?

You can more easily continue eye contact with the audience. You are free to move around the room.

Which of the following are recommended strategies for dealing with losing your train of thought while giving a presentation?

You can pause until you regain your composure. You can repeat the last statement you made.

Which of the following are accomplished by referring to one another throughout a team presentation? (Choose every correct answer.)

You ensure your comments connect with your teammates' contributions. You demonstrate that your team is united.

Which of the following browsing situations may reveal that adware is at work? More than one answer may be correct.

You have been looking for a new winter coat, and three out of five ads popping up on your browser currently show the type of coat you have been considering. Shortly after you buy and download a writing enhancement program, you begin seeing ads for special keyboards, styluses, and other assistive technology. In searching the term database management, the first item you see in the results list is an ad for a particular online database.

Which of the following typically occur when you smile during a presentation?

You make a positive connection with listeners. Listeners are more likely to view you favorably.

What is the main rationale for not starting to show slides as soon as you begin a presentation that features slides?

You should first make a connection with your audience.

After coming to an understanding concerning your company's brand and brand message, which of the following should you do before you start telling your company's story as part of public relations?

You should know the company's strategy for promoting various products and services.

Which of the following best explains what you should do during your team presentation to show your team is united?

You should refer to one another throughout the presentation.

What should you plan to do in the days after you have given a business presentation? (Choose every correct answer.)

You should reply to any audience members to whom you made promises about providing additional information. You should consider sending a brief email note thanking the audience members for attending. You should take steps to help develop ongoing professional relationships as a result of the presentation.

Which of the following statements about selecting a research topic is true?

You should spend adequate time exploring options before selecting your research topic.

Which of the following should you and your team members do to make your presentation the most effective?

You should stand close to one another. You should pay attention to one another as you each present.

Which of the following criteria are part of the FAIR test? (Choose every correct answer.)

Your real motives in making the presentation are accessible. The presentation is factually correct.

The review section of a business presentation contains which of the following?

a brief summary of the key messages a call to action

Who is responsible for calculating probable maximum loss?

a company's cybersecurity analysts

Each time a user clicks or interacts on a social media website

a data point that can be analyzed is recorded.

ankha begins his presentation about a new spreadsheet software program by showing managers how one of its highly innovative features works. What type of attention-getter is this?

a dramatic demonstration

By default, when a number is entered into a cell, it becomes a value that interacts with formulas or values. To keep the number from interacting, type an apostrophe in front so that it becomes ___.

a label

Which type of chart is the most effective for illustrating trends and incidents over a period of time?

a line chart

Which type of visual is most effective to display stock prices over time?

a line chart

Which of the following is an example of management inconsistency that employee scheduling software is designed to eliminate? More than one answer may be correct.

a manager at a restaurant, an employee whose last, consistency scheduling

What is a leading question?

a question that hints at an answer

A white paper is

a report on an issue by an organization, often with a specific agenda.

Placing your cursor between row headings so that you see the double-arrow row-adjusting pointer and then dragging allows you to adjust the height of the row Blank______ your pointer.

above

The Stored Communications Act prohibits which activity?

accessing the communications of an organization without authorization

In Excel, the cell that a user has selected is referred to as the _balnk_ cell.

active

Which factors should you consider when evaluating the quality of data from secondary research? (Choose every correct answer.)

adaptability reliability relevance

Use the AutoSum function if you want to quickly __ a series of values in a spreadsheet.

add

Survey questions should

address only one idea. not have a double meaning. not take much effort to answer.

At a business presentation, a speaker should begin to use slides

after a spoken opening.

Which of the following qualities are likely to be attached to a business message that continually uses the I-voice? (Choose every correct answer.)

aggressive egotistical

Which of the following threats to cybersecurity come from internal sources? More than one answer may be correct.

an accidental erasure of data an attack by an authorized user the leakage of sensitive information

In spreadsheets, all functions and calculations begin with

an equal sign (=).

In spreadsheets all functions and calculations begin with __.

an equals sign (=)

In the spreadsheet above, if you wanted to make cell B2 show the sum of cells A2 and B1 you would first click on cell B2 and then enter:

an equals sign.

Which of the following names a type of cybersecurity threat? More than one answer may be correct.

an event or act that may lead to asset loss, a condition that may lead to asset loss, a harmful result or consequence of asset loss

What is a cybersecurity threat?

an event or condition that can lead to IT asset loss and the negative consequences of such loss

In addition to advancements in computer hardware, what drove improvements to POS (point-of-sale) systems in the 1990s?

an increasingly diverse group of users and their needs

An enterprise resource planning (ERP) system is

an integrated MIS system for agility and a competitive edge

Charo created a preview that demonstrated benefits to the audience and included an emotion-evoking statement. What did she forget to include?

an overview

A business speaker can demonstrate confidence with which of the following?

an upright posture a slight forward lean

What is the final step in the six-step process of creating an SMIS?

analyze the collected data

Secondary research is the analysis of data collected by

anyone who was not working under the direction of someone from your organization.

Which of the following are aspects of setting up the logic of a business message? (Choose all that apply.)

arranging message logic defining a call to action identifying supporting points

When creating electronic slides for a business presentation, you should make sure that the data and ideas they present are

as simple and clear as possible.

When sharing files, a businessperson should be careful to do which of the following?

ask colleagues for input on formulating a sharing files protocol organize files by project add only constructive comments

Personal biases sometimes cause a researcher to do which of the following?

ask the wrong questions interpret data incorrectly collect only data that supports the researcher's biases

Soria, the owner of Sky Spa, wants to know how her customers feel about the experience at her location. One of the questions in her survey questionnaire reads, "On a scale of 1 to 5, how would you rate our prices, comfort, and service?" This question is ineffective because it

asks about multiple ideas.

To minimize the disadvantages of handouts during a business presentation, the best time to give them out is Blank______ the presentation.

at the end of

To break out of the reputation of an inexperienced newcomer, a person should

attend a lot of meetings to get to know as many colleagues as possible.

What should the preview of a speech accomplish? (Choose every correct answer.)

attract the attention of the audience highlight the value of the speech to the audience

Which of the following are aspects of the AIM planning process? (Choose every correct answer.)

audience message information

In general, Blank______ learners believe that emotion is best conveyed through voice.

auditory

Which of the following are key attributes of effective social media messages for businesses?

authenticity friendliness sincerity

Which of the elements of the CIA triad does properly maintaining all hardware serve?

availablitiy

If you want to find the mean of the values in cells above A37 in the above spreadsheet, what function would you place in A37?

average

Which of the following is an example of a tool that could be used to ensure data integrity? More than one answer may be correct.

backing up data to separate servers or to the cloud, checksums are used to detect errors that are introduced during transmission or storage

Rafe, the sales manager at a national magazine, wants to compare sales of the magazine's spring issue on the West Coast to those in the Midwest and on the East Coast. This comparison will best be illustrated through a

bar chart.

Which chart type can be used to compare many types of data and is thus the most versatile?

bar charts

Because people use business reports to make high-stakes decisions, the research should be

based on data gathered over weeks, months, or even years, if necessary. thorough and careful.

To form a business message with confident claims and predictions, you should do which of the following? (Choose all that apply.)

be careful in your reasoning choose your language carefully

In a business presentation, the content of any slide should

be easy to read and understand.

Which of the following are ways an inexperienced newcomer can improve a professional reputation?

be in attendance at numerous meetings ask to take on projects with greater responsibilities dress in a manner that reflects the company's corporate culture

Which of the following are the benefits for a speaker of arriving early to a speech or presentation?

being able to assess the room and equipment seeing who will be attending adjusting the presentation if needed

Which two of the following are forms of social media appropriate for use in business?

blogs forums

The challenges to business professionals of using social media in the workplace are

blurred boundaries between professional and private lives. lower productivity.

What does business-to-consumer (B2C) e-commerce replace?

brick-and-mortar store locations

What online sources are likely to provide quality information for business research? (Choose every correct answer.)

business and industry websites online forums and discussions

You can usually better assess the usefulness of ________ than other secondary sources because of the many online reviews available.

business books

What is the most reliable source for most business research?

business databases and other materials at the library

Which of the following are resources for business research offered by most libraries?

business periodicals online databases scholarly journals

Business messages usually conclude with a

call to action.

Primary research is usually preferable in preparing a business report because it

can be customized to specific projects.

Facts are statements that

can be relied on with a fair amount of certainty.

malicious bots are cybersecurity risks because they

can reproduce and link to an outside server.?

When giving a presentation, nervousness is only dysfunctional when a speaker

cannot deliver the content.

The purpose of spyware is to ______.

capture the user's account data, passwords, key strokes, and more

Hoda is skilled at reading the emotional signals of her audience and making quick, subtle adaptations to her presentation to connect with them. Hoda is good at showing her

caring

Sending mixed signals is most likely to

cause the reader to feel confused.

In the spreadsheet above the word Uber is found in B6. B6 is called a reference.

cell

The basic unit of any spreadsheet, essentially a box where data can be entered, is called a(n) Blank______.

cell

The basic unit of any spreadsheet, essentially a box where data can be entered, is called a(n) ___.

cell

Saving a spreadsheet file in .csv format only saves the

cell values.

In business social software, dashboards serve as a

center of communication.

Latecomers to forum discussions are most likely to cause problems by

challenging the team's hard-earned consensus and damaging morale.

In creating a business chart, the most important consideration is the

chart's takeaway message.

Typically, numerical information is most effectively presented through which two of the following?

charts tables

Which action is a deceptive research practice?

cherry-picking data and adjusting information in your favor.

What is the most time-consuming part about setting up a social reading platform?

choosing the most helpful mix of information

A public relations team's first step is to

clarify the company's brand.

Who generally makes the request for research in the workplace?

clients managers

Angela is a computer science major. Which of the following would therefore be the best topic for her to select for a college research paper?

cloud-based technologies

In which of the following areas can e-commerce technologies help to reduce an organization's operating costs? More than one answer may be correct.

communication, information collection, information processing

When Baruch joined his company, his manager encouraged him to use the company's digital platform to network with those who have shared professional interests and to join their groups. These groups are called

communities of practice.

Before posting on social media, business professionals should be aware of their

company's policies regarding the use of social networking websites.

Generally, bar charts are best suited for

comparing amounts or quantities.

Which of the following are positive meta messages when establishing a credible online reputation? (Choose every correct answer.)

compassion expertise integrity

The goal of the review in a business presentation is to

compel audience members to consider taking specific actions.

During presentations, speakers show their ________ by knowing their content well.

competence

When framing the primary message, authors of a business message should complete which of the following? (Choose all that apply.)

compose a brief, vivid message statement define the primary message

Select all the following that are applications of the AIM planning process in presentations and speeches.

conducting an analysis of the presentation's listeners including supporting points to the key ideas highlighting topic-related conclusions

In business messages, a can-do attitude has which of the following qualities? (Choose every correct answer.)

confidence enthusiasm optimism

Because of profiles included on business social networks, employees who do not know each other personally often feel more Blank______ than they would using only email.

connected

As part of the preparation process, a business speaker should

consider possible questions from the audience.

Online marketplaces where one consumer sells to another consumer are called

consumer-to-consumer (C2C).

In general, a consumer research survey should

contain fewer than 5 or 6 questions. take no longer than 5 minutes to complete.

In writing business messages, the planning stage focuses on ensuring excellent

content

Providers use SMISs to deliver which of the following kinds of user data to sponsors? More than one answer may be correct.

content data from user interactions connection data from user relationships with other sources data that reveal user behavior and connection patterns

Which of the following is the most critical factor in a successful presentation?

content development

To select nonadjoining cells in a spreadsheet, hold down the ________ key while selecting cells.

control

To select nonadjoining cells in a spreadsheet, hold down the __ key while selecting cells.

control (Ctrl)

The essential function of malicious bots is to ______.

control an individual computer by self-replicating and connecting to a central server

Column D shows the value of each sale for the day. If you want cell D37 to display the number of sales, you would use the function.

count

The purpose of programs that analyze connection data is to

create information about user behavior and patterns to benefit a sponsor.

What is the first step in the six-step process of creating an SMIS?

create system goals that align with the goals of the organization

An audience's assessment of a business communication message is largely based on the author's

credibility

Which of the following is an example of a task that might be completed during the planning stage of the plan-protect-respond cycle? More than one answer may be correct.

determine security weaknesses, determine existing vulnerabilities by having an employee attempt to hack into a system, figure out where vulnerabilities within your systems currently exist

What result can a speaker anticipate by mingling with audience members after a business presentation?

developing professional connections

Which of the following are helpful ways of organizing the logic of a business message? (Choose every correct answer.)

diagramming the logic sketching out the logic

Which of the following are benefits that you obtain by rehearsing a business presentation? (Choose every correct answer.)

discovery of areas where content needs to be altered awareness of places to highlight with nonverbal communication increased familiarity with the content

When using a shared file platform, it is important to

discuss protocols for co-editing files.

Building a personal brand on a social media platform in a business environment can

display your credibility. further your career.

For which two of the following situations would a chart be an effective way to present information?

displaying complex numerical data in a way that is easy to grasp. catching the attention of viewers and readers and drawing them into your message.

In the image, the user has selected a cell and then moved the pointer to the edge of the cell so that the 4-headed arrow appears. This pointer allows the user to:

drag the data to another cell.

Writing effective messages in business should seek to do which of the following? (Choose every correct answer.)

drive collaboration boost productivity

At the time cash registers were invented, "ringing up" a customer meant

each time the cash drawer was opened, the register rang, alerting a shop owner to register activity.

Which of the following is the primary goal of blogs for organizations?

effective public relations

Which of the following are at stake in the statements and actions of business professionals on social media?

employee personal standing employer reputation

What parts do people play in social media information systems? More than one answer may be correct.

employees and contributors, platform architects and data scientists

From the following list, select all the business practices that are both "green" or environmentally responsible and sustainable in terms of a business's current and long-term success and the environment.

encouraging, using, shifting

The primary goal of a company's social media strategy is to

engage potential customers

Consistent deep breathing as part of a presentation is effective in

enhancing voice timbre. helping maintain a confident posture. improving the tone of the voice.

Elmer is creating a table to show how the company has performed in the past year month by month. The most effective way to make the table easy to understand would be to

ensure that each grid line serves a distinct purpose.

What is typically included in the reviewing stage of writing an effective business message?

ensuring that the communication is fair

Because it indicates the beginning of a function or a formula, the most important symbol in Excel is the Blank______ sign.

equals (=)

The main characteristics that define cybersecurity threats are ______.

events that can lead to IT asset loss, conditions that can lead to IT asset loss, and the consequences of such loss

In order to be effective, a consumer survey should contain

exhaustive answer choices for each question.

In a business environment, blogs facilitate the sharing of which three of the following among business professionals?

experiences specific topics ideas

If you want to draw the audience's attention to you during your presentation, you should

explain and elaborate on the content in your slides.

During an internal business presentation, a speaker's credibility can be increased through which two of the following?

explaining how a business idea will improve the company demonstrating knowledge about a business issue

Which of the following are forms of nonverbal communication used by effective business speakers? (Choose every correct answer.)

eye contact an open stance

When describing electronic slides during a business presentation, the speaker's Blank______ should be towards the audience.

face

A social media information system (SMIS) directly serves its users by ______.

facilitating content sharing among them

The primary uses of microblogs in a business environment include which of the following?

facilitating quick replies to questions sharing announcements providing immediate information

Ideally, stories used in business presentations should be which of the following? (Choose every correct answer.)

factual drawn from real life honest

Extensive use of the I-voice in a business message

fails to focus on the interests of the audience.

An email is an example of data that is always at rest.

false

Computer viruses can be either chip technology or code.

false

Delivering an excellent business presentation is as easy as speaking.

false

Due to the many communication tools available in the emerging Social Age, the division between professional and private lives is becoming increasingly clear.

false

Entry-level professionals usually have very high professional credibility.

false

Most business arguments employ an indirect approach because it is more persuasive.

false

Most employees participate on companies' enterprise platforms with collaboration tools.

false

Offering to help a colleague on a company blog or wiki is considered intrusive and unprofessional.

false

Which of the following are part of planning the basic message structure? (Choose every correct answer.)

finding and framing the primary message arranging the logic of the primary message

Which of these is least important when analyzing data related to a business problem?

focusing on tangential issues

The beginning of a presentation is the time when audience members

form an opinion about the speaker.

To demonstrate competence when giving a presentation, a younger business professional should dress with greater

formality.

In order to emphasize important data in a spreadsheet, it's important to be able to Blank______ your information correctly.

format

To make important information stand out in a spreadsheet, it's handy to know how to ___ your work.

format

If you wish to keep a column visible while you scroll through the rest of a spreadsheet file, you can use the ___ options.

freeze

To prevent personal biases from influencing research, you should

frequently evaluate whether you are being fair. consider the data from various viewpoints. consider all available facts.

Using the SOFTEN model of nonverbal communication allows you to project which two of the following?

friendliness self-assurance

The total amount of money (principal + interest) that lender receives from a borrower at the end of the loan is referred to as the loan's

future value (FV)

Before you create any individual blog posts for your organization, you need to do which of the following? (Choose every correct answer.)

gain a shared sense of the brand message clarify your company's brand

Which of the following are identified to help create solid business ideas? (Choose every correct answer.)

gathering relevant information and facts determining the business issues and objectives making sense out of often complex and confusing pieces of information

Vector and raster files are

geographic data

When giving a business presentation, a speaker should dress with Blank______ than the members of the audience.

greater formality

Which of the following are positive aspects of social media use in a professional environment?

greater responsiveness between businesses and clients less need to travel for face-to-face meetings more effective team communication

In cybersecurity, the probable maximum loss (PML) is used to______.

help determine spending needed to adequately secure an organization's IT infrastructure

The goal of the NIST Cybersecurity Framework Protect (PR) function is to ______.

help protect an organization's IT infrastructure from security breaches by offering guidelines on IT infrastructure protection

Management information systems (MIS) for communication directly support organizational decision making by

helping managers communicate, obtain, discuss, and understand the information necessary for strategic decisions.

To retain a row or column, but remove it from view, right-click on the row or column heading and select

hide

What does the General Data Protection Regulation (GDPR) regulate?

how companies protect personal data

For business speakers, attire influences

how others perceive them.

Which of the NIST Cybersecurity Framework functions investigates an organization's cybersecurity management in the context of their business needs and resources?

identify (ID) function

Cybersecurity threat mitigation is best defined as the policies, procedures, and tools that help an organization

identify cybersecurity threats, prevent them from being realized, and minimize damage from them.

Charlie has been assigned the task of creating an effective business message aimed at encouraging healthy habits in the workplace. He uses the AIM planning process. What should he do during the information gathering stage?

identify problems that prevent employees from making healthy choices

In the context of the AIM planning process, what tends to be the single most important planning step for many messages?

identifying reader benefits and constraints

Setting up the logic of the message consists of which of the following? (Choose every correct answer.)

identifying supporting points in the message identifying the call to action

What is typically included in the planning stage of writing an effective business message?

identifying the primary message and key points

Audience members typically decide which of the following during the preview of a presentation?

if they are willing to act on what they hear if they will pay attention and listen to the presentation if they think they have something to gain from the presentation

A business professional who wears formal business attire generally exudes

importance.

In a business message, slanting the facts means to

include only favorable information.

When deciding how much information to convey in a chart, the designer should

include only what is needed. plan to use labels to help readers understand the data quickly.

If an organization wants to increase user engagement on social media, it wants to

increase the conversion rate of its social media posts to interactions with users.

Which of the following are potential uses for profiles on social networking platforms found in businesses?

increased ability to locate an employee with specific knowledge access to information on business professionals with common interests

Which of the following are effective techniques for increasing people's ability to find your business blogs and wikis? (Choose every correct answer.)

indexing blogs tagging entries labeling blogs

In the business environment, corporate blogs can be written by

individuals. senior executives. company teams.

The main aim of your presentation is to draw support from your audience and to

influence key decision makers in your audience.

Blog posts enable company managers to

inform their teams about announcements and updates.

Which of the following are characteristics of Web 2.0 communication tools? (Choose every correct answer.)

interactivity personally customizable social focused

When writing a business message, a key component of credibility comes from demonstrating

interest in others.

Advertised as an annual percentage rate (APR), the amount of money a lender charges for a loan is the loan's ________.

interest rate

In a press-release style message, the "story" is written in third person in a style often referred to as ________ style.

inverted pyramid

The need to keep sensitive data, information, and systems confidential ______.

is both a major goal and a requirement for cybersecurity

Sadiki included the question on a customer survey: "Do you prefer healthy, nutritious food, or food that is bad for you and will ruin your health?" The problem with that question is that it

is leading.

Data from secondary sources is probably not suitable for your business communication project if it

is not very relevant to the topic of your research. was gathered by people with questionable research skills. was obviously compiled by someone with a biased perspective.

Computing is considered "green" or environmentally responsible when

it reduces the consumption of natural resources and the associated environmental impact.

Which type of attire should generally be avoided in business-related settings?

jeans and a collarless shirt

To properly authenticate, or verify, the identity of authorized users and protect assets from unauthorized users, it is essential to

keep user logins and passwords confidential.

Which of the following is a best practice for ensuring that data are available? More than one answer may be correct.

keeping current with all system upgrades, preventing bottlenecks

When writing a presentation for clients and customers, you should primarily focus on influencing which two of the following groups? (Choose every correct answer.)

key decision makers prospects for future business

In a business presentation, the presenter's views are the

key messages of the presentation.

Which type of learner responds best to participation-focused presentations?

kinesthetic

Which of the following are different learning styles that audience members may have?

kinesthetic auditory visual

Which of the following is prohibited by the Computer Fraud and Abuse Act? More than one answer may be correct

knowingly transmitting a virus that causes damage to a computer accessing information on a computer that has been left unattended

In the above Calc file, cell B3 contains the text entry, Cookie Sales. In spreadsheets, this sort of entry is referred to as a(n)

label

If you wish to drag a value or label across your spreadsheet, use the ___ pointer.

large cross

Placing your cursor between column headings so that you see the double-arrow column-adjusting pointer and then dragging allows you to adjust the width of the column to the ___ of your pointer.

left

What are things that good speakers will do when involving the audience in their presentations? (Choose every correct answer.)

limit the amount of time spent interacting with listeners make sure questions and discussion stay on topic

To facilitate the use of contributions to blogs and wikis, ______ should be provided.

links to relevant files

When writing an effective business message, being flexible can involve which of the following?

listening to the ideas of others being open to alternative ways to address an issue

Built on real-time geodata and information provided from wireless mobile devices, ________ are widely used in m-commerce.

location based services (LBS)

E-commerce transactions that are executed using wireless mobile devices are known as

m-commerce

Which of the following acts is an example of social engineering?

manipulating people in order to obtain and misuse their personal information

A speaker can prepare for the unexpected during a business presentation by

mastering the presentation's content. maintaining an attitude of flexibility.

One potential drawback of using social media in the workplace is that social media

may lower productivity.

Which of the following are relaxation techniques that can help limit nervousness before a presentation? (Choose every correct answer.)

meditating emptying your mind counting backward from 100

The frame of a primary business message should be which of the following? (Choose every correct answer.)

memorable short

Overall and underlying messages that others decode from your online communications are referred to as ________ messages.

meta

The underlying, overall message that people get from a business communication is called the message of the communication.

meta

Roughly one of every three re-commerce customers today belong to which market segment or category of consumers? More than one answer may be correct.

millennials, Gen Z

A retail chain store uses a centralized mainframe system that connects all of the cash registers within a region. Regional managers are able pull sales reports for all units on this mainframe. Salespeople are able to easily ring up and total customers purchases, as well as communicate with other associates at different machines. What is his mainframe system an example of? More than one answer may be correct.

mobile POS station, client-server network

Entry-level business professionals have low credibility primarily because they are

newcomers

Which of the following are elements of the SOFTEN model of nonverbal communication?

nod tone smile

Employee monitoring software

observes computer use of all employees from a central location.

If you do not know the answer to a question during a business presentation, the best thing to do is to

offer to find the answer later and contact the questioner.

The professional reputation of entry-level business people can be improved relatively quickly through which of the following? (Choose every correct answer.)

offering something of value to the work environment being conscious of strengths and weaknesses

Where are data in transit found?

on a cellular network

Social media facilitates which of the following for business professionals? (Choose every correct answer.)

ongoing learning about their company gaining insights into best work practices

Business-message readers generally have a better reaction to an author who is seen as

open to a variety of options and ideas.

In business communications, which of the following generally enhances the writer's beneficial influence over others?

optimism

Meta messages are the Blank______ messages decoded by others from someone's online presence. (Choose every correct answer.)

overall underlying

When you lose your train of thought during a business presentation, an effective strategy is to

pause until it returns.

What is a recommended practice when you are answering a question from a member of the audience that requires you to quickly come up with a response?

pausing before giving the answer

Which group would be the most difficult to identify and survey to obtain information?

people who are undocumented workers in a specific city

The three parts that combine in an organization's social media information system (SMISs) are ______.

people, data and procedures, and hardware and software

A social media information system (SMIS) is composed of three parts, which are

people, data and procedures, and hardware and software.

In the context of a business speech, audience members primarily enjoy hearing about

people.

When you are deciding where to stand during a speech or presentation, you should choose a location that will do which of the following?

place you near the listeners give you the best eye contact with listeners

AIM is a process for Blank______ the writing of useful business messages

planning

When a chart is being developed, the key component is

planning.

Which of the following are likely effects of slanting the facts in business messages?

potential loss of author credibility reader doubt about message logic

A cost-benefit analysis is a useful tool used to analyze the costs associated with implementing a project or set of activities and the benefits that can be achieved as a result of the implementation. Which of the following would be considered benefits when conducting a cost-benefit analysis? More than one answer may be selected.

potential return, potential costs, brand exposure

Which of the following are ways to make use of social reading platforms?

praise other people's contributions use hashtags or topical searches to track information read important articles and posts

Adware specifically functions to ______.

present advertisements to users based on their browsing behaviors

Charts are useful for

presenting a memorable visual image. presenting complex data in a simple format. communicating numerical data.

The organizations likely to benefit the most from the global reach of e-commerce are those that

previously depended on foot traffic into one physical store to sell their products.

The amount of money borrowed in a loan is often referred to as the loan's balance or the ________ of the loan.

principal

Software used by social media information systems websites include

programs that analyze data.

Which of the following are acceptable topics for blogs published on a business social media platform?

project goals business expertise

In all business messages, communicators should ideally

project positivity.

What is one of the most common types of effective posts when establishing a professional reputation?

promoting your employer

Decision makers depend on business reports to

recommend actions based on the data. analyze the information properly. provide the correct information.

A useful tool for advancing slides during a business presentation that allows you to keep more eye contact with an audience than a keyboard would allow is a slide

remote control.

When interacting with the audience during a presentation, you need to be able to

reply quickly to questions asked by audience members.

When businesses employ social networking as part of their culture, employees should take which of the following steps? (Choose every correct answer.)

reply to comments make consistent contributions

What is most likely to show that the writer of a business message has concern for the audience?

respecting the autonomy of the reader

In what stage of the plan-protect-respond cycle forensic analysis conducted?

respond

A good member of a business social network community is expected to take which of the following actions?

respond positively to others' requests assist others when asked

Which of the following are parts of the process of crafting effective business messages? (Choose every correct answer.)

reviewing planning writing

Naming a range of cells is useful when creating a VLOOKUP.To name a range of cells in Excel, select the range by dragging, then __-click and select Define Name... from the menu.

right

One way to adjust the width of a column quickly in Excel is to place your cursor to the Blank______ of the column heading and just drag.

right side

The shortcut for adding a column in Excel is to click on the column heading to the right of where you wish to enter the column, and then click CTRL + Shift + Plus (+). Another method is to Blank______ on the heading to the right and select Insert from the context menu.

right-click

To insert a column to the left of column D, select column D and then ___ and select insert.

right-click

When you're using Excel, to hide column D, first click on the column heading to select the column, and then ___ to open the menu and select Hide.

right-click

A ___ is a horizontal line of cells in Excel (or any other spreadsheet program).

row

Placing the cursor between row headings 3 and 4 allows you to adjust the:

row height.

An advantage of using Google Sheets is that any changes made are automatically

saved

Smaller businesses are able to get the benefits of an enterprise resource (ERP) system through

scalable cloud-based ERP systems.

Barbara is looking for concise, easy to understand research on ways to motivate employees at her workplace. Which research source is least likely to provide the kinds of information she needs?

scholarly articles.

Which of the following are visual aids that can be used in business presentations? (Choose every correct answer.)

screencast videos electronic slides

Which term is used to encompass the analysis of data collected by others with no direction from you or members of your organization?

secondary research

What is an important step in integrating cloud computing into a business's IT structure?

secure a dependable, high-speed Internet service

For which type of cybersecurity vulnerability do organizations maintain and share databases of known problems?

security weaknesses in operating systems or application software

Which of the following would be an example of an effective application of visualization for relaxing in a business presentation?

seeing yourself speaking to members of the audience with confidence

In most spreadsheet programs, the first step in adding chart elements is to ___.

select the chart

Karla's company uses an internal social networking platform. Karla's posts usually involve awards she has won or praise she has received. She rarely comments on others' posts. Others will most likely see her as

self-promoting.

Electronic slides should Blank______ a business presentation.

serve simply as an aid to

The advantage of an op-ed style corporate blog is that it is often used to

share the opinions and expertise of a corporate leader with the public.

Kelli gives a presentation to advocate that her employer, Services-R-Us, which offers services such as personal shopping and event planning to assist busy professionals, expand its offerings to include dog walking. She decides to use the PREP method of justifying this position. Which action is an example of the third step in the method?

she cites a personal services company in another city that increased its business by adding dog walking to its services

Which action is most likely to result in your audience judging you as having character?

showing that you are interested in the needs of your audience.

As a rule of thumb, what is the minimum time needed to change a professional reputation?

six months

Adding a dedicated group to your Facebook account allows you to meet online and keep in touch with others who share your interest. You can post relevant media, such as photos, articles, and videos. Which role in a social media information system (SMIS) does your group fit into?

social media community

Communication tools for Web 2.0 include which of the following?

social networks podcasts wikis

If an organization's automated backup system is vulnerable to data loss or corruption, its cybersecurity vulnerability is a weakness or flaw in its

software

As other members who are part of your business social media see that you respond and help others on the social media, you can specifically expect that

some of them will respond and help you.

Ideally, the focal point of the audience during a business presentation should be the

speaker

Because they make it easy to arrange, display, and calculate numerical data, ________ programs are often used in budgeting, accounting, finance, grading, gambling houses, and even sports analysis.

spreadsheet

Programs, such as Microsoft Excel, iWorks (Apple) Numbers, Google Sheets, and OpenOffice Calc, that allow users to arrange numerical data are called _____ programs.

spreadsheet

Computer programs that allow users to easily arrange, calculate, and present numerical data are called ________.

spreadsheets

Computer programs that allow users to easily arrange, calculate, and present numerical data are called programs.

spreadsheets

Sports analysts often use ___ to keep track of statistics, times, and scores of nearly every sporting event.

spreadsheets

Sports analysts often use ________ to keep track of statistics, times, and scores of nearly every sporting event.

spreadsheets

To develop primary research skills for business communications, you should study

statistical and quantitative analysis. spreadsheet software.

You should arrange the slides that you use in a business presentation to create a

story line.

Which of the following are typical perceptions that readers have of a business message that includes exaggeration? (Choose every correct answer.)

that the message lacks realism that the message is unbelievable that the message seems over the top

Which of the following are contributing to the blurring of professional and private lives on social media? (Choose every correct answer.)

the ability to communicate from nearly any location about nearly anything the variety of communication devices that are widely available the ability to communicate with nearly anyone at nearly anytime

Which of the following are reasons why states are making cybersecurity measures a high priority? More than one answer may be correct.

the acceleration of new technologies the proliferation of cyber threats to data and technology

Which of the following are reasons why states are making cybersecurity measures a high priority? More than one answer may be correct.

the acceleration of new technologies, the proliferation of cyber threats to data and technology

Which of the following elements of a speech are part of the preview?

the attention-getter the overview the positioning statement

For many business messages, the most important step in the planning stage of business communication writing is identifying

the benefits to be gained by the reader.

The first modern transaction processing system was

the cash register.

In a deductive business argument, the essence of the message can be gleaned from which three of the following? (Choose every correct answer.)

the first sentences of supporting paragraphs the first paragraph the last paragraph

If you enter a formula, and Excel returns an error value of #DIV!, this means that

the formula is dividing a value by zero and therefore cannot enter a result.

Which of the following must remain confidential to achieve cybersecurity goals? More than one answer may be correct.

the logins and passwords of authorized users, private or sensitive data and information, the specifications of the organization's IT systems

For individuals who use social media in a business environment, one major risk is

the loss of credibility.

The first step of the AIM planning process may be difficult for a business presentation because you may not know

the makeup of the audience.

Hamish works for a social media website that caters to senior adults and allows them to engage with their families over the Internet for a small subscription. In the past, the company has focused on retirement communities, but Hamish thinks they would get more subscribers by focusing on seniors who live by themselves. He should prepare a presentation for senior staff that focuses primarily on influencing which decision maker in his company?

the marketing director

The traditional role of public relations was to communicate with

the media.

Readers interpret the tone of a business message primarily as a reflection of the writer's attitude toward which two of the following? (Choose every correct answer.)

the message content the readers of the message

A speaker's nonverbal communication influences how audience members perceive which two of the following?

the message delivered by the speaker the speaker's credibility

Using exaggeration in a business message can affect the credibility of which of the following?

the message itself the author

When using business social media, awareness of boundaries means observing the separation between

the professional and the private.

Piers is using the story line approach in his presentation. He says that the coffee shop chain he works for faces the challenge of improving its customer service orientation. After describing a sandwich chain that is similar to his company in size and target market, he explains the specific approach to training that the sandwich chain implemented in order to improve its customer service. What aspect of a business story does his explanation about the training program represent?

the resolution?

If a survey question addresses more than one idea,

the results cannot be properly analyzed. the respondent is likely to become confused.

When preparing a speech about a business product, what should you find out about your audience? (Choose every correct answer.)

the source of their information about the product what they know about the product

When speakers choose not to rehearse before giving a business presentation, audience members will typically perceive which two of the following? (Choose every correct answer.)

the speaker's disorganization the speaker's vagueness

The primary focus of a business presentation with visual aids should be

the speaker.

When creating a chart, you should consider the five most important elements, including

the sufficiency of the information. the descriptiveness of the title. how easily a reader can process the information.

Which of the following are elements of formal business attire? (Choose every correct answer.)

ties dress shirts business suits

What is a purpose of a positioning statement?

to demonstrate value to the audience

What does the General Data Protection Regulation (GDPR) strive to achieve?

to ensure EU companies protect the privacy and personal data of EU citizens

What should be one of the primary goals of a business communicator?

to express the message in ways that inspire others

Which of the following are the main goals of a business speech attention-getter? (Select all that apply.)

to get audience members to consider the presented ideas to engage audience members emotionally

An indirect approach is often used for which of the following types of business messages?

to give negative news

Templates are used to create a business message for which of the following reasons?

to organize its appearance to define its structure

What is the principal reason you should interpret slides during a presentation instead of reading them?

to prevent becoming just a narrator

Comma-separated format (.cvs) files are commonly used by those who are sending data but do not know what spreadsheet the recipient uses.

true

Cybersecurity risk analysis weighs the costs versus the benefits of instituting countermeasures to cybersecurity events.

true

Employees should become familiar with their companies' acceptable-use policies for social networking websites.

true

Information about an organization's most popular tweet is found in both the Twitter report card and the tweet activity dashboard.

true

Presentations put a spotlight on speakers, providing them with the opportunity to build credibility.

true

True or false: A fatal error in a business presentation is to present evidence but leave out central positions.

true

Twitter is a Web 2.0 communication tool.

true

Typically, tone influences readers over the entire course of a message.

true

To ensure that the bar charts are formatted effectively, the bars should be about ________ the width of the space in between bars.

two times

When contributing an individual blog to a business intranet, the ideal posting frequency to attract the most followers is

two to three times per week.

Which of the following can help improve the overall design of electronic slides used in business presentations? (Choose every correct answer.)

using a design expert when possible developing simple charts and diagrams focusing on key information

What action makes a chart ineffective?

using a nondescriptive chart title

Which of the following are open-stance gestures for a business speaker?

using palms-up gestures keeping arms at the sides of the body

When you specifically want your presentation to appeal to professionals with a blue motivational value system, you should focus on

using relationship-centered terms.

Which of the following are not productive or effective in online discussion forums? (Choose every correct answer.)

using strong, declarative language ignoring competing points of view voicing complaints

Select three true statements regarding labels.

usually a text or text+number combination can be created by typing an apostrophe in front of a number remain on the left side of a cell when entered

In the spreadsheet above, the entries in cells A1 and B2 look the same, but A1 contains a ___ while B2 contains a label.

value

In the context of business messages, workplace Blank______ are the core beliefs about suitable ways of handling issues and problems.

values

Many businesses send data such as product, customer, and orders information between different offices. Since these data do not include any formulas or styling it is commonly sent as a CSV file. CSV stands for comma-separated

values

Which type of cybersecurity breach can cause the most damage to an organization's systems, data, and information?

viruses

Speeches that are highlighted by slides full of illustrations appeal in particular to Blank______ learners.

visual

While participating in a survey, most respondents

want to finish quickly. want to answer without thinking very long.

Which tip will help you manage your nervousness before giving a presentation?

watching what foods and beverages you consume

Labels and legends on a chart should indicate

what units of measurement are depicted. what is being measured.

In which situation should the origin of information be authenticated to protect data integrity?

when electronic votes are submitted during an election

Reports or guides that are issued by the government and organizations and that generally describe research about solving a particular issue are

white papers.

During a business presentation, audience members should be able to understand the information on slides

within a few seconds.

Ideally, most of business social media content should be

work information.

When focusing on complex business problems, Blank______ is generally an essential part of the idea-development process.

writing down ideas

The most effective business social media tools all include the extensive use of which of the following?

written communication

Which of the following are examples of unsupportive behavior by an audience member during a business presentation? (Choose every correct answer.)

yawning texting

Primary research is the analysis of data collected by

you. colleagues under your direction. consultants under your direction.

To remove the content from one cell and move the content to another cell, one way is to right-click on the origination cell (to open the context menu) and click ___.

Cut

What is the benefit to using social media for conducting market research?

Demographic data and market information is much easier to gather from social media sites than it was to previously collect.

To remove and replace unwanted characters from an Excel spreadsheet, you will probably want to open the Find & Select menu. This is found in the Editing group on the Blank______ tab.

Home

To display the smallest value in a selected range quickly, you could use the Blank______ function.

MIN

Which of the following statements are correct regarding Excel's Save As option?

Save As allows you to choose where the file will be saved. Save As allows you to change the name of the file.

Which of the following are methods of selecting a range of adjoining cells in Excel?

Select the first cell in the range and drag down to the last cell. Select the first cell in the range then hold down the Shift key and select the last cell in the range.

From the following list, select all the primary considerations when developing the goals for a social media information system (SMIS).

The organization's larger goals for its mission, The organization's purposes for using social media

The main purpose of a social media information system (SMIS) is to

allow social network users to share content.

Describe what social media offers businesses eager to gain understanding of their customers. More than one answer may be correct.

social intelligence tools, unprecedented access to consumer data, insights analytics

What are some types of software that social media providers use? More than one answer may be correct.

software that allows the provider team to log on to the system, any database management system

Entries that Excel recognizes as being able to interact with other cells are referred to as

values

Place the following steps in order if you wish to save a Google Docs (Sheets) file as an Excel file. Click Microsoft Excel (.xlsx) Click Microsoft Excel (.xlsx) open choices for ranking Click the Download option open choices for ranking N Open the Google Docs (Sheets) file open choices for ranking Click the File tab

4 3 1 2

Every time you go to the gas station you are amazed by how much prices have increased. At this time last year, the price was $3.20 per gallon and now the price is $4.25 per gallon. Which of the following spreadsheet formulas correctly calculates the percentage change?

= ((4.25 - 3.20) / 3.20) * 100

What does the formula =SUM(C4,D5) mean in plain language?

Add the numbers in cell C4 and cell D5.

Select three formatting options that can help to highlight important information in your spreadsheet.

changing fonts, font styles, or font colors creating cell borders. changing alignment in the cell (center, left, top, etc.)

To remove and replace characters in Excel, one option is to use Find & Select menu. This menu is indicated by a(n) ___ icon.

magnifying glass

Setting social media metrics is the second step in creating a social media information system (SMIS) because

metrics are needed to quantify the organization's progress toward achieving its social media goals.

Some popular social media management systems are becoming more difficult to manage because

millions of diverse users across the globe are active participants.


Ensembles d'études connexes

Chapter 1 Smart Book Managerial accounting

View Set

Medication Administration: Intramuscular Injection Elsevier Military

View Set

Ch. 13 - Monopolistic Competition

View Set

Gastrointestinal Disorders NCLEX 3000

View Set

[MKT 201] Chapter 9 - Developing New Products and Managing the Product Life Cycle

View Set