MIS 2020 Final Practice Questions

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

The primary goal of a company's social media strategy is to

engage potential customers.

Vector and raster files are

geographic data.

With the increasing presence of Internet e-commerce sites the force of customers has

increased.

An appropriate social media goal for a business that wishes to raise its public profile is

increasing brand awareness.

Allowing people to share a digital ledger across a network of computers ________ uses computer code to create concatenated (linked together) blocks of transactions.

Blockchain

A target market for an organization is the online audience that has demonstrated its interest in the organization's products services or activities by following or engaging with the organization on social media.

False

Instagram Insights only provides demographic and engagement information for paid activity.

False

The type of e-commerce transaction that allows consumers to interact with government or authoritative bodies for activities such as paying taxes securing building permits or paying tuition at a university is referred to as a consumer-to-governance transaction.

False

One important ________ is that the firm's employees will learn to use technologies to develop the new product providing a competitive boost.

First-mover advantage

Which statement accurately describes the need to keep sensitive data information and systems confidential?

It is both a major goal and a requirement for cybersecurity

An international automobile manufacturer is concerned about how its global operations will be impacted by changing government standards for auto emissions and fuel efficiency. Which component of a PESTEL analysis can best help the manufacturer evaluate any threats posed by these policy changes?

Legal

Collections of related fields in a database are referred to as

Records

Which of the following is a popular data analytics program that offers business intelligence as well as data visualization?

Tableau

Which of the following scenarios represents a customer acquisition cost of $100? A company spends $100 000 on advertising and marketing in one month.

They gain 1,000 new customers in that month.

1JD.com is China's largest online retailer and the country's largest internet company by revenue. Its revenue eclipsed $70 billion in 2019.

True

According to We Are Social 90 percent of adult internet users (aged 16-64) around the world have visited an online retail store on the web.

True

Cybersecurity vulnerabilities can be intentionally exploited or accidentally allowed to compromise system security.

True

What is the goal of the planning phase of the plan-protect-respond cycle?

Understand common threats that an organization may face and determine how vulnerable they are to such threats.

Who is responsible for calculating probable maximum loss?

a company's cybersecurity analysts

Online marketplaces where one consumer sells to another consumer are called

consumer-to-consumer (C2C).

Karl Benz invented the internal combustion automobile in 1885. More than a century before Adam Smith had described how division of labor creates efficiencies. When Henry Ford set up Model T production on an assembly line in 1908 he combined technology and efficiency to produce an inexpensive automobile. Ford transformed the personal transportation market. Christensen called this process

disruptive innovation.

With a product differentiation strategy a company charges more for its product than its competitors charge for theirs because:

its product is unique in a way that justifies the higher price.

Some popular social media management systems are becoming more difficult to manage because

millions of diverse users across the globe are active participants.

Qualitative data that is not categorized is called nominal data. Qualitative data that is categorized (ranked for example) is considered _____ data.

ordinal

In order to be considered open data databases must provide access rights so that they can be

redistributed.

When selecting the right data it is important to be aware of the source of the data. For example data that is sold by an entity that didn't actually collect the data is considered ______ data.

third-party

What is the goal of the NIST Cybersecurity Framework Protect (PR) function?

to help protect an organization's IT infrastructure from security breaches by offering guidelines on IT infrastructure protection

According to the identify (ID) function of the NIST Cybersecurity Framework what allows an organization to prioritize its efforts where cybersecurity risk is involved?

understanding of its business environment and resources


Ensembles d'études connexes

Hemolytic Disease of the Newborn

View Set

Chapter 6,7, and 9 check your understanding

View Set

Chapter 32: Drug Therapy for Female Reproductive

View Set