MIS 2020 Final Practice Questions
The primary goal of a company's social media strategy is to
engage potential customers.
Vector and raster files are
geographic data.
With the increasing presence of Internet e-commerce sites the force of customers has
increased.
An appropriate social media goal for a business that wishes to raise its public profile is
increasing brand awareness.
Allowing people to share a digital ledger across a network of computers ________ uses computer code to create concatenated (linked together) blocks of transactions.
Blockchain
A target market for an organization is the online audience that has demonstrated its interest in the organization's products services or activities by following or engaging with the organization on social media.
False
Instagram Insights only provides demographic and engagement information for paid activity.
False
The type of e-commerce transaction that allows consumers to interact with government or authoritative bodies for activities such as paying taxes securing building permits or paying tuition at a university is referred to as a consumer-to-governance transaction.
False
One important ________ is that the firm's employees will learn to use technologies to develop the new product providing a competitive boost.
First-mover advantage
Which statement accurately describes the need to keep sensitive data information and systems confidential?
It is both a major goal and a requirement for cybersecurity
An international automobile manufacturer is concerned about how its global operations will be impacted by changing government standards for auto emissions and fuel efficiency. Which component of a PESTEL analysis can best help the manufacturer evaluate any threats posed by these policy changes?
Legal
Collections of related fields in a database are referred to as
Records
Which of the following is a popular data analytics program that offers business intelligence as well as data visualization?
Tableau
Which of the following scenarios represents a customer acquisition cost of $100? A company spends $100 000 on advertising and marketing in one month.
They gain 1,000 new customers in that month.
1JD.com is China's largest online retailer and the country's largest internet company by revenue. Its revenue eclipsed $70 billion in 2019.
True
According to We Are Social 90 percent of adult internet users (aged 16-64) around the world have visited an online retail store on the web.
True
Cybersecurity vulnerabilities can be intentionally exploited or accidentally allowed to compromise system security.
True
What is the goal of the planning phase of the plan-protect-respond cycle?
Understand common threats that an organization may face and determine how vulnerable they are to such threats.
Who is responsible for calculating probable maximum loss?
a company's cybersecurity analysts
Online marketplaces where one consumer sells to another consumer are called
consumer-to-consumer (C2C).
Karl Benz invented the internal combustion automobile in 1885. More than a century before Adam Smith had described how division of labor creates efficiencies. When Henry Ford set up Model T production on an assembly line in 1908 he combined technology and efficiency to produce an inexpensive automobile. Ford transformed the personal transportation market. Christensen called this process
disruptive innovation.
With a product differentiation strategy a company charges more for its product than its competitors charge for theirs because:
its product is unique in a way that justifies the higher price.
Some popular social media management systems are becoming more difficult to manage because
millions of diverse users across the globe are active participants.
Qualitative data that is not categorized is called nominal data. Qualitative data that is categorized (ranked for example) is considered _____ data.
ordinal
In order to be considered open data databases must provide access rights so that they can be
redistributed.
When selecting the right data it is important to be aware of the source of the data. For example data that is sold by an entity that didn't actually collect the data is considered ______ data.
third-party
What is the goal of the NIST Cybersecurity Framework Protect (PR) function?
to help protect an organization's IT infrastructure from security breaches by offering guidelines on IT infrastructure protection
According to the identify (ID) function of the NIST Cybersecurity Framework what allows an organization to prioritize its efforts where cybersecurity risk is involved?
understanding of its business environment and resources