MIS 2020 Midterm
Which of the following scenarios represents a customer acquisition cost of $100?
A company spends $100,000 on advertising and marketing in one month. They gain 1,000 new customers in that month.
With more than one answer being correct, select all of the following scenarios that show interaction between SMIS components.
A company's information systems (IS) group researches and chooses a program that can deliver content to several social media providers at the same time. Every day, a social media specialist at a start-up checks the news, plans how and what to tweet, quickly messages a manager, and sends the approved tweets. Social media providers rely on user data to better serve sponsor organizations.
________ uses computer code to create concatenated (linked together) blocks of transactions, allowing people to share a digital ledger across a network of computers.
Blockchain
Which statement inaccurately describes the need to keep sensitive data, information, and systems confidential?
Cybersecurity is a major requirement for only large companies.
Buying and selling of goods and services that are executed through cloud devices (including smartphones and wireless access points) are known as C-commerce transactions.
FALSE
Organizations can only use Facebook's Audience Insights to learn financial information about people who have engaged with the organization by "disliking" their page or attending an event hosted by the organization.
FALSE
Of the following, which is the best explanation of why technology is highlighted in a PESTEL analysis?
Failing to keep up with advances in technology can harm an organization's competitiveness
What groups of people can Audience Insights generate information about? More than one answer may be correct.
People who speak a specific language. All Facebook users. Facebook users who have indicated interest in an event publicized on Facebook.
A business-to-consumer transaction is considered to be the selling of products and services to individual consumers.
TRUE
Which of the following is a popular data analytics program that offers business intelligence as well as data visualization?
Tableau
From the answers below, select the best examples of information businesses get from social media to make more informed decisions? More than one answer may be correct.
The age, gender, and location of people who watched an advertisement a company posted on Facebook. What percentage of male users clicked on the link within a promoted tweet in their timeline? The demographics of people who completed a purchase after clicking on a sponsored post on a social media site.
Per our reading, the main purpose of a social media information system (SMIS) is to
allow social network users to share content
Data analysts must blend facts and data with knowledge about the
business or organization
When using SMIS, providers deliver which of the following kinds of user data to sponsors? More than one answer may be correct.
content data from user interactions connection data from user relationships with other sources data that reveal user behavior and connection patterns
The purpose of programs that analyze connection data is to
create information about user behavior and patterns to benefit a sponsor
The 3-step data visualization process consists of exploring the data sets for pattern, then planning for visuals, and finally
creating your visuals
When working in Tableau, users can assume which three roles?
creators explorers viewers
Campaign managers increasingly rely on _________ because so much information regarding voters' political attitudes is available online.
data mining
Some of the responsibilities of a data analyst include which three of the following?
data visualization data structuring data reporting
Karl Benz invented the internal combustion automobile in 1885. More than a century before, Adam Smith had described how division of labor creates efficiencies. When Henry Ford set up Model T production on an assembly line in 1908, he combined technology and efficiency to produce an inexpensive automobile. Ford transformed the personal transportation market. Christensen called this process
disruptive innovation
The three-step data visualization process is comprised of which of the following?
explore data sets for patterns create your visuals planning for visuals
To avoid the embarrassment of a misplaced debit card, some companies allow consumers in China to make purchases without cards or cash. The system uses
facial recognition
Instead of creating a new product, Chinese manufacturers have been notably successful at adopting a different strategy. They have been able to make and offer a competing product so rapidly that the majority of adopters have a choice when purchasing the product for the first time. This is referred to as a
fast-follower strategy
Lieberman and Montgomery coined what phenomenon when they examined the advantages and disadvantages of being the first firm to enter a product into the market.
first-mover advantage
In cybersecurity risk analysis, PML (probable maximum loss) is used to
help determine spending needed to adequately secure an organization's IT infrastructure.
Which of the NIST Cybersecurity Framework functions investigates an organization's cybersecurity management in the context of their business needs and resources?
identify (ID) function
Uses of data analytics include which three of the following?
improved decision making improved patient experiences and internal procedures in health care improved customer service
An online photo printing company can temporarily lose its e-commerce ubiquity if
its website crashes due to a coding error or attack by hackers
A multi-national automobile manufacturer is concerned about how its global operations will be impacted by changing government standards and regulations for auto emissions and fuel efficiency. Which component of a PESTEL analysis can best help the manufacturer evaluate any threats posed by these policy changes?
legal
Autonomous driving systems used by Tesla have raised some concerns from industry experts. They fear the technology used in Tesla's vehicles lacks the use of ________, a critical component in most autonomous vehicles.
lidar
The CIA triad defines which item as a goal related to confidentiality?
making sure the right people have access to secure information
Data in transit is generally found where?
on a cellular network
What is the second step in the six-step process of creating an SMIS?
outline measurements of success
A cost-benefit analysis is a useful tool used to analyze the costs associated with implementing a project or set of activities and the benefits that can be achieved as a result of the implementation. Which of the following would be considered benefits when conducting a cost-benefit analysis? More than one answer may be selected.
potential return on investment potential costs averted brand exposure
The organizations likely to benefit the most from the global reach of e-commerce are those that
previously depended on foot traffic into one physical store to sell their products
A cybersecurity threat which generally comes external from outside an organization is deemed:
ransomware
A major trend in data analytics is the use of artificial intelligence to focus on small data which is more precise, using small datasets that are capable of impacting decisions in the present. This is known as ______ AI.
scalable
Databases of known problems are maintained and shared by organizations to minimize which type of cybersecurity vulnerability?
security weaknesses in operating systems or application software
When identifying the vulnerability to an organization's automated backup system related to data loss or corruption, the weakness originates with
software
Components of a social media information system (SMIS) combine to
support a company's marketing strategy through social media.
To increase sales, a sportswear chain is designing a promotional campaign for social media. It plans to post links to coupons on its website and have its sales personnel scan the coupon redemption codes at store registers. Which are the best social media information system (SMIS) metrics to track the success of this promotion?
the sales statistics linked to the coupon redemption codes
When selecting the right data, it is important to be aware of the source of the data. For example, data that is sold by an entity that didn't actually collect the data is considered ______ data.
third-party
Common issues that e-commerce businesses face include
threats to customer data unstable customer loyalty
Manuel runs a small business that paints residential interiors. He has decided most of his current customers can best be reached by sending out a seasonal email newsletter. He will target new customers by placing ads on Facebook targeted at people located within 20 miles of his business who have searched for house painters. Where would he place this information on an e-commerce presence map?
type of presence
Which of the following are areas that are covered on an e-commerce presence map? More than one answer may be selected.
type of presence the platform the activity
According to the identify (ID) function of the NIST Cybersecurity Framework, what allows an organization to prioritize its efforts where cybersecurity risk is involved?
understanding of its business environment and resources
The most significant damage to an organization's systems, data, and information is caused by which type of attack?
viruses
Cellular technology called 5G offers the promise of download speeds as high as 20 Gbps. This will likely require more antenna arrays with each antenna sending out ________ microwave signals.)
weaker
Michelle runs a shop on Etsy. One month, she spends $2,800 to promote her shop on Etsy and other social media sites. In that month, she gains 50 new customers. All customers purchased products that cost $100, that were marked up 100 percent. What is the actual amount of revenue earned per customer, taking into account materials and promotional costs?
−$6.00