MIS
How does the cybersecurity goal of preserving data integrity relate to the goal of authenticating users?
Data integrity is more easily preserved if users must be authorized to access data and make changes.
Trying to answer questions such as "what happened?" or "what is occurring?" or "what was the ROI?" is the role of
Descriptive Analytics
Karl Benz invented the internal combustion automobile in 1885. More than a century before, Adam Smith had described how division of labor creates efficiencies. When Henry Ford set up Model T production on an assembly line in 1908, he combined technology and efficiency to produce an inexpensive automobile. Ford transformed the personal transportation market. Christensen called this process
Distruptive Innovation
Which is the best explanation of why technology is highlighted in a PESTEL analysis?
Failing to keep up with advances in technology can harm an organization's competitiveness.
A target market for an organization is the online audience that has demonstrated its interest in the organization's products, services, or activities by following or engaging with the organization on social media.
False
Authenticating the identity of a user, process, or device serves one purpose: to prevent unauthorized access to an organization's assets or resources. Group starts
False
Data and information collected on Instagram sites can only be analyzed by using the tools provided by Instagram.
False
Hardware, software, data, and procedures are four of the five components of a social media information system (SMIS). Group starts
False
The practice of trading used, old, or obsolete products via the internet in exchange for other used or similar products is called re-commerce.
False
Users in a social media information system can rely on providers to safeguard their personal information and profiles.
False
Making use of the research and development conducted by the market innovator and then developing a competing product at a lower price is referred to as the ________ strategy.
Fast Follower
3 Components of SMIS
Hardware and software, data and procedures, and people
An international automobile manufacturer is concerned about how its global operations will be impacted by changing government standards for auto emissions and fuel efficiency. Which component of a PESTEL analysis can best help the manufacturer evaluate any threats posed by these policy changes?
Legal
Under development at MIT, photonic crystals allow solar panels to be twice as efficient by absorbing and converting the sun's
Light
How are social media metrics and social media goals related?
Metrics that correspond to social media goals can serve as key-performance indicators (KPIs) for them.
Qualitative data that is not categorized is called nominal data. Qualitative data that is categorized (ranked, for example) is considered _____ data.
Ordinal
What is the second step in the six-step process of creating an SMIS?
Outline Measurement of Success
When data is anonymized, the PII is eliminated or encrypted. PII includes names, Social Security numbers, addresses, and more and stands for ______ identifiable information.
Personally
Which of the following is a popular Microsoft data analytics program that offers business intelligence as well as data visualization?
Power BI
Data-driven decision making (DDDM) can be facilitated through a six-step processes of Ask, Prepare, Process, Analysis, Share, and Act. Which of these steps refers to creating visualizations and presentations for key stakeholders?
Share
The e-commerce company with the highest revenue is based in which country?
The United States
What do all cybersecurity threats have in common?
They are connected to the loss of information, software, or hardware.
For strategic planning, managers should choose an aggressive strategy if a SWOT analysis reveals that the organization faces weak external ________ and its external opportunities are matched with internal strengths.
Threats
Accelerated mobile pages (AMPs) support m-commerce by utilizing a scaled-down version of hypertext markup language (HTML) to create web pages that load quickly on mobile devices.
True
To properly authenticate, or verify, the identity of authorized users and protect assets from unauthorized users, it is essential to
keep user logins and passwords confidential.
Built on real-time geodata and information provided from wireless mobile devices, ________ are widely used in m-commerce.
location-based services (LBS)
E-commerce transactions that are executed using wireless mobile devices are known as Multiple Choice
m-commerce
What does the identify (ID) function of the NIST Cybersecurity Framework focus on?
organizational understanding of how to manage cybersecurity risks
Which threat to cybersecurity can only come from outside an organization?
ransomware
the practice of selling used, old, or obsolete products via the internet in exchange for a new product or a cash payout, not trading these products for other used products.
re-commerce
A target market is
the audience (online and/or offline) that is most likely to be interested in the organization's products, services, or activities, based on specific demographics and behaviors.
According to We Are Social, 90 percent of adult internet users (aged 16-64) around the world have visited an online retail store on the web.
true