IS Final Exam Study Guide
The stylist just did a great job and your hair is going to look good for weeks. The stylist charged $70 and you decide to add a 15% cash tip. How big is the tip?
$10.50
If you type =2 + 3 * 6 into a cell in a spreadsheet and then press Enter, what will appear in the cell?
20
Which statement about online presence is true?
A personal brand built through an online presence can help business professionals gain opportunities
Which situation is an example of how social media can complicate professional relationships?
An employee blogs about an embarrassing incident involving his or her boss, who sees the post
Which person illustrates a characteristic of an excellent business thinker?
Barras uses a variety of sources such as journal articles and colleagues' expertise.
Headquartered in Toronto, ________ has developed a software application that serves as an early warning system for identifying pandemics.
BlueDot
Which of the following is the clearest definition of a computer virus?
Code-created malware that, when executed, damages programs and performance.
One of Google's companies that is investigating AI and Machine Learning is called
DeepMind
Gowan has been hired by Bailey's Automotive to assess whether the company should air television commercials in the local market. He is planning a study of the relationship between local television commercials and the sales of new vehicles. What is the best way for Gowan to establish a research objective that will address his research problem?
Determine how often television commercials result in purchases of new vehicles.
Which meta message would most likely be communicated through a professional networking site such as LinkedIn?
I am committed to my industry
A business message that primarily relies on the ________ shows that the message is self-centered.
I-voice
Which social media goal directly aligns with an organization's mission to increase the public's environmental awareness by increasing news coverage of environmental issues?
Increasing the conversion rate of its social media posts to full news stories
In a press-release style message, the "story" is written in third person in a style often referred to as ________ style.
Inverted Pyramid
How are data in process different from data at rest or data in storage?
It is held in the device's RAM until it can be processed by the CPU or GPU.
Which of the following statements describes a keylogger most accurately?
It is surveillance malware that captures confidential information through keyboard input.
Which of the following statements best illustrates why a rootkit is described as creating a back door?
Like an intruder coming through a back door, a rootkit allows an unknown user into an operating system.
How are social media metrics and social media goals related?
Metrics that correspond to social media goals can serve as key-performance indicators (KPI's) for them
How has social media changed the way businesses measure consumer behavior?
Social media makes it easier to collect the kind of data that are meaningful to businesses.
For the past few months, Denver Framing has experienced high employee turnover. After investigating, human resource manager Kyle discovered that most employees are unhappy with their salaries and therefore unmotivated to work. Kyle plans to craft a message using the direct approach. How should he structure it?
State the primary message; lay out supporting reasons; conclude with a call to action.
The first two steps of the six-step process in creating a social media information system (SMIS) involve developing social media goals and setting metrics. What are the third and fourth steps of the process?
Step 3: identify the organization's target market; Step 4: determine and integrate into the SMIS design traits valued by the target market.
What is the goal of the planning phase of the plan-protect-respond cycle?
Understand common threats that an organization may face and determine how vulnerable they are to such threats.
A function that looks for a value in the leftmost column of a table, and then returns a value located in the same row as the first value, is called a
VLookup
In Apple iWork's Numbers the freeze options are located under the Table tab. In Microsoft Excel and Google sheets the freeze cells or panes options are found in the ________ menu.
View
Rafi's company is having trouble recruiting employees with the right skills. He needs to choose someone to analyze the problem and suggest potential solutions. Which employee should he choose?
Wade has a knack for explaining complex issues in a clear, understandable way.
A social media information system (SMIS) should be designed to gather and analyze social media data because
a company can use platforms' data about its activities and audience to improve its social media strategies and business decisions.
Peyton wants to make his team's discussion forum more effective. Which strategy would best help him accomplish that?
acknowledge teammates' ideas
An effective social media information system (SMIS) collects and analyzes data about the organization's
activities and audience on social media and on its own websites
Learning platforms that use algorithms to adjust the content that each student sees in order to maximize learning efficiency is called ________ learning.
adaptive
Because the technology allows a robot arm to act more like a human's with regard to spatial recognition and safety awareness, while maintaining all of the advantages of a traditional industrial robot, ________ can make robots much more flexible and safer.
adaptive robotics
What is the final step in the six-step process of creating an SMIS?
analyze the collected data
"Cybersecurity threat mitigation" includes all of the policies, procedures, and tools that help organizations
anticipate and counter threats from security vulnerabilities or incidents and reduce their impact.
Which statement describes how writers should address the priorities of their targeted audience during the AIM planning process?
assign importance to things, such as projects, goals, and tasks
Using cyberattacks, such as the May 2017 WannaCry ransomware attack which struck British hospitals particularly hard, is an example of how a nation with less military strength can level the field using technology. This is an example of ________ warfare.
asymmetric
During which step in the AIM planning process should you consider the constraints your readers face?
audience analysis
Allowing people to share a digital ledger across a network of computers, ________ uses computer code to create concatenated (linked together) blocks of transactions.
blockchain
Facts are statements that
can be relied on with a fair amount of certainty.
Malicious bots are cybersecurity risks because they
can reproduce and link to an outside server
Saving a spreadsheet file in .csv format only saves the
cell values
A public relations team's first step is to
clarify the company's brand
The development of Web 2.0 tools has contributed to the development of more
collaborative networks
A business is planning on using sponsored social media content for its new product, which is appropriate for people in different age demographics. Which generation would be best targeted by sponsored posts on Instagram?
college students
What is the name of the study of how people make purchases and why they buy products and services?
consumer behavior
What are the core actions of the protect (PR) function?
controlling access to systems and preventing unauthorized access
Mason maintains an exhaustive database on his research sources and findings, which he shares with decision makers at Oriel Pharmaceuticals when presenting his report on the marketing approach for a new drug. This practice will increase the ________ of Mason's report.
credibility
What has the greatest influence on the impact of social media in the workplace?
cultural norms and values
One primary purpose or function of a company's social media information system (SMIS) is to connect the company's
customers on social media with its products and services on its websites
Arla, an executive at American Hustle, Inc., wants to introduce a profit-sharing program. She needs to convince the other executives that it is a good idea for their company. She has considered her audience and gathered information. Next, she should
decide how to frame her primary message
When using a shared file platform, it is important to
discuss protocols for co-editing files
Elmer is creating a table to show how the company has performed in the past year month by month. The most effective way to make the table easy to understand would be to
ensure that each grid line serves a distinct purpose
What is typically included in the reviewing stage of writing an effective business message?
ensuring that the communication is fair
In order to be effective, a consumer survey should contain
exhaustive answer choices for each question
When creating a blog, you should use naming, labeling, indexing, and tagging to
help others find your information
Kwame, the owner of Fantastico's, wants to graphically represent a comparison of his restaurant's market share with those of the top competitors in the same city. His research findings conclude that Fantastico's has the largest market share. In order to present this data most effectively, Kwame should
highlight the key points using color or labels
What does the General Data Protection Regulation (GDPR) regulate?
how companies protect personal data
Charlie has been assigned the task of creating an effective business message aimed at encouraging healthy habits in the workplace. He uses the AIM planning process. What should he do during the information gathering stage?
identify problems that prevent employees from making healthy choices
In the context of the AIM planning process, what tends to be the single most important planning step for many messages?
identify reader benefits and constraints
An appropriate social media goal for a business that wishes to raise its public profile is increasing brand awareness.
increasing brand awareness
When business professionals enter into primary research with preexisting assumptions or conclusions, they are likely to
interpret the data incorrectly
Which is the best definition of a cybersecurity exploit?
it is the means by which a hacker capitalizes on a cybersecurity vulnerability to do harm
One surveillance technology that relies on how the user enters data is a
keylogger
In the course of creating an effective business message, excellent business thinkers are most likely to
make well-reasoned conclusions and solutions
Which of the following acts is an example of social engineering?
manipulating people in order to obtain and misuse their personal information
Overall and underlying messages that others decode from your online communications are referred to as ________ messages.
meta
In order to make business messages more positive, business writers should focus on actions they can accomplish and demonstrate a realistic optimism. However, they should be careful
not to set unrealistic expectations
Where are data in transit found?
on a cellular network
What is the second step in the six-step process of creating an SMIS?
outline measurements of success
Which element is a typical Web 1.0 communication?
photos of a restaurant menu posted online
Bankers and other lenders refer to the initial amount of the loan (the principal) as the loan's
present value (PV)
The U.S. Census Bureau is using differential ________ to make census data secure and private.
privacy
The total value of a company is based on how much customers value its
products, services, and areas such as corporate philanthropy, social responsibility programs or policies, manufacturing processes, and brand attributes.
What is one of the most common types of effective posts when establishing a professional reputation?
promoting your employer
When displaying financial information, the accepted practice is that ________ indicates negative values.
red
In which situation should the origin of information be authenticated to protect data integrity?
reliability
What is most likely to show that the writer of a business message has concern for the audience?
respecting the autonomy of the reader
A corporation that was recently the victim of hacking that was caused by a high-level employee falling for a phishing scheme institutes a required, annual, self-paced training module that alerts employees to the most common recent phishing attacks. The institution of this new training requirement represents which phase of the plan-protect-respond cycle?
respond
For which type of cybersecurity vulnerability do organizations maintain and share databases of known problems?
security weaknesses in operating systems or application software
Karla's company uses an internal social networking platform. Karla's posts usually involve awards she has won or praise she has received. She rarely comments on others' posts. Others will most likely see her as
self-promoting
What is typically included in the writing stage of developing an effective business message?
setting a positive and other-oriented tone
Adish is analyzing the benefits and feasibility of implementing a stress-reduction program on a fixed budget. Through research, Adish learns that the cost of a stress reduction program exceeds the proposed budget. He also learns that such programs are linked to increased employee health and morale. Adish then advises the company leadership to implement the program because it will be effective at improving the well-being of employees. Adish is guilty of
slanting the facts
Currently, apps that run on the Cloud are ________ as compared to apps that run on local machines. Edge computing is a method of optimizing cloud computing systems by performing data processing at the edge of the network, near the source of the data and it is possible that cloud computing may take a back seat to edge computing.
slower
Suppose you are a company whose target market is identified as homeowners who live in suburban regions of the American Midwest. From the list below, choose the product you are most likely selling.
snow blowers
Of the listed methods of collecting demographic information, which is the most effective for organizations defining their target market?
social media
Adding a dedicated group to your Facebook account allows you to meet online and keep in touch with others who share your interest. You can post relevant media, such as photos, articles, and videos. Which role in a social media information system (SMIS) does your group fit into?
social media committee
What is something an excellent business writer would do?
spend more time planning than writing
Because they make it easy to arrange, display, and calculate numerical data, ________ programs are commonly used in nearly every business setting.
spreadsheet
Programs such as Microsoft Excel, iWork's (Apple) Numbers, Google Sheets, and OpenOffice Calc, that allow users to arrange numerical data are called
spreadsheets
________ was launched in 2014 by Skype co-founders, Ahti Heinla and Janus Friis. The company's vision is to revolutionize food and package deliveries across the globe. Starship robots can carry items within a 4-mile radius.
starship
One major threat to productive discussions is inconsistency. Firstcomers to a forum discussion are most likely to cause problems by
stating their opinion but failing to take part as the conversation evolves
A leading question is one that
suggests how you want the respondents to answer
Components of a social media information system (SIMS) combine to
support a companys marketing strategy through social media
What do the deductive approach and inductive approach to structuring business messages have in common?
the arrangement of supporting ideas is important
During the Information Age, the role of public relations broadened, and it came to be seen as a key component of
the marketing mix
Which statement accurately describes microblogs?
they contain just a few sentences per entry
Which social media metric is probably the most useful for determining whether a company is increasing its brand awareness on social media?
total mentions of the company on social media
According to the identify (ID) function of the NIST Cybersecurity Framework, what allows an organization to prioritize its efforts where cybersecurity risk is involved?
understanding of its business environment and resources
The NIST Cybersecurity Framework is a
voluntary guide for organizations
5G cellular technology offers the promise of download speeds as high as 20 Gbps. This will likely require more antenna arrays with each antenna sending out ________ microwave signals.
weaker
A meta message is
what people take away from a communication
In which situation should the origin of information be authenticated to protect data integrity?
when electronic votes are submitted during an election
Reports or guides that are issued by the government and organizations and that generally describe research about solving a particular issue are
white papers