MGMT 2303

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Why does emerging technology matter?

- innovation and progress - economic growth - efficiency

Extended reality (XR) utilizes the following technologies?

- mixed reality (MR) - augmented reality (AR) - virtual reality (VR)

What are the problems with traditional robots?

- no awareness of surroundings - can be dangerous near humans - can only do limited tasks

What are the benefits of Adaptive Robots:

- work faster than humans - work is more accurate than humans - do not get distracted

If the number 6 is in cell C4, and the number 5 is in cell D5, then the formula: =SUM(C4,D5) would result in

11.

If you type = 8 / 2 * 4 + 1 into a cell in a spreadsheet and then press Enter, what will appear in the cell?

17

If you type = 2 + 3 * 6 into a cell in a spreadsheet and then press Enter, what will appear in the cell?

20

If you type = 3 + 12 * 6 into a cell in a spreadsheet and then press Enter, what will appear in the cell?

75

Which 2 cell entries will result in 6?

=6*1

To multiply the value in cell B3 times the value in cell E2, you could use the PRODUCT function. Alternatively, you could simply enter

=B3*E2.

Which of the following entries would subtract the value in cell F3 from the value in cell D6?

=SUM(D6,-F3)

What is the essential purpose of a supply chain management system (SCM)?

A SCM helps managers anticipate supply issues, such as increased demand or production slowdowns, so they can make quick accommodations.

A corporation's Twitter report card indicates that engagement has dropped off in the past two months. What information from the tweet activity dashboard could they use to determine the cause of this drop off in engagement?

A change in demographics of the people who are engaging with their tweets.

How does supply chain visibility provided by a supply chain management system reduce the bullwhip effect?

Accurately predicting how many units of an item are expected to sell allows manufacturers to accurately source for the correct amount of raw materials and avoid overreacting to fluctuations in consumer demand.

What does the formula =SUM(C4,D5) mean in plain language?

Add the values in cell C4 and cell D5.

Which of the following is an example of an organization using knowledge gained from social media to make better strategic decisions.

An organization analyzes engagement with different sponsored posts to determine which ones generate the most engagement with their target audience.

Which statement best describes the impact of Moore's Law on business management systems?

As computer chips become more powerful, more powerful business management software is written and the overall system's capabilities improve.

How might a professor use an LMS to keep track of attendance in a class that is held face to face?

At the beginning of each class period, students are required to use clickers to take a brief multiple-choice test to indicate they are present.

Data analysts are likely to have achieved what education level when beginning their career?

Bachelor's degree

A sophisticated SCM can reduce the impact of the phenomenon that often occurs when small variations in consumer demand create amplified demand variations in the supply chain. This phenomenon is referred to as the

Bullwhip effect.

Businesses that rely on Quickbooks may need a decision support system, but this financial management software for small businesses does not provide one. What other resources are easily available?

Business analytics software apps that integrate with QuickBooks are available.

To access numerous management options for a column, row, or worksheet in Excel, you can just right-click on the associated header. This opens the ___ menu.

Context.

Which type of cybersecurity breach makes a computer, network, or online service malfunction or become unavailable to users?

DDOS attacks

Marketing manager Zia needs to know if increasing the firm's social media advertising budget will result in a higher return-on-investment. She uses a decision support system (DSS) to determine how much of a budget increase is needed to achieve a targeted sales increase. Later, if actual sales data do not match the DSS determination, Zia will rely on the system to adjust its recommendations. What does this example demonstrate?

DSS is a form of artificial intelligence.

How does the cybersecurity goal of preserving data integrity relate to the goal of authenticating users?

Data integrity is more easily preserved if users must be authorized to access data and make changes.

For any formula or function in Excel, there should first be a(n) ___ sign in the cell.

Equal (=)

Is it easier for an autonomous truck to operate in a highly congested city streets than on major interstates with speeds reaching 75 MPH?

FALSE

Social media providers include which of the following web-based platforms?

Facebook, Instagram, and Twitter

A marketing manager requests and receives a report on consumers who use a competing brand of laundry detergent. Included in this report is demographic information such as age, gender, and geographic location; frequency with which the product is purchased; estimated amount of revenue generated by this product per geographic location; and qualities that consumers rank as important to their purchasing decision. These reports represent what function of a marketing information system (MKIS)?

Gathering marketing data

How does a cybersecurity exploit threaten the safety of a system?

It is a tool or technique for taking advantage of a system vulnerability to cause harm.

Which is the best definition of a cybersecurity exploit?

It is the means by which a hacker capitalizes on a cybersecurity vulnerability to do harm.

________ shows that the number of transistors on a computer chip doubles roughly every 18 months, a phenomenon that reflects the speed at which business management systems and other technologies can advance.

Moore's Law

The phenomenon in which computer chips double in computing power roughly every 18 months is called

Moore's Law.

Which of the following is a popular Microsoft data analytics program that offers business intelligence as well as data visualization?

Power BI

Data-driven decision making (DDDM) can be facilitated through a six-step processes of Ask, Prepare, Process, Analysis, Share, and Act. Which of these steps refers to creating visualizations and presentations for key stakeholders?

Share.

Social engineering is used to target people whom

Social engineering is used to target people whom

Select that is NOT part of the "digital twin" components?

Software limited by changes in color

What is a benefit a student gains by using an LMS?

Student performance is more easily tracked through the gradebook, giving a student a constantly updated view of what their grade will be.

A manager wants to accurately predict how many light-up three-wheeled scooters they'll need to meet holiday demand. Which component of supply chain management would the manager be using to determine the appropriate number to produce?

Supply chain planning.

Which of the following is a popular data analytics program that offers business intelligence as well as data visualization?

Tableau.

Which would organizations be interested in the information on interactions and preferences that social media sites can provide?

The more an organization knows about users' interactions and preferences, the more strategic their targeting can be.

What do all cybersecurity threats have in common?

They are connected to the loss of information, software, or hardware.

Rana's employment agency is a startup with a one-person IT department, but it requires a business management system that can meet unique needs. Which type of business management system should she adopt?

a custom, cloud-based solution (PaaS or IaaS)

Troy has a customized business management system that he likes. However, it cannot easily scale up to meet his growing database storage needs, offers poor protection from hackers, and requires maintaining a large IT department. Troy should replace this system with

a custom, cloud-based solution (PaaS or IaaS).

Which component of a business management system can help a manager check and report on the company's current inventory?

a database management system (DBMS)

The business management system with the lowest initial or startup expenses is

a software as a service (SaaS) option.

Which type of business management system is best described as an "off-the-shelf" (OTS) or prepackaged system?

a software as a service (SaaS) system.

In Excel, the cell that a user has selected is referred to as the ___ cell.

active.

In Microsoft Excel, a name box (located to the left of the formula bar) shows the ___ cell.

active.

Managers have the greatest degree of control over a new business management system that is implemented as

an on-premises solution.

Which type of business management system would best enable executives to quickly adapt to dynamic business environments by implementing their own changes?

an on-premises system

Someone who possesses the knowledge of processing software, business strategy, and analytical skill to deliver data and reports that guide management and executives as they create well-informed decision making is known as a data

analyst.

"Cybersecurity threat mitigation" includes all of the policies, procedures, and tools that help organizations

anticipate and counter threats from security vulnerabilities or incidents and reduce their impact.

Organizations that use an on-premises business management system

are also responsible for maintaining, updating, and securing the system.

The model of a decision support system (DSS), or business intelligence (BI) system, typically adapts its processes based on the degree of accuracy of each prior decision. This type of processing can be called

artificial intelligence

A marketing manager wants to determine which marketing campaign for a specific product was the most successful as determined by the amount of revenue generated. She uses the company's MKIS to determine how much revenue was generated for each of the three major campaigns run that year to determine revenue generated as compared to the cost of the campaign. This is an example of using an MKIS to

assist with cost-benefit analysis.

Data analysts must blend facts and data with knowledge about the

business or organization.

The purpose of programs that analyze connection data is to

create information about user behavior and patterns to benefit a sponsor.

The 3-step data visualization process consists of exploring the data sets for pattern, then planning for visuals, and finally

creating your visuals.

An organization learns from a social media site that less than 10 percent of users who visit their page engage with the video that is pinned to the top. This is an example of what type of information?

customer interaction

Providing visibility means that the user interface of any SCM remains a critical component. Typically, a user interface comes in the form of a

dashboard.

A business management system includes three main components: a decision-making information system, a predictive information system, and a

database management system.

A database management system (DBMS) is a computer program that is used to create, process, and administer a________.

database.

What software systems are commonly used across the logistics industry, from railway scheduling to managing port visits for ships to operating locks on waterways?

decision support systems

To ensure adequate spacing between flights, track changes in aircraft airspeed and altitude, and issue alerts at any deviations, air traffic controllers use

decision support systems (DSS) also known as business intelligence

Which advance in MIS technology or tools could pose the greatest threat to a manager's job security?

decision-making software or apps

Trying to answer questions such as "what happened?" or "what is occurring?" or "what was the ROI?" is the role of

descriptive analytics.

The primary goal of a company's social media strategy is to

engage potential customers.

Authenticating the identity of a user, process, or device serves one purpose: to prevent unauthorized access to an organization's assets or resources.

false

During Mr. Kemps presentation, he stated that learning about capitalism is not worth your time?

false

Users in a social media information system can rely on providers to safeguard their personal information and profiles.

false

Database Management Systems (DBMS) assign users different access rules to protect the data and users from________, data leaks, and the misuse of data.

identity theft

What are the key impacts of Quantum Computing in Business Information Systems?

idk

Select the device most UNLIKELY to be used in autonomous trucks?

lidar?

AI Chatbots utilize algorithms, Blank 1, and natural language processing (NLP) to interpret user inputs and provide automated responses.

machine learning

A social media information system (SMIS) is composed of three parts, which are

people, data and procedures, and hardware and software.

Databases are designed to keep data and information about different types of data objects, including objects, events,________, and places.

people.

What is the overall goal of a decision support system?

problem solving by providing vital information or indicating areas of influence

A corporation that was recently the victim of hacking that was caused by a high-level employee falling for a phishing scheme institutes a required, annual, self-paced training module that alerts employees to the most common recent phishing attacks. The institution of this new training requirement represents which phase of the plan-protect-respond cycle?

respond

When you're using Excel, to hide column D, first click on the column heading to select the column, and then ___ to open the menu and select Hide.

right-click

To delete a row in Excel, click on any cell in the row and SHIFT + Spacebar to select the row, then CTRL + Minus (−) to delete it. Alternatively, simply ___ on the row heading and select Delete from the context menu.

right-click.

A major trend in data analytics is the use of artificial intelligence to focus on small data which is more precise, using small datasets that are capable of impacting decisions in the present. This is known as______ AI.

scalable

Adding a dedicated group to your Facebook account allows you to meet online and keep in touch with others who share your interest. You can post relevant media, such as photos, articles, and videos. Which role in a social media information system (SMIS) does your group fit into?

social media community

SQL is used to communicate with a database. According to ANSI (American National Standards Institute), it is the________ language for relational database management systems.

standard

One way to visualize a data ecosystem is to apply it to the data project life cycle. The Data Science Ready project outlines the five steps of the data project life cycle. The final stage in this life cycle is

storage.

SQL allows users to isolate specific information contained in a database, as well as to aid in the selection, creation, addition, and extraction of data from a database. SQL stands for______ query language.

structured.

A logistician for an oil company receives an alert from the software she uses that a supertanker has been delayed. In addition, she receives a choice of reasonable actions to take. What software is she likely using?

supply chain management software

Components of a social media information system (SMIS) combine to

support a company's marketing strategy through social media.

Relational databases organize data into________ based on structured data groupings.

tables.

What object is used to store information when creating a database?

tables.

What is the meaning of the term "social engineering" in the area of cybersecurity?

the act of manipulating or tricking people into sharing confidential, personal information

What is the least likely reason to ask a question?

to impress your boss/professor

Are there any ethical questions for startup firms utilizing gene modification such as CRISPR?

true

Choosing to target single women over 40 who live in metro areas and frequently "like" cat memes on different social media sites is an example of an organization using data to make an informed business decision.

true

Cybersecurity risk analysis weighs the costs versus the benefits of instituting countermeasures to cybersecurity events.

true

Cybersecurity vulnerabilities can be intentionally exploited or accidentally allowed to compromise system security.

true

Edge computing reduces the latency of data travel from devices to and from the data center?

true

In our presentation on Emerging Technology, can forklift trucks be operated remotely from a location that is hundreds of miles away?

true

Is a "Digital Twin" a software representation of a piece of equipment?

true

LIDAR is similar to RADAR but it uses light instead of sound waves?

true

People who register with social media providers in order to engage make up social media communities.

true


संबंधित स्टडी सेट्स

Comptia Security + Chapter 5 System Security Threats

View Set

Ch. 3- Groups, Teams, and Powerful Meetings

View Set

AP Human Geography Unit 5 Test - Study Guide

View Set

Professional Cooking - Chapter 13 "Legumes, Grains, Pasta, and other Starches"

View Set

Week 2 - Get to know the user / Get to know UX design best practices and trends / Weekly challenge 2: Thinking like a UX designer

View Set