MIS Exam 2
What is legendary GE CEO Jack Welch quoted as saying about competition?
"If you don't have a competitive advantage, don't compete."
The infection of a digital device by a computer virus happens in stages. What is the second step in this process?
An action such as running or opening a file activates the virus.
Which of the following are examples of spear phishing?
An email is sent to employees at a specific company, instructing them to click on a link. That link deploys malware to their device.
The group of laws created to update copyright laws concerning regulation of digital material in accordance with World Intellectual Property Organization treaties is known as the
Digital Millennium Copyright Act (DMCA).
In a DDoS attack, network computers that have been infected by a virus from more than one source computer act as zombies and work together to send out illegitimate messages creating huge volumes of network traffic. The acronym DDoS stands for
Distributed Denial of Service.
A hacker launches an attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests. This would be considered a _________ attack.
DoS
The U.S. Constitution specifically protects freedom of speech from government censorship through the
First Amendment.
A company wants to begin monitoring the Internet usage of its office employees to ensure that their working hours are spent productively. What is the least that the company should do to respect its employees' rights to information privacy?
Inform employees of the monitoring and obtain their consent.
Professor Michael E. Porter published "How Competitive Forces Shape Strategy" in the Harvard Business Review. In this paper, he described how all organizations must develop plans to deal with certain factors if they wish to succeed, or even continue to exist. These became known as
Porter's 5 Forces.
In terms of the Internet, a cookie is
a small text file stored on a user's hard disk.
Cyber criminals often demand ________ as a ransom payment because this type of money is difficult to trace and accessible through any Internet-connected device.
cryptocurrency
Saraiya runs a small café. She would like to start placing small ad buys on social media and hires an analytics firm to determine which platforms she should advertise on. What type of cost would this be considered?
customer acquisition cost
When making an ethical analysis, you should get all the pertinent facts and then
determine the affected.
Using technology to transform a market or to create an entirely new market is called creating a(n) ________ innovation.
disruptive
Karl Benz invented the internal combustion automobile in 1885. More than a century before, Adam Smith had described how division of labor creates efficiencies. When Henry Ford set up Model T production on an assembly line in 1908, he combined technology and efficiency to produce an inexpensive automobile. Ford transformed the personal transportation market. Christensen called this process
disruptive innovation.
Which element of a PESTEL analysis is represented by the use of data mining information from the Bureau of Labor Statistics to gain insight into regional employment figures?
economic
National Weather Service databases are used by modern supply chain management systems to track weather events that could impact logistics. Which element of a PESTEL analysis does this example represent?
environmental
Which dimension of ethical behavior in the digital age includes the question of how much time employees are allowed to spend browsing social media?
establishing standards
Living a virtuous life involves acting with high morals that are logically defined or shaped by
ethics.
Economies of scale means using
large production or purchasing power.
Manufacturing practices that emphasize developing efficient and smooth supply lines and minimizing excess inventory, delays, and waste are
lean techniques.
How your private data and information are used, who has access to them, which techniques and technologies protect them, and the communications and preferences surrounding how they are handled are components of Internet
privacy.
When a large number of buyers seek to purchase a firm's products even when prices increase, Porter's force of customers can be said to have
weakened.
Recently, TechJury compiled a list of cybersecurity statistics that show the impact of different malware and network attacks. What percentage of cyberattacks are aimed at small businesses?
43%
What is the difference between a DDoS attack and a DoS attack?
A DoS is carried out with one source device and a DDoS attack is carried out with many source devices.
Which of the following scenarios represents a customer acquisition cost of $100?
A company spends $100,000 on advertising and marketing in one month. They gain 1,000 new customers in that month.
Six Sigma techniques seek to reduce variance in output to less than how many errors per 1,000,000 manufacturing steps?
3.4
Which type of cookie is lost only if deleted or if is created with an expiration date?
persistent cookie
The Act that specifically requires all pornographic sites to include some sort of age verification is
the Children's Internet Protection Act of 2000 (CIPA).
Which 1986 law makes it illegal to intercept calls or messages without a warrant?
the Electronic Communications Privacy Act
The e-commerce company with the highest revenue is based in which country?
the United States
Which of Porter's 5 forces is countered by the barriers to entering a market?
the force of new competitors
What is a company that purchases consumer behavior information from other organizations engaged in?
third-party data purchase
What is antivirus software used for?
to scan files to identify and remove computer viruses and other malicious programs
A program that appears to be legitimate but executes an unwanted activity when activated is called a
trojan
Making an ethical decision will most likely result in
unintended consequences.
Alyssa says that no one would risk selling operable or effective malware programs, even on the Dark Web. Why is she wrong?
Criminal hackers do make money by selling actual malware.
Which provision of the USA PATRIOT Act was not renewed after it expired in 2015 nor covered by the subsequent USA Freedom Act?
The National Security Agency may not collect mass phone data from United States residents and citizens.
If an increase in price results in a relatively large decrease in demand for the product, the firm cannot easily increase its profit margin. This demonstrates which of Porter's 5 forces?
customers
A ________ deliberately modifies the normal operations of a computer or network through the use of malicious code.
cyberattack
A ________ is committed when a computer is the object of the crime or a computer is used to commit a criminal offense.
cybercrime
When conducting an ethical analysis, what is the last step you should take?
deciding and preparing for consequences
Making use of the research and development conducted by the market innovator and then developing a competing product at a lower price is referred to as the ________ strategy.
fast-follower
Over 50 percent of all innovative products fail in the market, while over 80 percent of the successors to the products succeed. This is a key tenet of ________ strategy.
fast-follower
Because employee education and training are so important to ensuring that all employees can participate in lean manufacturing processes, ________ systems play a key role in success.
human resources management
A sales associate has been hired to write blog posts that will be regularly published on a blog about new beauty products. The blog posts are designed to include the SEO terms that relate to the company's newest skin care product, using the keywords that will also be used in their advertising campaigns. What part of the e-commerce timeline would this be a part of?
implementation
A wi-fi tracker following a shopper's path within a store is an example of what kind of data collection?
indirect tracking
To address the ethical concerns surrounding ________, many employee handbooks state that the organization must use data responsibly and always respect privacy.
information privacy rights
Coffee vendors who operate small, drive-up coffee stands find it difficult to charge significantly higher prices than their many competitors do. What aspect of the coffee stand business makes raising prices difficult?
its low barriers to entry
An international automobile manufacturer is concerned about how its global operations will be impacted by changing government standards for auto emissions and fuel efficiency. Which component of a PESTEL analysis can best help the manufacturer evaluate any threats posed by these policy changes?
legal
A form of spyware that records all actions typed on a keyboard is called a keystroke
logger
E-commerce transactions that are executed using wireless mobile devices are known as
m-commerce.
Along with employees themselves, those most responsible for ethical employee behavior are
managers.
Deepfake technology raises questions about the ethics of
modifying images or video by replacing one person's likeness with another's.
According to Professor Porter, a business must differentiate itself from its competitors. One method is to encourage customers to believe that an organization provides higher quality goods or better service, then the organization can charge a premium, or gain market share, or (ideally) both. For example, by placing a swoop icon on a sweatshirt, Nike is able to charge a higher price. This methodology is called
monopolistic competition.
How have businesses reduced the likelihood of experiencing a data breach?
moving data storage to a cloud service provider such as Amazon Web Services
A checkbox may ask if you want to receive news and updates or participate in surveys from the site. When creating or browsing websites, this checkbox is referred to as an
opt-in and opt-out.
What type of firewall would filter messages coming from a specific, predefined IP address to a spam filter?
packet filter
Cookies that are stored on the hard drive and are not lost when the web browser is closed are called
persistent cookies.
A company regularly honors its employee-of-the-month with a congratulatory post on its social media pages. Which standards should the company establish and enforce to best protect the privacy rights of these employees?
rules of conduct for how social media followers and visitors respond to the posts
Specialized hardware or software that capture packets transmitted over a network are called packet
sniffers.
Sharing infected files and opening an infected email attachment are ways digital device users
spread computer viruses.
A business must not only look at its direct competitors, but also must contend with those firms that offer a product that a consumer might alternatively choose. For example, McDonald's and Burger King can be considered competitors and if one firm raises prices the other firm might gain its customers. However, if both firms raise their prices, customers may choose to purchase pizza instead. Porter refers to this as the force of
substitutes.
Coca-Cola and PepsiCo dominate the soft drink market. However, during the 2000s, many customers switched from soft drinks to water, causing Coca-Cola and PepsiCo to develop Dasani and Aquafina. The ability of customers to switch from one product to an alternate product illustrates what Porter called the force of
substitutes.
If McDonald's and Burger King raise prices too high, customers may switch from burgers to tacos. This illustrates Porter's force of
substitutes.
Apple uses Corning's glass products for all its devices, such as the Gorilla Glass 6 used in the iPhone 11 series. To ensure that it continues to have a strong relationship with this glass industry leader, Apple has invested nearly $500 million toward Corning's advanced glass research division. By building up this relationship, Apple seeks to maintain some control over which of Porter's 5 forces?
suppliers
During the 1950s, automobile manufacturers had little control over labor costs because the United Auto Workers union (UAW) exercised considerable control over labor
supply
Where are session cookies stored?
temporary memory
Which is the best explanation of why technology is highlighted in a PESTEL analysis?
Failing to keep up with advances in technology can harm an organization's competitiveness.
What is a characteristic shared by all devices that can be infected by a computer virus?
They are connected to the Internet.
How do breach and attack simulation technologies help white-hat hackers test security?
They execute thousands of attack techniques continuously to reveal weaknesses.
Which statement best describes how managers use management information systems to develop SWOT analyses?
They use multiple management information systems to examine the key factors that influence the internal strengths and weaknesses of any business.
As e-commerce continues to develop, many retailers are likely to maintain some type of "brick-and-mortar" store or physical location primarily because
consumers expect integrated shopping experiences that include face-to-face options.
How many dimensions or categories can the ethical concerns of the digital age be divided into?
five
When conducting a five-step ethical analysis, the first step in the process is
getting the facts.
An online photo printing company can temporarily lose its e-commerce ubiquity if
its website crashes due to a coding error or attack by hackers.
When conducting a SWOT analysis, an organization's human resource management system is used to evaluate the relative strength or weakness of its
personnel (workforce).
Which of the following statements encapsulates the purpose of the Federal Information Security Management Act?
protect government assets against cybersecurity events
In the financial world, some Nigerian banks have used a fast-follower strategy. To reap benefits, they have
quickly developed and marketed products introduced by Western banks.
One version of this type of malware encrypts a victim's data until a payment is made. Another version threatens to make public a 'victim's personal data unless a payment is made. This type of malware is called
ransomware.
You own a pool installation business and need a list of high-income houses with large backyards. You buy the list from a data marketing company. What is this called?
third-party data purchase
For strategic planning, managers should choose an aggressive strategy if a SWOT analysis reveals that the organization faces weak external ________ and its external opportunities are matched with internal strengths.
threats
Every time you view a webpage, your data is captured in small pieces called packets. How are data packets transmitted across the Internet?
through Transmission Control Protocol/Internet Protocol (TCP/IP)
On an e-commerce presence map, what is presence?
websites, email, social media sites, and offline media
As reported by Andrei Ene, one of the worst malware attacks in the last 10 years is the TBT, or
Tiny Banker Trojan.
The Act that signed into law to monitor terrorist activities and communications following the 9/11 attacks and the 2001 anthrax attack on Congress is the
USA PATRIOT Act/USA Freedom Act.
The Act that comprises a variety of crime statutes including identity theft and unlawful access to stored communications is the
Wiretap Act.
What is the relationship of blue ocean strategy to price leadership versus product differentiation?
With a blue ocean strategy, an organization focuses on both differentiation and price leadership.
Creating an entirely new market is an example of a ________ ocean strategy.
blue
Kim and Mauborgne further refined Porter's price leadership vs. product differentiation concept by highlighting two strategies. Which strategy do they assign to Cirque d'Soleil?
blue ocean
What does business-to-consumer (B2C) e-commerce replace?
brick-and-mortar store locations
Simon sells products with higher perceived values than his competitors' offerings. This provides Simon's firm with
competitive advantage.
Management information systems allow managers to build upon an organization's existing strengths to create
competitive advantages.
With a product differentiation strategy, a company charges more for its product than its competitors charge for theirs because:
its product is unique in a way that justifies the higher price.
In order to gain market share, a business must differentiate itself from its
competitors.
Online marketplaces where one consumer sells to another consumer are called
consumer-to-consumer (C2C).
Rather than creating a new product, Chinese manufacturers have been notably successful at adopting a different strategy. They have been able to make and offer a competing product so rapidly that the majority of adopters have a choice when purchasing the product for the first time. This is referred to as a
fast-follower strategy.
One important ________ is that the firm's employees will learn to use technologies to develop the new product, providing a competitive boost.
first-mover advantage
Lieberman and Montgomery examined the advantages and disadvantages of being the first firm to enter a product into the market. They coined this phenomenon
first-mover advantage.
A manager must conduct an ethical analysis to decide whether an employee is abusing the company's flextime policy. When determining whom will be affected by her decision, it is important that the manager also consider
whether she might personally benefit or be harmed by it.