MIS Midterm

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

What are examples of data with integrity

1. data that are used to set sales goals for account executives are stored on a secure server 2. Managers are allowed read only access to the sales data for the reps that they manage.

What is the six step process for Data Decision making (DDM)?

Ask, prepare, process, analysis, share, act

Online marketplaces where one consumer sells to another consumer are called

Consumer to consumer

Which type of cybersecurity breach makes a computer, network, or online service malfunction or become unavailable to users?

DDOS attacks

6 step rocess of creating an SMIS

Define your Goal -> Outline Measurements of success -> Determine customer values -> Define your value -> Establish connections with customers -> Analyze and valuate collected data

Sears revolutionized catalog (mail order) sales but failed to make the e-commerce leap. Amazon capitalized on this technology. What concept underlies Amazons success?

Disruptive innovation

Who has not suffered the embarrassment of a misplaced debit card? Some companies allow consumers in China to make purchases without cards or cash. The system uses:

Facial recognition

Of the following, which is the best explanation of why Technology is highlighted in a PESTEL analysis

Failing to keep up with advances in technology can harm an organization's competitiveness

The type of e-commerce transaction that allows consumers to interact with government or authoritative bodies for activities such as paying taxes, securing building permits, or paying tuition at a university, is referred to as a consumer-to-governance transaction.

False

t or f: A company that has created connections with it's target markets on social media can depend on these followers to regularly engage with its posted content and create traffic to it's website

False: company's must work to maintain connections

t or f: Information about geographic locations that is stored in a geographic Information System (GIS) is referred to as Geo-advertising

False: geo data=GIS

t or f: In an e-commerce presence map, the activity includes the methods used to reach stakeholders and customers, including desktop and mobile platforms, social media sites such as instagram of facebook, blogs, magazines, radio stations, and tv stations?

False: platform is the method

Over 50% of all innovative products fail in the market, while over 80% of the successors to the product succeed. This a key tenant of what strategy

Fast followers strategy

To properly authenticate, or verify, the identity of authorized users and protect assets from unauthorized users, it is essential to

Keep users logins and passwords confidential

Tesla's autonomous driving system has raised some concerns from industry experts. They fear the technology used in Tesla's vehicles lacks the use of ________, a critical component in most autonomous vehicles.

Lidar

Who published "How Competitive Forces Shape Strategy" in the Harvard Business review in 1979?

Michael E. Porter

What does the identify (ID) function of the NIST Cybersecurity framework focus on?

Organizational understanding of how to manage cybersecurity risks

Why are probable loss calculations important?

Organizations have limited funds to use towards system protections

When data is annonymized, the PII is eliminated or encrypted. PII names include, Social Security numbers, adresses, and more stands for _______ identifiable information

Personally

Professor Michael E. Porter published "How competitive forces shape strategy" in the Harvard Business Review. In this paper, he described how all organizations must develop plans to deal with certain factors if they wish to succeed, or continue to even exist.

Porter's 5 Forces

Which of the following is a popular Microsoft data analytics program that offers business intelligence as well as data visualization?

Power Bi

Porter's 5 Forces

Power of a company's competitive rivals, potential new market entrants, suppliers, customers, and substitute products

Collections of related fields in a database are referred to as

Records

Data project life cycle

Sensing -> Collecting -> Wrangling -> Analysis -> Storage

Data-driven decision making (DDDM) can be facilitated through a six-step processes of Ask, Prepare, Process, Analysis, Share, and Act. Which of these steps refers to creating visualizations and presentations for key stakeholders?

Share

Data-driven decision making (DDM) can be facilitated through a six step process of ask, prepare, process, analysis, share, and act. Which of these steps refers to creating visualizations and presentations for key stakeholders?

Share

Which PESTEL factor can managers monitor by improving communications throughout the organization and gaining better perceptions of consumers' opinions using CRM software?

Social Cultural

Of the listed methods of collecting demographic information, which is the most effective for organizations defining their target market?

Social Media

Which role in a social media information system does a Facebook group fit into?

Social Media community

How has social media changed the way businesses measure consumer behavior?

Social Media makes it easier to collect the kind of data that are meaningful to businesses

Adding a dedicated group to your Facebook account allows you to meet online and keep in touch with others who share your interest. You can post relevant media, such as photos, articles, and videos. Which role in a social media information system (SMIS) does your group fit into

Social media community

As of 2020, all legislation that has been passed to protect elections from cybersecurity threats are part of

State-specific cybersecurity laws

One way to visualize a data ecosystem is to apply it to the data project life cycle. The Data Science Ready project outlines the five steps of the data project life cycle, the final stage in this life cycle is

Storage

What allows users to isolate specific information contained in a database, as well as to aid in the selection, creation, addition, and extraction of data from a database?

Structured Query Language (SQL)

Cornings glass products are used by Apple for all it's devices, such as the Gorilla Glass used in the iphone series. To ensure that it continues to have a strong relationship with this glass industry leader, Apple has nearly invested $500 Million toward Corning's advanced glass research division. By building up this relationship, Apple seeks to maintain some control over which of Porter's 5 forces?

Suppliers

Which of the following is a popular data analytics program that offers business intelligence as well as data visualization?

Tableau

Creating an entire new market is an example of

The blue ocean strategy

What do most companies use as their main conduit to reaching and connecting with customers?

Their website

Why is it important to preserve the integrity of data, information, and systems?

These assets use their usefulness and value if their consistency, accuracy, or dependability is compromised

When selecting the right data, it is important to be aware of the source of the data. For example, data that is sold by an entity that didn't actually collect the data is considered ______ data.

Third Party

A business-to-consumer transaction is considered to be the selling of products and services to individual consumers.

True

According to We Are Social, 90 percent of adult internet users (aged 16-64) around the world have visited an online retail store on the web?

True

Cloud-based components used by social media providers are hardware

True

JD.com is China's largest online retailer and the country's largest internet company by revenue. It's revenue eclipsed $70 billion in 2019.

True

Who is responsible for calculating probable maximum loss?

a company's cybersecurity analysts

The main purpose of a social media information system (SMIS) is to

allow social network users to share content

Data analysts must blend facts and data with knowledge about

business or organization

t or f: The type of e-commerce transactions that involve the selling of goods and services between businesses is vendor to vendor e-commerce

false

What is a key tenet of ________ strategy in the following example? Example: Over 50 percent of all innovative products fail in the market, while over 80 percent of the successors to the products succeed.

fast-follower

Lieberman and Montgomery coined what phenomenon when they examined the advantages and disadvantages of being the first firm to enter a product into the market.

first-mover advantage

If an organization wants to increase user engagement on social media, it wants to

increase the conversion rate of its social media posts to interactions with users

The force of customers has __________ with the increasing presence of Internet e-commerce.

increased

Photonic crystals, under development at MIT, allow solar panels to be twice as efficient by absorbing and converting the sun's

light

Which of the following is a goal of confidentiality defined by the CIA triad?

making sure the right people have access to secure information

Business must differentiate itself from its competitors according to Professor Porter. One method is to encourage customers to believe that an organization provides higher quality goods or better service, then the organization can charge a premium, or gain market share, or (ideally) both. For example, Nike is able to charge a higher price by placing a swoop icon on a sweatshirt. This methodology is called

monopolistic competition

A manager for a national van rental company is in the process of conducting a SWOT analysis for her location. Which of the 5 Ps can she examine using the company's inventory management system for its rental fleet?

plant (physical attributes or resources)

If an organization's automated backup system is vulnerable to data loss or corruption, it's cybersecurity vulnerability is a weakness or flaw in its

software

As of 2020, all legislation that has been passed to protect elections from cybersecurity threats are part of

state-specific cybersecurity laws

One way to visualize a data ecosystem is to apply it to the data project life cycle. The Data Science Ready project outlines the five steps of the data project life cycle. The final stage in this life cycle is

storage

Of porters 5 forces, which is countered by the barriers to entering a market

the force of new competitors

Managers should choose an aggressive strategy if a SWOT analysis reveals that the organization faces weak external ________ and its external opportunities are matched with internal strengths.

threats

To remain relevant in today's e-commerce landscape, many businesses use progressive __________ applications to undertake m-commerce

web


संबंधित स्टडी सेट्स

Honors English Unit 2 Vocabulary

View Set

IMAGE ANALYSIS CHAPTER 4: UPPER EXTREMITY

View Set

Module 10 lesson 1 and 2 US history

View Set

Ex1: Ch 2 Project Selection & Prioritization

View Set

3.2 Iggy Review Chapter 12, Assessment and Care of Patients with Acid Base Imbalances

View Set

The First 15 Elements on the Periodic Table

View Set