MIS midterm
Airbus announced three concepts for the world's first zero-emission commercial aircraft. They are hopeful they can have these aircraft ready for service by 2035. This carbon-neutral technology would reduce the environmental impact of aircraft operations. The three concepts they are exploring include which of the following?
A turboprop design that can seat up to 100 people that uses a turboprop engine that is capable of traveling more than 1,000 nautical miles.
Which type of cybersecurity breach makes a computer, network, or online service malfunction or become unavailable to users?
DDOS attacks
Which is the best explanation of why technology is highlighted in a PESTEL analysis?
Failing to keep up with advances in technology can harm an organization's competitiveness
A cost-benefit analysis is a useful tool used to analyze the costs associated with implementing a project or set of activities and the benefits that would be achieved if the money was instead returned to the investors. T or F?
False
Of the following statements, choose the one that most accurately distinguishes social media providers from social media sponsors.
Social media providers build and host website platforms and sponsors invest in these platforms to enhance their social media presence
Creating an entirely new market is an example of a ________ ocean strategy.
blue
What does business-to-consumer (B2C) e-commerce replace?
brick-and-mortar store locations
The 3-step data visualization process consists of exploring the data sets for pattern, then planning for visuals, and finally
creating your visuals
If an increase in price results in a relatively large decrease in demand for the product, the firm cannot easily increase its profit margin. This demonstrates which of Porter's 5 forces?
customers
According to the identify (ID) function of the NIST Cybersecurity Framework, what allows an organization to prioritize its efforts where cybersecurity risk is involved?
understanding of its business environment and resources
Someone who possesses the knowledge of processing software, business strategy, and analytical skill to deliver data and reports that guide management and executives as they create well-informed decision making is known as a data
Analyst
The type of e-commerce transactions that involve the selling of goods and services between businesses is vendor-to-vendor (V2V) e-commerce. T or F?
False
With the increasing presence of Internet e-commerce sites, the force of customers has
Increased
Which threat to cybersecurity can only come from outside an organization?
Ransomware
In order to be considered open data, databases must provide access rights so that they can be
Redistributed
Which program is typically limited to one user at a time?
Spreadsheet
What is the final step in the six-step process of creating an SMIS?
analyze the collected data
SQL allows users to isolate specific information contained in a database, as well as to aid in the selection, creation, addition, and extraction of data from a database. SQL stands for ______ query language.
structured
The e-commerce company with the highest revenue is based in which country?
the United States
Accelerated mobile pages (AMPs) support m-commerce by utilizing a scaled-down version of hypertext markup language (HTML) to create web pages that load quickly on mobile devices. T or F?
True
Customer acquisition cost (CAC) is a metric that is used by e-commerce companies and other sales related organizations to assess the costs associated with convincing a potential customer to purchase a service or product. T or F?
True
People who register with social media providers in order to engage make up social media communities. T or F?
True
The main purpose of a social media information system (SMIS) is to
allow social network users to share content
Which of the following would be prohibited under the Electronic Communications Protection Act?
an employee leaking confidential emails they were not authorized to receive
The difference between a company's fundamental value and its total value is that
its fundamental value is what customers and stakeholder's value about its product or service, while its total value includes the value added by other aspects of the business.
Which of the National Institute of Standards Technology (NIST) Cybersecurity Framework functions entails an analysis of cybersecurity risk and reduction of potential damage to IT infrastructures?
protect (PR) function