MIS Midterm practice exam
weather
A differentiated scientific approach that utilizes observational data, analysis of range models, peer-reviewed research, and in-person reports to assess and possibly predict climate events has been developed by World ____ Attribution.
scalable
A major trend in data analytics is the use of artificial intelligence to focus on small data which is more precise, using small datasets that are capable of impacting decisions in the present. This is known as ______ AI.
Data + organizational knowledge = problem solved.
A simple formula that can be used to define success is:
computer
AI is the study and application of processes that combine what and data science to enable computer-assisted or automated problem-solving.
31
According to the Bureau of Labor Statistics, AI-related careers are predicted to increase by what % in the year 2030.
blockchain
Allowing people to share a digital ledger across a network of computers, ________ uses computer code to create concatenated (linked together) blocks of transactions.
data mining
Because so much information regarding voters' political attitudes is available online, campaign managers increasingly rely on
Analytical
Curiosity, understanding context, having a technical mindset, data design, and data strategy are the 5 essential aspects of __ thinking and skills
BlueDot
Headquartered in Toronto, ________ has developed a software application that serves as an early warning system for identifying pandemics.
Social media makes it easier to collect the kind of data that is meaningful to businesses.
How has social media changed the way businesses measure consumer behavior?
a proxy contract
If all parties want to update a smart contract they have to build an additional contract, called
geoadvertising
Information about geographic locations that is stored in a Geographic Information System (GIS) is referred to as
Internet of Things (IoT) M-commerce Integrated shopping experiences
Key considerations of today's e-commerce landscape include what
Oral communication skills Experience with SQL and computer code Technical writing skills
Key skills required of data analysts include what
proof-of-work (PoW)
Like Bitcoin and Litecoin, the Dogecoin blockchain is a ________ blockchain.
Power BI
Microsoft's analytics software that allows for the processing, manipulation, and visualization of data is called
a traditional cryptocurrency exchange.
Not as expensive as a cryptocurrency brokerage firm, users can buy, sell, or trade cryptocurrency either for other cryptocurrencies, or for regular (fiat) money such as U.S. dollars, for a standardized per-trade fee when trading through
Consumer-to-consumer (C2C)
Online marketplaces where one consumer sells to another consumer are called
Hepregen, Organovo, Nortis
Organ on a chip (OOC) technology allows scientists to develop drugs without animal or human testing. What are the three companies that are developing OOC.
structured
SQL allows users to isolate specific information contained in a database, as well as to aid in the selection, creation, addition, and extraction of data from a database. SQL stands for ______ query language.
permissionless
Servers that host the database are known as public ledgers because they are accessible to everyone and do not require that users place their trust in any individual. This means they are
metrics are needed to quantify the organization's progress toward achieving its social media goals
Setting social media metrics is the second step in creating a social media information system (SMIS) because
Zebra-Med
Software that uses artificial intelligence to analyze millions of clinical and imaging records to create high-performance algorithms that automatically detect conditions is being developed by
True
T or F A business-to-consumer transaction is considered to be the selling of products and services to individual consumers.
False, it is consumer-to-administration transaction
T or F The type of e-commerce transaction that allows consumers to interact with government or authoritative bodies for activities such as paying taxes, securing building permits, or paying tuition at a university, is referred to as a consumer-to-governance transaction.
True
T or F The type of e-commerce transaction where consumers are able to provide a service to a business often through a bidding or auction type of system is called consumer-to-business.
False
T or F Users in a social media information system can rely on providers to safeguard their personal information and profiles.
allow social network users to share content
The main purpose of a social media information system (SMIS) is to
Composable data and analytics
The process of taking components from data sources and analytics platforms to create a more user-friendly experience that makes finding critical insights easier is called
time intervals
To help ensure the strength of the blockchain, blocks can only be added in certain
descriptive analytics
Trying to answer questions such as "what happened?" or "what is occurring?" or "what was the ROI?" is the role of
geographic data
Vector and raster files are
Programs that can analyze data according to the site's requirements A database management system (DBMS) A program that allows access to the system itself
What are some types of software that social media providers use?
Confidentiality Availability Integrity
What is the CIA triad
It highlights high-performing tweets. Influencers are introduced to their target audience through the Twitter report card.
What is the purpose of the Twitter report card?
Third-party
When selecting the right data, it is important to be aware of the source of the data. For example, data that is sold by an entity that didn't actually collect the data is considered
Cell Networks
Where are data in transit found?
increasing brand awareness
Which of these common social media goals focuses on raising the public profile of a business?
Spreadsheet
Which program is typically limited to one user at a time?
If the consistency, accuracy, or dependability of these assets has been compromised, they lose their usefulness and value.
Why is preserving the integrity of data, information, and systems an important cybersecurity goal?
Tableau
a popular data analytics program that offers business intelligence as well as data visualization
enhanced security, cost savings, increased efficiency, data management efficiency
advantages of cloud-based AI
lack of control, internet concerns, data privacy
disadvantages of cloud-based AI
Machine learning uses various data inputs to build an algorithm, Algorithms created by machine learning take data and answers to questions and use this to develop a machine learning model, If-then statements are often used in machine learning models, If-then statements are often used in machine learning models.
how can machine learning can be used to solve a problem.
Starship
was launched in 2014 by Skype co-founders, Ahti Heinla and Janus Friis. The company's vision is to revolutionize food and package deliveries across the globe
Information density is the total amount of information as well as the quality of information available to all individuals in a market including customers and stakeholders. Organizations benefit from information density because it provides them large data sets from e-commerce activities that can be used to create effective target market strategies. Information density in e-commerce also allows for consumers to more easily find prices for goods or services that are available for sale (price transparency) and the actual costs a seller paid to acquire the goods or service (cost transparency).
what are characteristics that explain information density
Security weaknesses in an operating system or application software Weaknesses or flaws in system security implementation Weaknesses or flaws in system security control Weaknesses or flaws in a system's security design Weaknesses in system security procedures
what are types of cybersecurity vulnerabilities
Social media providers build and host website platforms and sponsors invest in these platforms to enhance their social media presence.
what most accurately distinguishes social media providers from social media sponsors.