MIS quizzes

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

"Full HD" resolution is expressed as

1920 x 1080.

CPU clock speeds of a personal computer range between ________.

2 to 4 gigahertz

If you type =2 + 3 * 6 into a cell in a spreadsheet and then press Enter, what will appear in the cell?

20

If you type =3+2^2*6 into a cell in a spreadsheet and then press Enter, what will appear in the cell?

27

The number 27 in the cell depicted above is a value, not a formula. If the user drags the cursor to the right, what will appear in the cell to the right?

27

The boot process consists of how many steps.

4

When you buy a new laptop, how much RAM should it come with?

4-8 GB

Recently, TechJury compiled a list of cybersecurity statistics that show the impact of different malware and network attacks. What percentage of cyberattacks are aimed at small businesses?

43%

How many bits equal a byte?

8

Every time you go to the gas station you're amazed by how much prices have increased. At this time last year the price was $3.20 per gallon and now the price is $4.25 per gallon. Which of the following spreadsheet formulas correctly calculates the percentage change?

= ((4.25 - 3.20) / 3.20) * 100

A friend asks if you want to go see the new Avengers movie but you say it's too expensive. "No it's not, tickets have only gone up $2.00 since last year," says your friend. You reply, "tickets went from $8 to $10 for a matinee. That is a large percentage increase. What formula would provide the percentage increase?

= (10 - 8) / 8 * 100

Select the spreadsheet formula that would correctly calculate the average (mean) of the following values: 3, 2, 6, and 8.

= (3 + 2 + 6 + 8) / 4

From the following list, select the statement that correctly defines that type of network.

A PAN connects devices around an individual. The Internet connects LANs, WANs, and other Internet networks together.

What is a cloud deployment model?

A cloud deployment model defines the framework of a cloud environment.

Select all of the following scenarios that show interaction between SMIS components. More than one answer may be correct.

A company's information systems (IS) group researches and chooses a program that can deliver content to several social media providers at the same time. Every day, a social media specialist at a start-up checks the news, plans how and what to tweet, quickly messages a manager, and sends the approved tweets. Social media providers rely on user data to better serve sponsor organizations.

List characteristics of computer viruses. More than one answer may be correct.

A computer virus is software that infects computers and is created using computer code. Viruses can destroy programs or alter the operations of a computer or network.

Which of the following are true statements about cryptocurrencies? More than one answer may be selected.

A cryptocurrency only exists on a computer. You can create new cryptocurrency using a process called mining.

Data analytics clearly would be efficient and practical in which of the following situations? More than one answer may be correct.

A farm equipment manufacturer is producing a new line of machines in three separate plants and it needs to test, troubleshoot, and coordinate production processes before opening the factory lines. Several new drugs have been FDA approved and a regional healthcare network must finalize its decision making concerning best practices for treatment options.

In which of these situations would an enterprise resource planning system (ERP) be clearly helpful? More than one answer may be correct.

A hospitality brand needs to know how directly its marketing and advertising efforts effect room sales. An international automaker must coordinate its new-vehicle production line with elements of its supply chain.

Which of the following organizations adhere to the principles described by Max Weber? More than one answer may be correct.

A medium-sized biotech company recruits for entry level positions at state colleges located in the organization's region. A minimum GPA is required, participation in extracurricular activities. All entry level positions support senior researchers and have the same starting salary. Senior researchers are people who have been promoted out of the entry level position; they are managed by people who have achieved their sales quotas in 7 of the last 10 years. New hires are trained in company policies and provided with management training after their first successful year. Employees with 2 years of exemplary performance reviews are invited to interview for positions managing the newest batch of college recruits. A local ad agencies firm specializes in SEO marketing for small, local clients. The ad agency typically hires 1-2 new employees every year from a small, local university; they must have completed a minor in Internet marketing. Promotions are based on annual reviews; employees who demonstrate potential are encouraged to take additional classes to further their career at the agency's expense. Employees are divided into different categories, based on the type of client they work with (i.e., retail; tourism; restaurant).

Why is a target market important to businesses and organizations?

A target market is the group of consumers most likely to purchase an organization's products and services.

Describe what is known about relatively recent data breaches. More than one answer may be correct.

According to research, there were 2037 publicly reported data breaches in the first half of 2020. In the first half of 2020, data breaches exposed over 27 billion records of information. The main reason most data breaches occur is due to misconfigured databases and services.

Choose what all-in-one computers actually mean.

All-in-one computers house every component except the keyboard and mouse inside the same case as the monitor. An all-in-one computer is a stationary device with a separate keyboard and mouse.

Select what's true regarding all-in-one computers.

All-in-one computers house every component except the keyboard and mouse inside the same case as the monitor. An all-in-one computer is a stationary device with a separate keyboard and mouse.

Popular Personal Media Players (PMP's) include which two of the following devices?

Amazon Kindle Fire Apple iPod

Which of the following are considered major cloud service providers? More than one answer may be correct.

Amazon Web Services (AWS) offers a broad set of global cloud-based products. Google Cloud offers a suite of modular cloud computing services. Kamatera Performance Cloud offers a range of flexible cloud infrastructure services.

Which of the following are examples of spear phishing?

An email is sent to employees at a specific company, instructing them to click on a link. That link deploys malware to their device.

Which of the following is an example of an employee behaving in a way that confirms the theories of Elton Mayo? More than one answer may be correct.

An employee comes in to work every day and competently does the tasks that are assigned to him. He does not frequently engage with his manager and is unsure how his job relates to the overall company goals. Although he used to frequently finish his tasks earlier than assigned, lately he is unable to complete them all in one day. An editorial assistant is hired after college graduation by an editor in chief at a publishing house. Although the assistant's main tasks are to make appointments, arrange for conference travel, and send out review copies, the editor in chief frequently meets with the assistant to let her know details of how conferences went and how books she has worked on are selling, describing to the assistant how these sales occur and why each conference is important. The assistant finds herself staying late at work to ensure that everything is done correctly and looks forward to her meetings with her boss. A copywriter at an ad agency writes detailed copy for Internet advertisements. It is an intense, grueling job—the copywriter usually writes copy for up to 50 ads a day. Although he received little feedback, he feels pride in his work and continues to be motivated to do a good job.

Which of the following is an example of an organization using knowledge gained from social media to make better strategic decisions.

An organization analyzes engagement with different sponsored posts to determine which ones generate the most engagement with their target audience.

Which of the following statements about the application of CRM systems to customer qualification are true?

An organization's goal in customer qualification is to decide whether pursuing relationships with specific customers make good business sense. Many CRM software programs can create customized sales funnels based on specific organizational needs and sales characteristics. Pursuing unqualified leads can be costly to a company.

For a specific advertisement, a social media platform allows a corporation to target male users who are between the ages of 18 and 25 and are currently attending college. This social media platform is assisting with which part of the market research process? More than one answer may be correct.

Analysis of data and information Data information and collection

Lightning connectors and ports are used by which company?

Apple

Which of the following are important questions to ask before signing a service level agreement (SLA) with a cloud services security vendor? More than one answer may be selected.

Are you in compliance with local, state, and federal security standards and regulations? Do you go through external security audits? How is data from different corporations kept separate?

The two main components of a processor are the control and the ________.

Arithmetic Logic Unit (ALU)

What does the above symbol (upper-case Sigma) represent in spreadsheets?

AutoSUM

Imagine you are speaking with a friend about how to protect yourself from phishing scams. Your friend, who works in cybersecurity, gives you some advice about what to do if you receive a phishing message. Which of the following statements would be considered good advice?

Banks and credit card companies will never ask you to provide personal information via email messages. If you receive a suspicious message, contact the institution that the message was allegedly sent from. Contact US-CERT to report the suspected scam.

A wireless short-range transmission protocol is called ________.

Bluetooth

Since its radio waves pass through walls or desktops, ________-capable devices are very popular.

Bluetooth

What function would you use to display how many entries are made in Column A above Cell A37?

COUNT

Select all true statements about CRM analytics from the following. More than one answer may be correct.

CRM analytics provides insights into customer behavior that can be used to make informed business decisions. Data is gathered from point-of-sale, e-commerce technology, and customer interactions. CRM analytics can be considered a form of online analytical processing.

Describe how customer relationship management (CRM) systems help businesses develop relationships with customers. More than one answer may be correct.

CRM systems provide organizations a clear overview of their customers. Information from CRM systems can be efficiently and intelligently used to make informed business decisions and to develop relationships with their customers. Data collected by CRM systems includes customers' likes and dislikes, what content they engage with, and what they post about competitors.

How do CRM systems make troubleshooting customer problems easier?

CRMs store information about customer purchases and interactions.

Which of the following is an example of a company using social media during the marketing research process? More than one answer may be correct.

Collect data and information Analyze data and information

What is the purpose of using color in spreadsheets?

Color makes data easier to read.

A site on the Windows operating system where you can uninstall programs, adjust settings, and manage tasks is the ________.

Control panel

Alyssa says that no one would risk selling operable or effective malware programs, even on the Dark Web. Why is she wrong?

Criminal hackers do make money by selling actual malware

Which of the following statements about sources of customer data are correct?

Customer surveys collect feedback from customers. Data collection from social media platforms can be integrated within a CRM platform. Analytics are used to uncover trends in the collected data.

Which of the following descriptions accurately apply to three CRM analytics functions?

Customer value and profitability is a function that identifies high-value customers. Personalization is a function that supports customized marketing. Predictive modeling is a function that connects prior information to future decisions.

________ involves identifying errors in data sets and removing/correcting these errors to ensure the data is accurate.

Data scrubbing

Which of the following could have a traditional (magnetic) hard drive?

Dell desktop computer

What is the benefit to using social media for conducting market research?

Demographic data and market information is much easier to gather from social media sites than it was to previously collect.

Choose the desktop computer features.

Desktops allow for relatively easy upgrade and expansion. Desktops are often used in offices since they do not need to be mobile. Desktops use a full OS.

Identify the characteristics of a desktop computer.

Desktops allow for relatively easy upgrade and expansion. Desktops are often used in offices since they don't need to be mobile. Desktops use a full OS.

What is the primary reason that businesses use CRM systems to help them identify MQLs and SQLs during the customer acquisition process?

Different engagement is needed to turn each type of lead into a customer.

From the following list, select all the reasons why organizations should identify their target markets when creating a social media information system (SMIS).

Different social media platforms attract and cater to different markets. Social media marketing is more cost-effective if it targets specific markets.

In a DDoS attack, network computers that have been infected by a virus from more than one source computer act as zombies and work together to send out illegitimate messages creating huge volumes of network traffic. The acronym DDoS stands for

Distributed Denial of Service.

A hacker launches an attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests. This would be considered a _________ attack.

DoS

According to Norton, which of the following steps should be taken to defend against rootkits? More than one answer may be correct

Don't ignore software updates. Be aware of phishing emails. Watch out for drive-by downloads.

What is the acronym for End-User Licensing Agreement?

EULA

What are the advantages of using personal computers in business? More than one answer may be correct.

Efficiency Flexibility of use Improved team communications

What was the driving principle behind McGregor's Theory Y?

Employees are capable of working without constant supervision.

What was the driving principle behind McGregor's Theory X?

Employees need close supervision.

Social media providers include which of the following web-based platforms?

Facebook, Instagram, and Twitter

Makoto and Rebecca want to hire a nanny for their 6-month-old baby. Before allowing someone into their home to watch their child, they are planning on running a comprehensive background check, including a credit check. Which law specifies whether Makoto and Rebecca are legally allowed to access potential candidate's credit information?

Fair Credit Reporting Act

An application that navigates all of the files and folders on your Mac is the ________.

Finder

The ________ computer creates images on your computer.

GPU

Today, the standard port for video and audio input on TV is the ________ port.

HDMI

Which statement correctly defines the components of the World Wide Web (WWW)? More than one answer may be correct.

HTTP is a protocol for the transmission of hypermedia documents (such as HTML) and was designed for communication between web browsers and web servers. A URL is the address of a document or other content/resources found on the web. HTML is a language commonly used format for publishing web documents and content.

What are questions a researcher seeks to answer in the study of consumer behavior. More than one answer may be correct.

How do consumers react to marketing strategies? How does the acquisition of products affect consumer self-image? How do consumers make purchasing decisions?

To quickly show if the values in a column or row are greater than, less than, or equal to a certain value, use the ________ function.

IF

What is the main benefit of having a social media information system (SMIS) that gathers and analyzes a company's social media data?

If the data show that a social media campaign is not attracting the desired attention or level of engagement, the company can change its campaign strategies.

Information provided by Instagram Insights informed an organization that their sponsored post had 1,000 impressions per day but an unsponsored post written by their new Social Media Director received 15,000 impressions that same day. Why might his information be valuable to the organization? More than one answer may be correct.

If the new Social Media Director is able to recreate that level of engagement with more of her posts, the organization may be able to reduce the amount of sponsored content they place on Instagram. The organization may be targeting the wrong audience with their sponsored posts; analyzing who's engaging with the Social Media Director's posts can provide the organization valuable information about their target audience.

Which of the following statements about blockchain are true? More than one answer may be selected.

In blockchain, the previous hash links two blocks together, which prevents anyone from inserting a block where one should not be. At its inception, members of a newly created blockchain network must agree to the rules and guidelines that will govern their blockchain.

Which social media goal directly aligns with an organization's mission to increase the public's environmental awareness by increasing news coverage of environmental issues?

Increasing the conversion rate of its social media posts to full news stories

A TV remote usually uses ________ waves.

Infrared (IR)

Which chip and manufacturing company is the largest in the world?

Intel

Smartphone features include

Internet capablility. touch screen. front/back facing cameras. speaker.

Which of the following applications or services will Web 3.0 be built to support? More than one answer may be correct.

IoT SaaS ubiquitous computing

How does a firewall work?

It determines what Internet traffic can leave or enter a network or computer.

How does a Network Address Translation (NAT) type of firewall work?

It hides internal IP addresses.

What is the purpose of the Twitter report card?

It highlights high-performing tweets. Correct. Influencers are introduced to their target audience through the Twitter report card.

How does a cybersecurity exploit threaten the safety of a system?

It is a tool or technique for taking advantage of a system vulnerability to cause harm.

Why might a government choose to get involved in state-sponsored cyberwarfare? More than one answer may be correct.

It is relatively inexpensive compared to traditional warfare. It is often difficult to trace and identify. It can cause widespread damage to IT infrastructure.

The processor directly houses the ________ cache.

L1

Which of these statements about packet sniffers are true? More than one answer may be correct.

Legitimate sniffers are used for routine examination and problem detection. Unauthorized sniffers are used to steal information.

Which CRM-compatible sales prospecting tool utilizes the profiles and connections on a social media platform to generate prospects?

LinkedIn Sales Navigator

Megahertz abbreviation is ________.

MHz

Digital music devices are connected to computers using ________ ports.

MIDI

All of the following are common ports that are included with laptop computers except ________.

MIDI ports.

Windows OS is owned and maintained by ________.

Microsoft

Which of the listed programs are used for creating documents, basic web pages, and desktop publishing?

Microsoft Word

Which of the following might be risky to uninstall from a Windows PC laptop?

Microsoft Works 6-9 Converter

MIDI is an acronym that stands for?

Musical Instrument Digital Interface

To retain a row or column, but remove it from view, right-click on the row or column heading and select

NOT Freeze.

Which of the following is a goal of an information technology disaster recovery plan (IT DRP)?

NOT conduct regular backups of data

The Foreign Key is a ________ field between tables that is not the primary key.

NOT primary

Parameter queries prompt the user for values in order to run/execute the query. When the value of a parameter is given, the query applies the field as a ________.

NOT report

What is a cybersecurity threat?

NOT threats to the security of data and information and to the operation of software or hardware

Common types of servers include

Network server. File server. Web server.

Why are probable loss calculations important?

Organizations have limited funds to use toward system protections.

What did Peter Drucker mean by "decentralization"?

Organizations work at what they do best and have a comparative advantage and outsource the work at which they have no advantage.

Which of these statements best explain why humans are studied as components in a technology-based business system? More than one answer may be correct.

People are valuable potential customers. Human capital is vital to operating SMISs.

What is the benefit of Facebook's Audience Insights tool providing information about users who are already connected to an event hosted by your organization? More than one answer may be correct.

People who do not frequently interact with your brand may have attended your event; additional information allows you to target them for higher engagement with your organization. People who have attended an event hosted by your organization already have a connection to the organization; more information about those people can help strengthen the connection they feel to the organization.

The information in ________ is dumped when a computer is shut down.

RAM

What does the acronym RDBMS stand for?

Relational Database Management Systems

An executive support system (ESS) would be most useful in which of the following situations? More than one answer may be correct.

Reports from all divisions are needed quickly for a crucial decision. The Board needs detailed information about a new product from the research and development group.

What is the role of social media information systems (SMIS) in consumer behavior?

SMIS provide user data and analytics tools that help inform consumer behavior researchers.

In a data warehouse, data is analyzed using business intelligence (BI) tools, ________ clients, and a variety of analytics applications designed to interpret the data. Multiple Choice

SQL

Which privacy law gives the government authority to prevent unfair or deceptive trade practices?

Section 5 of the Federal Trade Commission

Which of the following statements best explains why sleep is a factor in work-life balance?

Sleep is important to memory and brain health.

Which of the following describes a popular collaboration software program that is used in business? More than one answer may be correct.

Smartsheet is online project management software that focuses on the collaborative aspects of project management. Slack is a collaboration hub that focuses on making communication seamless using communication channels other than email. Trello is a collaboration tool that organizes projects into boards to create visual representations of project info and status.

f the following statements, choose all that describe the importance of hardware and software to SMIS. More than one answer may be correct.

Social media information systems are built with computer and network technology. Hardware and software options are numerous and varied, allowing users to customize according to their roles and business needs.

Of the following statements, which one specifically applies to the CRM integration of platforms such as Facebook, YouTube, and TikTok?

Social media platforms provide targeted customer information.

Of the following statements, choose the one that most accurately distinguishes social media providers from social media sponsors.

Social media providers build and host website platforms and sponsors invest in these platforms to enhance their social media presence.

Describe the benefits of an organization using social media to help create a target marketing strategy. More than one answer may be correct.

Social media provides companies with a rich collection of user data and personalized content. Social media provides companies with analytics tools to identify top consumers. Social media, as part of a target marketing strategy, often results in sales increases.

Which of the following is the term for CRM analytics that provides information about where data erosion occurs and how the erosion can be minimized?

Standardized Data Collection Processes

The first two steps of the six-step process in creating a social media information system (SMIS) involve developing social media goals and setting metrics. What are the third and fourth steps of the process?

Step 3: identify the organization's target market; Step 4: determine and integrate into the SMIS design traits valued by the target market.

Select all of the following statements that explain why providers need appropriate SMIS procedures. More than one answer may be correct.

System functioning and maintenance depend on correct procedures. Security, appropriate site use, and data handling are all facilitated through procedures. Procedures required of users protect privacy and uphold site policies.

What is the only way to guarantee that computers and networks are safe from cyberattacks?

Take them offline.

Explain the purpose of the National Institute of Standards Technology (NIST) Cybersecurity Framework.

The NIST Cybersecurity Framework is a voluntary guide that helps organizations understand and protect themselves against cybersecurity risks.

Which of the following are examples of information businesses get from social media to make more informed decisions? More than one answer may be correct

The age, gender, and location of people who watched an advertisement a company posted on Facebook. What percentage of male users clicked on the link within a promoted tweet in their timeline? The demographics of people who completed a purchase after clicking on a sponsored post on a social media site.

What is occurring when a call placed on a cellular network is "dropped?" More than one answer may be correct.

The call was unable to be relayed from the tower it initially connected with to a network of other cell towers. The mobile switching station that your phone connected to was unable to maintain a connection with the mobile switching station of the person you're calling.

A company is trying to determine why users are deleting or no longer engaging with their app on a regular basis. Which of the below is an example of how the company could use CRM to make this determination?

The company could use CRM to determine what part of the app users who deleted it were in right before the app was deleted.

A company is trying to determine why their CRM software is not generating better leads and asks you to analyze their process. Which of the following could be reasons why their CRM is not successfully generating leads? More than one answer may be correct.

The company only has a presence on Facebook—it has no social media presence on any other platform. The CRM is not set up to track which emails potential customers are clicking on to get to their e-commerce site.

A new app wants to use CRM to analyze whether a new feature would generate reliable income. Which of the following could be used to determine this? More than one answer may be correct.

The company uses the CRM to track how many users access this new feature and how much time they spend using it. The company uses the CRM to track how much more or less time users who access that feature spend in the app overall.

Mohammed is experiencing issues with his work computer. He speaks to the IT department and they identify various symptoms of a computer virus. What are symptoms of a computer virus? More than one answer may be correct.

The operating system may not launch properly. Critical files may be automatically deleted. The user may receive unexpected error messages.

Which statement best explains why knowing an organization's value proposition is important for creating its social media information system (SMIS)?

The organization can increase its exposure and user engagement on social media by designing an SMIS that enables it to reinforce and build on its identified strengths.

From the following list, select all the primary considerations when developing the goals for a social media information system (SMIS).

The organization's larger goals for its mission The organization's purposes for using social media

Which of the following list is a point-of-sale (POS) station output device? More than one answer may be correct.

Thermal printer Speaker

How are smartphones and remote servers alike? More than one answer may be correct.

They are SMIS hardware components. Smartphone users and data server technicians both interact with SMIS through specific hardware.

From the following list, select all the ways in which CRM systems assist businesses in targeting a market segment.

They are used to identify a target market and provide insights into the profiles of these customers. They help identify the common characteristics of target market members, including geographic location, demographic and psychographic backgrounds, and income level. They provide analysis of customer characteristics, which is an important part of the target market identification process.

According to Adam Smith, what are three ways that businesses can make labor more efficient?

They can have workers specialize in a single, simple task. They can reduce the distance between manufacturing steps or facilities. They can invent machines to multiply the productivity of workers.

Which statement best describes the impact of management information systems (MIS) for communication?

They have vastly improved organizations' ability to communicate effectively and efficiently.

How does spyware potentially harm the individual user?

This malware steals confidential information from the user.

As reported by Andrei Ene, one of the worst malware attacks in the last 10 years is the TBT, or

Tiny Banker Trojan.

Explain how trojans are designed and used. More than one answer may be correct.

Trojans are commonly used by hackers to gain access to systems and devices. Trojans are designed using some sort of social engineering tactic. Hackers use trojans to create a backdoor that bypasses security.

This type of connector is the most common type of connection to a computer for peripherals (printers, monitors, storage devices, etc.).

USB

Today, many computers use ________, a coding scheme that uses at least 16 bits to represent a character.

Unicode

Select what's true regarding uninstalling software.

Uninstalling system software is not recommended. Be cautious when uninstalling software from the OS manufacturer. Be cautious when uninstalling software from the computer manufacturer.

If an organization does not yet have social media content and followers, what can it do to help identify its target markets? More than one answer may be correct.

Use demographic and behavioral information to conduct market research Use public and purchased information to conduct competitor research Use existing customer information to conduct customer research

What is the term for a CRM that tracks the type of sale that is most likely to make a person purchase an item that they have previously viewed on an e-commerce site?

User Experience

In Apple iWork's Numbers the freeze options are located under the Table tab. In Microsoft Excel and Google sheets the freeze cells or panes options are found in the ________ menu.

View

Commonly used techniques to gain information in web mining include ________, ________,and ________.

WCM WSM WUM

Which of the following is a reason why farmers frequently use a DSS to determine appropriate fertilization and irrigation?

Weather patterns frequently change and cannot be predicted far in advance; therefore, the fertilization and irrigation needs are not consistent for a farmer's crops.

Commonly used techniques to gain information in web mining include, ________, ________, and ________.

Web Content Mining (WCM) Web Structure Mining (WSM) Web Usage Mining (WUM)

Which are important considerations when purchasing a new computer?

What is its price? How much RAM comes with it? Does the device have USB ports?

Which of the following should you consider when buying a new computer?

What is the cost? Does it have HDMI ports? Does it have an SD card slot?

What demographic data are collected from social media users? More than one answer may be correct.

Where a user is when they make a purchase initiated through a social media post. Which advertisements users frequently engage with.

Which of the following are designed as a network operating system?

Windows NT Windows Server UNIX

Select the reasons you might purchase a tablet computer.

You need a computer that you can use while walking. You need a highly mobile computer that works well for reading e-books or for online gaming.

Select the reasons for purchasing a tablet computer.

You need a computer that you can use while walking. You need a highly mobile computer that works well for reading ebooks or for online gaming.

From the following list, select all the sales prospecting tools that are most often integrated with CRM systems.

Zoominfo LinkedIn Sales Navigator Clearbit Prospector

Which of the following is one of the primary components that enable networks and individual devices to connect to the Internet?

a "backbone" of connected hardware and a suite of Internet protocol software

Each time a user clicks or interacts on a social media website

a data point that can be analyzed is recorded.

Which of the following is an example of management inconsistency that employee scheduling software is designed to eliminate? More than one answer may be correct.

a manager at a restaurant consistently scheduling favored employees for the shifts with most money-making potential an employee whose last name begins with the letter "Z" consistently not receiving his desired number of hours a week consistently scheduling too many or too few employees to work shifts

From the following list, select ways in which CRM systems are used for customer acquisition.

acquiring customers using social media, search, affiliate, referral, and email marketing tracking customer acquisition using a lead generation funnel tracking prospective and current customers through all stages of the funnel

Devices which house every component except the keyboard and mouse inside the same case as the monitor are called ________ computers.

all-in-one

The main purpose of a social media information system (SMIS) is to

allow social network users to share content.

In spreadsheets, all functions and calculations begin with

an equal sign (=).

If a company wants to create a secure computer network that can be accessed and used solely by its employees, it should create

an intranet.

Four types of action queries are included in many RDBMS these include ________, ________, ________, and make-table.

append delete update

A high-end jewelry designer creates several different brands of jewelry for women of different ages and tastes. To gain the greatest exposure to her potential customers on social media, her SMIS should be designed to use the platforms that

are most used by the target markets for each jewelry line or brand.

Which of the following data types are qualitative data? More than one answer may be correct.

attitude and opinion motivation to purchase

A gigabyte equals approximately one ________ bytes.

billion

A channel over which information flows inside a digital device is called a ________.

bus

The two main factors that affect the speed of the processor are clock speed and ________.

bus width

Reasons to purchase a desktop computer include

business workspace. families. gamers.

From the following list, select all the ways in which Henri Fayol's guiding principles of management address the welfare of employees.

by requiring that all employees be fairly compensated by requiring clear lines of authority and communication by requiring managers to be fair and kind to employees by requiring managers to encourage people to take initiative

How does using a CRM to track customer acquisition rates help organizations improve their future customer acquisition rates?

by revealing whether their marketing efforts are effective or require changes

In ASCII 8 bits are combined to create a ________.

byte

Manufacturers of computers and other electronic devices follow the IEEE 802.3 protocol to ensure that their products

can be used to create a standard ethernet connection.

The ________ speed of the processor dictates the number of instructions that CPU can process per second.

clock

Amazon, Kamatera, Salesforce, and Google are all examples of

cloud service providers.

Mary Parker Follett defines the elements of a successful business as

competence and expertise.

A digital device that accepts input, processes and stores the input, and provides output is a ________.

computer

What is the name of the study of how people make purchases and why they buy products and services?

consumer behavior

Choose the features of a traditional hard drive.

contains platters contains read/write heads stores data magnetically

Rootkits are typically used to allow hackers to do which of the following? More than one answer may be correct.

create a backdoor into a computer remotely control the operations of a computer

The purpose of programs that analyze connection data is to

create information about user behavior and patterns to benefit a sponsor

What is the first step in the six-step process of creating an SMIS?

create system goals that align with the goals of the organization

An organization learns from a social media site that less than 10 percent of users who visit their page engage with the video that is pinned to the top. This is an example of what type of information?

customer interaction

The design of a CRM system that collects data on customer interaction should include which of the following elements?

customer interaction monitoring information on individual customers automation factors

Share of wallet is also known as share of

customer.

A ________ deliberately modifies the normal operations of a computer or network through the use of malicious code.

cyberattack

Data centralization is necessary for maintaining ________.

data integrity

When creating a database field, we set ________ for each field to decrease data input mistakes.

data types

A database management system (DBMS) is a computer program that is used to create, process, and administer a ________.

database

A cloud database infrastructure integrates computer hardware and operating system in an internet-based ________.

datacenter

Which advance in MIS technology or tools could pose the greatest threat to a manager's job security?

decision-making software or apps

The purpose of the application protocol layer of TCP/IP is to

define how email programs and other software communicate within and across networks.

Which device carries a relatively large footprint and separate system unit?

desktop

The size of the screen is measured by the ________.

diagonal distance between the upper right and lower left corners of the screen

How is the screen size of a laptop computer measured?

diagonally from left corner to right corner

The correct way to measure the screen size of a computer monitor is?

diagonally from one corner to the other

If a customer segmentation tool supports integration, what is it able to do?

efficiently link data from various sources and platforms

Customer interaction encompasses all communication between a customer and an organization. A customer relationship management system (CRM) captures interactions from which three of the following sources?

email social media traditional mail

What parts do people play in social media information systems? More than one answer may be correct.

employees and contributors platform architects and data scientists

The primary goal of a company's social media strategy is to

engage potential customers.

Gartner IT Services company predicts that by 2021, customer relationship management systems will be the single largest revenue area of spending in

enterprise software.

The value that the future lifetime revenue an organization's customers will generate minus customer acquisition costs and customer retention costs is called customer

equity.

Which cryptocurrency offers a blockchain-based platform that can be used to develop decentralized applications?

ethereum

Databases are designed to maintain data and information about various types of data objects, including ________.

events people places

One benefit of using a CRM system to segment a market (rather than another type of market segmentation tool) is that a good CRM tool

facilitates using the company's own, collected data about customers.

Select which entities in a connected city may benefit from increased data generated by 5G networks. More than one answer may be correct.

first responders city planners utility companies

Describe the benefits of cloud computing. More than one answer may be correct.

flexibility cost savings collaboration

Which of the following is a strength of the Linux platform?

free to download and use

The Rule of 72 states that dividing 72 by the interest rate approximates the time for the investment to double. This calculates the ________ of the investment.

future value (FV)

The total amount of money (principal + interest) that lender receives from a borrower at the end of the loan is referred to as the loan's

future value (FV).

Typical tablet computer or smartphone SSD capabilities are measured in ________.

gigabytes

Which level of share of wallet means that existing customers are spending more to purchase products or services from one organization than they are from direct or indirect competitors?

high share of wallet

The SSD cost is ________ than the traditional hard drive cost.

higher

What does the General Data Protection Regulation (GDPR) regulate?

how companies protect personal data

From the following options, identify the risks and challenges that social media information systems (SMISs) present. More than one answer may be correct.

human resources (HR) risks that SMIS providers and sponsors encounter challenges that occur due to fast-changing and diverse user communities

Which of the NIST Cybersecurity Framework functions investigates an organization's cybersecurity management in the context of their business needs and resources?

identify (ID) function

From the following list, select the tasks involved in sales prospecting that a CRM and an integrated prospecting tool can assist with.

identifying potential customers (prospects) designing effective marketing strategies to reach prospects converting identified prospects into customers

Database Management Systems (DBMS) assign users different access rules to protect the data and users from ________, data leaks, and the misuse of data. Multiple Choice

identity theft

A new app was released providing consumers with digital coupons for products the consumer indicates they frequently purchase. The app gives different users coupons with different values and shares purchasing as well as demographic information with the product manufacturer. Under what circumstances would the information sharing with product manufacturers be ethical?

if the app's terms of service indicated who they would be sharing information with and what information would be shared

How does ransomware invade digital devices? More than one answer may be correct.

in a Trojan horse by email with a worm

According to research by Risk Based security, there were 2037 publicly reported data breaches

in the first half of 2020.

Josh is taking an Intro to Computers course and needs to use Microsoft Office to complete a variety of assignments. He has purchased the software, now he must ________ it so he can start his assignments.

install

Adding software to a digital device, or adding hardware components to a digital device is called ________.

installing

When a business is selecting a customer segmentation tool, what factor or feature does Salesforce.com recommend the business consider? More than one answer may be correct.

integration data collection tools cost

The cost of borrowing money, quoted as an annual percentage rate (APR), is a loan's

interest.

An email that appears to be from a legitimate company is most likely to be a social engineering cybersecurity attack if

it contains a link to a free offer that seems too good to be true.

John Locke's labor theory of property is applied to modern management theory because

it explains what motivates people to work: the desire to become personally wealthier.

Computing is considered "green" or environmentally responsible when

it reduces the consumption of natural resources and the associated environmental impact.

The difference between a company's fundamental value and its total value is that

its fundamental value is what customers and stakeholder's value about its product or service, while its total value includes the value added by other aspects of the business.

Uses for computer hard drives include ________ and ________.

keeps files for future use data remains intact when computer is turned off

A two-in-one computer combines a tablet with a detachable ________ to make a relatively powerful, yet mobile computer.

keyboard

A cybercriminal uses spyware to record all actions typed on a keyboard. This type of spyware is called a(n)

keystroke logger.

Which of the following represents the least amount of storage?

kilobyte

A mobile hinged computer with an integrated keyboard that uses a full operating system is called a notebook or a ________ computer.

laptop

Where would you expect to encounter a hardware keystroke logger? More than one answer may be correct.

library computer school computer work computer

Descriptive data about a customer includes categories such as

lifestyle and career.

What do customer relationship management (CRM) systems help businesses to do to retain their existing customers? More than one answer may be correct.

maintain customer engagement provide services to customers measure customer satisfaction

Adrian and Frank began the online process of applying for a short-term loan for their business. They created an account with a username and password, looked over the privacy statement, reviewed the security policy, and accepted the terms of use. After logging on, however, they became increasingly uncomfortable answering so many detailed questions about income, employment, and more. What specific risk might they have remembered from studying cybersecurity?

man-in-the-middle (MitM)

From the following list, select all the vital functions of customer relationship management (CRM) systems for businesses.

managing critical relationships helping synchronize customer interactions providing insights into customer satisfaction metrics

Which of the following acts is an example of social engineering?

manipulating people in order to obtain and misuse their personal information

Customized communication is best described as

matching the message to the individual customer.

Setting social media metrics is the second step in creating a social media information system (SMIS) because

metrics are needed to quantify the organization's progress toward achieving its social media goals.

A megabyte equals approximately one ________ bytes?

million

Megahertz is the same as a ________ cycles (or instruction) per second.

million

Some popular social media management systems are becoming more difficult to manage because

millions of diverse users across the globe are active participants.

A PaaS vendor offers its clients the ability to quickly build a customer loyalty app that allows customers to earn points for every purchase. The client chooses what features they'd like the app to have from a predetermined list of choices. What is this an example of?

mobile software development kit

A laptop typically has ________ RAM than a smartphone.

more

Which of the following is a strength of the Android platform?

most widely used OS for smartphones and tablets

Which of the following is a strength of the Windows platform?

most widely used OS in laptops, desktops, usually leading to lower prices

Of the following categories, which are identity data? More than one answer may be correct

name and address date of birth

Of the following categories, which are identity data? More than one answer may be correct.

name and address date of birth

The actual pixel number in a monitor is called the ________ resolution.

native

Choose the SSD characteristics.

no moving parts extremely fast

What does the acronym NoSQL stand for?

non-relational databases

The information in the memory (the RAM, the caches, the registers) is ________ when a computer is shut down.

not saved

Where are data in transit found?

on a cellular network

What is a key advanced technology behind CRM analytics?

online analytical processing

What manages hardware and software, supports the computer's basic functions, and runs programs?

operating system

Many manufacturers have made ________ optional equipment when purchasing a new laptop computer.

optical drives

What does the identify (ID) function of the NIST Cybersecurity Framework focus on?

organizational understanding of how to manage cybersecurity risks

What is the second step in the six-step process of creating an SMIS?

outline measurements of success

RAM storage and ________ processing are two main in-memory computing components.

parallel

A social media information system (SMIS) is composed of three parts, which are

people, data and procedures, and hardware and software.

The basic types of computer networks include which of the following? More than one answer may be correct.

personal area network (PAN) local area network (LAN) wide area network (WAN)

What methods are used to launch a ransomware attack? More than one answer may be correct.

phishing Trojan horse

The smallest image element is a(n) ________.

pixel

Bankers and other lenders refer to the initial amount of the loan (the principal) as the loan's

present value (PV).

A ________ key must contain a unique value.

primary

The amount of money borrowed in a loan is often referred to as the loan's balance or the ________ of the loan.

principal

The total value of a company is based on how much customers value its

products, services, and areas such as corporate philanthropy, social responsibility programs or policies, manufacturing processes, and brand attributes.

Bad actors seeking to create computer viruses primarily must know how to

program code.

Select what's true about utility programs.

program that performs a specific maintenance type of task included in both Windows and Mac OS common examples include disk formatting, disk cleanup, and disk defragmenting

Software used by social media information systems websites include

programs that analyze data.

Which type of touchscreen uses a single metallic-coated panel and uses electricity to calculate touch points?

projective capacitive

Remote desktop software

provides access to all networked devices from a separate computer.

Areas covered in digital governance include data architecture, data ________, data modeling, data warehousing, and data security.

quality

What is the key action called for in the detect (DE) function of the NIST Cybersecurity Framework?

quick identification of a cybersecurity threat

One version of this type of malware encrypts a victim's data until a payment is made. Another version threatens to make public a 'victim's personal data unless a payment is made. This type of malware is called

ransomware.

When displaying financial information, the accepted practice is that ________ indicates negative values.

red

The major advantages of executing a data quality audit include ________.

reduced risk of data inconsistency reduced data storage costs data improvement recommendations

In the business landscape, social media information systems are

relatively new and increasing in importance.

Mainframes were originally developed for their

reliability of handling transactions.

Examples of data scrubbing include which of the following?

removal of duplicate database records correcting misspelled words fixing syntax issues

A corporation that was recently the victim of hacking that was caused by a high-level employee falling for a phishing scheme institutes a required, annual, self-paced training module that alerts employees to the most common recent phishing attacks. The institution of this new training requirement represents which phase of the plan-protect-respond cycle?

respond

Which of the NIST Cybersecurity Framework functions calls for quick action on the part of an organization's cybersecurity team to mitigate damage to systems? Multiple Choice

respond (RS) function

What is the "RS" function in the National Institute of Standards Technology (NIST) Cybersecurity Framework?

respond function

A common method to delete a column or row in most spreadsheet programs is to ________ on the column or row heading, and then select Delete from the menu.

right-click

When a user has determined their destination, GIS can assist in providing directions. This is called

route information.

RDBMS (Relational Database Management System) elements include features that maintain data ________, accuracy, integrity, and ________.

security consistency

Some of the duties a database administrator performs include ________.

security tuning backup

For which type of cybersecurity vulnerability do organizations maintain and share databases of known problems?

security weaknesses in operating systems or application software

Peter Drucker felt the most important responsibility of a corporation is to

serve its customers.

List steps organizations who employ a CRM system can take to protect customer data. More than one answer may be correct.

server security proper CRM administration CRM software updates

A processor that consists of one control unit and one ALU is called a ________.

single-core processor

The average tablet has a ________ hard drive compared to the average desktop.

smaller

Examples of IoT devices include which of the following? More than one answer may be correct.

smart TVs home security cameras smart speakers

Which of the following are examples of the social media tools that help organizations interpret and collect user data? More than one answer may be correct.

social intelligence monitoring analytics insights analytics

Describe what social media offers businesses eager to gain understanding of their customers. More than one answer may be correct.

social intelligence tools unprecedented access to consumer data insights analytics

What are some types of software that social media providers use? More than one answer may be correct.

software that allows the provider team to log on to the system any database management system

Sports analysts often use ________ to keep track of statistics, times, and scores of nearly every sporting event.

spreadsheets

Devices allowing data to be retained when your computer is shut down are called ________ devices.

storage

What are some of the direct benefits of defining an organization's target market? More than one answer may be correct.

stronger marketing messages better understanding of customer needs keener insights into the competition

Mary Parker Follett's theory of management is based on the principle that

success depends on the flow of ideas from all levels of an organization.

Crosstab queries calculate the ________, ________, or other aggregate functions, then group two sets of values into the results.

sum average

What is the most powerful computer type?

supercomputer

Which has the most storage capacity?

terabyte

Which of the following represent the highest amount of storage?

terabyte

For laptops and tablets to use a LAN to connect to the Internet wirelessly,

the LAN device hosting the ISP connection must act as a wireless access poin

CRM software provides which of the following important customer qualification benefits? More than one answer may be correct.

the ability to make distinctions between true prospects and unrealistic sales opportunities the opportunity to create customized sales funnels based on specific organizational needs and sales characteristics

What is the meaning of the term "social engineering" in the area of cybersecurity?

the act of manipulating or tricking people into sharing confidential, personal information

Important considerations when purchasing a new tablet computer include which three items?

the amount of RAM it has. the size of its screen. the amount of storage it has.

What company-owned data and information do CRM marketers probably use to help them segment customers by their needs and wants? More than one answer may be correct.

the customers' past purchases from the company the customers' actions on the company's website

To calculate an organization's customer equity (CE) value we first determine

the future lifetime revenue the organization's customers will generate.

In his theories of management, Peter Drucker placed special emphasis on

the importance of involving employees in the goal-setting process.

The term "native resolution" refers to?

the number of pixels in a display

Choose the two answers that define the term "resolution" in output devices.

the number of pixels in a display quality of the image

What do most companies use as their main conduit for reaching and connecting with customers?

their website

You see ###### in a cell. This means that

this is not an error. The cell needs to be expanded in order to display the entire value.

A kilobyte is equal to approximately one ________ bytes.

thousand

Common names for a USB drive include?

thumb drive flash drive jump drive

Which of the following is considered an ethical use of third-party data? More than one answer may be correct.

to collect data from individuals for CRM purpose if it is clearly communicated to users and they have agreed to sell the data to third parties who use it for market and demographic analysis if it is clearly communicated to users and they have agreed

What does the General Data Protection Regulation (GDPR) strive to achieve?

to ensure EU companies protect the privacy and personal data of EU citizens

Why does Europe's General Data Protection Regulation (GDPR) govern the transfer of data outside of the EU? More than one answer may be correct.

to ensure data protection wherever the data is processed to prevent companies from circumventing the rule by processing or hosting data outside of the EU

What is the goal of the NIST Cybersecurity Framework Protect (PR) function?

to help protect an organization's IT infrastructure from security breaches by offering guidelines on IT infrastructure protection

What is the primary, underlying goal or purpose of state-sponsored cyberwarfare?

to protect or pursue national security interests

What is the purpose of saving an Excel file as a .cvs (comma-separated format) file?

to share data with other spreadsheet users regardless of which spreadsheet program is being used

Which social media metric is probably the most useful for determining whether a company is increasing its brand awareness on social media?

total mentions of the company on social media

Used in a variety of devices including ATMs and point-of-sale terminals, ________ allow for the input of data with the use of a stylus or finger.

touchscreens

According to the identify (ID) function of the NIST Cybersecurity Framework, what allows an organization to prioritize its efforts where cybersecurity risk is involved?

understanding of its business environment and resources

Tiffany has purchased a new laptop. She noticed many unwanted programs came pre installed on her laptop. She wants to ________ the programs from her device so they do not take up storage space.

uninstall

Which of the following are standard SQL commands?

update create drop

Usability in web mining refers to how a website ________ and ________ can interact with a website.

users visitors

If you purchase a new graphics computer game or a new photo/video editing software for your desktop computer, you may want to purchase a new ________ card.

video

Collaboration software is designed to increase collaboration and productivity primarily by enabling team members to

view, edit, and add shared information in real time, from anywhere.

From the following list, select the common types of malware used today.

viruses worms trojans

Share of customer, which focuses on getting as much business as possible from fewer customers, is also known as share of

wallet.

User communities rely on which of these software components to engage with a social media information system (SMIS)? More than one answer may be correct.

web browsers applications that access content

A benign Internet robot that gathers data is called a(n)

web crawler.

From the following list, select all the customer characteristics that are commonly analyzed by a CRM and used to create an ideal customer profile.

where customers are located what customers buy and how often why customers make their purchase

An investment firm creates a network designed to facilitate information exchange between devices at its offices in New York City and New Haven, Connecticut. Which type of network would the company use to exchange information?

wide area network (WAN)


संबंधित स्टडी सेट्स

Newton's Laws Of Motion & Forces

View Set

accounting ch.1-3 vocab&some online work

View Set

Famous Photographers & Photography Careers

View Set

Evolve Adaptive Quiz - Delegation

View Set

Chapter 8: Measurement & Scaling

View Set