CIS Quizes

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Phishing

A bank customer receives a message, ostensibly from the bank's website, asking her to provide her login information but contains many misspellings and links that go to suspicious websites.

Sock Puppet(def)

A fake online persona created to promote a particular point of view, often in praise of a firm, product, or individual.

Data cube

A special database used to store data in OLAP reporting

Which statement is TRUE about key performance indicators (KPIs)? KPIs measure progress toward a desired goal. KPIs involve setting targets (the desired level of performance). KPIs are measured using data. All of these statements are true.

All of these statements are true.

According to lessons in Module 2, the following solution(s) can help us overcome our unconscious biases. Select all answers that apply. speed up our thinking to process more information at once embed ourselves in networks of people who share similar traits and views as us set objective criteria to evaluate information embed ourselves in diverse networks and embrace inclusive relationships seek out and be open to contradictory and differing views

set objective criteria to evaluate information embed ourselves in diverse networks and embrace inclusive relationships seek out and be open to contradictory and differing views

the path that maps to the folder location where the file is stored under the filename "Web_address"

wiki

Search Costs

Finding and evaluating a new alternative costs time and money

Uncategorized answers

HaaS (Hardware as a Service)

What is the root cause of almost every data breach? Unpatched device Human error Zero-day attack Poorly crafted password

Human error

In this scenario, the cloud firm usually manages the infrastructure (keeping the hardware and networking running), while the client has control over most other things (operating systems, storage, deployed applications, and perhaps even security and networking features like firewalls and security systems).

IaaS (Infrastructure as a Service)

Human Resources

LinkedIn résumé database software

Which is a best practice for physical security awareness? Lock your computer screen and mobile devices every time you step away. Follow your organization's security policies unless they hinder efficiency. Always use a VPN. Always be considerate, such as holding open the door for other people, even if you don't know them.

Lock your computer screen and mobile devices every time you step away.

Ransomware

Malware that encrypts a user's files (or perhaps threatens to delete them) and demands that a user pay to regain control of their data and/or device.

What is the relationship between Moore's Law and e-waste? Moore's Law predicts the shrinking of powerful chips, which leads to increases in chip pathways and the crowding of electrons. Moore's Law predicts higher turnover of new technologies in the workplace, leading to waste in employees' time when they often have to learn new technologies. Moore's Law predicts the accelerated obsolescence of technology devices, which leads to increases in discarded hardware devices. Moore's Law predicts the slowing of e-waste as technologies become more affordable over time.

Moore's Law predicts the accelerated obsolescence of technology devices, which leads to increases in discarded hardware devices.

According to Michael Porter, the reason many firms perform poorly compared to their competitors is because they've defined themselves according to _________________________________ (performing the same tasks better than rivals) rather than _________________________________ (performing different tasks than rivals or the same tasks in a different way).

Operational effectiveness, strategic positioning

In this scenario, the cloud firm usually manages the platform (hosting, hardware, and supporting software), while the client has control over the creation and deployment of their applications.

PaaS (Platform as a Service)

Primary Components/Activities

Support—service, maintenance, and customer support Inbound logistics—getting needed materials and other inputs into the firm from suppliers Outbound logistics—delivering products or services to consumers, distribution centers, retailers, or other partners Operations—turning inputs into products or services Marketing and sales—customer engagement, pricing, promotion, and transaction

loyalty programs

Switching can cause customers to lose out on program benefits. Think frequent purchaser programs that offer "miles" or "points" (all enabled and driven by software).

Learning Costs

Switching technologies may require an investment in learning a new interface and commands

Data Lake

Systems that allow for the storage of data in both structured and unstructured ("raw," "unfiltered") formats

Transaction Processing System (TPS)

Systems that record a transaction (i.e., a form of business-related exchange), such as a cash register sale, ATM withdrawal, or product return

Switching Costs

The cost a consumer incurs when moving from one product to another. It can involve money spent, investments in time, any data loss, etc.

According to section 15.5 of your textbook, what is a characteristic of "data quality"? Check all that apply. The data can be trusted. The data is accurate, clean, complete, and reasonably free of errors. The data is hosted in-house. The data is sourced from third-party data aggregators.

The data can be trusted. The data is accurate, clean, complete, and reasonably free of errors.

Diversity

Understanding and valuing people who represent differences in races, genders, disabilities, sexual orientations, national origins, educational backgrounds, experiences, skills and knowledge (to name some characteristics) Organizations have made more progress in this area.

What is an example of crowdsourcing, as described in your textbook? Select all that apply. Walmart: The company set up a contest, providing a sample of historical sales data with potential influencing factors, including promotions, clearance sales, and price roll backs. Candidates were asked to build models that use these factors to forecast sales across various departments. Owned Media: Communication channels that can include firm-run blogs and websites, any firm-distributed corporate mobile website or app, and organization accounts on social media such as Twitter, Facebook, Pinterest, YouTube, and Instagram. Mechanical Turk: An online marketplace where anyone with a task to be completed or problem to be solved can put it up for Amazon, setting their price for completion or solution. Search Engine Optimization: The process of improving a page's organic page rankings (rank in search results), making your firm easy to find, pushing your firm higher in search results than your rivals, and solidifying perception of your firm as an expert. St. Louis Cardinals baseball team: The club's One for the Birds contest calls for the fans to submit scouting reports on promising players, as the team hopes to broaden its recruiting radar beyond its classic recruiting pool of Division I colleges.

Walmart: The company set up a contest, providing a sample of historical sales data with potential influencing factors, including promotions, clearance sales, and price roll backs. Candidates were asked to build models that use these factors to forecast sales across various departments. Mechanical Turk: An online marketplace where anyone with a task to be completed or problem to be solved can put it up for Amazon, setting their price for completion or solution. St. Louis Cardinals baseball team: The club's One for the Birds contest calls for the fans to submit scouting reports on promising players, as the team hopes to broaden its recruiting radar beyond its classic recruiting pool of Division I colleges.

According to Chapter 1, the following technologies are creating radical shifts in different industries and business disciplines: all of these machine learning artificial intelligence cloud computing 3D printing

all of these

According to this module, people cope with the psychological stress associated with paradoxical ideas through defensive strategies, such as: all of these blaming or scapegoating others for the tensions resorting to understandings or actions that have provided comfort and security in the past forming or joining subgroups that align with one of the viewpoints ignoring or denying the tensions

all of these

Marketing

customer relationship management personalization systems

Information silos arise as a result of ________________. an organization's plan to create them data being isolated in separated systems the individual users of personal information systems an organization's effort of technology integration

data being isolated in separated systems

Social media can be a key driver of "________" media, where consumers who are enthusiastic about products and services can help spread the word through social media and word of mouth. paid earned mainstream owned

earned

Who would be included as an employee cybersecurity threat? ambitious people any person with network security skills who works outside the organization another organization or person who sees themselves as competitors employees who sometimes do not follow security practices

employees who sometimes do not follow security practices

host name indicating the computer hosting the website.

en

According to the lecture video, "Overview of Artificial Intelligence," one of the differences between data and information is the following: facts versus risk reduction numeric versus qualitative values facts versus interesting facts risk reduction for facts

facts versus risk reduction

Google is the world's largest provider of cloud computing services. True False

false

India currently has the most Internet users compared to any other country. True False

false

application transfer protocol used in the Web address and stands for "hypertext transfer protocol secure."

https

People

individuals who interact with information systems and are impacted by these systems employees and customers

In any organization, a reactive, rather than proactive, approach is better suited for dealing with security breaches. information security is everybody's responsibility. technology lapses are solely responsible for almost all security breaches. greater expenditure on security products is the only way to contain security breaches. security breaches cannot be prevented despite the adoption of the best security policies.

information security is everybody's responsibility.

According to the lecture videos, ERP systems focus primarily on integrating business processes ______ to the organization, whereas SRM, SCM, and CRM tend to focus on integrating business processes ______ to the organization

internal, external

A significant portion of Facebook's underlying technical infrastructure consists of ______________, which is software that is typically free and whose code can be accessed and potentially modified by anyone. proprietary software open source software packaged software social graph software

open source software

The ____________ controls the computer hardware and how computer resources are allocated and provides a means by which end users can interact with the computer.

operating system

Hardware

physical parts of the technology that you can touch memory card

In one of the videos, the guest speaker Greg Watkins referred to a stereotype that people who are "techies" or who are drawn to anime and video games are perceived to be most suitable for information systems careers. This stereotype is an example of: (choose the best answer choice) status quo bias intentionality bias prototype bias confirmation bias

prototype bias

In the United States, Section 230 of the Communications Decency Act defines social media companies like Facebook as a(n): receiver of content, so the social media companies are neither publishers nor providers. publisher of content but not a provider of content, releasing social media companies from liability for the user-generated content posted on their platforms. hybrid provider and publisher, rendering social media companies liable for content posted by individual users but not users representing companies or organizations. provider of content but not a publisher of content, releasing social media companies from liability for the user-generated content posted on their platforms.

provider of content but not a publisher of content, releasing social media companies from liability for the user-generated content posted on their platforms.

Data

raw figures and facts mortality rate

Contractual Commitments

Breaking contracts can lead to compensatory damages and harm an organization's reputation as a reliable partner

Strategies that Weaken Personal Cybersecurity Hygiene

Click the "Remember me" or "Save password" settings on a public computer. Write your passwords down on a sticky note. Use public computers (libraries, coffee shops) when accessing sites that contain your financial data or other confidential information. Always trust an email with a link that states it's from your manager. Use the same password on many websites. Turn on browser settings that will auto-fill fields with your prior entries (e.g., usernames, passwords, phone numbers), especially on devices that you share with others.

According to the textbook and lecture videos, what is an example of positive outcomes associated with the use of AI? Use of AI can automate many tasks, providing convenience to consumers and cost savings for organizations. Use of AI can improve employee retention by uncovering patterns of those most likely to leave. All of these Use of AI can predict cancer survival better than humans.

All of these

The best way to thwart a would-be phishing attack is: Check all that apply. Tell the FBI about the phishing attack. Don't click on login links shown in emails; login to the website directly. Stay alert when interacting with email. Don't open unexpected attachments or files.

Don't click on login links shown in emails; login to the website directly. Stay alert when interacting with email. Don't open unexpected attachments or files.

Strategies thats Strengthen Personal Cyber Security Hygiene

Don't turn on risky settings, like unrestricted folder sharing. Pay attention when clicking links. Turn on software update features for your operating system and applications you use. Install security software (e.g., antivirus software, personal firewalls, malware scanners, etc.). Regularly backup your most important files practicing the 3-2-1 backup scheme. Don't give your password to anyone.

Process

Purchasing a product steps taken to achieve desired goals

A firm should be wary of adopting software packages or outsourcing portions of its value chain that are proprietary and a source of competitive advantage. True False

True

Collaborative Consumption

When participants share access to products and services rather than having ownership. Shared resources can be owned by a central service provider (e.g., Zipcar) or provided by a community that pools available resources (e.g., Airbnb, Uber).

Network Effects

When the value of a product or service increases as its number of users expand. Also known as Metcalfe's Law, or network externalities.

Which of the following is an example of a security threat resulting from malicious human activity? an employee who accidentally deletes customer records an employee who intentionally destroys data or other system components an employee who misunderstands operating procedures an employee who inadvertently installs an old database on top of the current one

an employee who intentionally destroys data or other system components

echnologies that measure and analyze human body characteristics for identification or authentication are known as ____________. bio-embedded systems overlamination processes holographs smart tags biometrics

biometrics

Hordes of surreptitiously infiltrated computers, linked and controlled remotely, are known as zombie networks or: zombots megabots botnets honeypots blacklists

botnets

Neural networks are statistical techniques commonly used in machine learning that are modeled off the following human biological system: eyes / human vision brain heart muscles

brain

Operations

supply chain management factory automation

Which of the following is a TRUE statement about volatile memory? Select all that apply. This type of memory does not require power to retain stored data or information. RAM is an example of this type of memory. This type of memory is used for long-term, permanent storage. This type of memory is used for short-term, temporary storage. This type of memory requires power to retain stored data or information. Flash storage is an example of this type of memory. A microphone is an example of this type of memory.

RAM is an example of this type of memory. This type of memory is used for short-term, temporary storage. This type of memory requires power to retain stored data or information.

Microblogging

Short, asynchronous messaging system. Users send messages to "followers" who aren't required to follow back. Twitter

A(n) _____ is someone who uncovers computer weaknesses and reveals them to manufacturers or system owners, without exploiting these vulnerabilities. white hat hacker corporate spy ethical cyber criminal black hat hacker hacktivist

white hat hacker

domain name with ".org" being the top level domain.

wikipedia.org

Data warehouse

A collection of databases structured for fast online queries and exploration, typically aggregating enormous amounts of data from many different operational systems

Vishing

A cyber rascal calls a company trying to get access to private personal and sometimes financial information to use for financial gain. It is a form of social engineering

Data mart

A database or databases focused on addressing the concerns of a specific problem or business unit

Sock Puppet

A fake online persona created to promote a particular point of view, often in praise of a firm, product, or individual.

Smishing

A person receives a text message from a familiar number with a link. If they click on the link, it will install a malicious software app on the phone

Platform Bundling

A strategy whereby a firm offers products and services that allow for the integration of other software products and complementary goods, which creates an eco-system of value-added offerings.

Envelopment

A strategy whereby a firm with a significant customer base adds a feature to an existing product or service and eliminates the need for any rival, stand-alone platforms. Think Apple adding video to cameras, crushing the market for the Flip cam.

Wikis

A website that anyone can edit directly from within the browser. All changes are attributed, and there is a revision history allowing for the roll back of changes to revert to earlier versions. Wikipedia

Which of the following is a risk associated with social media? Online trolls can vandalize content published on social media or otherwise cause grief or mischief on social media. The online social media activities of employees, whether in their personal or professional domains, can taint the image of the organizations they work for when the online content or behavior is perceived to be negative or controversial by the general public or key organizational stakeholders. Viral online outrage can harm the reputation of an organization, regardless of whether the organization uses social media. All of these are risks associated with social media.

All of these are risks associated with social media.

Griefer

An internet vandal and mischief maker; also sometimes referred to as a troll

Griefer(Def)

An internet vandal and mischief maker; also sometimes referred to as a troll

Status Quo Bias

An organization is recruiting a new CIO (Chief Information Officer) and is considering three candidates. All candidates have exceptional qualifications and leave positive first impressions on the organizational employees they meet during the interview process. In a late stage of the interview process, Candidate A proposes the adoption of a cloud-based enterprise system that would help the organization streamline their processes and better leverage organizational data for decision making, while Candidates B and C propose working within the practices that are already in place. Several employees do not wish to learn how to use a new system and change the way they do their jobs, even if doing so would improve organizational outcomes, so they express strong disapproval of Candidate A in favor of Candidates B and C.

Which of the following statements is TRUE? Because Facebook is private, most of its content is on the deep Web, which is a social network that only allows mutually trusted peers to participate in file sharing activities. Because Facebook is private, most of its content is on the deep Web, which is a peer-to-peer file sharing network that is used to share a variety of encrypted content. Because Facebook is private, most of its content is on the deep Web, which is Internet content that can't be indexed by Google and other search engines.

Because Facebook is private, most of its content is on the deep Web, which is Internet content that can't be indexed by Google and other search engines.

Messaging Services

Communicate with individuals or groups of users using short-format text, graphics, and video. Most messaging is done using mobile devices. Snapchat

According to a video in 11.5 of the textbook, the most dangerous type of false and misleading information that social media companies are trying to address is: Content high in truth with a high intent to mislead (e.g., propaganda, cherry-picked facts) Content high in truth with a low intent to mislead (e.g., being right) Content low in truth with a high intent to mislead (e.g., hoaxes, conspiracy theories) Content low in truth with a low intent to mislead (e.g., being wrong, made a mistake)

Content low in truth with a high intent to mislead (e.g., hoaxes, conspiracy theories)

According to a video in 11.5 of the textbook, the most dangerous type of false and misleading information that social media companies are trying to address is: Content low in truth with a low intent to mislead (e.g., being wrong, made a mistake) Content high in truth with a low intent to mislead (e.g., being right) Content low in truth with a high intent to mislead (e.g., hoaxes, conspiracy theories) Content high in truth with a high intent to mislead (e.g., propaganda, cherry-picked facts)

Content low in truth with a high intent to mislead (e.g., hoaxes, conspiracy theories)

Which of the following statements is TRUE about cybersecurity? Almost all security breaches can be traced back to technology lapses; personnel or procedural (process) factors are rarely contributing factors. Online backup services are considered a poor choice for end-users because this only increases the likelihood that an individual's data will be hacked. Computer users over 55 years of age are the most likely to click phishing links or give up personal information. Cybersecurity breaches can most often be traced back to personnel or procedural (process) factors. A vast majority of security breaches are not preventable and happen despite the best security practices. There is a technology solution for every security intrusion. Hardware failure is the least likely threat to one's data.

Cybersecurity breaches can most often be traced back to personnel or procedural (process) factors.

Organizations must be prepared to address and respond to the following situation(s) involving social media. Check all that apply. Employees sharing informational content posted by the organization on social media Dissatisfied customers publishing negative feedback about the organization on social media Individuals with no relationship with the organization posting harmful content about an organizational employee or the organization itself Employees posting content that could damage the organization's reputation Employees using internal social media for legitimate purposes Employees making anonymous posts on social media promoting the organization and disparaging competitors

Dissatisfied customers publishing negative feedback about the organization on social media Individuals with no relationship with the organization posting harmful content about an organizational employee or the organization itself Employees posting content that could damage the organization's reputation Employees making anonymous posts on social media promoting the organization and disparaging competitors

Spear Phishing

Employees of a medical center received e-mails from the head office manager, indicating that the recipient was being laid off and offering a link to job counseling resources. The link really offered a software payload that recorded and forwarded the keystrokes on the victim's PC.

Astroturfing

Engineering the posting of positive comments and reviews of a firm's product and services (or negative ones of a firm's competitors).

astroturfing(def.)

Engineering the posting of positive comments and reviews of a firm's product and services (or negative ones of a firm's competitors).

Electronic Social network

Facebook Online community that allows users to establish a personal profile, link to other profiles (i.e., friends), share content, and communicate with members via messaging, posts. Most personal relationships are reciprocal (i.e., both parties agree to be "friends").

Which of the following statements about Facebook and mobile is FALSE? Ads on Facebook mobile show up in a user's feed, the area of the screen they pay most attention to, suggesting mobile ads will be tougher to ignore than those on the side of a browser screen. Today, mobile makes up the majority of Facebook's advertising revenue. Facebook's was an early innovator and leader with mobile applications, out-competing Instagram in mobile photo sharing. Facebook's acquisition of WhatsApp was a way for the firm to gain leadership in the fast-growing mobile messaging market. Many analysts were skeptical of Facebook's ability to create a business from mobile. Mobile revenue just before Facebook's IPO was zero.

Facebook's was an early innovator and leader with mobile applications, out-competing Instagram in mobile photo sharing.

According to the lecture videos, research has shown that the link between (1) social media use and (2) negative responses and outcomes is the following: The majority of research studies show that social media use is the cause of various negative responses and outcomes. The majority of research studies reveal that the duration of social media use matters more in predicting negative outcomes than the types of social media use people engage in. Findings from existing studies are mixed; some show negative correlations and others show positive correlations. There is no link. The majority of research studies show that social media use is the cause of various positive responses and outcomes.

Findings from existing studies are mixed; some show negative correlations and others show positive correlations.

Which of the following is a FALSE statement about information system security? A constant vigilance regarding security needs to be a key component in your organization's culture. Information system security is fundamentally a technology problem. A constant vigilance regarding security needs to be part of your individual skill set. Information systems security involves a trade-off between cost and risk.

Information system security is fundamentally a technology problem.

Legacy Systems

Outdated information systems that were not designed to share data, aren't compatible with newer technologies, and aren't aligned with the firm's current business needs

Which of these would be an example of a DDoS attack? Overloading a popular social networking site with inbound messages in order to shut down access to the site Launching tough-to-track click-fraud efforts Stealing proprietary data directly from mobile phones using a distributed network of difficult-to-trace online services An extortion attempt where hackers threaten to reveal names and social security information stolen from medical records databases Launching a targeted phishing campaign on a department of defense or other surveillance network

Overloading a popular social networking site with inbound messages in order to shut down access to the site

Which of the following is a TRUE statement about websites, URLs, and phishing? Select all that apply. Phishing is one of the most common intrusion techniques used to spread malware. Spear phishing attacks specifically target a given organization or group of users. One of the reasons one should be careful about clicking on any URL in an e-mail is that hackers can easily embed a redirection in e-mail links, rerouting a user to an alternate online destination. Hackers might infiltrate computer systems to enlist hardware for subsequent illegal acts. URL-shortening services such as bit.ly limit the impact of phishing posts since the shortened URL, when clicked on, will clearly reveal the full target URL.

Phishing is one of the most common intrusion techniques used to spread malware. Spear phishing attacks specifically target a given organization or group of users. One of the reasons one should be careful about clicking on any URL in an e-mail is that hackers can easily embed a redirection in e-mail links, rerouting a user to an alternate online destination. Hackers might infiltrate computer systems to enlist hardware for subsequent illegal acts.

Prediction Market

Polling a diverse crowd and aggregating opinions in order to form a forecast of an eventual outcome.

In this scenario, the cloud firm manages the creation and deployment of software applications that are delivered online, while also managing the platform and infrastructure.

SaaS (Software as a Service)

In the ________________ of computing, technologies became so fast and inexpensive that they are considered pervasive and ubiquitous. Third Wave (1980s) First Wave (1960s) Sixth Wave (~2010-current times) Fourth Wave (1990s) Second Wave (1970s) Fifth Wave (~2000-2010)

Sixth Wave (~2010-current times)

Secondary Components/Activities

Technology / research and development—new product and process design Human resource management—recruiting, hiring, training, and development Procurement—sourcing and purchasing functions Firm infrastructure—functions that support the whole firm, including general management, planning, IS, and finance

Which of the following statements is FALSE? Facebook has a significant "walled garden," which has given rise to the fear that increasingly large parts of the Web will reside in a single service and thereby limit competition, innovation, and exchange. Facebook followed Twitter's Periscope with its own Facebook live video streaming tool. The Facebook-backed Libra cryptocurrency seeks to serve the 100 million adults worldwide who do not have a bank account. Application programming interfaces (APIs) refer to programming hooks, or guidelines, published by firms that tell other programs how to get a service to perform a task, such as sending or receiving data.

The Facebook-backed Libra cryptocurrency seeks to serve the 100 million adults worldwide who do not have a bank account.

Crowdsourcing

The act of taking a job traditionally performed by a designated agent (usually an employee) and outsourcing it to an undefined, generally large group of people in the form of an open call.

According to lessons from this module, one reason that people possess unconscious biases is the following: (choose the best answer) The human brain is wired to be immoral and selfish. The human brain is wired for poor information processing, so it is incapable of evaluating objective and unbiased information. The human brain receives millions of pieces of information each second and can only process a small fraction of this information, so it relies on mental shortcuts to make decisions. The human brain does not receive enough information at any given moment, so it intentionally seeks out relevant and objective information to fill in the gaps.

The human brain receives millions of pieces of information each second and can only process a small fraction of this information, so it relies on mental shortcuts to make decisions.

Big data

The massive amounts of data available to today's managers, often unstructured and are too big and costly to easily work through use of conventional databases

According to this module, some social media researchers express concerns that social media use is re-wiring our brains to shorten our attention spans, while other social media researchers caution that there is insufficient research to support these claims. False True

True

Which statement is TRUE about cybersecurity within organizations? Check all that apply. Two-factor authentication is favored for most security situations since it's considered to be fast and convenient for customers. The virtual shutdown of websites by way of overloading them with seemingly legitimate requests sent simultaneously from thousands of machines is termed a DDoS (distributed denial of service) attack. Proactively avoiding a cybersecurity incident costs less than dealing with a security breach afterward. A Red Team looks for weaknesses in security mechanisms, with a view to help plug the holes that might be exploited by cyber-criminals. Almost all security breaches can be traced back to technology lapses; personnel or procedural factors rarely factor in. When defining a cybersecurity strategy, it is always a balancing act between risk and cost.

When defining a cybersecurity strategy, it is always a balancing act between risk and cost. A Red Team looks for weaknesses in security mechanisms, with a view to help plug the holes that might be exploited by cyber-criminals The virtual shutdown of websites by way of overloading them with seemingly legitimate requests sent simultaneously from thousands of machines is termed a DDoS (distributed denial of service) attack

What is a business process? the triggers that initiate a sequence of events a series of steps taken to achieve a desired outcome or goal the goals a company specifies to define their performance targets raw facts and figures

a series of steps taken to achieve a desired outcome or goal

According to the textbook, after the initial problematic roll-out of the Healthcare.gov app, a team of seasoned technologists and committed developers worked on fixing the system using a(n) ____________ methodology and led the web app to exceed enrollment projections. waterfall agile DevOps spiral

agile

According to this video, a strategy you can use to resolve paradoxes (contradictory ideas and values) is the following: introduce new ideas that can resolve the paradox all of these clarify levels of analysis (individual, society, organization, etc.) account for time account for context

all of these

What is a key way that organizations use social media? customer engagement all of these contests and promotions human resources management data analytics viral marketing knowledge sharing

all of these

Which of the following best captures individuals' motivations for information security attacks? protest hacking (hacktivism) revenge (disgruntled employee) pranking people intellectual property theft all of these stealing personal or financial data cyberwarefare

all of these

When an organization creates its social media awareness and response team, it should: create a team comprised of a small number of individuals to maintain privacy about the organization's response strategies create an interdisciplinary team from different functional areas, such as public relations, legal, marketing, customer support, human resources, and IT, among others outsource the activities of this team to a SMART consulting firm create a team comprised primarily of individuals in public relations and marketing

create an interdisciplinary team from different functional areas, such as public relations, legal, marketing, customer support, human resources, and IT, among others

An attack on the U.S. power grid by terrorists or a foreign power is indicative of: espionage extortion DDoS attacks. phishing cyberwarfare.

cyberwarfare

According to the video "Artificial Intelligence Overview from Fortune Brainstorm Films" in Chapter 1, artificial intelligence could contribute up to $15.7 billion to the global economy in 2030. True False

false

The reason unscrupulous individuals use the unsophisticated method of Phishing or Spear Phishing emails are: Select all that apply. to gain the login information of the targets (email recipients) to access the targets' (email recipients') financial credentials for financial gain to get the most results for the least amount of effort to obtain private information to sell on the Dark Web to gain private information legitimately, as ransomware is protected under Section 230

o gain the login information of the targets (email recipients) to access the targets' (email recipients') financial credentials for financial gain to get the most results for the least amount of effort to obtain private information to sell on the Dark Web

In cloud computing, resources are said to be "pooled" because ________. organizations use open source standards which enable users to modify a program's source code organizations share the same physical hardware through virtualization organizations use the public network to create the appearance of a private connection organizations offer their services to each other free of charge, in a give-and-take arrangement

organizations share the same physical hardware through virtualization

According to the lecture videos, what contributes the most to the risk and challenges of implementing ERP systems? technology people and processes

people and processes

In the lecture videos, the Prada example shows that copying technology alone is not a guarantee of success. The firm would have benefited from a holistic understanding that Information Systems is comprised of the following components: processors, hard drives, networking, memory, and input people, processes and technology (hardware, software, and data) operating systems, programs, data, processors, and information the Internet, web, apps, enterprise software and legacy systems

people, processes and technology (hardware, software, and data)

Two of the biggest considerations in the management of the facilities of a large data center include: traffic and access parking and phone lines glycol and dust power and cooling

power and cooling

According to this module's lessons, systems thinking can help people think more critically about complex problems, as it helps explain the different components that work together to yield outcomes. When applying the information systems framework, which three components are most relevant? Select the three below. processes technology stimulus response people

processes technology people

A _____ enables communication between computers and processes by defining the format of data and rules for exchange. nomenclature convention protocol dialect regulation

protocol

According to lessons in Module 2, the following solution(s) can help us overcome our unconscious biases. Select all answers that apply. set objective criteria to evaluate information speed up our thinking to process more information at once seek out and be open to contradictory and differing views embed ourselves in diverse networks and embrace inclusive relationships embed ourselves in networks of people who share similar traits and views as us

set objective criteria to evaluate information seek out and be open to contradictory and differing views embed ourselves in diverse networks and embrace inclusive relationships

What are some of the novel technologies presented in Chapter 5? Select all that apply. smart billboards that detect people's demographics as they walk by in order to change its advertising to target these demographics smart diaper that sends a tweet when the sensor detects moisture smart license plate that contacts emergency services when a car crashes humanoid robot developed using stem cells from animal embryos that is a living, programmable organism smart umbrella that receives weather reports wirelessly and flashes when rain is expected smart hover board that leverages advanced hydraulic systems to achieve flight for short periods of time artificial neurons placed on silicon chips that mimic neurons of the human nervous system and can be used to treat Alzheimer's disease and other neurological conditions

smart billboards that detect people's demographics as they walk by in order to change its advertising to target these demographics smart diaper that sends a tweet when the sensor detects moisture smart license plate that contacts emergency services when a car crashes smart umbrella that receives weather reports wirelessly and flashes when rain is expected

According to this module, one of the conditions that has not been widely supported in existing research to establish a causal link between social media use and addictions or other mental health conditions is the following: strong correlation between (1) social media use and (2) addictions or other mental health conditions scientific or theoretical arguments that explain the causal relationship social media use precedes the development of addictions or other mental health conditions strong correlations between key variables that span multiple observations, different populations and different contexts

social media use precedes the development of addictions or other mental health conditions

Open source software is software developed for the open commercial market. software that provides the source code for a nominal purchase or licensing. all of these software that provides the source code for anyone to copy and use.

software that provides the source code for anyone to copy and use.

A supply chain management system is _____. Choose the best answer the management of data and services and includes all the processes that transform business operations into final products the management of the flow of good and services and includes all processes that transform raw materials into final products a suite software that allows company to manage all the systems within the company a system that supply's raw materials to the company

the management of the flow of good and services and includes all processes that transform raw materials into final products

According to the lecture videos and textbook, machine learning involves the following: Select all that apply. learning through additional explicit programming use of algorithms learning through data and experience learning by knowing

use of algorithms learning through data and experience

Timing and technology alone will not yield sustainable competitive advantage. Moving first pays off when the time lead is used to create critical resources that are _______. Check all that apply. low in switching costs valuable commodities durable goods lacking in substitutes tough to imitate rare

valuable lacking in substitutes tough to imitate rare

According to this module, what is a true statement about generational theory? Select all answers that apply. A generational cohort shares important historical, cultural, and social events that shape its members' attitudes and dispositions throughout their lives. Generational theory explains how different generations are similar to one another, despite the generational cohorts' experiencing different socio-cultural and historical events. Generational theory helps explain how each generation faces challenges in sharing traits with its own members. A generational cohort shares major experiences and events that leave distinctive imprints on the cohort, manifested in espoused beliefs, values, and behaviors. This is especially true when these events are experienced at salient, early stages of life.

A generational cohort shares important historical, cultural, and social events that shape its members' attitudes and dispositions throughout their lives. Generational theory explains how different generations are similar to one another, despite the generational cohorts' experiencing different socio-cultural and historical events. A generational cohort shares major experiences and events that leave distinctive imprints on the cohort, manifested in espoused beliefs, values, and behaviors. This is especially true when these events are experienced at salient, early stages of life.

Confirmation Bias

A member of a project team believes the team is using an inefficient methodology to execute and manage the project. To prove this point, the team member seeks out and summarizes information that verifies the flaws associated with the chosen methodology and ignores any evidence to the contrary. The team member presents this information to the project manager's supervisor as justification to change the team's methodology.

Horns Effect

A recruiter interviews a candidate who appears reserved and shy. Based on this first impression, the recruiter assumes the candidate will be incapable of effectively communicating with clients and connecting with other employees. Despite the candidate having letters of recommendation that highlight the candidate's effective communication and teamwork skills, the recruiter continues to believe the candidate lacks skills in these areas.

What is a TRUE statement about database management systems (DBMS)? Check all that apply. Although the DBMS is considered application software, using the layer cake analogy, it's useful to think of an organization's database systems as layered on top of the operating system layer but under the (enterprise) application layer. A DBMS is sometimes referred to as database software, which is software for creating, maintaining, and manipulating data. A DBMS is a tagging language that can be used to identify data fields made available for use by other applications. Most APIs and Web services send messages where the data exchanged is wrapped in identifying XML tags. A DBMS is a set of standards for exchanging messages containing formatted data between computer applications. A DBMS is a set of programming hooks, or guidelines, that tell other programs how to get a service to send or receive data.

Although the DBMS is considered application software, using the layer cake analogy, it's useful to think of an organization's database systems as layered on top of the operating system layer but under the (enterprise) application layer. A DBMS is sometimes referred to as database software, which is software for creating, maintaining, and manipulating data.

Which of the following are descriptions/examples of UnStructured Data ? Choose all that apply This type of Data is stored in conventional formats This type of data is more often associated with "Big Data" Relational Database is an example of this type of data Approximately 80 percent corporate data is an example of this type of data. Social Media is an example of this type of data Data Warehouse is an example of this type of data

Approximately 80 percent corporate data is an example of this type of data. Social Media is an example of this type of data

Financial Commitment

Can include investments in new equipment, the cost to acquire any new software, consulting, or expertise, and the devaluation of any investment in prior technologies no longer used

According to lessons in this module, the following statement best describes careers in information systems. Careers in information systems almost always fall on a business/soft skills track and include roles such as IT managers, consultants, and business analysts. Careers in information systems almost always fall on a technical track and include roles such as programmers, database developers, and network administrators. Careers in information systems can fall on either business or technical tracks and often combine both business/soft and technical skills.

Careers in information systems can fall on either business or technical tracks and often combine both business/soft and technical skills.

What is the difference between on-premises enterprise software and cloud-based enterprise software? On-premises enterprise software is hosted online on the company's own servers and accessed through a web browser, whereas cloud-based enterprise software is installed on off-site servers owned by the company. On-premises enterprise software is hosted on the vendor's servers and accessed through a web browser, whereas cloud-based enterprise software is installed locally, on a company's own computers and servers. Cloud-based enterprise software is hosted on the vendor's servers and accessed through a web browser, whereas on-premises enterprise software is installed locally, on a company's own computers and servers. Cloud-based enterprise software is hosted online on the company's own servers and accessed through a web browser, whereas on-premises enterprise software is installed on off-site servers owned by the company.

Cloud-based enterprise software is hosted on the vendor's servers and accessed through a web browser, whereas on-premises enterprise software is installed locally, on a company's own computers and servers.

________________ refers to connecting server computers via software and networking so that their resources can be used to collectively solve computing tasks. Grid computing Cloud computing Cluster computing Massively parallel processing

Cluster computing

Which statements are TRUE regarding the reasons managers should pay attention to Moore's Law? Check all that apply. The rising power of minicomputers mitigates the need of outsourcing in many firms. Cost decreases often encourage governmental regulation of suppliers. Ideas that may be impossible today due to power, capacity, or cost reasons may be possible in the future. The advance of powerful, cheap computing often comes with a special kind of price elasticity that enables whole new markets to open up.

Cost decreases often encourage governmental regulation of suppliers. Ideas that may be impossible today due to power, capacity, or cost reasons may be possible in the future. The advance of powerful, cheap computing often comes with a special kind of price elasticity that enables whole new markets to open up.

According to your textbook, how are artificial intelligence, machine learning and deep learning related? Machine learning is a subcategory of deep learning, which is a subset of artificial intelligence. Deep learning is a subcategory of machine learning, which is a subset of artificial intelligence. Artificial intelligence is a subcategory of machine learning, which is a subset of deep learning. Machine learning is a subcategory of artificial intelligence, which is a subset of deep learning.

Deep learning is a subcategory of machine learning, which is a subset of artificial intelligence.

According to the module videos and textbook, which of the following is an example of how organizations can develop and deploy more ethical and less risk-prone information systems? Select all that apply. Develop a code of technology ethics Use AI in the hiring process Hire ethicists Increase diversity in information systems development and management teams Create a systems review board Leverage "black swan" events to predict risks in the organization Assign managers and executives with the bulk of ethical decision making tasks

Develop a code of technology ethics Hire ethicists Increase diversity in information systems development and management teams Create a systems review board

According to the textbook and lecture videos, what is a risk or challenge associated with use of AI? Select all that apply. Poor customer service resulting from customer service text bots and virtual concierge apps Potential to lose competitive advantage because AI tools are easy to replicate Employees may resist AI systems in the workplace because AI could significantly alter their jobs. Potential for AI algorithms to yield biased predictions and results Consumers and employees may feel their information privacy is compromised. Insufficient and inconsistent data will inhibit AI use. Potential for negative unintended consequences of data misuse Potential to become obsolete and result in financial losses

Employees may resist AI systems in the workplace because AI could significantly alter their jobs. Potential for AI algorithms to yield biased predictions and results Consumers and employees may feel their information privacy is compromised. Insufficient and inconsistent data will inhibit AI use. Potential for negative unintended consequences of data misuse

Inclusion

Enacting practices that support respectful and collaborative work environments and encourage a sense of belonging and acceptance among all employees Organizations have made less progress in this area.

According to the textbook, what are ways that FreshDirect achieved competitive advantage over rivals? Check all that apply. FreshDirect was a first mover in the online grocery market, allowing the firm to develop brand, scale, data, and other advantages that newcomers lack. FreshDirect developed complex and highly customizable enterprise software that it also sells to retailers, differentiating its services. FreshDirect was a fast follower, learning from Instacart's successes and mistakes, and entered the online grocery market quickly with superior products at lower costs. FreshDirect created an imitation-resistant value chain. Traditional grocers found it difficult to copy the firm's delivery business because this would have left them straddling two markets (low-margin storefront and high-margin delivery), unable to gain optimal benefits from either.

FreshDirect created an imitation-resistant value chain. Traditional grocers found it difficult to copy the firm's delivery business because this would have left them straddling two markets (low-margin storefront and high-margin delivery), unable to gain optimal benefits from either. FreshDirect was a first mover in the online grocery market, allowing the firm to develop brand, scale, data, and other advantages that newcomers lack.

Which of the following is correct definition/description about information ? Choose all that apply Data presented in context so that it can answer a question or support decision making Inferred from knowledge and organized to have useful meaning Inferred from data and organized to have useful meaning Knowledge presented in context so that it can answer a question or support decision making

Inferred from data and organized to have useful meaning Data presented in context so that it can answer a question or support decision making

What is the relationship between Moore's Law and e-waste? Moore's Law predicts the shrinking of powerful chips, which leads to increases in chip pathways and the crowding of electrons. Moore's Law predicts higher turnover of new technologies in the workplace, leading to waste in employees' time when they often have to learn new technologies. Moore's Law predicts the slowing of e-waste as technologies become more affordable over time. Moore's Law predicts the accelerated obsolescence of technology devices, which leads to increases in discarded hardware devices.

Moore's Law predicts the accelerated obsolescence of technology devices, which leads to increases in discarded hardware devices.

Please select the answer that shows the correct order of the SDLC phases from start to finish, according to your textbook. Design, Requirements, Implementation, Maintenance, Verification Requirements, Design, Implementation, Verification, Maintenance Requirements, Design, Verification, Implementation, Maintenance Verification, Design, Requirements, Implementation, Maintenance

Requirements, Design, Implementation, Verification, Maintenance

According to the lecture videos, which statements are TRUE regarding spreadsheets? Check all that apply. Spreadsheets are not an effective tool to use to store large amounts of organizational data long term for decision making. Spreadsheets contain tables that are connected with a set of logical relationships that allow us to have more data and better data quality than we would have if the data just resides in an organizational database. Spreadsheets use SQL to create and manipulate data in workbooks. Spreadsheets are useful for analyzing data.

Spreadsheets are not an effective tool to use to store large amounts of organizational data long term for decision making Spreadsheets are useful for analyzing data.

According to this module, what is a true statement about "people" in information systems? Select all answers that apply. Information systems professionals are able to focus mostly on developing and maintaining skills with technology, such as software and data, because they typically work with other professionals (e.g., managers) who can focus more on the soft skills. Technology implementation failures in organizations are more likely to stem from problems with "people" (e.g., end users, project managers) rather than poorly designed technology. People create, use, and manage information systems, but they are not actually included in the definition of information systems. People create and manage the technology and process components of information systems; this is one reason it's important to understand the "people" component of information systems. Learning how to work effectively with people from diverse backgrounds is a critical soft skill that information systems professionals should learn and maintain.

Technology implementation failures in organizations are more likely to stem from problems with "people" (e.g., end users, project managers) rather than poorly designed technology. People create and manage the technology and process components of information systems; this is one reason it's important to understand the "people" component of information systems. Learning how to work effectively with people from diverse backgrounds is a critical soft skill that information systems professionals should learn and maintain.

According to section 16.4 of your textbook, which statements are TRUE about net neutrality? Select all that apply. Internet service firms (e.g., Google, Netflix) say they create demand for broadband business from ISPs (e.g., Comcast, AT&T), while broadband firms (e.g., Comcast, AT&T) say Internet service firms (e.g., Google, Netflix) are ungrateful parasites that aren't sharing the wealth. The Obama administration was largely against Net neutrality, but the Trump administration restored most of these regulations. As a result, several states have attempted to enact their own rules repealing Net neutrality. The Obama administration had largely supported Net neutrality, but the Trump administration removed most of these regulations. As a result, several states have attempted to enact their own rules favoring Net neutrality. Internet service firms (e.g., Comcast, AT&T) say they create demand for broadband business from ISPs (e.g., Google, Netflix), while broadband firms (e.g., Google, Netflix) say Internet service firms (e.g., Comcast, AT&T) are ungrateful parasites that aren't sharing the wealth.

The Obama administration had largely supported Net neutrality, but the Trump administration removed most of these regulations. As a result, several states have attempted to enact their own rules favoring Net neutrality. Internet service firms (e.g., Google, Netflix) say they create demand for broadband business from ISPs (e.g., Comcast, AT&T), while broadband firms (e.g., Comcast, AT&T) say Internet service firms (e.g., Google, Netflix) are ungrateful parasites that aren't sharing the wealth.

Data mining

The process of using computers to identify hidden patterns and to build models from large data sets

According to the textbook, which of the following is true of United States environmental legislation regarding e-waste and recycling standards? California's strict recycling policies led to the highest rate of recycling in history in 2017. The U.S. has nearly met its goal of reducing trash 75 percent by 2020. The U.S. is part of the Basel Convention on hazardous waste, a treaty that restricts the exports of e-waste. There is no U.S. federal legislation signed into law covering e-waste.

There is no U.S. federal legislation signed into law covering e-waste.

The founders of tech firms Microsoft, Dell, Facebook, Apple, Google, Instagram, Yahoo!, Snapchat, YouTube, Dropbox, Box, and Spotify all have the following in common: They were all college dropouts. They all left their positions at professional companies to found their own companies. They were all in their 20s when they founded these tech firms. They all funded their companies with Kickstarter campaigns.

They were all in their 20s when they founded these tech firms.

Hale Effect

Three candidates are being considered to fill one spot on a management team that will lead a major organizational project. The team's project lead does not personally know all three candidates but observes that one candidate stands out as being the most physically attractive. Despite this candidate having the most inferior credentials of the three candidates, the hiring manager feels most inclined to recruit this candidate to the management team

Information and Data

Users may have to reenter data, convert files or databases, or even lose earlier contributions on incompatible systems

What is a cross-functional process? a business process that spans multiple functional areas or units in an organization a business process that has so many functions or purposes that it becomes dysfunctional a business process that involves many people within the same department and does not involve other departments

a business process that spans multiple functional areas or units in an organization

According to the textbook, due to widespread access to simple, affordable handheld devices in East Africa's Somaliland, the country's economy is fast becoming: agriculture-based a global leader in mobile device manufacturing cashless a global leader in e-waste recycling

a global leader in e-waste recycling

A customer relationship management system is ________. Choose the best answer. a Web application that allows businesses to manage customer suggestions and complaints in a structured fashion a suite of software applications that integrates existing systems by providing layers of software that connect applications together a system for managing all the interactions with the customer, from lead generation to customer service a suite of applications, a database, and a set of inherent processes for consolidating business operations into a single, consistent, computing platform

a system for managing all the interactions with the customer, from lead generation to customer service

The scalability of a software product is defined as the: ability to take advantage of complementary products developed for a prior generation of technology ability to replace a technically superior product upon market inception. capability to continue operations even if a component fails. ability to be easily expanded to manage workload increases. long-term market viability of a software product.

ability to be easily expanded to manage workload increases.

According to the lessons in this module, our unconscious mind can determine: who we choose to help who we turn to for advice all of the these where we sit (e.g., in a business meeting) who we eat lunch with

all of these

Social media has been used for the following: all of these social protests spreading fake news word-of-mouth marketing reputation management recruiting

all of these

The assigned chapter discusses various sources of internal and external data that an organization collects, stores, and analyzes for strategic decision making. Which is an example of a data source discussed in the chapter? enterprise systems loyalty cards call center conversations social media surveys all of these transaction processing systems sensor data data aggregators (firms that collect and resell data) focus groups

all of these

Chapter 1 covers the following novel application(s) of drone technology. Select all correct answers. embedding sensors in home appliances crop surveying in farming that can inform ways to improve crop yields delivering medical supplies to rural, underserved communities transforming high-powered computing into a utility that even the smallest businesses can access and afford

crop surveying in farming that can inform ways to improve crop yields delivering medical supplies to rural, underserved communities

Which of the following is a benefit of in-house hosting (as compared to cloud hosting)? in depth visibility of security and disaster preparedness for business continuity superior flexibility and adaptability to growing or fluctuating demand lower capital requirements fewer training requirements

in depth visibility of security and disaster preparedness for business continuity

What are the advantages of ERP system ? Choose all that apply Answer, implementations can be costly and time consuming (sometimes spanning years) increased visibility into an organization's business processes operational efficiency and effectiveness standardized processes in the commercial software means the processes customizations can be costly and difficult to maintain when upgrading the software standardization and integration of business processes users tend to resist new implementations because these systems tend to substantially change their jobs "single source of truth" with data stored in a single, centralized database--allowing for powerful analytics and decision making

increased visibility into an organization's business processes operational efficiency and effectiveness standardization and integration of business processes "single source of truth" with data stored in a single, centralized database--allowing for powerful analytics and decision making

The major types of computer hardware are ________. input, output, processing and the storage devices data, hardware, applications and network none of these application program, data and network interface

input, output, processing and the storage devices

Software

instructions that tell the hardware what to do Web browser

According to the lecture videos, there is _______________ in the telecommunications industry (e.g., Verizon, AT&T) in the United States. low supplier bargaining power low threat of new entrants high customer bargaining power high threat of new entrants

low threat of new entrants

According to the lecture video, which AI tools do Apple's Siri and Android's Google Assistant rely on? Select all that apply. expert systems robotics machine learning natural language processing

machine learning natural language processing

The domain name service (DNS) is a distributed database that allows users to communicate with other computers by: assigning domain names to different IP addresses. mapping host and domain names to IP addresses of computers. assigning IP addresses to different domain names. creating IP addresses that are unique to servers. mapping host names to domain names.

mapping host and domain names to IP addresses of computers.

Which of the following is an example of "processing" hardware? Select all that apply. microphone hard drive printer microprocessor random access memory (RAM) speaker touchpad flash memory sensors on smart devices central processing unit

microprocessor central processing unit

According to the textbook, which of the following is NOT a strategy used by a firm to achieve and maintain competitive advantage? differentiation network effects packaged software scale advantages switching costs and data distribution channels brand

packaged software

Finance

robo-advisors computer-automated trading

According to the lecture videos and textbook, what are examples of artificial intelligence applications? Select all that apply. iRobot Roomba XML robo-journalists voice analysis software to detect employees' "compassion fatigue" CAPTCHA IBM Watson McDonald's use of digital drive-thru menus Electronic Data Interchange virtual backgrounds in conferencing apps like Zoom JSON

robo-journalists voice analysis software to detect employees' "compassion fatigue" CAPTCHA IBM Watson McDonald's use of digital drive-thru menus virtual backgrounds in conferencing apps like Zoom IRobot Roomba

Data is oftentimes considered a defensible source of competitive advantage; however, advantages based on capabilities and data that others can acquire will be ________

short lived

According to this module, a digital native is: someone who creates digital technologies, such as a programmer/software developer. someone who prefers the native operating system that comes installed on devices someone with advanced knowledge and expertise in using digital technologies, regardless of when they were first exposed to them. someone who grew up in a time when adoption and diffusion of digital technologies, such as the Internet, was already mainstream.

someone who grew up in a time when adoption and diffusion of digital technologies, such as the Internet, was already mainstream.

According to your textbook, a scrum team repeats or reiterates its efforts in ____________, which are short time-boxed increments, each increment usually lasting 1-6 weeks. daily scrums product backlogs sprints user stories

sprints

Regarding Internet access speeds, the United States currently is not in the top 25 ranking for nations' mobile download performance. True False

true

According to the lecture videos and your textbook, deep learning involves multiple layers of interconnections among data to identify patterns and predict results and uses _______________. Select all that apply. semi-supervised data unsupervised data unlabeled data unstructured data human intervention dark data

unlabeled data unstructured data


Set pelajaran terkait

Med Surg III - Summer 2017 - Test 4

View Set

Chapter 30: Assessment and Management of Patients with Vascular Disorders

View Set

Chapter 7: Special Driving Situations

View Set

Visual Studio: Review Questions Chapter 3

View Set

Accounting 101 (Chapter 2 Smartbook)

View Set

A Concise Introduction to Logic, Chapter 4 (Categorical Propositions)

View Set