IS 2200
In an Excel file, if a label (such as the word "panda") is used in a formula, what will appear in the cell when the Enter key is pressed?
#VALUE!
You just had a great lunch at a nice restaurant and decide to leave a 15% tip on your $18 meal. What will be the total charge on your debit card?
$20.70
The stylist just did a great job and your hair is going to look good for weeks. The stylist charged $70 and you decide to add a 15% cash tip. How big is the tip?
10.50
Which person illustrates a characteristic of an excellent business thinker?
Barras uses a variety of sources such as journal articles and colleagues' expertise.
How can you make sure that your business report meets the needs of the target audience?
Consider updating them about your progress in creating the report and involving them in the process.
Gowan has been hired by Bailey's Automotive to assess whether the company should air television commercials in the local market. He is planning a study of the relationship between local television commercials and the sales of new vehicles. What is the best way for Gowan to establish a research objective that will address his research problem?
Determine how often television commercials result in purchases of new vehicles.
Social media providers include which of the following web based platforms?
Facebook, Instagram, and Twitter
Which statement about online research is true?
Industry sites list a variety of sources that may be more current than the information in business databases
Which guideline is suggested for fielding questions?
Pause before answering a question.
Auguste is mentoring Parul, a younger colleague, in how to be a better business writer. As Parul was writing her last memo, she did several things. Which one will Auguste tell her she needs to change?
She drew primarily on her own opinions and expertise.
Programs such as Microsoft Excel, iWork's (Apple) Numbers, Google Sheets, and OpenOffice Calc, that allow users to arrange numerical data are called
Spreadsheets
Which statement accurately describes microblogs?
They contain just a few sentences per entry.
Which statement is true about visual learners?
They enjoy gestures and metaphors.
From the following list, select all situations that lead you to suspect the presence of adware.
When looking up information on the Dallas Cowboys, you notice an ad for a Dallas Cowboys jersey.When looking up information on the Dallas Cowboys, you notice an ad for a Dallas Cowboys jersey. You have been looking for a car bike rack, and four out of five ads popping up on your browser show types of racks and other sporting gear.You have been looking for a car bike rack, and four out of five ads popping up on your browser show types of racks and other sporting gear. After you buy and download a drawing program, you begin seeing ads for interactive drawing games and other creative technology.
Software-based keyloggers often infect a system through
a malicious email or link opened by an unsuspecting user.
Arturo opens his presentation with his two takeaway messages and a statement that frames them both in appealing terms. What did he forget to include in the preview of his presentation?
an attention-getter
The beginning of your presentation is critical because
audience members form quick impressions about you and your message during this time.
Rafe, the sales manager at a national magazine, wants to compare sales of the magazine's spring issue on the West Coast to those in the Midwest and on the East Coast. This comparison will best be illustrated through a
bar chart.
In the financial world, which color represents credits or profits?
black
Spyware's basic function is to
capture the user's account data, passwords, keystrokes, and more.
During Kyle's presentation, one of the audience members asked for the names of additional sources of information about the topic. He promised to get it to her, looked up the sources as soon as he returned todesk, and emailed the information to her right away. Which of the three aspects of credibility is most demonstrated by Kyle's action?
caring
Industry publications tend to be
expensive
Which of these is least important when analyzing data related to a business problem?
focusing on tangential issues
If you wish to keep a column visible while you scroll through the rest of a spreadsheet file, you can use the ________ options.
freeze
The total amount of money (principal + interest) that lender receives from a borrower at the end of the loan is referred to as the loan's
future value (FV).
To determine how much a recurring monthly payment would be for a car loan or a mortgage, use the ________ function.
pmt
Bankers and other lenders refer to the initial amount of the loan (the principal) as the loan's
present value (PV).
The amount of money borrowed in a loan is often referred to as the loan's balance or the ________ of the loan.
principal
Which type of reputation is affected by material a person posts to an online discussion forum that is accessed only by people in his or her company
professional and private
Which threat to cybersecurity can only come from outside an organization?
ransomware
When displaying financial information, the accepted practice is that ________ indicates negative values.
red
Jorge primarily used research from printed texts for his report. What is a potential problem with Jorge's research?
reliability
A cybersecurity exploit allows a hacker or intruder to
remotely access a network, gain privileges, and make unauthorized changes.
Which of the NIST Cybersecurity Framework functions calls for quick action on the part of an organization's cybersecurity team to mitigate damage to systems?
respond (rs) function
A common method to delete a column or row in most spreadsheet programs is to ________ on the column or row heading, and then select Delete from the menu
right-click
Which action during a speech is most likely to result in your audience judging you as caring?
showing that you are interested in the needs of your audience
The evolution of the Internet from Web 1.0 to Web 2.0 platforms is the primary driver of the ________ Age.
social
Because they make it easy to arrange, display, and calculate numerical data, ________ programs are often used in budgeting, accounting, finance, grading, gambling houses, and even sports analysis.
spreadsheet
What is the first step of the PREP method of justifying your views in a presentation?
stating your position
During the Information Age, the role of public relations broadened, and it came to be seen as a key component of
the marketing mix.
You see ###### in a cell. This means that
this is not an error. The cell needs to be expanded in order to display the entire value.
What is a purpose of a positioning statement?
to demonstrate value to the audience
What is the purpose of saving an Excel file as a .cvs (comma-separated format) file?
to share data with other spreadsheet users regardless of which spreadsheet program is being used
Which type of event or condition may represent a cybersecurity threat? More than one answer may be correct.
an intentional event or action that damages computer hardwarean intentional event or action that damages computer hardware an unintentional or accidental event that deletes important network data or informationan unintentional or accidental event that deletes important network data or information the incorrect use or abuse of a computer assetsthe incorrect use or abuse of a computer assets an error, flaw, or weakness in a network asse
Describe steps in cybersecurity risk analysis. More than one answer may be correct.
assign value to assets assign value to assets estimate potential losses estimate potential losses estimate the likelihood of occurrence of threats
A public relations team's first step is to
clarify the company's brand.
The development of Web 2.0 tools has contributed to the development of more
collaborative networks
What are the core actions of the protect (PR) function?
controlling access to systems and preventing unauthorized access
controlling access to systems and preventing unauthorized access
controlling access to systems and preventing unauthorized access
Mason maintains an exhaustive database on his research sources and findings, which he shares with decision makers at Oriel Pharmaceuticals when presenting his report on the marketing approach for a new drug. This practice will increase the ________ of Mason's report.
credibility
Who is the primary audience for most business reports?
decision makers
The purpose of adware is to ________. More than one answer may be correct.
display ads to users based on their browsing behaviorsdisplay ads to users based on their browsing behaviors Correct redirect your search requests to advertising websitesredirect your search requests to advertising websites Incorrect collect marketing-type data about youcollect
The Primary goal of a companys social media strategy is to
engage potential customers
What is typically included in the reviewing stage of writing an effective business message?
ensuring that the communication is fair
In cybersecurity risk analysis, PML (probable maximum loss) is used to
help determine spending needed to adequately secure an organization's IT infrastructure.
In the context of dealing with business problems, what should ideally be the first step?
identifying
Pivot tables provide a quick way to organize information. In most spreadsheet programs, click the ________ tab to create a pivot table.
insert
When business professionals enter into primary research with preexisting assumptions or conclusions, they are likely to
interpret the data incorrectly.
Readers are more likely to react positively to a message if the writer
is clearly concerned about the issues discussed.
Sadiki included the question on a customer survey: "Do you prefer healthy, nutritious food, or food that is bad for you and will ruin your health?" The problem with that question is that it
is leading.
Which of the following statements describes a keylogger most accurately
is surveillance malware that captures confidential information through keyboard inputs
Which of the following is prohibited by the Computer Fraud and Abuse Act? More than one answer may be correct
knowingly transmitting a virus that causes damage to a computer knowingly transmitting a virus that causes damage to a computer accessing information on a computer that has been left unattended
In order to design your slides to facilitate ease of processing,
limit your text to ten words per line.
Which formatting method decreases the effectiveness of pie charts?
locating the smallest pie slice at 12 o'clock
Which of the following acts is an example of social engineering?
manipulating people in order to obtain and misuse their personal information
Which action is most likely to result in your audience judging you as having character?
offering your views transparently
Which of the following is a goal of an information technology disaster recovery plan (IT DRP)?
outline specific recovery times for information technology to resume after an issue occurs
A social media information system (SMIS) is composed of three parts, which are
people, data and procedures, and hardware and software.
Howard, a manager at ABN, has to prepare a report about the advantages of introducing a counseling program for employees in his company. In his report, he makes the claim that introducing a counseling program would reduce voluntary turnover because employees would be happier with their pay packages, but he offers no evidence linking counseling with pay. This report failed to effectively deliver the message that Howard had intended. What is the most likely reason for its failure?
unsupported generalization
User 2.0 is most likely to
use the Internet for social connection.
Wanda, the marketing manager at Royal Theatres, believes that employees should always act ethically and should also report instances of unethical behavior that they encounter. This belief held by Wanda is an example of a
value
In Apple iWork's Numbers the freeze options are located under the Table tab. In Microsoft Excel and Google sheets the freeze cells or panes options are found in the ________ menu.
view
Which is the best definition of a cybersecurity exploit?
It is the means by which a hacker capitalizes on a cybersecurity vulnerability to do harm.
The amount of money borrowed in a loan is often referred to as the loan's balance or the of the loan
Principal
What is a cybersecurity threat?
an event or condition that can lead to IT asset loss and the negative consequences of such loss
"Cybersecurity threat mitigation" includes all of the policies, procedures, and tools that help organizations
anticipate and counter threats from security vulnerabilities or incidents and reduce their impact.
Saving a spreadsheet file in .cvs format only saves the
cell values
Where are data in transit found?
cellular network
In the context of the AIM planning process, what tends to be the single most important planning step for many messages?
identifying reader benefits and constraints
If an organization wants to increase user engagement on social media, it wants to
increase the conversion rate of its social media posts to interactions with users.
Reports or guides that are issued by the government and organizations and that generally describe research about solving a particular issue are
white papers.
Ransomware is typically introduced into a network by a ________ and to an individual computer by a Trojan horse.
worm