MGMT 2303 Exam 1 study
Which of the following statements refer to programs known as spiders, web crawlers, and bots?
"Good bots" have diverse functions and do not pose security risks. Malicious bots create security risks by compromising a user's control of the computer. Internet robots are used for both legitimate and malicious purposes.
Which two of the following are examples of managers using a decision support system?
-A doctor evaluating a patient with complex, unusual symptoms tracks the patient's symptoms in the electronic health record (EHR) during the exam. The EHR analyzes the symptoms, suggesting possible illnesses related to the symptoms. -A sales manager wants to know how customer responses to a large, multistate sales promotion affect each of his reps' sales in real time.
What are two advantages that made mainframe-based POS stations among the first commercially available local area networks?
-Ongoing backup of data generated by each POS station -Communication between POS stations within a store
Gigabyte (GB)
1 billion bytes
Megabyte (MB)
1 million bytes
Petabyte (PB)
1,000 terabytes of data
Kilobyte (KB)
1000 bytes
How does a rootkit pose a cybersecurity threat?
A range of malicious actions is possible because the invader has the same access as the computer's owner or user. Installed on a computer's operating system, a rootkit bypasses security functions.
Select three options that describe advancements made in point-of-sale (POS) system software in the 1990s (in addition to in-store sales and tax tracking).
Across-chain sales and inventory tracking Stronger connection with customers Immediate communication with internal financial teams
Which of the following are areas covered by state-specific cybersecurity laws? More than one answer may be correct
Addressing security needs of smart devices. Protecting elections from cyber threats. Ensuring state and local governments are protected from cybersecurity threats.
Which of the following is not part of the boot process?
Any installed anti-virus software checks the system for errors
The value of data analytics to an organization can be best summarized by which statement?
Data analytics is a capability that supports increased organizational performance by drawing meaning from large amounts of data.
Which of the following is considered a cybersecurity threat to data at rest? More than one answer may be correct.
Data will be viewed by unauthorized users. Data will be stolen.
Which three of the following are key benefits of electronic point-of-sales (POS) stations?
Decreased customer wait time Increased information available to managers Increased accuracy
A sales manager receives weekly reports on each of the sales representatives they manage. Included in these reports are weekly sales by product, what percentage of the monthly quota the rep has achieved, and the sales ranking of reps compared to other reps in the company. These reports represent what function of a marketing information system (MKIS)?
Distributing sales and marketing information
Which 3 of the following are considered best practiced for ensuring that data are available?
Ensuring that the data server has an appropriate amount of bandwidth. Storing data on multiple hard drives. Having standby equipment available to take over in a situation where the main system fails.
According the Max Weber, which of the following characteristics are fundamental to capitalism? More than one answer may be correct.
Ethical behavior Charity Personal responsibility
Which of the following services are often provided by Platform as a Service (PaaS)
Hosting of hardware and software Multi-language program development Provide mobile software development kits (SDKs) that assist in app development.
Data at rest or storage can be found in which of the following places? More than one answer may be correct.
In the cloud On an external hard drive
What is the goal of the protect stage in the plan-protect-respond cycle?
Limit the impact of a security breach. Ensure uninterrupted delivery of vital services.
Terabyte (TB)
One trillion bytes of data
Which of the following is an example of an event that may occur during the protect stage of the plan-protect-respond cycle? More than one answer may be correct.
Perform routine maintenance on organizational resources. Require all employees to attend training that outlines the different types of security threats their organization faces. Determine levels of access control.
Which of the following statements best describes Follett's theory of management?
Receptivity to the flow of ideas from all levels of the organization leads to success.
In which of the following scenarios is a learning management system (LMS) being used to document student activity?
Students have a semester-long project that they are required to submit in stages through their LMS.
A manager receives word that a large portion of inventory is missing from a shipment to a channel partner. She analyzes the RFID tracking data and determines that this part of the shipment was delivered to the wrong channel partner. Which component of supply chain management experienced a breakdown in this scenario?
Supply chain logistics
Max Weber believed that organizations were best supported by which of the following strategies? Multiple choice question.
The use of rules and organizational regulations.
Select two options that are point-of-sale (POS) station output devices.
Thermal printer Speaker
What is the key role of a client-server network in business?
To provide personal computer users secured access to shared data.
Which two of the following are usually considered the strengths of the macOS platform?
Very stable and reliable, few viruses Strong graphics quality and graphical user interface (GUI).
According to the Hawthorne effect, when do employees become more productive?
When they know their work is being monitored.
Adam Smith's Invisible Hand theory proposes that ______.
a free, unregulated market operates better than one in which the government controls the business activities of individuals and companies
The primary advantage of mainframes computers is that they ______.
allow modifications to system capacity while the system is in use
Small application programs that are often utility programs and perform less complex operational functions and are commonly used to execute tasks in the Control Panel of Microsoft Windows are called ___.
applets
The essential function of malicious bots is to ______.
control an individual computer by self-replicating and connecting to a central server
Which of the following is considered a cybersecurity threat to data at rest?
data will be stolen data will be viewed by unauthorized users
In his text, "The Human Side of Enterprise," Douglas McGregor focused on __
manager attitudes toward their employees
According to Henri Fayol, the main roles or responsibilities of a manager are ______
planning, organizing, staffing, directing, and controlling processes correct Reason: Fayol identified these five roles of managers in Industrial Administration.
Resolution refers to the ______ and clarity of an image.
sharpness
John Locke's labor theory of property proposes that ______.
since people own their own labor, they naturally own the products of their labor
The purpose of executive support systems (ESS) is to
support decision making by compiling and organizing data into clear, usable reports
Programs that offer the structure and hardware control necessary to run the computer and its peripheral devices are called __ software.
system
Fill in the blank question. The most common OS for personal computers is Microsoft _____
windows
Which two of the following problems may be solved with the capabilities of an ERP system?
-An apparel firm needs to know how directly its marketing and advertising efforts effect sales. -A manufacturer must coordinate its new production line with elements of its supply chain.
Which three of the following are important considerations when purchasing a new laptop computer?
The OS The price The screensize
A business uses enterprise resource planning (ERP) systems to achieve ______.
an integrated MIS system that will strengthen its position in a competitive marketplace
Which of the elements of the CIA triad does serve in maintaining a properly functioning, error-free operating system? Multiple choice question.
availability
Memory and _______ hold data used y processors
cache
According to Mary Parker Follett, a successful business depends on ______.
competence and expertise
In his theories of management, Peter Drucker placed special emphasis on ____
the importance of involving employees in the decision-making process
A cybersecurity exploit is ______.
the means by which a hacker capitalizes on a cybersecurity vulnerability to gain access to and harm a system
An electrical company is considering opening a new location in North Idaho. In order to determine the size of the new location, it uses its HR management system to determine the number of employees to transfer from other locations, how many new employees it would like to hire for that location, and what each employees' role would be. What function is this HR management system helping the company perform?
Forecasting
Who is quoted as saying "Do what you do best and outsource the rest"?
Peter Drucker
To get to the bottom of the odd computer problems she was having, Priya listed these symptoms: files mysteriously disappearing, system configurations unexpectedly altered, and two icons showing up for applications she did not download. What malware could have been installed on Priya's computer?
a rootkit
Data from the hard drive reaches the CPU ___ than data from the RAM.
slower
The main characteristics that define cybersecurity threats are ______.
events that can lead to IT asset loss, conditions that can lead to IT asset loss, and the consequences of such loss
Select three options that describe benefits of cloud computing.
-Affordability for business use -Flexibility of user devices -Access to applications software
How do managers use personal computers for their business needs? More than one answer may be correct.
-Creating and using databases and spreadsheets -Communicating via e-mail
Which three of the following are common word processing programs?
Google Docs Pages for Mac Microsoft Word
What is the main purpose of a decision support system?
Help manage processes involving a variety of quickly changing inputs
Select the scenarios below that show how Frederick Taylor's scientific management has influenced today's business decisions. More than one answer may be correct.
-A political campaign director needs to hire paid workers and volunteers on all levels, from supervisors to canvassers. Instead of seeking mostly campaign veterans, the director recruits from groups who have shown great interest in "the cause." They'll be trained and supplied with what they need to do good work. -In some urban school districts, teachers work in teams of two so less experienced teachers learn from seasoned co-teachers. In addition to their administrative responsibilities, the principal and assistant principal assign the teams and hold staff trainings throughout the year. These schools find that this system benefits both teachers and students. -Supervisors in a large warehouse notice that the robots are working faster than the humans. Employees scanning and sending items off to shipping are becoming frustrated and even physically hurt moving the items that the robots pick off the shelves. Management decides to recalibrate the robots' speed to coordinate with the humans' speed.
Which three of the following are examples of a business that would benefit from scheduling software?
A restaurant that is open for lunch and dinner and has a full bar staffed with a bartender. There are 50 tables in the restaurant and each server is responsible for no more than five tables at a time. -A daycare center that is open Monday through Saturday from 7:00 am until 6:00 pm. There are six classrooms and each must have two teachers present at all times. No employee may work more than 40 hours per week. A national drugstore chain whose policy is that there must be two cashiers, one stock person, and one manager or assistant manager working per shift.
Which two of the following are reasons why employee scheduling software was originally developed?
-Make the execution of management policies more consistent -Improve the quality of employee performance