MIS 2020: Practice Exam

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

When conducting a five-step ethical analysis, the first step in the process is

getting the facts.

Which law or set of laws was created to implement two World Intellectual Property Organization (WIPO) treaties and to update copyright laws regulating digital material?

the Digital Millennium Copyright Act (DMCA)

Which 1986 law makes it illegal to intercept calls or messages without a warrant?

the Electronic Communications Privacy Act

The Act that protects person-to-person wire, oral, and electronic communications is

the Wiretap Act.

To calculate an organization's customer equity (CE) value we first determine

the future lifetime revenue the organization's customers will generate.

Which type of event or condition may represent a cybersecurity threat? More than one answer may be correct.

- an intentional event or action that damages computer hardware -an unintentional or accidental event that deletes important network data or information -an error, flaw, or weakness in a network asset -the incorrect use or abuse of a computer assets

Of the companies listed below, which three are the most influential global e-commerce organization(s) in 2019, according to a graphic provided by Statista?

-Alibaba -JD.com -Amazon

Describe how business-to-business (B2B) e-commerce transactions work. More than one answer may be correct.

-Business-to-business (B2B) e-commerce is the selling of good and services between businesses. -B2B transactions often involve orders placed on a recurring basis. -B2B purchases often occur in large quantities and are directly shipped from one business to another.

Online analytical processing (OLAP) is the technology behind many business intelligence applications. Of the following, what three facts about OLAP and CRM are true?

-CRM analytics are considered a form of online analytical processing (OLAP). -CRM systems incorporate data mining through online analytical processing. -OLAP includes predictive what-if analysis, report generation, and forecasting.

Which of the following statements about sources of customer data are correct?

-Customer surveys collect feedback from customers. -Data collection from social media platforms can be integrated within a CRM platform. -Analytics are used to uncover trends in the collected data.

From the following list, select all of the ways in which cybersecurity helps preserve the integrity of data, information, and systems.

-Cybersecurity policies and procedures are designed to protect the consistency, accuracy, and dependability of these assets. -Cybersecurity tools such as user-access controls, file permission, and version controls help prevent unauthorized changes. -Cybersecurity systems are designed to detect unauthorized or unanticipated changes to data that suggest a loss of integrity.

We Are Social surveyed internet users aged 16-64 around the world, to learn about their e-commerce activities. What did the survey reveal about this demographic? More than one answer may be correct.

-Eighty percent searched online for a product or service to buy online. -Ninety percent visited an online store on the world wide web. -Seventy-four percent reported they had purchased a good or service online.

Which of the following services are often provided by platform as a service (PaaS) vendors? More than one answer may be selected.

-host hardware and software -build scalable apps without having to write any code -provide social media capabilities

Which of the following are correct regarding blockchain? More than one answer may be selected.

-In supply chain management, blockchain can verify with almost absolute certainty where items and goods are along the supply chain, thus removing guesswork and inefficiencies for shippers and customers. -For business contracts, blockchain makes it almost impossible to change any information in a contract. This is advantageous for businesses that are dealing with multiple contracts.

Which statement defines or explains a characteristic of information density? More than one answer may be correct.

-Information density is the total amount of information as well as the quality of information available to all individuals in a market, including customers and stakeholders. -Information density in e-commerce allows consumers to more easily find retail prices for goods or services (price transparency) and the wholesale costs a seller paid (cost transparency). -Information density in e-commerce allows consumers to more easily find retail prices for goods or services (price transparency) and the wholesale costs a seller paid (cost transparency).

Which of the following applications or services will Web 3.0 be built to support? More than one answer may be correct.

-IoT -SaaS -ubiquitous computing

A digital music streaming company is promoting its service in a new country with a special discount for residents. How can the company use authentication to help prevent people from exploiting or abusing the deal? More than one answer may be correct.

-It can verify that the customer lives in the correct country. -It can verify that the customer is new to the company or service. -It can grant the customer access only to the music included in the deal.

When reporting a coworker's computer ethics violations, which of these guidelines should you follow? More than one answer may be correct.

-Only report incidences that you have personally witnessed. -If in doubt, report the activity to ensure that it does not go unnoticed.

What groups of people can Audience Insights generate information about? More than one answer may be correct.

-People who speak a specific language. -Facebook users who have indicated interest in an event publicized on Facebook. -All Facebook users.

From the following list, select all the ways in which CRM systems assist businesses in targeting a market segment.

-They help identify the common characteristics of target market members, including geographic location, demographic and psychographic backgrounds, and income level. -They help identify the common characteristics of target market members, including geographic location, demographic and psychographic backgrounds, and income level. -They provide analysis of customer characteristics, which is an important part of the target market identification process.

If an organization does not yet have social media content and followers, what can it do to help identify its target markets? More than one answer may be correct.

-Use existing customer information to conduct customer research -Use demographic and behavioral information to conduct market research -Use public and purchased information to conduct competitor research

From the following list, select the companies that are leaders in the re-commerce market.

-Yerdle Re-commerce -thredUP -The RealReal

Which of the following threats to cybersecurity come from internal sources? More than one answer may be correct.

-an accidental erasure of data -an attack by an authorized user -the leakage of sensitive information

The deactivation of access to corporate systems and documents after an employee leaves a company is an example of which tool that ensures confidentiality? More than one answer may be correct.

-authentication -access control

Which of the following are common issues experienced by e-commerce-oriented businesses?

-data theft -unethical practices -challenges with competitor analysis

Of the following categories, which are identity data? More than one answer may be correct.

-date of birth -name and address

Which browser settings should you consider adjusting? More than one answer may be correct.

-deciding from which sites you want to allow cookies -blocking or customizing your cookie settings

Which of the following concerns falls under the dimension of establishing standards in the digital age? More than one answer may be correct.

-how much data employees use to stream audio and video over Wi-Fi while working -how often employees check their personal social media sites each day while working

Data redundancy can lead to which three of the following?

-increased storage fees -inefficient access times -inconsistent data

Which of the following is prohibited by the Computer Fraud and Abuse Act? More than one answer may be correct

-knowingly transmitting a virus that causes damage to a computer -accessing information on a computer that has been left unattended

What are characteristics of business-to-business (B2B) transactions? More than one answer may be correct.

-often transpire on a recurring basis -generally involve large quantities -often include direct shipment between businesses

What is an example of a business-to-business transaction? More than one answer may be correct.

-purchasing office supplies for a university -buying medical equipment for a pediatrician's office -purchasing food service items for a restaurant

Information in tables is stored in ________ called records and ________ called fields.

-rows -columns

Which of the following are reasons why states are making cybersecurity measures a high priority? More than one answer may be correct.

-the acceleration of new technologies -the proliferation of cyber threats to data and technologythe

The use of web mining by organizations can lead to improved website visibility, ________, and ________.

-usability -accessibility

In which customer interaction instances is automated messaging especially useful? More than one answer may be correct.

-when a customer transaction warrants an initial acknowledgment -when information about task scheduling needs to be conveyed -when the answer to a customer's question is not in FAQs

Which intellectual property is correctly matched with the legal device or tool that protects it?

A portrait that you paint can be copyrighted.

Instagram Insights only provides demographic and engagement information for paid activity.

False

Which of the following is an example of something that would occur during the Measure and Analyze steps of the Six Sigma process? More than one answer may be selected.

Determine the number of imperfect products that occurred at a manufacturing plant every month Compare the number of imperfect products produced at two different manufacturing plant locations and describe any procedural differences between the locations. Determine the different types of training that occur at different corporate locations.

Social media providers include which of the following web-based platforms?

Facebook, Instagram, and Twitter

A form of protection provided by the laws of the United States for "original works of authorship," including literary, dramatic, musical, architectural, cartographic, choreographic, pantomimic, pictorial, graphic, sculptural, and audiovisual creations is called a patent.

False

A large corporation purchases and sells consumer data. This is referred to as big data collecting.

False

Actively encouraging any employee to halt production if a manufacturing error or safety risk is observed is part of the training associated with the disruptive innovation model.

False

Conversations and interactions on social media are not part of the information provided to organizations.

False

ERD is a method of describing the architecture of databases structurally by using tables.

False

Generally, cloud computing services are classified in three ways: infrastructure as a service (IaaS), platform as a service (PaaS), and security as a service (SaaS).

False

Just-in-time manufacturing and inventory management gained popularity in the 1980s and sought to emulate the efficiencies of Korean automobile manufacturers.

False

Lean manufacturing techniques seek to eliminate waste in the production process; in contrast, Six Sigma seeks to eliminate disruption.

False

Supply chain management systems are business computer applications that support customer preferences and relationships.

False

The Children's Internet Protection Act of 2000 (CIPA) seeks to keep children off the Internet.

False

The practice of trading used, old, or obsolete products via the internet in exchange for other used or similar products is called re-commerce.

False

The software code of a particular computer virus is called the virus DNA.

False

To evaluate an organization's internal opportunities and threats, management can conduct a PESTEL (political, economic, sociocultural, technological, environmental, and legal) analysis.

False

Which Act requires all government agencies to have a plan in place in the event of a cyberattack?

Federal Information Security Management Act (FISMA)

A company wants to begin monitoring the Internet usage of its office employees to ensure that their working hours are spent productively. What is the least that the company should do to respect its employees' rights to information privacy?

Inform employees of the monitoring and obtain their consent.

Which of the following is an example of a benefit to using a scroll-over feature on a Business Intelligence (BI) dashboard?

It allows the user to see the details of the project right from the screen with overall summary of the project.

Which CRM-compatible sales prospecting tool utilizes the profiles and connections on a social media platform to generate prospects?

LinkedIn Sales Navigator

Which of the following is the term for CRM analytics that provides information about where data erosion occurs and how the erosion can be minimized?

Standardized Data Collection Processes

Which provision of the USA PATRIOT Act was not renewed after it expired in 2015 nor covered by the subsequent USA Freedom Act?

The National Security Agency may not collect mass phone data from United States residents and citizens.

Why is it important to preserve the integrity of data, information, and systems?

These assets lose their usefulness and value if their consistency, accuracy, or dependability is compromised.

How do businesses ultimately benefit from using a CRM to identify the highest revenue customers in a target market, before developing a marketing campaign?

They better understand their ideal customer for their product or service.

In 2013 the U.N. General Assembly adopted a resolution affirming that the rights held by people offline must also be protected online, calling for its member nations to respect the right to privacy in digital communication. Which of the following statements applies to the real-life impact of this resolution?

This sounds good, but users should be aware that digital privacy is not honored by many on the Internet.

A data mart is a division of a data warehouse explicitly built and constructed for individual departments or business functions.

True

Analytics can provide insight into how customers and members of the organization interact with the customer relationship management software. This information can be used to design data collection strategies that encourage interaction and use.

True

Because Business Intelligence (BI) and Big Data Analytics only has value if it can be effectively presented and interpreted, one of the most important features of a BI system are its data visualization tools.

True

Conducting a PESTEL analysis involves evaluating any external opportunities and threats to an organization by examining the political, economic, sociocultural, technological, environmental, and legal issues facing an organization.

True

Enterprise resource planning (ERP) software is a business application that integrates the management of almost all aspects of an organization.

True

In 1979, Professor Michael E. Porter published "How Competitive Forces Shape Strategy" in the Harvard Business Review. In this paper, he described factors (or forces) that impact businesses. These became known as Porter's 5 forces.

True

Many corporations integrate supply chain management (SCM) software into an enterprise response planning (ERP) suite of software.

True

Merchant account aggregators and merchant money aggregators support small businesses by allowing them to share merchant accounts.

True

One of the benefits of cloud computing is increased collaboration among corporate users.

True

The cash register was the primary transaction processing system for nearly 100 years.

True

To encourage reports about computer ethics violations, managers should ensure that a system exists in which employees can report such malfeasance anonymously.

True

Why would a business choose to implement a business intelligence (BI) software system that their employees are already familiar with?

User familiarity will make the implementation easier and as seamless as possible.

Each time a user clicks or interacts on a social media website

a data point that can be analyzed is recorded.

How is quantitative data about a customer most accurately characterized?

as a record of how a customer interacts with a business

What is the MOST direct way in which customer relationship management (CRM) systems can help businesses increase their sales?

by facilitating customers' transactions with the business

In order to gain market share, a business must differentiate itself from its

competitors.

A bank clerk has inappropriately used a customer's personal email address. The branch manager reprimands the employee and withholds an expected promotion. Which dimension of ethical behavior in the digital age is demonstrated by this disciplinary action?

control and accountability

A state requires all visitors to online cannabis shops to be at least 21 years old. However, it is unclear who should screen the website visitors and who should be responsible for any violations. Which dimension (category) of ethical behavior does this issue fall under?

control and accountability

It is far less expensive to retain an existing customer than it is to acquire a new customer. This is the concept behind the use of which business computer application systems?

customer relationship management systems

Share of wallet is also known as share of

customer.

Providing visibility means that the user interface of any SCM remains a critical component. Typically, a user interface comes in the form of a

dashboard.

Which element of a PESTEL analysis is represented by the use of data mining information from the Bureau of Labor Statistics to gain insight into regional employment figures?

economic

Which dimension of ethical behavior in the digital age includes the question of how much time employees are allowed to spend browsing social media?

establishing standards

The First Amendment to the U.S. Constitution affects Internet privacy because it

extends freedom of speech protection to the Internet, which means government does little filtering of content.

One benefit of using a CRM system to segment a market (rather than another type of market segmentation tool) is that a good CRM tool

facilitates using the company's own, collected data about customers.

Which EIS category would be responsible for tracking travel expenses incurred by regional sales representatives?

financial management

How many dimensions or categories can the ethical concerns of the digital age be divided into?

five

A new app was released providing consumers with digital coupons for products the consumer indicates they frequently purchase. The app gives different users coupons with different values and shares purchasing as well as demographic information with the product manufacturer. Under what circumstances would the information sharing with product manufacturers be ethical?

if the app's terms of service indicated who they would be sharing information with and what information would be shared

An appropriate social media goal for a business that wishes to raise its public profile is

increasing brand awareness.

The difference between a company's fundamental value and its total value is that

its fundamental value is what customers and stakeholder's value about its product or service, while its total value includes the value added by other aspects of the business.

Coffee vendors who operate small, drive-up coffee stands find it difficult to charge significantly higher prices than their many competitors do. What aspect of the coffee stand business makes raising prices difficult?

its low barriers to entry

The amount of time that passes between when a device is asked to perform and when it completes the task is known as

latency.

An international automobile manufacturer is concerned about how its global operations will be impacted by changing government standards for auto emissions and fuel efficiency. Which component of a PESTEL analysis can best help the manufacturer evaluate any threats posed by these policy changes?

legal

Which of these is the "L" factor that managers examine while conducting a PESTEL analysis?

legal considerations

With the increasing presence of Internet e-commerce sites, the force of customers has

leveled off.

What is the fourth step in a five-step ethical analysis?

listing options

Where are data in transit found?

on a cellular network

Which major category of executive information system application would focus on the process a software company used to launch a new application?

operations management

A checkbox may ask if you want to receive news and updates or participate in surveys from the site. When creating or browsing websites, this checkbox is referred to as an

opt-in and opt-out.

When conducting a SWOT analysis, an organization's human resource management system is used to evaluate the relative strength or weakness of its

personnel (workforce).

A branch manager for a national car rental company is in the process of conducting a SWOT analysis for her location. Which of the 5 Ps can she examine using the company's inventory management system for its rental fleet?

plant (physical attributes or resources)

The organizations likely to benefit the most from the global reach of e-commerce are those that

previously depended on foot traffic into one physical store to sell their products.

A branch manager for a national car rental company is in the process of conducting a SWOT analysis for her location. Which of the 5 Ps can she examine using the company's inventory management system for its rental fleet?

processes (activities that create value)

A ________ is also known as a question. A request for information from a database.

query

Entities in Diagrams of Entity Relationship (ERD) are the many business objects that make up the database. Such objects contain:

roles/people tangible business objects intangible business objects

A company regularly honors its employee-of-the-month with a congratulatory post on its social media pages. Which standards should the company establish and enforce to best protect the privacy rights of these employees?

rules of conduct for how social media followers and visitors respond to the posts

Of the listed methods of collecting demographic information, which is the most effective for organizations defining their target market?

surveys

Which of the following do modern inventory systems ensure? More than one answer may be selected.

shelf-space optimization, minimization of stock obsolescence,profitability of product lines

A business must not only look at its direct competitors, but also must contend with those firms that offer a product that a consumer might alternatively choose. For example, McDonald's and Burger King can be considered competitors and if one firm raises prices the other firm might gain its customers. However, if both firms raise their prices, customers may choose to purchase pizza instead. Porter refers to this as the force of

substitutes.

If McDonald's and Burger King raise prices too high, customers may switch from burgers to tacos. This illustrates Porter's force of

substitutes.

What is the correct term for systems that allow money to be exchanged for goods and services more efficiently?

transaction processing systems

Which type of cybersecurity breach can cause the most damage to an organization's systems, data, and information?

viruses

When a large number of buyers seek to purchase a firm's products even when prices increase, Porter's force of customers can be said to have

weakened.

User communities rely on which of these software components to engage with a social media information system (SMIS)? More than one answer may be correct.

web browsers applications that access content

A manager must conduct an ethical analysis to decide whether an employee is abusing the company's flextime policy. When determining whom will be affected by her decision, it is important that the manager also consider

whether she might personally benefit or be harmed by it.


Set pelajaran terkait

MASSACHUSETTS Life Insurance Producer

View Set

Business Policies Test 1 (Ch. 1-4)

View Set

Medication and IV Administration

View Set

18. Extensor Indicis- Abductor Pollicis Longus

View Set

CHS 330: Environmental Health Final

View Set

Lab Assignment - Spine and Thorax

View Set