Final Exam Study Questions

Ace your homework & exams now with Quizwiz!

Seong finds that a geographic restructuring would have a positive effect on his insurance company's sales department and increase its efficiency. He draws up a report for the board of directors in which he suggests that separate departments should be set up for each of the company's 10 sales territories. Which statement is most likely to increase the positivity of his proposition?

I look forward to putting together a detailed plan to restructure the company geographically.

The cost of borrowing money, quoted as an annual percentage rate (APR), is a loan's:

Interest

How are data in process different from data at rest or data in storage?

It is held in the device's RAM until it can be processed by the CPU or GPU.

Overall and underlying messages that others decode from your online communications are referred to as ________ messages.

Meta

To determine how much a recurring monthly payment would be for a car loan or a mortgage, use the ________ function.

PMT function

What is the most common format for a written PR message?

Press-release style

________ involve ranking or assigning importance to things, such as projects, goals, and tasks.

Priorities

Why is data that is located in the RAM of a device considered data in transit?

RAM only holds data and instructions temporarily; nothing is permanently stored in RAM.

T/F: A legend shows which items are being identified by the different colors, lines, bars, or pie segments.

True

T/F: According to the National Institute of Standards Technology (NIST), the RS function of the framework includes communications with internal and external stakeholders.

True

What is the goal of the planning phase of the plan-protect-respond cycle?

Understand common threats that an organization may face and determine how vulnerable they are to such threats.

Which formatting guideline increases the effectiveness of all types of charts?

Use darker colors to represent the most important data series.

Nate's boss has asked him to present a business report on "consumer shopping habits" in three days. Due to the time constraint, his boss wants him to use secondary research. In this situation, what should Nathan do?

Use data published in business journals.

Which social media tool would be best at helping a business professional establish a personal brand?

a blog

Which element is a typical Web 2.0 communication?

a discussion forum that allows users to post questions and answers

Which type of visual is most effective to display stock prices over time?

a line chart

Conrad was disturbed to find evidence of applications he did not download, system configurations unexpectedly altered, and files mysteriously that disappeared and moved. Which cybersecurity threat best explains the problems he was having?

a rootkit

In spreadsheets, all functions and calculations begin with

an equal sign (=).

Define social age:

an era in which people engage in networked communication, collaborate across boundaries, and solve problems communally.

What is a cybersecurity threat?

an event or condition that can lead to IT asset loss and the negative consequences of such loss

"Cybersecurity threat mitigation" includes all of the policies, procedures, and tools that help organizations

anticipate and counter threats from security vulnerabilities or incidents and reduce their impact.

Soria, the owner of Sky Spa, wants to know how her customers feel about the experience at her location. One of the questions in her survey questionnaire reads, "On a scale of 1 to 5, how would you rate our prices, comfort, and service?" This question is ineffective because it...

asks about multiple ideas.

What is an example of an activity that would be useful during the planning stage of the plan-protect-respond cycle?

attempting to exploit flaws from the outside, simulating attacks that a hacker would try

To break out of the reputation of an inexperienced newcomer, a person should

attend a lot of meetings to get to know as many colleagues as possible.

During which step in the AIM planning process should you consider the constraints your readers face?

audience analysis

Which chart type can be used to compare many types of data and is thus the most versatile?

bar charts

Which action is a deceptive research practice?

cherry-picking data and adjusting information in your favor

The development of Web 2.0 tools has contributed to the development of more

collaborative networks.

What has the greatest influence on the impact of social media in the workplace?

cultural norms and values

According to the Coca-Cola social media guidelines, when employees promote the brand online, they should

disclose that they work for the company.

Sadie, the expeditor at RingGro Manufacturing, writes a memo asking her manager to buy her a new computerized system for tracking customer orders. She claims that if she does not get this system, chronically late deliveries will ensue. Her manager turns down her request. Sadie made the mistake of using

either/or logic.

In order to be effective, a consumer survey should contain:

exhaustive answer choices for each question.

What is least important when analyzing data related to a business problem?

focusing on tangential issues

In cybersecurity risk analysis, PML (probable maximum loss) is used to

help determine spending needed to adequately secure an organization's IT infrastructure.

What does the General Data Protection Regulation (GDPR) regulate?

how companies protect personal data

Cybersecurity threat mitigation is best defined as the policies, procedures, and tools that help an organization

identify cybersecurity threats, prevent them from being realized, and minimize damage from them.

Charlie has been assigned the task of creating an effective business message aimed at encouraging healthy habits in the workplace. He uses the AIM planning process. What should he do during the information gathering stage?

identify problems that prevent employees from making healthy choices

When business professionals enter into primary research with preexisting assumptions or conclusions, they are likely to

interpret the data incorrectly.

Readers are more likely to react positively to a message if the writer

is clearly concerned about the issues discussed.

An email that appears to be from a legitimate company is most likely to be a social engineering cybersecurity attack if

it contains a link to a free offer that seems too good to be true.

One surveillance technology that relies on how the user enters data is a

keylogger

In the course of creating an effective business message, excellent business thinkers are most likely to

make well-reasoned conclusions and solutions.

Ransomware basically holds a target hostage because it

makes the target's own data inaccessible.

Adrian and Frank began the online process of applying for a short-term loan for their business. They created an account with a username and password, looked over the privacy statement, reviewed the security policy, and accepted the terms of use. After logging on, however, they became increasingly uncomfortable answering so many detailed questions about income, employment, and more. What specific risk might they have remembered from studying cybersecurity?

man-in-the-middle (MitM)

One potential drawback of using social media in the workplace is that social media

may lower productivity.

In order to make business messages more positive, business writers should focus on actions they can accomplish and demonstrate a realistic optimism. However, they should be careful

not to set unrealistic expectations.

What is a goal of an information technology disaster recovery plan (IT DRP)?

outline specific recovery times for information technology to resume after an issue occurs

Web 1.0 communication tools are primarily

passive and static.

A social media information system (SMIS) is composed of three parts, which are:

people, data and procedures, and hardware and software.

A unique set of professional skills and attributes that others associate with you is called your

personal brand.

Bankers and other lenders refer to the initial amount of the loan (the principal) as the loan's:

present value (PV)

What is the key action called for in the detect (DE) function of the NIST Cybersecurity Framework?

quick identification of a cybersecurity threat

The ________ of data acquired through secondary research is how well it applies to your specific business problem.

relevance

Jorge primarily used research from printed texts for his report. What is a potential problem with Jorge's research?

reliability

A cybersecurity exploit allows a hacker or intruder to

remotely access a network, gain privileges, and make unauthorized changes.

What is most likely to show that the writer of a business message has concern for the audience?

respecting the autonomy of the reader

Which of the NIST Cybersecurity Framework functions calls for quick action on the part of an organization's cybersecurity team to mitigate damage to systems?

respond (RS) function

The advantage of an op-ed style corporate blog is that it is often used to

share the opinions and expertise of a corporate leader with the public.

What action is most likely to lower a person's credibility?

slanting facts

In an Excel file, if a label (such as the word "panda") is used in a formula, what will appear in the cell when the Enter key is pressed?

#VALUE!

What are two methods of selecting a range of adjoining cells in Excel?

1. Select the first cell in the range and drag down to the last cell. 2. Select the first cell in the range then hold down the shift key and select the last cell in the range.

Which of the following is a best practice for ensuring that data are available? More than one answer may be correct. 1. keeping current with all system upgrades keeping current with all system upgrades 2. limiting access to those who have the appropriate clearance 3. preventing bottlenecks 4. using two-factor authentication

1. keeping current with all system upgrades keeping current with all system upgrades 3. preventing bottlenecks

Describe the categories of the Recover (RC) function of the NIST Cybersecurity Framework. More than one answer may be correct.

1. restoration of impaired systems restoration of impaired systems 2. improvements to cybersecurity plans improvements to cybersecurity plans 3. communication with all stakeholders

If you type = 2 + 3 * 6 into a cell in a spreadsheet and then press Enter, what will appear in the cell?

20

To quickly show if the values in a column or row are greater than, less than, or equal to a certain value, use the ________ function.

IF function

The evolution of the Internet from Web 1.0 to Web 2.0 platforms is the primary driver of the ________ Age.

Social

Sports analysts often use ________ to keep track of statistics, times, and scores of nearly every sporting event.

Spreadsheets

What do the deductive approach and inductive approach to structuring business messages have in common?

The arrangement of supporting ideas is important.

Who is responsible for calculating probable maximum loss?

a company's cybersecurity analysts

A Trojan horse succeeds through

deceptive access.

Bad actors seeking to create computer viruses primarily must know how to

program

In what stage of the plan-protect-respond cycle forensic analysis conducted?

responding stage

If you type =3+2^2*6 into a cell in a spreadsheet and then press Enter, what will appear in the cell?

27

T/F: In financial institutions, the color red represents positive values?

False

T/F: Using percentages in tables, as opposed to counts, makes it difficult for readers to make effective comparisons quickly.

False

Pivot tables provide a quick way to organize information. In most spreadsheet programs, click the ________ tab to create a pivot table.

Insert tab

Enduring beliefs and ideals that individuals hold are called

Values

Spyware's basic function is to

capture the user's account data, passwords, keystrokes, and more.

Saving a spreadsheet file in .csv format only saves the

cell values

A drawback of online databases is that they

take time to navigate.

During the Information Age, the role of public relations broadened, and it came to be seen as a key component of

the marketing mix.

The traditional role of public relations was to communicate with

the media.

What is the goal of most public relations messages?

to create a distinctive brand for a company or organization

What does the General Data Protection Regulation (GDPR) strive to achieve?

to ensure EU companies protect the privacy and personal data of EU citizens

What is the purpose of saving an Excel file as a .cvs (comma-separated format) file?

to share data with other spreadsheet users regardless of which spreadsheet program is being used

To ensure that the bar charts are formatted effectively, the bars should be about ________ the width of the space in between bars.

two times

Which technique is most likely to make business messages more positive?

using constructive terms

Chavez, a human resources manager of K8 Fabrics believes that the company can improve employee retention rates by improving employee benefits. In outlining his argument to the company's leadership team, he points out that a large technology firm had success with such a strategy. Chavez' message fails to convince K8's leadership team. What is the likely cause of their reaction?

weak analogy

Reports or guides that are issued by the government and organizations and that generally describe research about solving a particular issue are

white papers.

In a blog post, you have ________ to draw your readers in.

5 to 15 seconds

What spreadsheet formula would correctly calculate the average (mean) of the following values: 4, 2, 5, and 5

= (4 + 2 + 5 + 5) / 4

Which two of the following refer to the amount of money a lender charges for borrowing money (excluding any origination fees)?

APR and Interest Rate

Which of the following is an example of an organization using knowledge gained from social media to make better strategic decisions.

An organization analyzes engagement with different sponsored posts to determine which ones generate the most engagement with their target audience.

Σ What does the above symbol (upper-case Sigma) represent in spreadsheets?

AutoSUM

Talia posted the following message to a discussion forum at work: "Ralph, your late report cost us a shot at being team of the month." What team communication rule did she violate?

Avoid blaming.

In the financial world, which color represents credits or profits?

Black

Stanley, a sales analyst for G&B Toys, is preparing a report for board members on the company's market share for action figures. Although G&B has retained its spot as the market leader, several competitors have captured a larger share of the market over the preceding year and appear likely to overtake G&B within the next three years. How should Stanley present his findings to the board?

Disclose the data fully to foster transparency in the organization.

What is the process of calculating a percentage change?

First - subtract the original number from the new number. Next - divide the difference by the original number and multiply by 100


Related study sets

O/I/A Quiz Online #1 (Major Upper Body)

View Set

Math 8 - Study Guide for Tuesday's Test - Part 1

View Set

Chapter 28 Assisting with Respiratory and Oxygen Delivery

View Set

SLP102-4: Wong - Quiz 2 3/24/21 - Morphology

View Set

Discrete Mathematics - Chapter 4: Elementary number theory and method of proof

View Set

Chapter 5, 14,15,16 (Mid-Term), Money and Banking CH 5, Econ Chapter 5 part 2, econ206 chapter 5, Econ 2035 Ch5.1, 2035 Chapter 5, Money and Banking Ch 5, Chapter 3 FINC 3700, Chapter 4, Econ 2035 Ch4.3, Money & Banking HW #2, Econ 3229 quiz 4, Money...

View Set

Sales and Marketing Applications I

View Set

Psych - Ch. 5 Development - Prep: Learning Curve

View Set

Plant Biology SIU semester final

View Set