Final Exam Study Questions
Seong finds that a geographic restructuring would have a positive effect on his insurance company's sales department and increase its efficiency. He draws up a report for the board of directors in which he suggests that separate departments should be set up for each of the company's 10 sales territories. Which statement is most likely to increase the positivity of his proposition?
I look forward to putting together a detailed plan to restructure the company geographically.
The cost of borrowing money, quoted as an annual percentage rate (APR), is a loan's:
Interest
How are data in process different from data at rest or data in storage?
It is held in the device's RAM until it can be processed by the CPU or GPU.
Overall and underlying messages that others decode from your online communications are referred to as ________ messages.
Meta
To determine how much a recurring monthly payment would be for a car loan or a mortgage, use the ________ function.
PMT function
What is the most common format for a written PR message?
Press-release style
________ involve ranking or assigning importance to things, such as projects, goals, and tasks.
Priorities
Why is data that is located in the RAM of a device considered data in transit?
RAM only holds data and instructions temporarily; nothing is permanently stored in RAM.
T/F: A legend shows which items are being identified by the different colors, lines, bars, or pie segments.
True
T/F: According to the National Institute of Standards Technology (NIST), the RS function of the framework includes communications with internal and external stakeholders.
True
What is the goal of the planning phase of the plan-protect-respond cycle?
Understand common threats that an organization may face and determine how vulnerable they are to such threats.
Which formatting guideline increases the effectiveness of all types of charts?
Use darker colors to represent the most important data series.
Nate's boss has asked him to present a business report on "consumer shopping habits" in three days. Due to the time constraint, his boss wants him to use secondary research. In this situation, what should Nathan do?
Use data published in business journals.
Which social media tool would be best at helping a business professional establish a personal brand?
a blog
Which element is a typical Web 2.0 communication?
a discussion forum that allows users to post questions and answers
Which type of visual is most effective to display stock prices over time?
a line chart
Conrad was disturbed to find evidence of applications he did not download, system configurations unexpectedly altered, and files mysteriously that disappeared and moved. Which cybersecurity threat best explains the problems he was having?
a rootkit
In spreadsheets, all functions and calculations begin with
an equal sign (=).
Define social age:
an era in which people engage in networked communication, collaborate across boundaries, and solve problems communally.
What is a cybersecurity threat?
an event or condition that can lead to IT asset loss and the negative consequences of such loss
"Cybersecurity threat mitigation" includes all of the policies, procedures, and tools that help organizations
anticipate and counter threats from security vulnerabilities or incidents and reduce their impact.
Soria, the owner of Sky Spa, wants to know how her customers feel about the experience at her location. One of the questions in her survey questionnaire reads, "On a scale of 1 to 5, how would you rate our prices, comfort, and service?" This question is ineffective because it...
asks about multiple ideas.
What is an example of an activity that would be useful during the planning stage of the plan-protect-respond cycle?
attempting to exploit flaws from the outside, simulating attacks that a hacker would try
To break out of the reputation of an inexperienced newcomer, a person should
attend a lot of meetings to get to know as many colleagues as possible.
During which step in the AIM planning process should you consider the constraints your readers face?
audience analysis
Which chart type can be used to compare many types of data and is thus the most versatile?
bar charts
Which action is a deceptive research practice?
cherry-picking data and adjusting information in your favor
The development of Web 2.0 tools has contributed to the development of more
collaborative networks.
What has the greatest influence on the impact of social media in the workplace?
cultural norms and values
According to the Coca-Cola social media guidelines, when employees promote the brand online, they should
disclose that they work for the company.
Sadie, the expeditor at RingGro Manufacturing, writes a memo asking her manager to buy her a new computerized system for tracking customer orders. She claims that if she does not get this system, chronically late deliveries will ensue. Her manager turns down her request. Sadie made the mistake of using
either/or logic.
In order to be effective, a consumer survey should contain:
exhaustive answer choices for each question.
What is least important when analyzing data related to a business problem?
focusing on tangential issues
In cybersecurity risk analysis, PML (probable maximum loss) is used to
help determine spending needed to adequately secure an organization's IT infrastructure.
What does the General Data Protection Regulation (GDPR) regulate?
how companies protect personal data
Cybersecurity threat mitigation is best defined as the policies, procedures, and tools that help an organization
identify cybersecurity threats, prevent them from being realized, and minimize damage from them.
Charlie has been assigned the task of creating an effective business message aimed at encouraging healthy habits in the workplace. He uses the AIM planning process. What should he do during the information gathering stage?
identify problems that prevent employees from making healthy choices
When business professionals enter into primary research with preexisting assumptions or conclusions, they are likely to
interpret the data incorrectly.
Readers are more likely to react positively to a message if the writer
is clearly concerned about the issues discussed.
An email that appears to be from a legitimate company is most likely to be a social engineering cybersecurity attack if
it contains a link to a free offer that seems too good to be true.
One surveillance technology that relies on how the user enters data is a
keylogger
In the course of creating an effective business message, excellent business thinkers are most likely to
make well-reasoned conclusions and solutions.
Ransomware basically holds a target hostage because it
makes the target's own data inaccessible.
Adrian and Frank began the online process of applying for a short-term loan for their business. They created an account with a username and password, looked over the privacy statement, reviewed the security policy, and accepted the terms of use. After logging on, however, they became increasingly uncomfortable answering so many detailed questions about income, employment, and more. What specific risk might they have remembered from studying cybersecurity?
man-in-the-middle (MitM)
One potential drawback of using social media in the workplace is that social media
may lower productivity.
In order to make business messages more positive, business writers should focus on actions they can accomplish and demonstrate a realistic optimism. However, they should be careful
not to set unrealistic expectations.
What is a goal of an information technology disaster recovery plan (IT DRP)?
outline specific recovery times for information technology to resume after an issue occurs
Web 1.0 communication tools are primarily
passive and static.
A social media information system (SMIS) is composed of three parts, which are:
people, data and procedures, and hardware and software.
A unique set of professional skills and attributes that others associate with you is called your
personal brand.
Bankers and other lenders refer to the initial amount of the loan (the principal) as the loan's:
present value (PV)
What is the key action called for in the detect (DE) function of the NIST Cybersecurity Framework?
quick identification of a cybersecurity threat
The ________ of data acquired through secondary research is how well it applies to your specific business problem.
relevance
Jorge primarily used research from printed texts for his report. What is a potential problem with Jorge's research?
reliability
A cybersecurity exploit allows a hacker or intruder to
remotely access a network, gain privileges, and make unauthorized changes.
What is most likely to show that the writer of a business message has concern for the audience?
respecting the autonomy of the reader
Which of the NIST Cybersecurity Framework functions calls for quick action on the part of an organization's cybersecurity team to mitigate damage to systems?
respond (RS) function
The advantage of an op-ed style corporate blog is that it is often used to
share the opinions and expertise of a corporate leader with the public.
What action is most likely to lower a person's credibility?
slanting facts
In an Excel file, if a label (such as the word "panda") is used in a formula, what will appear in the cell when the Enter key is pressed?
#VALUE!
What are two methods of selecting a range of adjoining cells in Excel?
1. Select the first cell in the range and drag down to the last cell. 2. Select the first cell in the range then hold down the shift key and select the last cell in the range.
Which of the following is a best practice for ensuring that data are available? More than one answer may be correct. 1. keeping current with all system upgrades keeping current with all system upgrades 2. limiting access to those who have the appropriate clearance 3. preventing bottlenecks 4. using two-factor authentication
1. keeping current with all system upgrades keeping current with all system upgrades 3. preventing bottlenecks
Describe the categories of the Recover (RC) function of the NIST Cybersecurity Framework. More than one answer may be correct.
1. restoration of impaired systems restoration of impaired systems 2. improvements to cybersecurity plans improvements to cybersecurity plans 3. communication with all stakeholders
If you type = 2 + 3 * 6 into a cell in a spreadsheet and then press Enter, what will appear in the cell?
20
To quickly show if the values in a column or row are greater than, less than, or equal to a certain value, use the ________ function.
IF function
The evolution of the Internet from Web 1.0 to Web 2.0 platforms is the primary driver of the ________ Age.
Social
Sports analysts often use ________ to keep track of statistics, times, and scores of nearly every sporting event.
Spreadsheets
What do the deductive approach and inductive approach to structuring business messages have in common?
The arrangement of supporting ideas is important.
Who is responsible for calculating probable maximum loss?
a company's cybersecurity analysts
A Trojan horse succeeds through
deceptive access.
Bad actors seeking to create computer viruses primarily must know how to
program
In what stage of the plan-protect-respond cycle forensic analysis conducted?
responding stage
If you type =3+2^2*6 into a cell in a spreadsheet and then press Enter, what will appear in the cell?
27
T/F: In financial institutions, the color red represents positive values?
False
T/F: Using percentages in tables, as opposed to counts, makes it difficult for readers to make effective comparisons quickly.
False
Pivot tables provide a quick way to organize information. In most spreadsheet programs, click the ________ tab to create a pivot table.
Insert tab
Enduring beliefs and ideals that individuals hold are called
Values
Spyware's basic function is to
capture the user's account data, passwords, keystrokes, and more.
Saving a spreadsheet file in .csv format only saves the
cell values
A drawback of online databases is that they
take time to navigate.
During the Information Age, the role of public relations broadened, and it came to be seen as a key component of
the marketing mix.
The traditional role of public relations was to communicate with
the media.
What is the goal of most public relations messages?
to create a distinctive brand for a company or organization
What does the General Data Protection Regulation (GDPR) strive to achieve?
to ensure EU companies protect the privacy and personal data of EU citizens
What is the purpose of saving an Excel file as a .cvs (comma-separated format) file?
to share data with other spreadsheet users regardless of which spreadsheet program is being used
To ensure that the bar charts are formatted effectively, the bars should be about ________ the width of the space in between bars.
two times
Which technique is most likely to make business messages more positive?
using constructive terms
Chavez, a human resources manager of K8 Fabrics believes that the company can improve employee retention rates by improving employee benefits. In outlining his argument to the company's leadership team, he points out that a large technology firm had success with such a strategy. Chavez' message fails to convince K8's leadership team. What is the likely cause of their reaction?
weak analogy
Reports or guides that are issued by the government and organizations and that generally describe research about solving a particular issue are
white papers.
In a blog post, you have ________ to draw your readers in.
5 to 15 seconds
What spreadsheet formula would correctly calculate the average (mean) of the following values: 4, 2, 5, and 5
= (4 + 2 + 5 + 5) / 4
Which two of the following refer to the amount of money a lender charges for borrowing money (excluding any origination fees)?
APR and Interest Rate
Which of the following is an example of an organization using knowledge gained from social media to make better strategic decisions.
An organization analyzes engagement with different sponsored posts to determine which ones generate the most engagement with their target audience.
Σ What does the above symbol (upper-case Sigma) represent in spreadsheets?
AutoSUM
Talia posted the following message to a discussion forum at work: "Ralph, your late report cost us a shot at being team of the month." What team communication rule did she violate?
Avoid blaming.
In the financial world, which color represents credits or profits?
Black
Stanley, a sales analyst for G&B Toys, is preparing a report for board members on the company's market share for action figures. Although G&B has retained its spot as the market leader, several competitors have captured a larger share of the market over the preceding year and appear likely to overtake G&B within the next three years. How should Stanley present his findings to the board?
Disclose the data fully to foster transparency in the organization.
What is the process of calculating a percentage change?
First - subtract the original number from the new number. Next - divide the difference by the original number and multiply by 100