IS Final Exam Study Guide

Ace your homework & exams now with Quizwiz!

The stylist just did a great job and your hair is going to look good for weeks. The stylist charged $70 and you decide to add a 15% cash tip. How big is the tip?

$10.50

If you type =2 + 3 * 6 into a cell in a spreadsheet and then press Enter, what will appear in the cell?

20

Which statement about online presence is true?

A personal brand built through an online presence can help business professionals gain opportunities

Which situation is an example of how social media can complicate professional relationships?

An employee blogs about an embarrassing incident involving his or her boss, who sees the post

Which person illustrates a characteristic of an excellent business thinker?

Barras uses a variety of sources such as journal articles and colleagues' expertise.

Headquartered in Toronto, ________ has developed a software application that serves as an early warning system for identifying pandemics.

BlueDot

Which of the following is the clearest definition of a computer virus?

Code-created malware that, when executed, damages programs and performance.

One of Google's companies that is investigating AI and Machine Learning is called

DeepMind

Gowan has been hired by Bailey's Automotive to assess whether the company should air television commercials in the local market. He is planning a study of the relationship between local television commercials and the sales of new vehicles. What is the best way for Gowan to establish a research objective that will address his research problem?

Determine how often television commercials result in purchases of new vehicles.

Which meta message would most likely be communicated through a professional networking site such as LinkedIn?

I am committed to my industry

A business message that primarily relies on the ________ shows that the message is self-centered.

I-voice

Which social media goal directly aligns with an organization's mission to increase the public's environmental awareness by increasing news coverage of environmental issues?

Increasing the conversion rate of its social media posts to full news stories

In a press-release style message, the "story" is written in third person in a style often referred to as ________ style.

Inverted Pyramid

How are data in process different from data at rest or data in storage?

It is held in the device's RAM until it can be processed by the CPU or GPU.

Which of the following statements describes a keylogger most accurately?

It is surveillance malware that captures confidential information through keyboard input.

Which of the following statements best illustrates why a rootkit is described as creating a back door?

Like an intruder coming through a back door, a rootkit allows an unknown user into an operating system.

How are social media metrics and social media goals related?

Metrics that correspond to social media goals can serve as key-performance indicators (KPI's) for them

How has social media changed the way businesses measure consumer behavior?

Social media makes it easier to collect the kind of data that are meaningful to businesses.

For the past few months, Denver Framing has experienced high employee turnover. After investigating, human resource manager Kyle discovered that most employees are unhappy with their salaries and therefore unmotivated to work. Kyle plans to craft a message using the direct approach. How should he structure it?

State the primary message; lay out supporting reasons; conclude with a call to action.

The first two steps of the six-step process in creating a social media information system (SMIS) involve developing social media goals and setting metrics. What are the third and fourth steps of the process?

Step 3: identify the organization's target market; Step 4: determine and integrate into the SMIS design traits valued by the target market.

What is the goal of the planning phase of the plan-protect-respond cycle?

Understand common threats that an organization may face and determine how vulnerable they are to such threats.

A function that looks for a value in the leftmost column of a table, and then returns a value located in the same row as the first value, is called a

VLookup

In Apple iWork's Numbers the freeze options are located under the Table tab. In Microsoft Excel and Google sheets the freeze cells or panes options are found in the ________ menu.

View

Rafi's company is having trouble recruiting employees with the right skills. He needs to choose someone to analyze the problem and suggest potential solutions. Which employee should he choose?

Wade has a knack for explaining complex issues in a clear, understandable way.

A social media information system (SMIS) should be designed to gather and analyze social media data because

a company can use platforms' data about its activities and audience to improve its social media strategies and business decisions.

Peyton wants to make his team's discussion forum more effective. Which strategy would best help him accomplish that?

acknowledge teammates' ideas

An effective social media information system (SMIS) collects and analyzes data about the organization's

activities and audience on social media and on its own websites

Learning platforms that use algorithms to adjust the content that each student sees in order to maximize learning efficiency is called ________ learning.

adaptive

Because the technology allows a robot arm to act more like a human's with regard to spatial recognition and safety awareness, while maintaining all of the advantages of a traditional industrial robot, ________ can make robots much more flexible and safer.

adaptive robotics

What is the final step in the six-step process of creating an SMIS?

analyze the collected data

"Cybersecurity threat mitigation" includes all of the policies, procedures, and tools that help organizations

anticipate and counter threats from security vulnerabilities or incidents and reduce their impact.

Which statement describes how writers should address the priorities of their targeted audience during the AIM planning process?

assign importance to things, such as projects, goals, and tasks

Using cyberattacks, such as the May 2017 WannaCry ransomware attack which struck British hospitals particularly hard, is an example of how a nation with less military strength can level the field using technology. This is an example of ________ warfare.

asymmetric

During which step in the AIM planning process should you consider the constraints your readers face?

audience analysis

Allowing people to share a digital ledger across a network of computers, ________ uses computer code to create concatenated (linked together) blocks of transactions.

blockchain

Facts are statements that

can be relied on with a fair amount of certainty.

Malicious bots are cybersecurity risks because they

can reproduce and link to an outside server

Saving a spreadsheet file in .csv format only saves the

cell values

A public relations team's first step is to

clarify the company's brand

The development of Web 2.0 tools has contributed to the development of more

collaborative networks

A business is planning on using sponsored social media content for its new product, which is appropriate for people in different age demographics. Which generation would be best targeted by sponsored posts on Instagram?

college students

What is the name of the study of how people make purchases and why they buy products and services?

consumer behavior

What are the core actions of the protect (PR) function?

controlling access to systems and preventing unauthorized access

Mason maintains an exhaustive database on his research sources and findings, which he shares with decision makers at Oriel Pharmaceuticals when presenting his report on the marketing approach for a new drug. This practice will increase the ________ of Mason's report.

credibility

What has the greatest influence on the impact of social media in the workplace?

cultural norms and values

One primary purpose or function of a company's social media information system (SMIS) is to connect the company's

customers on social media with its products and services on its websites

Arla, an executive at American Hustle, Inc., wants to introduce a profit-sharing program. She needs to convince the other executives that it is a good idea for their company. She has considered her audience and gathered information. Next, she should

decide how to frame her primary message

When using a shared file platform, it is important to

discuss protocols for co-editing files

Elmer is creating a table to show how the company has performed in the past year month by month. The most effective way to make the table easy to understand would be to

ensure that each grid line serves a distinct purpose

What is typically included in the reviewing stage of writing an effective business message?

ensuring that the communication is fair

In order to be effective, a consumer survey should contain

exhaustive answer choices for each question

When creating a blog, you should use naming, labeling, indexing, and tagging to

help others find your information

Kwame, the owner of Fantastico's, wants to graphically represent a comparison of his restaurant's market share with those of the top competitors in the same city. His research findings conclude that Fantastico's has the largest market share. In order to present this data most effectively, Kwame should

highlight the key points using color or labels

What does the General Data Protection Regulation (GDPR) regulate?

how companies protect personal data

Charlie has been assigned the task of creating an effective business message aimed at encouraging healthy habits in the workplace. He uses the AIM planning process. What should he do during the information gathering stage?

identify problems that prevent employees from making healthy choices

In the context of the AIM planning process, what tends to be the single most important planning step for many messages?

identify reader benefits and constraints

An appropriate social media goal for a business that wishes to raise its public profile is increasing brand awareness.

increasing brand awareness

When business professionals enter into primary research with preexisting assumptions or conclusions, they are likely to

interpret the data incorrectly

Which is the best definition of a cybersecurity exploit?

it is the means by which a hacker capitalizes on a cybersecurity vulnerability to do harm

One surveillance technology that relies on how the user enters data is a

keylogger

In the course of creating an effective business message, excellent business thinkers are most likely to

make well-reasoned conclusions and solutions

Which of the following acts is an example of social engineering?

manipulating people in order to obtain and misuse their personal information

Overall and underlying messages that others decode from your online communications are referred to as ________ messages.

meta

In order to make business messages more positive, business writers should focus on actions they can accomplish and demonstrate a realistic optimism. However, they should be careful

not to set unrealistic expectations

Where are data in transit found?

on a cellular network

What is the second step in the six-step process of creating an SMIS?

outline measurements of success

Which element is a typical Web 1.0 communication?

photos of a restaurant menu posted online

Bankers and other lenders refer to the initial amount of the loan (the principal) as the loan's

present value (PV)

The U.S. Census Bureau is using differential ________ to make census data secure and private.

privacy

The total value of a company is based on how much customers value its

products, services, and areas such as corporate philanthropy, social responsibility programs or policies, manufacturing processes, and brand attributes.

What is one of the most common types of effective posts when establishing a professional reputation?

promoting your employer

When displaying financial information, the accepted practice is that ________ indicates negative values.

red

In which situation should the origin of information be authenticated to protect data integrity?

reliability

What is most likely to show that the writer of a business message has concern for the audience?

respecting the autonomy of the reader

A corporation that was recently the victim of hacking that was caused by a high-level employee falling for a phishing scheme institutes a required, annual, self-paced training module that alerts employees to the most common recent phishing attacks. The institution of this new training requirement represents which phase of the plan-protect-respond cycle?

respond

For which type of cybersecurity vulnerability do organizations maintain and share databases of known problems?

security weaknesses in operating systems or application software

Karla's company uses an internal social networking platform. Karla's posts usually involve awards she has won or praise she has received. She rarely comments on others' posts. Others will most likely see her as

self-promoting

What is typically included in the writing stage of developing an effective business message?

setting a positive and other-oriented tone

Adish is analyzing the benefits and feasibility of implementing a stress-reduction program on a fixed budget. Through research, Adish learns that the cost of a stress reduction program exceeds the proposed budget. He also learns that such programs are linked to increased employee health and morale. Adish then advises the company leadership to implement the program because it will be effective at improving the well-being of employees. Adish is guilty of

slanting the facts

Currently, apps that run on the Cloud are ________ as compared to apps that run on local machines. Edge computing is a method of optimizing cloud computing systems by performing data processing at the edge of the network, near the source of the data and it is possible that cloud computing may take a back seat to edge computing.

slower

Suppose you are a company whose target market is identified as homeowners who live in suburban regions of the American Midwest. From the list below, choose the product you are most likely selling.

snow blowers

Of the listed methods of collecting demographic information, which is the most effective for organizations defining their target market?

social media

Adding a dedicated group to your Facebook account allows you to meet online and keep in touch with others who share your interest. You can post relevant media, such as photos, articles, and videos. Which role in a social media information system (SMIS) does your group fit into?

social media committee

What is something an excellent business writer would do?

spend more time planning than writing

Because they make it easy to arrange, display, and calculate numerical data, ________ programs are commonly used in nearly every business setting.

spreadsheet

Programs such as Microsoft Excel, iWork's (Apple) Numbers, Google Sheets, and OpenOffice Calc, that allow users to arrange numerical data are called

spreadsheets

________ was launched in 2014 by Skype co-founders, Ahti Heinla and Janus Friis. The company's vision is to revolutionize food and package deliveries across the globe. Starship robots can carry items within a 4-mile radius.

starship

One major threat to productive discussions is inconsistency. Firstcomers to a forum discussion are most likely to cause problems by

stating their opinion but failing to take part as the conversation evolves

A leading question is one that

suggests how you want the respondents to answer

Components of a social media information system (SIMS) combine to

support a companys marketing strategy through social media

What do the deductive approach and inductive approach to structuring business messages have in common?

the arrangement of supporting ideas is important

During the Information Age, the role of public relations broadened, and it came to be seen as a key component of

the marketing mix

Which statement accurately describes microblogs?

they contain just a few sentences per entry

Which social media metric is probably the most useful for determining whether a company is increasing its brand awareness on social media?

total mentions of the company on social media

According to the identify (ID) function of the NIST Cybersecurity Framework, what allows an organization to prioritize its efforts where cybersecurity risk is involved?

understanding of its business environment and resources

The NIST Cybersecurity Framework is a

voluntary guide for organizations

5G cellular technology offers the promise of download speeds as high as 20 Gbps. This will likely require more antenna arrays with each antenna sending out ________ microwave signals.

weaker

A meta message is

what people take away from a communication

In which situation should the origin of information be authenticated to protect data integrity?

when electronic votes are submitted during an election

Reports or guides that are issued by the government and organizations and that generally describe research about solving a particular issue are

white papers


Related study sets

Chapter 39 corporate formation and financing

View Set

Supply Chain Management Test Three (13, 14, 15, 17)

View Set

Chapter 13; Hoffman & Sullivan (Cancer Care) - Davis Edge Questions

View Set

Bio readings18-26 chapter 23 plus pgs.777-809 Mar16began

View Set

4.microangiopathic haemolytic anaemias (TTP, HUS)

View Set

SECURITY + VIRTUAL PRIVATE NETWORK 5.7

View Set

Management 350 Exam #1 Practice Questions

View Set