CIS Final

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/114

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

115 Terms

1
New cards

Disruptive innovations don’t need to perform better than incumbents; they simply need to perform well enough to appeal to their customers (and often do so at a lower price).

True

2
New cards

Firms that listen to existing customers and tailor offerings based on this input are far more likely to identify potentially disruptive technologies than those that experiment with products that existing customers do not demand.

False

3
New cards

Quality and complexity have both caused 3D printing to flounder.

True

4
New cards

Cross-border bank transfers are not likely to adopt Bitcoin since these functions are already electronic and highly automated.

False

5
New cards

An NFT is a new-fungible token.

False

6
New cards

Like most open source efforts, Bitcoin was created by a consortium of for-profit corporations hoping to fuel adoption of a beneficial new standard.

False

7
New cards

Which of the following is true of disruptive technologies?

Over time, initially underperforming incumbents improve performance attributes to the point where they invade established markets.

8
New cards

Which of the following is a way to recognize potentially disruptive innovations?

seeking the opinions of venture capitalists, research academics, and passionate internal engineering staff

9
New cards

What is another common term for 3D printing?

additive manufacturing

10
New cards

Which of the following statements about DeFi are true?

Most DeFi efforts lack consumer protection.

11
New cards

Amazon is now the third-largest seller of online advertisements, behind only Google (aka Alphabet) and Meta, but it also buys more advertising than any other firm in history.

True

12
New cards

Amazon does not open its website up to third-party sellers.

False

13
New cards

In order to automate profit-pushing hyper-efficiency, Amazon warehouses are powered by at least as much code as the firm’s website.

True

14
New cards

One of the reasons Amazon has struggled to achieve profitability is because the firm has a negative cash conversion cycle.

False

15
New cards

A cloud computing model that allows a software developer to create systems without having to think about servers is known as serverless.

True

16
New cards

Which of the following is true of Amazon?

The three pillars of Amazon's business are large selection, convenience, and lower prices.

17
New cards

Amazon’s moves are largely motivated by:

relentless customer focus

18
New cards

Identify the true statement.

Rivals colluding to set prices is illegal.

19
New cards

Which of the following is true of Amazon Web Services (AWS)?

It allows anyone with a credit card to access industrial-strength, scalable computing resources.

20
New cards

Amazon Web Services (AWS)

offer several advantages, including increased scalability, reliability, and security.

21
New cards

Network effects do not influence all consumer products or services.

True

22
New cards

Many firms attempt to enhance their network effects by creating a platform for the development of third-party products and services that enhance the primary offering.

True

23
New cards

Almost all networks derive most of their value from a single class of users.

False

24
New cards

Cross-side benefits arise due to interaction among members of a single class of participants.

False

25
New cards

A blue ocean strategy often works best when combined with operational effectiveness.

False

26
New cards

Metcalfe’s Law is also known as:

network externalities

27
New cards

Which of the following is an example of a two-sided market?

Square

28
New cards

Which statement best describes the relationship between network effects and innovation?

Network effects increase innovation within a standard but decrease the number of innovative offerings that compete against a strongly established standard.

29
New cards

Two distinctly separate markets are said to undergo convergence when they

begin to offer similar features and capabilities.

30
New cards

Large firms often find new markets attractive but might not have products ready for delivery. What strategy do such firms use to get potential adopters to delay their purchasing decisions?

preannounce forthcoming efforts

31
New cards

Many social media websites have emerged as top destinations on the Internet; however, the category has remained volatile, with many one-time leaders losing popularity over time.

True

32
New cards

Social media refers to content that is peer produced and shared online.

True

33
New cards

Social networking feeds are at times controversial with instances of feed mismanagement causing user discontent, public relations problems, and the possibility of legal action.

True

34
New cards

Despite its good intentions, privacy regulations exposed the website PatientsLikeMe to significant fines and it was eventually forced to shut down.

False

35
New cards

SMART is an acronym referring to the social media awareness and response team.

True

36
New cards

Which of the following statements holds true for electronic social networks?

Their key use is to discover and reinforce affiliations, identify experts, message individuals or groups, and virally share media.

37
New cards

The long tail nature of the blogging phenomenon is demonstrated by

the niche content that is discoverable through search engines and that is often shared via other types of social media.

38
New cards

Advertisement and sponsorships are components of:

paid media

39
New cards

A prediction market involves

polling a diverse crowd and aggregating opinions to form a forecast of an eventual outcome.

40
New cards

What is crowdsourcing?

It is the act of taking a job traditionally performed by a designated agent and outsourcing it to an undefined generally large group of people in the form of an open call.

41
New cards

Payment continues to represent a barrier to widespread adoption of the sharing economy, since many consumers feel uncomfortable exchanging cash or financial information with strangers.

False

42
New cards

Social media profiles can also be used to fight online fraud.

True

43
New cards

Airbnb has an AI-driven verification scheme where hosts must prove they are on-site and take real-time photos of a property in order to receive a "verification" check.

True

44
New cards

Surge pricing allows Uber to increase the supply of drivers when demand is high.

True

45
New cards

Which of the following firms is an example of a circular economy?

All of the above are true: Poshmark, ThredUp & Rent the Runway

46
New cards

The sharing economy consists of which of the following?

All of the above are true: recirculation of goods, increased utilization of durable assets, exchange of services & sharing of productive assets

47
New cards

Which of the following is not true regarding the competitive dynamics of most sharing economy marketplaces?

Late movers have a substantial advantage in this market since inventory should be cheaper to acquire for those firms that have entered markets more recently.

48
New cards

Another major concern for firms in the sharing economy is uncertainty around the ability of these firms to continue to consider their workers as _____ and not employees.

independent contractors

49
New cards

Which of the following lead Airbnb to make changes to their platform and include new features?

All of the above are correct: fake listings, additional fee scams & listings not matching descriptions

50
New cards

Product-market fit is a key concept in entrepreneurship and new product development that conveys the degree to which a product satisfies:

market demand

51
New cards

Data that a customer has explicitly shared with a firm is referred to as zero-party data.

True

52
New cards

Cookies given by the website that you are visiting are known as first-party cookies.

True

53
New cards

App Tracking Transparency requires all iOS apps to ask users for their permission to share their data.

True

54
New cards

A VPN is a service that creates a public connection across the private Internet, encrypting transmission and making your Internet communication appear as if it is connected to the organization that provides VPN software

False

55
New cards

A line-of-sight is signal that must have an obscured pass from source to receiver to be accurate.

True

56
New cards

Data that is collected by one firm and shared with a partner organization is known as:

second-party data

57
New cards

Advertisers were frustrated with traditional ad channels such as print and television because

they had no way of measuring effectiveness

58
New cards

All devices that connect to the internet are identified by an assigned numeric value. The numeric value is known as the:

IP address

59
New cards

Technology that recognizes bits that make up an image, video, or audio and identifies the content that is being played is known as:

ACR

60
New cards

Firms encounter challenges with privacy and data laws because

All of the above are true: firms are responsible for making their own regulations, firms often work with third parties, firms that are not heavily laden with technology are not required to abide by the laws & laws vary by region and there are no clear standards.

61
New cards

Data harvesters are cybercriminals who infiltrate systems and collect data for illegal resale.

True

62
New cards

One of the reasons one should be careful about clicking on any URL in an e-mail is that hackers can easily embed a redirection in e-mail links, rerouting a user to an alternate online destination.

True

63
New cards

Challenge questions offered by websites to automate password distribution and resets are formidable in protecting the privacy of email accounts.

False

64
New cards

The term deepfake refers to sophisticated media created by AI that attempts to look or sound like a real person or event.

True

65
New cards

When using a public wireless network, using VPN software is not advisable as it can reveal your communications to any network eavesdroppers.

False

66
New cards

Which of the following is a valid statement on information security?

Information security is everybody's responsibility.

67
New cards

The use of public wireless connections can increase a user’s vulnerability to monitoring and compromise. _____ software can be used to encrypt transmissions over public networks, making it more difficult for a user’s PC to be penetrated.

VPN

68
New cards

Technologies that measure and analyze human body characteristics for identification or authentication are known as:

biometrics

69
New cards

A common example of 2FA is

a password, plus the use of a separate verification code.

70
New cards

Information security policies would be ineffective without _____ and _____.

audit; enforcement

71
New cards

Firms may want to use ARM chips because they draw less power than Intel chips.

True

72
New cards

Almost all custom hearing aids are 3D printed.

True

73
New cards

Tech-fueled operations cannot yield greater profits than off-line players.

False

74
New cards

Dynamic pricing is described as pricing that shifts over time, usually based on conditions that change demand (e.g., charging more for scarce items).

True

75
New cards

Amazon’s relentless efficiency has streamlined its entire order process to involve only about a minute of human contact.

True

76
New cards

In the absence of network effects, the value of a product or service increases as the number of users grows.

False

77
New cards

Messaging is considered a one-sided market.

True

78
New cards

Crowdsourcing can be considered a type of peer-production.

True

79
New cards

The unstructured nature of wikis is both a source of strength and weakness.

True

80
New cards

Third-party data is collected by a company that has had the customer explicitly enter a relationship with them.

False

81
New cards

Websites of reputed companies can also be sources of malware.

True

82
New cards

Regularly updated software lowers a system’s vulnerable attack surface.

True

83
New cards

Allowing third-party sellers to list their products on Amazon is controversial. Why would Amazon allow products sold by others to appear on its site?

All of the above are true: Selection attracts consumers & A network effect competitive advantage is created where more buyers attract more sellers, giving Amazon an advantage over any rival attempting to create a similar marketplace & Although products are sold by third parties, Amazon gains valuable data on things such as customer browsing habits and sales & Amazon's brand is reinforced as a first-choice shopping destination.

84
New cards

Which of the following is the most liquid asset?

cash

85
New cards

Which of the following factors represents one of the sources of value derived from network effects?

staying power

86
New cards

Peer production refers to

users collaboratively working to create content, products, and services.

87
New cards

Which of the following statements about blogging is true?

Blog comments can be a hothouse for spam and the disgruntled.

88
New cards

Uber has strengthened initial skepticism around safety and offered such solid safety features that it felt confident enough to offer the Uber Teen service that allows

All of the above are correct: parents to share an account with kids as young as thirteen, caretakers to track ride progress in real time, only top-rated drivers to provide rides & automatic audio-recording by default.

89
New cards

Each time an ad is shown to a user is known as a(n):

impression

90
New cards

Advertisers might consider using an ad network because

they can advertise across a series of sites.

91
New cards

Advertisers use _____ to deliver targeted ads to your television based on your profile.

dynamic ad insertion

92
New cards

The five components of information systems needed to fully understand organizational privacy policies include:

data, software, hardware, procedures and people

93
New cards

Artificial intelligence is a tool that empowers hackers, but can also be used to help firms become more secure through assisting in:

threat detection

94
New cards

What is the file extension for an Excel workbook containing a VBA program?

xlsm

95
New cards

What does VBA stand for?

VBA Stands for Visual Basic for Application

96
New cards

Which Excel feature allows you to automate repetitive tasks by recording a sequence of actions?

Macros

97
New cards

The initial value of a non-declared variable is ZERO.

False

98
New cards

The initial value of the variable declared as an Integer is ZERO.

True

99
New cards

The initial value of the variable declared as String is Space.

False

100
New cards

What is the correct way to add a comment to VBA code?

‘Comment