BIS 270

¡Supera tus tareas y exámenes ahora con Quizwiz!

In database terminology, a record represents

A single instance of whatever the table keeps track of.

What is an example of cybersquatting?

Acquiring a domain name to extort a firm, individual, product, or trademark holder

______ put(s) users in control so that they can create custom reports on an as-needed basis by selecting fields, ranges, summary conditions, and other parameters.

Ad hoc reporting tools

Which of the following statements is true about Airbnb's revenue model?

Airbnb charges both property owners and guests as part of transactions on their website.

Technologies that measure and analyze human body characteristics for identification or authentication are known as _____.

Biometrics

______ is a term used to describe unpredictable, but highly impactful events.

Black Swans

Hordes of surrptitously infiltrated computers, linked and controlled remotely, are known as zombie networks, or

Botnets

Which of the following statements regarding cloud computing is true?

Cloud computing has led to decreased hardware and software sales at many firms, while increasing services expenses

_____ refer to databases focused on addressing the concerns of a specific problem or business unit.

Data marts

If a computer system can be equated to a layered cake, which of the following combinations represents the computer system in the bottom-to-top order?

Hardware, operating system, application, user

Entrepreneurs are scrappy in their quest to gather market intelligence and understand how customers respond to their offerings. How did Airbnb's CEO gather additional intelligence on how the firm was being used?

He lived out of Airbnb rentals full-time.

"Cookies cannot reliably identify individual users" Which of the following is the reason for the statement?

Individual users use different browsers on the same computer to surf the Web.

Data becomes _____ when it is presented in a context so that it can answer a question or support decision making.

Information

Which of the following statements holds true for the term opt-out?

It refers to a program that enrolls all customers by default, but that allows consumers to discontinue participation if they want to.

Which of the following is true of the term Internet Backbone?

It refers to high-speed data lines provided by many firms all across the world that interconnect and collectively form the core of the internet.

Which of the following statements holds true for the term encryption?

It refers to scrambling data using a code or formula, known as a cipher, such that it is hidden from those who do not have the unlocking key.

Which of the following is true of software as a service (SaaS).

It refers to software that is made available by a third-party online.

Which of the following statements holds true for the term click-through rate?

It refers to the number of users who clicked an ad divided by the number of times the ad was delivered.

Which of the following statements holds true for search engine optimization (SEO)?

It refers to the process of improving a page's organic search results.

Which of the following is not true regarding the competitive dynamics of most sharing economy marketplaces?

Late-Movers have a substantial advantage in this market since inventory should be cheaper to acquire for those firms that have entered markets more recently.

If a customer pays a retailer cash, he is likely to remain a mystery to the retailer because his name is not attached to the money. Retailers can tie the customer to cash transactions and track the customer's activity if they can convince the customer to use a _________.

Loyalty card

Ad rank on Google is calculated using the equation: Ad Rank = f(_______________, Quality Score, expected impact of extensions and formats).

Maximum CPC

_________ refers to software that is free and where anyone to look at and potentially modify the code

Open source software

Android is a software product developed by Google that allows cell phone manufacturers to control hardware and establishes standards for developing and executing applications on its platform. Android is thus an example of a(n) ___________.

Operating System

Which of these would be an example of a DDoS attack?

Overloading a popular social networking site with inbound messages in order to shut down access to the site.

A bank customer receives a message, ostensibly from the bank's web site, asking her to provide her login information. Assuming the message is intended to defraud the customer, what type of infiltration technique is being used here?

Phishing

Which of the following characteristics is said to be Java's biggest selling point?

Platform independence.

Computer hardware refers to:

The physical components of information technology.

______ repeatedly sends a cluster of three packets starting at the first router connected to a computer, then the next, and so on, building out the path that packets take to their destination.

Traceroute

Computer systems are often infected with malware by means of exploits that sneak in masquerading as something they are not. These exploits are called

Trojans

The use of public wireless connections can increase a user's vulnerability to monitoring and compromise. __________ software can be used to encrypt transmissions over public networks, making it more difficult for a user's PC to be penetrated.

VPN

A(n) ________ is someone who uncovers computer weaknesses and reveals them to manufacturers or system owners, without exploiting these vulnerabilities.

White hat hacker

Which of the following is an example of computer hardware?

Xbox (video game) console

Attacks that exhaust all possible password combinations in order to break into an account are called _____ attacks.

brute-force

The ________ refers to a situation where ads appear alongside text the advertiser would like to avoid.

content adjacency program

Firmware refers to:

control software stored on nonvolatile memory chips.

________ is the term used to describe raw facts and figures

data

Circuit-switched networks provide connection between two parties that:

is dedicated for use by the parties for the duration of a connection.

Data mining is leveraged by some firms to determine which products customers buy together, and how an organization can use this information to cross-sell more products or services. This area of application of data mining is referred to as:

market basket analysis

Less popular open source products are not likely to attract the community of users and contributors necessary to help improve these products over time. This situation reiterates the belief that _______ are a key to success.

network effects

A ________ enables communication by defining the format of data and rules for exchange

protocol

Knowledge is defined as:

the insight derived from experience and expertise.

The fault-tolerant nature of the DNS ensures that

the service continues functioning even if one nameserver goes down.

The LAMP stack of open source products is used:

to power many of the Internet's most popular Web sites.

The address one types into a web browser is also known as a:

uniform resource locator.

A server running _____ can create smaller compartments in memory that each behave as a separate computer with its own operating system and resources.

virtualization software

Search engines use _____ to discover documents for indexing and retrieval.

web-crawling spiders

What is the most common function performed by electronic data interchanges?

Sending electronic equivalents of structured documents between different organizations.

_________ refers to a precise set of instructions that tell the computer hardware what to do.

Software

Cloud vendors that host hardware, operating system, database, and other software, which clients can then use to build their own applications, are said to be providing:

Software as a service.


Conjuntos de estudio relacionados

Organic Chemistry Lab FINAL Review

View Set

psych outcome: Stereotypes, prejudice and discrimination

View Set

WEEK 6 [ADN 225] CHAPTER 8"DISEASES & DISORDERS OF THE RESPIRATORY SYSTEM"

View Set

First and Second Industrial Revolutions

View Set