CIS TEST 2
Crowd Funding Sites
- people join together to loan money for a business idea - websites like GoFundMe, KickStarter
Application Security
1. Application configuration 2. Encryption technology
Disruptive Technology
A new way of doing things that initially does not meet the needs of existing customers
Information Secrecy
Addresses the protection of data from unauthorized disclosure and confirmation of data source quthenticity.
perimeter network
Also known as a DMZ, a small network that is set up separately from a company's private LAN and the Internet.
Information Property
An ethical issue that focuses on who owns information about individuals. Focuses on how infromation can be sold and exchanged.
Which of the following are associated with Public Key encryption?
Asymmetric keys,Private keys
Select the four characteristics of Web 2.0.
Collaboration outside the organization Collaboration inside the organization Content sharing through open sourcing User-contributed content
What is intangible creative work that is embodied in physical form and includes copyrights, trademarks, and patents?
Intellectual property
What are agents, software, or businesses that provide a trading infrastructure to bring buyers and sellers together?
Intermediaries
data security
Keeping the organization's data safe from theft, modification, and/or destruction
tacit knowledge
Knowledge contained in people's heads
select the four challenges facing ebusiness
Managing consumer trust Adhering to taxation rules Identifying limited market segments Ensuring consumer protection
Personalization
Occurs when a company knows enough about a customer's likes and dislikes that it can fashion offers more likely to appeal to that person
What consists of nonproprietary hardware and software based on publicly known standards that allows third parties to create add-on products to plug into or interoperate with the system?
Open system
Intermedaries
Organisations involved in the distribution of goods and services on behalf of other businesses
What occurs when a new radical form of business enters the market that reshapes the way companies and organizations behave?
Paradigm shift
Which of the following help contribute to filter bubbles for users on the Internet. a)Past click behavior. b)Location. c)Anti-virus software settings. d)Choosing one type of newspaper. e)Search history. f)Type of computer
Past click behavior, Location, Search history, Type of computer
Sustaining technology
Produces an improved product customers are eager to buy
The video from OSLIS on the topics of Evaluating Websites provides 4 strategies for evaluating internet websites. Which of the following is not a proposed website evaluation method. a)Review the evidence. b)Recognition of a familiar logo or band. c)Investigate the Author d)Uncover the motivation and bias of the source. e)Assess Timeliness.
Recognition of a familiar logo or band
An open ________ consists of nonproprietary hardware and software based on publicly known standards that allows third parties to create add-on products to plug into or interoperate with the system.
SYSTEM
INFRASTRUCTURE SECURITY
Security on hardware and software necessary to run your network.
authentication and authorization
Something that is part of the user, such as a fingerprint or voice signature, Something the user has, such as a smart card or token, Something the user knows, such as a user ID and password.
What contains instructions written by a programmer specifying the actions to be performed by computer software?
Source code
What produces an improved product customers are eager to buy, such as a faster car or larger hard drive?
Sustaining technology
Which of the following are challenges of Business 2.0 but not Web 1.0? (select all that apply, omit those that do not.) a)Violations of Copyright b)Plagiarism c)Information Vandalism d)Technology Dependence e)Ensuring Consumer Protection f)Adhering to Taxation Rules
Technology Dependence, Violations of Copyright, Plagiarism, Information Vandalism
What discusses how established companies can take advantage of disruptive technologies without hindering existing relationships with customers, partners, and stakeholders?
The Innovator's Dilemma
privacy
The right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent
Business 2.0
User-contributed content
What is created and updated by many users for many users?
User-contributed content
Select two terms representing the next generation of Internet use — as a more mature, distinctive communications platform characterized by new qualities such as collaboration sharing, and free.
Web 2.0 Business 2.0
Long Tail
a new approach to segmentation based on the idea that companies can make money by selling small amounts of items that only a few people want, provided they sell enough different items
Firewall
a part of a computer system or network that is designed to block unauthorized access while permitting outward communication.
Web 2.0
a set of economic, social, and technology trends that collectively form the basis for the next generation of the Internet
Public Key Encryption
asymmetric keys and public keys and private keys are all concepts associated with public key encryption
Which of the following is not an example of an information security policy Question 3 options: a) A rule requiring users to change passwords every 45 days b) A rule allowing users to share passwords c) A rule specifying that passwords should contain special characters d) A rule requiring users to log off when they leave for lunch e) A rule forbidding users from sharing login IDs
b) A rule allowing users to share passwords
A(n) ___________ technology is a new way of doing things that initially does not meet the needs of existing customers.
disruptive
Common computer encryption methods use keys that are 256 or 512 bits long. Doubling the length of an encryption key ______________.
exponentially increase the computer time needed to break (crack) an encrypted message.
open system
consists of nonproprietary hardware and software based on publicly known standards that allow third parties to create add-on products to plug into or interoperate with the system
source code
contains instructions written by a programmer specifying the actions to be performed by computer software
fake news
content, articles, videos that present made up or false information
User-contributed content
created and updated by many users for many users
Information security policies
identifies the rules required to maintain information security, such as requiring users to log off before leaving for lunch or meetings, never sharing passwords with anyone, and changing passwords every 30 days
private data
information which is confidential and only ethically available to selected individual.. The right to keep certain things to yourself; not for public viewing.
explicit knowledge
knowledge consists of anything that can be documented, archived, and codified, often with the help of MIS.
Caesar Cypher
letter-by-letter method to make a cipher. For each letter, substitute another letter 4 letters ahead. For "a", write "d".
Chris Anderson, editor-in-chief of Wired magazine, describes niche-market ebusiness strategies as capturing the ______ tail, referring to the tail of a typical sales curve.
long
information reach
measures the number of people a firm can communicate with all over the world
public key encryption
n is an essential building block of digital signatures and authentication and nonrepudiation
paradigm shift
occurs when a new, radical form of business enters the market that reshapes the way companies & organizations behave
Organizations address security risks through two lines of defense; the first is___________ and the second is__________
people and technology
Authorization
process of providing a user with permission including access levels and abilities such as file access, hours of access, and amount of allocated storage space?
In __________ steps are added to the value chain as new players find ways to add value to the business process.
reintermediation
Ecryption
scrambles information into an alternative form that requires a key or password to decrypt
token
small electronic devices that change user passwords automatically
counterfeit software
software that is manufactured to look like the real thing and sold as such
information richness
the amount and depth of information that gets transmitted in a message
Confidentiality
the assurance that messages and information are available only to those who are authorized to view them
Biometrics
the identification of a user based on a physical characteristic, such as fingerprint, iris, face, voice, or handwriting
Ethics
the principles of right and wrong that guide an individual in making decisions
crowd source
the process of obtaining needed services, ideas, or content by soliciting contributions from a large group of people, and especially from an online community, rather than from traditional employees or suppliers
pirated software
the unauthorized use, duplication, distribution, or sale of copyrighted software
public encryption
uses two keys a public key that everyone can have and private key for only the recipient
What is the difference between asynchronous and synchronous communication? a)Asynchronous is real-time communication; synchronous is one-way technology. b)Asynchronous communication includes instant messaging; synchronous communication includes email. c)Asynchronous communication is fast and instant; synchronous communication is collected at a single point in time. d) Asynchronous is communication that does not occur at the same time; synchronous communication occurs at the same time.
D. Asynchronous is communication that does not occur at the same time; synchronous communication occurs at the same time.
Which of the following is a defining characteristic of Web 2.0? a)Hypertext Transport Protocol (HTTP) b)Need for strong technical skills c)URLs d)User-contributed content e)asynchronous communication
D.User-contributed content
Select three types of clickstream data metrics.
Demographics of registered visitors Length of stay on the website Number of abandoned registrations
Symmetric Key Encryption
Encryption system in which a single key is used for both encryption and decryption.
asymmetric key encryption
Encryption system in which two keys are used: a public key used only to encrypt data, and a private key used only to decrypt it.
Information Management
Ensures that organizations have the types of data/information required to function and grow efficiently.
In Excel, a relative cell reference ___________. (Select all correct answers) a)example is EK12 b)a way of identifying a cell position that will NOT be adjusted when pasted or copied to additional cells. c)requires that cell protection be set to "unlocked" d)example is $A$1 e)a way of identifying a cell position that WILL be adjusted when pasted or copied to additional cells.
a)example is EK12 e)a way of identifying a cell position that WILL be adjusted when pasted or copied to additional cells.
_________ data can observe the exact pattern of a consumer's navigation through a site.
clickstream
Asynchronous communication
communication such as email in which the message and the response do not occur at the same time
synchronous communication
communications that occur at the same time such as IM or chat
Clickstream
computer jargon used to describe user movement through websites
Decryption
decode information, the opposite of encrypt
Authentication
is a method for confirming users' identities.
Copyright
is the legal protection afforded an expression of an idea, such as a song, book, or video game.