Concept Assessment 1

¡Supera tus tareas y exámenes ahora con Quizwiz!

If you receive $1,000 15 years from now, what is the PV of that $100 if you use a 7% interest or discount rate?

$362.45

If you receive $100 five years from now, what is the PV of that $100 if you use a 6% interest or discount rate?

$74.73

Michelle runs a shop on Etsy. One month, she spends $2,800 to promote her shop on Etsy and other social media sites. In that month, she gains 50 new customers. Customers purchased products that cost $100 and were marked up by 100%. What is the actual amount of profit earned per customer, taking into account materials and promotional costs?

-6 NOT 56

What if any difference is there between a Trojan horse and a regular computer virus?

A Trojan horse does not self-replicate.

What is a cloud deployment model?

A cloud deployment model defines the framework of a cloud environment. ?

What is a key difference between business-to-government (B2G) transactions and other types of e-commerce?

B 2 G transactions involve prenegotiated contracts.

How does each additional block added to the blockchain strengthen the integrity of the entire chain?

Because each block contains information on recording time and sequence for both its transaction and the transaction immediately preceding it, with more blocks there is more transaction history information, making it difficult to falsify.

How do CRM systems make troubleshooting customer problems easier?

CRMs store information about customer purchases and interactions.

Who is protected by California's SB-327 for IoT Security and who is accountable for ensuring the guidelines are met?

California's SB-327 for IoT Security helps to protect consumers; the responsibility lies with makers of devices that connect with the Internet.

What is the key reason to implement cloud computing into one's personal and/or business data and information processing?

Cloud computing diminishes the need to store files and software on a local drive.

Which type of cybersecurity breach makes a computer, network, or online service malfunction or become unavailable to users?

DDOS attacks

What is the primary reason that businesses use CRM systems to help them identify MQLs and SQLs during the customer acquisition process?

Different stages of the lead generation funnel focus on each type of lead. NOT Marketing products or services to each type of lead requires CRM software.

What is the correct term for the small computer within a smartphone that analyzes the sounds entering your phone through the analog/digital converter?

Digital Signal Processor (DSP)

Which privacy law governs the transfer of personal data outside of the geographic location the law was written in?

Europe's General Data Protection Regulation NOT California Consumer Privacy Act

The abbreviation for Future Value is (___).

FV

Positive and negative numbers/values will impact the __________ Value (FV) calculation.

Future

What does the abreviation (FV) stand for?

Future Value

The term Internal Rate of Return is abbreviated (____).

IRR

A doctor in a small, private practice is looking for a safe way to share and receive patient information with other doctors his patients go to for care. She wants to make sure that any system she uses guarantees her patients privacy and abides by all local, state, and federal regulations (including HIPPA). Her tech adviser recommends a system that uses blockchain. Why would this be a good system for this type of information?

In blockchain, each record of a patient's data would be encrypted as a secure "block" of data; only authorized users would be able to access it.

How are data in process different from data at rest or data in storage?

It is held in the device's RAM until it can be processed by the CPU or GPU.

Which of the following statements best illustrates why a rootkit is described as creating a back door?

Like an intruder coming through a back door, a rootkit allows an unknown user into an operating system

Negative numbers are shown with which sign in front of the number?

Minus sign (−)

A sales associate has been hired to write blog posts that will be regularly published on a blog about new beauty products. The blog posts are designed to include the SEO terms that relate to the company's newest skin care product, using the keywords that will also be used in their advertising campaigns. What part of the e-commerce timeline would this be a part of?

NOT mobile platform plan NOT web level

The abbreviation for Net Present Value is (_____).

NPV

NPER is the acronym for what financial function term?

Number of Periods

Why are probable loss calculations important?

Organizations have limited funds to use toward system protections.

The __________ calculates the payment for a loan based on constant payments and a constant interest rate.

PMT

The total amount a series of payments is worth now is called the __________.

PV (Present Value)

__________ is widely used in finance in the stock valuation, bond pricing, and financial modeling.

PV (Present Value)

PMT is the Excel function for __________.

Payment

Interest Rate goes into which line in the Excel PMT function?

Rate

Explain the purpose of the National Institute of Standards Technology (NIST) Cybersecurity Framework.

The NIST Cybersecurity Framework is a voluntary guide that helps organizations understand and protect themselves against cybersecurity risks

Which is the best explanation of how the World Wide Web (WWW) differs from the Internet?

The web is only one of many applications that runs on and is accessed through the Internet.

The e-commerce company with the highest revenue is based in which country?

US? NOT China

What is the goal of the planning phase of the plan-protect-respond cycle?

Understand how to identify important data and create systems for backing this data up.

How does VPN software ensure that people accessing a network are authorized to do so?

VPN software uses encryption to protect the users' credentials.

Why is establishing authentication procedures a common cybersecurity goal?

Verifying that users are authorized to access systems, data, and resources is fundamental to preventing their unauthorized use

What is the second step that occurs when placing a call on a cellular network?

Your voice is converted by your phone to an electrical signal that is transmitted via radio waves to the nearest cell tower.

Who is responsible for calculating probable maximum loss?

a company's cybersecurity analysts

Software-based keyloggers often infect a system through

a malicious email or link opened by an unsuspecting user.

Which of the four criteria is occurring when a network confirms that a transaction has not yet occurred on the blockchain?

a transaction is verified

Which of the following would be prohibited under the Electronic Communications Protection Act?

an employee leaking confidential emails they were not authorized to receive

If a company wants to create a secure computer network that can be accessed and used solely by its employees, it should create

an intranet

An __________ is a contract between an individual and a company in which you make a lump sum payment or series of payments and, in return, receive regular disbursements beginning either immediately or more commonly at some point in the future.

annuity

How is quantitative data about a customer most accurately characterized?

as basic information about the customer

Which cryptocurrency shares features with a previous cryptocurrency but is technologically enhanced?

bitcoin cash

Manufacturers of computers and other electronic devices follow the IEEE 802.3 protocol to ensure that their products

can be used to create a standard ethernet connection.

Which type of collaboration software could best help an organization increase engagement between remote employees and those who are "in-house" or organization-based?

cloud-based forums, messaging, and meeting apps

Which of the elements of the CIA triad does properly maintaining all hardware serve?

confidentiality

Online marketplaces where one consumer sells to another consumer are called

consumer-to-consumer

Saraiya runs a small café. She would like to start placing small ad buys on social media and hires an analytics firm to determine which platforms she should advertise on. What type of cost would this be considered?

customer acquisition cost NOT social media

Sales managers must identify the customer leads that best fit the company's goals. CRM assists in this aspect of a company's sales process, which is known as

customer qualification

What is the "DE" function in the National Institute of Standards Technology (NIST) Cybersecurity Framework?

detect function

In addition to overall digital flexibility, technological savings, and increased collaboration, computing in the cloud provides organizations with

disaster recovery

The __________ is the interest rate that is actually earned or paid on an investment, loan, or other financial instrument due to the result of compounding interest over a given time period.

effective interest rate

If a customer segmentation tool supports integration, what is it able to do?

efficiently link data from various sources and platforms

An ordinary annuity is a series of __________ payments made at the end of consecutive periods over a fixed length of time.

equal

Time Value of Money (TVM) is one of the most basic fundamentals in __________.

finance

Excel functions can be found under which tab?

formulas

According to research by Risk Based security, there were 2037 publicly reported data breaches

in the first half of 2020.

An educational startup has already written its proprietary "Homework Helper" code, using AI to help high school students with homework. While their data storage needs are currently small, they expect their needs to grow exponentially as they increase their user base. Which of the following could help them with this?

infrastructure as a service (IaaS)

Future Value (FV) calculations help you determine the amount of money you will have if you deposit a sum of money into an account or __________ money in a financial instrument that pays interest.

invest

The main advantage of the IPv6 format for IP addresses is that

it is shorter and easier to remember than addresses in the IPv4 format.

The amount of time that passes between when a device is asked to perform and when it completes the task is known as

latency

Descriptive data about a customer includes categories such as

lifestyle and career ?

Built on real-time geodata and information provided from wireless mobile devices, ________ are widely used in m-commerce

location-based services (LBS) NOT gps

E-commerce transactions that are executed using wireless mobile devices are known as

m commerce

Which of the following acts is an example of social engineering?

manipulating people in order to obtain and misuse their personal information

Customized communication is best described as

matching the message to the individual customer. ?

It is especially important for startup companies to create and follow a well-designed e-commerce strategy. Which of the following is the last phase in a well-designed strategy?

mobile platform planning and implementation

A PaaS vendor offers its clients the ability to quickly build a customer loyalty app that allows customers to earn points for every purchase. The client chooses what features they'd like the app to have from a predetermined list of choices. What is this an example of?

mobile software development kit

When calculating (FV) Future Value of an annuity it is important to set the payment (PMT) to a __________ value.

negative

Where are data in transit found?

on a cellular network

What is a key advanced technology behind CRM analytics?

online analytical processing NOT online customer management

An interest rate (or rate) is usually stated as a __________.

percentage

E-commerce ________ includes creating marketing messages that contain the individual's name, appeal to his/her interests, and take their purchase behavior into account.

personalization

The organizations likely to benefit the most from the global reach of e-commerce are those that

previously depended on foot traffic into one physical store to sell their products.

Which of the following is an example of an activity that would be useful during the planning stage of the plan-protect-respond cycle?

providing awareness training to staff so that they know what phishing attempts to be wary of

While using her phone's GPS to drive to her vacation destination, Siena needs to find a gas station. She enters into her phone's GPS that she is looking for a gas station that is no more than five miles away from the route she is currently on. What is this an example of?

proximity location

What is the key action called for in the detect (DE) function of the NIST Cybersecurity Framework?

quick identification of a cybersecurity threat

A corporation that was recently the victim of hacking that was caused by a high-level employee falling for a phishing scheme institutes a required, annual, self-paced training module that alerts employees to the most common recent phishing attacks. The institution of this new training requirement represents which phase of the plan-protect-respond cycle?

respond

Which of the NIST Cybersecurity Framework functions calls for quick action on the part of an organization's cybersecurity team to mitigate damage to systems?

respond (RS) function

What is the "RS" function in the National Institute of Standards Technology (NIST) Cybersecurity Framework?

respond function

One of the benefits of using a CRM system is that data can be analyzed and provided to assist in measuring the value that the future lifetime revenue an organization's customers will generate minus customer acquisition costs and customer retention costs. This value is referred to as customer

revenue NOT enterprise

When a user has determined their destination, GIS can assist in providing directions. This is called

route information.

Payment can be made in the form of funds, assets, or __________.

services

A project manager needs to assess how much progress her team has made on the project, to provide executives with a weekly update. Which collaboration software program will be most useful for assessing the project's status?

smartsheet

Which Web 2.0 feature utilizes application programming interfaces (APIs) to automate web content and/or processes?

software as a service (SaaS)

As of 2020, all legislation that has been passed to protect elections from cybersecurity threats are part of

state-specific cybersecurity laws.

For laptops and tablets to use a LAN to connect to the Internet wirelessly,

the LAN device hosting the ISP connection must act as a wireless access point.

To calculate an organization's customer equity (CE) value we first determine

the future lifetime revenue the organization's customers will generate.

What does the General Data Protection Regulation (GDPR) strive to achieve?

to ensure EU companies protect the privacy and personal data of EU citizens

What is the main purpose of content delivery networks (CDNs)?

to minimize the distance between website users and website servers

E-commerce ________ is the ability of an organization to create a strong presence among consumers in many places, with minimal time constraints, to sell them products and services.

ubiquity

According to the identify (ID) function of the NIST Cybersecurity Framework, what allows an organization to prioritize its efforts where cybersecurity risk is involved?

understanding of its business environment and resources

Which type of cybersecurity breach can cause the most damage to an organization's systems, data, and information?

viruses

Share of customer, which focuses on getting as much business as possible from fewer customers, is also known as share of

wallet

To remain relevant in today's e-commerce landscape, many businesses use progressive ________ applications to undertake m-commerce.

web NOT mobile

On an e-commerce presence map, what is presence?

websites, email, social media sites, and offline media NOT methods acquire customers

An investment firm creates a network designed to facilitate information exchange between devices at its offices in New York City and New Haven, Connecticut. Which type of network would the company use to exchange information?

wide area network (WAN)


Conjuntos de estudio relacionados

CS316 Lab __ CH 14 : File Processing

View Set

Interpersonal Communication Final

View Set

NU270 Week 3 PrepU: Health, Wellness, & Illness

View Set

British Empire in Asia, Africa, and the Pacific

View Set

TESTING AND MEASURE FINAL, PART 3

View Set

Hiltz PHIL1317 Quiz 1,2,3,4,5,6,7,8. True/False + Box Words

View Set