IS 130 FINAL

¡Supera tus tareas y exámenes ahora con Quizwiz!

Job coaches recommend spending ------ percent of your time online to get a job

10

--------- cellular networks used analog signals and had low bandwidth.

1G

GPS uses the known speed of the signals and distance from ------- satellite (s) to find the location of a receiving station or user.

3

- is an example of metasearch engine

?

NICs allow devices to physically connect to the -------- communications medium.

?

--------- is a physical control.

A company gate

If you accept the potential risk, continue operating with no controls, and absorb any damages that occur, you have adopted a risk ----------- strategy.

Acceptance

If someone simulates a valid wireless access point to get people usernames, passwords, and account numbers without the person's knowledge, this is ------------.

An evil twin attack

Ransomware is typically disseminated through -----------.

Botnets

Group purchasing is a common technique in a -------

Buy-side market

The ------ is a model in which organizations attempt to procure needed products or services from other organizations electronically

Buy-side marketplace

-------- systems are important because customers are --------- powerful than ever; these systems put the intimacy back into customer service

CRM; more

--------- refers to the maximum number of times an instance of one entity can be associated with an instance in the related entity.

Cardinality

The -------- approach highlights the interlocking relationships that underline all societies.

Common good

------- facilitates dynamic pricing

Cookies

------- is the loss of a certain percentage of customers over time

Customer churn

--------- refers to the practice of registering or using domain names for the purpose of profiting from the goodwill or the trademark that belongs to someone else

Cyber-squatting

------- allows you to read a voice mail message in your e-mail inbox

DSL (?) not sure

Suppose that you believe that killing someone is wrong even it if is self-defense. This is an example of the -------- approach

Deontology

-------- modems convert information for use on the POTS

Dial-up

If you have to speak into your phone to unlock it, this is an example the user ---------.

Does

------------- is the process of converting an original message into a form that cannot be read by anyone except the intended receiver.

Encryption

A relational database is basically one big table; it is also called a flat file.

False

An FAIS helps get rid of information silos caused by ERP

False

Authentication occurs after authorization.

False

Collaborative consumption services offer employees many benefits including higher pay, more paid vacation, and flexible hours

False

Retailers are the prime example of companies involved in the production process.

False

Super Wi-Fi is super-fast Wi-Fi technology.

False

The internet grew out of an experimental project by some universities in the 1960s.

False

The internet is a PAN

False

Tracking cell phones is illegal.

False

The Sarbanes-Oxley Act requires publicly held companies to implement -------- controls; it was passed to address the ------- crisis.

Financial; Enron

An --------- is a system that prevents a specific type of information from moving between untrusted and private networks

Firewalls

The ----- process originates in the sales department and ends in the accounting department

Fulfillment

Organization's use Porter's competitive forces model to design -------- strategies; they us the value chain model to identify -------- activities to make the greatest impact.

General, specific

You open an e-mail form your friend that looks a little odd, but you figure your friend would never send you anything bad. This is ---------- and is an ----------- mistake.

Human error, unintentional

------- consists of 32 bits

IPv4

135.62.128.91 is an example of an ---------- address.

IPv4

Databases maximize ----------; this means --------.

Independence; applications and data are not linked to each other, so all applications are able to access the same data.

Car and technology companies are currently competing over who can offer the first self-driving car. This is an example of an ---------- strategy

Innovation

Which of the following increases supplier power?

Internet searching

Systems that manage processes originating in one company and concluding in another company are called ------ systems

Interorganizational

-------- delivers the precise number of parts to be assembled into a finished product at precisely the right time

JIT

------- satellites have the shortest orbital life.

LEO

--------- satellites are used to run the GPS system.

MEO

------ is part of the ------ process and occurs when the company is trying to fulfill a specific customer order.

Make-to-order; production

----------- are a set of core data that span the enterprise information systems.

Master Data

in September 2014, NASCAR implemented an app from ----- to perform prerace inspections

Microsoft

Databases ----- redundancy; this means -------.

Minimize, the same data are stored in multiple locations

-------- technology enables the use of mobile wallets.

NFC

You decide to integrate your supply chain to cut down production time. This is an example of an ------- strategy.

Operational effectiveness

-------- is a software company that compares a homeowner's energy use to the average energy use of his or her neighbors

Opower

-------- analytics drives the coupons you get the grocery store when you use your loyalty card

Predictive

The -------- key is ab identifier field that uniquely identifies a record.

Primary

The ------ process originates in the warehouse department and ends in the warehouse department

Production

As the principal of a local high school, you want to install a wireless WAN to give students better, more secure access to the internet. You request bids from a few local service providers to get the best price. This is an example of a ------- auction.

Reverse

--------- uses AI to predict the best ad to present to a given customer who is visiting a particular web page

Rocket Fuel

--------- is the most popular query language used for interacting with a database.

SQL

Legacy systems were developed as --------.

Silos

--------- is a wireless network proposal that creates long-distance wireless internet connections; it uses the lower-frequency "white spaces" between broadcast TV channels.

Super Wi-Fi

Management is a process by which an organization achieves its goals (called------) through the use of resources (called ------)

The output; input

Which of the following is FALSE of persuasive technologies?

They are only used for consumer habit formation

The ------ layer of TCP/IP provides communication and packet services.

Transport

A device can be wireless but not mobile.

True

A filter bubble is a result of a search in which a website algorithm guesses what a user would like to see based on information about the user

True

An RFQ is associated with a reverse auction.

True

Big Data facilitates dynamic pricing.

True

Businesses must respond to customers more quickly and appropriately than they did prior to social computing

True

Content that is illegal in one country can still be legal in other countries.

True

Data aggregators can collect public and non-public information to create digital dossiers.

True

Disintermediation is a threat of substitute products from Porter's Five Forces

True

Download speed is much faster than upload speed when defining the term broadband.

True

Modern smartphones exhibit a process called dematerialization.

True

Organizations can use SaaS to acquire cloud-based ERP systems

True

Privacy rights apply to individuals, groups, and institutions.

True

Social marketplaces act as online intermediaries that harness the power of social networks for introducing, buying, and selling products and services

True

Social marketplaces are an example of C2C commerce

True

TPSs collect data continuously, typically in real time.

True

The public's right to know supersedes the individuals right to privacy.

True

The web makes disintermediation easier, particularly for online services.

True

Knowledge is distinct from data and information.

True.

Smartphones are sensors that can be used for electronic surveillance.

True.

A ----- relationship exists when an association is maintained within a single entity

Unary

A transaction is any business even that generates ------ worthy of being captured and stored in a database

data

Data reduction is the conversion of raw information into a smaller amount of more useful data

false

Filter bubbles guarantee that you will see websites that widely disagree so you can come to an informed decision

false

Users had passive involvement with web 2.0 websites. Web 3.0, on the other hand, facilitates more interactive social computing

false

American companies can easily do business with Chinese companies. This phenomenon is called

globalization

Suppose you have a primary location in New York City where your main corporate servers are located. Just in case something happens in New York City, you have backup servers that are updated every minute in Chicago. This is an example of a -------- site.

hot

when you map out how your business currently processes customer orders to figure out how to reduce delivery time, this is part of the ----- phase of BPI

improve

----- is an example of effectiveness

increasing customer satisfaction

----- industries experience the greatest threat from substitutes

information-based

Biometrics is an example of something the user -----------.

is

The pursuit of the "American Dream" and our ability to choose our religious orientation is a reflection of the ---------- approach.

rights

the BYOD phenomenon is a ------ pressure

technology

Companies listen to consumers in the blogosphere who express their views on the companies' products. This is consumer-generated media.

true

Consumers typically respond negatively to dynamic pricing.

true

Organizations can use Big Data to microsegment customers.

true

Viral marketing lends itself especially well to social networking

true


Conjuntos de estudio relacionados

1-3 Basic Networking Connectivity And Communications Exam

View Set

Cultural Anthropology - Chapter 8 Test (6th ed)

View Set

CRIJ 3340 - Gender and Crime Midterm Study Guide (Chapters 1-4)

View Set

Explorations in Mathematics B: Unit 2: Assignment 2

View Set

Business and Organizational Management

View Set