CGS Assessment 2

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

If you receive $1000.15 years from now, what is the PV of that $100 if you use a 7% interest or discount rate?

$362.45

Michelle runs a shop on Etsy. One month, she spends $2,800 to promote her shop on Etsy and other social media sites. In that month, she gains 50 new customers. What is her customer acquisition cost for that month?

$56

If you receive $100.05 years from now, what is the PV of that $100 if you use a 6% interest or discount rate?

$74.73

Michelle runs a shop on Etsy. One month, she spends $2,800 to promote her shop on Etsy and other social media sites. In that month, she gains 50 new customers. Customers purchased products that cost $100 and we were marked up by 100%. What is the actual amount of profit earned per customer taking into account materials and promotional costs?

-6 dollars

What is a cloud deployment model?

A cloud deployment model defines the framework of a cloud environment.

What is the difference between a cloud service and a web service?

A cloud service provides users with increased computing power and data management, whereas a web service provides the software tools needed for devices and systems to communicate with each other.

If a company wants to create a secure, computer net worth, I can be assessed you solely by its employees, it should create

An Intranet

What are the three categories of the detect (DE) function of the NIST cybersecurity framework?

Analysis, observation, detection

An _ is a contrast between an individual in a company in which you make a lump sum payment or series of payments, and, in return, receive regular disbursement to beginning either immediately or more commonly at some point in the future.

Annuity

What does business to customer (B2C) e-commerce replace

Brick and mortar store locations

Why is a denial-of-service attack (DoS attack) a threat to data availability?

By flooding a system with incoming messages, a DoS attack forces the system to shut down, rendering it inaccessible to the users who legitimately have access to it.

Manufacturer of computers and other electronic devices follow the IEEE 802.3 protocol to ensure that their products

Can be used to create a standard ethernet connection

Which of the following is the clearest definition of a computer virus?

Code-created malware that, when executed, damages programs and performance.

Online marketplaces where one customer sells to another consumer are called

Consumer to consumer (C2C)

Saraiya runs a small café. She would like to start placing small ad buys on social media and hires an analytics firm to determine which platforms she should advertise on. What type of cost would this be considered?

Customer Acquisition Cost

What is one of the greatest risks of an organization storing customer data?

Data breaches

The _ is the interest rate that is actually earned or paid on an investment, loan, or other financial instrument, due to the result of compounding interest over a given time period.

Effective interest-rate

An ordinary annuity is a series of _ payments made at the end of consecutive periods over fixed the length of time

Equal

Which priority law governance to transfer personal data outside of the geographic location the law was written in?

Europe's General data protection regulation

The abbreviation for future value is

FV

Makato and Rebecca want to hire a nanny for their six month old baby. Before allowing someone into their home to watch their child, they are planning on running a comprehensive background, check, including a credit check. Which law specifies, whether Makato and Rebecca are legally allowed to access potential candidates credit information?

Fair credit reporting act

Time value of money (TVM) is one of the most basic fundamentals in

Finance

The key feature of Web 2.0, that allows us to collectively classified information, such as by tagging websites, and online images, is called

Folksonomy

Excel functions can be found under which tab

Formulas

Cognitive and negative numbers/values will impact the _ Value (FV) calculation

Future

What does the abbreviation (FV) stand for

Future value

The term of internal rate of return is abbreviated

IRR

What is the second step in the process of sending a message via the Internet?

Identify the correct domain name.

A doctor in a small, private practice is looking for a safe way to share and receive patient information with other doctors his patients go to for care. She wants to make sure that any system she uses guarantees her patients privacy and abides by all local, state, and federal regulations (including HIPPA). Her tech adviser recommends a system that uses blockchain. Why would this be a good system for this type of information?

In blockchain, each record of a patient's data would be encrypted as a secure "block" of data; only authorized users would be able to access it.

An educational startup has already written it's proprietary homework, helper code, using AI to help high school students with homework. While their data storage needs are currently small, they are expect their needs to grow exponentially as they increase their user base. What does the hell I could help them with this?

Infrastructure as a service (IaaS)

Future value (FV) calculations help you determine the amount of money you will have if you deposit a sum of money and do an account or _ money, and a financial instrument that pays interest

Invest

An email to be from a legitimate company, is most likely to be a social engineering cybersecurity attack if

It contains a link to a free offer that seems too good to be true

Which statement accurately describes the need to keep sensitive data, information, and systems, confidential?

It is both a major goal and a requirement for cybersecurity.

How are data and process different from data at rest or data in storage?

It is held in the device's RAM until it can be processed by the CPU or GPU.

Once surveillance technology that relies on how the user enters data is a

Keylogger

Which of the following statements best illustrates why a rootkit is described as creating a back door?

Like an intruder coming through a back door, a rootkit allows an unknown user into an operating system.

E-commerce transactions that are executed, using wireless mobile devices are known as

M-commerce

It is especially important for startup companies to create follow a well-designed e-commerce strategy. Which of the following is the last phrase in a well-designed strategy?

Mobile platform planning and implementation

A PaaS vendor offers its clients the ability to quickly build a customer loyalty that allows customers to earn points for every purchase. The client chooses what features they'd like the app to have from a predetermined list of choices. What is this an example of?

Mobile software development kit

The abbreviation for net present value is

NPV

Which of the four criteria is occurring when a network confirms that a transaction has not yet occurred on the block chain?

Not: a transaction is stored

When calculating (FV) future value of an annuity it is important to set the payment (PMT) to a _ value

Not: positive

NPER is the acronym for which financial function term?

Number of periods

Why are probable loss calculations important?

Organizations have limited funds to use toward system protections.

The _ calculates the payment for a loan, based on constant payments in a constant interest rate

PMT

_ is widely used in finance in the stock, evaluation, bond pricing, and financial modeling

PV (Present Value)

They total amount a series of payments is worth now is called the

PV (present value)

PMT is the Excel function for

Payment

An interest rate (or rate) is usually stated as a

Percentage

E-commerce ________ includes creating marketing messages that contain the individual's name, appeal to his/her interests, and take their purchase behavior into account.

Personalization

Which threat to cyber security can only come from outside an organization?

Ransomware

Interest rate goes into which line in the Excel PMT function?

Rate

When I user has to determine their destination, GIS can assist in providing directions. This is called.

Route information

Payment can be made in the form of funds, assets, or

Services

With Web 3.0, every day device is connected to the web will become

Smarter and more capable, given the improved support for the Internet of things (IoT)

Of the following statements, which one specifically applies to the CRM integration of platform, such as Facebook, YouTube, and TikTok?

Social media platforms provide targeted customer information

As of 2020, all legislation that has been past to protect elections from cybersecurity threats are part of

State-specific cybersecurity laws

Explain the purpose of the national Institute of standard technology (NIST) cybersecurity framework

The NIST cybersecurity framework is a voluntary guide that helps organizations understand and protect themselves against cybersecurity risks

Software-base keyloggers often infect a system through

The malicious email or link opened by an unsuspecting user

What is the best explanation of how the World Wide Web (WWW) differs from the Internet?

The where is only one of many applications that runs on and is accessed through the Internet

Why is it important to preserve the integrity of data, information, and systems?

These assets lose their usefulness and value if their consistency, accuracy, or dependability is compromised.

M-commerce is a subset of

Traditional e-commerce

A project manager needs to assess how much progress her team has made on the project, to provide executives with the weekly update. Which collaboration software program will be most useful for assessing the project status?

Trello

Manuel runs a small business of paints, residential interiors. He has decided most of his current customers can best be reached by sending out a seasonal email newsletter. He will target new customers by placing ads on Facebook. Targeted at people located within 20 miles of his business who have searched for house painters. Where when he places information on an e-commerce presence map?

Type of presence

The e-commerce company with the highest revenue is based in which country?

United States

Why would a vendor agreement be a disadvantage of cloud computing?

Vendor agreements make it difficult to switch services.

Collaboration software designed to increase collaboration and productivity, primarily by enabling team members to

View, edit, and ad shared information real time, from anywhere

To remain relevant in today's e-commerce, landscape, many business businesses use progressive _ applications to undertake m-commerce

Web

An investment firm creates a network designed to facilitate information exchange between devices at its offices in New York City and New Haven, Connecticut. Which type of network went to the company used to exchange information?

Wide area network (WAN)

The main advantage of the IPV six format for IP addresses, is that

You can accommodate many more addresses in the IPV format

Which of the following is one of the primary components that enable networks and individual devices to connect to the Internet?

a "backbone" of connected hardware and a suite of Internet protocol software

Who is responsible for calculating probable maximum loss?

a company's cybersecurity analysts

Social engineering is used to target people whom

are not cautious about giving out confidential or sensitive information.

Which cryptocurrency shares features with the previous cryptocurrency, but is technologically enhanced?

bitcoin cash

Malicious bots are cybersecurity risks because they

can reproduce and link to an outside server.

A company just received a government contract to provide onboarding services targeted towards people who want to sign up for Medicare. They will be handling sensitive information, including the users' Social Security numbers and home addresses and will host the login page where people will access their Medicare account online. Which of the following are considered major cloud service providers?

cloud services security

Which type of collaboration software could best help an organization increase engagement between remote employees, and those who are in-house or organization based

cloud-based forums, messaging, and meeting apps

Share of wallet is also known as share of

customer

The information needed to calculate share a customer is provided, in large part, by

customer relationship management systems

Gartner IT Services company predicts that by 2021, customer relationship management systems will be the single largest revenue area of spending in

enterprise software

Apple has a very high customer equity (CE) value. Apple has gained this high CE value due to

extreme customer loyalty.

Which level of share of wallet means that existing customers are spending more to purchase products or services from one organization than they are from direct or indirect competitors?

high share of wallet

Descriptive data about a customer includes categories such as

lifestyle and career

Negative numbers are shown with which sign in front of the number?

minus sign (-)

What does the identify (ID) function of the NIST cybersecurity framework focus on?

organizational understanding of how to manage cybersecurity risks

Which of the following is a goal of an information technology disaster recovery plan (IT DRP)?

outline specific recovery times for information technology to resume after an issue occurs

What type of computer users are considered miners?

people who validate cryptocurrency transactions on the digital ledger

The organizations likely to benefit the most from the global reach of e-commerce are those that

previously depended on foot traffic into one physical store to sell their products.

A cybersecurity exploit allows a hacker or intruder to

remotely access a network, gain privileges, and make unauthorized changes.

In what stage of the plan-protect-respond cycle forensic analysis conducted

responding stage

For laptops and tablets to use a LAN to connect to the Internet wirelessly,

the LAN device hosting the ISP connection must act as a wireless access point.

To calculate an organization's customer equity (CE) value we first determine

the future lifetime revenue the organization's customers will generate.

The concept of share of customer focuses on getting

the most business from the fewest customers.

What is the goal of the NIST cybersecurity framework protect (PR) function?

to help protect an organization's IT infrastructure from security breaches by offering guidelines on IT infrastructure protection

What is the main purpose of content delivery networks (CDNs)?

to minimize the distance between website users and website servers

What part of the plan-protect-respond cycle is occurring when an organization limits access to sensitive documents on a server to only those with the required security clearance?

to protect

The NIST cybersecurity framework is a

voluntary guide for organizations.

On an e-commerce presence map, what is presence?

websites, email, social media sites, and offline media


Kaugnay na mga set ng pag-aaral

unit 3 The solar system and the universe

View Set

Nervous System Review 9-1-9.10 - 2/27/18

View Set

Music of Medieval, Renaissance and Baroque Period

View Set

Chapter 22 Management of Patients With Upper Respiratory Tract Disorders Book Review Exam 2

View Set