CGS Assessment 2
If you receive $1000.15 years from now, what is the PV of that $100 if you use a 7% interest or discount rate?
$362.45
Michelle runs a shop on Etsy. One month, she spends $2,800 to promote her shop on Etsy and other social media sites. In that month, she gains 50 new customers. What is her customer acquisition cost for that month?
$56
If you receive $100.05 years from now, what is the PV of that $100 if you use a 6% interest or discount rate?
$74.73
Michelle runs a shop on Etsy. One month, she spends $2,800 to promote her shop on Etsy and other social media sites. In that month, she gains 50 new customers. Customers purchased products that cost $100 and we were marked up by 100%. What is the actual amount of profit earned per customer taking into account materials and promotional costs?
-6 dollars
What is a cloud deployment model?
A cloud deployment model defines the framework of a cloud environment.
What is the difference between a cloud service and a web service?
A cloud service provides users with increased computing power and data management, whereas a web service provides the software tools needed for devices and systems to communicate with each other.
If a company wants to create a secure, computer net worth, I can be assessed you solely by its employees, it should create
An Intranet
What are the three categories of the detect (DE) function of the NIST cybersecurity framework?
Analysis, observation, detection
An _ is a contrast between an individual in a company in which you make a lump sum payment or series of payments, and, in return, receive regular disbursement to beginning either immediately or more commonly at some point in the future.
Annuity
What does business to customer (B2C) e-commerce replace
Brick and mortar store locations
Why is a denial-of-service attack (DoS attack) a threat to data availability?
By flooding a system with incoming messages, a DoS attack forces the system to shut down, rendering it inaccessible to the users who legitimately have access to it.
Manufacturer of computers and other electronic devices follow the IEEE 802.3 protocol to ensure that their products
Can be used to create a standard ethernet connection
Which of the following is the clearest definition of a computer virus?
Code-created malware that, when executed, damages programs and performance.
Online marketplaces where one customer sells to another consumer are called
Consumer to consumer (C2C)
Saraiya runs a small café. She would like to start placing small ad buys on social media and hires an analytics firm to determine which platforms she should advertise on. What type of cost would this be considered?
Customer Acquisition Cost
What is one of the greatest risks of an organization storing customer data?
Data breaches
The _ is the interest rate that is actually earned or paid on an investment, loan, or other financial instrument, due to the result of compounding interest over a given time period.
Effective interest-rate
An ordinary annuity is a series of _ payments made at the end of consecutive periods over fixed the length of time
Equal
Which priority law governance to transfer personal data outside of the geographic location the law was written in?
Europe's General data protection regulation
The abbreviation for future value is
FV
Makato and Rebecca want to hire a nanny for their six month old baby. Before allowing someone into their home to watch their child, they are planning on running a comprehensive background, check, including a credit check. Which law specifies, whether Makato and Rebecca are legally allowed to access potential candidates credit information?
Fair credit reporting act
Time value of money (TVM) is one of the most basic fundamentals in
Finance
The key feature of Web 2.0, that allows us to collectively classified information, such as by tagging websites, and online images, is called
Folksonomy
Excel functions can be found under which tab
Formulas
Cognitive and negative numbers/values will impact the _ Value (FV) calculation
Future
What does the abbreviation (FV) stand for
Future value
The term of internal rate of return is abbreviated
IRR
What is the second step in the process of sending a message via the Internet?
Identify the correct domain name.
A doctor in a small, private practice is looking for a safe way to share and receive patient information with other doctors his patients go to for care. She wants to make sure that any system she uses guarantees her patients privacy and abides by all local, state, and federal regulations (including HIPPA). Her tech adviser recommends a system that uses blockchain. Why would this be a good system for this type of information?
In blockchain, each record of a patient's data would be encrypted as a secure "block" of data; only authorized users would be able to access it.
An educational startup has already written it's proprietary homework, helper code, using AI to help high school students with homework. While their data storage needs are currently small, they are expect their needs to grow exponentially as they increase their user base. What does the hell I could help them with this?
Infrastructure as a service (IaaS)
Future value (FV) calculations help you determine the amount of money you will have if you deposit a sum of money and do an account or _ money, and a financial instrument that pays interest
Invest
An email to be from a legitimate company, is most likely to be a social engineering cybersecurity attack if
It contains a link to a free offer that seems too good to be true
Which statement accurately describes the need to keep sensitive data, information, and systems, confidential?
It is both a major goal and a requirement for cybersecurity.
How are data and process different from data at rest or data in storage?
It is held in the device's RAM until it can be processed by the CPU or GPU.
Once surveillance technology that relies on how the user enters data is a
Keylogger
Which of the following statements best illustrates why a rootkit is described as creating a back door?
Like an intruder coming through a back door, a rootkit allows an unknown user into an operating system.
E-commerce transactions that are executed, using wireless mobile devices are known as
M-commerce
It is especially important for startup companies to create follow a well-designed e-commerce strategy. Which of the following is the last phrase in a well-designed strategy?
Mobile platform planning and implementation
A PaaS vendor offers its clients the ability to quickly build a customer loyalty that allows customers to earn points for every purchase. The client chooses what features they'd like the app to have from a predetermined list of choices. What is this an example of?
Mobile software development kit
The abbreviation for net present value is
NPV
Which of the four criteria is occurring when a network confirms that a transaction has not yet occurred on the block chain?
Not: a transaction is stored
When calculating (FV) future value of an annuity it is important to set the payment (PMT) to a _ value
Not: positive
NPER is the acronym for which financial function term?
Number of periods
Why are probable loss calculations important?
Organizations have limited funds to use toward system protections.
The _ calculates the payment for a loan, based on constant payments in a constant interest rate
PMT
_ is widely used in finance in the stock, evaluation, bond pricing, and financial modeling
PV (Present Value)
They total amount a series of payments is worth now is called the
PV (present value)
PMT is the Excel function for
Payment
An interest rate (or rate) is usually stated as a
Percentage
E-commerce ________ includes creating marketing messages that contain the individual's name, appeal to his/her interests, and take their purchase behavior into account.
Personalization
Which threat to cyber security can only come from outside an organization?
Ransomware
Interest rate goes into which line in the Excel PMT function?
Rate
When I user has to determine their destination, GIS can assist in providing directions. This is called.
Route information
Payment can be made in the form of funds, assets, or
Services
With Web 3.0, every day device is connected to the web will become
Smarter and more capable, given the improved support for the Internet of things (IoT)
Of the following statements, which one specifically applies to the CRM integration of platform, such as Facebook, YouTube, and TikTok?
Social media platforms provide targeted customer information
As of 2020, all legislation that has been past to protect elections from cybersecurity threats are part of
State-specific cybersecurity laws
Explain the purpose of the national Institute of standard technology (NIST) cybersecurity framework
The NIST cybersecurity framework is a voluntary guide that helps organizations understand and protect themselves against cybersecurity risks
Software-base keyloggers often infect a system through
The malicious email or link opened by an unsuspecting user
What is the best explanation of how the World Wide Web (WWW) differs from the Internet?
The where is only one of many applications that runs on and is accessed through the Internet
Why is it important to preserve the integrity of data, information, and systems?
These assets lose their usefulness and value if their consistency, accuracy, or dependability is compromised.
M-commerce is a subset of
Traditional e-commerce
A project manager needs to assess how much progress her team has made on the project, to provide executives with the weekly update. Which collaboration software program will be most useful for assessing the project status?
Trello
Manuel runs a small business of paints, residential interiors. He has decided most of his current customers can best be reached by sending out a seasonal email newsletter. He will target new customers by placing ads on Facebook. Targeted at people located within 20 miles of his business who have searched for house painters. Where when he places information on an e-commerce presence map?
Type of presence
The e-commerce company with the highest revenue is based in which country?
United States
Why would a vendor agreement be a disadvantage of cloud computing?
Vendor agreements make it difficult to switch services.
Collaboration software designed to increase collaboration and productivity, primarily by enabling team members to
View, edit, and ad shared information real time, from anywhere
To remain relevant in today's e-commerce, landscape, many business businesses use progressive _ applications to undertake m-commerce
Web
An investment firm creates a network designed to facilitate information exchange between devices at its offices in New York City and New Haven, Connecticut. Which type of network went to the company used to exchange information?
Wide area network (WAN)
The main advantage of the IPV six format for IP addresses, is that
You can accommodate many more addresses in the IPV format
Which of the following is one of the primary components that enable networks and individual devices to connect to the Internet?
a "backbone" of connected hardware and a suite of Internet protocol software
Who is responsible for calculating probable maximum loss?
a company's cybersecurity analysts
Social engineering is used to target people whom
are not cautious about giving out confidential or sensitive information.
Which cryptocurrency shares features with the previous cryptocurrency, but is technologically enhanced?
bitcoin cash
Malicious bots are cybersecurity risks because they
can reproduce and link to an outside server.
A company just received a government contract to provide onboarding services targeted towards people who want to sign up for Medicare. They will be handling sensitive information, including the users' Social Security numbers and home addresses and will host the login page where people will access their Medicare account online. Which of the following are considered major cloud service providers?
cloud services security
Which type of collaboration software could best help an organization increase engagement between remote employees, and those who are in-house or organization based
cloud-based forums, messaging, and meeting apps
Share of wallet is also known as share of
customer
The information needed to calculate share a customer is provided, in large part, by
customer relationship management systems
Gartner IT Services company predicts that by 2021, customer relationship management systems will be the single largest revenue area of spending in
enterprise software
Apple has a very high customer equity (CE) value. Apple has gained this high CE value due to
extreme customer loyalty.
Which level of share of wallet means that existing customers are spending more to purchase products or services from one organization than they are from direct or indirect competitors?
high share of wallet
Descriptive data about a customer includes categories such as
lifestyle and career
Negative numbers are shown with which sign in front of the number?
minus sign (-)
What does the identify (ID) function of the NIST cybersecurity framework focus on?
organizational understanding of how to manage cybersecurity risks
Which of the following is a goal of an information technology disaster recovery plan (IT DRP)?
outline specific recovery times for information technology to resume after an issue occurs
What type of computer users are considered miners?
people who validate cryptocurrency transactions on the digital ledger
The organizations likely to benefit the most from the global reach of e-commerce are those that
previously depended on foot traffic into one physical store to sell their products.
A cybersecurity exploit allows a hacker or intruder to
remotely access a network, gain privileges, and make unauthorized changes.
In what stage of the plan-protect-respond cycle forensic analysis conducted
responding stage
For laptops and tablets to use a LAN to connect to the Internet wirelessly,
the LAN device hosting the ISP connection must act as a wireless access point.
To calculate an organization's customer equity (CE) value we first determine
the future lifetime revenue the organization's customers will generate.
The concept of share of customer focuses on getting
the most business from the fewest customers.
What is the goal of the NIST cybersecurity framework protect (PR) function?
to help protect an organization's IT infrastructure from security breaches by offering guidelines on IT infrastructure protection
What is the main purpose of content delivery networks (CDNs)?
to minimize the distance between website users and website servers
What part of the plan-protect-respond cycle is occurring when an organization limits access to sensitive documents on a server to only those with the required security clearance?
to protect
The NIST cybersecurity framework is a
voluntary guide for organizations.
On an e-commerce presence map, what is presence?
websites, email, social media sites, and offline media