COM-325-Exam 2

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

In data communication, the _____ is a packet-switching service that operates at 25 Mbps and 622 Mbps, with maximum speed of up to 10 Gbps.

Asynchronous Transfer Mode

_____ is the amount of data that can be transferred from one point to another in one second.

Bandwidth

_____ check to see what links are on the user's Web page and make sure they work; if a link is broken, they identify it and include this information as part of the data about that page.

Crawlers

Identify a social networking site based in Ghana.

Facebook

A global information system (GIS) can be defined along two dimensions: customization and communication.

False

E-commerce is a subset of social commerce.

False

E-commerce provides product acknowledgements through phone calls and faxes.

False

EAP (Extensible Authentication Protocol) keys are dynamically generated based on the user's SSID and password.

False

In the context of the CIA triangle, confidentiality means that computers and networks are operating and authorized users can access the information they need.

False

Open-source systems have eliminated all difficulties related the the lack of standardization across borders.

False

Recommendation web sites are not allowed to offer incentives to individuals for sharing information about their purchases.

False

The main drawback of an intrusion detection system (IDS) is its inability to prevent denial-of-service (DoS) attacks.

False

_____ involves the design, manufacture, use, and disposal of computers and servers in such a way that there is minimal impact on the environment.

Green computing

Which growing application of IoT is used to enhance manufacturing processes and data analytics on factory floors?

Industrial Internet of Things (IIoT)

_____ is an Internet service for communicating with others via a private "chat room" on the Internet.

Instant messaging

_____ is an Internet service that enables users in chat rooms to exchange text messages with people in other locations in real time.

Internet Relay Chat

In the context of information privacy, which of the following is true of spam?

It is sent in bulk using automated mailing software.

Which statement is true of Hypertext Markup Language (HTML)?

It is used to define a Web page's layout and appearance.

Identify the main disadvantage of omnichannel.

Its complexity.

_____ are community-based marketplaces that enable individuals to communicate directly with each other and conduct e-commerce operations.

Peer-to-peer e-commerce platforms

Which layer of the Open Systems Interconnection (OSI) model formats message packets?

Presentation

All client computers that try to access an access point are required to include an _____ in all their packets.

SSID

_____ is a primary activity in Michael Porter's value chain.

Service

_____ is an attempt to gain access to a network by posing as an authorized user in order to find sensitive information, such as passwords and credit card information.

Spoofing

Which of the following is true of mobile commerce (m-commerce) applications?

They are supported by short-range wireless communication technologies.

In the context of intentional security threats, _____ can erase data and wreak havoc on computers and networks but do not replicate themselves.

Trojan programs

Ethernet is a standard communication protocol embedded in software and hardware devices used for building a local area network (LAN).

True

Social Web sites provide shopping advice and opinion through chat and forums.

True

_____ is a technique that combines the strongest features of Wired Equivalent Privacy (WEP) and Extensible Authentication Protocol (EAP) techniques and helps improve the security of wireless networks.

Wi-Fi Protected Access

_____ support m-commerce applications.

Wireless wide area networks

A _____ is an organization with assets and operations in at least one country other than its home country.

multinational corporation

In a(n) _____, production, sales, and marketing are decentralized and financial management remains the parent company's responsibility.

multinational structure

The four pillars of hypersociality describe a return to a _____ for businesses.

natural human interaction

The goal of the Health Insurance Portability and Accountability Act (HIPAA) includes:

protecting medical providers' notes and records.

A _____ is an information system that enables users to retrieve data from the Web by using keywords related to their topic of interest.

search engine

The _____ pillar of hypersociality realizes that the benefits of leveraging social media are much greater than its negatives.

social messiness vs. process hierarchy

In the context of information privacy, junk e-mail is also known as _____.

spam

The coordination dimension of a global information system (GIS) requires _____.

standardization within departments

Control in a global information system requires _____.

the use of defined behaviors for different processes

Horizontal scaling of a client/server architecture means _____.

adding more workstations

Spoofing happens when:

an illegitimate program poses as a legitimate one.

Identify an advantage of a cross-channel sales strategy.

b. It increases sales opportunities.

An organization's extranet server is typically placed in a network area called the ______ that is separate from the LAN.

demilitarized zone

A ________ is rented from a third party and usually contains telecommunication equipment.

co-location facility

Before establishing a security program, organizations should __________.

conduct a basic risk analysis

Online auction sites that involve business transactions between users of products and services are categorized as _____ e-commerce.

consumer-to-consumer

In the context of a global information system (GIS), _____ refers to the use of managerial power to ensure adherence to the organization's goals.

control

A level 3 security system focuses on protecting the _____ against intrusion, denial-of-service attacks, and unauthorized access.

corporate network

Identify a true statement about copyright laws.

d. They protect tangible material, such as books.

Designing and implementing a global database is a technical challenge, mainly because of the _____.

different character sets used for the names of people and places

In the universal resource locator (URL) https://www.exsat.org, the domain name is _____.

exsat.org

When planning a comprehensive security system, the first step is designing _____, which use a combination of hardware and software for improving reliability, a way of ensuring availability in case of a system failure.

fault-tolerant systems

Which system is used for managing global operations, supporting an international company's decision-making processes, and dealing with complex variables in global operations and decision making?

global information

The top two targets for ransomware attacks are the __________.

healthcare industry and financial institutions

In a global information system (GIS), high coordination:

helps maintain control of market needs around the world.

Hypersocial organizations should forget information channels and concentrate on:

knowledge networks.

Clement applies for a home loan at Global Bank Inc. As part of the process, he provides his personal details to the banker who is responsible for sanctioning loans. The banker uses Clement's personal information to sell him insurance policies. In this scenario, the banker's action is considered _____.

legal, but unethical

Most software applications are _____ in nature and cannot be integrated into a GIS infrastructure.

local


Kaugnay na mga set ng pag-aaral

Modern Database Management - Chapter 1

View Set

Chapter 3 health illness Module 2

View Set

Care of the Older Adult and Chronic Illness

View Set

FUNDAMENTALS OF INSPECTING THE EXTERIOR COURSE

View Set

Finance Chapter 9 Smartbook Questions

View Set