MIS 2100
Which of the following statements accurately describes computer networks? More than one answer may be correct.
A network is a group of two or more devices/computers that are connected together. Networks range in size from small home networks to the internet, the world's largest network. Only certain types of networks can be linked together and supported by the internet
Which of the following is a benefit of collaboration software for business teams and organizations? More than one answer may be correct.
Better communication: team members can share content in real time, from any location Improved interaction: remote employees can attend meetings via video conferencing
One of the benefits of cloud computing is increased collaboration among corporate users.
true
Which is the best explanation of how the World Wide Web (WWW) differs from the internet?
world wide web (www)
A computer network must be connected to the internet to support
communicating via email with people on other networks
Which of the following describes a popular collaboration software program that is used in business? More than one answer may be correct.
Smartsheet, Slack, and Trello
What is the key reason to implement cloud computing into one's personal and/or business data and information processing?
Cloud computing eliminates the need to store files and software on a local drive.
Which of the following is an example of a tool that could be used to ensure data integrity? More than one answer may be correct.
backing up data to separate servers or to the cloud hard copies of important datasets are kept in a locked warehouse
In addition to overall digital flexibility, technological savings, and increased collaboration, computing in the cloud provides organizations with
disaster recovery.
A server is a group of two or more devices/computers that are connected to allow them to exchange information and share resources.
false
An organization is said to have "e-commerce universality" if it has a strong online presence that enables it to quickly sell its products and/or services to almost anyone, regardless of the time or their location
false
Businesses have found that though their reliance on internal IT infrastructure has increased, while their costs are reduced when using the cloud.
false
One noted disadvantage of cloud computing is the issue of overcollaboration between users.
false
The practice of trading used, old, or obsolete products via the internet in exchange for other used or similar products is called re-commerce.
false
The type of e-commerce transactions that involve the selling of goods and services between businesses is vendor-to-vendor (V2V) e-commerce.
false
Which of the NIST Cybersecurity Framework functions investigates an organization's cybersecurity management in the context of their business needs and resources?
identify (ID) function
From the following list, select the functions of an Internet Service Provider (ISP).
providing access or a gateway to the resources on the internet providing an Internet Protocol (IP) address creating protocols and other standards for transmitting messages
Which of the following are areas that are covered on an e-commerce presence map? More than one answer may be selected.
the platform the activity
Which of the following are correct regarding blockchain? More than one answer may be selected.
In supply chain management, blockchain can verify with almost absolute certainty where items and goods are along the supply chain, thus removing guesswork and inefficiencies for shippers and customers. For business contracts, blockchain makes it almost impossible to change any information in a contract. This is advantageous for businesses that are dealing with multiple contracts.
Which of the following is a characteristic of the internet that helps explain how it works? More than one answer may be correct.
The internet has connections points called nodes. Data is usually stored on specialized computers called servers.
From the following list, select the companies that are leaders in the re-commerce market.
Yerdle Re-commerce thredUp The RealReal
What is the second step that occurs when placing a call on a cellular network?
Your voice is converted by your phone to an electrical signal that is transmitted via radio waves to the nearest cell tower.
The key feature of Web 2.0 that allows users to collectively classify information, such as by tagging websites and online images, is called
folksonomy
The deactivation of access to corporate systems and documents after an employee leaves a company is an example of which tool that ensures confidentiality? More than one answer may be correct.
access control authentication
Which of the following threats to cybersecurity come from internal sources? More than one answer may be correct.
an accidental erasure of data an attack by an authorized user the leakage of sensitive information
If a company wants to create a secure computer network that can be accessed and used solely by its employees, it should create
an intranet.
Which cryptocurrency shares features with a previous cryptocurrency but is technologically enhanced?
bitcoin cash
What are the core actions of the protect (PR) function?
controlling access to systems and preventing unauthorized access
From the following list, select all the types of problems that create a cybersecurity vulnerability.
faulty procedures for upholding system security poor setup or implementation of system security insufficient control or management of system security
List disadvantages of cloud computing. More than one answer may be correct.
limited control
Which Web 2.0 feature utilizes application programming interfaces (APIs) to automate web content and/or processes?
software as a service (SaaS)
Manuel runs a small business that paints residential interiors. He has decided most of his current customers can best be reached by sending out a seasonal email newsletter. He will target new customers by placing ads on Facebook targeted at people located within 20 miles of his business who have searched for house painters. Where would he place this information on an e-commerce presence map?
type of presence
Why is establishing authentication procedures a common cybersecurity goal?
Verifying that users are authorized to access systems, data, and resources is fundamental to preventing their unauthorized use.
Manufacturers of computers and other electronic devices follow the IEEE 802.3 protocol to ensure that their products
can be used to create a standard ethernet connection.
Which type of collaboration software could best help an organization increase engagement between remote employees and those who are "in-house" or organization-based?
cloud-based forums, messaging, and meeting apps
What are the major issues faced by organizations in terms of data and information that were addressed by cloud computing? More than one answer may be correct.
data management storage security
What do all cybersecurity threats have in common?
They are connected to the loss of information, software, or hardware.
Why is a denial-of-service attack (DoS attack) a threat to data availability?
By flooding a system with incoming messages, a DoS attack forces the system to shut down, rendering it inaccessible to the users who legitimately have access to it
Which type of cybersecurity breach makes a computer, network, or online service malfunction or become unavailable to users?
DDOS attacks
Determine which of the following is an example of data that has integrity.
Data that are used to set sales goals for account executives are stored on a secure server; managers are allowed read-only access to the sales data for the reps they directly manage.
Describe cloud computing in today's business environment. More than one answer may be correct.
Due to the cost-effective nature of cloud storage, many small businesses use it to back up data. A majority of global companies are using the cloud to backup and store data and information.
Of the following statements, choose the ones that correctly apply to issues in m-commerce.
Ethical issues include keeping product listings accurate, following online selling laws, and maintaining web accessibility. Due to similarities between organizations that sell goods and services online, competitor analysis is challenging. Customer loyalty is highly important, as it can cost five times more to acquire a new customer than it costs to retain one.
Which of the following would be prohibited under the Electronic Communications Protection Act?
an employee leaking confidential emails they were not authorized to receive
At its core, blockchain stores transaction data in blocks and then links the blocks together to form a chain.
true
The basic types of computer networks include which of the following? More than one answer may be correct.
wide area network (WAN) local area network (LAN) personal area network (PAN)
What does the identify (ID) function of the NIST Cybersecurity Framework focus on?
organizational understanding of how to manage cybersecurity risks
Common issues that e-commerce businesses face include
threats to customer data. unstable customer loyalty.
A project manager needs to assess how much progress her team has made on the project, to provide executives with a weekly update. Which collaboration software program will be most useful for assessing the project's status?
trello
The type of e-commerce transaction where consumers are able to provide a service to a business often through a bidding or auction type of system is called consumer-to-business.
true
Why is data that is located in the RAM of a device considered data in transit?
RAM only holds data and instructions temporarily; nothing is permanently stored in RAM
From the following list, select the statement that correctly defines that type of network.
An internet connects LANs, WANs, and other internets together. An WAN connects a variety of devices at a single site, such as an office.
Which of the following statements about the revenues of global e-commerce companies are correct?
Amazon has had revenues of over $280 billion. Alibaba has had revenues of over $56 billion. JD.com's revenues have eclipsed $70 billion.
From the following list, select all of the ways in which cybersecurity helps preserve the integrity of data, information, and systems.
Cybersecurity policies and procedures are designed to protect the consistency, accuracy, and dependability of these assets.Cybersecurity policies and procedures are designed to protect the consistency, accuracy, and dependability of these assets. Cybersecurity tools such as user-access controls, file permission, and version controls help prevent unauthorized changes.Cybersecurity tools such as user-access controls, file permission, and version controls help prevent unauthorized changes. Cybersecurity systems are designed to detect unauthorized or unanticipated changes to data that suggest a loss of integrity.
From the following list, select all the characteristics of collaboration software that enhance the productivity of teams, groups, and organizations.
Dedicated workspaces are viewable and editable by approved users, regardless of their physical location. The software is cloud-based, removing the need for users to have specific software downloaded on a device. Remote users create individual, dedicated workspaces online for managing their own data and workflows. Changes to project documents or spreadsheets must be saved and sent to the members of a team.
Which statement correctly defines a component of the World Wide Web (WWW)? More than one answer may be correct.
HTML is a language commonly used format for publishing web documents and content. A URL is the address of a document or other content/resources found on the web. HTTP is a protocol for the transmission of hypermedia documents (such as HTML) and was designed for communication between web browsers and web servers W3C is the architecture of the WWW, which is created by its standards and protocols.
Which of the following correctly identify National Institute of Standards and Technology (NIST) cloud computing deployment models? More than one answer may be correct.
Public cloud infrastructure is for open use by the general public. It may be owned, managed, and operated by a business, academic, or government organization, or some combination of them. Private cloud infrastructure is extended to a single organization with multiple consumers e.g., business units. Community cloud infrastructure is a composition of two or more distinct cloud infrastructures that remain unique entities but are bound together by standardized or proprietary technology.
Which of the following would be considered a benefit in a cost-benefit analysis? More than one answer may be correct.
Spending money to update the CRM database in order to generate more customer leads, resulting in an $50,000 increase in sales to new customers. A weekly blog that generates engagement among users who have never heard of your product before. Updating shipping tracking software so that it is easy to confirm orders have successfully reached customers.
What is occurring when a call placed on a cellular network is "dropped?" More than one answer may be correct.
The mobile switching station that your phone connected to was unable to maintain a connection with the mobile switching station of the person you're calling.
From the following list, select all the statements that correctly characterize or define e-commerce ubiquity.
The term refers to the degree an organization has gained access to consumers, thus increasing the likelihood of product or service adoption. It is the ability of an organization to create a strong presence among consumers in many places, with minimal time constraints, to sell the products and services they offer. It gives customers the ability to purchase products and services regardless of time or location.
Why would a vendor agreement be a disadvantage of cloud computing?
Vendor agreements make it difficult to switch services.
The internet has two primary components that enable it to connect networks and individual devices
a "backbone" of connected hardware and a suite of internet protocol software.
Collaboration software leads to better collaboration by enabling people from across the organization and in the same time zone to share content in real time.
false
Cryptocurrency allows people to share a digital ledger across a network of computers without a central source of control because no single entity has the ability to tamper with the records.
false
Digital currencies that only exist on computers and are transferred between peers without an intermediary such as a bank are called digicurrencies.
false
Describe the benefits 5G networks will provide cell phone carriers and users. More than one answer may be correct.
greater capacity faster connections and data transfer speeds
Which of the following are areas covered by state-specific cybersecurity laws? More than one answer may be correct
increasing cybersecurity at the state and local level protecting critical infrastructure from cyber threats
To properly authenticate, or verify, the identity of authorized users and protect assets from unauthorized users, it is essential to
keep user logins and passwords confidential.
The amount of time that passes between when a device is asked to perform and when it completes the task is known as
latency
The organizations likely to benefit the most from the global reach of e-commerce are those that
previously depended on foot traffic into one physical store to sell their products.
What is an example of a business-to-business transaction? More than one answer may be correct.
purchasing office supplies for a university buying medical equipment for a pediatrician's office purchasing food service items for a restaurant
With Web 3.0, everyday devices connected to the Web will become
smarter and more capable, given the improved support for the Internet of Things (IoT).
Which of the following are reasons why states are making cybersecurity measures a high priority? More than one answer may be correct.
the acceleration of new technologies the proliferation of cyber threats to data and technologythe
A LAN is a type of network that connects devices at a single site within a limited geographic range.
true
A business-to-consumer transaction is considered to be the selling of products and services to individual consumers.
true
A computing model where services are provided over a network, primarily accessed via the internet, is called cloud computing.
true
Accelerated mobile pages (AMPs) support m-commerce by utilizing a scaled-down version of hypertext markup language (HTML) to create web pages that load quickly on mobile devices.
true
Customer acquisition cost (CAC) is a metric that is used by e-commerce companies and other sales related organizations to assess the costs associated with convincing a potential customer to purchase a service or product.
true
The Internet of Things refers to all devices that are capable of being connected to the internet.
true
E-commerce ________ is the ability of an organization to create a strong presence among consumers in many places, with minimal time constraints, to sell them products and services.
ubiquity
According to the identify (ID) function of the NIST Cybersecurity Framework, what allows an organization to prioritize its efforts where cybersecurity risk is involved?
understanding of its business environment and resources
Collaboration software is designed to increase collaboration and productivity primarily by enabling team members to
view, edit, and add shared information in real time, from anywhere.
Which type of cybersecurity breach can cause the most damage to an organization's systems, data, and information?
viruses
On an e-commerce presence map, what is presence?
websites, email, social media sites, and offline media
An investment firm creates a network designed to facilitate information exchange between devices at its offices in New York City and New Haven, Connecticut. Which type of network would the company use to exchange information?
wide area network (WAN)
From the following list, select all the key aspects of today's e-commerce landscape that organizations should consider when conducting business in this environment.
Internet of Things (IoT) integrated shopping experiences m-commerce