3300 FINAL

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

The three aspects of Information Security that we discussed in class are: A. Confidentiality, Integrity, Availability. B. Security, Integrity, Availability. C. Confidentiality, Integration, Access. D. Confidence, Integrity, Access.

Confidentiality, Integrity, Availability

Which of the following is an accurate description of "Moore's Law"? A. The cost of microprocessor chips is halved about every eighteen months. B. The amount of data that can be transmitted over an optical fiber cable doubles about every nine months. C. The number of transistors fitting on a chip doubles about every two years. D. The cost of a semiconductor fabrication plant doubles about every four years

The number of transistors fitting on a chip doubles about every four years

Which of the following is an element of privacy? A. the right to be left alone B. the right to view, correct, and edit private, protected information C. the right to withhold taxes D. the right to demand information

The right to be left alone

The ________ feature introduced by instant messaging shows whether a person is logged in and available to answer a question, pick up the phone, or stop by for a brief meeting. A. presence awareness B. telepresence C. media richness D. telecommute

presence awareness

a responsive and flexible network for receiving defective and excess products back from their customers and supporting customers who have problems with delivered products plan, source, make, deliver, or return.

return

develop a set of pricing, delivery and payment processes with suppliers and create metrics for monitoring and improving the relationships. plan, source, make, deliver, or return.

source

Structured information can be defined as data ________. A. that can be organized into hierarchies B. that cannot be linked together C. about data that clarifies the nature of the information D. that is difficult to break down

that can be organized into hierarchies

Which of the following has raised questions regarding the ethical implications of companies collecting and analyzing enormous amounts of customer data? A. use of commercial off-the-shelf software B. use of cloud computing C. use of target advertising D. use of open source software

use of target advertising

The percentage of workers who left an organization and were replaced during a time period is called employee _____

Turnover

Said to be inventor(s) of public-private key encryption.

Whitfield Diffie and Martin Hellman

A foreign key is ________. A. an attribute that is present in only one table B. a primary key which appears as an attribute in a different table C. a unique value or attribute that determines a primary key D. a field, or a group of fields, that makes each record unique in a table

a primary key which appears as an attribute in a different table

A self-replicating program that sends copies to other nodes on a computer network and may contain malicious code intended to cause damage is a. trojan horse b. worm c. keylogger d. virus

b. worm

BusinessUSA.com allows small-scale producers to post information about their products on the site and prospective buyers compare the prices and features of the competing products before purchasing them. Which of the following types of e-marketplaces does BusinessUSA.com represent? A. business to consumer (B2C) B. business to business (B2B) C. consumer to consumer (C2C) D. consumer to business (C2B)

business to consumer (B2C)

How can a company avoid the trap of competing only on price? A. by keeping the price at a level higher than the competitors B. by following a pricing strategy inconsistent with the market equilibrium C. by differentiating the products or services that it offers D. by selling at a price much lower than the competition

by following a pricing strategy inconsistent with the market equilibrium

What act established privacy rights over educational records? a. CAN-SPAM act b. Gramm-Leach-Bliley act c. FERPA d. Privacy act of 1974

c. FERPA

Why are some results for google internet search queries no longer available when web surfing in the European Union? a. due to the censorship of adult sites b. pirated material for movie sharing sites like torrents are blocked. c. individuals can now request that their information be removed through "the right to be forgotten". d. fears of litigation by end users

c. individuals can now request that their information be removed through "the right to be forgotten".

each of the following are information security issues, except: a. risk management b. identifying threats c. utilitarianism d. technical security controls

c. utilitarianism

"tracking _______ are commonly used as ways to compile long-term records of individuals' browsing histories"

cookies

contract between authors and society enforced by government

copyright

To prevent unauthorized access, which of the following is not commonly used in authentication strategies? a. something the user knows, such as a user ID, password, PIN, answer to a security question b. something the user has in his possession, such as an ID badge, credit card, RFID chip c. something the user is-a biometric characteristic that uniquely ids the user, voice pattern, fingerprint d. something the user likes, such as food, weather or sports

d. something the user likes, such as food, weather or sports

This is the part that many SCM insiders refer to as logistics, where companies coordinate the receipt of orders from customers, develop a network of warehouses, pick carriers to get products to customers and set up an invoicing system to receive payments. plan, source, make, deliver, or return.

deliver

An electronic bridge between partner companies in a supply chain that is used to transmit real-time information about orders, inventories, invoices, and other data is called ________. A. electronic market B. financial network C. expense and cost recovery system D. electronic data interchange

electronic data interchange

Technique that scrambles data using mathematical formulas, so that it cannot be read without applying the key to decrypt it

encryption

An integrated application suite to support a whole establishment that includes modules to manage financials, human resources, supply chain, customer relationships, and other business processes is called ________. A. enterprise resource planning B. total quality management C. business process automation D. business process management

enterprise resource planning

A system of moral principles that human beings use to judge right and wrong and to develop rules of conduct

ethics

.Which of the following collaborative technologies has the greatest amount of media richness as well as interactivity? A. face-to-face conversations B. shared workspaces C. social networking D. text messaging

face-to-face conversations

Proxy servers can be used to mask a web surfers' IP address. t/f?

false

Distributed Denial of Service (DDoS) is a method that programmers use to protect against malware. t/f?

false DoS: An attack in which computers in a botnet are directed to flood a single website server with rapid fire page requests, causing it to slow down or crash

Firewalls are protective controls that stops employees from gaining access to unauthorized material t/f?

false Firewall: A defensive technical control that inspects incoming and outgoing traffic and either blocks or permits it according to rules the organization establishes. The firewall can be a hardware device or a software program

Sending unsolicited commercial messages to millions of email addresses harvested from websites is called hacking. t/f?

false- spamming

What is the difference between asynchronous and synchronous communication? A. Asynchronous is real-time communication. Synchronous is one-way technology. B. Asynchronous is communication that does not occur at the same time. Synchronous communication occurs at the same time. C. Asynchronous communication includes instant messaging. Synchronous communication includes email. D. Asynchronous communication is fast and instant. Synchronous communication is collected at a single point in time.

Asynchronous is communication that does not occur at the same time. Synchronous communication occurs at the same time.

this license lets other remix tweak and build upon your work non-commercially, as long as they credit you and license their new creations under the identical terms

Attribution- non commercial- shareAlike

This license lets others remix, tweak, and build upon your work non-commercially, as long as they credit you and license their new creations UNDER THE IDENTICAL TERMS

Attribution-Share A Like

American computer scientist, recognized by many as the father of the data warehouse.

Bill Inmon

____ results from rational behavior by companies within the existing structure of supply chains

Bullwhip Effect

The "big bang" approach for implementing ERP involves ________. A. implementing software-as-a-service (SaaS) or on-demand software products B. going live with all the core modules in the engineered suite at the same time C. matching ERP modules to company needs D. using best-of-breed suites for enhancing ERPs through mergers

going live with all the core modules in the engineered suite at the same time

The term ________ refers to configured computers with specific vulnerabilities so they can attract different varieties of malware in the wild, study their properties, and find out who started them. A. expert systems B. web crawlers C. honeypots D. server farms

honeypots

Which of the following is a transmission protocol which specifies that the resource is a web page containing code the web browser can interpret and display? A. file transfer protocol B. file exchange protocol C. hypertext transfer protocol D. simple text transfer protocol

hypertext transfer protocol

a plan that an organization uses to categorize a security threat, determine the cause, preserve any evidence, and also get the systems back online so the organization can resume business

incidence response plan

The protection of data about individuals

information privacy

Which of the following is a function of unified communications? A. enabling a company to communicate with all its customers at the same time B. collecting and storing data from multiple users and building a database C. integrating multiple applications and communications channels into a single interface D. maintaining a record of individual changes made on shared documents through version

integrating multiple applications and communications channels into a single interface

assets created by an individual; i.e. designs, inventions, etc.

intellectual property

lifetime of author plus 70 years

length of copyright in the US

A network which connects computers, printers, scanners, and other devices in a single building or home is called a ________. A. wide area network B. personal area network C. local area network D. global area network

local area network

Supply chain managers schedule the activities necessary for production, testing, packaging and preparation for delivery. This is the most metric-intensive portion of the supply chain—one where companies are able to measure quality levels, production output and worker productivity. plan, source, make, deliver, or return.

make

Which of the following is a function of normalization? A. assigning primary keys B. assigning incremental numbers to records C. minimizing duplication of information D. decreasing the functional dependency of data

minimizing duplication of information

Software that is freely distributed, along with the code underlying the program, so that people can access the code to improve it is known as ________. A. legacy software B. proprietary software C. open source software D. firmware

open source software

an attempt to steal passwords or other sensitive information by persuading the victim, often in an email, to enter information into a fraudulent website that masquerades as the authentic version

phishing

The first step in the successful management of a next-generation supply chain is ________. A. sourcing B. delivering C. making D. planning

planning

Which of the following is true of a byte? A. It holds eight zeros and ones and represents a single character B. It holds twelve bits and represents a nibble C. It is the equivalent of two key presses for text D. It is the equivalent of a short, text-only email message

A. It holds eight zeros and ones and represents a single character

_________ is a cost-cutting approach to servers in which multiple operating systems run concurrently on a single physical PC server. A. Virtualization B. Software licensing C. Distributed computing D. DGrid computing

A. Virtualization

The ________ code defines how keyboard characters are encoded into digital strings of ones and zeros. A. T.61 B. ASCII C. ANSEL D. MARC-8

ASCII

Alice wants to send a Secret message to Bob without Eve being able to know what the message is. So Alice encrypts the message with ____________________. Bob can then decrypt the message with __________________. A. Bob's Private Key, Alice's Public Key B. Bob's Public Key, Bob's Private Key C. Alice's Private Key, Bob's Public Key D. Alice's Public Key, Bob's Private Key

Alice's Public Key, Bob's Private Key

What is Cloud Computing replacing? A. Corporate data centers B. Expensive personal computer hardware C. Expensive software upgrades D. All of the above

All of the above

Effective and efficient SCM systems. Decrease or Increase? 1. _____ the power of its buyers 2. _____ its own supplier buyer 3. _____ switching costs to reduce the threat of substitute products or services 4. Create entry barriers thereby _____ the threat of new entrants 5. _____ efficiencies while seeking a competitive advantage through cost leadership

1. Decrease2. Increase3. Increase4. Decrease5. Increase

Cracked German Enigma Codes. Proposed separating a computer's hardware from it's software

Allen Turning

Which of the following is an example of a consumer to consumer e-marketplace? A. An airline gives a traveler best travel and ticket offers in response to the traveler's post on the airline's website that she wants to fly from New York to San Francisco. B. An author who writes book reviews, posts links to books on Amazon.com on her website, and receives revenues from successful sales to her blog subscribers. C. A person posts information about furniture he wishes to sell on eBay and sells it to another individual who views that eBay page. D. A business owner calculates the tax he has to pay to the IRS through an interactive tool on its website and makes the payment via wire transfer from the same site.

A person posts information about furniture he wishes to sell on eBay and sells it to another individual who views that eBay page.

Refers to technologies that software developers, publishers, media companies, and other intellectual property owners use to control access to their digital content

Digital Rights Management (DRM)

Developed the Relational Database model

Edgar F Codd

the electronic interchange of business information using a standardized format; a process which allows one company to send information to another company electronically rather than with paper.

Electronic data interchange (EDI)

_____ involves the automatic tagging of unusual events in financial transactions and is used to spot mistakes and fraudulent activities

Exception Reports

________ involves the automatic tagging of unusual events in financial transactions and is used to spot mistakes and fraudulent activities. A. Exception reporting B. Compliance reporting C. Human capital management D. Electronic data interchange

Exception reporting

one of the founders of intel who thought that the number of transistors on a microprocessor would continue to double every 2 years

Gordon E. Moore

Which of the following technologies is better equipped than relational databases to handle big data? A. MySQL B. Hadoop C. ETL D. SQL Server

Hadoop

The monetary gains produced by an organization's expenditures on salaries, benefits, bonuses, and other costs for employee talent is called ____

Human Capital Return on Investment

How is metadata related to information? A. It helps clarify the nature of the information. B. It helps gather unstructured information. C. It organizes unstructured information to form structured information. D. It removes redundant data from unstructured information.

It helps clarify the nature of the information.

What is the main drawback of using unstructured information? A. It hinders creativity. B. It is expensive to maintain. C. It cannot be used to store numerical information. D. It makes retrieving information very difficult.

It makes retrieving information very difficult.

Which of the following best describes support activities? A. It refers to activities directly related to the process by which products and services are created, marketed, sold, and delivered. B. It refers to activities that help the transformation of raw materials to finished products. C. It refers to processes including administration and management, human resources, procurement, and technology assistance. D. It refers to activities that comprise multiple tasks and are performed by one person or department.

It refers to processes including administration and management, human resources, procurement, and technology assistance.

Which of the following statements is true of information privacy? A. It is most easily achieved online and is impossible to maintain on paper. B. It is governed by laws that are universal in all countries. C. It refers to the protection of data about individuals. D. It emphasizes the importance of sharing data over protecting personally identifiable information

It refers to the protection of data about individuals

leading authority on competitive strategy and the competitiveness and economic development of nations, states, and regions.

Michael Porter

How much a customer spends on each purchase

Monetary Value

beliefs about fundamental and natural rights that belong to human beings

Natural Law and Rights

What is the bullwhip effect in the context of supply chain management?

Occurs when changes in consumer demand causes the companies in a supply chain to order more goods to meet the new demand. The bullwhip effect usually flows up the supply chain, starting with the retailer, wholesaler, distributor, manufacturer and then the raw materials supplier.

a study prepared by the department of defense, it is a history of the US political-military involvement in Vietnam from 1945-1967. leaked to press by Daniel Ellsberg

Pentagon Papers

Said: "Efficiency is doing things right; effectiveness is doing the right things".

Peter Drucker

_____________ is a technology placed on tags that consist of small chips equipped with a microprocessor, a tiny antenna to receive and transmit data, and sometimes a battery that stores information on the tagged object's history. A. GPS B. RFID C. GPRS D. CDMA

RFID

What is the formula that an organization can use to find its most valuable customers?

RFM - Recency, Frequency, Monetary Value

How recently a customer purchased items

Recency

Doesn't remove the original article or file about you, but deletes the search engine results or other places where that information is stored

Right to be forgotten

Describe SCM, CRM, and ERP and the differences among them.

SCM- Management of info flows between and among activities in a supply chain to maximize total supply chain effectiveness and corporate profitability CRM- Managing all aspects of a customer's relationship with an org to increase customer loyalty and retention and an org's profitability ERP- Integrates all departments and functions throughout an org into a single IT system so employees can make decisions by viewing enterprise wide info on all business ops Differences- SCM is internal and deals with the processes and their flows within the supply chain. CRM is external and deals with the relationship between the company and it's customers. ERP incorporates all of a company's operations and puts it all together in one IT system

This license lets others distribute, remix, tweak and build upon your work, even commercially, as long as they credit you for the original creation. this is the most accommodating of licenses offered

ShareAlike

Intended sales income that was not and cannot be realized is ____

Shrinkage

the art of manipulating people into breaking normal information security procedures or divulging confidential information

Social Engineering

What are the three ways to authenticate someone (select three answers from the list below). A. Something they know B. Something they are C. Someplace they have been D. Something they have E. Something they aren't

Something they know, something they are, something they have

the world's first copyright law

Statue of Ann

The bullwhip effect can be reduced if:

Suppliers have real-time access to up-to-date retail sales

The bullwhip effect can be reduced if: 1. Suppliers have real-time access to up-to-date retail sales data 2. Suppliers are provided with warehouse management software 3. Suppliers are provided with global trade management software 4. Suppliers occasionally receive faxed purchase orders from the retailer

Suppliers have real-time access to up-to-date retail sales data

Possibly the most fractured group of software applications on the planet

Supply Chain Management software

________ are the costs that customers incur when they change suppliers. A. Network costs B. Switching costs C. Overhead costs D. Opportunity costs

Switching costs

System that routes communication so that IP address and other identifying information in the communications is shutdown

TOR

According to Tom Jerzak, "Care over distance" describes? A. Telepresence B. Telemedicine C. Presence Awareness D. Health Information Systems

Telemedicine

Said to be inventor(s) of the world wide web.

Time Berners Lee

Works at CERN, developed HTTP and HTML protocols/languages

Time Berners Lee

SQL links tables together by ________. A. using primary keys and foreign keys B. using data stored in cloud computers C. assigning incremental numbers to records D. assigning XML tags to the tables

Using primary keys and foreign keys

An intermediary server that receives and analyzes requests from clients and then directs them to their designated destinations is called a Proxy server t/f?

true

Installation of malware can be intentional or accidental human error t/f?

true

Plagiarism is a type of intellectual property theft t/f?

true

.Which of the following transmission media is most commonly used in ordinary telephones? A. coaxial cables B. twisted pair wires C. optical fiber D. ribbon cables

twisted pair wires

According to Tom Jerzak, Telework is becoming ____________ for business A. a have to have B. ubiquitous C. unnecessary D. social

ubiquitous

The unique global address for a web page or other resource on the Internet is called the ________. A. extensible resource identifier B. uniform resource locator C. solution deployment descriptor D. internationalized resource identifier

uniform resource locator


Ensembles d'études connexes

Sociology Ch. 8: Stratification and Mobility in the United States

View Set

Chapter 6: Introduction to the Internet Protocol

View Set

PSYC 100- LearningCurve 14b- Social- Cognitive Theories and the Self

View Set

3.5: The challenge of secularism

View Set

vocab workshop level h unit 4 answers

View Set

CIS 321 Data Communication and Networking Exam 2 Study Guide

View Set