Info Systems Exam 3

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which of the following is the best description of a protocol in a telecommunications network architecture?

A standard set of rules and procedures for control of communications in a network

All of the following are physical components of an RFID system except:

Bar codes

Because of ____ e-commerce sites, anyone can become a merchant online.

C2C

A trusted third-party organization that issues attachments to emails or embedded Web site data to verify the identity of a sender or Web site is known as a(n) _____.

Certificate authority

Which statement about data security in the public cloud is true?

Clients of public cloud computing services must rely on service providers to safeguard their data.

_____ refers to a computing environment where software and storage are provided as an Internet service and accessed with a Web browser.

Cloud computing

Why do cloud computing service arrangements often pose challenges for organizations that are transitioning to the cloud?

Cloud computing arrangements can be lengthy and complex.

A(n) ________ signal is a discrete, binary waveform that transmits data coded into two discrete states such as 1-bits and 0-bits.

Digital

A computer network consists of at least three computers.

False

A hub is a networking device that is used to filter and forward data to specified destinations on the network.

False

Bartering is a technique used by advertisers to recapture shoppers who abandoned a Web site without making a purchase.

False

Because cloud computing arrangements have become so common, they are typically simple and straightforward from both the legal and pricing standpoints.

False

In 1992, the Supreme Court ruled that online retailers must collect sales taxes even in states where they lack a physical presence.

False

In spite of recent economic downturns, Web site operators have shunned the idea of bartering for goods and services.

False

Redundancy in data center hardware and file storage locations is a common problem for businesses who decide to implement cloud computing.

False

Security is not a significant concern for developers of IoT applications because of the limited scope of the private data these applications handle.

False

Sensors that can monitor and report data about traffic and parking conditions via the Internet are part of a network of physical objects known as the Internet of Technology.

False

Smart card use is restricted to data associated with financial transactions.

False

The number of cycles per second that can be sent through any telecommunications medium is measured in kilobytes.

False

One or more access points positioned on a ceiling, wall, or other strategic spot in a public place to provide maximum wireless coverage for a specific area are referred to as:

Hotspots

A(n) ________ is a commercial organization with a permanent connection to the Internet that sells temporary connections to retail subscribers.

ISP

If your home air conditioner has an IP address, it is part of the ____.

Internet of Things

What happens to the data gathered by IoT sensors?

It passes over the network and is gathered and stored.

Which type of network is used to connect digital devices within a half-mile or 500-meter radius?

LAN

Which of the following is a device that acts as a connection point between computers and can filter and forward data to a specified destination?

Switch

The concept of a future web in which it is commonplace for everyday objects to be connected, controlled or monitored over the Internet is called:

The Internet of Things

Why, during the final stage of the multistage model for e-commerce, is comprehensive customer information captured in the supplier's database?

This facilitates customer service after order delivery.

A mobile advertiser can find how many people clicked on his ad and how many people bought his product or service.

True

An electronic exchange is an electronic forum where manufacturers, suppliers, and competitors buy and sell goods, trade market information, and run back-office operations.

True

Because of the danger of vendor lock-in, organizations must choose a cloud provider wisely.

True

Coaxial cable is similar to that used for cable television and consists of thickly insulated copper wire.

True

Computer networks are fundamentally different from telephone networks.

True

Consumers who have enrolled in mobile banking and downloaded their bank's mobile application to their cell phones can check their credit card balances before making major purchases.

True

Devices that belong to the IoT network contain sensors that can detect something about the device's surroundings, such as pressure, temperature, or motion.

True

Digital rights activists believe "zero-rating" practices violate net neutrality principles.

True

Fiber-optic cable is more expensive and harder to install than wire media.

True

In the utilities industry, IoT sensors are used extensively to capture operational data and help the utility provider achieve 24/7 uptime.

True

Lack of trust in online sellers is one of the most frequently cited reasons that some consumers are not willing to purchase online.

True

Mobile search makes up at more than 50% of all Internet searches.

True

Organizations that are concerned about the security of their data must investigate the cloud provider's processes and applications related to security fully before using public cloud computing.

True

The Domain Name System (DNS) converts domain names to IP addresses.

True

The emerging Internet of People is based on sensors attached to clothing and personal effects that monitor physical states and locations of individuals.

True

The three basic components of the most successful e-commerce models are content, commerce, and community.

True

VoIP technology delivers voice information in digital form using packet switching.

True

To use the analog telephone system for sending digital data, you must also use:

a modem

What is the Internet of Things?

a network of physical objects embedded with sensors, processors, software, and network connectivity capability

Emily researches private clouds while working on a proposal to move her organization to the cloud. She learns that _____.

a private cloud is often comparable in cost to or less expensive than an on-premises environment

Purple Pie Man's Bakery has entered an agreement with Amazon whereby the bakery's database system resides on Amazon's hardware and employees access it through the Internet. In this scenario, Purple Pie Man's Bakery is _____.

a tenant of Amazon

In which of the following forms of e-commerce is the seller most likely to offer a customized product offering to a potential buyer?

business-to-consumer (B2C) e-commerce

Based on a 1992 Supreme Court ruling, an Internet-based merchant needed to collect sales taxes only when _____.

buyers lived in a state where the merchant had a physical presence

Private cloud computing _____.

can rely on on-premises or virtual clouds

Suppose a business wishes to have access to servers and storage devices, but does not want to buy them. The business prefers to have their own employees install and maintain the computing platform and application software. What is their best choice?

cloud computing: infrastructure as a service

A common reason an organization chooses a private rather than a public cloud environment is _____.

concerns about data security

Authentication technologies are used by many organizations to _____.

confirm the identity of a user requesting access to information or assets

IPv6 has been developed in order to:

create more IP addresses.

Bandwidth is the:

difference between the highest and lowest frequencies that can be accommodated on a single channel.

Bluetooth can be used to link up to ________ devices within a 10-meter area using low-power, radio-based communication.

eight

Which type of cloud computing environment is most suitable for an organization that wants to run applications with stringent compliance requirements on-premises while running applications with fluctuating capacity needs on a service provider's cloud?

hybrid

Which benefit of public cloud computing results when service providers operate multiple data centers distributed geographically and save multiple copies of data on different machines?

increased redundancy

James is considering joining an electronic exchange so that his business can purchase needed supplies easily and possibly at better prices. James would prefer to join an exchange that is open to anyone in his firm's market space. Which type of electronic exchange is James considering?

independent

A VPN:

is an encrypted private network configured within a public network.

Wholesale e-commerce applications often focus on improving a plant manager's efficiency in researching prices and availability from suppliers for _____.

manufacturing, repair, and operations goods and services

Digital subscriber lines:

operate over existing telephone lines to carry voice, data, and video.

Using a customer's name in an email campaign or a greeting that appears when they visit a Web page is considered the most basic form of _____.

personalization

Thomas asks his firm's Web site developers to try to make the site intuitive from their customers' point of view, and to incorporate a chat feature that allows customer service to follow the customer and provide assistance with a purchase. Thomas wants their organization to become the customers' _____.

preferred supplier

Compared to traditional commerce transactions, e-commerce transactions _____.

reduce the costs of sales

The number of mobile Web sites worldwide has grown rapidly, in part because of _____.

the development of new and useful applications

Francis purchases a new tablet device through an e-commerce Web site. In this scenario, the last stage of the multistage model for e-commerce takes place when _____.

the merchant's technical support team helps Francis configure his device

What must Web site operators constantly monitor to provide a good experience to their Internet shoppers?

traffic and response times experienced by visitors


Ensembles d'études connexes

Statistical Studies: Misleading Graphs (Practice) ~amdm

View Set

Art Appreciation Chapter 5 Part 1 Vocab

View Set

Muscles of the arm: Origin, Insertion, and Action

View Set

Logistics Final ope, logistics 3380 midterm eep

View Set

Ch 3 Foundation EAQ Documentation

View Set

Belmont Report and Its Principles

View Set

Neurology 400 - Special Senses: Smell

View Set