Mix of possible MIS Final Questions

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Loyalty Card

A _____ is a marketing effort by a firm that is targeted at extracting information about an individual customer that might help the firm keep the customer faithful and satisfied.

Row

A horizontal set of data or components. In a graph, it is called the "x-axis." Contrast with column

Zero Day Exploits

A type of advanced cyber attack, finds a backdoor into a program and exploits it and steals small amounts of information that the company wouldnt know what even hit them

Circuit-switched networks are more efficient than packet-switched networks because of the nature of the dedicated connection they provide.

False

Conventional reports look more like a spreadsheet, with the various dimensions of analysis in rows and columns, with summary values at the intersection.

False

Cyber criminals who infiltrate systems and collect data for illegal resale are called cash-out fraudsters.

False

Data miners should realize that first findings of analytics always reveal an optimal course of action.

False

During our in-class discussion on Business Intelligence (Unit 5), we identified Microsoft Excel as a database program.

False

EDI is easier to code and more robust than XML because it can be extended.

False

Enriching click fraud refers to the practice in which site operators generate false page views in order to boost their site's CPM earnings.

False

Google's interest-based ads have been accused of profiling users on the basis of race, religion, sexual orientation, health, political, or trade union affiliation, and certain financial categories.

False

Huddle in Google+ helps users manage sharing contacts.

False

In public-key encryption systems, the functions of the public and private keys are interchangeable.

False

In the URL, the host name is the name of the network a user tries to connect to.

False

Linux is one of the most used operating systems in desktop computers, but can be found only in a tiny fraction of mobile phones, and consumer electronics.

False

One of the drawbacks of open source software is that it cannot be easily migrated to more powerful computers as circumstances dictate.

False

Running ads on a Web site is a guaranteed path to profits.

False

SaaS offerings usually work well when the bulk of computing happens at the client end of a distributed system.

False

Text ads appearing on Google search pages are billed on a cost-per-thousand impressions (CPM) basis.

False

The care and feeding of information systems is usually simple and inexpensive.

False

The periood between distributing cash and collecting funds associated with a given operation (a.k.a. the Cash Coversion Cycle) may never be negative.

False

Turning data into useable information is hindered by transactional databases that are set up to be simultaneously accessed for reporting and analysis.

False

When using a public wireless network, using VPN software is not advisable as it can reveal your communications to any network eavesdroppers.

False

Which of the following questions relate to data quantity? a. What data is needed to compete on analytics and to meet our current and future goals? b. How should the firm handle security and access? c. Can we even get the data we'll need? d. How much data is needed? e. Where will the systems be housed?

How much data is needed?

Peering usually takes place at neutral sites called _____. a. STPs b. ISPs c. IPs d. https e. IXPs

IXPs

Each time an ad is served to a user for viewing is referred to as a(n) [I].

Impression

Field

In a database, _____ represent each category of data contained in a record

Which of the following is a valid statement on information security? a. Technology lapses are solely responsible for almost all security breaches. b. A reactive, rather than proactive, approach is better suited for dealing with security breaches. c. Security breaches cannot be prevented despite the adoption of the best security policies. d. Information security is everybody's responsibility. e. Greater expenditure on security products is the only way to contain security breaches

Information security is everybody's responsibility.

Which of the following statements is true of the term "FTTH"? a. It refers to high-speed data lines provided by many firms all across the world that interconnect and collectively form the core of the Internet. b. It refers to a situation when separate ISPs link their networks to swap traffic on the Internet. c. It refers to broadband service provided via light-transmitting fiber-optic cables. d. It refers to a system that connects end users to the Internet. e. It refers to the language used to compose Web pages

It refers to broadband service provided via light-transmitting fiber-optic cables.

Which of the following is true of software as a service (SaaS)? a. SaaS vendors are less attuned to customer needs. b. Saas firms face diseconomies of scale. c. It refers to software that is made available by a third-party online. d. Firms spend more using SaaS. e. There are no accounting and corporate finance implications for SaaS.

It refers to software that is made available by a third-party online.

Linux (Created by)

Linus Torvalds created

[L] is the dominant Open Source Software (OSS) Operating System (it was used in a Demo in class).

Linux

Business Intelligence Systems

Systems that use data created by other systems to provide reporting and analysis for organizational decision making are called _____

The most significant enabler of Business Intelligence is: A. Data B. People C. Education D. Technology E. Culture

Technology

The current wave of computing is characterized by which of the following: A. PCs Break Onto The Scene, Affordable For Everyone B. Large, Room Sized Computers C. Ubiquitous (Everywhere And In Everything) D. Minicomputers, Fridge-sized E. The Internet, Everyone Is Connected

Ubiquitous (Everywhere And In Everything)

Advantage of using OSS

You can modify and share code

Point-of-sale systems

_____ are critical for capturing sales data, and are usually linked to inventory systems to subtract out any sold items.

Contract manufacturing

_____ involves outsourcing production to third-party firms.

Enterprise Resource Planning

_____ refers to a software package that integrates the many functions of a business, such as accounting, finance, inventory management, and human resources.

Network Effects

a phenomenon whereby a product or service gains additional value as more people use it.

data warehouse

a set of databases designed to support decision making in an organization. It is structured for fast online queries and exploration.

In database terminology, a record represents: a. a single instance of whatever the table keeps track of. b. each category of data contained in a row. c. a list of data, arranged in columns and rows. d. one or more keys that relate separate tables in a database. e. a field or combination of fields used to uniquely identify a file.

a single instance of whatever the table keeps track of.

Record

a single instance of whatever the table keeps track of.

_____ allows users to pay for goods, store gift cards, and redeem coupons using their mobile phones. a. Google Wallet b. Google+ c. Takeout d. Android e. Google Currents

a.Google Wallet

"Cookies cannot reliably identify individual user." Which of the following is the reason for the statement shown above? a. Individual users use different browsers on the same computer to surf the Web. b. Individuals use different log-in accounts on the same computer to browse the Internet. c. Internet service providers assign arbitrary IP addresses to devices accessing the Internet from the same network. d. Cookies assigned by Web servers are prone to duplication. e. The explosion in Internet-enabled mobile devices has resulted in an acute shortage of IP addresses.

a.Individual users use different browsers on the same computer to surf the Web.

Nearly 30 percent of Google's revenues come from running ads on: a. third-party Web sites. b. competing search engines. c. the Android platform. d. built-in toolbars. e. its organic search pages.

a.third-party Web sites.

ad hoc reporting tools

allow users to dive in and create their own reports, selecting fields, ranges, and other parameters to build their own reports on the fly.

Scalability

allows a firm to scale from start-up to blue chip without having to significantly rewrite their code, potentially saving big on software development costs.

RFID tags

are small chip-based tags that wirelessly emit a unique identifying code for the item that they are attached to.

Mark, a retailer, is unable to sell his products. He doesn't have sufficient cash to meet his on-going expenses. In this scenario, Mark is facing a(n) _____. a. high inventory turnover problem b. environmental problem c. sugging problem d. stock-out problem e. liquidity problem

liquidity problem

Dashboards

provide a sort of heads-up display of critical indicators, letting managers get a graphical glance at key performance metrics.

Canned Reports

provide regular summaries of information in a predetermined format. They're often developed by information systems staff and formats can be difficult to alter.

1 petabyte = 1 _____ bytes a. trillion b. million c. billion d. sextillion e. quadrillion

quadrillion

Customer Lifetime Value

represents the present value of the likely future income stream generated by an individual purchaser.

Moore's Law has been in effect since the _____ wave of computing. a. first b. fourth c. second d. third e. fifth

second

Vendors frequently sign _____ with their customers to ensure a guaranteed uptime and define their ability to meet demand spikes. a. infrastructure provider contracts b. host vendor terms c. open source contracts d. requests for information e. service level agreements

service level agreements

Application Software

software focuses on the work of a user or an organization.

One of the factors that complicates the elimination of legacy systems is the: a. low market value for outdated hardware and software. b. unavailability of suitable data porting methods to offset data redundancy. c. frequency at which technology improves as per Moore's law. d. absence of regulatory mechanisms to handle the efficient disposal of legacy systems. e. costs associated with breaking extended vendor or outsourcer agreements.

costs associated with breaking extended vendor or outsourcer agreements.

Software as a Service (SaaS)

software licensing and delivery model in which software is licensed on a subscription basis and is centrally hosted. typically accessed by users using a thin client via a web browser.

Zara is susceptible to any disruption in northern Spain because:

it moves all of its deliveries through just two locations, both in Spain.

Open Source Software

something people can modify and share because its design is publicly accessible.

Supply Chain Management

systems that can help a firm manage aspects of its value chain, from the flow of raw materials into the firm through delivery of finished products and services at the point-of-consumption

Total Cost of Ownership (TCO)

systems that can include software development and documentation, or the purchase price and ongoing license and support fees, plus configuration, testing, deployment, maintenance, support, training, compliance auditing, security, backup, and provisions for disaster recovery.

Customer Relationship Management

systems used to support customer-related sales and marketing activities

An organization's partner firms that should be regularly audited to ensure that they are compliant with security frameworks include: a. clients. b. technology providers and contract firms. c. international standards organizations. d. law-enforcement agencies. e. government regulatory bodies.

technology providers and contract firms.

black hat hackers

the bad guys. Some call them "crackers." There's even a well-known series of hacker conventions known as the Black Hat conference.

white hat hackers

the good guys who probe for weaknesses, but don't exploit them.

Knowledge is defined as: a. the process of breaking a complex topic into smaller parts. b. the insight derived from experience and expertise. c. the data presented in a context so that it can answer a question or support decision making. d. raw facts and figures. e. a listing of primary data.

the insight derived from experience and expertise.

Inventory turns is: a. the number of times an inventory item moves within a warehouse. b. high when the rate of selling merchandise is low. c. also known as gross-profit margin turnover. d. the stock of inventory returned to a manufacturer due to poor quality. e. the number of times inventory is sold or used during a specific period.

the number of times inventory is sold or used during a specific period.

Cloud Computing

the practice of using a network of remote servers hosted on the Internet to store, manage, and process data, rather than a local server or a personal computer.

Data mining

the process of using computers to identify hidden patterns and to build models from large data sets.

Contract manufacturers are widely criticized because:

they often employ child labor.

All of the costs associated with the design, development, testing, implementation, documentation, training and maintenance of a software system are collectively termed as: a. total cost of ownership. b. economic value added. c. return on investment. d. cost to company. e. economies of scale.

total cost of ownership.

The address one types into a Web browser is also known as a: a. unique resource locator. b. universal redirection link. c. uniform resource locator. d. universal redirection locator. e. uniform resource link.

uniform resource locator.

vertical integration

when a single firm owns several layers in its value chain.

Data Cube

which take data from standard relational databases, calculating and summarizing data for superfast reporting access. OLAP tools can present results through multidimensional graphs, or via spreadsheet-style cross-tab reports.

vertically integrated

.As the world's largest chain of coffee houses, Starbucks sources most of its raw materials such as coffee beans and vegetables from suppliers owned by it. It also holds equal or majority stakes in most of the foreign direct investment it carries out in other countries to set up franchisee coffee shops. Based on this information, Starbucks can be said to be

Types of Cyber Criminals

Account theft and illegal funds transfer, Stealing personal or financial data,Compromising computing assets for use in other crimes,Extortion,Espionage,Cyberwarfare,Terrorism,Pranksters, Protest hacking (hacktivism), Revenge (disgruntled employees)

_____ is a term used to describe unpredictable, but highly impactful events. a. Flash outs b. Black swans c. Straddling d. Viral trojans e. Power plays

Black swans

As identified by the Group 2 Emerging Technology Presentation, BCI stand for [B] [C] [I]?

Brain Computer Interface

From a IT Managerial perspective, the cost of data storage should be measured in: A. Dollars B. Transmission Speed C. Web D. Bits E. Bytes

Bytes

The Brain of a computer is also known as the [C] [P] [U]. What do the letters CPU stand for?

Central Processing Unit

_____ act as storage places where a firm's servers get super-fast connections as close to the action as possible. a. Internet exchange points b. Incubation facilities c. Dispatch facilities d. Colocation facilities e. Preening facilities

Colocation facilities

Key Inc., an American guitar maker, recently lost an action to recover the domain name piano-key.com, claiming that the defendant infringed on its registered trademark. What did Key Inc. specifically accuse the defendant of? a. Computer trespassing b. Domain hoarding c. Sugging d. Cybersquatting e. Internet stalking

Cybersquatting

Which of the following is often considered a defensible source of competitive advantage? a. Market capital b. Technology c. Data d. Profits e. Infrastructure

Data

information

Data becomes _____ when it is presented in a context so that it can answer a question or support decision making.

Data may NOT be a defensible source of competitive advantage (a true strategic asset) if it is... A. Lacking Substitutes B. Imperfectly Imitable C. Valuable D. Rare E. Disruptive

Disruptive

Ways to steal information

Extortion, espionage

What protocol do most Web developers use to upload the Web pages, graphics, and other files for their Web sites? a. SNMP b. SMTP c. FTP d. TCP e. HTTP

FTP

A black hat hacker looks for weaknesses in security mechanisms, with a view to help plug the holes that might be exploited by cyber-criminals.

False

A study by Gartner Research claims that the amount of data on corporate hard drives doubles every eighteen months.

False

[O] search refers to the search engine results that are returned and ranked according to relevance.

Organic Search

[P] is the algorithm developed by Google cofounder Larry Page to rank Web sites.

PageRank

High-end fashion house Prada's experiment of implementing the latest technology in its flagship store failed because

Prada assumed information systems are made up of only hardware and software.

[P] is the primary issue in how companies entice customers to provide them with data.

Privacy

From the Group 3 Emerging Technology Presentation on Solar Roadways, which of the following was NOT identified as a benefit? A. Heated B. No Potholes C. Sustaining Technology D. Durable E. Lights Up

Sustaining Technology

Which of the following is an example of volatile memory? a. Nanodrive b. Read-only memory c. Optical disk drive d. Flash memory e. Random-access memory

Random-access memory

Which of the following models is used for most databases? A. Access B. Relational C. Hierarchical D. Network E. Spreadsheet

Relational

Which of the following is a way to recognize potentially disruptive innovations? a. Pay attention to slow-expensive advancements in technology. b. Become more consumer-focused. c. Remove shortsightedness regarding the future. d. Indulge in bottom-line obsession. e. Increase conversation within same product groups.

Remove shortsightedness regarding the future.

As identified by the Group 2 Emerging Technology Presentation, which of the following are BCI methods: Semi-Invasive Method Non-Invasive Method Invasive Method

Semi-Invasive Method Non-Invasive Method Invasive Method

_____ provide the infrastructure backbone to SaaS and hardware cloud efforts, as well as many large-scale Internet services. a. Neural networks b. Data warehouses c. Private clouds d. Server farms e. Content delivery networks

Server farms

As identified by the Group 1 Emerging Technology Presentation on RFID, one of the current, potential dangers or problems of RFID is: A. Too complicated B. Limited use in retail business C. Cancer from radio waves D. Skimming information E. Too much data on the tags

Skimming information

Data

The term _____ is used to refer to raw facts and figures.

A device gets its IP address from whichever organization is currently connecting it to the Internet.

True

DSL technology is expensive for service providers in the United States because of the sparsely populated cities.

True

Desktop applications are typically designed for a single user.

True

Firms that base decisions on hunches are said to be gambling, not managing.

True

Google allows users to install a cookie that enables them to opt out of interest-based tracking.

True

Google uses the kind of Intel or AMD processors, low-end hard drives, and RAM chips that one would find in a desktop PC.

True

If several people use the same browser on the same computer without logging on to that machine as separate users, then all of their Web surfing activity may be mixed into the same cookie profile.

True

In-game advertising makes more sense in racing or other sports games than it does for games set in the past, future, or on other worlds.

True

It is feared that innovation might suffer as a result of the transition of Internet services from flat-rate pricing to metered usage.

True

Online advertising represents the only advertising category trending with positive growth.

True

Random occurrences in data mining results can be detected by dividing the data and building a model with one portion and using another portion to verify the results.

True

Regularly updated software lowers a system's vulnerable attack surface.

True

Spear phishing attacks specifically target a given organization or group of users.

True

The Internet has no center and no one owns it.

True

The User Datagram Protocol (UDP) acts as a substitute to TCP when there is a need for speed of communication and quality can be sacrificed.

True

The typical Web user has 6.5 passwords, each of which is used at four sites, on average.

True

The basis of CAPTCHA is the: The Internet Turing test Amdahl's Law Bandwidth Moore's Law

Turing test

Why Do tech Projects Fail

Unrealistic or unclear project goals, Poor project leadership and weak executive commitment , Inaccurate estimates of needed resources, Badly defined system requirements and allowing "feature creep" during development, Poor reporting of the project's status, Poor communication among customers, developers, and users , Use of immature technology, Unmanaged risks , Inability to handle the project's complexity, Sloppy development and testing practices, Poor project management, Stakeholder politics, Commercial pressures (e.g., leaving inadequate time or encouraging, corner-cutting) are all examples why.....

Over Engineering

When you start to assume things based of traits until you gain the knowledge to prove it or debunkit

It Project Outsourcing

Whether or not you want to do things your self or have other do it for you.

Which of the following statements holds true for the term cache? a. It refers to software that traverses available Web links in an attempt to perform a given task. b. It refers to a temporary storage space used to speed computing tasks. c. It refers to Internet content that can't be indexed by Google and other search engines. d. It refers to the Internet directory service that allows devices and services to be named and discoverable. e. It refers to the process of improving a page's organic search results.

b.It refers to a temporary storage space used to speed computing tasks.

Which of the following statements holds true for the term spider? a. It refers to a temporary storage space used to speed computing tasks. b. It refers to software that traverses available Web links in an attempt to perform a given task. c. It refers to the Internet directory service that allows devices and services to be named and discoverable. d. It refers to Internet content that can't be indexed by Google and other search engines. e. It refers to the process of improving a page's organic search results.

b.It refers to software that traverses available Web links in an attempt to perform a given task.

Which of the following statements holds true for search engine optimization (SEO)? a. It refers to a temporary storage space used to speed computing tasks. b. It refers to the process of improving a page's organic search results. c. It refers to the Internet directory service that allows devices and services to be named and discoverable. d. It refers to Internet content that can't be indexed by Google and other search engines. e. It refers to software that traverses available Web links in an attempt to perform a given task.

b.It refers to the process of improving a page's organic search results.

Of the various social products associated with a user's profile on Google+, _____ offers group texting. a. Stream b. Messenger c. Sparks d. Hangouts e. Circle

b.Messenger

Which of the following is Google's biggest acquisition to date? a. DoubleClick b. Motorola Mobility c. Zagat d. Android e. YouTube

b.Motorola Mobility

_____ are served by ad networks or other customer profiling firms to identify users and record behavior across multiple Web sites. a. Plug-ins b. Third-party cookies c. Honeypots d. Interstitials e. Creatives

b.Third-party cookies

Technologies that measure and analyze human body characteristics for identification or authentication are known as _____. a. overlamination processes b. bio-embedded systems c. holographs d. biometrics e. smart tags

biometrics

Compiling

convert into a machine-code or lower-level form in which the program can be executed.

Which of the following formulas is used by Google to determine the rank order of sponsored links appearing on its search results pages? a. Ad rank = Minimum CPC × Click-through rate b. Ad rank = Churn rate × Average cost-per-click c. Ad rank = Maximum CTR × Number of impressions d. Ad rank = Maximum CPC × Quality score e. Ad rank = Cost-per-thousand impressions × Number of impressions

d.Ad rank = Maximum CPC × Quality score

Which of the following statements holds true for the term dark Web? a. It refers to a temporary storage space used to speed computing tasks. b. It refers to the Internet directory service that allows devices and services to be named and discoverable. c. It refers to the process of improving a page's organic search results. d. It refers to Internet content that can't be indexed by Google and other search engines. e. It refers to software that traverses available Web links in an attempt to perform a given task.

d.It refers to Internet content that can't be indexed by Google and other search engines.

Which of the following statements holds true for the term cost-per-click? a. It refers to the ad rates quoted in cost-per-thousand impressions. b. It refers to the number of users who clicked an ad divided by the number of times the ad was delivered. c. It refers to the cost an advertiser is willing to bear for a particular amount of time a surfer spends on an ad. d. It refers to the maximum amount of money an advertiser is willing to pay for each click on their ad. e. It refers to the number of customers joining a particular social networking Web site.

d.It refers to the maximum amount of money an advertiser is willing to pay for each click on their ad.

Which of the following is an example of an anomalous pattern typical of online advertising frauds? a. Clicks that fit standard surfing patterns for geography b. A low number of clicks originating from a certain country c. Clicks that fit the standard surfing patterns for time d. Too many visits to a new, obscure site e. Uniform click-through rates across comparable sites

d.Too many visits to a new, obscure site

A(n) _____ refers to a heads-up display of critical indicators that allow managers to get a graphical glance at key performance metrics. a. embassy b. dashboard c. prediction interface d. interstitial e. canned report

dashboard

Cyber criminals who infiltrate systems and collect data for illegal resale are called _____. a. information hoarders b. ethical hackers c. data harvesters d. corporate spies e. cash-out fraudsters

data harvesters

cybercrook

deliberately hops through several systems to make his path difficult to follow, slowing cross-border legal pursuit or even thwarting prosecution if launched from nations without extradition agreements.

Operating Systems

designed to create a platform so that programmers can write additional applications, allowing the computer to do even more useful things.

Based on the author's take on e-waste management, a manager would do well to learn that: a. dealing with e-waste at home can be ten times cheaper than sending it abroad. b. it is simple enough for firms to monitor and track e-waste management through international agencies such as Fair Factories Clearinghouse. c. disposal and recycling partners must be audited with the same vigor as suppliers and other partners. d. environmentalists target only the big firms as they can afford to compensate for any environmental damage wrought by their practices. e. appointing environmentalists like Al Gore to the firm's board of directors helps avoid legal action and brand tarnishing due to bad e-waste management practices.

disposal and recycling partners must be audited with the same vigor as suppliers and other partners.

Which of the following metrics is used by Google to develop a precise ad ranking formula that rewards top-performing ads? a. Number of keywords that trigger an ad b. Ratio of graphical content to text content in the ad c. The minimum cost-per-click an advertiser is willing to pay d. Relevance of keywords to Web site content e. An advertisement's quality score

e.An advertisement's quality score

Which of the following statements holds true for the term server farm? a. It refers to a closed network or single set of services controlled by one dominant firm. b. It refers to a group of surreptitiously infiltrated computers linked and controlled remotely. c. It refers to a network of users with distinct IP addresses, engaged in click fraud. d. It refers to a tracking cookie used to identify users and record behavior across multiple Web sites. e. It refers to a massive network of computer servers running software to coordinate their collective use.

e.It refers to a massive network of computer servers running software to coordinate their collective use.

Which of the following statements holds true for the term plug-in? a. It refers to the generation of bogus clicks, either for financial gain or to attack rivals by draining their online ad budget. b. It refers to a program (typically a marketing effort) that requires customer consent. c. It refers to recruiting a network of users with the goal of spreading IP addresses across several systems. d. It refers to a program that enrolls all customers by default, but that allows consumers to discontinue participation if they want to. e. It refers to a small computer program that extends the feature set or capabilities of another application.

e.It refers to a small computer program that extends the feature set or capabilities of another application.

Which of the following statements holds true for the term click farm? a. It refers to the generation of bogus clicks, either for financial gain or to attack rivals by draining their online ad budget. b. It refers to a program that requires customer consent. c. It refers to a small computer program that extends the feature set or capabilities of another application. d. It refers to a program that enrolls all customers by default, but that allows consumers to discontinue participation if they want to. e. It refers to recruiting a network of users with the goal of spreading IP addresses across several systems and making a fraud effort more difficult to detect.

e.It refers to recruiting a network of users with the goal of spreading IP addresses across several systems and making a fraud effort more difficult to detect.

Which of the following is true about market maturity? a. Finding new growth markets that are as lucrative as matured markets becomes easier for leaders. b. Small fluctuations in annual revenues create huge movements in the stock prices of firms. c. Mature markets are gradually discarded by all firms in the industry. d. Prices tend to increase due to the mass exit of competing firms from the market. e. Without substantial year-on-year growth, stock prices of firms do not move.

e.Without substantial year-on-year growth, stock prices of firms do not move.

Google mounts racks of servers inside standard-sized shipping containers, each with as many as 1,160 servers per box. Google assumes individual components will regularly fail, but no single failure should interrupt the firm's operations. By doing so, Google can ensure its network is: a. data optimized. b. service-regulated. c. organically searched. d. traffic efficient. e. fault-tolerant.

e.fault-tolerant.

If a firm's pages are not near the top of query results, customers may never discover its Web site. This has led to _____ becoming a critical function for many marketing organizations. a. last mile access b. content adjacency c. load balancing d. geotargeting e. search engine optimization

e.search engine optimization

Black Swans

high-impact events

The PDAs used by Zara staff are linked to the store's point-of-sale system which shows:

how garments rank by sales

Debugging

identify and remove errors from computer software or hardware

Benefits enjoyed by SaaSvendors

improved system customization options and integration with standard software packages. And at times a lack of complexity can be a blessing—fewer choices can mean less training, faster start-up time, and lower costs associated with system use. But firms with unique needs may find SaaS restrictive.

Data mart

is a database focused on addressing the concerns of a specific problem

The domain name service (DNS) is a distributed database that allows users to communicate with other computers by: a. mapping host names to domain names. b. assigning domain names to different IP addresses. c. creating IP addresses that are unique to servers. d. mapping host and domain names to IP addresses of computers. e. assigning IP addresses to different domain names.

mapping host and domain names to IP addresses of computers.

A domain name service is a collection of software that: a. directs the flow of traffic across the Internet. b. allots domain names to different Web sites. c. assigns IP addresses to different systems. d. maintains a registry of different IP addresses. e. maps an Internet address to an IP address.

maps an Internet address to an IP address.

Spyware is defined as a type of software that: a. monitors user actions or scans for files surreptitiously. b. infects other software and decreases the network speeds. c. scans for loopholes in other software and releases malware payloads. d. clogs up network traffic and disables networks. e. serves up unwanted advertisements after being installed without user knowledge.

monitors user actions or scans for files surreptitiously.

Relational DB

multiple tables are related based on common keys

Legacy systems

outdated information systems that were not designed to share data, aren't compatible with newer technologies, and aren't aligned with the firm's current business needs.

Types of Malicious Code

phishing, botnets, trojan horses, spyware adware, worms, rootkit, scare ware, are all examples of..

Attacks that are so new that they have not been clearly identified, and so have not made it into security screening systems are called _____. a. brute force attacks b. zero-day exploits c. non-precedent breaches d. novel attacks e. first mover attacks

zero-day exploits


Ensembles d'études connexes

Completing the Application, Underwriting and Delivering the Policy

View Set

Algebra 2 Unit 9 - Lesson 1 - Mean, Variance, and Standard Deviation

View Set