Quizzes for Exam 2

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which of the following is not an example of larger, conventional firms working with sharing economy startups? A. Apple's purchase of Beats to give new musical artists more exposure. B. Condé Nast's investment in Rent the Runway. C. Google's investment in Uber. D. Walgreens' partnership with TaskRabbit. E. W Hotel partnering with Desks Near Me.

A. Apple's purchase of Beats to give new musical artists more exposure.

If a computer system can be equated to a layered cake, which of the following combinations represents the computer system in the bottom-to-top order? A. Hardware, operating system, application, user B. User, application, hardware, operating system C. User, operating system, hardware, application D. Application, operating system, hardware, user E. Operating system, hardware, user, application

A. Hardware, operating system, application, user

Which of the following is an example of application software? A. MS Word B. iOS C. Linux D. MS Windows E. Android

A. MS Word

Which of the following is true of the difference between operating systems and application software? A. Operating systems control the hardware, while application software performs the work that users and firms are directly interested in accomplishing. B. Operating systems support tasks performed by a single user, while application software support tasks performed by multiple users. C. Operating systems control the hardware elements visible to the human eye, while application software controls the hardware elements invisible to the human eye. D. Operating systems are software packages that integrate the many functions of a business, while application software works with a minimal degree of overlap. E. Operating systems are software packages offered by a third party, while application software contains programs that are designed in-house.

A. Operating systems control the hardware, while application software performs the work that users and firms are directly interested in accomplishing.

Which of the following refers to a variant of utility computing where vendors provide the operating system and supporting software like database management systems but where client firms write their own code? A. Platform as a service B. Host service vendor C. Software as a service D. Application service provider E. Infrastructure as a service

A. Platform as a service

Some of the most common guidelines issued by Web sites when designing a secure password include: A. The password should be at least eight characters long and include at least one number and other nonalphabet character. B. The password should be short and straightforward. C. The password should include names of family members or pets, so as to be easily remembered. D. Choose a hard-to-guess password, then re-use this hardened password across websites. This minimize instances of calling systems professionals for a password reset, hence eliminating an additional potential vulnerability. E. The password should be the same as your name so as to trick the hacker.

A. The password should be at least eight characters long and include at least one number and other nonalphabet character.

_____ allow(s) a server to run what amounts to a copy of a PC—OS, applications, and all—and simply deliver an image of what's executing to the remote device. A. Virtual desktops B. Cloudbursting C. Hardware clouds D. Vertical niches E. Black swans

A. Virtual desktops

The hypertext transfer protocol (http) defines the communication between: A. Web browsers and Web servers. B. operating systems and Web browsers. C. hardware and operating systems. D. mail servers and hardware. E. hardware and Web browsers.

A. Web browsers and Web servers.

One of the risks associated with SaaS is the: A. dependence on a single vendor. B. inability to migrate to new versions of software. C. reduced reliance on a network connection. D. costs associated with storing large amounts of data in-house. E. user interface of Web-based software being more sophisticated than desktop alternatives.

A. dependence on a single vendor.

In security circles the phrase "compliance" refers to: A. legal or professionally binding steps that an organization must take. B. security audit practices used by the tech divisions of Big Four accounting firms. C. a firm's installing software to fulfill government surveillance requirements. D. the U.S. government legislation requiring organizations to share security breaches with law enforcement and industry trade organizations. E. only deploying open source software that is downloaded from approved GitHub locations.

A. legal or professionally binding steps that an organization must take.

Data mining is leveraged by some firms to determine which products customers buy together, and how an organization can use this information to cross-sell more products or services. This area of application of data mining is referred to as: A. market basket analysis. B. expert systems. C. customer churn. D. customer segmentation. E. vertical integration.

A. market basket analysis.

Cloud computing refers to: A. replacing computing resources with services provided over the Internet. B. a technology that can make a single computer behave like many separate computers. C. designing computers with many microprocessors that work together, simultaneously, to solve problems. D. designing microprocessors with two or more calculating processor cores on the same piece of silicon. E. manufacturing semiconductors as a stack of multiple, interconnected layers instead of in one flat plane.

A. replacing computing resources with services provided over the Internet.

Which of the following parameters significantly influences the rank of a Web page in Google's search results? A. the number of other pages linking to a given page B. the maximum bid for click-through rates C. the quantity of content on a Web Page D. the number of keyword matches in the content E. the quality of content on a Web page

A. the number of other pages linking to a given page

_____ perform the work that users and firms are directly interested in accomplishing and can be thought of as places where a user's real work is done. A. Emulators B. Applications C. Platforms D. Embedded systems E. Operating systems

B. Applications

_____ is a class of computer software that seeks to reproduce or mimic human thought, decision making, or brain functions. A. Biometrics B. Artificial intelligence C. Android D. Legacy software E. Intrane

B. Artificial intelligence

A research scientist with a major pharmaceutical firm in New Jersey is caught passing on sensitive information, worth millions of dollars, regarding the composition and test results of his firm's latest drug to a rival company. What crime is he being held responsible for? A. Cyber-fraud B. Corporate espionage C. Carrying out technology disruptions D. Extortion E. Illegal funds transfer

B. Corporate espionage

Which of the following statements holds true for the term spoof? A. It refers to a con executed using technology, typically targeted at acquiring sensitive information or tricking someone into installing malicious software. B. It refers to e-mail transmissions and packets that have been altered to seem as if they came from another source. C. It refers to scrambling data using a code or formula, known as a cipher, such that it is hidden from those who do not have the unlocking key. D. It refers to a seemingly tempting, but bogus target meant to draw hacking attempts. E. It refers to highly restrictive programs that permit communication only with approved entities and/or in an approved manner.

B. It refers to e-mail transmissions and packets that have been altered to seem as if they came from another source

Which of the following is not true regarding the competitive dynamics of most sharing economy marketplaces? A. Ratings represent a switching cost built over time by early participants in sharing economy marketplaces. B. Late-movers have a substantial advantage in this market since inventory should be cheaper to acquire for those firms that have entered markets more recently. C. Network effects should grow over time, favoring firms that got a successful, early start over rivals who arrived late doing the same thing. D. These are two-sided markets. E. None of the above - all statements are true.

B. Late-movers have a substantial advantage in this market since inventory should be cheaper to acquire for those firms that have entered markets more recently.

Which of the following sets of software represents the constituents of the LAMP stack? A. LimeWire, Acrobat Reader, Mozilla, Python B. Linux, Apache, MySQL, Perl C. Lingo, Afnix, Moby, PPL D. Linux, Android, Mac OS X, PHP E. LimeWire, AppleScript, MATLAB, Photoshop

B. Linux, Apache, MySQL, Perl

___________ occurs by repeatedly searching keywords linked to rival ads with the goal of reducing the rival's click through rate. A. Spamdexing B. Rank-based impression fraud C. Keyword stuffing D. Depleting impression fraud E. Disbarring fraud

B. Rank-based impression fraud

Which of the statements about Google's strategy and competitive environment is true: A. Brin and Page founded Google in their 20s, following Yang and Filo of Yahoo (also in their 20s), underscoring just how easy it is for new comers to create new threats in today's search market. B. The scale of server farms capable of indexing today's Web represents a significant barrier to entry. C. Google has invested in proprietary components such as chips and hard drives, creating a difficult- to-copy barrier to entry to any firm seeking to enter its markets D. Bing has been gaining significant market share on Google due to Microsoft's successful leverage of existing products (Xbox, Windows Phone, Office, and the Windows operating system) as a default distribution channel for its search. E. All of the above

B. The scale of server farms capable of indexing today's Web represents a significant barrier to entry.

Computer-driven investment models can be very effective when the market behaves as it has in the past. However, in terms of historical consistency, they are vulnerable to failure in the face of: A. brute force attacks. B. black swans. C. zero-day exploits. D. calendar rivalry metrics. E. distributed denial of service.

B. black swans.

Data becomes _____ when it is presented in a context so that it can answer a question or support decision making. A. knowledge B. information C. a database D. wisdom E. a relational language

B. information

Computer hardware refers to: A. a precise set of instructions that orchestrate the functioning of the computer. B. the physical components of information technology. C. the mechanism through which users interact with a computer. D. a program that fulfills the requests of a client. E. handheld computing devices meant largely for mobile use outside an office setting.

B. the physical components of information technology.

Most graphical display ads are billed on a ______ basis. A. CPTI B. PPC C. CPM D. CPC E. CTR

C. CPM

Entrepreneurs are scrappy in their quest to gather market intelligence and understand how customers respond to their offerings. How did Airbnb's CEO gather additional intelligence on how the firm was being used? A. He bought several apartments to rent out under Airbnb B. He became an Uber driver C. He lived out of Airbnb rentals full-time D. He became a bell hop at a San Francisco Hilton Hotel E. All of the above

C. He lived out of Airbnb rentals full-time

Which of the following statements holds true for the term "html"? A. It refers to high-speed data lines provided by many firms all across the world that interconnect and collectively form the core of the Internet. B. It refers to the broadband service provided via light-transmitting fiber-optic cables. C. It refers to the language used to create and format Web pages. D. It refers to a situation when separate ISPs link their networks to swap traffic on the Internet. E. It refers to a system that connects end users to the Internet.

C. It refers to the language used to create and format Web pages.

Which of the following is one of the benefits enjoyed by SaaS vendors? A. Development across multiple platforms B. Limits accessibility to resources by just about anybody C. Lower distribution costs D. Lower hardware maintenance costs E. Faster product deployment

C. Lower distribution costs

_____ are software systems designed to support interoperable machine-to-machine interaction over a network. A. Scripting languages B. Client-servers C. Web services D. Caches E. Business intelligence systems

C. Web services

What is the difference between collaborative consumption firms Zilok and Chegg? A. Zilok has gone public, Chegg hasn't. B. Zilok is a service where a person comes to your home to complete a task, Chegg is a rental firm. C. Zilok provides inventory provided by participating citizen suppliers', Chegg owns its own inventory. D. Zilok is the European equivalent of Chegg. E. Zilok was purchased by Chegg underscoring the winner take all' dynamics of these markets.

C. Zilok provides inventory provided by participating citizen suppliers', Chegg owns its own inventory.

Cookies refer to: A. small computer programs that extend the features or capabilities of another application B. the design and content components of an advertisement C. a line of identifying text, assigned and retrieved by a given Web server and stored by a user's browser D. terms that prevent specific ads from being published E. a temporary storage space used to keep a running count of the number of ad impressions

C. a line of identifying text, assigned and retrieved by a given Web server and stored by a user's browser

In database terminology, a record represents: A. a list of data, arranged in columns and rows. B. all of the data in a given column. C. a single instance of whatever the table keeps track of. D. a field or combination of fields used to uniquely identify a file. E. one or more keys that relate separate tables in a database.

C. a single instance of whatever the table keeps track of.

Hordes of surreptitiously infiltrated computers, linked and controlled remotely, are known as zombie networks or: A. honeypots. B. zombots. C. botnets. D. blacklists. E. megabots.

C. botnets.

The _________ measures the percentage of people who clicked on an ad to arrive at a destination-site. A. click churn rate B. link C. click-through rate D. click landing-page rate E. impression score

C. click-through rate

Sifting through trash in an effort to uncover valuable data or insights that can be stolen or used to launch a security attack is known as: A. trash recovery. B. junk exploring. C. dumpster diving. D. scrap sifting. E. data sieving.

C. dumpster diving

The term _____ originally referred to a particularly skilled programmer. A. data harvester B. cracke C. hacker D. black hat E. hacktivist

C. hacker

A protester seeking to make a political point by leveraging technology tools, often through system infiltration, defacement, or damage is called a(n) _____. A. activist B. cyber agitator C. hacktivist D. ethical hacker E. cybersquatter

C. hacktivist

The cost of producing an additional unit of a product is known as its: A. isocost. B. transaction cost. C. marginal cost. D. redundancy cost. E. implicit cost.

C. marginal cost

To overcome reception and availability problems, mobile telecom services firms have begun _____ that provide a "five bar" coverage in a roughly 5,000-square-foot footprint. A. providing incentives to communities that allow the construction of towers B. leveraging GEO and LEO technologies C. offering femtocells D. providing wi-fi base stations at very low costs E. switching from Wi-Fi to WiMax

C. offering femtocells

A __________ is a search performed on Google or any other search engine. A. impression B. PageRank C. query D. link E. crawl

C. query

The frequencies licensed by telecommunication firms to provide wireless service is known as _____. A. GEO and LEO range B. mobile service array C. wireless spectrum D. communication backbone E. communication bandwidth

C. wireless spectrum

Which of the following statements is true about Airbnb's revenue model? A. Airbnb currently does not make money via transactions, only from advertising listings on its website. B. Airbnb only charges property owners who rent on the website. C. Airbnb only charges guests who rent on the website. D. Airbnb charges both property owners and guests as part of transactions on their website. E. Airbnb doesn't charge transactions for the three years after it enters a market, so as to generate two-sided network effects of property rents and guests searching for properties to stay in.

D. Airbnb charges both property owners and guests as part of transactions on their website.

Which of the following statements is true about information systems? A. Most firms spend a huge portion of their information technology budgets on training and system security. B. New programs should be thoroughly tested across the range of a firm's hardware after deployment. C. Purchase, configuration, and licensing costs for packaged software account for most information technology expenses of a firm. D. Firms need to vigilantly manage the moving target of computer security issues. E. Total cost of ownership of information systems is often a redundant concept while making technology investment decisions

D. Firms need to vigilantly manage the moving target of computer security issues.

The acronym HFT refers to: A. High Finance Telecommunications B. High Fidelity Transmissions C. Hedge Fund Transfers D. High Frequency Trading E. Hypertext File Transfer

D. High Frequency Trading

Which of the following statements is consistent with ground realities regarding information security? A. Cyber-crime is not yet considered a serious enough threat to warrant the attention of law-enforcement agencies. B. Law-enforcement agencies are well-resourced to fight cyber-crimes effectively. C. Governments usually outmatch private industry in terms of retaining top talent with incentives and generous pay. D. Law-enforcement agencies struggle to hire, train, and retain staff capable of keeping pace with today's cyber-criminals. E. Cyber-crime is not rewarding in terms of financial gain.

D. Law-enforcement agencies struggle to hire, train, and retain staff capable of keeping pace with today's cyber-criminals.

What are the implications for firms that do not have common database systems with consistent formats across their enterprise? A. They can save infrastructural and operational costs. B. They can expect to leverage economies of scale by serving more customers. C. They can hedge against the risk of data redundancy. D. They struggle to manage their value chain efficiently. E. They profit from the aggregation of diverse data sets and enhance their repositories.

D. They struggle to manage their value chain efficiently.

A firm that provides hardware and services to run Web sites of others is known as a(n) _____. A. Web site incubator B. Internet service facilitator C. Web domain name registrar D. Web hosting service E. Internet Web fab

D. Web hosting service

The scalability of a software product is defined as the: A. capability to continue operations even if a component fails. B. long-term market viability of a software product. C. ability to take advantage of complementary products developed for a prior generation of technology. D. ability to be easily expanded to manage workload increases. E. ability to replace a technically superior product upon market inception.

D. ability to be easily expanded to manage workload increases.

The exploit referred to as __________ allowed hackers to leverage vulnerability in DNS software to redirect users to sites they did not request. A. cybersquatting. B. phishing. C. an online imposture. D. cache poisoning. E. a distributed denial of request.

D. cache poisoning.

Display ads sold on a cost per thousand impressions basis often focus on: A. generating the maximum click-throughs B. directing potential customers to the advertiser's online storefront C. persuading users to perform a specified action such as signing up for a service D. creating awareness of an advertiser's brand E. improving quality score metrics

D. creating awareness of an advertiser's brand

In online advertising, the term "impression" refers to: A. the Web site displayed when a user clicks on an advertisement B. the measure of a user's perception of ad effectiveness C. ads that run before a user arrives at a Web site's main content D. each time an ad is shown E. the design and content of an advertisement

D. each time an ad is shown

The fault-tolerant nature of the DNS ensures that: A. if users can't reach a host computer, they are redirected back to the previous page. B. mistyped or misspelled Web addresses are automatically corrected. C. if a document or file can't be accessed, it won't result in a 404 error. D. the service continues functioning even if one nameserver goes down. E. mismatched host names and domain names are still assigned with the correct IP address.

D. the service continues functioning even if one nameserver goes down.

Oracle, a firm that sells commercial ERP and database products, provides Linux for free, selling high-margin Linux support contracts for as much as five hundred thousand dollars. Oracle's motivation for this lies in: A. accelerating the shift of open source software towards a proprietary regime. B. using open source software to fuel sales of hardware. C. impoverishing other open source developers and furthering its own proprietary offerings. D. using open source software to wean customers away from competitors. E. protecting itself from the risks of distributing code while unaware of legal implications.

D. using open source software to wean customers away from competitors.

_____ is the process of using computers to identify hidden patterns in and to build models from large data sets. A. Data harvesting B. E-discovery C. Optimization D. Report canning E. Data mining

E. Data mining

____ are model building techniques where computers examine many potential solutions to a problem, iteratively modifying various mathematical models, and comparing the mutated models to search for a best alternative. A. Expert systems B. Ad hoc reporting tools C. Iterative mutations D. Sampled alliterations E. Genetic algorithms

E. Genetic algorithms

Which of the following statements holds true for the term spider? A. It refers to the Internet directory service that allows devices and services to be named and discoverable. B. It refers to the process of improving a page's organic search results. C. It refers to Internet content that can't be indexed by Google and other search engines. D. It refers to a temporary storage space used to speed computing tasks. E. It refers to software that traverses available Web links in an attempt to perform a given task

E. It refers to software that traverses available Web links in an attempt to perform a given task

Which of the following was an outdated notion regarding open source software and has been shown to be inaccurate? A. Open source software is free and its code is available for anyone to look at and potentially modify. B. Open source software code can be changed and redistributed, provided the modified software remains open and free. C. Open source software is to technology what capitalism is to economics. D. The majority of persons who work on open source projects are paid by commercially motivated employers. E. Open source is fueled on the contributions of loners tooling away for the glory of contributing to better code.

E. Open source is fueled on the contributions of loners tooling away for the glory of contributing to better code.

_____ involves allowing voice packets to gain delivery importance over packets for applications like e-mail. A. Voice precedence B. Data rationing C. Right-of-way for voice D. Information queuing E. Packet prioritization

E. Packet prioritization

_____ is by far the most popular language for creating and manipulating databases. A. XML B. HTML C. PHP D. Java E. SQL

E. SQL

____ repeatedly sends a cluster of three packets starting at the first router connected to a computer, then the next, and so on, building out the path that packets take to their destination. A. Firewall B. Router C. Pathfinder D. Mapper E. Traceroute

E. Traceroute

Systems that deny the entry or exit of specific IP addresses, products, Internet domains, and other communication restrictions are said to employ a(n): A. intrusion detection software. B. access restriction software. C. whitelists. D. anti-virus software. E. blacklists.

E. blacklists

A(n) _____ refers to a heads-up display of critical indicators that allow managers to get a graphical glance at key performance metrics. A. interstitial B. embassy C. canned report D. prediction interface E. dashboard

E. dashboard

In database systems, a _____ defines the data that a table can hold. A. row B. key C. record D. file E. field

E. field

T/F As per the chapter, firms classified as being part of the sharing economy and collaborative consumption are still considered too risky to attract substantial venture capital investment.

False

T/F If eBay and Craigslist are included, some 40 percent of the US and Canadian population have participated in the sharing economy.

True

T/F Social media profiles can also be used to fight online fraud.

True

T/F Uber prices services according to demand. This allows the company to increase rates during peak periods in order to attract more potential suppliers into the market to meet demand.

True

T/F Uber's CEO views itself as software platform for shipping and logistics.

True

Control programs stored on chips (often used in embedded systems) are sometimes referred to as _________________.

firmware

When referring to the 'software layer cake' model, Android, Windows, and iOS are all __________________

operating systems


Ensembles d'études connexes

Real Estate Private Equity Questions

View Set

Ch.15 The West Between the Wars, Ch.14 World War I and The Russian Revolution, Ch.13 Challenge and Transition in East Asia (1800-1914), Ch. 9 The French Revolution and Napoleon, Ch.12 The Reach of Imperialism (1800-1914), Ch.11 Mass Society and Democ...

View Set

Exam 6: Ch. 38 & 40 Musculoskeletal

View Set

Entrepreneurship Review Chapter 1

View Set

NC Statutes and Regulations Pertinent to Property and Liability

View Set

2ND TB (CHPT 5): Health Belief Model (HBM)

View Set

Systematic Review and Meta-analysis

View Set

Chapter 22: Renaissance & Mannerism in Cinquecento Italy

View Set