Test 3 isys warm up and videos

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

The domain name system converts domain names to ______________.

IP Addresses

Mary's company is implementing an ERP system to achieve which main business objective

Improved decision making

Enterprise systems provide value by both ____________ and providing ____________ to help managers make better decisions

Increasing operational efficiency; firm-wide information

_____________ check for data entering a system for accuracy and completeness, such as when a clerk confirms a telephone number for a new customer

Input controls

A ___________ is great for a city to set up for emergency and public use since it is larger than many types of network configuration

MAN

According to DHS agent portrayed in this video, the secret service has responded to network intrusions at businesses throughout the United States that have been impacted by _________ through their point of sale systems

Malware

Customer relationship management typically focuses on 3 key elements of the customer relationship:

Marketing, sales, service

As zero and one explain in this video, a ____________ must be used to convert an analog signal to digital signal when transmitting data through a typical telephone line

Modem

In this video, one-bit describes _________, the method of slicing digital messages into parcels, transmitting them across communication networks, and reassembling them at their destination

Packet switching

Instead of sending an entire file in one big chunk across the internet, ___________ is used which dices the file up into little pieces that are sent independently across the communications paths and then reassembled when they reach their destination

Packet switching

A just-in-time strategy means:

Raw materials would arrive just in time to be transformed into a product and the product would ship as soon as completed

Agent macey explains how a _________ pretends to be a legitimate company and sends email requesting users to update their confidential information such as passwords or account numbers

Spoofer

Bandwidth transmission speed is measured in ____________.

Hertz

In this video, one-bit describes how voices travel through typical telephone transmission lines. He is describing a(n) ____________

Analog signal

According to the information system in this video, computers represent data using ________

Bits

When information about the demand for a product gets distorted as it passes from one entity to the next across the supply chain it is called the ______________

Bullwhip effect

Enterprise systems have a set of integrated software modules and a ____________ by which business processes and functional areas throughout the company can _____________ data

Central database ; share

According to the information in this video, the telephone system is an example of a ________ network

Circuit-switched

___________ can be destructive to a company when at risk for people or programs deliberately moving through ads, thus driving up advertising costs for a company

Click fraud

According to the information provided in this video, any business that has an online presence is at risk of __________

Denial-of-service attack, loss of customer data, unauthorized data disclosure, exposure to hacker activity

In this video, special agent macey says the single largest threat to the internet is

Denial-of-services attacks

In this video, Kevin describes ___________ as a set of integrated software modules that support nearly all of their organizations business processes

ERP

As Kevin explains, _________ processes support activities in multiple departments and span an organization

Enterprise

The ________ mandates that financial services firms ensure security and confidentiality of customer data

Gramm-Leach-Bliley Act

What outlines medical security and privacy rules and procedures for simplifying the administration of health care billing and automating the transfer of health care data

HIPAA Act

According to this video, which of the following statements is true regarding enterprise resource planning system

They integrate data with a centralized database

What is pharming?

Users are redirected to a phony web page even when the correct URL is typed in

Based on the information provided in this video, which of the following usually happens in a denial-of-service attack

A hacker floods a web server with so many requests that it becomes unavailable to its intended users

What type of communications processor directs packets of data through different networks, ensuring that the data sent gets to the correct address

A router

In this video dramatization, Kevin describes which component of an ERP system that consolidates data from sales, marketing, and service departments

Customer relationship management (CRM)


Ensembles d'études connexes

Unit 02 Literary Terms and Academic Vocabulary

View Set

Network Utilities Command Line Quiz

View Set

Pharmacology Prep U Chapter 9 Antibiotics

View Set

Telecom Chapter 7 - Wireless LANs II

View Set

UNIT 2 US Comprehensive Survey InQuizitives

View Set

World History Chapter 10.3 Vocab- The Protestant Reformation!

View Set

Unit 2: Cinderella Man Questions

View Set