Info Systems Exam 3
Which of the following is the best description of a protocol in a telecommunications network architecture?
A standard set of rules and procedures for control of communications in a network
All of the following are physical components of an RFID system except:
Bar codes
Because of ____ e-commerce sites, anyone can become a merchant online.
C2C
A trusted third-party organization that issues attachments to emails or embedded Web site data to verify the identity of a sender or Web site is known as a(n) _____.
Certificate authority
Which statement about data security in the public cloud is true?
Clients of public cloud computing services must rely on service providers to safeguard their data.
_____ refers to a computing environment where software and storage are provided as an Internet service and accessed with a Web browser.
Cloud computing
Why do cloud computing service arrangements often pose challenges for organizations that are transitioning to the cloud?
Cloud computing arrangements can be lengthy and complex.
A(n) ________ signal is a discrete, binary waveform that transmits data coded into two discrete states such as 1-bits and 0-bits.
Digital
A computer network consists of at least three computers.
False
A hub is a networking device that is used to filter and forward data to specified destinations on the network.
False
Bartering is a technique used by advertisers to recapture shoppers who abandoned a Web site without making a purchase.
False
Because cloud computing arrangements have become so common, they are typically simple and straightforward from both the legal and pricing standpoints.
False
In 1992, the Supreme Court ruled that online retailers must collect sales taxes even in states where they lack a physical presence.
False
In spite of recent economic downturns, Web site operators have shunned the idea of bartering for goods and services.
False
Redundancy in data center hardware and file storage locations is a common problem for businesses who decide to implement cloud computing.
False
Security is not a significant concern for developers of IoT applications because of the limited scope of the private data these applications handle.
False
Sensors that can monitor and report data about traffic and parking conditions via the Internet are part of a network of physical objects known as the Internet of Technology.
False
Smart card use is restricted to data associated with financial transactions.
False
The number of cycles per second that can be sent through any telecommunications medium is measured in kilobytes.
False
One or more access points positioned on a ceiling, wall, or other strategic spot in a public place to provide maximum wireless coverage for a specific area are referred to as:
Hotspots
A(n) ________ is a commercial organization with a permanent connection to the Internet that sells temporary connections to retail subscribers.
ISP
If your home air conditioner has an IP address, it is part of the ____.
Internet of Things
What happens to the data gathered by IoT sensors?
It passes over the network and is gathered and stored.
Which type of network is used to connect digital devices within a half-mile or 500-meter radius?
LAN
Which of the following is a device that acts as a connection point between computers and can filter and forward data to a specified destination?
Switch
The concept of a future web in which it is commonplace for everyday objects to be connected, controlled or monitored over the Internet is called:
The Internet of Things
Why, during the final stage of the multistage model for e-commerce, is comprehensive customer information captured in the supplier's database?
This facilitates customer service after order delivery.
A mobile advertiser can find how many people clicked on his ad and how many people bought his product or service.
True
An electronic exchange is an electronic forum where manufacturers, suppliers, and competitors buy and sell goods, trade market information, and run back-office operations.
True
Because of the danger of vendor lock-in, organizations must choose a cloud provider wisely.
True
Coaxial cable is similar to that used for cable television and consists of thickly insulated copper wire.
True
Computer networks are fundamentally different from telephone networks.
True
Consumers who have enrolled in mobile banking and downloaded their bank's mobile application to their cell phones can check their credit card balances before making major purchases.
True
Devices that belong to the IoT network contain sensors that can detect something about the device's surroundings, such as pressure, temperature, or motion.
True
Digital rights activists believe "zero-rating" practices violate net neutrality principles.
True
Fiber-optic cable is more expensive and harder to install than wire media.
True
In the utilities industry, IoT sensors are used extensively to capture operational data and help the utility provider achieve 24/7 uptime.
True
Lack of trust in online sellers is one of the most frequently cited reasons that some consumers are not willing to purchase online.
True
Mobile search makes up at more than 50% of all Internet searches.
True
Organizations that are concerned about the security of their data must investigate the cloud provider's processes and applications related to security fully before using public cloud computing.
True
The Domain Name System (DNS) converts domain names to IP addresses.
True
The emerging Internet of People is based on sensors attached to clothing and personal effects that monitor physical states and locations of individuals.
True
The three basic components of the most successful e-commerce models are content, commerce, and community.
True
VoIP technology delivers voice information in digital form using packet switching.
True
To use the analog telephone system for sending digital data, you must also use:
a modem
What is the Internet of Things?
a network of physical objects embedded with sensors, processors, software, and network connectivity capability
Emily researches private clouds while working on a proposal to move her organization to the cloud. She learns that _____.
a private cloud is often comparable in cost to or less expensive than an on-premises environment
Purple Pie Man's Bakery has entered an agreement with Amazon whereby the bakery's database system resides on Amazon's hardware and employees access it through the Internet. In this scenario, Purple Pie Man's Bakery is _____.
a tenant of Amazon
In which of the following forms of e-commerce is the seller most likely to offer a customized product offering to a potential buyer?
business-to-consumer (B2C) e-commerce
Based on a 1992 Supreme Court ruling, an Internet-based merchant needed to collect sales taxes only when _____.
buyers lived in a state where the merchant had a physical presence
Private cloud computing _____.
can rely on on-premises or virtual clouds
Suppose a business wishes to have access to servers and storage devices, but does not want to buy them. The business prefers to have their own employees install and maintain the computing platform and application software. What is their best choice?
cloud computing: infrastructure as a service
A common reason an organization chooses a private rather than a public cloud environment is _____.
concerns about data security
Authentication technologies are used by many organizations to _____.
confirm the identity of a user requesting access to information or assets
IPv6 has been developed in order to:
create more IP addresses.
Bandwidth is the:
difference between the highest and lowest frequencies that can be accommodated on a single channel.
Bluetooth can be used to link up to ________ devices within a 10-meter area using low-power, radio-based communication.
eight
Which type of cloud computing environment is most suitable for an organization that wants to run applications with stringent compliance requirements on-premises while running applications with fluctuating capacity needs on a service provider's cloud?
hybrid
Which benefit of public cloud computing results when service providers operate multiple data centers distributed geographically and save multiple copies of data on different machines?
increased redundancy
James is considering joining an electronic exchange so that his business can purchase needed supplies easily and possibly at better prices. James would prefer to join an exchange that is open to anyone in his firm's market space. Which type of electronic exchange is James considering?
independent
A VPN:
is an encrypted private network configured within a public network.
Wholesale e-commerce applications often focus on improving a plant manager's efficiency in researching prices and availability from suppliers for _____.
manufacturing, repair, and operations goods and services
Digital subscriber lines:
operate over existing telephone lines to carry voice, data, and video.
Using a customer's name in an email campaign or a greeting that appears when they visit a Web page is considered the most basic form of _____.
personalization
Thomas asks his firm's Web site developers to try to make the site intuitive from their customers' point of view, and to incorporate a chat feature that allows customer service to follow the customer and provide assistance with a purchase. Thomas wants their organization to become the customers' _____.
preferred supplier
Compared to traditional commerce transactions, e-commerce transactions _____.
reduce the costs of sales
The number of mobile Web sites worldwide has grown rapidly, in part because of _____.
the development of new and useful applications
Francis purchases a new tablet device through an e-commerce Web site. In this scenario, the last stage of the multistage model for e-commerce takes place when _____.
the merchant's technical support team helps Francis configure his device
What must Web site operators constantly monitor to provide a good experience to their Internet shoppers?
traffic and response times experienced by visitors