IST 205 Exam 1

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Which of the following is the NIST definition of cloud computing:

"Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. This cloud model promotes availability and is composed of five essential characteristics, three service models, and four deployment models."

Which one of the following is an IP address?

129.237.11.76

What is the definition of a data mart?

A database focused on addressing the concerns of a specific problem or business unit/area.

Which of the following statements best describes a business process?

A series of tasks or steps that are completed in order to accomplish a goal or achieve an output.

Which best defines the Bluetooth technology?

A technology for connecting nearby devices wirelessly

According to our reading this week, Wal-Mart data mining efforts result in the following outcomes:

Additional insight as to what products customers stock up on in the days leading up to hurricanes.

According to our Cloud Computing Reader, NIST identifies five characteristics of a cloud computing environment consisting of:

Internet access, measured success, shared resource pooling

One characteristic of cloud computing is measure service. Measured service is best described as:

Cloud is often pay-as-you-go, where you only pay for what you use. Think about how a utility company meters how much water, electricity, or gas is used and charges based on consumption.

Businesses embark on digital transformation for the following reasons

Competitive advantage, improve business processes

What term is best described by: "the act of taking a job traditionally performed by a designated agent (usually an employee) and outsourcing it to an undefined, generally large group of people in the form of an open call"

Crowdsourcing

Some of the main points of our chapter 7 readings can be summarized as follows:

Customer conversations are happening and employees are using social media. Even firms that aren't planning on creating a social media presence need to professionalize the social media function in their firm (consider this a social media awareness and response team, or SMART)

Based on the article "The Nine Elements of Digital Transformation" , the authors believe businesses are digitally transforming three key areas of their enterprises, these three areas are:

Customer experience, operational processes, business models

According to our Module 3 reading, areas where businesses can use and benefit from data mining include:

Customer segmentation to provide insight as to the high value customers; and fraud detection uncovering patterns of criminal activity.

From the reading: "The Nine Elements of Digital Transformation ", identifies the following three building blocks with which companies are digitally transforming customer experience:

Customer understanding, top-line growth, customer touch points

Which one of the following converts the www site www.ku.edu to the IP address 129.237.11.26?

DNS (Domain Namer Server)

Businesses will often rely on external data sources to meet their needs for data to use in their businesses. For example, this data can provide insight about potential customers to which a business can target in their marketing campaigns. What is the name of such companies that serve as one source of this external data?

Data aggregators/data brokers

What is the term for a set of databases designed to support decision making in an organization?

Data warehouse

Which is the best description of digital transformation?

Digital transformation involves using digital technologies to remake a process to become more efficient or effective

Businesses must have social media policies...in our reading we read about the negative effects that can happen without one, such as with United Airlines and Domino's Pizza. Many businesses emphasize the three R's as part of a social media policy: Representation, Responsibility, Respect. Representation is best described as:________________________

Employees need clear and explicit guidelines on expectations for social media engagement. Are they empowered to speak on behalf of the firm? If they do, it is critical that employees transparently disclose this to avoid legal action. Firms may also want to provide guidelines on initiating and conducting dialogue, when to respond online, and how to escalate issues within the organization.

Businesses must have social media policies...in our reading we read about the negative effects that can happen without one, such as with United Airlines and Domino's Pizza. Many businesses emphasize the three R's as part of a social media policy: Representation, Responsibility, Respect. Responsibility is best described as:________________________

Employees need to have accountability for their online actions. Firms must set explicit expectations for disclosure, confidentiality and security, and provide examples of engagement done right, as well as what is unacceptable.

Any software that allows multiple users to interact on a document or topic could be considered collaborative...examples include:

Google drive, Microsoft Sharepoint, Cisco WebEx, Zoom

The cloud infrastructure is a composition of two or more clouds (private, community, or public) that remain unique entities but are bound together by standardized or proprietary technology that enables data and application portability (e.g., cloud bursting for load-balancing between clouds)." best describes what concept or cloud deployment model?

Hybrid cloud

Which one of the following descriptions best identifies the origin of the Internet?

In September, 1969, the ARPANET(Advanced Research Projects Agency Network) was turned on. The first four nodes were at UCLA, Stanford, MIT, and the University of Utah.

Some reasons businesses cannot take advantage of their data and information to realize benefits include:

Incompatible systems, operational data, data quality issues

Every device that communicates on the Internet, whether it be a personal computer, a tablet, a smartphone, or anything else, is assigned a unique identifying number called __________________

Internet Protocol (IP) address

What is the term for outdated information systems that make it difficult or impossible for companies to use the data within the company because they aren't designed to share data or be compatible with other, newer information systems?

Legacy systems

During the course lecture, I discuss advantages of cloud computing, these include:

Lower IT infrastructure, lower software cost, unlimited storage capacity

The following technology trends drive digital transformation:

Mobility, social media, big data

Within the context of the Four Ms of effective media engagement, megaphone involves the following:

Outbound communication

The following are examples of digital transformation in the health care sector:

Patient self-services, using digital channels rather than direct physician interaction (e.g. telemedicine), or patient self-management solutions

From our lecture video on digital transformation, which of the following best describes the Best Buy initiatives to stay competitive in their business environment?

Price matching, focus on delivery, customer experience focus/improvements

In computer networking, a _______________- is the set of rules that allow two (or more) devices to exchange information back and forth across the network.

Protocols

According to our IST205 Cloud Computing Reader, three deployment models (that is how companies actually use cloud computing in their businesses) are:

Public cloud, hybrid cloud, private cloud

Data refers to: ______________________

Raw facts and figures

Which statement below best describes how businesses can use influencers within their business model?

Reaching out to key influencers can also be extremely valuable. Prominent bloggers and other respected social media participants can provide keen guidance and insight. The goal isn't to create a mouthpiece, but to solicit input, gain advice, gauge reaction, and be sure your message is properly interpreted.

When data sent over the internet is divided into packets, what computing devices forward those packets from one location to the next?

Routers

According to my lecture on cloud computing, some disadvantages to cloud computing include:

Stored data may not be secure, more risk on information leakage, dependencies on service suppliers

What networking protocol divides up the data being sent from one computer (such as www sites, email, files...) into packets that then get sent over (routed in various directions) the internet and then reassembles the packets on the receiving computer?

TCP/IP

What protocol serves as the basis for communicating/interconnecting over the internet...this protocol allows different networks and different devices to communicate over the internet.

TCP/IP (Transmission Control Protocol/Internet Protocol)

One source of data for organizations is the internally generated data from their www sites and customer relationship management systems (CRM). These systems can capture most of the activities of your www surfing behavior such as what www pages and items you look at, your comments, and www search history.

TRUE

Businesses use social computing to harness the "Wisdom of the Crowds". Wisdom of the crowds is the belief that:____________________

The crowd isn't always right, but in many cases where topics are complex, problems are large, and outcomes are uncertain, a large, diverse group may bring collective insight to problem solving that one smart guy or a professional committee lacks. One technique for leveraging the wisdom of crowds is a prediction market, where a diverse crowd is polled and opinions aggregated to form a forecast of an eventual outcome.

Wikis can be used in business environments where:_______________

They can be ideal for creating resources that benefit from the input of many such as encyclopedia entries, meeting agendas, and project status documents.

In our IST205 Cloud Computing Reader, it describes several cloud deployment models that organizations can implement to meet their computing and data needs. According to this reading, the Private Cloud deployment model is best described as:

This cloud model is great for organizations concerned about sharing resources on a public cloud. It is implemented on servers owned and maintained by the organization and accessed over the internet or through a private internal network.

In the class lecture, I discuss why cloud computing is important for businesses is that, previously businesses had to store all their data and software on their own servers...some of the problems or disadvantages with this include:

This is not scalable...hard to keep up; hard to budget resources; paying for over capacity that isn't used

What is data mining used for?

Using computers and data to identify hidden patterns and to build models from large data sets.

__________________ enables sounds to be converted to a digital format for transmission over the Internet and then re- created at the other end.

VOIP

In this concept, a group of individuals (the crowd often consists mostly of untrained amateurs), collectively has more insight than a single or small group of trained professionals.

Wisdom of the crowds

Infrastructure as a Service is a type of cloud service that is best described as:

With this type of cloud solution, you rent IT infrastructure—servers and virtual machines (VMs), storage, networks, operating systems—from a cloud provider on a pay-as-you-go basis. This is the simplest option for businesses. With this type of cloud service, an organization migrates its hardware—renting servers and data storage in the cloud rather than purchasing and maintaining its own infrastructure.

Which phrase best describes data:

a collection of facts

Business processes are important components of information systems a business process is best defined as a

a series of steps undertaken to achieve a desired outcome or goal

According to Michael Porter, two primary methods for a business to obtain competitive advantage are:

cost advantage and differentiation advantage

According to our IS and Competitive Advantage reading, a strategic information system is one that attempts to do one or more of the following:

deliver a product or a service at a lower cost; deliver a product or service that is differentiated; help an organization focus on a specific market segment; enable innovation.

According to our Chapter 1 reading, and information system is best described as consisting of the following components

hardware, software, data, people, and processes

In the reading this week, the author discusses how businesses can experience success with customers with social computing through a strategy of Engage and Respond. The author maintains a business can maintain a successful social media presence through the 4 Ms of Engagement...these 4 Ms are:

megaphone, magnet, monitoring, mediation

The two main categories of software are:

operating systems and application software

The article "Nine Elements of Digital Transformation" states the following: "Digital Transformation requires ______________ to drive change...

strong leadership

What event in 1991 led to the use of the internet and world wide web by private businesses and the commercialization of the internet and www as we see in place today?

the National Science Foundation, which governed how the Internet was used, lifted restrictions on its commercial use

Which of the following phrases best describes software:

the set of instructions that tell the hardware what to do

According to Michael Porter, competitive advantage is best described as:

when a business is able to sustain profits that exceed the average for the industry


संबंधित स्टडी सेट्स

Community Nursing - EXAM 2 (Evolve)

View Set

Mortgage Loan Origination - CompuCram - Ethics

View Set

World Geography : Unit 7. WESTERN EUROPE

View Set

CA Real Estate Finance Course (PRACTICE EXAM)

View Set