K201 post lecture quizes for Ch 6,8,9,10,12
The net neutrality principle renders the Internet as a service which provides (serves) data or information to users.
False
Which of the following is a characteristic of an inter-enterprise information system?
Its problem solutions affect multiple organizations.
A(n) ________ is the hierarchy of the tasks required to complete a project.
Work Breakdown Structure (WBS)
Success metrics are also known as ________.
key performance indicators (KPI)
What are BPM activities?
model, design, implement, and assess
Both adware and spyware ________.
observe user behavior without the user's permission
Which of the following statements is TRUE about a VPN?
A VPN connection utilizes private networks instead of the public network.
One of the problems of the SDLC involves ________ which signifies once a phase is completed you go to the next phase and do not go back.
Ambiguous Requirements
Physical security is an example of a ______
Data safeguard
Which of the following best characterizes IUanyWare?
IaaS
If you use your smart phone as a hotspot to connect to the Internet on your tablet you are using a ________.
Personal Area Network (PAN)
A scheduling information system used by a receptionist at a doctor's office is an example of how an information system improves the quality of a process by ________.
augmenting human activity
A computer hacker trying different combinations of characters to crack a password is a ________.
brute force attack
A ________ is an application program that obtains product data from a database, manages the items in a shopping cart, and coordinates the checkout process.
commerce server
In a BPMN process diagram, dotted arrows depict the flow of ________ in the process.
data
________ refers to an organization-wide function that oversees the development and the enforcement of data policies and data standards.
data administration
UrToy's market share doubled after it embedded artificial intelligence into its exclusive line of smart teddy bears. This is an example of the company's ________.
effectiveness
Process ________ is a measure of the ratio of process outputs to inputs and is usually associated with the cost-leadership strategy.
efficiency
Social media (SM) providers host the SM presence using ________ in the cloud.
elastic servers
Stan illegally ________ the employee database and downloaded all of the records in the company's employee information table.
hacked
Data, isolated in separate functional systems, is characteristic of a(n) ________.
information silo
The ________ phase is the most important step in the SDLC process.
requirements
Taking time to foster genuine connections with your professors, classmates, etc. now, with hopes of it leading to opportunities in the future, is an example of investing in your __________.
social capital
While social capital can depreciate over time, just like traditional forms of capital, social capital can also increase in value over time.
true
A(n) ________ is an inducement to social media users for passing communications along through different tiers of communities in social media.
viral hook