MIS 301 Exam 2 Quiz Questions

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Facebook's mobile ads now bring in more than ____ percent of the firm's ad revenue.

90

When taken together, these features enlist websites to serve as vassal states in the Facebook empire.

API to integrate Facebook logon, likes, and other open graph features into other sites

What is not considered a criteria necessary for prediction markets to function properly?

Be related

A key advance of the Oculus Rift was:

It didn't make users puke.

The version history and roll back features of wikis is considered to be more clear, allowing users to be able to see who made what edits, than collaborating simultaneously in a tool such as Google Docs or Office365. T/F

True

To become the Web's leading photo-sharing service, Facebook didn't acquire anyone. The site simply turned on a substandard photo-sharing feature and quickly became the biggest photo-sharing site on the Web. T/F

True

Twitter ads are billed on pay per performance when there is a retweet, follow, buy, or other engagement with a promotion. T/F

True

Two strategic assets considered vital to Facebook's enduring competitive advantage in social networking are switching costs and network effects. T/F

True

WeChat processed 460 billion transactions in 2018—over forty-six times more than PayPal processed. T/F

True

Engineering the posting of positive comments and reviews of a firm's product and services on feedback forums is known as _____.

astroturfing

Online journal entries, usually made in a reverse chronological order, are known as _____.

blogs

Social networks are a hothouse for "_________" media, where enthusiast-consumers can help spread the word about products and services.

earned

Open source software refers to:

free software whose source code is available for modification by anyone.

A(n) ___________________ is measured each time an ad is served to a user for viewing, i.e. each time an ad appears on someone's screen.

impression

A(n) _____ is an online community that allows users to establish a personal profile and communicate with others.

social network

GitHub and Stack Overflow are websites that are especially useful for students and professionals focusing on the _______________________ industries.

software development

Many entrepreneurs accept startup capital from _____, investor groups that provide funding in exchange for a stake in the firm and often, a degree of managerial control usually in the form of a voting seat, or seats on the firm's board of directors.

venture capital firms

A website anyone can edit directly within a Web browser is known as a _______.

wiki

Ads on Facebook carry an average CPM of over ______.

$11

Facebook acquired Instagram for $ ___________.

1 billion

The phrase ______________ refers to efforts where participants share access to products and services rather than having ownership.

Collaborative consumption

What was the biggest problem with the rollout of Facebook's Beacon platform?

It was an "opt-out" program.

What is not considered one of the four "Ms" of social media engagement: Monetize Magnet Monitoring Mediating megaphone

Monetize- four "Ms" of social media are the megaphone (outbound communication), magnet (drawing others into the conversation), and monitoring and mediating online conversations.

Mandated for Wikipedia contributions, this editorial style is free of bias and opinion:

Neutral point of view

What feature of Facebook helps new applications gain visibility among users?

News feeds

Physician social network "_________" is a godsend to physicians looking to gain peer opinion on confounding cases or other medical questions.

Sermo

The phrase _____ is used to refer to situations in which users collaboratively work to create contents, products, and services. Examples include social media as well as service like Skype and BitTorrent.

peer production

The "three Rs" emphasized in the social media policy guidelines of most organizations relate to:

representation, responsibility, and respect.

The roll back feature of a wiki page allows:

restoration of the wiki page to a prior version.

The phrase _____ refers to the global mapping of users, organizations, and how they are connected.

social graph

_________ started __________, building the world's first socially driven beauty brand, leveraging social media to share, promote, and co-create.

Emily Weiss; Glossier

_____ refer(s) to applications that address the needs of multiple, simultaneous users in an organization or work group.

Enterprise software

One challenge for Facebook Mobile is newsfeed ads. Users tend to ignore ads in their newsfeed even more than they do ads that appear on the side of conventional web pages. T/F

False

The failure of China's WeChat platform shows the folly of trying to create an application platform through a mobile app. T/F

False

Twitter is larger than other social media sources. T/F

False

___ is an example of an exploit in which hackers target security vulnerabilities caused by software developers not validating user input.

SQL injection technique

___ is the ability to either handle increasing workloads or to be easily expanded to manage workload increases.

Scalability

___ is machine learning where data is not explicitly labeled and doesn't have a predetermined result.

Self-supervised learning

Facebook was one of Silicon Valley's most aggressive practitioners of the acqui-hire—acquiring startups as a means of securing new talent. T/F

True

Firms may turn to third parties and outside services to acquire data for predictive models. T/F

True

Firms that choose one ad network are not required to run ads from only that network. T/F

True

Google assets include brand, scale, network effects, and data. T/F

True

Google gets creative about how its servers are cooled—stormwater runoff is used in the southeastern United States. T/F

True

Google sells more advertising than any other media company in the world, including Disney, News Corp, Time Warner, and the New York Times corporation. T/F

True

Google's size has caused it to be investigated for antitrust violations in Europe. T/F

True

In a further bid to go after YouTube, Facebook shares ad revenue with digital content creators, and to battle TikTok and Snapchat, it now allows ads to run in videos as short as one minute. T/F

True

Java code that runs through the JVM interpreter is slower than the code compiled for the native operating system and processor that make up a platform. T/F

True

Keyloggers spyware can be either software-based or hardware-based. T/F

True

Many firms with similar procedures for accounting, finance, and human resource functions might buy a software package rather than develop their own code. This is usually considered fine since these functions are often not strategic. T/F

True

Many wikis also serve as knowledge management systems that act as a sort of collective corporate memory that's vital for sharing skills, learning, and preserving expertise when employees leave the firm. T/F

True

NoSQL technologies are often used with massive, disparately structured data. T/F

True

Over the past several years, online advertising has represented the only advertising category that is consistently trending with positive share growth. T/F

True

Publicly declared affiliations, political or religious views, excessive contact, declined participation, and other factors might lead to awkward or strained employee relationships. T/F

True

SDK are tools that allow the creation of products or add-ons for a specific operating system. T/F

True

SMART is an acronym for social media awareness teams. T/F

True

So-called content adjacency problems occur when ads appear alongside text they'd prefer to avoid. T/F

True

Some networks are curating user feeds, so it's not guaranteed that what you're posting on social networks will even be seen T/F

True

Spotify's Echo Nest subsidiary analyzes both tracks themselves, as well as what others are saying about music in order to build automated music recommendations. T/F

True

Stuxnet showed that with computers at the heart of so many systems, it's now possible to destroy critical infrastructure without firing a shot. T/F

True

The terms web services and APIs are often used interchangeably, and refer to code and request/response standards used by this code so that other programs can call these services to perform a task. T/F

True

Total cost of ownership is all the cost associated with the design, development, testing, implementation documentation, training and maintenance of a software system. T/F

True

Twitter initially made its data available for free to other developers via API (application programming interface).

True

Two-factor or multi-factor authentication systems can slow consumers down, leading to consumer annoyance and dissatisfaction. T/F

True

Users don't really search the Internet using Google; they search a copy of Internet content stored on Google's servers. T/F

True

Walmart uses Hadoop to sift through social media posts about the firm. T/F

True

While Facebook has gotten even more accurate at ad targeting, its relentless string of privacy gaffes, increased public outcry, and a tightening regulatory environment have prompted the firm to halt a five-year partnership with third-party data aggregators that gave the firm access to additional data such as offline purchases and loyalty program participation. T/F

True

Wikis can be effective for group work and team meetings, since they can be used for everything from posting an agenda in advance, to prompting users to share documents before face-to-face brainstorming and feedback. T/F

True

YouTube is actually the Internet's second biggest search engine. T/F

True

_____ is the idea that a group of amateur individuals collectively have more insight than a single or small group of trained professionals.

Wisdom of crowds

___ are attacks that are so new that they haven't been clearly identified, and so they haven't made it into security screening systems.

Zero-day exploits

Which of the following is an open source e-mail software that competes with Outlook server?

Zimbra

Edward Snowden is:

a U.S. government contractor thought whistle-blower by many, who released (in violation of U.S. law) secret documents exposing state-run surveillance networks.

Firmware is used to refer to:

a device's control programs stored on nonvolatile memory chips.

Polling a diverse crowd and aggregating opinions, in order to form a forecast of an eventual outcome to leverage the wisdom of crowds, is known as _____.

a prediction market

iBeacon is:

a technology that apps can use to determine a user's location.

A(n) _____ is software that controls computer hardware and establishes standards for developing and executing applications.

operating system

Text ads appearing on Google search pages are billed on a(n) _____ basis.

pay-per-click

Cons executed through technology and that often try to leverage the reputation of a trusted firm or friend to trick the victim into performing an action or revealing information constitute:

phishing

Firms that invite other organizations to integrate with their systems via web services and APIs are often thought of as turning their products into ____________.

platforms

Products and services that allow for the development and integration of software products and other complementary goods are known as _____.

platforms

Rails, Django, AngularJS, and ASP.NET are examples of ____________.

programming frameworks

Systems that can absorb any type of data, structured or not, from any type of source are often referred to as:

schema-less.

Programs written using _____ can be interpreted within their applications, rather than compiled to run directly by a microprocessor.

scripting languages

The practice of designing, running and optimizing search-engine ad campaigns is known as:

search engine marketing.

You will often hear technologists refer to the SQL standard by pronouncing it as _______.

sequel

The ____ between the customer and the vendor usually specify the levels of availability, serviceability, performance, operation, or other commitment requirements.

service level agreements

Organizations that have created a robust set of Web services around their processes and procedures are said to have a(n) _____.

service-oriented architecture

User interface refers to:

the mechanism through which users interact with a computing device.

Facebook has been used by over _________ different advertisers, and many of these are small businesses using the firm's self-service ad platform.

1 million

Apple requires any app sales to share a _____ percent take with the firm (_____ percent for smaller developers).

30; 15

As many as ____________ automated “bots” were used with the express purpose of sowing confusion during the 2016 U.S. presidential election.

50k

While the Health.gov failure was large and public, it was by no means an anomaly. Research firm the Standish Group estimates that in the past ten years, some ____ percent of large federal information technology projects were unsuccessful.

94

Efforts that link advertisers to content providers willing to host advertisers in exchange for payment, are referred to as ____

Ad networks

Which of the following has become a dominant software development methodology?

Agile development

What is true about Facebook and Twitter feeds?

All Twitter posts appear in the feeds of followers with an open Twitter app, but Facebook posts are curated and only appear in the feeds of some friends and fans.

Which additional factors favor the competitive dynamics of smartphone apps over browser-based desktop services? Smartphones apps can access a phone's media library and cloud storage. Smartphone apps can use push notifications. Smartphone apps also get an icon on the home screen. Limited screen real-estate on mobile devices All of the above

All of the above

Which of the following is a precaution a user can take against hacking? All of the above Stay Vigilant Stay armed Surf smart Stay Updated

All of the above

Which of the following is true about Facebook Messenger It is a Skype competitor All of the above None of the above It has become a payments platform It is now used as a tool for customer support and service

All of the above

Which of the following is not true about potential benefits to firms that create platforms? All of the above are true They can enhance network effects They can widen the reach of firms and products They can create switching costs The potential to make their products and services more useful

All of the above are true

Which of the following is not true of Google Stadia? It can support a faster gaming experience than any console available at the time of launch. All of the above are true. It eliminates the console. It has a price point of $10 a month. None of the above are true.

All of the above are true.

Which of the following factors is thought to have been at work during the Target security breach? None of the above The database for credit card transactions wasn't sufficiently isolated from other parts of the system. Target's security software could have automatically deleted detected malware, but this function was turned off. Malicious code was disguised by using the name of a legitimate software product. All of the above.

All of the above.

__ is a term describing the extensive use of data, statistical and quantitative analysis, explanatory and predictive models, and fact-based management to drive decisions and actions.

Analytics

Many leading content outlets use Facebook Instant Articles feature because:

Articles load faster, increasing the likelihood that they'll be read (and ads will be served)

_ is computer software that seeks to reproduce or mimic human thought, decision making, or brain functions.

Artificial intelligence software

________ are promotions that are not paid for or owned but rather grow organically from customer efforts or other favorable publicity. Examples include positive tweets, referring Facebook posts, and pins on Pinterest.

Earned Media

What did Waze offer Google?

Better maps through crowdsourcing.

___ are unpredicted but highly impactful/spiking events.

Black swans

iBeacon technology works by using ___________ technology.

Bluetooth low-energy

_ are hordes of surreptitiously infiltrated computers linked and controlled remotely, and are also known as zombie networks.

Botnets

__ is a catchall term combining aspects of reporting, data exploration, and ad hoc queries, and sophisticated data modeling and analysis.

Business intelligence

_____ is a set of standards for exchanging messages containing formatted data between computer applications.

Electronic data interchange

_____ refers to replacing computing resources, which could include hardware or software, with services provided over the Internet.

Cloud computing

___ is a scalability solution that is usually provided as an overflow service, kicking in as needed.

Cloudbursting

Which of the following is true regarding ad networks?

Competition among ad networks is subject to network effects.

_____ is the term used to represent the physical components of information technology.

Computer hardware

_____ are a type of virtualization that allows for shared operating systems, more resource savings and faster execution.

Containers

_____ is the concern that an advertisement will run near offensive material, embarrassing an advertiser and degrading their brands.

Content adjacency

_____ refer(s) to systems distributed throughout the Internet that help to improve the delivery speeds of Web pages and other media, typically by spreading access across multiple sites located closer to users.

Content delivery networks

__ systems are often used to empower employees to track and record data at nearly every point of customer contact

Customer relationship management

__ are firms that collect and resell data.

Data aggregators

What do developers feel is the key to viable, large-scale prediction markets?

Decentralization

Sites that cannot be indexed by Google and other search engines are referred to as the _____.

Deep Web

_____ is a form of computing where systems in different locations communicate and collaborate to complete a task.

Distributed computing

__ refers to identifying and retrieving relevant electronic information to support litigation efforts.

E-discovery

Despite the potential impact of crowdsourcing, very few big brands are taking advantage of this method.

False

Don't confuse blogs with conventional search engine results. Blogs are very important, but they do not influence the content that appears in searches through Google or Bing. T/F

False

Facebook has lots of upsides in part because its audience in key demographics is so much smaller than conventional television networks. T/F

False

Facebook is so strong due to a team of domain experts. Genius developers are allowed to stay focused on a single project, perhaps throughout their career, serving as a resource for all new employees that enter that group. T/F

False

Fees for transactions handled by blockchain vs. centralized markets are higher, and since blockchains are peer-produced infrastructure, the cost to run such market should be very high. T/F

False

One federal study showed Black and Asian people were about three times more likely than white people to be misidentified by facial recognition. T/F

False- 100x more likely

Google has made roughly 75 acquisitions overall, more than Microsoft but less than Amazon. T/F

False- 200 acquisitions- more than Microsoft and Amazon

While Google initially earned most of its money via advertising, today most of income comes from other non-Google businesses including Gmail, Android, cloud computing, and Nest. T/F

False- 80 percent of Alphabet's nearly $181 billion in 2020 revenue came from advertising.

Google is a massive player in search. However, Google's rivals (including Bing and Yahoo) combine for a larger total share of the search market. T/F

False- 86.13% of the market is Google

Advertisers can also use a technique known as ad blocking to protect themselves from having their ads appear when specific words show up on a web page.

False- Advertisers can also use negative keywords, which tell networks to avoid showing ads when specific words appear.

Part of the brilliance of the Android operating system is that this has given Google a way to see user behavior and target ads inside all apps used on the system. T/F

False- Android does not "see" inside all apps. When you search for restaurant reviews in Google's search engine, it can serve you ads and continue to build your user profile.

A best practice for information security is to stay with mandated security regulations requirements. T/F

False- Companies should approach information security as a part of their "collective corporate responsibility‚

While Google plays in search and Android, it's still very much a horizontal company when compared to other tech industry rivals. T/F

False- Google is one of the most vertically integrated tech firms the world has seen, offering OS, services, software, hardware, stores, broadband, and mobile.

Global anti-trust laws are synchronized by world trade bodies, so a ruling in one nation will apply to most other industrialized nations. T/F

False- In the United States, after a nearly two-year probe, one of the biggest investigations in history (generating over 9 million pages in testimony), the Federal Trade Commission (FTC) has essentially said "no," at least for now.

Google's moves to allow hotel bookings directly from search pages have been well received by its large advertisers, Priceline and Expedia. T/F

False- Making Google more relevant, especially on mobile, makes sense, but the new functionality comes with risks. Google's move into travel booking is upsetting some of the firm's biggest customers.

One way to enhance security against malware on smartphones is to modify the phone to work off network. T/F

False- Most smartphones have layers of security to block the spread of malware, so hackers typically hunt for the weakest victims- being off network

Public key encryption is considered far weaker than private key encryption, so most websites avoid using public key system T/F

False- Most websites that deal with financial transactions (e.g., banks, online stores) secure transmissions using a method called public key encryption. The system works with two keys-a public key and a private key.

VPN software should only be used on an organization's internal network. Never use VPN software on a public wireless network, as this could give hackers an entryway from your computer into your organization's secure network T/F

False- Public wireless connections pose significant security threats.

Google's dominance in search has discouraged all rivals, save for Microsoft with Bing, from improving or investing in competitive efforts. T/F

False- Rivals in search include established players like Yahoo! and relative newcomers like Wolfram Alpha

One career thought to be 'safe' from disruption by technology is journalist, since a computer could never write a newspaper article or a book. T/F

False- The PA Media news service uses AI dubbed RADAR (for Reporters and Data and Robots) to write 50,000 local news stories.

Students are discouraged from using over-the-Internet backup services since these are known sources for security vulnerability. T/F

False- The most likely threat to your data doesn't come from hackers; it comes from hardware failure. Yet most users still don't regularly back up their systems. Internet backup services can provide off-site storage and access if disaster strikes.

he encryption math behind OpenSSL is so solid and would require such an extensive amount of computing power to execute a brute-force attack, that OpenSSL had (as of the writing of the textbook) never been compromised. T/F

False- While encryption math is quite strong, that does not mean that all software using this math can't have other bugs that create vulnerabilities.

The success of the firm's search business has made the firm more risk averse. T/F

False- allows them to experiment more

Google has been a relentless experimenter, even encouraging employees to spend 20 percent of their free time on new efforts. The primary benefit of "20 percent time" is seen as an employee retention-targeted job perk, since very few "20 percent time" projects have actually resulted in efforts Google has launched. T/F

False- half of Google products got their start in 20 percent time.

The high customer costs of cloud computing raise the barriers to entry for startup technology firms seeking cloud services. T/F

False- lowers

Google owns a mobile phone network. T/F

False- owns mobile virtual network operator

Collaborative filtering is determining which customers are likely to leave, and what tactics can help the firm avoid unwanted defections. T/F

False- personalizing an individual customer's experience based on the trends and preferences identified across similar customers.

Studies have shown that while online advertising is growing, the take from the Big Three—Google, Microsoft, and Amazon—is getting larger while the percentage of revenue earned by firms outside the Big Three is shrinking.

False- the Big Three—Google, Facebook, and Amazon—is getting larger while the percentage of revenue earned by firms outside the Big Three is shrinking.

Google Glass has not made any other measurable impacts for other industries. T/F

False- uccessful breakout in the medical community, where it was used during an operation to remove an abdominal tumor.

One of the biggest problems facing Internet access for the world's poor is that such a small percentage of the global population living poverty lives near a mobile cellphone tower. T/F

False. 85% of population lives within range if cell tower

By default, a post by a "liked" firm or friend will appear in your feed. T/F

False. Algorithm determines what you see based on what it believes you want to see

In order to expand earned-media reach, organizations should include a request at the end of their Facebook posts that requests that users reshare the information. T/F

False. Begging for shares gets posts punished

While blogs are effective for communicating with the public, firms shouldn't use blogs for internal communication since everyone can see them. T/F

False. Can be encrypted

SaaS means a greater consumerization of technology, which is rarely, if ever, works out well for firms T/F

False. Can foster creativity and lower cost solutions

The fixed cost to produce a software product is effectively zero. T/F

False. Fixed is expensive, duplicating is effectively zero

In contrast to other major platforms, there has never been a major open source software security vulnerability. T/F

False. Heartbleed incident

Facebook COO Sheryl Sandberg's ad industry experience was cultivated at Yahoo! T/F

False. It was from Google

Bloggers and other users of social media often refer to the MSM. This phrase stands for Media Social Methods. T/F

False. MSM= Mainstream Media

App platforms lower the switching costs of software developers when compared to costs associated with developing browser-based alternatives. T/F

False. Makes it more costly to switch

Dynamic pricing is considered especially appropriate for retailers, such as grocery stores or department stores. T/F

False. Not good for places with repeat purchases and alternative choices

Roughly 80 percent of corporate data is messy and unstructured, and stored in conventional, relational formats. T/F

False. Not stored in conventional and relational formats

Most of the time, server hardware resides on server-class software. T/F

False. PC/Laptios can run server software, just weaker

You will often hear scrum described as having roles, artifacts, and blueprints T/F

False. Roles, Artifacts, and Ceremonies

Most firms will opt for an IT configuration that is 100 percent in-house, packaged, or SaaS. T/F

False. Tech decisions are not binary for whole organization in all situations.

Virtualization offers firms many advantages, but one disadvantage is that it requires firms to buy more server computers than if organizations had not deployed virtualization. T/F

False. This stops firms from buying separate server computers(virtual computers on a single machine)

Corporations will want to be cautious about what is posted to wikis since wikis can be accessed by anyone. T/F

False. Too many people review it and internal firewalls protect fake news

Products and services designed to target a specific industry are known as horizontal niches. T/F

False. Vertical niches/specialized markets

The three "Vs" of Big Data refer to the names of the three leading commercial and open source technologies used in most of these efforts. T/F

False. Volume, Velocity, and Variety

What is perhaps the most significant contributor to Facebook's ability to strengthen and deliver user value from the social graph?

Feeds

Which of the following statements is true regarding enterprise systems?

For many firms, installing and deploying enterprise systems have been difficult, with some firms experiencing loss or even bankruptcy from botched efforts.

Those looking to share open source projects, contribute to these projects, or examine the code of projects (a great way to learn) should visit the site ___________.

GitHub

__ allows users to use their phones pay for goods, store gift cards, collect and redeem coupons and special offers, and manage loyalty programs.

Google Pay

The Walmart efficiency dance starts with a proprietary system called _________, a system originally developed in 1991 and continually refined ever since.

Retail Link

_ refer to protesters seeking to make a political point by leveraging technology tools, often through system infiltration, defacement, or damage.

Hacktivists

___ is a set of mostly open source tools to manage massive amounts of unstructured data for storage, extraction, and computation.

Hadoop

The ______________ framework represents a series of standards for best practices in implementing, maintaining and improving organizational security.

ISO 27000

With _______, firms get the most basic offerings but can also do the most customization, putting their own tools (operating systems, databases, programming languages) on top.

IaaS

What is a valid observation regarding information security?

Information security isn't just a technology problem.

The term for techniques used to improve a page's rank in search results is:

SEO

Which of the following is true about SaaS?

Its associated costs are treated as variable operating expenses rather than fixed capital expenses.

__ is insight gained from experience and expertise.

Knowledge

Which of the following can be a major roadblock to turning data into information, and inhibits firm agility, holding back operational and strategic initiatives?

Legacy systems

_ is the process of creating a series of bogus websites, all linking back to the pages one is trying to promote.

Link fraud

Which of the following is considered to be the flagship open source software product?

Linux

__ are systems that provide rewards and usage incentives, typically in exchange for a method that provides a more detailed tracking and recording of customer activity.

Loyalty programs

___ refers to a type of artificial intelligence that leverages massive amounts of data so that computers can improve the accuracy of actions and predictions on their own without additional programming.

Machine learning

Which of these is NOT a reason that so many are offline in the world? Many of the world's populations do not live within range of a cell tower with at least 2G data network. The services aren't designed for emerging market use by populations who have ultra-low bandwidth services that run reliably on very low-end or old, recycled hardware. The data is too expensive for many of the world' poorest citizens. All of these are reasons that so many potential users are offline. The content is not compelling enough to draw in non-users.

Many of the world's populations do not live within range of a cell tower with at least 2G data network.

__ is the value of a firm calculated by multiplying its share price by the number of shares.

Market cap

Which of the following is not considered advantages of apps over packaged software and browser-based alternatives?

Most app stores provide localization efforts, translating content uploaded by developers into language systems offered in local app stores throughout the world.

The technology used to enable the wireless payment scheme in Google Pay is known as

NFC

L.L. Bean's rollout of Big Data efforts for improved customer service involved all of the following except: None of the above are incorrect—the effort leveraged all of the above. Training technical staff Training marketing staff On-premises technology was moved to Google's Data Cloud Reporting tools were made available to nontechnical staff

None of the above are incorrect—the effort leveraged all of the above.

One of the reasons behind Beacon's failure is a common one: managers failed to completely consider the components and interplay among elements in an information system. Which of the following is not a component of an information system (IS)? People None of the above, all of the above are components of IS Hardware Procedures Software Data

None of the above, all of the above are components of IS

__ refers to a method of querying and reporting that takes data from standard relational databases, calculates and summarizes the data, and then stores the data in a special database.

Online analytical processing

_______ offerings—free alternatives where anyone can look at and potentially modify a program's code.

Open source software

________ are media from communication channels that an organization controls. These can include firm-run blogs and websites, any firm-distributed corporate mobile website or app, and organization accounts on social media such as Twitter, Facebook, Pinterest, YouTube, and Instagram.

Owned Media

________ refers to efforts where an organization pays to leverage a channel or promote a message. Paid media efforts include things such as advertisement and sponsorships.

Paid Media

Which of these is not a Google-backed effort to improve broadband access to Internet services?

Project X

Which of the following is usually not an option for firms relying on unique processes, procedures, or technologies that create vital, differentiating competitive advantage?

Purchasing package software from a vendor to automate such efforts

Which of the following observations regarding software as a service is true?

Radical changes in a SaaS system's functionality might result in unforeseen training costs.

Which of the following is by far the most common standard for expressing databases?

Relational databases

An integrated shopping experience and unified customer view across channels is sometimes referred to as ___

omnichannel

Which of the following refers to sites that wrap data in invisible tags that can be recognized by search engines, analysis tools, and other services to make it easier for computer programs to accurately categorize, compare, and present this information?

Semantic Web

__ are massive networks of computer servers running software to coordinate their collective use.

Server farms

The term "software" is used to refer to:

Set of instructions that tells the hardware what to do

_____ is an attempt to profit from a falling stock price.

Short Selling

Which of the following is a customer relationship management software?

Siebel

Why is it potentially easier for services delivered over mobile apps to recreate a social graph than it is for users of a browser-based service?

Smartphones can access a user's address book

The _______ breed of cloud-based data tools is specifically designed to gather data from disparate sources and turn them into standard formats that can be interrogated by managers.

Snowflake

_____ refers to a false online persona created to promote a particular point of view often in praise of a firm, product, or individual.

Sock puppet

__ is a form of cloud computing where a firm subscribes to a third-party software-replacing service that is delivered online.

Software as a service

______ are methods to divide tasks related to software creation and deployment up into tasks targeted at building better products.

Software development methodologies

_____ systems help a firm manage aspects of its value chain, from the flow of raw materials into the firm through delivery of finished products, and services at the point-of-consumption.

Supply chain management

The cost a consumer incurs when moving from one product to another is known as _____.

Switching Costs

Which of the following is a true statement regarding the Starbucks Rewards program?

The app allows customers to scan purchases made outside the store.

_____ occur(s) when others take advantage of a user or service without providing any sort of reciprocal benefits.

The free rider problem

What reason did Mark Zuckerberg give for acquiring Oculus VR?

To start building what Zuckerberg hopes is the next major computing platform that will come after mobile

_____ are links in a blog post that refer readers back to cited sources.

Trackbacks

A white hat hacker looks for weaknesses in security mechanisms, with a view to help plug the holes that might be exploited by cyber-criminals. T/F

True

Although Microsoft has been tremendously profitable over the past decade, its stock price has been relatively flat over those years. T/F

True

Although the attack on Target was one of the largest credit card breaches in U.S. business history, the software that executed the attack was not considered to be especially sophisticated. T/F

True

As of early 2021, five of the top ten most popular Internet sites in the world focused on social media, peer-produced content. T/F

True

As users spend more time in apps, this presents a challenge to Google's dominance in search. T/F

True

At the time of its IPO, Facebook earned no money from mobile advertising, but today mobile brings in the majority of the firm's ad revenue. T/F

True

Blogging can be an effective tool for firms to share opinions directly with the public without communication being filtered by a journalist or narrowed by the editor of a third-party publication.

True

By mid-2018, Instagram and WhatsApp Story features were larger than all of Snapchat’s daily active user base. T/F

True

Concern over managing a firm's online image has led to the rise of an industry known as online reputation management. T/F

True

Critics worry that for billions of low-income users, Facebook will come to represent the only Internet they know and have access to, deepening the roots and entanglement vines of the firm's walled garden. T/F

True

Data quantity answers the question: How much data do we need? T/F

True

EDI is a very old standard. The two main technologies replacing EDI are extensible markup language (XML), and JavaScript Object Notation (JSON) T/F

True

Embedded systems are special purpose software designed and included inside physical products. T/F

True

Even specialty devices like video game consoles, television set-top boxes, Kindles and smart appliances run some form of OS. T/F

True

Expert systems are used in tasks ranging from medical diagnoses to product configuration. T/F

True

In 2018, a research firm, Cambridge Analytica, detailed a surreptitious campaign to harvest user data on a wide scale—unleashing a big firestorm for Facebook. T/F

True.

Salesforce.com's Chatter, Microsoft's Yammer, HipChat, and Slack are all services that have been billed as "_____________."

Twitter for the Enterprise

What is one of the differences between Twitter and Facebook?

Twitter settings allow asymmetrical following, unlike Facebook

Why have U.S. technology firms complained that U.S. government surveillance techniques put them at a disadvantage relative to foreign firms?

U.S. firms complain that the actions of surveillance agencies have put them at a disadvantage by damaging their reputation.

Facebook allows any developer to add a Facebook "Like" button to their site with just a few lines of HTML code. What advantage do websites leverage by integrating this feature?

Viral distribution

Which software allows a single computer to function as if it were several different computers?

Virtualization software

Which of the following statements is true about Facebook's acquisition of WhatsApp? While WhatsApp's messaging lagged Facebook's in the high-growth markets of India, Brazil, and Mexico, the service was growing at a faster rate. WhatsApp had fewer global users than SnapChat, but SnapChat refused Facebook's acquisition offer, so the WhatsApp purchase made Facebook a strong number-two player in mobile messaging. WhatsApp's average revenue per user in developing markets is actually higher than Facebook's. WhatsApp was popular in markets where Facebook is blocked by local governments. WhatsApp's share of the global mobile messaging market was so much greater than Facebook's, Zuckerberg saw WhatsApp as the best way for Facebook to remain relevant in this market.

WhatsApp's share of the global mobile messaging market was so much greater than Facebook's, Zuckerberg saw WhatsApp as the best way for Facebook to remain relevant in this market.

What has crowd wisdom as its underlying principle?

Wiki

The bulk of Facebook's revenue is earned through:

advertising.

Packaged enterprise systems can: make data more usable ease the linking of systems with software streamline processes all of the above

all of the above

Feature creep can be defined as:

an expansion of the scope of a project.

Programming hooks, or guidelines published by firms that tell other programs how to get a service to perform a task such as send or receive data, are known as _____.

application programming interfaces

A(n) _____ is software that houses and serves business logic for use by distributed systems.

application server

A task board is an example of a(n) ________, while a daily scrum is an example of a(n) _________.

artifact; ceremony

Algorithms that learn based on data that includes bias may be __

biased

The ___________ nature of AI makes it especially difficult to transparently demonstrate how machine learning software has arrived at decisions.

black box

A process-improvement approach that can assist in assessing the maturity, quality, and development of certain organizational business processes, and suggest steps for their improvement is known as:

capability maturity model integration.

The factors that can determine a given ad's quality score in Google includes the:

click-through rate.

The term _____ refers to a collection of computing resources available for access over the Internet.

cloud

Relating the Facebook platform to sources of value from network effects, developers creating applications create ___________________ that have the potential to add value to Facebook beyond what the firm itself provides to its users.

complementary benefits

An organization is said to be _____ if its systems operate within required legal constraints, and industry and organizational obligations.

compliant

Advertising based on a website's content is known as:

contextual advertising.

Facebook's _______________ effort, where users were asked to look at Facebook phrases and offer translation suggestions for their local language, helped the firm rapidly deploy versions in dozens of markets.

crowdsourcing localization

Data used in online analytical processing (OLAP) reporting are stored in _____

data cubes

A(n) _____ is a database or databases focused on addressing the concerns of a specific problem.

data mart

For ____________ to work, the organization must have clean, consistent data; and the events in that data should reflect current and future trends.

data mining

Setting up new collection efforts, surveys, or systems to obtain the data is called ________.

data sourcing

A set of databases designed to support decision making in an organization is known as a(n):

data warehouse

A _____ is either a single table or a collection of related tables.

database

Most enterprise software works in conjunction with a _______________, which stores and retrieves the data that an application creates and uses.

database management system (DBMS)

The term _____ refers to Internet content that cannot be indexed by Google and other search engines.

deep Web

A link that takes a user to a specific webpage (rather than the home page) or which launches an app and brings up a unique location rather than just launching the app is referred to as _____________.

deep linking

So-called ______ technology creates bogus media—images, sound, or video—creating or superimposing media in a way that makes it appear that a false event actually took place.

deepfake

An attack in which a firm's computer systems are flooded with thousands of seemingly legitimate requests, the sheer volume of which will slow or shut down the site, is known as:

distributed denial of service.

Google's ad network gives it:

distribution

Walmart stopped sharing its data assets with information brokers like ACNielsen and Information Resources because:

due to Walmart's huge scale, the agencies offered no extra value with their additional data.

One of the physical threats hackers use, sifting through trash searching for valuable data, is called__________________.

dumpster diving

Changing pricing based on demand conditions is known as:

dynamic pricing

A(n) _____ to social media refers to an established online presence where customers can reach and interact with a firm.

embassy approach

Google technology has been engineered so that no single point of failure should interrupt the firm's operations. Systems that have such safeguards against interruption are said to be:

fault tolerant.

Pioneered by Facebook but now adopted by most services, _____ provide a timely list of the activities of and public messages from people, groups, and organizations that an individual has an association with.

feeds

A phrases table, column, and row are also referred to by the names ___________ respectively.

file, field, record

Oracle, a firm that sells commercial ERP and database products, provides Linux for free, selling high-margin Linux support contracts for as much as $500,000. This is an example of:

firms using OSS to wean customers away from competitors.

A(n) ______ is a model building technique in which computers examine many potential solutions to a problem, iteratively modifying various mathematical models, and comparing the modified models to search for a best alternative.

genetic algorithm

A security tool that is deployed by firms as a phony target to lure or distract attackers and gain information about them is known as a:

honeypot

RFID technology is often used to ____

identify products as they move through an organization's value chain

Netflix leveraged crowdsourcing by offering one million dollars to the first team to:

improve accuracy of its movie recommendations by 10 percent.

A(n) _____ is an application for programmers, which includes a text editor, a debugger for sleuthing out errors, and other useful programming tools.

integrated development environment

Advertisements that are targeted based on a user's query are referred to as _____.

keyword advertising

Operating systems are designed to give programmers a common set of commands to consistently interact with the hardware. These commands make a programmer's job easier by:

making it faster to write software while minimizing the possibility of errors in code.

Ad rank on Google is calculated using the equation: Ad Rank = f (bid value a.k.a. __________ an advertiser is willing to pay, Quality Score, expected impact of extensions and formats).

maximum CPC

The problem of incompatible legacy systems limiting firms' ability to turn data into information is compounded by:

mergers and acquisitions

Search engine results returned and ranked according to relevance are known as a(n):

natural or organic search.

Advertisers can use _______, which tell networks to avoid showing ads when specific words appear.

negative keywords

Malware _____ are a sort of electronic fingerprint often used to recognize malicious code.

signatures

A problem limiting the turning of data into information is that most transactional databases are not set up to be:

simultaneously accessed for reporting and analysis.

Con games that trick employees into revealing information or performing other tasks that compromise a firm are known as _____ in security circles.

social engineering

A(n) _____ is software that traverses available Web links in an attempt to perform a given task.

spider

The term _____________ refers to forging or disguising the origin or identity.

spoof

In the context of open source software, the term "hardened" is used to describe:

technology products with particularly strong security features.

Using ____________, the firm makes money off its 2 billion+ users, even when they're not on Facebook's own sites and apps.

the Facebook Audience Network

The Nest thermostat or app-controlled lighting and door locks are part of a category of products known as _______________.

the Internet of Things

True platform independence can be defined as:

the ability for developers to write code that can be run everywhere.

The major concern regarding software as a service involves:

the high dependence a firm develops with its SaaS vendor.

Facebook has offered a system where website operators can choose to accept a user's Facebook credentials for logging in. Users appreciate this feature because:

they can access content without having to create a new account

The phrase __________________ refers to security schemes that automatically send one-time use representations of a credit card which can be received and processed by banking and transaction firms at the time of payment. They are used in Apple Pay and Android Pay.

tokenization

The costs associated with the design, development, testing, implementation, documentation, training and maintenance of a software system are collectively referred to as:

total cost of ownership.

A system that records business-related exchanges, such as a cash register sale, ATM withdrawal, or product return is known as a(n) _____.

transaction processing system

Exploits that attempt to infiltrate a computer system by masquerading as something that they are not are called:

trojans

From the privacy and user-content fiascos faced by Facebook, managers can learn that:

violation of public trust can lead to intense public scrutiny and regulatory consequences.

When a firm runs an instance of a PC's software on another machine and simply delivers the image of what's executing to the remote device, it is said to be operating on a(n) _____.

virtual desktop

A server running _____ software can create smaller compartments in memory that each behave as a separate computer with its own operating system and resources.

virtualization

A(n) _____ is a closed network or a single set of services that is controlled by one dominant firm

walled garden

Programs that use _____ are highly restrictive, permitting communication only with pre-approved entities.

whitelists

The key difference between viruses and worms is that:

worms do not need an executable to spread, unlike viruses.


संबंधित स्टडी सेट्स

Ch 18 - Case Study: Diets for Disease Prevention

View Set

Honors Psychology Unit 6: Social Cognition, Emotion, and Persuasion

View Set

5.8 Reactions to the Industrial Economy

View Set

Espanol - Temas y preguntas para el examen oral

View Set

History of Rock 'n Roll Final Study Guide

View Set

ORDER: 1-55 (TEST 1), 56-115 (TEST 2),

View Set