Acc 270 Final Exam

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

A potential roadblock to transition of DSL to FTTH is the: A. high costs of building entirely new networks. B. scarcity of the material required to create the cables. C. impracticality of switching to a technology that is not proven yet. D. location driven quality of service offered by fiber optic technology. E. high possibility of external interference and hence, fears of information security.

A

All of the costs associated with the design, development, testing, implementation, documentation, training and maintenance of a software system are collectively termed as: A. total cost of ownership. B. economies of scale. C. economic value added. D. return on investment. E. cost to company.

A

Mobile providers can be susceptible to poor coverage indoors as a result of: A. spectrum used by most mobile phone firms that does not travel well through solid objects. B. a high degree of latency. C. network congestion that clogs up the network traffic. D. a lack of sufficient number of towers owing to the not-in-my-backyard problem. E. an increase in bandwidth demand placed on their networks.

A

Several surprising findings were revealed in the wake of the Target breach, providing a cautionary tale for all executives and security professionals. Which of the following was not thought to have occurred during the Target security breach? A. Target had security software, but the notification alerts from the software were ignored. B. Target had properly installed and configured its security software, but hackers got in, anyway. C. Credit card databases were on entirely separate systems, not connected to other parts of the firm's information system, but wireless networking allowed hackers to access anything reachable from a cell phone connection. D. Target regularly monitored file names and matched them to file sizes and archival copies to ensure that software was not installed on their systems using the names of legitimate products, but hackers saved files with blank file names so they wouldn't be detected. E. All of the above

A

The hypertext transfer protocol (http) defines the communication between: A. Web browsers and Web servers. B. operating systems and Web browsers. C. hardware and operating systems. D. mail servers and hardware. E. hardware and Web browsers.

A

The software business is extremely profitable compared to the hardware business because: A. the marginal cost to produce an additional copy of a software product is effectively zero. B. of the lack of market price regulations and guidelines. C. software producers serve niche businesses sectors with high profit margins. D. software development is a one-time process with no upgrade costs. E. software firms benefit from special tax exemptions that aid profitability.

A

Which of the following is an example of application software? A. MS Word B. iOS C. Linux D. MS Windows E. Android

A

Which of the following is not an example of larger, conventional firms working with sharing economy startups? A. Apple's purchase of Beats to give new musical artists more exposure. B. Condé Nast's investment in Rent the Runway. C. Google's investment in Uber. D. Walgreens' partnership with TaskRabbit. E. W Hotel partnering with Desks Near Me.

A

Which of the following is true of scripting languages? A. They are often designed to be interpreted within their applications. B. They are compiled to run directly by a microprocessor. C. They typically execute outside an application. D. They are faster than the development efforts found in most commercial software. E. Most of these languages are complicated with respect to user friendliness.

A

Which of the following is true of the difference between operating systems and application software? A. Operating systems control the hardware, while application software performs the work that users and firms are directly interested in accomplishing. B. Operating systems support tasks performed by a single user, while application software support tasks performed by multiple users. C. Operating systems control the hardware elements visible to the human eye, while application software controls the hardware elements invisible to the human eye. D. Operating systems are software packages that integrate the many functions of a business, while application software works with a minimal degree of overlap. E. Operating systems are software packages offered by a third party, while application software contains programs that are designed in-house.

A

A research scientist with a major pharmaceutical firm in New Jersey is caught passing on sensitive information, worth millions of dollars, regarding the composition and test results of his firm's latest drug to a rival company. What crime is he being held responsible for? A. Cyber-fraud B. Corporate espionage C. Carrying out technology disruptions D. Extortion E. Illegal funds transfer

B

Circuit-switched networks provide connection between two parties that: A. uses a single router for each individual on either end of the connection. B. is dedicated for use by the parties for the duration of a connection. C. repeatedly switches between an open and closed state depending on whether someone is speaking or other noise is being transmitted during a call. D. slicing up the conversation into smaller chunks and transmitting them over a shared circuit that mixes content with other callers but routes and reassembles a call to the correct recipient. E. prioritizing voice calls over other connections on IP networks.

B

Computer hardware refers to: A. a precise set of instructions that orchestrate the functioning of the computer. B. the physical components of information technology. C. the mechanism through which users interact with a computer. D. a program that fulfills the requests of a client. E. handheld computing devices meant largely for mobile use outside an office setting.

B

Cyber criminals who infiltrate systems and collect data for illegal resale are called _____. A. cash-out fraudsters B. data harvesters C. corporate spies D. ethical hackers E. information hoarders

B

Data becomes _____ when it is presented in a context so that it can answer a question or support decision making. A. knowledge B. information C. a database D. wisdom E. a relational language

B

Most transactional databases are not set up to be simultaneously accessed for reporting and analysis. As a consequence: A. navigational databases are being preferred over transactional databases. B. data is not efficiently transformed into information. C. firms prefer to outsource data mining operations to third-party firms. D. analysts must also become transactional specialists. E. most firms incur additional expenditure to effectively record transactions.

B

Technologies that measure and analyze human body characteristics for identification or authentication are known as _____. A. overlamination processes B. biometrics C. smart tags D. bio-embedded systems E. holographs

B

Which of the following is not true regarding the competitive dynamics of most sharing economy marketplaces? A. Ratings represent a switching cost built over time by early participants in sharing economy marketplaces. B. Late-movers have a substantial advantage in this market since inventory should be cheaper to acquire for those firms that have entered markets more recently. C. Network effects should grow over time, favoring firms that got a successful, early start over rivals who arrived late doing the same thing. D. These are two-sided markets. E. None of the above - all statements are true.

B

Which of the following is one of the characteristics of using software as a service model? A. Longer deployment times B. Scalable systems C. Fixed operating expenses D. Heightened financial risk E. Higher maintenance costs

B

Which of the following is true of software as a service (SaaS)? A. Firms spend more using SaaS. B. It refers to software that is made available by a third-party online. C. Due to US and European legal requirements, there are no accounting and corporate finance implications for SaaS in these regions. D. Saas firms face diseconomies of scale. E. SaaS vendors are less attuned to customer needs.

B

Which of the following sets of software represents the constituents of the LAMP stack? A. LimeWire, Acrobat Reader, Mozilla, Python B. Linux, Apache, MySQL, Perl C. Lingo, Afnix, Moby, PPL D. Linux, Android, Mac OS X, PHP E. LimeWire, AppleScript, MATLAB, Photoshop

B

Which of the following was considered a contributor to vulnerabilities in the OpenSSL security product, known as the Heartbleed bug: A. Overseas hackers modified the open source code and uploaded a compromise version to the Internet, which became widely used. B. Few developers were working on the project, so the ideal that "given enough eyeballs, all bugs are shallow" wasn't met with OpenSSL. C. Developers failed to see a major incompatibility with versions of the Windows operating system and Chrome browser. D. There was no commercial entity overseeing the project. E. A Linux update was not coordinated with OpenSSL, leaving a gaping hole when the two products were used together to transmit content over the Internet.

B

_____ is a class of computer software that seeks to reproduce or mimic human thought, decision making, or brain functions. A. Biometrics B. Artificial intelligence C. Android D. Legacy software E. Intranet

B

A protester seeking to make a political point by leveraging technology tools, often through system infiltration, defacement, or damage is called a(n) _____. A. activist B. cyber agitator C. hacktivist D. ethical hacker E. cybersquatter`

C

Entrepreneurs are scrappy in their quest to gather market intelligence and understand how customers respond to their offerings. How did Airbnb's CEO gather additional intelligence on how the firm was being used? A. He bought several apartments to rent out under Airbnb B. He became an Uber driver C. He lived out of Airbnb rentals full-time D. He became a bell hop at a San Francisco Hilton Hotel E. All of the above

C

In database systems, a table is also known as a _____. A. field B. record C. file D. row E. key

C

In database terminology, a record represents: A. a list of data, arranged in columns and rows. B. all of the data in a given column. C. a single instance of whatever the table keeps track of. D. a field or combination of fields used to uniquely identify a file. E. one or more keys that relate separate tables in a database.

C

Sifting through trash in an effort to uncover valuable data or insights that can be stolen or used to launch a security attack is known as: A. trash recovery. B. junk exploring. C. dumpster diving. D. scrap sifting. E. data sieving.

C

Software (often on firmware) designed to make physical products and devices "smarter" by doing things like sharing usage information, helping diagnose problems, indicating maintenance schedules, providing alerts, or enabling devices to take orders from other systems is referred to as ___________. A. Desktop software programs B. Enterprise Resource Planning systems C. Embedded systems D. Multi-threaded E. Application servers

C

To overcome reception and availability problems, mobile telecom services firms have begun _____ that provide a "five bar" coverage in a roughly 5,000-square-foot footprint. A. providing incentives to communities that allow the construction of towers B. leveraging GEO and LEO technologies C. offering femtocells D. providing wi-fi base stations at very low costs E. switching from Wi-Fi to WiMax

C

What is the difference between collaborative consumption firms Zilok and Chegg. A. Zilok has gone public, Chegg hasn't. B. Zilok is a service where a person comes to your home to complete a task, Chegg is a rental firm. C. Zilok provides inventory provided by participating 'citizen suppliers', Chegg owns its own inventory. D. Zilok is the European equivalent of Chegg. E. Zilok was purchased by Chegg underscoring the 'winner take all' dynamics of these markets.

C

Which of the following is a valid statement on information security? A. Security breaches cannot be prevented despite the adoption of the best security policies. B. Technology lapses are solely responsible for almost all security breaches. C. Information security is everybody's responsibility. D. Greater expenditure on security products is the only way to contain security breaches. E. A reactive, rather than proactive, approach is better suited for dealing with security breaches.

C

Which of the following is one of the benefits enjoyed by SaaS vendors? A. Development across multiple platforms B. Limits accessibility to resources by just about anybody C. Lower distribution costs D. Lower hardware maintenance costs E. Faster product deployment

C

_____ are software systems designed to support interoperable machine-to-machine interaction over a network. A. Scripting languages B. Client-servers C. Web services D. Caches E. Business intelligence systems

C

_____ is a term used to describe unpredictable, but highly impactful events. A. Straddling B. Viral trojans C. Black swans D. Power plays E. Flash outs

C

A(n) ________ is a software program that makes requests of a server program.

Client

Attacks that are so new that they have not been clearly identified, and so have not made it into security screening systems are called _____. A. novel attacks B. first mover attacks C. non-precedent breaches D. zero-day exploits E. brute force attacks

D

Oracle, a firm that sells commercial ERP and database products, provides Linux for free, selling high-margin Linux support contracts for as much as five hundred thousand dollars. Oracle's motivation for this lies in: A. accelerating the shift of open source software towards a proprietary regime. B. using open source software to fuel sales of hardware. C. impoverishing other open source developers and furthering its own proprietary offerings. D. using open source software to wean customers away from competitors. E. protecting itself from the risks of distributing code while unaware of legal implications.

D

Peering usually takes place at neutral sites called _____. A. https B. IPs C. ISPs D. IXPs E. STPs

D

The acronym HFT refers to: A. High Finance Telecommunications B. High Fidelity Transmissions C. Hedge Fund Transfers D. High Frequency Trading E. Hypertext File Transfer

D

Which of the following statements is true about Airbnb's revenue model? A. Airbnb currently does not make money via transactions, only from advertising listings on its website. B. Airbnb only charges property owners who rent on the website. C. Airbnb only charges guests who rent on the website. D. Airbnb charges both property owners and guests as part of transactions on their website. E. Airbnb doesn't charge transactions for the three years after it enters a market, so as to generate two-sided network effects of property rents and guests searching for properties to stay in.

D

Why do firms need to create separate data repositories for their reporting and analytics work? A. Most firms store their data assets offsite to insure themselves against the possibility of data damage through natural disasters. B. Maintaining huge databases can be a cost-sink for most firms. C. Most organizations need to differentiate data derived in-house and from data aggregators. D. Running analytics against transactional data can bog down a TPS. E. Reporting and analytics are two separate functions, each requiring its own separate database specifically formatted to the needs of the management team.

D

_____ refers to software for creating, maintaining, and manipulating data. A. Extranet B. ROM C. RAM D. DBMS E. Internet 2

D

A _____ is a system that provides rewards and usage incentives, typically in exchange for a method that provides a more detailed tracking and recording of consumer activity. A. sugging report B. canned report C. dashboard D. legacy system E. loyalty program

E

A(n) _____ refers to a heads-up display of critical indicators that allow managers to get a graphical glance at key performance metrics. A. interstitial B. embassy C. canned report D. prediction interface E. dashboard

E

In database systems, a _____ defines the data that a table can hold. A. row B. key C. record D. file E. field

E

Systems that deny the entry or exit of specific IP addresses, products, Internet domains, and other communication restrictions are said to employ a(n): A. intrusion detection software. B. access restriction software. C. whitelists. D. anti-virus software. E. blacklists.

E

The Internet Protocol Suite consists of the Internet Protocol and _____. A. File Transfer Protocol B. Simple Mail Transfer Protocol C. Session Initiation Protocol D. Datagram Congestion Control Protocol E. Transmission Control Protocol

E

The domain name service (DNS) is a distributed database that allows users to communicate with other computers by: A. assigning IP addresses to different domain names. B. mapping host names to domain names. C. creating IP addresses that are unique to servers. D. assigning domain names to different IP addresses. E. mapping host and domain names to IP addresses of computers.

E

This process of converting a code into machine-readable form is known as: A. integrating. B. assimilating. C. debugging. D. sequencing. E. compiling.

E

Which of the following applications is most likely to use UDP instead of TCP? A. E-mail B. Web transmissions C. File transfer D. Peer-to-peer downloads E. Web-based phone calls

E

Which of the following are considered sources of information that can potentially be used by social engineers? A. LinkedIn B. Corporate directories C. Social media posts D. Contests or surveys E. All of the above

E

Which of the following is one of the sources of revenue for open source vendors? A. Licensing OSS for incorporation into subsequent open source products B. Selling open source products at prices well below commercial products C. Marketing versions of open source software masked as proprietary software D. Claiming royalties on software based on open source code E. Selling support and consulting services

E

_____ provide the standards, syntax, statements, and instructions for writing computer software. A. Operating systems B. Application servers C. Database management systems D. Platforms E. Programming languages

E

As per the chapter, firms classified as being part of the sharing economy and collaborative consumption are still considered too risky to attract substantial venture capital investment. A. True B. False

False

If eBay and Craigslist are included, some 40 percent of the US and Canadian population have participated in the sharing economy. A. True B. False

True

Social media profiles can also be used to fight online fraud. A. True B. False

True

Uber prices services according to demand. This allows the company to increase rates during peak periods in order to attract more potential suppliers into the market to meet demand. A. True B. False

True

Uber's CEO views itself as software platform for shipping and logistics. A. True B. False

True

When referring to the 'software layer cake' model, Android, Windows, and iOS are all _______

operating systems


Set pelajaran terkait

PrepU questions for MS 3 1st exam

View Set

EMT-Chapter 24 -Gynecologic Emergencies

View Set

Psych 5.1 Sensation and Perception

View Set

Ch 3 - Balance Sheet and Disclosure notes

View Set

Rocks and Minerals: Silicate Family

View Set