Computer Fundamentals for Business - Concept Assessment 2 Study guide
Why is a denial-of-service attack (DoS attack) a threat to data availability?
By flooding a system with incoming messages, a DoS attack forces the system to shut down, rendering it inaccessible to the users who legitimately have access to it.
Determine which of the following is an example of data that has integrity.
Data that are used to set sales goals for account executives are stored on a secure server; managers are allowed read-only access to the sales data for the reps they directly manage.
Makoto and Rebecca want to hire a nanny for their 6-month-old baby. Before allowing someone into their home to watch their child, they are planning on running a comprehensive background check, including a credit check. Which law specifies whether Makoto and Rebecca are legally allowed to access potential candidate's credit information?
Fair Credit Reporting Act
Excel functions can be found under which tab?
Formulas
Positive and negative numbers/values will impact the __________ Value (FV) calculation.
Future
Which of the following statements best illustrates why a rootkit is described as creating a back door?
Like an intruder coming through a back door, a rootkit allows an unknown user into an operating system.
What do all cybersecurity threats have in common?
They are connected to the loss of information, software, or hardware.
A project manager needs to assess how much progress her team has made on the project, to provide executives with a weekly update. Which collaboration software program will be most useful for assessing the project's status?
Trello
What are the three categories of the detect (DE) function of the NIST Cybersecurity Framework?
analysis, observation, detection
What does business-to-consumer (B2C) e-commerce replace?
brick-and-mortar store locations
Manufacturers of computers and other electronic devices follow the IEEE 802.3 protocol to ensure that their products
can be used to create a standard ethernet connection.
A company just received a government contract to provide onboarding services targeted towards people who want to sign up for Medicare. They will be handling sensitive information, including the users' Social Security numbers and home addresses and will host the login page where people will access their Medicare account online. Which of the following are considered major cloud service providers?
cloud services security
A computer network must be connected to the Internet to support
communicating via email with people on other networks.
The information needed to calculate share of customer is provided, in large part, by
customer relationship management systems.
Share of wallet is also known as share of
customer.
What is the "DE" function in the National Institute of Standards Technology (NIST) Cybersecurity Framework?
detect function
Which cryptocurrency offers a blockchain-based platform that can be used to develop decentralized applications?
ethereum
Which level of share of wallet means that existing customers are spending more to purchase products or services from one organization than they are from direct or indirect competitors?
high share of wallet
What does the General Data Protection Regulation (GDPR) regulate?
how companies protect personal data
According to research by Risk Based security, there were 2037 publicly reported data breaches
in the first half of 2020.
To properly authenticate, or verify, the identity of authorized users and protect assets from unauthorized users, it is essential to
keep user logins and passwords confidential.
One surveillance technology that relies on how the user enters data is a
keylogger.
The amount of time that passes between when a device is asked to perform and when it completes the task is known as
latency.
E-commerce transactions that are executed using wireless mobile devices are known as
m-commerce.
Ransomware basically holds a target hostage because it
makes the target's own data inaccessible.
Which of the following is a goal of an information technology disaster recovery plan (IT DRP)?
outline specific recovery times for information technology to resume after an issue occurs
E-commerce ________ includes creating marketing messages that contain the individual's name, appeal to his/her interests, and take their purchase behavior into account.
personalization
What is the key action called for in the detect (DE) function of the NIST Cybersecurity Framework?
quick identification of a cybersecurity threat
As of 2020, all legislation that has been passed to protect elections from cybersecurity threats are part of
state-specific cybersecurity laws.
For laptops and tablets to use a LAN to connect to the Internet wirelessly,
the LAN device hosting the ISP connection must act as a wireless access point.
The e-commerce company with the highest revenue is based in which country?
the United States
To calculate an organization's customer equity (CE) value we first determine
the future lifetime revenue the organization's customers will generate.
What is the goal of the NIST Cybersecurity Framework Protect (PR) function?
to help protect an organization's IT infrastructure from security breaches by offering guidelines on IT infrastructure protection
What is the main purpose of content delivery networks (CDNs)?
to minimize the distance between website users and website servers
M-commerce is a subset of
traditional e-commerce.
What is the second criteria necessary for adding a block to the blockchain?
transaction verification
E-commerce ________ is the ability of an organization to create a strong presence among consumers in many places, with minimal time constraints, to sell them products and services.
ubiquity
Online content that has been created and posted by unpaid contributors such as customers or fans of a product or service is referred to as
user-generated.
How do CRM systems make troubleshooting customer problems easier?
CRMs store information about customer purchases and interactions.
Which is the best explanation of how the World Wide Web (WWW) differs from the Internet?
The web is only one of many applications that runs on and is accessed through the Internet.
Which threat to cybersecurity can only come from outside an organization?
ransomware
Which NIST Cybersecurity Framework function involves correcting an organization's cybersecurity plans due to a cybersecurity event?
recover (RC) function
What is the "RS" function in the National Institute of Standards Technology (NIST) Cybersecurity Framework?
respond function
An investment firm creates a network designed to facilitate information exchange between devices at its offices in New York City and New Haven, Connecticut. Which type of network would the company use to exchange information?
wide area network (WAN)
A doctor in a small, private practice is looking for a safe way to share and receive patient information with other doctors his patients go to for care. She wants to make sure that any system she uses guarantees her patients privacy and abides by all local, state, and federal regulations (including HIPPA). Her tech adviser recommends a system that uses blockchain. Why would this be a good system for this type of information?
(WRONG ANSWER): Because blockchain can be used for quality assurance purposes, using it in healthcare would ensure that no mistakes were made when treating patients. Guess - In blockchain, a secure connection is created between computers accessing information. This would prevent unauthorized people from accessing any sensitive data.
What is a cloud deployment model?
A cloud deployment model defines the framework of a cloud environment.
If you receive $1,000 15 years from now, what is the PV of that $100 if you use a 7% interest or discount rate?
$362.45
Michelle runs a shop on Etsy. One month, she spends $2,800 to promote her shop on Etsy and other social media sites. In that month, she gains 50 new customers. What is her customer acquisition cost for that month?
$56
If you receive $100 five years from now, what is the PV of that $100 if you use a 6% interest or discount rate?
$74.73
What is the term for a CRM that tracks the type of sale that is most likely to make a person purchase an item that they have previously viewed on an e-commerce site?
(WRONG ANSWER): Product Development Guess - User Experience
Cybersecurity threat mitigation is best defined as the policies, procedures, and tools that help an organization
(WRONG ANSWER): keep its IT assets and other proprietary information confidential and protected from ransomware.
Malicious bots are cybersecurity risks because they
(WRONG ANSWER): ultimately destroy an individual computer's hard drive.
Which of the following is the clearest definition of a computer virus?
Code-created malware that, when executed, damages programs and performance.
How does the cybersecurity goal of preserving data integrity relate to the goal of authenticating users?
Data integrity is more easily preserved if users must be authorized to access data and make changes.
What is the primary reason that businesses use CRM systems to help them identify MQLs and SQLs during the customer acquisition process?
Different engagement is needed to turn each type of lead into a customer.
What is the correct term for the small computer within a smartphone that analyzes the sounds entering your phone through the analog/digital converter?
Digital Signal Processor (DSP)
The abbreviation for Future Value is (___).
FV
Negative numbers are shown with which sign in front of the number?
Minus sign (−)
The abbreviation for Net Present Value is (_____).
NPV
NPER is the acronym for what financial function term?
Number of Periods
The __________ calculates the payment for a loan based on constant payments and a constant interest rate.
PMT
The total amount a series of payments is worth now is called the __________.
PV (Present Value)
Explain the purpose of the National Institute of Standards Technology (NIST) Cybersecurity Framework.
The NIST Cybersecurity Framework is a voluntary guide that helps organizations understand and protect themselves against cybersecurity risks.
Why is it important to preserve the integrity of data, information, and systems?
These assets lose their usefulness and value if their consistency, accuracy, or dependability is compromised.
What is the second step that occurs when placing a call on a cellular network?
Your voice is converted by your phone to an electrical signal that is transmitted via radio waves to the nearest cell tower.
Which of the following is one of the primary components that enable networks and individual devices to connect to the Internet?
a "backbone" of connected hardware and a suite of Internet protocol software
Which of the four criteria is occurring when a network confirms that a transaction has not yet occurred on the blockchain?
a transaction is verified
If a company wants to create a secure computer network that can be accessed and used solely by its employees, it should create
an intranet.
An __________ is a contract between an individual and a company in which you make a lump sum payment or series of payments and, in return, receive regular disbursements beginning either immediately or more commonly at some point in the future.
annuity
"Cybersecurity threat mitigation" includes all of the policies, procedures, and tools that help organizations
anticipate and counter threats from security vulnerabilities or incidents and reduce their impact.
What are the core actions of the protect (PR) function?
controlling access to systems and preventing unauthorized access
Saraiya runs a small café. She would like to start placing small ad buys on social media and hires an analytics firm to determine which platforms she should advertise on. What type of cost would this be considered?
customer acquisition cost
Sales managers must identify the customer leads that best fit the company's goals. CRM assists in this aspect of a company's sales process, which is known as
customer qualification.
A Trojan horse succeeds through
deceptive access.
The purpose of the application protocol layer of TCP/IP is to
define how email programs and other software communicate within and across networks.
In addition to overall digital flexibility, technological savings, and increased collaboration, computing in the cloud provides organizations with
disaster recovery.
The __________ is the interest rate that is actually earned or paid on an investment, loan, or other financial instrument due to the result of compounding interest over a given time period.
effective interest rate
Vector and raster files are
geographic data.
A PaaS vendor offers its clients the ability to quickly build a customer loyalty app that allows customers to earn points for every purchase. The client chooses what features they'd like the app to have from a predetermined list of choices. What is this an example of?
mobile software development kit
When calculating (FV) Future Value of an annuity it is important to set the payment (PMT) to a __________ value.
negative
What is a key advanced technology behind CRM analytics?
online analytical processing
What type of computer users are considered miners?
people who validate cryptocurrency transactions on the digital ledger
To remain relevant in today's e-commerce landscape, many businesses use progressive ________ applications to undertake m-commerce.
web
A benign Internet robot that gathers data is called a(n)
web crawler.
It is especially important for startup companies to create and follow a well-designed e-commerce strategy. Which of the following is the first phase in a well-designed strategy?
web planning
In which situation should the origin of information be authenticated to protect data integrity?
when electronic votes are submitted during an election
What does the abreviation (FV) stand for?
Future Value
The term Internal Rate of Return is abbreviated (____).
IRR
What is the second step in the process of sending a message via the Internet?
Identify the correct domain name.
What is the goal of the planning phase of the plan-protect-respond cycle?
Understand common threats that an organization may face and determine how vulnerable they are to such threats.
How does VPN software ensure that people accessing a network are authorized to do so?
VPN software authenticates users.
Why is establishing authentication procedures a common cybersecurity goal?
Verifying that users are authorized to access systems, data, and resources is fundamental to preventing their unauthorized use.
Manuel runs a small business that paints residential interiors. He has decided most of his current customers can best be reached by sending out a seasonal email newsletter. He will target new customers by placing ads on Facebook targeted at people located within 20 miles of his business who have searched for house painters. Where would he place this information on an e-commerce presence map?
type of presence
Collaboration software is designed to increase collaboration and productivity primarily by enabling team members to
view, edit, and add shared information in real time, from anywhere.
Which function of the NIST Cybersecurity Framework calls for an organization to implement plans for resilience?
recover (RC) function
A cybersecurity exploit allows a hacker or intruder to
remotely access a network, gain privileges, and make unauthorized changes.
For which type of cybersecurity vulnerability do organizations maintain and share databases of known problems?
security weaknesses in operating systems or application software
Payment can be made in the form of funds, assets, or __________.
services
With Web 3.0, everyday devices connected to the Web will become
smarter and more capable, given the improved support for the Internet of Things (IoT).
Which Web 2.0 feature utilizes application programming interfaces (APIs) to automate web content and/or processes?
software as a service (SaaS)
What if any difference is there between a Trojan horse and a regular computer virus?
A Trojan horse does not self-replicate.
What is the difference between a cloud service and a web service?
A cloud service provides users with increased computing power and data management, whereas a web service provides the software tools needed for devices and systems to communicate with each other.
How does a cybersecurity exploit threaten the safety of a system?
It is a tool or technique for taking advantage of a system vulnerability to cause harm.
How are data in process different from data at rest or data in storage?
It is held in the device's RAM until it can be processed by the CPU or GPU.
__________ is widely used in finance in the stock valuation, bond pricing, and financial modeling.
PV (Present Value)
PMT is the Excel function for __________.
Payment
Why is data that is located in the RAM of a device considered data in transit?
RAM only holds data and instructions temporarily; nothing is permanently stored in RAM.
Interest Rate goes into which line in the Excel PMT function?
Rate
Of the following statements, which one specifically applies to the CRM integration of platforms such as Facebook, YouTube, and TikTok?
Social media platforms provide targeted customer information.
Which of the following is the term for CRM analytics that provides information about where data erosion occurs and how the erosion can be minimized?
Standardized Data Collection Processes
How do businesses ultimately benefit from using a CRM to identify the highest revenue customers in a target market, before developing a marketing campaign?
They save time and money by targeting this precise segment of the market.
Which cryptocurrency shares features with a previous cryptocurrency but is technologically enhanced?
bitcoin cash
What is the MOST direct way in which customer relationship management (CRM) systems can help businesses increase their sales?
by helping them identify and attract prospective customers
How does using a CRM to track customer acquisition rates help organizations improve their future customer acquisition rates?
by revealing whether their marketing efforts are effective or require changes
Amazon, Kamatera, Salesforce, and Google are all examples of
cloud service providers.
Which type of collaboration software could best help an organization increase engagement between remote employees and those who are "in-house" or organization-based?
cloud-based forums, messaging, and meeting apps
As e-commerce continues to develop, many retailers are likely to maintain some type of "brick-and-mortar" store or physical location primarily because
consumers expect integrated shopping experiences that include face-to-face options.
Which of the following is a goal of confidentiality as defined by the CIA triad?
making sure the right people have access to secure information
Which of the following acts is an example of social engineering?
manipulating people in order to obtain and misuse their personal information
It is especially important for startup companies to create and follow a well-designed e-commerce strategy. Which of the following is the last phase in a well-designed strategy?
mobile platform planning and implementation
An interest rate (or rate) is usually stated as a __________.
percentage
The organizations likely to benefit the most from the global reach of e-commerce are those that
previously depended on foot traffic into one physical store to sell their products.
Bad actors seeking to create computer viruses primarily must know how to
program code.
While using her phone's GPS to drive to her vacation destination, Siena needs to find a gas station. She enters into her phone's GPS that she is looking for a gas station that is no more than five miles away from the route she is currently on. What is this an example of?
proximity location
What does the General Data Protection Regulation (GDPR) strive to achieve?
(WRONG ANSWER): to ensure U.S. companies protect the privacy and personal data of U.S. citizens
What is a key difference between business-to-government (B2G) transactions and other types of e-commerce?
B2G transactions involve prenegotiated contracts.
How does each additional block added to the blockchain strengthen the integrity of the entire chain?
Because each block contains information on recording time and sequence for both its transaction and the transaction immediately preceding it, with more blocks there is more transaction history information, making it difficult to falsify.
Time Value of Money (TVM) is one of the most basic fundamentals in __________.
finance
The key feature of Web 2.0 that allows users to collectively classify information, such as by tagging websites and online images, is called
folksonomy.
An educational startup has already written its proprietary "Homework Helper" code, using AI to help high school students with homework. While their data storage needs are currently small, they expect their needs to grow exponentially as they increase their user base. Which of the following could help them with this?
infrastructure as a service (IaaS)
Future Value (FV) calculations help you determine the amount of money you will have if you deposit a sum of money into an account or __________ money in a financial instrument that pays interest.
invest
An online photo printing company can temporarily lose its e-commerce ubiquity if
its website crashes due to a coding error or attack by hackers.
Built on real-time geodata and information provided from wireless mobile devices, ________ are widely used in m-commerce.
location-based services (LBS)
Apple has a very high customer equity (CE) value. Apple has gained this high CE value due to
extreme customer loyalty.
Gartner IT Services company predicts that by 2021, customer relationship management systems will be the single largest revenue area of spending in
enterprise software.
An ordinary annuity is a series of __________ payments made at the end of consecutive periods over a fixed length of time.
equal
The value that the future lifetime revenue an organization's customers will generate minus customer acquisition costs and customer retention costs is called customer
equity.