IS 130 FINAL
Job coaches recommend spending ------ percent of your time online to get a job
10
--------- cellular networks used analog signals and had low bandwidth.
1G
GPS uses the known speed of the signals and distance from ------- satellite (s) to find the location of a receiving station or user.
3
- is an example of metasearch engine
?
NICs allow devices to physically connect to the -------- communications medium.
?
--------- is a physical control.
A company gate
If you accept the potential risk, continue operating with no controls, and absorb any damages that occur, you have adopted a risk ----------- strategy.
Acceptance
If someone simulates a valid wireless access point to get people usernames, passwords, and account numbers without the person's knowledge, this is ------------.
An evil twin attack
Ransomware is typically disseminated through -----------.
Botnets
Group purchasing is a common technique in a -------
Buy-side market
The ------ is a model in which organizations attempt to procure needed products or services from other organizations electronically
Buy-side marketplace
-------- systems are important because customers are --------- powerful than ever; these systems put the intimacy back into customer service
CRM; more
--------- refers to the maximum number of times an instance of one entity can be associated with an instance in the related entity.
Cardinality
The -------- approach highlights the interlocking relationships that underline all societies.
Common good
------- facilitates dynamic pricing
Cookies
------- is the loss of a certain percentage of customers over time
Customer churn
--------- refers to the practice of registering or using domain names for the purpose of profiting from the goodwill or the trademark that belongs to someone else
Cyber-squatting
------- allows you to read a voice mail message in your e-mail inbox
DSL (?) not sure
Suppose that you believe that killing someone is wrong even it if is self-defense. This is an example of the -------- approach
Deontology
-------- modems convert information for use on the POTS
Dial-up
If you have to speak into your phone to unlock it, this is an example the user ---------.
Does
------------- is the process of converting an original message into a form that cannot be read by anyone except the intended receiver.
Encryption
A relational database is basically one big table; it is also called a flat file.
False
An FAIS helps get rid of information silos caused by ERP
False
Authentication occurs after authorization.
False
Collaborative consumption services offer employees many benefits including higher pay, more paid vacation, and flexible hours
False
Retailers are the prime example of companies involved in the production process.
False
Super Wi-Fi is super-fast Wi-Fi technology.
False
The internet grew out of an experimental project by some universities in the 1960s.
False
The internet is a PAN
False
Tracking cell phones is illegal.
False
The Sarbanes-Oxley Act requires publicly held companies to implement -------- controls; it was passed to address the ------- crisis.
Financial; Enron
An --------- is a system that prevents a specific type of information from moving between untrusted and private networks
Firewalls
The ----- process originates in the sales department and ends in the accounting department
Fulfillment
Organization's use Porter's competitive forces model to design -------- strategies; they us the value chain model to identify -------- activities to make the greatest impact.
General, specific
You open an e-mail form your friend that looks a little odd, but you figure your friend would never send you anything bad. This is ---------- and is an ----------- mistake.
Human error, unintentional
------- consists of 32 bits
IPv4
135.62.128.91 is an example of an ---------- address.
IPv4
Databases maximize ----------; this means --------.
Independence; applications and data are not linked to each other, so all applications are able to access the same data.
Car and technology companies are currently competing over who can offer the first self-driving car. This is an example of an ---------- strategy
Innovation
Which of the following increases supplier power?
Internet searching
Systems that manage processes originating in one company and concluding in another company are called ------ systems
Interorganizational
-------- delivers the precise number of parts to be assembled into a finished product at precisely the right time
JIT
------- satellites have the shortest orbital life.
LEO
--------- satellites are used to run the GPS system.
MEO
------ is part of the ------ process and occurs when the company is trying to fulfill a specific customer order.
Make-to-order; production
----------- are a set of core data that span the enterprise information systems.
Master Data
in September 2014, NASCAR implemented an app from ----- to perform prerace inspections
Microsoft
Databases ----- redundancy; this means -------.
Minimize, the same data are stored in multiple locations
-------- technology enables the use of mobile wallets.
NFC
You decide to integrate your supply chain to cut down production time. This is an example of an ------- strategy.
Operational effectiveness
-------- is a software company that compares a homeowner's energy use to the average energy use of his or her neighbors
Opower
-------- analytics drives the coupons you get the grocery store when you use your loyalty card
Predictive
The -------- key is ab identifier field that uniquely identifies a record.
Primary
The ------ process originates in the warehouse department and ends in the warehouse department
Production
As the principal of a local high school, you want to install a wireless WAN to give students better, more secure access to the internet. You request bids from a few local service providers to get the best price. This is an example of a ------- auction.
Reverse
--------- uses AI to predict the best ad to present to a given customer who is visiting a particular web page
Rocket Fuel
--------- is the most popular query language used for interacting with a database.
SQL
Legacy systems were developed as --------.
Silos
--------- is a wireless network proposal that creates long-distance wireless internet connections; it uses the lower-frequency "white spaces" between broadcast TV channels.
Super Wi-Fi
Management is a process by which an organization achieves its goals (called------) through the use of resources (called ------)
The output; input
Which of the following is FALSE of persuasive technologies?
They are only used for consumer habit formation
The ------ layer of TCP/IP provides communication and packet services.
Transport
A device can be wireless but not mobile.
True
A filter bubble is a result of a search in which a website algorithm guesses what a user would like to see based on information about the user
True
An RFQ is associated with a reverse auction.
True
Big Data facilitates dynamic pricing.
True
Businesses must respond to customers more quickly and appropriately than they did prior to social computing
True
Content that is illegal in one country can still be legal in other countries.
True
Data aggregators can collect public and non-public information to create digital dossiers.
True
Disintermediation is a threat of substitute products from Porter's Five Forces
True
Download speed is much faster than upload speed when defining the term broadband.
True
Modern smartphones exhibit a process called dematerialization.
True
Organizations can use SaaS to acquire cloud-based ERP systems
True
Privacy rights apply to individuals, groups, and institutions.
True
Social marketplaces act as online intermediaries that harness the power of social networks for introducing, buying, and selling products and services
True
Social marketplaces are an example of C2C commerce
True
TPSs collect data continuously, typically in real time.
True
The public's right to know supersedes the individuals right to privacy.
True
The web makes disintermediation easier, particularly for online services.
True
Knowledge is distinct from data and information.
True.
Smartphones are sensors that can be used for electronic surveillance.
True.
A ----- relationship exists when an association is maintained within a single entity
Unary
A transaction is any business even that generates ------ worthy of being captured and stored in a database
data
Data reduction is the conversion of raw information into a smaller amount of more useful data
false
Filter bubbles guarantee that you will see websites that widely disagree so you can come to an informed decision
false
Users had passive involvement with web 2.0 websites. Web 3.0, on the other hand, facilitates more interactive social computing
false
American companies can easily do business with Chinese companies. This phenomenon is called
globalization
Suppose you have a primary location in New York City where your main corporate servers are located. Just in case something happens in New York City, you have backup servers that are updated every minute in Chicago. This is an example of a -------- site.
hot
when you map out how your business currently processes customer orders to figure out how to reduce delivery time, this is part of the ----- phase of BPI
improve
----- is an example of effectiveness
increasing customer satisfaction
----- industries experience the greatest threat from substitutes
information-based
Biometrics is an example of something the user -----------.
is
The pursuit of the "American Dream" and our ability to choose our religious orientation is a reflection of the ---------- approach.
rights
the BYOD phenomenon is a ------ pressure
technology
Companies listen to consumers in the blogosphere who express their views on the companies' products. This is consumer-generated media.
true
Consumers typically respond negatively to dynamic pricing.
true
Organizations can use Big Data to microsegment customers.
true
Viral marketing lends itself especially well to social networking
true