MIS 2100

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which of the following statements accurately describes computer networks? More than one answer may be correct.

A network is a group of two or more devices/computers that are connected together. Networks range in size from small home networks to the internet, the world's largest network. Only certain types of networks can be linked together and supported by the internet

Which of the following is a benefit of collaboration software for business teams and organizations? More than one answer may be correct.

Better communication: team members can share content in real time, from any location Improved interaction: remote employees can attend meetings via video conferencing

One of the benefits of cloud computing is increased collaboration among corporate users.

true

Which is the best explanation of how the World Wide Web (WWW) differs from the internet?

world wide web (www)

A computer network must be connected to the internet to support

communicating via email with people on other networks

Which of the following describes a popular collaboration software program that is used in business? More than one answer may be correct.

Smartsheet, Slack, and Trello

What is the key reason to implement cloud computing into one's personal and/or business data and information processing?

Cloud computing eliminates the need to store files and software on a local drive.

Which of the following is an example of a tool that could be used to ensure data integrity? More than one answer may be correct.

backing up data to separate servers or to the cloud hard copies of important datasets are kept in a locked warehouse

In addition to overall digital flexibility, technological savings, and increased collaboration, computing in the cloud provides organizations with

disaster recovery.

A server is a group of two or more devices/computers that are connected to allow them to exchange information and share resources.

false

An organization is said to have "e-commerce universality" if it has a strong online presence that enables it to quickly sell its products and/or services to almost anyone, regardless of the time or their location

false

Businesses have found that though their reliance on internal IT infrastructure has increased, while their costs are reduced when using the cloud.

false

One noted disadvantage of cloud computing is the issue of overcollaboration between users.

false

The practice of trading used, old, or obsolete products via the internet in exchange for other used or similar products is called re-commerce.

false

The type of e-commerce transactions that involve the selling of goods and services between businesses is vendor-to-vendor (V2V) e-commerce.

false

Which of the NIST Cybersecurity Framework functions investigates an organization's cybersecurity management in the context of their business needs and resources?

identify (ID) function

From the following list, select the functions of an Internet Service Provider (ISP).

providing access or a gateway to the resources on the internet providing an Internet Protocol (IP) address creating protocols and other standards for transmitting messages

Which of the following are areas that are covered on an e-commerce presence map? More than one answer may be selected.

the platform the activity

Which of the following are correct regarding blockchain? More than one answer may be selected.

In supply chain management, blockchain can verify with almost absolute certainty where items and goods are along the supply chain, thus removing guesswork and inefficiencies for shippers and customers. For business contracts, blockchain makes it almost impossible to change any information in a contract. This is advantageous for businesses that are dealing with multiple contracts.

Which of the following is a characteristic of the internet that helps explain how it works? More than one answer may be correct.

The internet has connections points called nodes. Data is usually stored on specialized computers called servers.

From the following list, select the companies that are leaders in the re-commerce market.

Yerdle Re-commerce thredUp The RealReal

What is the second step that occurs when placing a call on a cellular network?

Your voice is converted by your phone to an electrical signal that is transmitted via radio waves to the nearest cell tower.

The key feature of Web 2.0 that allows users to collectively classify information, such as by tagging websites and online images, is called

folksonomy

The deactivation of access to corporate systems and documents after an employee leaves a company is an example of which tool that ensures confidentiality? More than one answer may be correct.

access control authentication

If a company wants to create a secure computer network that can be accessed and used solely by its employees, it should create

an intranet.

Which cryptocurrency shares features with a previous cryptocurrency but is technologically enhanced?

bitcoin cash

What are the core actions of the protect (PR) function?

controlling access to systems and preventing unauthorized access

From the following list, select all the types of problems that create a cybersecurity vulnerability.

faulty procedures for upholding system security poor setup or implementation of system security insufficient control or management of system security

List disadvantages of cloud computing. More than one answer may be correct.

limited control

Which Web 2.0 feature utilizes application programming interfaces (APIs) to automate web content and/or processes?

software as a service (SaaS)

Manuel runs a small business that paints residential interiors. He has decided most of his current customers can best be reached by sending out a seasonal email newsletter. He will target new customers by placing ads on Facebook targeted at people located within 20 miles of his business who have searched for house painters. Where would he place this information on an e-commerce presence map?

type of presence

Why is establishing authentication procedures a common cybersecurity goal?

Verifying that users are authorized to access systems, data, and resources is fundamental to preventing their unauthorized use.

Manufacturers of computers and other electronic devices follow the IEEE 802.3 protocol to ensure that their products

can be used to create a standard ethernet connection.

Which type of collaboration software could best help an organization increase engagement between remote employees and those who are "in-house" or organization-based?

cloud-based forums, messaging, and meeting apps

What are the major issues faced by organizations in terms of data and information that were addressed by cloud computing? More than one answer may be correct.

data management storage security

What do all cybersecurity threats have in common?

They are connected to the loss of information, software, or hardware.

Why is a denial-of-service attack (DoS attack) a threat to data availability?

By flooding a system with incoming messages, a DoS attack forces the system to shut down, rendering it inaccessible to the users who legitimately have access to it

Which type of cybersecurity breach makes a computer, network, or online service malfunction or become unavailable to users?

DDOS attacks

Determine which of the following is an example of data that has integrity.

Data that are used to set sales goals for account executives are stored on a secure server; managers are allowed read-only access to the sales data for the reps they directly manage.

Describe cloud computing in today's business environment. More than one answer may be correct.

Due to the cost-effective nature of cloud storage, many small businesses use it to back up data. A majority of global companies are using the cloud to backup and store data and information.

Of the following statements, choose the ones that correctly apply to issues in m-commerce.

Ethical issues include keeping product listings accurate, following online selling laws, and maintaining web accessibility. Due to similarities between organizations that sell goods and services online, competitor analysis is challenging. Customer loyalty is highly important, as it can cost five times more to acquire a new customer than it costs to retain one.

Which of the following would be prohibited under the Electronic Communications Protection Act?

an employee leaking confidential emails they were not authorized to receive

At its core, blockchain stores transaction data in blocks and then links the blocks together to form a chain.

true

The basic types of computer networks include which of the following? More than one answer may be correct.

wide area network (WAN) local area network (LAN) personal area network (PAN)

What does the identify (ID) function of the NIST Cybersecurity Framework focus on?

organizational understanding of how to manage cybersecurity risks

Common issues that e-commerce businesses face include

threats to customer data. unstable customer loyalty.

A project manager needs to assess how much progress her team has made on the project, to provide executives with a weekly update. Which collaboration software program will be most useful for assessing the project's status?

trello

The type of e-commerce transaction where consumers are able to provide a service to a business often through a bidding or auction type of system is called consumer-to-business.

true

Why is data that is located in the RAM of a device considered data in transit?

RAM only holds data and instructions temporarily; nothing is permanently stored in RAM

From the following list, select the statement that correctly defines that type of network.

An internet connects LANs, WANs, and other internets together. An WAN connects a variety of devices at a single site, such as an office.

Which of the following threats to cybersecurity come from internal sources? More than one answer may be correct.

an accidental erasure of data an attack by an authorized user the leakage of sensitive information

An investment firm creates a network designed to facilitate information exchange between devices at its offices in New York City and New Haven, Connecticut. Which type of network would the company use to exchange information?

wide area network (WAN)

Which of the following statements about the revenues of global e-commerce companies are correct?

Amazon has had revenues of over $280 billion. Alibaba has had revenues of over $56 billion. JD.com's revenues have eclipsed $70 billion.

From the following list, select all of the ways in which cybersecurity helps preserve the integrity of data, information, and systems.

Cybersecurity policies and procedures are designed to protect the consistency, accuracy, and dependability of these assets.Cybersecurity policies and procedures are designed to protect the consistency, accuracy, and dependability of these assets. Cybersecurity tools such as user-access controls, file permission, and version controls help prevent unauthorized changes.Cybersecurity tools such as user-access controls, file permission, and version controls help prevent unauthorized changes. Cybersecurity systems are designed to detect unauthorized or unanticipated changes to data that suggest a loss of integrity.

From the following list, select all the characteristics of collaboration software that enhance the productivity of teams, groups, and organizations.

Dedicated workspaces are viewable and editable by approved users, regardless of their physical location. The software is cloud-based, removing the need for users to have specific software downloaded on a device. Remote users create individual, dedicated workspaces online for managing their own data and workflows. Changes to project documents or spreadsheets must be saved and sent to the members of a team.

Which statement correctly defines a component of the World Wide Web (WWW)? More than one answer may be correct.

HTML is a language commonly used format for publishing web documents and content. A URL is the address of a document or other content/resources found on the web. HTTP is a protocol for the transmission of hypermedia documents (such as HTML) and was designed for communication between web browsers and web servers W3C is the architecture of the WWW, which is created by its standards and protocols.

Which of the following correctly identify National Institute of Standards and Technology (NIST) cloud computing deployment models? More than one answer may be correct.

Public cloud infrastructure is for open use by the general public. It may be owned, managed, and operated by a business, academic, or government organization, or some combination of them. Private cloud infrastructure is extended to a single organization with multiple consumers e.g., business units. Community cloud infrastructure is a composition of two or more distinct cloud infrastructures that remain unique entities but are bound together by standardized or proprietary technology.

Which of the following would be considered a benefit in a cost-benefit analysis? More than one answer may be correct.

Spending money to update the CRM database in order to generate more customer leads, resulting in an $50,000 increase in sales to new customers. A weekly blog that generates engagement among users who have never heard of your product before. Updating shipping tracking software so that it is easy to confirm orders have successfully reached customers.

What is occurring when a call placed on a cellular network is "dropped?" More than one answer may be correct.

The mobile switching station that your phone connected to was unable to maintain a connection with the mobile switching station of the person you're calling.

From the following list, select all the statements that correctly characterize or define e-commerce ubiquity.

The term refers to the degree an organization has gained access to consumers, thus increasing the likelihood of product or service adoption. It is the ability of an organization to create a strong presence among consumers in many places, with minimal time constraints, to sell the products and services they offer. It gives customers the ability to purchase products and services regardless of time or location.

Why would a vendor agreement be a disadvantage of cloud computing?

Vendor agreements make it difficult to switch services.

The internet has two primary components that enable it to connect networks and individual devices

a "backbone" of connected hardware and a suite of internet protocol software.

Collaboration software leads to better collaboration by enabling people from across the organization and in the same time zone to share content in real time.

false

Cryptocurrency allows people to share a digital ledger across a network of computers without a central source of control because no single entity has the ability to tamper with the records.

false

Digital currencies that only exist on computers and are transferred between peers without an intermediary such as a bank are called digicurrencies.

false

Describe the benefits 5G networks will provide cell phone carriers and users. More than one answer may be correct.

greater capacity faster connections and data transfer speeds

Which of the following are areas covered by state-specific cybersecurity laws? More than one answer may be correct

increasing cybersecurity at the state and local level protecting critical infrastructure from cyber threats

To properly authenticate, or verify, the identity of authorized users and protect assets from unauthorized users, it is essential to

keep user logins and passwords confidential.

The amount of time that passes between when a device is asked to perform and when it completes the task is known as

latency

The organizations likely to benefit the most from the global reach of e-commerce are those that

previously depended on foot traffic into one physical store to sell their products.

What is an example of a business-to-business transaction? More than one answer may be correct.

purchasing office supplies for a university buying medical equipment for a pediatrician's office purchasing food service items for a restaurant

With Web 3.0, everyday devices connected to the Web will become

smarter and more capable, given the improved support for the Internet of Things (IoT).

Which of the following are reasons why states are making cybersecurity measures a high priority? More than one answer may be correct.

the acceleration of new technologies the proliferation of cyber threats to data and technologythe

A LAN is a type of network that connects devices at a single site within a limited geographic range.

true

A business-to-consumer transaction is considered to be the selling of products and services to individual consumers.

true

A computing model where services are provided over a network, primarily accessed via the internet, is called cloud computing.

true

Accelerated mobile pages (AMPs) support m-commerce by utilizing a scaled-down version of hypertext markup language (HTML) to create web pages that load quickly on mobile devices.

true

Customer acquisition cost (CAC) is a metric that is used by e-commerce companies and other sales related organizations to assess the costs associated with convincing a potential customer to purchase a service or product.

true

The Internet of Things refers to all devices that are capable of being connected to the internet.

true

E-commerce ________ is the ability of an organization to create a strong presence among consumers in many places, with minimal time constraints, to sell them products and services.

ubiquity

According to the identify (ID) function of the NIST Cybersecurity Framework, what allows an organization to prioritize its efforts where cybersecurity risk is involved?

understanding of its business environment and resources

Collaboration software is designed to increase collaboration and productivity primarily by enabling team members to

view, edit, and add shared information in real time, from anywhere.

Which type of cybersecurity breach can cause the most damage to an organization's systems, data, and information?

viruses

On an e-commerce presence map, what is presence?

websites, email, social media sites, and offline media

From the following list, select all the key aspects of today's e-commerce landscape that organizations should consider when conducting business in this environment.

Internet of Things (IoT) integrated shopping experiences m-commerce


Set pelajaran terkait

History of Rock and Roll Midterm (CH. 3) MSU

View Set