MIS 301: Unit 2

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

operating system

The software that controls the computer hardware and establishes standards for developing and executing applications.

WeChat processed 460 billion transactions in 2018—over forty-six times more than PayPal processed. True or False.

True

YouTube is actually the Internet's second biggest search engine. True or False.

True

Over the past several years, online advertising has represented the only advertising category that is consistently trending with positive share growth. True or False.

True.

The phrase __________________ refers to security schemes that automatically send one-time use representations of a credit card which can be received and processed by banking and transaction firms at the time of payment. They are used in Apple Pay and Android Pay. Localization Single-factor authentication Balkanization tokenization

tokenization

Ads on Facebook carry an average CPM of over ______.

$11

four primary advantages of Big Data

- flexibility - scalability - cost-effectiveness - fault tolerance

Facebook acquired Instagram for $ ___________.

1 billion

Facebook has been used by over _________ different advertisers, and many of these are small businesses using the firm's self-service ad platform.

1 million

For a crowd to be "smart" it needs to be:

1. Diverse : participants are contributing different types of knowledge 2. Decentralized : so that no one at the top is dictating the crowds answer 3. Able to offer a collective verdict 4. Independent : so they each focuses on information rather than the options of others

Apple requires any app sales to share a _____ percent take with the firm (_____ percent for smaller developers).

30, 15

As many as ____________ automated “bots” were used with the express purpose of sowing confusion during the 2016 U.S. presidential election.

50,000

colossal walled garden

A closed network or single set of services controlled by one dominant firm.

cloud

A collection of resources available for access over the internet

utility computing

A form of cloud computing where a firm develops its own software, and then runs it over the Internet on a service provider's computers.

SaaS

A form of cloud computing where a firm subscribes to a third-party software and receives a service that is delivered online.

server farms

A massive network of computer servers running software to coordinate their collective use. Server farms provide the infrastructure backbone to SaaS and hardware cloud efforts, as well as many large-scale Internet services.

capability maturity model integration (CMMI)

A process-improvement approach (useful for but not limited to software engineering projects) that can assist in assessing the maturity, quality, and development of certain organizational business processes, and suggest steps for their improvement.

service oriented architecture (SOA)

A robust set of Web services built around an organizations processes and procedures.

EDI (electronic data interchange)

A set of standards for exchanging messages containing formatted data between computer applications.

enterprise resource planning (ERP)

A software package that integrates the many functions (accounting, finance, inventory management, human resources, etc.) of a business.

software package

A software product offered commercially by a third party.

Which of the following is true about Facebook and Twitter feeds?

All Twitter posts appear in the feeds of followers with an open Twitter app, but Facebook posts are curated and only appear in the feeds of some friends and fans.

Which of the following factors is thought to have been at work during the Target security breach? Malicious code was disguised by using the name of a legitimate software product. Target's security software could have automatically deleted detected malware, but this function was turned off. All of the above. The database for credit card transactions wasn't sufficiently isolated from other parts of the system. None of the above

All of the above

Which of the following is true about Facebook Messenger? None of the above It has become a payments platform It is a Skype competitor It is now used as a tool for customer support and service All of the above

All of the above

Which of the following is not true of Google Stadia? It eliminates the console. None of the above are true. All of the above are true. It can support a faster gaming experience than any console available at the time of launch. It has a price point of $10 a month.

All of the above.

The factors that can determine a given ad's quality score in Google includes the: cost-per-impression. click-through rate. number of clicks. cost-per-click. number of impressions.

An ad's quality score includes an ad's click-through rate (CTR), or the number of users who clicked an ad divided by the number of times the ad was delivered (the impressions). The CTR measures the percentage of people who clicked on an ad to arrive at a destination-site, a key measure of the performance quality of a given ad.

integrated development environment (IDE)

An application that includes an editor (a sort of programmer's word processor), debugger, and compiler, among other tools.

social networks

An online community that allows users to establish a personal profile and communicate with others. Large public social networks include Facebook, LinkedIn, Google+, and Pinterest.

Many leading content outlets use Facebook Instant Articles feature because: - All of the above - These articles strip out Google ads and use Facebook's less expensive ads. = Articles load faster, increasing the likelihood that they'll be read (and ads will be served) - Bloggers bypass the mainstream media (MSM) and share via Facebook, getting a cut of any subscription revenue for commercial sign-ups - Facebook leverages the front-facing camera on your mobile phone to watch where users look, offering feedback to content providers on effective ad copy and placement

Articles load faster, increasing the likelihood that they'll be read (and ads will be served)

What did Waze offer Google? Better pricing via crowdsourcing. Better advertising accuracy via crowdsourcing. All of the above. Better maps through crowdsourcing. Better voice-enabled search via crowdsourcing.

Better maps through crowdsourcing

iBeacon technology works by using ___________ technology. WiMax WiGig Bluetooth low-energy WiFi Big Data

Bluetooth low-energy

Ad rank on Google is calculated using the equation: Ad Rank = f (bid value a.k.a. __________ an advertiser is willing to pay, Quality Score, expected impact of extensions and formats). maximum CPM impression PageRank maximum CPC CTR

CPC, cost per click

_____ systems are often used to empower employees to track and record data at nearly every point of customer contact. Enterprise resource handling Customer relationship management Transaction processing Supply chain management Collaborative filtering

CRM

Setting up new collection efforts, surveys, or systems to obtain the data is called ________.

Data sourcing

What do developers feel is the key to viable, large-scale prediction markets?

Decentralization

agile development

Developing work continually and iteratively, with a goal of more frequent product rollouts and constant improvement across smaller components of the larger project.

Google's ad network gives it: distribution. equity. market cap. all of the above. patent protection.

Distribution. For Google, its ad network is a distribution play. The ability to reach more potential customers across more websites attracts more advertisers to Google.

________ are promotions that are not paid for or owned but rather grow organically from customer efforts or other favorable publicity. Examples include positive tweets, referring Facebook posts, and pins on Pinterest.

Earned Media

_________ started __________, building the world's first socially driven beauty brand, leveraging social media to share, promote, and co-create.

Emily Weiss; Glossier

Google's dominance in search has discouraged all rivals, save for Microsoft with Bing, from improving or investing in competitive efforts. True or False.

False, there is still competition. Rivals in search include established players like Yahoo! and relative newcomers like Wolfram Alpha. Apple's Siri is basically a search engine, and the firm has been aggressively cutting deals with category players like Yelp and the Weather Channel, and Apple now lets app firms integrate Siri into their own offerings, as well, all of which further cut Google out of new emerging channels for search.

Don't confuse blogs with conventional search engine results. Blogs are very important, but they do not influence the content that appears in searches through Google or Bing. True or False.

False.

The success of the firm's search business has made the firm more risk averse. True or False.

False. Averse means reluctant to take risks. Google's success has made it more likely to take risks.

A best practice for information security is to stay with mandated security regulations requirements. True or False.

False. Companies should approach information security as a part of their "collective corporate responsibility…regardless of whether regulation requires them to do so."

Bloggers and other users of social media often refer to the MSM. This phrase stands for Media Social Methods. True or False.

False. Corporate blogs can be published directly to the public, skipping what bloggers call the mainstream media (MSM) and presenting their words without a journalist filtering their comments or an editor cutting out key points they'd hoped to make.

Google owns a mobile phone network. True or False?

False. Google doesn't own a mobile phone network; it's an MVNO (mobile virtual network operator), licensing capacity from T-Mobile and Sprint at a discount for resale under its own brand and plans.

Google has made roughly 75 acquisitions overall, more than Microsoft but less than Amazon. True or False

False. Google has made roughly 200 acquisitions overall, which is more than Apple, Microsoft, Amazon, Facebook, and Yahoo combined.

Corporations will want to be cautious about what is posted to wikis since wikis can be accessed by anyone. True or False.

False. In addition to the hundreds of public wikis, there are many thousand more that are hidden away behind firewalls, used as proprietary internal tools for organizational collaboration.

While blogs are effective for communicating with the public, firms shouldn't use blogs for internal communication since everyone can see them. True or False.

False. Like any Web page, blogs can be public or isolated for internal use via a corporate firewall or password protection.

Google's moves to allow hotel bookings directly from search pages have been well received by its large advertisers, Priceline and Expedia. True or False.

False. Making Google more relevant, especially on mobile, makes sense, but the new functionality comes with risks. Google's move into travel booking is upsetting some of the firm's biggest customers. Priceline spends over $1.5 billion advertising with Google each year. Expedia spends over $1 billion. Just these two firms account for about a 5 percent chunk of Google revenue.

One way to enhance security against malware on smartphones is to modify the phone to work off network. True or False.

False. Most smartphones have layers of security to block the spread of malware, so hackers typically hunt for the weakest victims. Easy marks include "jail-broken" iPhones, devices with warranty-voiding modifications in which security restrictions are overridden to allow phones to be used off-network, and for the installation of unsanctioned applications.

Public key encryption is considered far weaker than private key encryption, so most websites avoid using public key systems. True or False.

False. Most websites that deal with financial transactions (e.g., banks, online stores) secure transmissions using a method called public key encryption. The system works with two keys-a public key and a private key. The public key can "lock" or encrypt data, but it can't unlock it: that can only be performed by the private key. So a website that wants you to transmit secure information will send you a public key-you use this to lock the data, and no one that intercepts that transmission can break in unless they've got the private key. If the website does its job, it will keep the private key out of reach of all potentially prying eyes.

By default, a post by a "liked" firm or friend will appear in your feed. True or False

False. Not everyone sees every post to their feed; like Google, Facebook uses a secret and constantly refined algorithm that attempts to identify what you're most interested in, while cutting "spammy" content.

7. Google has been a relentless experimenter, even encouraging employees to spend 20 percent of their free time on new efforts. The primary benefit of "20 percent time" is seen as an employee retention-targeted job perk, since very few "20 percent time" projects have actually resulted in efforts Google has launched. True or False.

False. Roughly half of Google products got their start in 20 percent time.

Facebook COO Sheryl Sandberg's ad industry experience was cultivated at Yahoo! True or False

False. Sandberg came from Google

Studies have shown that while online advertising is growing, the take from the Big Three—Google, Microsoft, and Amazon—is getting larger while the percentage of revenue earned by firms outside the Big Three is shrinking. True or False.

False. The big three are Google, Facebook, and Amazon.

Students are discouraged from using over-the-Internet backup services since these are known sources for security vulnerability. True or False.

False. The most likely threat to your data doesn't come from hackers; it comes from hardware failure. Yet most users still don't regularly back up their systems. Internet backup services can provide off-site storage and access if disaster strikes.

Which of the following is perhaps the most significant contributor to Facebook's ability to strengthen and deliver user value from the social graph? Profiles Games Events Messages Feeds

Feeds

long tail

In this context, refers to an extremely large selection of content or products. The long tail is a phenomenon whereby firms can make money by offering a near-limitless selection. Ex. "the niche content that is discoverable through search engines and that is often shared via other types of social media."

applications

Includes desktop applications, enterprise software, utilities, and other programs that perform specific tasks for users and organizations.

venture capitalists

Individuals or companies that invest in new businesses in exchange for partial ownership of those businesses and sometimes some degree of managerial control.

What was the biggest problem with the rollout of Facebook's Beacon platform?

It was an opt out program

inbound marketing

Leveraging online channels to draw consumers to the firm with compelling content rather than conventional forms of promotion such as advertising, e-mail marketing, traditional mailings, and sales calls.

Which of these is NOT a reason that so many are offline in the world?

Many of the world's populations do not live within range of a cell tower with at least 2G data network. This is false. Most do.

What feature of Facebook helps new applications gain visibility among users?

News feeds

Which of these is not a Google-backed effort to improve broadband access to Internet services? O3b Project X All of the above are Google-backed efforts. Google Fiber Project Loon

Project X

_______________ is an example of an exploit in which hackers target security vulnerabilities caused by software developers not validating user input. Trojan technique. SQL injection technique Data subversion technique Unstructured validation technique CQL insertion technique

SQL injection technique Some exploits, like the SQL injection technique, directly target poorly designed and programmed websites, zeroing in on a sloppy programming practice where software developers don't validate user input.

application server

Software that houses and serves business logic for use (and reuse) by multiple applications.

content delivery networks (CDN)

Systems distributed throughout the Internet (or other network) that help to improve the delivery (and hence loading) speeds of Web pages and other media, typically by spreading access across multiple sites located closer to users. Akamai is the largest CDN, helping firms like CNN and MTV quickly deliver photos, video, and other media worldwide.

business intelligence (BI) systems

Systems that use data created by other systems to provide reporting and analysis for organizational decision-making.

Using ____________, the firm makes money off its 2 billion+ users, even when they're not on Facebook's own sites and apps.

The Facebook Audience Network

Which of the following is a true statement regarding the Starbucks Rewards program? The app allows customers to scan purchases made outside the store. It has been largely unsuccessful. 65 percent of the firm's overall sales are attributable to Starbucks Rewards. App users are twice as likely to visit a Starbucks every day. Nearly a quarter of all Starbucks app users visit a store at least once a week.

The app allows customers to scan purchases made outside the store.

wisdom of crowds

The idea that a group of individuals (the crowd), often consisting of untrained amateurs, will collectively have more insight than a single or small group of trained professionals.

Malware _____ are a sort of electronic fingerprint often used to recognize malicious code. code patterns code trails impressions digital tags signatures

The malware signature is a sort of electronic fingerprint often used to recognize malicious code. Recent malware has become polymorphic, meaning different versions are created and deployed in a way that their signature is slightly altered.

online reputation management

The process of tracking and responding to online mentions of a product, organization, or individual. Services supporting online reputation management range from free Google Alerts to more sophisticated services that blend computer-based and human monitoring of multiple media channels.

To become the Web's leading photo-sharing service, Facebook didn't acquire anyone. The site simply turned on a substandard photo-sharing feature and quickly became the biggest photo-sharing site on the Web. True or False.

True. In photos, Google, Yahoo!, and one-time standout MySpace all spent millions to acquire photo-sharing sites (Picasa, Flickr, and Photobucket, respectively). But to become the Web's leading photo-sharing service, Facebook didn't acquire anyone. The site simply turned on a substandard photo-sharing feature and quickly became the biggest photo-sharing site on the Web. Facebook users now post over 350 million photos each day.

NoSQL technologies are often used with massive, disparately structured data. True or False.

True. NoSQL technologies are especially popular with Internet firms that rely on massive, unwieldy, and disparately structured data; this technology is often at the heart of what are often characterized as "big data" efforts.

Salesforce.com's Chatter, Microsoft's Yammer, HipChat, and Slack are all services that have been billed as "_____________."

Twitter for the Enterprise

Which of the following is one of the differences between Twitter and Facebook?

Twitter settings allow asymmetrical following, unlike Facebook.

Which of the following statements is true about Facebook's acquisition of WhatsApp?

WhatsApp's share of the global mobile messaging market was so much greater than Facebook's, Zuckerberg saw WhatsApp as the best way for Facebook to remain relevant in this market.

Facebook allows any developer to add a Facebook "Like" button to their site with just a few lines of HTML code. What advantage do websites leverage by integrating this feature? Co-identification Viral distribution Staying power Envelopment Peer production

Viral distribution

collaborative consumption

When participants share access to products and services rather than having ownership. Shared resources can be owned by a central service provider (e.g., Zipcar) or provided by a community that pools available resources (e.g., Airbnb, Uber).

Relating the Facebook platform to sources of value from network effects, developers creating applications create ___________________ that have the potential to add value to Facebook beyond what the firm itself provides to its users. opportunity costs business intelligence unique selling propositions vertical niches complementary benefits

complimentary benefits

_____ is the process of using computers to identify hidden patterns in and to build models from large data sets.

data mining

criteria necessary for a crowd to be "smart"

diverse, decentralized, offer a collective verdict, independent

Social networks are a hothouse for "_________" media, where enthusiast-consumers can help spread the word about products and services.

earned

24. Pioneered by Facebook but now adopted by most services, _____ provide a timely list of the activities of and public messages from people, groups, and organizations that an individual has an association with.

feeds

In database systems, a table is known as a ______.

file

The four M's of social medi

megaphone (outbound communication), magnet (drawing others into the conversation), and monitoring and mediating online conversations.

Social media offers the 4 M's of engagement

megaphone, magnet, monitoring, mediation

The problem of incompatible legacy systems limiting firms' ability to turn data into information is compounded by: availability of newer technology. lethargic competition in the industry. mergers and acquisitions. Moore's law. awareness of technology.

mergers and acquisitions.

In database systems, a row is also known as a _____.

record

Social media policy revolves around the 3 R's

representation, responsibility, respect, 4th R: reputation

The "three Rs" emphasized in the social media policy guidelines of most organizations relate to:

reputation, responsibility, and respect

A problem limiting the turning of data into information is that most transactional databases are not set up to be: used for recording customer activity. capable of storing large volumes of data. simultaneously accessed for reporting and analysis. functional in scalable, high volume environments. used across different domains.

simultaneously accessed for reporting and analysis.

Con games that trick employees into revealing information or performing other tasks that compromise a firm are known as _____ in security circles. information fishing impostor scams artifices identity theft social engineering

social engineering

Facebook's mission

to make the world more open and connected

Three V's of Big Data

volume, velocity, variety

The key difference between viruses and worms is that: worms need a running program to spread, unlike viruses. viruses are spread over online technologies such as the Internet, unlike worms. worms do not need an executable to spread, unlike viruses. viruses spread faster than worms. viruses affect systems by pretending to be something they are not, unlike worms.

worms do not need an executable to spread, unlike viruses. Viruses infect other software and files and require an executable (running program) to spread, attaching to other executables. Worms exploit security vulnerability to automatically spread, but do not need an executable.


Set pelajaran terkait

Prologue: The Story of Psychology

View Set

Therapeutic Exercise & Dosing to Enhance Strength, Endurance, Flexibility, and Balance in Older Adults

View Set

Chapter 18: The Arabian Peninsula

View Set

Chapter 7 (LOVE AND ROMANTIC RELATIONSHIPS)

View Set

Trigonometry - Solving Trig Equations

View Set

PNE 105 Adv. Med.Surg. Ch 21: Caring for Clients with Lower Respiratory Disorders. Prep U

View Set

Sexual Harassment and Sexual Assault

View Set