Test 3 isys warm up and videos
The domain name system converts domain names to ______________.
IP Addresses
Mary's company is implementing an ERP system to achieve which main business objective
Improved decision making
Enterprise systems provide value by both ____________ and providing ____________ to help managers make better decisions
Increasing operational efficiency; firm-wide information
_____________ check for data entering a system for accuracy and completeness, such as when a clerk confirms a telephone number for a new customer
Input controls
A ___________ is great for a city to set up for emergency and public use since it is larger than many types of network configuration
MAN
According to DHS agent portrayed in this video, the secret service has responded to network intrusions at businesses throughout the United States that have been impacted by _________ through their point of sale systems
Malware
Customer relationship management typically focuses on 3 key elements of the customer relationship:
Marketing, sales, service
As zero and one explain in this video, a ____________ must be used to convert an analog signal to digital signal when transmitting data through a typical telephone line
Modem
In this video, one-bit describes _________, the method of slicing digital messages into parcels, transmitting them across communication networks, and reassembling them at their destination
Packet switching
Instead of sending an entire file in one big chunk across the internet, ___________ is used which dices the file up into little pieces that are sent independently across the communications paths and then reassembled when they reach their destination
Packet switching
A just-in-time strategy means:
Raw materials would arrive just in time to be transformed into a product and the product would ship as soon as completed
Agent macey explains how a _________ pretends to be a legitimate company and sends email requesting users to update their confidential information such as passwords or account numbers
Spoofer
Bandwidth transmission speed is measured in ____________.
Hertz
In this video, one-bit describes how voices travel through typical telephone transmission lines. He is describing a(n) ____________
Analog signal
According to the information system in this video, computers represent data using ________
Bits
When information about the demand for a product gets distorted as it passes from one entity to the next across the supply chain it is called the ______________
Bullwhip effect
Enterprise systems have a set of integrated software modules and a ____________ by which business processes and functional areas throughout the company can _____________ data
Central database ; share
According to the information in this video, the telephone system is an example of a ________ network
Circuit-switched
___________ can be destructive to a company when at risk for people or programs deliberately moving through ads, thus driving up advertising costs for a company
Click fraud
According to the information provided in this video, any business that has an online presence is at risk of __________
Denial-of-service attack, loss of customer data, unauthorized data disclosure, exposure to hacker activity
In this video, special agent macey says the single largest threat to the internet is
Denial-of-services attacks
In this video, Kevin describes ___________ as a set of integrated software modules that support nearly all of their organizations business processes
ERP
As Kevin explains, _________ processes support activities in multiple departments and span an organization
Enterprise
The ________ mandates that financial services firms ensure security and confidentiality of customer data
Gramm-Leach-Bliley Act
What outlines medical security and privacy rules and procedures for simplifying the administration of health care billing and automating the transfer of health care data
HIPAA Act
According to this video, which of the following statements is true regarding enterprise resource planning system
They integrate data with a centralized database
What is pharming?
Users are redirected to a phony web page even when the correct URL is typed in
Based on the information provided in this video, which of the following usually happens in a denial-of-service attack
A hacker floods a web server with so many requests that it becomes unavailable to its intended users
What type of communications processor directs packets of data through different networks, ensuring that the data sent gets to the correct address
A router
In this video dramatization, Kevin describes which component of an ERP system that consolidates data from sales, marketing, and service departments
Customer relationship management (CRM)