ACC 270 Exam 2

Ace your homework & exams now with Quizwiz!

____ Put users in control so that they can create custom reports on an as-needed basis by selecting fields, ranges, summary conditions, and other parameters. A. Canned reports B. Data cubes C. Ad hoc reporting tools D. Dashboards E. Online analytical processing

Ad hoc reporting tools

The inherently ____ nature of feeds allows individuals to rapidly blast their activities to their contacts or 'friends' and forward along posts they think may be of interest to others. A. static B. chronological C. serial D. decadent E. viral

Viral

____ allows a server to run what amounts to a copy of a PC-OS, applications, and all- and simply deliver an image of what's executing to the remote device. A. Vertical niches B. Virtual desktops C. Hardware clouds D. Cloudbursting E. Black swans

Virtual desktops

A server running ____ can create smaller compartments in memory that each behaves as a separate compute with its own operating system and resources. A. genetic algorithms B. open source software C. private clouds D. neural networks E. virtualization software

Virtualization software

An Uber-commissioned study claims the firm's impact on the US economy tops $____ a year. A. 28 million B. 280 million C. 2.8 billion D. 28 billion E. none of the above

2.8 Billion

Peering refers to: A. high-speed data lines provided by many firms all across the world that interconnect and collectively form the core of the Internet. B. the language used to compose Web pages. C. the broadband service provided via light-transmitting fiber-optic cables. D. a system that connects end users to the Internet. E. a situation when separate ISPs connect their networking equipment together to share traffic.

A situation when seperate ISPs connect their networking equipment together to share traffic.

Which of the following is an example of computer hardware? A. Application B. Operating system C. Platform D. Malware E. A video game console

A video game console

The scalability of a software product is defined as the: A. capability to continue operations even if a component fails. B. long-term market viability of a software product. C. ability to replace a technically superior product upon market inception. D. ability to take advantage of complementary products developed for a prior generation of technology. E. ability to be easily expanded to manage workload increases.

Ability to be easily expanded to manage workload increases.

The bulk of Facebook's revenue comes from: A. data aggregation services. B. application development. C. subscription fees. D. data harvesting. E. advertising.

Advertising

Which of the following statements is true about Airbnb's revenue model? A. Airbnb currently does not make money via transactions, only from advertising listings on its website. B. Airbnb only charges property owners who rent on the website. C. Airbnb only charges guests who rent on the website. D. Airbnb charges both property owners and guests as part of transactions on their website. E. Airbnb doesn't charge transactions for the three years after it enters a market, so as to generate two-sided network effects of property rents and guests searching for properties to stay in.

Airbnb charges both property owners and guests as part of transactions on their website.

Uber's commitment to data allow the firm to: A. cut prices B. attract new drivers C. grow and expand the firm D. all of the above E. none of the above

All of the above

Viruses are programs that infect other software or files and require: A. the computer to be shutdown to spread. B. an executable program to spread. C. Windows as an operating system to spread. D. a large file size to spread. E. a disk based operating system to spread.

An executable program to spread.

Which of the following is not true about apps and the app economy? A. Apps have been criticized as creating consumer switching costs vs. browser-based alternatives. B. Apps developed for one platform typically cannot be used on another platform. C. App store access is limited to industrialized nations with large smartphone user populations. D. Apps have been vital to the rise of several high-valued efforts, including Uber, Rovio, Instagram, and WhatsApp. E. App stores are 'always open'.

App store access is limited to industrialized nations with large smartphone user populations.

Severs or organizations do not need to be houses within a country in order to use a country code as part of their domain name. T/F?

True

Which of the following is *not* an example of larger, conventional firms working with sharing economy startups? A. Apple's purchase of Beats to give new musical artists more exposure. B. Condé Nast's investment in Rent the Runway. C. Google's investment in Uber. D. Walgreens' partnership with TaskRabbit. E. W Hotel partnering with Desks Near Me.

Apple's purchase of Beats to give new musical artists more exposure.

Users of Google and other search engines are said to be a hunt because they: A. are acquiring profiling data which acts as ammunition to improve their search results. B. want to explore and look around. C. are there to seek information to drive a specific action. D. allocate time for activities such as looking for news and friend updates. E. are unwilling to leave the Web page when they are having conversations.

Are there to seek information to drive a specific action

____ is a class of computer software that seeks to reproduce or mimic human thought, decision making, or brain function. A. Biometrics B. Artificial intelligence C. Intranet D. Legacy software E. Android

Artificial intelligence

Information security policies would be ineffective without ____ and ____. A. compliance; subjectivity B. rigidity; adaptability C. protocols; the backing of ISO D. accountability; flexibility E. audit; enforcement

Audit, enforcement

Surge pricing allows Uber to increase the supply of drivers when demand is high. T/F?

True

Systems that can absorb any type of data, structured or not, from any type of source are often called schema-less. T/F?

True

Technologies that measure and analyze human body characteristics for identification or authentication are known as ____. A. smart tags B. biometrics C. bio-embedded systems D. holographs E. overlamination processes

Biometrics

Hordes of surreptitiously infiltrated computers, linked and controlled remotely, are known as zombie networks or: A. honeypots. B. botnets. C. zombots. D. megabots. E. blacklists.

Botnets

____ refers to the process of combining aspects of reporting, data exploration and ad hoc queries, and sophisticated data modeling and analysis. A. Business intelligence B. Queritic modeling C. Big Data D. Logistics E. Electronic trading

Business intelligence

The data a firm can leverage is a true strategic asset when it is valuable, rare, imperfectly imitable, and non-substitutable. T/F?

True

The use of public social networks within private organizations is growing, and many organizations are implementing their own, private, social networks. T/F?

True

Uber prices services according to demand. This allows the company to increase rates during peak periods in order to attract more potential suppliers into the market to meet demand. T/F?

True

Which of the following statements is true about corporations and blogging?A. Corporations that blog have to be careful about editors filtering their ideas. B. CEOs use blogs for purposes that include a combination of marketing, sharing ideas, press response, image shaping, and reaching consumers directly. C. Since corporate blogging offers a one-sided dialogue, people outside the corporation cannot provide feedback about the corporation's products or services. D. Corporate blogs can be published to the public only through the mainstream media. E. Corporate blogs have a limit on page size, and word count.

CEOs use blogs for purposes that include a combination of marketing, sharing ideas, press response, image shaping, and reaching consumers directly.

Which of the following statements regarding cloud computing is true? A. Cloud computing has led to decreased hardware and software sales at many firms, while increasing service expenses. B. The shift to cloud computing does not alter the margin structure for many in the computing industry. C. Cloud computing has raised the barriers for entry to new entrants to the information technology markets. D. Cloud computing discourages innovation and therefore changes the desired skills mix and job outlook for IS workers. E. Cloud computing has shifted power towards venture firms in those industries that had previously needed little startup capital.

Cloud computing has led to decreased hardware and software sales at many firms, while increasing service expenses.

Developers who make application create ____ that have the potential to add value to Facebook beyond what the firm itself provides to its users. A. switching costs B. distribution channels C. one-sided markets D. complementary benefits E. private equity shares

Complementary benefits

___ refers to the practice of ensuring that an org.'s systems operate within legal constraints, and org. obligations. A. Integration B. Parallelism C. Security D. Immunity E. Compliance

Compliance

Uber's CEO views itself as software platforms for shipping and logistics. T/F?

True

Which of the following issues raises advertiser concerns on promoting products and services on social networking sites? A. Low marketing budgets B. Inflation C. DNS cache poisoning D. Phishing E. Content adjacency

Content adjacency

Firmware refers to: A. control software stored on nonvolatile memory chips. B. control software stored on removable discs. C. computer hardware elements visible to the human eye. D. control software stored on hard drives. E. computer hardware elements invisible to the human eye.

Control software stored on nonvolatile memory chips

Salesforce.com's Chatter and Microsoft's Yammer are all examples of: A. keyword-based classification systems created by user communities. B. corporate microblogging services. C. blogs by company executives used for aggregating customer opinion. D. industry-specific social networks. E. private, in-house wikis for setting meeting agendas to building multimedia training for new hires.

Corporate microblogging services

What does the acronym CPM stand for? A. cost per millisecond B. cost per billion impressions C. cost per thousand seconds D. cost per thousand impressions E. cost per million seconds

Cost per thousand impressions

Which of the following is one of the reasons for the failure of technology projects? A. Insufficient expenditure on information systems B. Disallowing "feature creep" during development C. Prolonged project periods D. Use of matured technology E. Inadequate testing of systems before deployment

Inadequate testing of systems before deployment

Another major concerns for firms in the sharing economy is uncertainty around the ability of these firms to continue to consider their workers as ____ and not empolyees. A. investors B. critics C. independent contractors D. liabilities E. none of the above

Independent contractors

Data becomes ____ when it is presented in a context so that it can answer a question or support decision making. . a database B. a relational language C. wisdom D. information E. knowledge

Information

A ____ refers to a heads-up display of critical indicators that allows managers to get a graphical glance at key performance metrics. A. prediction interface B. embassy C. dashboard D. interstitial E. canned report

Dashboard

Firms that collect and resell data are known as: A. data aggregators. B. data mongers. C. data miners. D. data barons. E. knowledge consultancies.

Data aggregators

Cyber criminals who infiltrate systems and collect data for illegal resale are called: A. data harvesters B. ethical hackers C. corporate spies D. cash-out fraudsters E. information hoarders

Data harvesters

____ refer to databases focused on addressing the concerns of a specific problem or business unit. A. Data marts B. Data aggregators C. Dashboards D. Data analytics E. Hadoop

Data marts

Which of the following criteria, according to James Surowiecki, is necessary for a crowd to be 'smart'?. Offer a wide range of verdicts B. Strongly opinionated C. Homogeneous D. Intellectually proximate E. Decentralized

Decentralized

____ technology is a broadband technology that can use the wires of a local telephone network. A. Fiber to the Home (FTTH) B. Telecom-broadband hybrid C. Coaxial cable D. Broadband over power line (BPL) E. Digital Subscriber Line (DSL)

Digital Subscriber Line (DSL)

Social networks are a hothouse for '_____' media, where enthusiast-consumers can help spread the word about products and services.A. paid B. mainstream C. owned D. earned

Earned

Software (often on firmware) designed to make physical products and devices 'smarter' by doing things like sharing usage info, helping diagnose problems, indicating maintenance schedules, providing alerts, or enabling devices to take orders form other systems is referred to as____. A. Enterprise Resource Planning systems B. Embedded systems C. Multi-threaded D. Desktop software programs E. Application servers

Embedded systems

___ refers to a software package that integrates the many functions of a business, such as accounting, finance, inventory management, and HR. A. Desktop software B. Enterprise resource planning C. Supply chain management D. Database management system E. Customer relationship management

Enterprise resource planning

Which of the following statements is true about Facebook? A. Global growth of Facebook is saturated, with most of the planet's population already having Facebook accounts. B. Approximately 20 percent of Facebook users reside in China. C. Entrepreneurs beware: Mark Zuckerberg lost most of the value in the firm he founded to the Winklevoss twins, providing evidence that entrepreneurs should have a founder with a strong legal background. D. Facebook has largely avoided privacy concerns by allowing posts to expire over time. E. Facebook is highly profitable, with a growing ad business on mobile platforms.

Facebook is highly profitable, with a growing ad business on mobile platforms.

Airbnb's technology does not allow the firm to monitor to see if hosts are trying to arrange a stay and payment outside of the system. T/F?

False

Blogs are used to collaborate on common tasks or to create a common knowledge base. T/F

False

Data warehouses are composed entirely of proprietary corporate data, while data marts take advantage of data purchased from third-party firms. T/F?

False

Facebook can be completely indexed by search engines, like Google and Bing, being able to index all of Facebook content. T/F?

False

Facebook's 'no-beta' culture seldom tolerates mistakes on the road to progress. T/F?

False

Facebook's phenomenal growth implies that it requires minimal infrastructure investment.

False

Firms classified as being part of the sharing economy and collaborative consumption are still considered too risky to attract substantial venture capital investment. T/F?

False

Firms that grow quickly may seem less risky/more likely to success; therefore fast growth may help an entrepreneur extract better ownership terms from potential investors. T/F?

False

Payment continues to represent a barrier to widespread adoption of the sharing economy, since many consumers feel uncomfortable exchanging cash or financial information with strangers. T/F?

False

Some firms write their own enterprise software from scratch as it can save time and reduce development costs. T/F?

False

The more application software that is available for a platform, the less valuable it potentially becomes. T/F?

False

Uber claims the firm's growth is minting over 500 new jobs a month. T/F?

False

While firms like Deloitte Consulting and Goldman Sachs had hoped to create lasting social networks of former employees, firms saw little value in these efforts and even exposed themselves to significant legal and privacy threats. T/F

False

While unions and hotel chains might not like Airbnb and feel threatened by its offerings, Airbnb is legal in nearly every market worldwide since private citizens are fully empowered to rent property that they own. T/F

False

The term ____ originally referred to a particularly skilled programmer. A. data harvester B. hacktivist C. hacker D. black hat E. cracke

Hacker

A protester seeking to make a political point by leveraging technology tools, often through system infiltration, defacement, or damage is called a ____. A. ethical hacker B. activist C. cyber agitator D. hacktivist E. cybersquatter

Hacktivist

___ represent a method for organizing tweets where keywords are preceded by the # character. A. Wikis B. Folksonomies C. Microblogs D. Blogs E. Torrents

Hash tags

Entrepreneurs are scrappy in their quest to gather market intelligence and understand how customers respond to their offerings. How did Airbnb's CEO gather additional intelligence on how the firm was being used? A. He bought several apartments to rent out under Airbnb B. He became an Uber driver C. He lived out of Airbnb rentals full-time D. He became a bell hop at a San Francisco Hilton Hotel E. All of the above

He lived out of Airbnb rentals full-time

Which of the following is a valid statement on information security? A. Technology lapses are solely responsible for almost all security breaches. B. Greater expenditure on security products is the only way to contain security breaches. C. Information security is everybody's responsibility. D. Security breaches cannot be prevented despite the adoption of the best security policies. E. A reactive, rather than proactive, approach is better suited for dealing with security breaches.

Information security is everybody's responsibility

An ____ is an application that includes an editor, a debugger, and a compiler, among other tools. A. integrated development environment B. programming language C. enterprise resource planning system D. operating system E. extensible markup language

Integrated development environment

A system that monitors network use for potential hacking attempts and takes preventative action to block, isolate, or identify attempted infiltration, and raise further alarms to warn security personnel is known as: A. honeypot system. B. patching system. C. whitelist. D. intrusion detection system. E. firewall system.

Intrusion detection system

Which of the following functions is likely to be performed by enterprise software? A. Spreadsheet accounting B. Inventory tracking C. Word processing D. Making PowerPoint presentations E. Internet browsing

Inventory tracking

____ refer to older information systems that are often incompatible with other systems, technologies, and ways of conducting business.A. Data aggregator systems B. Mnemonic systems C. Loyalty card systems D. Legacy systems E. Transaction systems

Legacy systems

What is the likely implication of a large and active wiki community? A. It removes boundaries between functional areas and flattens preexisting hierarchies between user classes. B. It becomes more likely that content is up-to-date and errors are quickly corrected. C. It becomes easier for most users to contribute without training or knowledge of arcane code or markup language. D. It makes it easier to maintain a history of any changes so they can be compared and rolled back as needed. E. It becomes more difficult to track alterations made to data by users and errors can creep in owing to that.

It becomes more likely that content is up-to-date and errors are quickly corrected

What is Facebook's motivation for offering new features under an opt-out scheme? A. Mobile ad revenue from the Facebook app has grown steadily since the firm's IPO. B. Instagram is new to advertising and WhatsApp hasn't advertised much, suggesting that Facebook has lots of unrealized growth potential in its app stable. C. Ads on Facebook mobile show up in a user's feed, the area of the screen they pay most attention to, suggesting mobile ads will be tougher to ignore than those on the side of a browser screen. D. All of the above E. None of the above - analysts remain very pessimistic about Facebook's prospects for mobile advertising.

It ensures a larger audience, and helps enhance network effects and data advantages.

Popular sites like Google and Yahoo! have several computers assigned to their host names because: A. of the different devices used to access these web sites. B. it ensures that the load of requests to their sites do not overwhelm a single computer. C. they have operations in different countries. D. hoarding all information in one server is expensive. E. they are registered under several generic top-level domain names.

It ensures that the load of requests to their sites do not overwhelm a single computer.

Which of the following statements is true of the term 'FTTH'? A. It refers to a situation when separate ISPs link their networks to swap traffic on the Internet. B. It refers to the language used to compose Web pages. C. It refers to a system that connects end users to the Internet. D. It refers to broadband service provided via light-transmitting fiber-optic cables. E. It refers to high-speed data lines provided by many firms all across the world that interconnect and collectively form the core of the Internet.

It refers to broadband service provided via light-transmitting fiber-optic cables.

Which of the following statements holds true for the term spoof? A. It refers to e-mail transmissions and packets that have been altered to seem as if they came from another source. B. It refers to highly restrictive programs that permit communication only with approved entities and/or in an approved manner. C. It refers to a con executed using technology, typically targeted at acquiring sensitive information or tricking someone into installing malicious software. D. It refers to scrambling data using a code or formula, known as a cipher, such that it is hidden from those who do not have the unlocking key. E. It refers to a seemingly tempting, but bogus target meant to draw hacking attempts.

It refers to e-mail transmissions and packets that have been altered to seem as if they came from another source

Which of the following statements holds true for the term encryption? A. It refers to a seemingly tempting, but bogus target meant to draw hacking attempts. B. It refers to e-mail transmissions and packets that have been altered to seem as if they came from another source. C. It refers to highly restrictive programs that permit communication only with approved entities and/or in an approved manner. D. It refers to a con executed using technology, typically targeted at acquiring sensitive information or tricking someone into installing malicious software. E. It refers to scrambling data using a code or formula, known as a cipher, such that it is hidden from those who do not have the unlocking key.

It refers to scrambling data using a code or formula, known as a cipher, such that it is hidden from those who do not have the unlocking key.

Which of the following is true of software as a service (SaaS)? A. Due to US and European legal requirements, there are no accounting and corporate finance implications for SaaS in these regions. B. Firms spend more using SaaS. C. Saas firms face diseconomies of scale. D. It refers to software that is made available by a third-party online. E. SaaS vendors are less attuned to customer needs.

It refers to software that is made available by a third-party online

Which of the following statements holds true for the term 'htlm'? A. It refers to the broadband service provided via light-transmitting fiber-optic cables. B. It refers to a situation when separate ISPs link their networks to swap traffic on the Internet. C. It refers to a system that connects end users to the Internet. D. It refers to the language used to create and format Web pages. E. It refers to high-speed data lines provided by many firms all across the world that interconnect and collectively form the core of the Internet.

It refers to the language used to create and format Web pages.

Which of the following technologies are being used to replace the older EDI for specifying data standards? A. JavaScript object notation B. Hypertext transfer protocol C. Extensible markup language D. Both (a) and (b) E. Both (a) and (c)

JavaScript object notation Extensible markup language

____ can be either software-based or deployed via hardware, such as a recording 'dongle' that is plugged in between a keyboard and a PC. A. Bootloggers B. KitRoots C. Adwares D. Keyloggers E. Shadow-keyboards

Keyloggers

The most dominant standard for 4G technology worldwide is: A. LTE B. Circuit switching C. WiMax D. Wi-Fi E. GPRS

LTE

Open source software products often have fewer bugs than their commercial counterparts because of the: A. emphasis placed on technological superiority of OSS products. B. pyramidal programming practice followed by OSS developers. C. relatively poorer standards of commercially programmed software. D. stringent quality checks undertaken by the original developers. E. large number of persons who have looked at the code.

Large number of persons who have looked at the code.

The domain name services (DNS) is a distributed datatbase that allows users to communicate with other computers by: A. assigning IP addresses to different domain names. B. creating IP addresses that are unique to servers. C. mapping host names to domain names. D. assigning domain names to different IP addresses. E. mapping host and domain names to IP addresses of computers.

Mapping host and domain names to IP addressed of computers.

____ are designed to provide rapid notification to their leadership rather than detailed or in-depth comments A. Wikis B. Folksonomies C. Microblogs D. Blogs E. Torrents

Microblogs

Analysts are so bullish on Facebook's mobile advertising prospects because: A. Mobile ad revenue from the Facebook app has grown steadily since the firm's IPO. B. Instagram is new to advertising and WhatsApp hasn't advertised much, suggesting that Facebook has lots of unrealized growth potential in its app stable. C. Ads on Facebook mobile show up in a user's feed, the area of the screen they pay most attention to, suggesting mobile ads will be tougher to ignore than those on the side of a browser screen. D. All of the above E. None of the above - analysts remain very pessimistic about Facebook's prospects for mobile advertising.

Mobile ad revenue from the Facebook app has grown steadily since the firm's IPO Instagram is new to advertising and WhatsApp hasn't advertised much, suggesting that Facebook has unrealized growth in its app stable Ads on Facebook mobile show up in a user's feed, the area of the screen they pay most attention to, suggesting mobiles

Which of the following factors has helped Facebook build up trust among its users? A. Superior technology compared to rivals B. Mutual and reciprocal approval of friend requests C. Free nature of applications available to users D. Low switching costs E. Availability of venture capital funds

Mutual and reciprocal approval of friend requests.

Less popular open source products are not likely to attract the community of users and contributors necessary to help improve these products over time. This situation reiterates the belief that ____ are a key to success. A. brand strategies B. technology expenses C. proprietary products D. advertising campaigns E. network effects

Network effects

Studying Facebook provides a context for understanding which of the following: A. network effects B. platform partnerships C. privacy D. business value of social media E. all of the above

Network effects Platform partnerships Privacy Business value of social media

Installing a complex set of an org. legacy systems on third-party hardware can be a brutal challenge. For that reason we can expect most cloud computing efforts to focus on: A. migrating to a set of robust and well-defined standards. B. the development of large pools of in-house specially suited hardware. C. bettering the options for old software. D. improving quality of existing code. E. new software development projects.

New software development projects

Which of the followings aspects of international law would enable a cyber-criminal operating across borders to evade prosecution? A. Technological incompatibility between the two countries B. Lack of technology to identify the origin of a security attack C. Non-recognition of commission of a security-related crime D. Unwillingness of developed countries to share technical know-how with lesser-developed countries E. Non-existent extradition agreements between two countries

Non-existent extradition agreements between two countries

For years, which of the following is the only major media category that has been seen as increasing in spending? A. Online advertising B. Radio jingles C. Television ads D. Print media E. Telemarketing

Online advertising

____ is a method of querying and reporting that takes data from standard relational databases, calculates and summarizes the data, and then stores the data in a special database called a data cube. A. Online analytical processing B. Data aggregation C. Data adjacency D. Ad hoc reporting E. E-discovery

Online analytical processing

___ refers to software that is free and where anyone can look at and potentially modify the code. A. Licensed software B. Proprietary software C. Open source software D. Software as a service E. Social software

Open source software

Which of the following is true of the difference between operating systems and application software? A. Operating systems are software packages offered by a third party, while application software contains programs that are designed in-house. B. Operating systems support tasks performed by a single user, while application software support tasks performed by multiple users. C. Operating systems control the hardware, while application software performs the work that users and firms are directly interested in accomplishing. D. Operating systems control the hardware elements visible to the human eye, while application software controls the hardware elements invisible to the human eye. E. Operating systems are software packages that integrate the many functions of a business, while application software works with a minimal degree of overlap.

Operating systems control the hardware, while application software performs the work that users and firms are directly interested in accomplishing.

Which of these would be an example of a DDoS attack? A. Launching tough-to-track click-fraud efforts B. An extortion attempt where hackers threaten to reveal names and social security information stolen from medical records databases C. Stealing proprietary data directly from mobile phones using a distributed network of difficult-to-trace online services. D. Overloading a popular social networking site with inbound messages in order to shut down access to the site E. Launching a targeted phishing campaign on a department of defense or other surveilance network.

Overloading a popular social networking site with inbound messages in order to shut down access to the site.

Updates that plug existing holes in software are called: A. maculations. B. compliance. C. patches. D. keys. E. dongles.

Patches

Which of the following refers to a variant of utility computing where vendors provide the operating system and supporting software like database management systems but where client firms write their own code? A. Software as a service B. Host service vendor C. Platform as a service D. Infrastructure as a service E. Application service provider

Platform as a service

Which of the following characteristics is said to be Java's biggest selling point. A. Open source nature B. Platform independence C. Interpretability D. Service-oriented architecture E. Data portability

Platform independence

___ provide the standards, syntax, statements, and instructions for writing computer software. A. Programming languages B. Database management systems C. Platforms D. Application servers E. Operating systems

Programming languages

A ____ enables communication by defining the format of data and rules for exchange. A. nomenclature B. convention C. protocol D. regulation E. dialect

Protocol

The sharing economy consist of which of the following: A. recirculation of goods B. increased utilization of durable assets C. exchange of services D. sharing of productive assets E. all of the above

Recirculation of goods Increasing utilization of durable assets Exchange of services Sharing of productive assets

Markets can leverage social media channels for: A. all of the above. B. reinforcing a customer's relationship with the firm. C. competitive intelligence. D. disseminating information. E. generating customer input.

Reinforcing a customer's relationship with the firm competitive intelligence disseminating information general customer input

Which of the following is not considered an advantage of Hadoop? A. scalability. B. cost effectiveness. C. flexibility. D. relational structure. E. fault tolerance.

Relational structure

Cloud computing refers to: A. designing microprocessors with two or more calculating processor cores on the same piece of silicon. B. designing computers with many microprocessors that work together, simultaneously, to solve problems. C. manufacturing semiconductors as a stack of multiple, interconnected layers instead of in one flat plane. D. replacing computing resources with services provided over the Internet. E. a technology that can make a single computer behave like many separate computers.

Replacing computing resources with services provided over the Internet

One of the functions of the IP is to: A. check for damaged or corrupt message packets and request for replacements, if needed. B. rearrange message packets in the same sequence as they were sent. C. label message packets with source and destination addresses. D. route message packets to the final destination. E. slice up the message into smaller chunks of data called packets, to be sent over the network.

Route message packets to the final destination

Why do firms need to create separate data repositories for their reporting and analytics work? A. Most firms store their data assets offsite to insure themselves against the possibility of data damage through natural disasters. B. Running analytics against transactional data can bog down a TPS. C. Most organizations need to differentiate data derived in-house and from data aggregators. D. Maintaining huge databases can be a cost-sink for most firms. E. Reporting and analytics are two separate functions, each requiring its own separate database specifically formatted to the needs of the management team.

Running analytics against transactional data can bog down a TPS

____ is by far the most popular language for creating and manipulating databases. A. SQL B. XML C. Java D. HTML E. PHP

SQL

Which of the following is one of the characteristics of using software as a service model? A. Fixed operating expenses B. Heightened financial risk C. Higher maintenance costs D. Scalable systems E. Longer deployment times

Scalable systems

Which of the following is one of the sources of revenue for open source vendors? A. Claiming royalties on software based on open source code B. Marketing versions of open source software masked as proprietary software C. Licensing OSS for incorporation into subsequent open source products D. Selling open source products at prices well below commercial products E. Selling support and consulting services

Selling support and consulting services

What is the most common function performed by electronic data interchanges? A. Sending electronic equivalents of structured documents between different organizations B. Integrating various electronic functions of a business, such as accounting, finance, inventory management, and human resources C. Providing electronic reporting and analysis for organizational decision making D. App store downloads and the serving of other types of rich media. E. Housing and serving business logic for use and reuse by multiple electronic applications

Sending electronic equivalents of structured documents between different orgs.

A data cube refers to a: A. combination of fields used to uniquely identify a record, and to relate separate tables in a database. B. special database used to store data in OLAP reporting. C. firm that collects data with the intention of reselling it to others. D. heads-up display of critical indicators that allow managers to get a graphical glance at key performance metrics. E. secure, cloud-based off-site location used for data storage, analysis, and reporting.

Special database used to store data in OLAP reporting

The dark Web refers to: A. peer-to-peer file sharing networks that are used to illegally share copyrighted material. B. seemingly innocent Web sites, containing malware that infects computers. C. sites that cannot be indexed by Google and other search engines. D. networks that allow only mutually trusted peers to participate in file-sharing activities. E. Web sites that advocate violence toward people of a specific race, ethnicity, or religion.

Sites that cannot be indexed by Google and other search engines.

Which of the following types of infiltration techniques does one open up to by posting sensitive personal information and details about one's workplace on social networking sites? A. Social engineering B. Virus infections C. Password theft D. Phishing E. Physical threats

Social engineering

A ___ is a fake online persona created to promote a particular point of view, often in praise of a firm, product, or individual: A. sock puppet B. avatar C. gadfly D. troll E. poltergeist

Sock Pupper

____ refers to a precise set of instructions that tell the computer hardware what to do. A. An input device B. An output device C. Desktop D. Software E. A mnemonic

Software

Which of the following refers to wireless systems provided by earth-bound stations like cell phone towers? A. Geosynchronous wireless B. LEO systems C. Terrestrial wireless D. Ground wireless E. Geostationary wireless

Terrestrial wireless

Which of the following conditions is essential for data mining to work? A. The organization must leverage standard relational databases as opposed to inferior hierarchical and analytical databases. B. The data mining software must necessarily incorporate ad hoc reporting tools and dashboards. C. The events in the data should reflect current and future trends. D. The data must be collected from proprietary sources and not from data aggregators. E. The data should have passed the Diehard suite of stringent tests for randomness.

The events in the data should reflect current future trends.

Which of the following statements relating to open source software is true? A. Open source software is available for anyone to download from the Internet, but the code should not be modified. B. Major hardware firms no longer employ paid staff contributing to open source projects. C. The vast majority of people who work on efforts like Linux are now paid to do so by non-profit organizations such as the Linux foundation. D. The source code for open source software may be modified and redistributed, provided it is priced reasonably and part of the proceeds is contributed to the Linux Foundation. E. The flagship OSS product is the Linux operating system, now available on all scales of computing devices.

The flagship OSS product is the Linux operating system, not available on all scales of computing devices.

The term 'social graph' refers to: A. user-generated content that is shared by a broad community of users. B. an online community that allows users to establish personal profiles. C. the global mapping of users and organizations, and how they are related. D. the sum total of the economic and social value created by a network of individuals. E. the effects that emerge from individuals who use the same products or services.

The global mapping of users and organizations, and how they are related.

The software business is extremely profitable compared to the hardware business because: A. software firms benefit from special tax exemptions that aid profitability. B. software development is a one-time process with no upgrade costs. C. of the lack of market price regulations and guidelines. D. the marginal cost to produce an additional copy of a software product is effectively zero. E. software producers serve niche businesses sectors with high profit margins.

The marginal cost to produce an additional copy of a software product is effectively zero.

The fault-tolerant nature of DNS ensures that: A. mismatched host names and domain names are still assigned with the correct IP address. B. if a document or file can't be accessed, it won't result in a 404 error. C. the service continues functioning even if one nameserver goes down. D. mistyped or misspelled Web addresses are automatically corrected. E. if users can't reach a host computer, they are redirected back to the previous page

The service continues functioning even if one nameserver goes down.

Which of the following statements holds true for Wikis? Their key use is to anonymously share ideas in an unattributed manner. B. Their key use is to collaborate on common tasks or to create a common knowledge base. C. Their key use is creating an effective form for online advertising, customer tracking, and service personalization. D. Their key use is to discover and reinforce affiliations, identify experts, message individuals or groups, and virally share media. E. Their key use is to poll a diverse crowd and aggregate opinions to form a forecast of an eventual outcome.

Their key use is to collaborate on common tasks or to create a common knowledge base.

Which of the following statements is true about microblogging? A. Their key use is to distribute time-sensitive information, share opinions, virally spread ideas, run contests and promotions, solicit feedback, provide customer support, track commentary on firms/products/issues, and organize protests. B. Their key use is to poll a diverse crowd and aggregate opinions to form a forecast of an eventual outcome. C. Their key use is to collaborate on common tasks or to create a common knowledge base. D. Their key use is as a tool for the creation and maintenance of open source and other software products. E. Their key use is to share ideas, obtain feedback, and mobilize a community.

Their key use is to distribute time-sensitive information, share opinions, virally spread ideas, run contests and promos, solicit feedback, provide customer support, track commentary on firms/products/issues, and organize protests.

Vendors who use open source as part of their product offerings can expect to bring new products to the market faster because: A. open source software programming is based on simpler code than commercial products. B. the large number of people who look at the code help speed up product development. C. open source products have lower product life cycles. D. they can skip segments of the software development process. E. the open source nature of the products ensures they don't have to conduct debugging tests.

They can skip segments of the software development process

What are the implications for firms that do not have common database systems with consistent formats across their enterprise? A. They can hedge against the risk of data redundancy. B. They can expect to leverage economies of scale by serving more customers. C. They struggle to manage their value chain efficiently. D. They can save infrastructural and operational costs. E. They profit from the aggregation of diverse data sets and enhance their repositories.

They struggle to manage their value chain efficiently

The LAMP stack of open source products is used: A. as a global set of standards for software product improvements and official releases. B. to provide guidelines for programming databases. C. to power many of the Internet's most popular Web sites. D. as a template for most operating systems. E. in debugging most of the software tools available today.

To power many of the Internet's most popular Web sites.

All of the costs associated with the design, development, testing, implementation, documentation, training and maintenance of a software system are collectively termed as: A. economic value added. B. return on investment. C. economies of scale. D. cost to company. E. total cost of ownership.

Total cost of ownership

The Internet Protocol Suite consists of the Internet Protocol and ____. A. Datagram Congestion Control Protocol B. Session Initiation Protocol C. Simple Mail Transfer Protocol D. File Transfer Protocol E. Transmission Control Protocol

Transmission Control Protocol

Computer systems are often infected with malware by means of exploits that sneak in masquerading as something they are not. These exploits are called: A. rootkits. B. trojans. C. viruses. D. honeypots. E. worms.

Trojans

A device gets its IP address from whichever organization is currently connecting to the Internet. T/F?

True

A firm can mix and match components, linking software the firm has written with modules purchased from different enterprise software version. T/F?

True

Application Programming Interface refers to the technology used to integrate Uber with other services, including OpenTable, GoogleMaps, and Spotify. T/F?

True

Changing the letter case when typing in host and domain names does not affect the user's ability to reach the destination. T/F?

True

Facebook's acquisition of WhatsApp was a way for Zuckerberg's firm to gain leadership in the fast-growing mobile messaging market. T/F?

True

Highly fragmented markets are especially ripe for rollup in electronic marketplaces. T/F?

True

If eBay and Craigslist are included, some 44 percent of the US and Canadian population have participated in the sharing economy. T/F?

True

Managers who understand software are better equipped to harness the possibilities and impact of technology. T/F?

True

Most mainstream news outlets have begun supplementing their content with blogs that can offer greater depth, more detail, and deadline-free timeliness. T/F

True

Random occurrences in data mining results can be detected by dividing the data and building a model one portion and using another portion to verity the results. T/F?

True

Routers don't have perfect, end-to-end information on all points in the Internet. T/F?

True

The address one types into a Web browser is also known as a: A. unique resource locator. B. uniform resource locator. C. universal redirection locator. D. universal redirection link. E. uniform resource link.

Uniform resource locator

Investor groups that provide funding in exchange for an ownership stake in the firm are called ____? A. credit unions B. venture capital firms C. hedge fund managers D. mutual fund executives E. greenfield investors

Venture capital firms

Peer production refers to:A. graphical editing tools, such as those found in a wiki, page layout program, or other design tool. B. programming hooks, or guidelines published by firms that tell other programs how to get a service to perform a task such as send or receive data. C. users collaboratively working to create content, products, and services. D. the process of tracking and responding to online mentions of a product, organization, or individual. E. content that is more complex than simple text or photos and includes animation, audio, and video.

Users collaboratively working to create contents, products, and services.

The use of public wireless connections can increase a user's vulnerability to monitoring and compromise. ____ software can be used to encrypt transmission over public networks, making it more difficult for a user's PC to be penetrated. A. Rootkit B. CAPTCHa C. Keylogging D. VPN E. DDos

VPN

___ is a term that refers to a closed network or single set of services controlled by one dominant firm. A. Walled garden B. Cloud C. Network effects D. Free rider problem E. Localization

Walled garden

How are sites and services from the Internet's first phase (Web. 1.0) different from those that are classified as social media or peer-production efforts? A. Web 1.0 services are a broader mixture of multimedia content than Web 2.0 services. B. Web 2.0 services foster collaboration and information sharing, as opposed to static, transaction-oriented Web 1.0 efforts. C. Web 1.0 services include a wide array of social networks, blogs, and instant messaging services. D. Web 1.0 services included syndication and search engine optimization features compared to their more efficient Web 2.0 counterparts. E. Applications in Web 1.0 are placed within supporting structures such as social networks, instead of being placed directly on the Web.

Web 2.0 services foster collaboration and information sharing, as opposed to static, transaction-oriented Web 1.0 efforts.

The hypertext transfer protocol (http) defines the communication between: A. Web browsers and Web servers. B. hardware and Web browsers. C. mail servers and hardware. D. operating systems and Web browsers. E. hardware and operating systems.

Web browsers and Web servers

A firm that provides hardware and services to run Web sites of others is known as a: A. Internet Web fab B. Web site incubator C. Internet service facilitator D. Web hosting service E. Web domain name registrar

Web hosting service

___ are software systems to support interoperable machine-to-machine interaction over a network. A. Web services B. Scripting languages C. Business intelligence systems D. Caches E. Client-servers

Web services

Which of the following applications is most likely to use UDP instead of TCP? A. Web transmissions B. E-mail C. Peer-to-peer downloads D. File transfer E. Web-based phone calls

Web-based phone calls

Cloud computing is not typically suited for situations: A. with no existing regulatory compliance issues. B. where complex legacy systems have to be ported. C. where pricing economics favor buying over renting. D. involving offloading of expensive computing tasks. E. characterized by limited-time tasks.

Where complex legacy systems have to be ported

A ____ is someone who uncovers computer weaknesses and reveals them to manufacturers or system owners, without exploiting these vulnerabilities. A. corporate spy B. data harvester C. white hat hacker D. hacktivist E. ethical cyber criminal

White hat hacker

____ are individuals employed by an org. to review community website content in order to prune excessive contributions, move commentary to the best location, and edit as necessary. A. Astroturfers B. System administrators C. Web masters D. Database administrators E. Wikimasters

Wikimaster

Attacks that exhaust all possible password combinatinos in order to break into an account are called ____ attacks A. strong arm B. infinity C. brute-force D. zero-day E. permuted

brute-force

Most transactional databases are not set up to be simultaneously accessed for reporting and analysis. As a consequence: A. most firms incur additional expenditure to effectively record transactions. B. firms prefer to outsource data mining operations to third-party firms. C. navigational databases are being preferred over transactional databases. D. data is not efficiently transformed into information. E. analysts must also become transactional specialists.

data is not efficiently transformed into information

Data mining is leverages by some firms to determine which products customers buy together, and how an organization can use this information to cross-sell more products or services. This are of application of data mining is referred to as: A. market basket analysis. B. customer churn. C. customer segmentation. D. vertical integration. E. expert systems.

market basket analysis

A prediction market involves: A. polling a diverse crowd and aggregating opinions to form a forecast of an eventual outcome. B. making calculated estimates on the prices of goods and services based on the speculation of a group of experts. C. aggregating the opinions of a specialized group of experts who analyze a problem and suggest solutions. D. trading on essential goods and services with a view of making a profit by hiking prices at a time of high demand. E. leveraging customers to virally promote a firm's products or services.

polling a diverse crowd and aggregating opinion to form a forecast of an eventual outcome.


Related study sets

PHED 1164 FINAL EXAM Study Guide

View Set

PSYC&100 General Psychology: Chapter 13

View Set

Environmental Science: Geology, Minerals, and MIning

View Set

Risk Management Exam Study Guide

View Set

Crash Course AP US History Supreme Court Cases

View Set