Acc 270 Exam 2
15. _____ is a term used to describe unpredictable, but highly impactful events.
Black swans
25. In database terminology, a record represents
A single instance of whatever the table keeps track of.
30. What is an example of cybersquatting?
Acquiring a domain name to extort a firm, individual, product, or trademark holder
2. Which of the following statements is true about Airbnb's revenue model?
Airbnb charges both property owners and guests as part of transactions on their website.
8. If a computer system can be equated to a layered cake, which of the following combinations represents the computer system in the bottom-to-top order?
Hardware, operating system, application, user
3. Entrepreneurs are scrappy in their quest to gather market intelligence and understand how customers respond to their offerings. How did Airbnb's CEO gather additional intelligence on how the firm was being used?
He lived out of Airbnb rentals full-time
23. _____ is the term used to describe raw facts and figures.
Data
22. _____ refer to databases focused on addressing the concerns of a specific problem or business unit.
Data marts
50. Ad rank on Google is calculated using the equation: Ad Rank = f(_______________, Quality Score, expected impact of extensions and formats).
Maximum CPC
10. Which of the following characteristics is said to be Java's biggest selling point?
Platform independence
11. What is the most common function performed by electronic data interchanges?
Sending electronic equivalents of structured documents between different organizations
48. "Cookies cannot reliably identify individual users." Which of the following is the reason for the statement?
Individual users use different browsers on the same computer to surf the Web.
20. Data becomes _____ when it is presented in a context so that it can answer a question or support decision making.
Information
34. ____ repeatedly sends a cluster of three packets starting at the first router connected to a computer, then the next, and so on, building out the path that packets take to their destination.
Traceroute
40. The use of public wireless connections can increase a user's vulnerability to monitoring and compromise. ____________ software can be used to encrypt transmissions over public networks, making it more difficult for a user's PC to be penetrated.
VPN
7. _____ refers to a precise set of instructions that tell the computer hardware what to do.
Software
14. Cloud vendors that host hardware, operating system, database, and other software, which clients can then use to build their own applications, are said to be providing:
Software as a Service.
27. Data mining is leveraged by some firms to determine which products customers buy together, and how an organization can use this information to cross-sell more products or services. This area of application of data mining is referred to as:
market basket analysis
43. Technologies that measure and analyze human body characteristics for identification or authentication are known as _____.
biometrics
35. Hordes of surreptitiously infiltrated computers, linked and controlled remotely, are known as zombie networks or:
botnets
41. Attacks that exhaust all possible password combinations in order to break into an account are called _____ attacks.
brute force
18. Less popular open source products are not likely to attract the community of users and contributors necessary to help improve these products over time. This situation reiterates the belief that _____ are a key to success.
network effects
6. Android is a software product developed by Google that allows cell phone manufacturers to control hardware and establishes standards for developing and executing applications on its platform. Android is thus an example of a(n) _____.
operating system
47. The _____ refers to a situation where ads appear alongside text the advertiser would like to avoid.
content adjacency problem
9. Firmware refers to:
control software stored on nonvolatile memory chips.
33. Circuit-switched networks provide connection between two parties that:
is dedicated for use by the parties for the duration of a connection.
21. If a customer pays a retailer in cash, he is likely to remain a mystery to the retailer because his name is not attached to the money. Retailers can tie the customer to cash transactions and track the customer's activity if they can convince the customer to use a _____.
loyalty card
38. A bank customer receives a message, ostensibly from the bank's Web site, asking her to provide her login information. Assuming the message is intended to defraud the customer, what type of infiltration technique is being used here?
phishing
24. Knowledge is defined as:
the insight derived from experience and expertise.
32. The fault-tolerant nature of the DNS ensures that:
the service continues functioning even if one nameserver goes down.
13. The LAMP stack of open source products is used:
to power many of the Internet's most popular Web sites
39. Computer systems are often infected with malware by means of exploits that sneak in masquerading as something they are not. These exploits are called:
trojans
31. The address one types into a Web browser is also known as a:
uniform resource locator.
17. A server running _____ can create smaller compartments in memory that each behave as a separate computer with its own operating system and resources
virtualization software
45. Search engines use _____ to discover documents for indexing and retrieval.
web-crawling spiders
36. A(n) _____ is someone who uncovers computer weaknesses and reveals them to manufacturers or system owners, without exploiting these vulnerabilities.
white hat hacker
4. Computer hardware refers to:
the physical components of information technology.
37. Which of these would be an example of a DDoS attack?
Overloading a popular social networking site with inbound messages in order to shut down access to the site
5. Which of the following is an example of computer hardware?
Xbox (video game) console
26. _____ put(s) users in control so that they can create custom reports on an as-needed basis by selecting fields, ranges, summary conditions, and other parameters.
Ad hoc reporting tools
16. Which of the following statements regarding cloud computing is true?
Cloud computing has led to decreased hardware and software sales at many firms, while increasing service expenses
49. Which of the following statements holds true for the term opt-out?
It refers to a program that enrolls all customers by default, but that allows consumers to discontinue participation if they want to.
29. Which of the following is true of the term Internet backbone?
It refers to high-speed data lines provided by many firms all across the world that interconnect and collectively form the core of the Internet.
42. Which of the following statements holds true for the term encryption?
It refers to scrambling data using a code or formula, known as a cipher, such that it is hidden from those who do not have the unlocking key.
19. Which of the following is true of software as a service (SaaS)?
It refers to software that is made available by a third-party online.
46. Which of the following statements holds true for the term click-through rate?
It refers to the number of users who clicked an ad divided by the number of times the ad was delivered.
44. Which of the following statements holds true for search engine optimization (SEO)?
It refers to the process of improving a page's organic search results.
1. Which of the following is not true regarding the competitive dynamics of most sharing economy marketplaces?
Late-movers have a substantial advantage in this market since inventory should be cheaper to acquire for those firms that have entered markets more recently.
12. _____ refers to software that is free and where anyone to look at and potentially modify the code.
Open source software
28. A _____ enables communication by defining the format of data and rules for exchange.
Protocol