BUS INFO Exam 2

Ace your homework & exams now with Quizwiz!

Chapter 14 - Question 8 What is the key takeaway from the Heartland breach? A. Even widely-used open source software is vulnerable. B. Compliance does not equal security and firms that have passed multiple compliance audits may still remain vulnerable. C. SSL public-key encrpytion can be hacked. D. GitHub is a horrible place to store widely-used code. E. Firms that fail to employ ISO 27000 will remain vulnerable.

B. Compliance does not equal security and firms that have passed multiple compliance audits may still remain vulnerable.

Chapter 9 - Question 1 As per the chapter, firms classified as being part of the sharing economy and collaborative consumption are still considered too risky to attract substantial venture capital investment. A. True B. False

B. FALSE

Chapter 10 - Question 5 Computer hardware refers to: A. a precise set of instructions that orchestrate the functioning of the computer. B. the physical components of information technology. C. the mechanism through which users interact with a computer. D. a program that fulfills the requests of a client. E. handheld computing devices meant largely for mobile use outside an office setting.

B. the physical components of information technology.

Chapter 11 - Question 5 _____ allow(s) a server to run what amounts to a copy of a PC—OS, applications, and all—and simply deliver an image of what's executing to the remote device. A. Virtual desktops B. Cloudbursting C. Hardware clouds D. Vertical niches E. Black swans

A. Virtual desktops

Chapter 13 - Question 9 Popular sites like Google and Yahoo! have several computers assigned to their host names because: A. they have operations in different countries. B. they are registered under several generic top-level domain names. C. of the different devices used to access these web sites. D. hoarding all information in one server is expensive. E. it ensures that the load of requests to their sites do not overwhelm a single computer.

E. it ensures that the load of requests to their sites do not overwhelm a single computer.

Chapter 13 - Question 8 One of the factors that accelerated the development of the Internet during the 1990s was: A. the introduction of the personal computer into households. B. the government's taking over of the Internet's operating structure from private players. C. Intel's invention of low power processors used in portable computers. D. the creation of the Windows and Mac OS operating systems. E. the invention of graphical Web browsing.

E. the invention of graphical Web browsing.

Chapter 12 - Question 10 In database systems, a _____ defines the data that a table can hold A. row B. key C. record D. file E. field

E. field

Chapter 10 - Question 2 A(n) _______is a software program that makes requests of a server program.

Client

Chapter 9 - Question 8 Which of the following is not an example of larger, conventional firms working with sharing economy startups? A. Apple's purchase of Beats to give new musical artists more exposure. B. Condé Nast's investment in Rent the Runway. C. Google's investment in Uber. D. Walgreens' partnership with TaskRabbit. E. W Hotel partnering with Desks Near Me.

A. Apple's purchase of Beats to give new musical artists more exposure.

Chapter 10 - Question 8 If a computer system can be equated to a layered cake, which of the following combinations represents the computer system in the bottom-to-top order? A. Hardware, operating system, application, user B. User, application, hardware, operating system C. User, operating system, hardware, application D. Application, operating system, hardware, user E. Operating system, hardware, user, application

A. Hardware, operating system, application, user

Chapter 10 - Question 7 Which of the following is one of the reasons for the failure of technology projects? A. Inadequate testing of systems before deployment B. Insufficient expenditure on information systems C. Use of matured technology D. Prolonged project periods E. Disallowing "feature creep" during development

A. Inadequate testing of systems before deployment

Chapter 10 - Question 6 Which of the following is an example of application software? A. MS Word B. iOS C. Linux D. MS Windows E. Android

A. MS Word

Chapter 15 - Question 6 Ad rank on Google is calculated using the equation: Ad Rank = f (_______________, Quality Score, expected impact of extensions and formats) A. Maximum CPC B. Maximum CPM C. CTR D. Impression E. PageRank

A. Maximum CPC

Chapter 14 - Question 4 Which weakness of Web sites to launch attacks does an SQL injection technique exploit? A. Sloppy programming practices where software developers do not validate user input B. Lack of in-built anti-virus features C. Irregular auditing of Web site content D. Ease of infiltrating the Web site E. Non-employment of encryption techniques

A. Sloppy programming practices where software developers do not validate user input

Chapter 9 - Question 10 If eBay and Craigslist are included, some 40 percent of the US and Canadian population have participated in the sharing economy. A. True B. False

A. TRUE

Chapter 9 - Question 3 Uber's CEO views itself as software platform for shipping and logistics. A. True B. False

A. TRUE

Chapter 9 - Question 6 Social media profiles can also be used to fight online fraud. A. True B. False

A. TRUE

Chapter 9 - Question 7 Uber prices services according to demand. This allows the company to increase rates during peak periods in order to attract more potential suppliers into the market to meet demand. A. True B. False

A. TRUE

Chapter 12 - Question 6 Which of the following is not a step in developing and deploying more ethical and less risk-prone systems? A. Use AI in the hiring process B. Develop a code of technology ethics. C. Create a systems review board D. Hire ethicists E. All of the above are steps in developing more ethical systems

A. Use AI in the hiring process

Chapter 15 - Question 2 What is a "black hat SEO"? A. Using unauthorized (and Google-prohibited) techniques to improve a page's search results B. Paying off a search engine firm's engineers to lower your ad rate C. Linking to competitor websites in hopes that they will fall in search engine rankings D. Attempting to hack into a firm's email to manipulate SLA contracts E. All of the above

A. Using unauthorized (and Google-prohibited) techniques to improve a page's search results

Chapter 13 - Question 4 Peering usually takes place at neutral sites called _____. A. https B. IPs C. ISPs D. IXPs E. STPs

D. IXPs

Chapter 15 - Question 10 Link farming is a type of online advertising fraud where fraudsters attempt to: A. create a series of bogus websites, all linking back to a page, in the hope of increasing that page's results in organic search B. pack a website with unrelated keywords in the hope of luring users who wouldn't normally visit a website C. search keywords linked to rival ads in the hope of generating impressions without clicks to lower the performance rank of these ads D. frame a rival by generating bogus clicks or impressions that appear to be associated with the rival, in the hope that this rival will be banned from an ad network E. generate bogus impressions that can be linked back to a rival's ad to exhaust the rival's CPM ad budget

A. create a series of bogus websites, all linking back to a page, in the hope of increasing that page's results in organic search

Chapter 13 - Question 2 A potential roadblock to transition of DSL to FTTH is the: A. high costs of building entirely new networks. B. scarcity of the material required to create the cables. C. impracticality of switching to a technology that is not proven yet. D. location driven quality of service offered by fiber optic technology. E. high possibility of external interference and hence, fears of information security.

A. high costs of building entirely new networks.

Chapter 11 - Question 2 Open source software products often have fewer bugs than their commercial counterparts because of the: A. large number of persons who have looked at the code. B. stringent quality checks undertaken by the original developers. C. emphasis placed on technological superiority of OSS products. D. relatively poorer standards of commercially programmed software. E. pyramidal programming practice followed by OSS developers.

A. large number of persons who have looked at the code.

Chapter 12 - Question 1 Data mining is leveraged by some firms to determine which products customers buy together, and how an organization can use this information to cross-sell more products or services. This area of application of data mining is referred to as: A. market basket analysis B. expert systems C. customer churn D. customer segmentation E. vertical integration

A. market basket analysis

Chapter 11 - Question 6 The software business is extremely profitable compared to the hardware business because: A. the marginal cost to produce an additional copy of a software product is effectively zero. B. of the lack of market price regulations and guidelines. C. software producers serve niche businesses sectors with high profit margins. D. software development is a one-time process with no upgrade costs. E. software firms benefit from special tax exemptions that aid profitability.

A. the marginal cost to produce an additional copy of a software product is effectively zero.

Chapter 11 - Question 7 All of the costs associated with the design, development, testing, implementation, documentation, training and maintenance of a software system are collectively termed as: A. total cost of ownership. B. economies of scale. C. economic value added. D. return on investment. E. cost to company.

A. total cost of ownership.

Chapter 11 - Question 8 Which of the following was considered a contributor to vulnerabilities in the OpenSSL security product, known as the Heartbleed bug: A. Overseas hackers modified the open source code and uploaded a compromise version to the Internet, which became widely used. B. Few developers were working on the project, so the ideal that "given enough eyeballs, all bugs are shallow" wasn't met with OpenSSL. C. Developers failed to see a major incompatibility with versions of the Windows operating system and Chrome browser. D. There was no commercial entity overseeing the project. E. A Linux update was not coordinated with OpenSSL, leaving a gaping hole when the two products were used together to transmit content over the Internet.

B. Few developers were working on the project, so the ideal that "given enough eyeballs, all bugs are shallow" wasn't met with OpenSSL.

Chapter 13 - Question 5 Which of the following statements is true of the term "FTTH"? A. It refers to high-speed data lines provided by many firms all across the world that interconnect and collectively form the core of the Internet. B. It refers to broadband service provided via light-transmitting fiber-optic cables. C. It refers to the language used to compose Web pages. D. It refers to a situation when separate ISPs link their networks to swap traffic on the Internet. E. It refers to a system that connects end users to the Internet.

B. It refers to broadband service provided via light-transmitting fiber-optic cables.

Chapter 11 - Question 3 Which of the following is true of software as a service (SaaS)? A. Firms spend more using SaaS. B. It refers to software that is made available by a third-party online. C. Due to US and European legal requirements, there are no accounting and corporate finance implications for SaaS in these regions. D. Saas firms face diseconomies of scale. E. SaaS vendors are less attuned to customer needs.

B. It refers to software that is made available by a third-party online.

Chapter 9 - Question 2 Which of the following is not true regarding the competitive dynamics of most sharing economy marketplaces? A. Ratings represent a switching cost built over time by early participants in sharing economy marketplaces. B. Late-movers have a substantial advantage in this market since inventory should be cheaper to acquire for those firms that have entered markets more recently. C. Network effects should grow over time, favoring firms that got a successful, early start over rivals who arrived late doing the same thing. D. These are two-sided markets. E. None of the above - all statements are true.

B. Late-movers have a substantial advantage in this market since inventory should be cheaper to acquire for those firms that have entered markets more recently.

Chapter 11 - Question 10 Which of the following sets of software represents the constituents of the LAMP stack? A. LimeWire, Acrobat Reader, Mozilla, Python B. Linux, Apache, MySQL, Perl C. Lingo, Afnix, Moby, PPL D. Linux, Android, Mac OS X, PHP E. LimeWire, AppleScript, MATLAB, Photoshop

B. Linux, Apache, MySQL, Perl

Chapter 12 - Question 2 __________ is a type of AI often broadly defined as software with the ability to learn or improve without being explicitly programmed A. Deep learning B. Machine learning C. OCR D. Neural networking

B. Machine learning

Chapter 12 - Question 7 Which of the following is not considered an advantage of Hadoop? A. Flexibility B. Relational structure C. Scalability D. Cost effectiveness E. Fault tolerance

B. Relational structure

Chapter 11 - Question 9 Which of the following is one of the characteristics of using software as a service model? A. Longer deployment times B. Scalable systems C. Fixed operating expenses D. Heightened financial risk E. Higher maintenance costs

B. Scalable systems

Chapter 15 - Question 3 Which of the statements about Google's strategy and competitive environment is true? A. Brin and Page founded Google in their 20s, following Yang and Filo of Yahoo (also in their 20s), underscoring just how easy it is for newcomers to create new threats in today's search market B. The scale of server farms capable of indexing today's Web represents a significant barrier to entry C. Google has invested in proprietary components such as chips and hard drives, creating a difficult-to-copy barrier to entry to any firm seeking to enter its markets D. Bing has been gaining significant market share on Google due to Microsoft's successful leverage of existing products (Xbox, Windows Phone, Office, and the Windows operating system) as a default distribution channel for its search E. All of the above

B. The scale of server farms capable of indexing today's Web represents a significant barrier to entry

Chapter 14 - Question 6 Cyber criminals who infiltrate systems and collect data for illegal resale are called _____. A. cash-out fraudsters B. data harvesters C. corporate spies D. ethical hackers E. information hoarders

B. data harvesters

Chapter 15 - Question 1 The process of computers identifying a user's physical location for the purpose of delivering tailored ads or other content is called _____ A. parallelism B. geotargeting C. triangulation D. network parallax E. trilateration

B. geotargeting

Chapter 12 - Question 9 Data becomes _____ when it is presented in a context so that it can answer a question or support decision-making A. knowledge B. information C. a database D. wisdom E. a relational language

B. information

Chapter 10 - Question 3 A(n) _____ is an application that includes an editor, a debugger, and a compiler, among other tools. A. programming language B. integrated development environment C. operating system D. extensible markup language E. enterprise resource planning system

B. integrated development environment

Chapter 15 - Question 4 Google's stated mission is to: A. establish itself as the most valuable media company in the world B. organize the world's information and make it universally accessible and useful C. pair Internet surfers with advertisers and earn revenue along the way D. foster technological innovation to promote a knowledge-driven culture E. make the world more open and connected

B. organize the world's information and make it universally accessible and useful

Chapter 14 - Question 1 The e-mail password of a senior employee in an organization was compromised by someone observing this user as the employee accessed his account. This is most likely a case of: A. keylogging. B. shoulder surfing. C. dumpster diving. D. screen capture. E. spyware.

B. shoulder surfing.

Chapter 10 - Question 10 Software (often on firmware) designed to make physical products and devices "smarter" by doing things like sharing usage information, helping diagnose problems, indicating maintenance schedules, providing alerts, or enabling devices to take orders from other systems is referred to as ___________. A. Desktop software programs B. Enterprise Resource Planning systems C. Embedded systems D. Multi-threaded E. Application servers

C. Embedded systems

Chapter 9 - Question 4 Entrepreneurs are scrappy in their quest to gather market intelligence and understand how customers respond to their offerings. How did Airbnb's CEO gather additional intelligence on how the firm was being used? A. He bought several apartments to rent out under Airbnb B. He became an Uber driver C. He lived out of Airbnb rentals full-time D. He became a bell hop at a San Francisco Hilton Hotel E. All of the above

C. He lived out of Airbnb rentals full-time

Chapter 14 - Question 3 Which of the following is a valid statement on information security? A. Security breaches cannot be prevented despite the adoption of the best security policies. B. Technology lapses are solely responsible for almost all security breaches. C. Information security is everybody's responsibility. D. Greater expenditure on security products is the only way to contain security breaches. E. A reactive, rather than proactive, approach is better suited for dealing with security breaches.

C. Information security is everybody's responsibility.

Chapter 9 - Question 5 What is the difference between collaborative consumption firms Zilok and Chegg. A. Zilok has gone public, Chegg hasn't. B. Zilok is a service where a person comes to your home to complete a task, Chegg is a rental firm. C. Zilok provides inventory provided by participating 'citizen suppliers', Chegg owns its own inventory. D. Zilok is the European equivalent of Chegg. E. Zilok was purchased by Chegg underscoring the 'winner take all' dynamics of these markets.

C. Zilok provides inventory provided by participating 'citizen suppliers', Chegg owns its own inventory.

Chapter 14 - Question 2 Hordes of surreptitiously infiltrated computers, linked and controlled remotely, are known as zombie networks or: A. honeypots. B. zombots. C. botnets. D. blacklists. E. megabots.

C. botnets.

Chapter 15 - Question 7 A walled garden refers to a: A. site that wraps data in invisible tags that can be recognized by search engines to accurately categorize, compare, and present user information B. group of surreptitiously infiltrated computers linked and controlled remotely C. closed network or single set of services controlled by one dominant firm D. network of users with distinct IP addresses, engaged in click fraud E. tracking cookie used to identify users and record behavior across multiple websites

C. closed network or single set of services controlled by one dominant firm

Chapter 14 - Question 7 Sifting through trash in an effort to uncover valuable data or insights that can be stolen or used to launch a security attack is known as: A. trash recovery. B. junk exploring. C. dumpster diving. D. scrap sifting. E. data sieving.

C. dumpster diving.

Chapter 12 - Question 8 In database systems, a table is also known as a _____ A. field B. record C. file D. row E. key

C. file

Chapter 12 - Question 4 Knowledge is defined as: A. raw facts and figures B. the data presented in a context so that it can answer a question or support decision-making C. the insight derived from experience and expertise D. a listing of primary data E. the process of breaking a complex topic into smaller parts

C. the insight derived from experience and expertise

Chapter 15 - Question 9 Close to 20 percent of Google's revenues come from running ads on: A. the Android platform B. its organic search pages C. third-party websites D. competing search engines E. built-in toolbars

C. third-party websites

Chapter 9 - Question 9 Which of the following statements is true about Airbnb's revenue model? A. Airbnb currently does not make money via transactions, only from advertising listings on its website. B. Airbnb only charges property owners who rent on the website. C. Airbnb only charges guests who rent on the website. D. Airbnb charges both property owners and guests as part of transactions on their website. E. Airbnb doesn't charge transactions for the three years after it enters a market, so as to generate two-sided network effects of property rents and guests searching for properties to stay in.

D. Airbnb charges both property owners and guests as part of transactions on their website.

Chapter 10 - Question 9 Which of the following statements is true about information systems? A. Most firms spend a huge portion of their information technology budgets on training and system security. B. New programs should be thoroughly tested across the range of a firm's hardware after deployment. C. Purchase, configuration, and licensing costs for packaged software account for most information technology expenses of a firm. D. Firms need to vigilantly manage the moving target of computer security issues. E. Total cost of ownership of information systems is often a redundant concept while making technology investment decisions.

D. Firms need to vigilantly manage the moving target of computer security issues.

Chapter 15 - Question 5 Which of the following statements holds true for the term cache? A. It refers to the Internet directory service that allows devices and services to be named and discoverable B. It refers to the process of improving a page's organic search results C. It refers to Internet content that can't be indexed by Google and other search engines D. It refers to a temporary storage space used to speed computing tasks E. It refers to software that traverses available Web links in an attempt to perform a given task

D. It refers to a temporary storage space used to speed computing tasks

Chapter 14 - Question 10 Which of the followings aspects of international law would enable a cyber-criminal operating across borders to evade prosecution? A. Lack of technology to identify the origin of a security attack B. Non-recognition of commission of a security-related crime C. Unwillingness of developed countries to share technical know-how with lesser-developed countries D. Non-existent extradition agreements between two countries E. Technological incompatibility between the two countries

D. Non-existent extradition agreements between two countries

Chapter 12 - Question 5 Why do firms need to create separate data repositories for their reporting and analytics work? A. Most firms store their data assets offsite to insure themselves against the possibility of data damage through natural disasters B. Maintaining huge databases can be a cost-sink for most firms C. Most organizations need to differentiate data derived in-house and from data aggregators D. Running analytics against transactional data can bog down a TPS E. Reporting and analytics are two separate functions, each requiring its own separate database specifically formatted to the needs of the management team

D. Running analytics against transactional data can bog down a TPS

Chapter 13 - Question 7 A firm that provides hardware and services to run Web sites of others is known as a(n) _____. A. Web site incubator B. Internet service facilitator C. Web domain name registrar D. Web hosting service E. Internet Web fab

D. Web hosting service

Chapter 13 - Question 6 Peering refers to: A. high-speed data lines provided by many firms all across the world that interconnect and collectively form the core of the Internet. B. the broadband service provided via light-transmitting fiber-optic cables. C. the language used to compose Web pages. D. a situation when separate ISPs connect their networking equipment together to share traffic. E. a system that connects end users to the Internet.

D. a situation when separate ISPs connect their networking equipment together to share traffic.

Chapter 11 - Question 1 The scalability of a software product is defined as the: A. capability to continue operations even if a component fails. B. long-term market viability of a software product. C. ability to take advantage of complementary products developed for a prior generation of technology. D. ability to be easily expanded to manage workload increases. E. ability to replace a technically superior product upon market inception.

D. ability to be easily expanded to manage workload increases.

Chapter 13 - Question 10 Supporters of net neutrality believe: A. it will improve innovation. B. it will keep costs low. C. it will level the playing field among competitive services offered over the Internet. D. all of the above. E. none of the above.

D. all of the above.

Chapter 10 - Question 4 Firmware refers to: A. computer hardware elements visible to the human eye. B. control software stored on removable discs. C. control software stored on hard drives. D. control software stored on nonvolatile memory chips. E. computer hardware elements invisible to the human eye.

D. control software stored on nonvolatile memory chips.

Chapter 12 - Question 3 An early version of the "Einstein" AI model being developed at Salesforce identified the top predictor of a sales opportunity was if a client: A. had a large disposable income B. had purchased from a particular firm in the past C. was between the ages of 30 and 55 D. had the name John E. None of the above

D. had the name John

Chapter 11 - Question 4 Vendors frequently sign _____ with their customers to ensure a guaranteed uptime and define their ability to meet demand spikes. A. infrastructure provider contracts B. host vendor terms C. open source contracts D. service level agreements E. requests for information

D. service level agreements

Chapter 14 - Question 9 A(n) _____ is someone who uncovers computer weaknesses and reveals them to manufacturers or system owners, without exploiting these vulnerabilities. A. hacktivist B. data harvester C. corporate spy D. white hat hacker E. ethical cyber criminal

D. white hat hacker

Chapter 15 - Question 8 Which of the following statements holds true for the term spider? A. It refers to the Internet directory service that allows devices and services to be named and discoverable B. It refers to the process of improving a page's organic search results C. It refers to Internet content that can't be indexed by Google and other search engines D. It refers to a temporary storage space used to speed computing tasks E. It refers to software that traverses available Web links in an attempt to perform a given task

E. It refers to software that traverses available Web links in an attempt to perform a given task

Chapter 13 - Question 1 ____ repeatedly sends a cluster of three packets starting at the first router connected to a computer, then the next, and so on, building out the path that packets take to their destination. A. Firewall B. Router C. Pathfinder D. Mapper E. Traceroute

E. Traceroute

Chapter 13 - Question 3 The Internet Protocol Suite consists of the Internet Protocol and _____. A. File Transfer Protocol B. Simple Mail Transfer Protocol C. Session Initiation Protocol D. Datagram Congestion Control Protocol E. Transmission Control Protocol

E. Transmission Control Protocol

Chapter 14 - Question 5 Systems that deny the entry or exit of specific IP addresses, products, Internet domains, and other communication restrictions are said to employ a(n): A. intrusion detection software. B. access restriction software. C. whitelists. D. anti-virus software. E. blacklists.

E. blacklists.

Chapter 10 - Question 1 Control programs stored on chips (often used in embedded systems) are sometimes referred to as ________

Firmware


Related study sets

Chapter 7: Causes of the American Revolution

View Set

PSY 245 (drugs and behavior) Chapter 10 final

View Set

Computer Concepts 2018 Section E Module 2

View Set

MKTG345-002-202040 Chapter 4 Homework

View Set