CIS TEST 2

Ace your homework & exams now with Quizwiz!

Crowd Funding Sites

- people join together to loan money for a business idea - websites like GoFundMe, KickStarter

Application Security

1. Application configuration 2. Encryption technology

Disruptive Technology

A new way of doing things that initially does not meet the needs of existing customers

Information Secrecy

Addresses the protection of data from unauthorized disclosure and confirmation of data source quthenticity.

perimeter network

Also known as a DMZ, a small network that is set up separately from a company's private LAN and the Internet.

Information Property

An ethical issue that focuses on who owns information about individuals. Focuses on how infromation can be sold and exchanged.

Which of the following are associated with Public Key encryption?

Asymmetric keys,Private keys

Select the four characteristics of Web 2.0.

Collaboration outside the organization Collaboration inside the organization Content sharing through open sourcing User-contributed content

What is intangible creative work that is embodied in physical form and includes copyrights, trademarks, and patents?

Intellectual property

What are agents, software, or businesses that provide a trading infrastructure to bring buyers and sellers together?

Intermediaries

data security

Keeping the organization's data safe from theft, modification, and/or destruction

tacit knowledge

Knowledge contained in people's heads

select the four challenges facing ebusiness

Managing consumer trust Adhering to taxation rules Identifying limited market segments Ensuring consumer protection

Personalization

Occurs when a company knows enough about a customer's likes and dislikes that it can fashion offers more likely to appeal to that person

What consists of nonproprietary hardware and software based on publicly known standards that allows third parties to create add-on products to plug into or interoperate with the system?

Open system

Intermedaries

Organisations involved in the distribution of goods and services on behalf of other businesses

What occurs when a new radical form of business enters the market that reshapes the way companies and organizations behave?

Paradigm shift

Which of the following help contribute to filter bubbles for users on the Internet. a)Past click behavior. b)Location. c)Anti-virus software settings. d)Choosing one type of newspaper. e)Search history. f)Type of computer

Past click behavior, Location, Search history, Type of computer

Sustaining technology

Produces an improved product customers are eager to buy

The video from OSLIS on the topics of Evaluating Websites provides 4 strategies for evaluating internet websites. Which of the following is not a proposed website evaluation method. a)Review the evidence. b)Recognition of a familiar logo or band. c)Investigate the Author d)Uncover the motivation and bias of the source. e)Assess Timeliness.

Recognition of a familiar logo or band

An open ________ consists of nonproprietary hardware and software based on publicly known standards that allows third parties to create add-on products to plug into or interoperate with the system.

SYSTEM

INFRASTRUCTURE SECURITY

Security on hardware and software necessary to run your network.

authentication and authorization

Something that is part of the user, such as a fingerprint or voice signature, Something the user has, such as a smart card or token, Something the user knows, such as a user ID and password.

What contains instructions written by a programmer specifying the actions to be performed by computer software?

Source code

What produces an improved product customers are eager to buy, such as a faster car or larger hard drive?

Sustaining technology

Which of the following are challenges of Business 2.0 but not Web 1.0? (select all that apply, omit those that do not.) a)Violations of Copyright b)Plagiarism c)Information Vandalism d)Technology Dependence e)Ensuring Consumer Protection f)Adhering to Taxation Rules

Technology Dependence, Violations of Copyright, Plagiarism, Information Vandalism

What discusses how established companies can take advantage of disruptive technologies without hindering existing relationships with customers, partners, and stakeholders?

The Innovator's Dilemma

privacy

The right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent

Business 2.0

User-contributed content

What is created and updated by many users for many users?

User-contributed content

Select two terms representing the next generation of Internet use — as a more mature, distinctive communications platform characterized by new qualities such as collaboration sharing, and free.

Web 2.0 Business 2.0

Long Tail

a new approach to segmentation based on the idea that companies can make money by selling small amounts of items that only a few people want, provided they sell enough different items

Firewall

a part of a computer system or network that is designed to block unauthorized access while permitting outward communication.

Web 2.0

a set of economic, social, and technology trends that collectively form the basis for the next generation of the Internet

Public Key Encryption

asymmetric keys and public keys and private keys are all concepts associated with public key encryption

Which of the following is not an example of an information security policy Question 3 options: a) A rule requiring users to change passwords every 45 days b) A rule allowing users to share passwords c) A rule specifying that passwords should contain special characters d) A rule requiring users to log off when they leave for lunch e) A rule forbidding users from sharing login IDs

b) A rule allowing users to share passwords

A(n) ___________ technology is a new way of doing things that initially does not meet the needs of existing customers.

disruptive

Common computer encryption methods use keys that are 256 or 512 bits long. Doubling the length of an encryption key ______________.

exponentially increase the computer time needed to break (crack) an encrypted message.

open system

consists of nonproprietary hardware and software based on publicly known standards that allow third parties to create add-on products to plug into or interoperate with the system

source code

contains instructions written by a programmer specifying the actions to be performed by computer software

fake news

content, articles, videos that present made up or false information

User-contributed content

created and updated by many users for many users

Information security policies

identifies the rules required to maintain information security, such as requiring users to log off before leaving for lunch or meetings, never sharing passwords with anyone, and changing passwords every 30 days

private data

information which is confidential and only ethically available to selected individual.. The right to keep certain things to yourself; not for public viewing.

explicit knowledge

knowledge consists of anything that can be documented, archived, and codified, often with the help of MIS.

Caesar Cypher

letter-by-letter method to make a cipher. For each letter, substitute another letter 4 letters ahead. For "a", write "d".

Chris Anderson, editor-in-chief of Wired magazine, describes niche-market ebusiness strategies as capturing the ______ tail, referring to the tail of a typical sales curve.

long

information reach

measures the number of people a firm can communicate with all over the world

public key encryption

n is an essential building block of digital signatures and authentication and nonrepudiation

paradigm shift

occurs when a new, radical form of business enters the market that reshapes the way companies & organizations behave

Organizations address security risks through two lines of defense; the first is___________ and the second is__________

people and technology

Authorization

process of providing a user with permission including access levels and abilities such as file access, hours of access, and amount of allocated storage space?

In __________ steps are added to the value chain as new players find ways to add value to the business process.

reintermediation

Ecryption

scrambles information into an alternative form that requires a key or password to decrypt

token

small electronic devices that change user passwords automatically

counterfeit software

software that is manufactured to look like the real thing and sold as such

information richness

the amount and depth of information that gets transmitted in a message

Confidentiality

the assurance that messages and information are available only to those who are authorized to view them

Biometrics

the identification of a user based on a physical characteristic, such as fingerprint, iris, face, voice, or handwriting

Ethics

the principles of right and wrong that guide an individual in making decisions

crowd source

the process of obtaining needed services, ideas, or content by soliciting contributions from a large group of people, and especially from an online community, rather than from traditional employees or suppliers

pirated software

the unauthorized use, duplication, distribution, or sale of copyrighted software

public encryption

uses two keys a public key that everyone can have and private key for only the recipient

What is the difference between asynchronous and synchronous communication? a)Asynchronous is real-time communication; synchronous is one-way technology. b)Asynchronous communication includes instant messaging; synchronous communication includes email. c)Asynchronous communication is fast and instant; synchronous communication is collected at a single point in time. d) Asynchronous is communication that does not occur at the same time; synchronous communication occurs at the same time.

D. Asynchronous is communication that does not occur at the same time; synchronous communication occurs at the same time.

Which of the following is a defining characteristic of Web 2.0? a)Hypertext Transport Protocol (HTTP) b)Need for strong technical skills c)URLs d)User-contributed content e)asynchronous communication

D.User-contributed content

Select three types of clickstream data metrics.

Demographics of registered visitors Length of stay on the website Number of abandoned registrations

Symmetric Key Encryption

Encryption system in which a single key is used for both encryption and decryption.

asymmetric key encryption

Encryption system in which two keys are used: a public key used only to encrypt data, and a private key used only to decrypt it.

Information Management

Ensures that organizations have the types of data/information required to function and grow efficiently.

In Excel, a relative cell reference ___________. (Select all correct answers) a)example is EK12 b)a way of identifying a cell position that will NOT be adjusted when pasted or copied to additional cells. c)requires that cell protection be set to "unlocked" d)example is $A$1 e)a way of identifying a cell position that WILL be adjusted when pasted or copied to additional cells.

a)example is EK12 e)a way of identifying a cell position that WILL be adjusted when pasted or copied to additional cells.

_________ data can observe the exact pattern of a consumer's navigation through a site.

clickstream

Asynchronous communication

communication such as email in which the message and the response do not occur at the same time

synchronous communication

communications that occur at the same time such as IM or chat

Clickstream

computer jargon used to describe user movement through websites

Decryption

decode information, the opposite of encrypt

Authentication

is a method for confirming users' identities.

Copyright

is the legal protection afforded an expression of an idea, such as a song, book, or video game.


Related study sets

Middle Ages: Development of Feudalism-Essential Questions

View Set

OB Review + Pre-Lecture Quiz #1-5

View Set

How are the two major political parties similar and how are they different?

View Set

Chapter 7: The International Monetary System and the Balance of Payments

View Set