COM-325-Exam 2
In data communication, the _____ is a packet-switching service that operates at 25 Mbps and 622 Mbps, with maximum speed of up to 10 Gbps.
Asynchronous Transfer Mode
_____ is the amount of data that can be transferred from one point to another in one second.
Bandwidth
_____ check to see what links are on the user's Web page and make sure they work; if a link is broken, they identify it and include this information as part of the data about that page.
Crawlers
Identify a social networking site based in Ghana.
A global information system (GIS) can be defined along two dimensions: customization and communication.
False
E-commerce is a subset of social commerce.
False
E-commerce provides product acknowledgements through phone calls and faxes.
False
EAP (Extensible Authentication Protocol) keys are dynamically generated based on the user's SSID and password.
False
In the context of the CIA triangle, confidentiality means that computers and networks are operating and authorized users can access the information they need.
False
Open-source systems have eliminated all difficulties related the the lack of standardization across borders.
False
Recommendation web sites are not allowed to offer incentives to individuals for sharing information about their purchases.
False
The main drawback of an intrusion detection system (IDS) is its inability to prevent denial-of-service (DoS) attacks.
False
_____ involves the design, manufacture, use, and disposal of computers and servers in such a way that there is minimal impact on the environment.
Green computing
Which growing application of IoT is used to enhance manufacturing processes and data analytics on factory floors?
Industrial Internet of Things (IIoT)
_____ is an Internet service for communicating with others via a private "chat room" on the Internet.
Instant messaging
_____ is an Internet service that enables users in chat rooms to exchange text messages with people in other locations in real time.
Internet Relay Chat
In the context of information privacy, which of the following is true of spam?
It is sent in bulk using automated mailing software.
Which statement is true of Hypertext Markup Language (HTML)?
It is used to define a Web page's layout and appearance.
Identify the main disadvantage of omnichannel.
Its complexity.
_____ are community-based marketplaces that enable individuals to communicate directly with each other and conduct e-commerce operations.
Peer-to-peer e-commerce platforms
Which layer of the Open Systems Interconnection (OSI) model formats message packets?
Presentation
All client computers that try to access an access point are required to include an _____ in all their packets.
SSID
_____ is a primary activity in Michael Porter's value chain.
Service
_____ is an attempt to gain access to a network by posing as an authorized user in order to find sensitive information, such as passwords and credit card information.
Spoofing
Which of the following is true of mobile commerce (m-commerce) applications?
They are supported by short-range wireless communication technologies.
In the context of intentional security threats, _____ can erase data and wreak havoc on computers and networks but do not replicate themselves.
Trojan programs
Ethernet is a standard communication protocol embedded in software and hardware devices used for building a local area network (LAN).
True
Social Web sites provide shopping advice and opinion through chat and forums.
True
_____ is a technique that combines the strongest features of Wired Equivalent Privacy (WEP) and Extensible Authentication Protocol (EAP) techniques and helps improve the security of wireless networks.
Wi-Fi Protected Access
_____ support m-commerce applications.
Wireless wide area networks
A _____ is an organization with assets and operations in at least one country other than its home country.
multinational corporation
In a(n) _____, production, sales, and marketing are decentralized and financial management remains the parent company's responsibility.
multinational structure
The four pillars of hypersociality describe a return to a _____ for businesses.
natural human interaction
The goal of the Health Insurance Portability and Accountability Act (HIPAA) includes:
protecting medical providers' notes and records.
A _____ is an information system that enables users to retrieve data from the Web by using keywords related to their topic of interest.
search engine
The _____ pillar of hypersociality realizes that the benefits of leveraging social media are much greater than its negatives.
social messiness vs. process hierarchy
In the context of information privacy, junk e-mail is also known as _____.
spam
The coordination dimension of a global information system (GIS) requires _____.
standardization within departments
Control in a global information system requires _____.
the use of defined behaviors for different processes
Horizontal scaling of a client/server architecture means _____.
adding more workstations
Spoofing happens when:
an illegitimate program poses as a legitimate one.
Identify an advantage of a cross-channel sales strategy.
b. It increases sales opportunities.
An organization's extranet server is typically placed in a network area called the ______ that is separate from the LAN.
demilitarized zone
A ________ is rented from a third party and usually contains telecommunication equipment.
co-location facility
Before establishing a security program, organizations should __________.
conduct a basic risk analysis
Online auction sites that involve business transactions between users of products and services are categorized as _____ e-commerce.
consumer-to-consumer
In the context of a global information system (GIS), _____ refers to the use of managerial power to ensure adherence to the organization's goals.
control
A level 3 security system focuses on protecting the _____ against intrusion, denial-of-service attacks, and unauthorized access.
corporate network
Identify a true statement about copyright laws.
d. They protect tangible material, such as books.
Designing and implementing a global database is a technical challenge, mainly because of the _____.
different character sets used for the names of people and places
In the universal resource locator (URL) https://www.exsat.org, the domain name is _____.
exsat.org
When planning a comprehensive security system, the first step is designing _____, which use a combination of hardware and software for improving reliability, a way of ensuring availability in case of a system failure.
fault-tolerant systems
Which system is used for managing global operations, supporting an international company's decision-making processes, and dealing with complex variables in global operations and decision making?
global information
The top two targets for ransomware attacks are the __________.
healthcare industry and financial institutions
In a global information system (GIS), high coordination:
helps maintain control of market needs around the world.
Hypersocial organizations should forget information channels and concentrate on:
knowledge networks.
Clement applies for a home loan at Global Bank Inc. As part of the process, he provides his personal details to the banker who is responsible for sanctioning loans. The banker uses Clement's personal information to sell him insurance policies. In this scenario, the banker's action is considered _____.
legal, but unethical
Most software applications are _____ in nature and cannot be integrated into a GIS infrastructure.
local
