CIS 2050 Final Exam – Flashcards

Unlock all answers in this set

Unlock answers
question
_____ communicate(s) via radio waves using radio antennas placed within adjacent geographic areas.
answer
Cell phones
question
Which of the following is a true statement about the impact of social computing on a business?
answer
A small minority of individuals contribute the majority of feedback and can provide skewed data
question
_____, with the shortest range of any wireless network, is designed to be used with contactless credit cards.
answer
Near-field communications
question
Which type of electronic commerce is the largest by volume?
answer
business-to-business
question
The comments of consumers in the blogosphere concerning a company's products are called ____________________.
answer
Consumer-generated media
question
Although rogue access devices can be installed innocently, they can also be installed by an attacker trying to gain unauthorized access to a wireless network. In such cases, these devices are called an _____.
answer
Evil twin
question
Which type of social network allows users to edit and contribute content posted to a particular site?
answer
Wiki
question
Which of the following tools are not used by marketing professionals to compile market research?
answer
RSS
question
____ contain a chip that can store information and be used for several purposes.
answer
Smart cards
question
_____ offer(s) consumers incentives to accept advertising and e-mail voluntarily.
answer
Permission marketing
question
In which of the following business models do businesses request quotes from suppliers and use B2B with a reverse auction mechanism?
answer
electronic tendering system
question
The monitoring, collection, and analysis of socially generated data, and the resultant strategic decisions are combined in a process known as_________.
answer
social intelligence
question
Refer to IT's About Business 8.1 - Big Wheel Mobile Truck & Square: Products like Square offer small independent businesses the following advantages over the traditional credit card systems:
answer
Square doesn't charge merchants a fee for each transaction, Square doesn't require expensive equipment, Square can run on most mobile devices that the merchant already has, and Square can be easily customized and updated
question
In ____ e-commerce, an organization provides information and services to its workers
answer
business-to-employee
question
_____, which is a broader concept than _____, is the buying and selling of goods and services, as well as servicing customers, collaborating with business partners, and performing transactions within an organization.
answer
Electronic business, electronic commerce
question
Using social computing tools to do market research
answer
Can foster closer customer relationships
question
Conversational marketing can take place in which of the following forums?
answer
Blogs, Wikis, Online forums, and social networking sites
question
The most common wireless technology for TV and DVD remote control devices is ____.
answer
infrared
question
_____ refers to online word-of-mouth marketing
answer
Viral marketing
question
HR departments use social computing applications to assist them in which of the following activities:
answer
Recruiting, training, regrouping teams, and managing downsizing
question
In the _____ marketplace model, organizations attempt to sell their products or services to other organizations electronically.
answer
sell-side
question
If you buy a hot dog at a concession stand using your contactless credit card, you are using a ____.
answer
wireless electronic payment system
question
Which of the following is true about the impact of social computing on customer service?
answer
customers themselves can be used to reduce problems
question
Which of the following is the most appropriate wireless networking standard for creating personal area networks?
answer
bluetooth
question
A ____ is automatically launched by some trigger and appears behind the active window.
answer
pop-under ad
question
Which of the following can be used for reading utility meters without a person having to get out of a truck?
answer
ZigBee
question
Networks track users via which technologies:
answer
GPS, cell towers, and wi-fi networks
question
Individuals are finding it convenient and productive to use wireless devices for which of the following reasons?
answer
To make use of time that was formerly wasted, to become more efficient, work locations are more flexible, and to be able to allocate working time around personal and professional obligations
question
The degree of digitization relates to the following
answer
The product or service sold, the process by which the product is produced, and the delivery agent or intermediary
question
Which of the following is an advantage of social commerce over traditional e-commerce?
answer
The ability to predict buying habits based on real-time data
question
In _______ e-commerce, the sellers and buyers are organizations.
answer
business-to-business
question
LinkedIn is a _______________________ social networking site that makes money from advertising and services.
answer
Business-oriented
question
In the _____ marketplace model, EC technology is used to streamline the purchasing process in order to reduce the cost of items purchased, the administrative cost of procurement, and the purchasing cycle time.
answer
buy-side
question
Which of the following statements concerning blogging are true?
answer
Tweets are replacing blogging, blogging can be used in marketing, a company can maintain an internal blog site, and anyone can blog
question
_____ networks collect data from many points over an extended space.
answer
wireless sensor
question
_____ refer(s) to the wireless communication of location-based information and control messages to and from vehicles and other mobile assets.
answer
telematics
question
In _____ auctions, there is one buyer who wants to buy a product. Suppliers submit bids, and the lowest bid wins.
answer
reverse
question
Which of the following is inhibiting faster Wi-Fi expansion?
answer
Wi-fi services may not survive in the face of free hotspot access, unless the service is free users have to log on to separate accounts for each hotspot, a lack of security, and users cannot roam from hotspot to hotspot if the hotspots use different wi-fi network services
question
_____ refers to efforts by unauthorized users to access data traveling over wireless networks.
answer
eavesdropping
question
_____ is a satellite-based tracking system that enables users to determine a person's position.
answer
Global positioning system
question
The development of mobile commerce is driven by all of the following factors:
answer
The cell phone culture, the widespread availability of mobile devices, bandwidth improvement, and it eliminates the need for a pc
question
____ refers to the practice of registering or using domain names for the purpose of profiting from the goodwill or trademark belonging to someone else.
answer
cybersquatting
question
_____ are a payment mechanism that are similar to regular bank checks but are transmitted electronically, with a signature in digital form.
answer
electronic checks
question
Which of the following is an electronic commerce application?
answer
Buying stocks, home banking, conducting an auction, and buying real estate
question
A Web site that combines content from other Web sites to form new content is called a(n) ______.
answer
mashup
question
______ are a form of e-cash that enable you to store a fixed amount of prepaid money and then spend it as necessary.
answer
stored-value money cards
question
_____ networks use multiple Wi-Fi access points to create a wide area network.
answer
mesh
question
____ enable two individuals to transfer funds without using a credit card.
answer
person-to-person payments
question
Unfortunately, many managers consider smart phones as only _____, rather than as _____ that can transmit wirelessly.
answer
phones, digital cameras
question
What would be the best use of RFID in a business?
answer
supply chain management
question
_______ e-commerce is also known as e-tailing.
answer
business-to-consumer
question
The main problem with radio transmission is which of the following?
answer
when you travel too far from the source, the signal fades
question
You just started to work on a project with three other people. You realize that everyone has their own notes, which makes it hard for you to keep track of what has been done and what still needs to be done. Which of the following applications would you suggest the team use?
answer
Wikis
question
Building relationships, anticipating needs, and providing special deals for the community's members is a function of which category of Web 2.0 applications?
answer
social commerce
question
Which of the following is an effect that E-commerce has had on organizations?
answer
E-commerce makes it easy to reach customers around the world, e-commerce enables smaller businesses to operate in areas dominated by larger companies, e-commerce removes many barriers for start-up businesses, and e-commerce increases the number of potential customers to whom the company can market its products
question
The greatest problem with GEO satellites is which of the following?
answer
propagation delay
question
The capabilities of smart phones include all of the following except _________.
answer
corporate transaction processing
question
The key mechanisms of the _____ marketplace model are forward auctions and electronic catalogs that can be customized for each large buyer.
answer
sell-side
question
Social marketplaces act as online ______________ that harness the power of social networks for introducing, buying, and selling products and services.
answer
intermediaries
question
The act of locating wireless local area networks while moving around a city is called ____.
answer
war driving
question
_____ use credit card numbers, transmitted electronically over the Internet, to pay for goods and services. They are either unencrypted or encrypted, with coded data readable by an intermediary between the buyer's and seller's banks.
answer
electronic credit cards
question
Which of the following is true about social commerce?
answer
businesses can easily learn about customers' experiences
question
Which of the following is a problem that e-commerce can cause for the airline industry?
answer
mistakes in fares
question
In the _____ B2B application, the orders of many buyers are aggregated so that they comprise a large volume, in order to merit more seller attention.
answer
group purchasing
question
Which of the following is an example of social commerce?
answer
Disney allows people to book tickets on Facebook without leaving the site, Zappo's uses Twitter to send customers coupons when they mention a Zappo's product, Pepsi Co. sends live notifications to customers when they are close to a store that sells their products, and Wendy offers gift cards to online users for funniest response to various challenges
question
With regard to mobile computing, _____ means that it is easy and fast to access the Web and other mobile devices.
answer
convenience and instant connectivity
question
Today, most wireless local area networks use the _____ standard, which can transmit up to 54 Mbps and has a range of about 300 feet.
answer
802.11g
question
Which of the following is a risk of social computing?
answer
consumer-generated content is not edited or filtered
question
Which of the following is a customer touch point?
answer
Telephone contact, e-mail, Web sites, and customer visits to a store
question
Returned products, recycled products, and disposal of materials or products are called:
answer
reverse flows
question
Over time, the customer relationship with vendors has become more impersonal for all of the following reasons:
answer
consumers became mobile, the internet grew rapidly, supermarkets and department stores proliferated, and people move from farm to cities
question
_____ systems support the front-office business processes which directly interact with customers.
answer
operational crm
question
A company's organization and processes for distributing and delivering products to its final customers is the:
answer
downstream portion of the supply chain
question
The sales, marketing, and service functions are part of:
answer
operational crm
question
Which of the following are limitations of EDI?
answer
it is difficult to make quick changes, business processes may have to be restructured, multiple EDI standards exist, and it is inflexible
question
A check-in kiosk at the airport would be what type of CRM application?
answer
customer touching
question
_____ systems study customer behavior and perceptions to provide business intelligence.
answer
analytical crm
question
You are in the market for a small economy car. The salesperson has you drive the economy car, and then hands you the keys to a mid-size car of the same brand for you to drive. The salesperson is engaged in:
answer
up-selling
question
Which of the following is a social networking site?
answer
LinkedIn, YouTube, Facebook, and Flickr
question
A business that wants to create a forum allowing employees to interact with coworkers would benefit from utilizing__________.
answer
enterprise social networks
question
With Web 1.0 sites, users _________________, whereas with Web 2.0 sites, users _________________.
answer
passively receive information, participate with the site
question
Many companies are using ________ to capture updated product features and specifications.
answer
wikis
question
Which of the following is an example of social shopping?
answer
shopping communities and clubs, group shopping, peer-to-peer, and social marketplaces
question
The _____ standard can transmit up to 75 Mbps and has a range of 31 miles.
answer
WiMAX
question
_____ is a wireless standard that enables temporary, short-range connection between mobile devices.
answer
bluetooth
question
The area of the earth reached by a satellite's transmission is referred to as its _____.
answer
footprint
question
Which of the following is a mobile application in financial services?
answer
wireless wallets, micropayments, mobile banking, and wireless electronic payment systems
question
Which of the following is an advantage of radio?
answer
radio waves propagate easily through office walls, radio devices are easy to install, no metallic wires are needed, and radio devices are inexpensive
question
If you are a worker managing your fringe benefits over your company's intranet, you are engaging in _________ e-commerce.
answer
business-to-employee
question
Internet advertising improves on traditional advertising in all of the following ways:
answer
internet ads are current, internet ads can reach large numbers of potential buyers all over the world, internet ads can be updated at any time at minimal cost, and internet ads can make effective use of multimedia
question
eBay uses a _____ auction.
answer
forward
question
Which of the following enables users to send data across sometimes unreliable networks?
answer
TCP/IP
question
Consider this domain name, www.business.gsu.edu. The "gsu" is the __________.
answer
name of the organization
question
____ portals coordinate content within relatively narrow organizational and partners' communities.
answer
corporate
question
_____ refers to the range of frequencies available in any communications channel.
answer
bandwidth
question
When data are normalized, attributes in the table depend only on the _____.
answer
primary key
question
_____ are Internet access points that are located in public places, such as libraries and airports.
answer
internet kiosks
question
_____ are software programs that hide in other computer programs and reveal their designed behavior only when they are activated.
answer
trojan horses
question
Many organizations have implemented corporate portals for which of the following reasons?
answer
to cut costs, to free up time for busy managers, to improve profitability, and to offer customers self-service opportunities
question
_____ is a formal approach to managing data consistently across an entire organization.
answer
data governance
question
Which of the following statements concerning the difficulties in protecting information resources is correct?
answer
employees typically do not follow security procedures when the procedures are inconvenient, computing resources are typically decentralized, computer networks can be located outside the organization, and computer crimes often remain undetected for a long period of time
question
The part of a network that handles the major traffic is the ________.
answer
backbone
question
Traditional data formats change ______ while big data formats change _______.
answer
slowly, rapidly
question
Not including alphabetic characters in a Social Security Number field is an example of _____ .
answer
data integrity
question
In a database, the primary key field is used to _____.
answer
uniquely identify a record
question
In a _____ attack, a coordinated stream of requests is launched against a target system from many compromised computers at the same time.
answer
distributed denial-of-service
question
The most overlooked people in information security are:
answer
janitors and guards
question
Which of the following statements concerning firewalls is true?
answer
firewalls examine every message that enters or leaves an organization's network, firewalls are sometimes located inside an organization's private network, firewalls filter network traffic according to categories of activities that are likely to cause problems, and firewalls prevent unauthorized internet users from accessing private networks
question
Which of the following statements is false?
answer
It is easy to assess the value of a hypothetical attack
question
_____ is a method for analyzing and reducing a relational database to its most streamlined form.
answer
normalization
question
Applications offered by the Internet2 include which of the following?
answer
remote diagnosis, digital libraries, distance education, and virtual laboratories
question
The data in a data warehouse have which of the following characteristics?
answer
they are organized by subject
question
Place the following members of the data hierarchy in their correct order:
answer
bit-byte-field-record-file-database
question
_____ controls are concerned with user identification, and they restrict unauthorized individuals from using information resources.
answer
access
question
A database management system is primarily a(n) _____.
answer
interface between applications and a database
question
_____ tell the database management system which records are joined with others in related tables.
answer
primary keys
question
Bob is using public key encryption to send a message to Ted. Bob encrypts the message with Ted's _____ key, and Ted decrypts the message using his _____ key.
answer
public, private
question
In TCP/IP, IP is responsible for:
answer
Disassembling and reassembling of packets during transmission.
question
Which of the following is a characteristic of twisted-pair wire?
answer
Inexpensive, easy to work with, and subject to interference from other electrical sources
question
The cost of a stolen laptop includes all of the following:
answer
loss of intellectual property, loss of productivity, replacement cost, and loss of data
question
In the data hierarchy, the smallest element is the _____.
answer
bit
question
An information system's _____ is the possibility that the system will be harmed by a threat.
answer
vulnerability
question
Data dictionaries provide which of the following advantages to the organization?
answer
they reduce data inconsistency, they enable faster program development, and they make it easier to modify data and information
question
Tacit knowledge has which of the following characteristics?
answer
unstructured
question
_____ portals offer content for diverse communities and are intended for broad audiences.
answer
commercial
question
A(n) _____ is a network designed to serve the internal informational needs of a single organization.
answer
intranet
question
In a university's relational database, the student record contains information regarding the student's last name. The last name is a(n):
answer
attribute
question
When companies attempt to counter _____ by requiring users to accurately select characters in turn from a series of boxes, attackers respond by using _____.
answer
keyloggers, screen scrapers
question
Networks enable which of the following applications?
answer
discovery, communications, collaboration, and web services
question
Which of the following is not a characteristic of strong passwords?
answer
they tend to be short so they are easy to remember
question
_____ occurs when various copies of the data agree.
answer
data consistency
question
A pharmaceutical company's research and development plan for a new class of drugs would be best described as which of the following?
answer
a trade secret
question
With _____, every call opens up a dedicated circuit for the duration of the call
answer
plain old telephone service
question
Unintentional threats to information systems include all of the following:
answer
tailgating, tornados, power outage, and lack of user experience
question
Which of the following are advantages of computer networks?
answer
they enable organizations to be more flexible, they enable companies to share hardware computer applications and data, they enable geographically dispersed employees to work together, and they provide a critical link between businesses and their customers
question
A _____ attack uses deception to fraudulently acquire sensitive personal information by masquerading as an official e-mail.
answer
phishing
question
A standardized language used to manipulate data is _____.
answer
structured query language
question
_____ occurs when the same data are stored in many places.
answer
data redundancy
question
_____ are fields in a record that have some identifying information but typically do not identify the record with complete accuracy.
answer
secondary keys
question
Portals are an example of which network application?
answer
discovery
question
A _____ is any danger to which an information resource may be exposed.
answer
threat
question
A(n) _____ connects parts of the intranets of different organizations and allows secure communications among business partners.
answer
extranet
question
Consider this domain name, www.business.gsu.edu. The "edu" is the _______.
answer
top-level domain
question
Which of the following is not an example of a weak password?
answer
9AmGt/*
question
_____ occurs when applications cannot access data associated with other applications.
answer
data isolation
question
A _____ connects dissimilar networks.
answer
gateway
question
Which data transmission technology requires fiber-optic cable, can transmit up to 2.5 gigabits per second, and is more expensive than DSL?
answer
asynchronous transfer mode
question
Which transmission technology is an interface standard for transporting digital signals over fiber-optic lines that enables the integration of transmissions from multiple vendors?
answer
synchronous optical network
question
In the relational database model, related tables can be joined when they contain common _____.
answer
columns
question
With _____, phone calls are treated as just another kind of data.
answer
voice over IP
question
_____ is a process that helps organizations identify, select, organize, disseminate, transfer, and apply expertise that are part of the organization's memory and typically reside inside the organization in an unstructured manner.
answer
knowledge management
question
In _____, the organization takes concrete actions against risks.
answer
risk mitigation
question
Refer to Opening Case - The Network Neutrality Wars: Which of the following is not a challenge for achieving net neutrality?
answer
telecommunications and cable companies are in favor of net neutrality
question
Employees in which functional areas of the organization pose particularly grave threats to information security?
answer
human resources and management information systems
question
Which of the following statements concerning the difficulties in protecting information resources is not correct?
answer
rapid technological changes ensure that controls are effective for years
question
All of the following statements concerning wide-area networks are true except:
answer
they are provided by individual companies
question
_____ can be exercised to solve a problem, whereas _____ may or may not be able to be exercised to solve a problem
answer
knowledge, information
question
The process of moving data from various sources into the data warehouse is called:
answer
extracting, transforming, and loading
question
A _____ is a logical grouping of related fields.
answer
record
question
A(n) _____ connects two or more devices in a limited geographical area.
answer
local area network
question
Which of the following is not a source for external data?
answer
corporate databases
question
Refer to IT's About Business 6.3: Marriott's Corporate Portal: Marriott's BrandWorks portal has the following features
answer
video conferencing
question
_____ is the process in which an organization assesses the value of each asset being protected, estimates the probability that it will be compromised, and compares the probable costs of an attack with the costs of protecting the asset.
answer
risk analysis
question
Which of the following is not a strategy for mitigating the risk of threats against information?
answer
Continue operating with no controls and absorb any damages that occur, transfer the risk by purchasing insurance, implement controls that minimize the impact of the threat, and install controls that block the risk.
question
In a process called _____, a company allows nothing to run unless it is approved, whereas in a process called _____, the company allows everything to run unless it is not approved.
answer
whitelisting, blacklisting
question
Which of the following is a reason why managing data is difficult over time?
answer
New systems are developed, the media the data are stored on becomes problematic, new sources of data are created, and the amount of data increases exponentially.
question
The components of a local area network include which of the following?
answer
File server, client computers, wireline or wireless communications media, and network interface cards
question
Which of the following factors is not increasing the threats to information security?
answer
limited storage capacity on portable devices
question
Which of the following is not a component of a local area network?
answer
bridge
question
Which of the following is(are) designed to use your computer as a launch pad for sending unsolicited e-mail to other computers?
answer
spamware
question
A _____ allows a device to physically connect to a local area network's communications medium.
answer
network interface card
question
_____ signals convey information in wave form, whereas _____ signals convey information in binary form.
answer
analog, digital
question
In order to ensure that computers developed by different manufacturers can communicate, _____ have been developed.
answer
protocols
question
Which of the following statements concerning packet switching is not true?
answer
packets require dedicated circuits
question
Skype is an example of _______.
answer
voice over IP
question
_____ portals support communities such as hobby groups or political parties.
answer
affinity
question
BitTorrent uses a process called _____, which eliminates file-sharing bottlenecks by having everyone share little pieces of a file at the same time.
answer
swarming
question
The data in a data warehouse:
answer
are not updated
question
In a relational database, every row represents a _____.
answer
record
question
An attribute is any characteristic or quality describing a particular entity.
answer
true
question
An entity is a person, place, thing, or event about which information is maintained.
answer
true
question
At ASU, students can take more than one class, and each class can have more than one student. This is an example of what kind of relationship?
answer
many-to-many
question
As an individual student in your university's student database, you are a(n) _____ of the STUDENT class.
answer
instance
question
A(n) _____ is a logical grouping of characters into a word, a small group of words, or a complete number.
answer
field
question
A negative value for a student's grade point average is an example of a data integrity problem.
answer
true
question
Access controls involve _____ before _____.
answer
authentication, authorization
question
Dumpster diving is:
answer
typically committed for the purpose of identity theft
question
_____ are segments of computer code embedded within an organization's existing computer program that activate and perform a destructive action at a certain time or date.
answer
logic bombs
question
A _____ is a document that grants the holder exclusive rights on an invention for 20 years.
answer
patent
question
The computing skills necessary to be a hacker are decreasing for which of the following reasons?
answer
computer attack programs, called scripts, are available for download from the Internet
question
Organizations use hot sites, warm sites, and cold sites to insure business continuity. Which of the following statements is not true?
answer
a hot site needs to be located close to the organization's office
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New