IS 290 final study – Flashcards

Unlock all answers in this set

Unlock answers
question
Which of the following terms implies that organizations that cannot adapt to the new demands placed on them for surviving in the information age are doomed to extinction?
answer
Digital Darwinism
question
Which of the following produces an improved product customers are eager to buy, such as a faster car or larger hard drive?
answer
Sustaining Technology
question
Which of the following represents a form of disruptive technology?
answer
a. is a new way of doing things that initially does not meet the needs of existing customers b. Tends to open new markets & destroy old ones c. enters the marketplace at the low end d. all of the above*
question
Which of the following is a challenge of sustaining technology?
answer
Provides a product that does not meet existing customers' future needs
question
The Innovator's Dilemma suggests that established companies can take advantage of _____without hindering existing relationships with customers, partners, & stakeholders.
answer
Disruptive technology
question
Which of the following began as an essential emergency military communications system operated by the US Dept. of Defense (DARPA)?
answer
Internet
question
Which of the following terms could you use to synonymously when referring to the web?
answer
URL (Universal Resource Locator), domain name
question
At a local marketing firm, Steve is the lead web developer & is responsible for working with customers on their web designs, development, & graphics. Which of the following would be a critical skill Steve must have to be able to perform his job?
answer
All of these: a. understanding that he must create a unique domain name for each client b. being able to work with HTML (Hypertext Markup Language) c. Understanding the WWW and how hyperlinks work
question
What is the difference between ecommerce & ebusiness?
answer
Ecommerce is buying & selling of goods or services online. Ebusiness includes ecommerce & all activities related to internal & external business operations.
question
What is the practice of buying a domain name & not using the web page but waiting to profit from the trademark?
answer
Domain or Cyber Squatting
question
What caused Polaroid to go bankrupt?
answer
1-hour film processing & digital cameras stole its market share
question
What is the depth & breadth of details contained in a piece of textual, graphic, audio, or video?
answer
Information richness
question
What measures the number of people a firm can communicate with all over the world?
answer
information reach
question
What is the ability of an organization to tailor its products or services to the customers' specifications?
answer
Mass Customization
question
Which of the below would not be considered a company operating in the long tail of a typical sales curve?
answer
Walmart
question
Amazon creates a unique recommendation listing for each customer that revisits its website. How would you classify Amazon's ebusiness strategy?
answer
Personalization
question
Nike offers people the opportunity to visit its website to create running shoes in the style & color they choose. How would you classify Nike's ebusiness strategy?
answer
Mass Customization
question
What uses the Internet to reassemble buyers, sellers, & other partners in a traditional supply chain in new ways?
answer
Reintermediation
question
When evaluating the business value of disintermediation, the more ____that are cut from the distribution chain, the lower the product price.
answer
Intermediaries
question
What type of mediation refers to the creation of new kinds of intermediaries that simply could not have existed before the advent of ebusiness?
answer
Cybermediation
question
A company can reduce its costs by using ebusiness to change its business processes. Which of the following does not represent an example of how a company can reduce its costs through ebusiness?
answer
Researching products to find the lowest price & visiting the store to purchase the item.
question
Which of the below statements is correct?
answer
Just putting up a website does not create an ebusiness.
question
What is the exact pattern of a consumer's navigation through a site?
answer
Clickstream data
question
What is the business strategy that lets a company shorten the order process & add value with reduces costs or a more responsive & efficient service, & occurs when a business sells directly to the customer online?
answer
Disintermediation
question
which of the following is an example of a clickstream data metric?
answer
All of these a. Dates & times of visits b. The number of page views c. Number of customer with shopping carts
question
Which of the following is an example of a disruptive technology?
answer
All of these a. Oracle's database software b. Sony's transistor-based consumer electronics (transistor radio) c. Intel's low-end microprocessor
question
Which of the following is an example of sustaining technology?
answer
Porsche's faster car
question
Which company is expecting to gain the majority of its returns on existing investments?
answer
Phillips Petroleum
question
Which company is expecting to gain the majority of its returns on new investments?
answer
Dell
question
Which of the following is a reason for the growth of the WWW?
answer
All of these a. Advancements in networking hardware b. Web pages being easy to create & flexible c. The microcomputer revolution
question
Which of the following is NOT one of the Internets' impacts on information?
answer
digital divide
question
What are agents, software, or businesses that provide a trading infrastructure to bring buyer & sellers together?
answer
Intermediaries
question
What occurs when steps are added to the value chain as new players find ways to add value to the business process?
answer
Reintermediation
question
What refers to the creation of new kinds of intermediaries that simply could not have existed before the advent of ebusiness, including comparison-shopping sites such as Froogle & bank account aggregation services such as Citibank?
answer
Cybermediation
question
Which of the below is NOT a characteristic of Business 2.0?
answer
Technical skills are required
question
What are the 4 most common Business 2.0 characteristics?
answer
content sharing through open source, user-contributed content, collaboration inside the organization, & collaboration outside the organization.
question
What is a system that consists of nonproprietary hardware & software based on publicly known standards that allows third parties to create add-on products to plug into or interoperate with the system?
answer
Open system
question
Which of the below is not a characteristic associated with Mozilla Firefox?
answer
Mozilla Firefox is a prime example of a reputation system
question
What is Mozilla Firefox?
answer
a competitor to Internet Explorer
question
What is software whose source code is available for free by any third party to review & modify?
answer
Open Source
question
Erik is the president & owner of Watch Out, a local website development company that helps clients create & build unique websites. Many of his daily tasks are heavily technical in nature & require a high level of computer programming & internet knowledge. Which of the below would Erik primarily use when performing his daily tasks?
answer
Source code
question
Ebusiness was characterized by a few companies or user posting content for the masses. What characterized Business 2.0?
answer
The masses posting content for the masses
question
What is web content that is created & updated by many users for many users?
answer
user-contributed content
question
eBay buyers voluntarily comment to other users & sellers on the quality of service, promptness of shipping, & their general satisfaction with the product. This is one of the most popular examples of user-generated content & is called a(n) ____.
answer
Reputation system
question
What is the most common form of collective intelligence found inside the organization?
answer
Knowledge Management (system)
question
What is the difference between asynchronous & synchronous communication?
answer
Asynchronous is communication that does not occur at the same time. Synchronous communication occurs at the same time.
question
Which of the below is not a characteristic of Business 2.0?
answer
Web Browser
question
Lisa loves her job as an executive recruiter for a large hospital located in Dallas. Part of her job is to gather industry info, collaborate with partners, compare competitors, and tap into the knowledge of prospective employees, partners, & customers. Which of the below would Lisa use to perform her job?
answer
Collective intelligence
question
Which system supports the capture, organization, & dissemination of knowledge throughout an organization?
answer
Knowledge management system
question
What are the 2 categories that include intellectual & knowledge-based assets?
answer
Explicit knowledge & tacit knowledge
question
What is the type of knowledge that is contained in people's heads?
answer
Tacit knowledge
question
What is the type of knowledge that consists of anything that can be documented, archived, & codified, often with the help of an MIS dept?
answer
Explicit Knowledge
question
Which of the following is not an example of explicit knowledge?
answer
Employee opinion
question
What do Netflix & Amazon use to drive their recommendation tools?
answer
User-generated content
question
What is the practice of expanding your business & social contacts by constructing a personal network?
answer
Social networking
question
Which of the below represents an example of why an employer would use social media?
answer
All of these a. to find potential job candidates via LinkedIn b. To attract new job candidates via YouTube c. To review potential job candidates by viewing their Facebook page
question
Which of the below is NOT an example of a social bookmarking website?
answer
Facebook
question
What maps group contacts, identifying who knows each other & who works together?
answer
Social networking analysis
question
Many social media websites use ____ or specific keywords or phrases incorporated into website content for means of a classification or taxonomy.
answer
Tags
question
Social tagging describes the collaborative activity of marking shared online content with keywords or tags as a way to ____.
answer
All of these organize it for future search, navigation, filtering
question
Cell phone manufacturers often refer to their products as mobile devices. Which of the below would not be included in the folksonomy for a cell phone?
answer
Technology platform
question
What is the term that is similar to taxonomy except that crowdsourcing determines the tag or keyword-based classification system?
answer
Folksonomy
question
Using the collective power of a community to identify & classify content significantly _____content categorization costs.
answer
Lowers
question
Which social media site works by allowing content to find the users, instead of the users having to search for the content?
answer
StumbleUpon
question
What is one simplification that has occurred with Business 2.0?
answer
Improving access to information
question
Which of the following identifies Business 2.0 communication & collaboration tools?
answer
Blogs, wikis, mashup
question
What does RSS stand for?
answer
Real Simple Syndication
question
Many websites use _____ to constantly feed new to consumer instead of having the consumer search for the news.
answer
RSS
question
What describes how products in a network increase in value to users as the number of users increase?
answer
Network effect
question
A company's internal wiki can be a great tool for all of the following except:
answer
Building software applications.
question
What is a website or web application that uses content form more than one source to create a completely new product or service?
answer
Mashup
question
An API is a set of routines, protocols, & tools for _____.
answer
Building software applications.
question
What is the role of a mashup editor?
answer
All of these a. to provide a visual interface to build up a mashup. b. WYSIWYG's often it allows the user to drag & drop data points into a web application.
question
Which of the following are challenges of Business 2.0?
answer
All of these a. Violations of copyright & plagiarism b. Information vandalism c. Technology dependence
question
What is a potential problem or impact of technology dependence?
answer
All of these a. Outages create potentially great havoc for people, businesses, & educational institutions that rely heavily on technology b. Many have a need to be continuously connected for every activity, which potentially eliminates crucial in-person social skills & could stunt psychological growth c. How do people or businesses function if the connection is down?
question
Which of the following best describes Web 1.0?
answer
Static text-based information websites
question
Which of the following best describes Web 2.0?
answer
Social media & user-generated web content
question
Which of the following best describes Web 3.0?
answer
Based on the "intelligent" web where application use natural language processing
question
Which statement below is inaccurate?
answer
Web 2.0 is a simple static website without any interaction with its user
question
What is a component of Web 3.0 that describes things in a way that computer can understand?
answer
Semantic web
question
Which statement below is incorrect?
answer
The semantic web captures, organizes, & disseminates knowledge (i.e. know-how) throughout an organization.
question
Which of the following is not a topic or feature that is included in Web 3.0?
answer
social networking
question
What statement below describes Web 3.0's feature that ensures the "integration of legacy devices"?
answer
The ability to use current devices such as iPhones & laptops as credit cards or tickets
question
What website was the primary catalyst for growing electronic government & is the official US gateway to all government information?
answer
FirstGov.gov
question
What company monitors the operation of its vending machines via wireless technology?
answer
Dr. Pepper/Seven Up inc.
question
What refers to any type of electrical or electronic operation that is accomplished without the use of "hard-wired" connection?
answer
Wireless
question
What technology allows viewers in almost any location to select from hundreds of channels?
answer
Satellite TV
question
What technology enables wireless networks to extend as far as 30 miles & transfer information, voice, & video at faster speeds than cable?
answer
WiMAX wireless broadband
question
What technology provides connectivity for portable & mobile applications, both personal & business?
answer
Cellular phones & pagers
question
What technology uses radio waves rather than wires to transmit information across a local area network?
answer
Wireless local area network
question
What is intangible creative work that is embodied in physical form?
answer
Intellectual property
question
What is the legal protection afforded an expression of an idea, such as a song, video game, & some types of proprietary documents?
answer
Copyright
question
What is the assurance that messages & information remain available only to those authorized to view them?
answer
Confidentiality
question
What is the right to be left alone when you want to be, to have control over your own personal possessions, & not to be observed without your consent?
answer
Privacy
question
What is the unauthorized use, duplication, or sale of copyrighted software?
answer
Pirated software
question
What are the policies & procedures that address the ethical use of computers & Internet usage in the business environment?
answer
ePolicies
question
Which of the following is not considered an ePolicy?
answer
Security badge policy
question
Which of the following is NOT included in the 4 quadrants of ethical & legal behavior?
answer
None of these a. illegal behavior & ethical behavior b. legal behavior and ethical behavior c. legal behavior & unethical behavior
question
Which act prohibits the use of video rental information on customer for any purpose other than that of marketing goods & services directly to the consumer?
answer
Bork Bill
question
Which act allows any person to examine government records unless it would cause an invasion of privacy?
answer
Freedom of Information Act
question
Which act restricts what information the federal government can collect?
answer
Privacy Act
question
Which act protects investors by improving the accuracy & reliability of corporate disclosures?
answer
Sarbanes-Oxley Act
question
Which act strengthened criminal laws against identity theft?
answer
None of these a. bork bill b. sarbanes-oxley act c. cable communnications act
question
According to the ethical computer use policy, users should be _____of the rules &, by agreeing to use the system on that basis, _____to abide by the rules.
answer
Informed; consent
question
If an organization were to have only one policy, which one would it want?
answer
Ethical Computer use policy
question
Which of the following represents the classic example of unintentional information reuse?
answer
social security number
question
What is one of the guidelines an organization can follow when creating an information privacy policy?
answer
Notice & disclosure
question
What is a policy that a user must agree to follow in order to be provided access to a network or to the internet?
answer
acceptable use policy
question
What is a contractual stipulation that ensures that ebusiness participants do not deny their online actions?
answer
Nonrepudiation
question
Which policy is it common practice for many businesses & educational facilities to require employees or students to sign before being granted a network ID?
answer
Acceptable use policy
question
What is one of the major problems with email?
answer
User's expectation of privacy
question
What is a mail bomb?
answer
Sending a massive amount of email to a specific person or system resulting in filling up the recipient's disk space
question
What is a small file deposited on a hard drive by a website containing information about customers & their web activities?
answer
Cookie
question
What are the 3 primary challenges facing 21st century global businesses?
answer
Cultural, political, geoeconomic
question
Which company created several different websites to respond to sensitive cultural differences?
answer
McDonalds
question
Which of the following is NOT a political business challenge?
answer
Differences in social attitudes
question
Which of the following is the key result from the highly publicized survey administered by the Institute for Citizen-Centered Services & the Institute for Public Administration in Canada?
answer
Key drivers that directly impact online transaction are security & privacy
question
What are the 4 global IT business management areas critical to running multinational companies?
answer
Business strategies, enterprise architectures, information issues, system development
question
What are the 4 global IT business driver that should be included in all global IT business strategies?
answer
global customers, global products, global operations & resources, global collaboration
question
What are the factors included in the global operations & resources category of global IT business drivers?
answer
Common equipment, facilities, assembly processes, & people are shared by a global company & IT can track shared resources
question
What are the factors included in the global customer's category of global IT business drivers?
answer
Customers who travel anywhere or companies with global operations & global IT systems help provide fast, convenient, homogeneous service
question
What are the factors included in the global products category of global IT business drivers?
answer
Products are the same world wide & global IT can help manage worldwide marketing, sales, & quality control
question
What are the factors included in the global collaboration category of global IT business drivers?
answer
The knowledge & expertise of colleagues in a global company can only be accessed, shared, & organized by global IT systems
question
What key questions should IT governance answer?
answer
What key metrics management requires
question
Which of the following is not one of the 5 focus areas from the IT Governance Institute?
answer
Product delivery
question
Which of the following represents the 5 focus areas from the IT Governance Institute?
answer
Strategic alignment, risk management, performance measures, resource management, value delivery
question
What IT governance focus area puts structure around measuring business performance, such as a balanced scorecard, which uses both qualitative & quantitative measures?
answer
Performance measures
question
What is a set of guidelines & supporting tools for IT governance that is accepted worldwide & generally used by auditors & companies as a way to integrate technology to implement controls & meet specific business objectives?
answer
CoBIT Information Systems Audit & Control Association
question
What is an enterprise architecture?
answer
Includes the plans for how an organization will build, deploy, use, & share its data, processes, & IT assets.
question
Which of the following is one of the fundamental issues surrounding the struggle between Internet censorship & openness?
answer
All of these a. filtering the flows b. punishing the purveyors c. controlling the conduits
question
Which of the following countries in internet access banned or subject to tight limitation through government-controlled ISPs?
answer
All of these a. Burma b. Libya C. Syria
question
What clearly dominates as the primary problem hindering international telecommunication issues as reported by IT executives at 300 Fortune 500 multinational companies?
answer
Political issues dominate
question
Managing global enterprise architectures is a key global IT challenge for the 21st century. What is included in the term global enterprise architectures?
answer
Internet, intranet, extranet, & other telecommunication networks
question
What is deperimeterization?
answer
occurs when an organization moves employees outside its firewall
question
What are transborder data flows?
answer
occurs when business data flows across international boundaries over the telecommunications networks for global information systems
question
What concerns the legal right or general expectation of individuals, groups, or institutions to determine for themselves when & to what extent information about them is communicated to others?
answer
Information privacy
question
Which of the following is a US-EU data privacy requirement?
answer
All of these a. notice of the purpose & use of data collected b. access for consumers to their info c. adequate security, data integrity, & enforcement provisions
question
Which of the following is one of the rights granted to European Union members under the directive on the protection of personal data grants?
answer
All of these a. the right to know the course of personal data processing & the purpose of such processing b. the right to access &/or rectify inaccuracies in one's own personal data c. the right the disallow the use of personal data
question
An organization processing personal data of a person living in the EU must comply with which of the following principles?
answer
Adequate, relevant, & not excessive
question
Which state recognizes an individual's right to privacy?
answer
California
question
Which act protects health insurance information?
answer
HIPAA
question
What is the purpose of PIPEDA?
answer
to provide Canadian citizens with a right of privacy with respect to how their personal info is collected, used, or disclosed by an organization
question
What is wireless fidelity?
answer
a means of linking computers using infrared or radio signals
question
What is Bluetooth?
answer
a telecommunications industry specification that descries how mobile phones, computers, & personal digital assistants (PDAs) can be easily interconnected using a short-range wireless connection
question
What is radio frequency identification (RFID)?
answer
A technology that uses active or passive tags in the form of chips or smart labels that can store unique identifiers & relay this info to electronic reasers
question
What is a microwave transmitter?
answer
uses the atmosphere (or outer space) as the transmission medium to send the signal to a microwave receiver
question
What is a global positioning system (GPS)?
answer
a constellation of 24 well-spaced satellites that orbit the Earth & make it possible for people with ground receivers to pinpoint their geographic location
question
What is a geographic information system (GIS)?
answer
designed to work with info that can be shown on a map
question
What is an RFID tag?
answer
contains a microchip & an antenna
question
Which of the following is not a component of a RFID architecture?
answer
Store
question
What is Bluetooth's max range?
answer
30 feet
question
Which of the following is NOT a primary difference between traditional satellites & low-orbit satellites?
answer
Consumes more power
question
What are wireless mobile content services that provide location-specific info to mobile users moving from location to location?
answer
LBS (location based service)
question
Which of the following is considered a location based services market segment?
answer
All of these a. emergency services b. navigation services c. tracking services
question
Which of the following is not a privacy issues associated with location based info?
answer
identity theft
question
Which of the following is a common GIS use?
answer
All of these a. info alerts b. routing info c. finding what is nearby
question
What is a telecommunications technology aimed at providing wireless data over long distances in a variety of ways, from point-to-point links to full mobile cellular type access?
answer
WiMAX
question
What are the 2 components of a WiMAX system?
answer
WiMAX tower, WiMAX receiver
question
Which of the following is NOT a benefit of WiMAX?
answer
Low bandwidth
question
Which of the following represents an unusual use of RFID?
answer
All of these a. preventing toilets from overflowing b. identifying human remains c. timing athletic events
question
What are the technologies available to help prevent & build resistance to attacks?
answer
content filtering, encryption, firewalls
question
What attacks computer systems by transmitting a virus hoax, with a real virus attached?
answer
Hoaxes
question
What floods a website with so many requests for service that is slows down or crashes the site?
answer
Denial-of-service attack (DOS)
question
What identifies the rules required to maintain info security?
answer
Information security policies
question
What includes a variety of threats such as viruses, worms, & Trojan horses?
answer
malicious code
question
What is a device that is around the same size as a credit card, containing embedded technologies that can store info & small amounts of software to perform some limited processing?
answer
Smart card
question
What is a method for confirming users' identities?
answer
Authentication
question
What is a type of virus that spreads itself, not just file to file, but from computer to computer?
answer
Worm
question
What is encryption?
answer
Scrambles info into an alternative form that requires a key or password to decrypt the info
question
What is social engineering?
answer
Using one's social skills to trick people into revealing access credentials or other info valuable to the attacker
question
What is spam?
answer
A form of unsolicited email
question
What is the forging of the return address on an email so that the email message appears to come from someone other than the actual sender?
answer
Spoofing
question
What is the identification of a user based on a physical characteristic, such as a fingerprint, iris, face, voice, or handwriting?
answer
Biometrics
question
What is the most common type of defense within detection & response technologies?
answer
Antivirus software
question
What is the most costly & intrusive form of authentication?
answer
Something that is part of the user such as a fingerprint or voice signature
question
What i th most secure type of authentication?
answer
Combination of all of the above a. ...part of the user such as fingerprint/voice signature b. ...user has such as smart card/token c. ..user knows such as user ID & password
question
What is the recommended way to implement info security lines of defense?
answer
people first, technology second
question
Where do organizations typically place firewalls?
answer
Between the server & the internet
question
Which is a virus that opens a way into the network for future attacks?
answer
Backdoor programs
question
Which of the following authentication methods is 100% accurate?
answer
None of the above (nothing is 100%)
question
Which of the following can be completed by encryption?
answer
All of these a. use a mathematical formula to convert info into some sort of code b. replace character with other characters c. switch order of characters
question
Which of the following is a program or devices that can monitor data traveling over a network?
answer
Sniffer
question
Which of the following is not considered a type of biometrics?
answer
None of the above face, iris, voice are all biometrics
question
Which term describes legitimate users who purposely or accidentally misuse their access to the environment & cause some kind of business-affecting incident?
answer
Insiders
question
Who are hackers with criminal intent?
answer
Crackers
question
Who are those who seek to cause harm to other people or to destroy critical systems of information & use the Internet as a weapon of mass destruction?
answer
Cyberterrorists
question
Who breaks into other people's computer systems & just looks around or steals & destroys info?
answer
Black-hat hacker
question
Who finds hacking code on the Internet & click-and-points their way into systems to cause damage or spread viruses?
answer
Script Kiddies
question
Who works at the request of the system owners to find system vulnerabilities & plug the holes?
answer
White-hat hackers
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New