click below
click below
Normal Size Small Size show me how
MIS 3000 CH3-5
MIS 3000 Chapter 3-5
Question | Answer | |
---|---|---|
What are the standards that specify the format of data as well as the rules to be followed during transmission? | Protocol | |
What is the digital divide? | Occurs when those with access to technology have great advantages over those without access to technology | |
What is the Internet standard that supports the exchange of information on the WWW? | Hypertext transport protocol | |
What is a new 'middle man' like a comparison shopping site created by ebusiness? | Cybermediary | |
What is NOT a challenge of Ebusiness? | Network sustainablility | |
Which is a common B2C model? | Brick and Mortar Click and Mortar Pure-play | |
What is a website or web application that uses content form more than one source to create a completely new service? | Web Mashup | |
What is the conducting of business on the Internet, not only buying and selling, but also serving customers and collaborating with business partners? | Ebusiness | |
_______ encourages collaboration and sharing. | Web 2.0 | |
Which of the following is a reason for the growth of the World Wide Web? | The microcomputer revolution Advancements in networking hardware Web pages being easy to create and flexible | |
What is information richness? | Refers to the depth and breadth of information transferred between customers and businesses | |
What is information reach? | Refers to the number of people a business can communicate with, on a global basis | |
What is eprocurement? | The B2B purchase and sale of supplies and services over the Internet | |
Clickstream data can reveal all but which of the following? | Number of abandoned shopping carts | |
Which of the following is a standard format to share information digitally within the supply chain. | Electronic Data Interchange | |
Which business type describes Barnes and Noble? | Click-and-mortar business | |
What is NOT an advantage of Ebusiness? | Increased costs | |
Which of the following is not a term associated with web 3.0? | Evolution toward web 4.0 | |
What Revenue Model creates incentives to do many transactions? | Transaction fees | |
What is a company that offers an organization access over the Internet to systems and related services that would otherwise have to be located in personal or organizational computers? | Online service provider (OSP) | |
What is a policy that a user must agree to follow in order to be provided access to a network or to the Internet? | Acceptable use policy | |
What is social engineering? | Using one's social skills to trick people into revealing access credentials or other information valuable to the attacker | |
What is intangible creative work that is embodied in physical form? | Intellectual property | |
What floods a website with so many requests for service that it slows down or crashes the site? | Denial-of-service attack | |
What is the recommended way to implement information security lines of defense? | People first, technology second | |
Question 6 0.5 / 0.5 points Which act protects investors by improving the accuracy and reliability of corporate disclosures? | Sarbanes-Oxley Act | |
Which act restricts what information the federal government can collect? | Privacy act | |
Which of the following is NOT a technique for authentication? | Something a person uses. | |
Which act prohibits the use of video rental information on customers for any purpose other than that of marketing goods and services directly to the consumer? | Bork Bill | |
Informing the consumer what data is being collected and how it will be used is an example of? | Notice/Awareness | |
The mechanism in place to enforce fair information practices is | self-regulation private remedies government enforcement | |
Where do organizations typically place firewalls? | Between the server and the Internet | |
What is a method for confirming users' identities? | Authentication | |
What is the identification of a user based on a physical characteristic, such as a fingerprint, iris, face, voice, or handwriting? | Biometrics | |
What is spam? | A form of unsolicited email | |
Giving the consumer the right to Opt-in or Opt-out of how their information is used is an example of? | Choice/Consent | |
What is a small file deposited on a hard drive by a website containing information about customers and their Web activities? | Cookie | |
Making data available to the consumer in order that they can verify its correctness is an example of? | Access/Participation | |
What includes a variety of threats such as viruses, worms, and Trojan horses? | Malicious code | |
Having the data collector protect the information from unauthorized use or disclosure is an example of? | Integrity/Security | |
What is social engineering? | Using one's social skills to trick people into revealing access credentials or other information valuable to the attacker | |
What is the ability to get a system up and running in the event of a system crash or failure that includes restoring the information backup? | Recovery | |
Which term refers to the time frames when the system is operational? | Availability | |
The __________ MIS infrastructure identifies where and how important information, such as customer records, is maintained and secured. | Information | |
Which cloud computing model offers applications on a pay-per-use basis? | Infrastructure as a Service Platform as a Service Software as a Service | |
The increased demand in technology devices has caused an increase in discarded devices, a phenomenon known as _______. | Ewaste | |
The information MIS infrastructure supports the day-to-day business operations and plans for ___________. | Security breaches and theft Floods and earthquakes Malicious internet attacks | |
Which of the following describes the difference between a backup plan and a recovery plan? | Backup is an exact copy of a system's information, where recovery is the ability to get a system up and running in the event of a system crash or failure | |
An MIS infrastructure is __________ and ___________. | Dynamic and continually changing | |
Which of the following sustainable infrastructure components is a collection of computers, often geographically dispersed, that are coordinated to solve a common problem? | Grid computing | |
What enables computers to run multiple operating systems and multiple software applications at the same time and creates multiple ‘virtual' machines all on a single computing device? | Virtualization | |
What are the three pressures driving sustainable MIS infrastructures? | Increases in electronic waste, energy waste, and carbon emissions | |
What of the following is a problem with cloud computing? | Security | |
Which of the following reflects Moore's law? | The computer chip performance per dollar doubles every 18 months | |
What measures how quickly a system performs a process or transaction? | Performance | |
What occurs when a primary machine recovers and resumes operations, taking over from a secondary server? | Failback | |
Which of the below offers a low-speed and low-cost backup method? | DVD Thumb drive External hard drive | |
Which of the following agile MIS infrastructure characteristics refers to the ability of an application to operate on different devices or software platforms, such as different operating systems? | Portability | |
To combat disasters a company can create a _________ that would detail the process for recovering information or a system in the event of a catastrophic disaster. | Disaster recovery plan | |
What is a challenge for cloud computing that could cause employee performance to decrease? | Limited Internet features | |
What creates a way for a company to recover and restore partially or completely interrupted critical functions within a predetermined time after a disaster or extended disruption? | Business continuity planning | |
What are the three pressures driving sustainable MIS infrastructures? | Increases in electronic waste, energy waste, and carbon emissions | |
What is a global public network of computer networks that pass information from one to another using common computer protocols? | Internet |