MIS 301 Exam Prep 2

0.0(0)
studied byStudied by 4 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/121

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

122 Terms

1
New cards
Studying Facebook provides a context for understanding which of the following?

Responses

* platform
* network effects
* all of the available options are true
* privacy
* business value of social media
\
* all of the available options are true
2
New cards
Systems distributed throughout the Internet that help improve the delivery speeds of Web pages and other media, typically by spreading access across multiple sites located closer to users are known as:

* internet exchange points.
* colocation centers.
* private clouds.
* content delivery networks.
Content delivery networks
3
New cards
Which statement is true of the term “cloud”?

Responses

* It refers to a situation when the value of a product or service increases as the number of its users expands.
* It refers to a situation when others take advantage of a user or a service without providing any sort of reciprocal benefit.
* It refers to the phenomenon of adapting products and services for different languages and regional differences.
* It refers to a collection of computing resources available for access over the Internet.
It refers to a collection of computing resources available for access over the Internet.
4
New cards
Facebook’s primary competitive advantages are grounded in ___ __and__ _________

\-network effects

\-switching costs

\-user verification

\-massive infrastructure

\-information sharing
Network effects and switching costs
5
New cards
Software that is free and whose code can be accessed and potentially modified by anyone is referred to as _____.

* shared source files
* open source software
* proprietary software
* available files
open source software
6
New cards
At the heart of Facebook’s appeal is a concept Zuckerberg calls the _____, which refers to Facebook’s ability to collect, express, and leverage the connections between the site’s users.

* friend graph
* social graph
* Facebook graph
* media graph
social graph
7
New cards
WeChat is the dominant mobile platform in ____, with over 1 billion users.
China
8
New cards
_____ problem is when others take advantage of a user or service without providing any sort of reciprocal benefit.

\-Free rider

\-Theft

\-Hacking
Free rider
9
New cards
Facebook, a firm that has built its reputation on desktop dominance, is seeing new competition, especially in _____ where the competitive dynamics differ significantly. 

\-Artificial intelligence

\-mobile apps

\-international markets
Mobile apps
10
New cards
Developers who make applications create _____ that have the potential to add value to Facebook beyond what the firm itself provides to its users.

Responses

* switching costs
* distribution channels
* one-sided markets
* complementary benefits
Complementary benefits
11
New cards
Google’s stated mission is to:

* organize the world’s information and make it universally accessible and useful.
* establish itself as the most valuable media company in the world.
* pair Internet surfers with advertisers and earn revenue along the way.
* foster technological innovation to promote a knowledge-driven culture.
organize the world’s information and make it universally accessible and useful.
12
New cards
The bulk of Google’s revenue comes from _____.

Responses

* licensing
* Android
* advertising
* registration charges
Advertising
13
New cards
A(n) _____ is a search performed on Google or any other search engine.

Responses

* query
* PageRank
* link
* impression
query
14
New cards
_____ is the process of creating a series of bogus Web sites, all linking back to the pages one is trying to promote.

Responses

* Click scam
* Link fraud
* Phishing
* SQL injection
Link fraud
15
New cards
Which statement holds true for search engine optimization (SEO)?

Responses

* It refers to the process of improving an ad’s rank in Google’s online advertising listings.
* It refers to Internet content that can’t be indexed by Google and other search engines.
* It refers to the process of improving a page's organic search results.
* It refers to a temporary storage space used to speed computing tasks.
It refers to the process of improving a page's organic search results.
16
New cards
If a firm’s pages are not near the top of query results, customers may never discover its website. This has led to _____ becoming a critical function for many marketing organizations.

Responses

* last mile access
* geotargeting
* outsourcing
* search engine optimization
search engine optimization
17
New cards
Search engines use _____ to discover documents for indexing and retrieval.

Responses

* interstitials
* landing pages
* caches
* web-crawling spiders
web-crawling spiders
18
New cards
In online advertising, the term “impression” refers to:

Responses

* the Web site displayed when a user clicks on an advertisement.
* each time an ad is shown.
* ads that run before a user arrives at a Web site’s main content.
* the measure of a user’s perception of ad effectiveness.
each time an ad is shown.
19
New cards
Which statement holds true for the term cost-per-click?

Responses

* It refers to the ad rates quoted in cost-per-thousand impressions.
* It refers to the cost associated with the storage and bandwidth to deliver a website once it is clicked on.
* It refers to the number of users who clicked an ad divided by the number of times the ad was delivered.
* It refers to the amount of money an advertiser pays for each click on their ad.
It refers to the amount of money an advertiser pays for each click on their ad.
20
New cards
Click through rate
The number of users who clicked an ad divided by the number of time the ad was delivered
21
New cards
Pay per click
A concept where advertisers do not pay unless someone clicks on their ad
22
New cards
opt out
a program that enrolls all customers by default, but that allows consumers to discontinue participation if they want to
23
New cards
Opt in
A program (typically a marketing effort) that requires customer consent
24
New cards
The address one types into a Web browser is also known as a:

Responses

* uniform resource locator.
* unique resource locator.
* universal redirection locator.
* universal redirection link.
uniform resource locator.
25
New cards
Which statement holds true for the term “html”?

Responses

* It refers to high-speed data lines provided by many firms all across the world that interconnect and collectively form the core of the Internet.
* It refers to a situation when separate ISPs link their networks to swap traffic on the Internet.
* It refers to the broadband service provided via light-transmitting fiber-optic cables.
* It refers to the language used to create and format Web pages.
It refers to the language used to create and format Web pages.
26
New cards
The hypertext transfer protocol (http) defines the communication between:

Responses

* mail servers and hardware.
* hardware and operating systems.
* web browsers and web servers.
* operating systems and Web browsers.
* \
web browsers and web servers.
27
New cards
A _____ enables communication by defining the format of data and rules for exchange.

Responses

* dialect
* protocol
* nomenclature
* regulation
* protocol
28
New cards
A protocol called ___ works as a TCP stand-in when you’ve got the need for speed, but are willing to sacrifice quality. 

\-UDP

\-SCTP

\-DCCP
UDP
29
New cards
Which of the following applications is most likely to use UDP instead of TCP?

Responses

* File transfer
* Web transmissions
* E-mail
* Web-based phone calls
Web-based phone calls
30
New cards
Internet networks are _____.

Responses

* packet-switched networks
* bit-switched networks
* circuit-switched networks
* data-switched networks
* packet-switched networks
31
New cards
____is an application transfer protocol that is used to copy files from one computer to another.

UDP

TCP

SCTP

FTP
FTP
32
New cards
______is acquiring a domain name that refers to a firm, individual, product, or trademark, with the goal of exploiting it for financial gain.

CYBERSQUATTING

CYBERCROUCHING

CYBERSITTING
Cybersquatting
33
New cards
Internet service provider
an organization or form that provides access to the Internet
34
New cards
Web Hosting service
A firm that provides hardware and services to run the websites of others
35
New cards
Which of the following is a valid statement on information security?

Responses

* Security breaches cannot be prevented despite the adoption of the best security policies.
* Information security is everybody’s responsibility.
* Greater expenditure on security products is the only way to contain security breaches.
* Technology lapses are solely responsible for almost all security breaches.
Information security is everybody’s responsibility.
36
New cards
Several surprising findings were revealed in the wake of the Target breach, providing a cautionary tale for all executives and security professionals. Which of the following was ***not*** thought to have occurred during the Target security breach?

Responses

* Credit card databases were on entirely separate systems, not connected to other parts of the firm’s information system, but wireless networking allowed hackers to access anything reachable from a cell phone connection.
* Target had properly installed and configured its security software, but hackers got in anyway.
* Target had security software and paid close attention to the notification alerts from the software.
* Target regularly monitored file names and matched them to file sizes and archival copies to ensure that software was not installed on their systems using the names of legitimate products, but hackers saved files with blank file names so they wouldn’t be detected.
Target had security software and paid close attention to the notification alerts from the software.
37
New cards
A research scientist with a major pharmaceutical firm in New Jersey is caught passing on sensitive information, worth millions of dollars, regarding the composition and test results of his firm’s latest drug to a rival company. What crime is he being held responsible for?

Responses

* Extortion
* Carrying out technology disruptions
* Corporate espionage
* Cyber-fraud
Corporate espionage
38
New cards
Which of the following types of infiltration techniques does one open up to by posting sensitive personal information and details about one’s workplace on social networking sites?

Responses

* Virus infections
* Password theft
* Social engineering


* None of the available options are true
Social engineering
39
New cards
Which of the following are considered sources of information that can potentially be used by social engineers?

Responses

* All of the available options are true
* Contests or surveys
* Social media posts
* LinkedIn
* None of the available options are true
* Corporate directories
All of the available options are true
40
New cards
A bank customer receives a message, ostensibly from the bank’s Web site, asking her to provide her login information. Assuming the message is intended to defraud the customer, what type of infiltration technique is being used here?

Responses

* Spyware
* Social engineering
* Phishing


* Malware
Phishing
41
New cards
Updates that plug existing holes in a software are called _____.

Responses

* keys
* maculations
* compliance
* patches
patches
42
New cards
One of the reasons organizations delay patches to plug holes in their security applications is:

Responses

* lack of information on effectiveness of patches.
* the rising cost of labor.
* the fear that the new technology contains a change that will cause problems down the road.
* redundancy of patches within a short span of time.
the fear that the new technology contains a change that will cause problems down the road.
43
New cards
_______________ is a system that monitors network use for potential hacking attempts. 

\
Phishing Detection System

Scammer Detection System

Hacker Detection System

Intrusion Detection System
Intrusion Detection System
44
New cards
Spoofed
The forging or disguising of the origin of an email
45
New cards
Bad apple
Rogue employee can steal secrets, install malware, or hold a fim hostage
46
New cards
Phishing
Using technology to acquire sensitive information or tricking someone into installing malicious software
47
New cards
Which of the following is an example of computer hardware?

Responses

* malware
* application
* video game console


* operating system
video game console
48
New cards
Which of the following is an operating system?

Responses

* Notepad
* Microsoft Access
* Linux
* USB 2.0
Linux
49
New cards
Android is a software product developed by Google that allows cell phone manufacturers to control hardware and establishes standards for developing and executing applications on its platform. Android is thus an example of a(n) _____.

Responses

* programming language
* database management system
* user interface
* operating system
operating system
50
New cards
_____ provide the standards, syntax, statements, and instructions for writing computer software.

Responses

* Programming languages
* Application servers
* Database management systems
* Platforms
programming languages
51
New cards
Which of the following is an example of application software?

Responses

* MS Word
* Linux
* Android
* Mac OS
MS Word
52
New cards
Which statement is not true about potential benefits to firms that create platforms?

Responses

* they can widen the reach of firms and products
* none of the available options are true
* they can enhance network effects
* the potential to make their products and services more useful
* all of the available options are true en


* they can create switching costs
all of the available options are true
53
New cards
Web _____ are small pieces of code that are accessed via the application server, which permit interoperable machine-to-machine interaction over a network.

servers

software

systems

Services 
services
54
New cards
A ______ is a program that fulfills the requests of a client.

server

system

software

service
server
55
New cards
Customer relationship management
Systems user to support customer-related sales and marketing activities
56
New cards
Business intelligence systems
systems that use data created by other systems to provide reporting and analysis for organizational decision-making
57
New cards
Database management systems
software for creating, maintaining, and manipulating data
58
New cards
supply chain management
systems that can help a firm manage aspects of its value chain, from the flow of raw materials into the from through delivery of finished products and services at the point-of-consumption
59
New cards
\
A combination of _____ and ____ issues conspired to undermine the roll-out of HealthCare.gov.

enrollment

software

revenue

managerial

technical
managerial

technical
60
New cards
The software business is extremely profitable compared to the hardware business because:

Responses

* software firms benefit from special tax exemptions that aid profitability.
* of the lack of market price regulations and guidelines.
* the marginal cost to produce an additional copy of a software product is effectively zero.
* software producers serve niche businesses sectors with high profit margins.
the marginal cost to produce an additional copy of a software product is effectively zero.
61
New cards
Which statement is true about cloud computing?

Responses

* Cloud infrastructure is often located in warehouse-style buildings designed for computers, not people.
* Cloud firms are usually crammed inside inefficiently cooled downtown high-rises.
* Cloud computing firms often have data centers that are not designed to pool and efficiently manage computing resources.
* Cloud computing is not as green as traditional computing.
Cloud infrastructure is often located in warehouse-style buildings designed for computers, not people.
62
New cards
Open source software products often have fewer bugs than their commercial counterparts because of the:

Responses

* pyramidal programming practice followed by OSS developers.
* relatively poorer standards of commercially programmed software.
* stringent quality checks undertaken by the original developers.
* large number of persons who have looked at the code.

\
large number of persons who have looked at the code.
63
New cards
Which statement was considered a contributor to vulnerabilities in the OpenSSL security product known as the Heartbleed bug?

Responses

* Developers failed to see a major incompatibility with versions of the Windows operating system and Chrome browser.
* Few developers were working on the project, so the ideal that “given enough eyeballs, all bugs are shallow” wasn’t met with OpenSSL.
* Overseas hackers modified the open source code and uploaded a compromise version to the Internet, which became widely used.
* A Linux update was not coordinated with OpenSSL, leaving a gaping hole when the two products were used together to transmit content over the Internet.
Few developers were working on the project, so the ideal that “given enough eyeballs, all bugs are shallow” wasn’t met with OpenSSL.
64
New cards
SaaS, or software as a service is a ….

\-software licensing and delivery model in which software is licensed on a subscription basis and is centrally hosted.

\-license that has periodic fees based on usage. Payment can be before or after use.

\-license in which the copyright holder grants users the rights to use, study, change, and distribute the software to anyone and for any purpose.

\-non-expiring license to use a software application. The customer has no obligation to pay for support or update services.
software licensing and delivery model in which software is licensed on a subscription basis and is centrally hosted.
65
New cards
______is the ability to either handle increasing workloads or to be easily expanded to manage workload increases.

Efficiency

Adaptability

Redundancy

Scalability
Scalability
66
New cards
_____ desktop is when a firm runs an instance of a PC’s software on another machine and simply delivers the image of what’s executing to the remote device. 

Virtual

Cybernetic

Simulated
Virtual
67
New cards
Total cost of ownership
the cost associated with the design, development, testing, implementation, documentation, training, and maintenance of a software system
68
New cards
Marginal cost
the cost of producing one more unit of a product
69
New cards
Identify the options managers have when determining how to satisfy the software needs of their companies?

\-development of the effort themselves

\-use OSS

\-Outsourcing development

\-Use SaaS or utility computing

\-purchase packed software from a vendor
All of them are options managers have
70
New cards
utility computing
A form of cloud computing where a firm develops its won software, and then runs it over the Internet on a service provider’s computers
71
New cards
Cloudbursting
A scalability solution that is usually provided as an overflow service, kicking in as needed.
72
New cards
_____ refers to the process of combining aspects of reporting, data exploration and ad hoc queries, and sophisticated data modeling and analysis.

Responses

* Electronic trading
* Business intelligence


* Queritic modeling
* Logistics
Business intelligence
73
New cards
If a customer pays a retailer in cash, he is likely to remain a mystery to the retailer because his name is not attached to the money. Retailers can tie the customer to cash transactions and track the customer’s activity if they can convince the customer to use a _____.

Responses

* point-of-sale terminal
* data cube
* loyalty card
* dashboard
Loyalty card
74
New cards
Firms that collect and resell data are known as _____. 

Responses

* data mongers
* data aggregators
* data miners
* data barons
data aggregators
75
New cards
Why do firms need to create separate data repositories for their reporting and analytics work?

Responses

* Reporting and analytics are two separate functions, each requiring its own separate database specifically formatted to the needs of the management team.
* Maintaining huge databases can be a cost-sink for most firms.
* Running analytics against transactional data can bog down a TPS.
* Most firms store their data assets offsite to insure themselves against the possibility of data damage through natural disasters.
Running analytics against transactional data can bog down a TPS.
76
New cards
_______provides customers with a unified experience across customer channels, which may include online, mobile, catalog, phone, and retail.

Internet

Multichannel

Omnichannel
Omnichannel
77
New cards
______is a term describing the extensive use of data, statistical and quantitative analysis, explanatory and predictive models, and fact-based management to drive decisions and actions.

Survey

Analytics

Back-of-envelope calculation
Analytics
78
New cards
Most transactional databases are not set up to be simultaneously accessed for reporting and analysis. In order to run analytics the data must first be _____ to a data warehouse or data mart.

stored

canned

ported
ported
79
New cards
Despite its success, Walmart is a mature business that needs to do which of the following to boost profits and continue to move its stock price higher? Select all that apply.

\
* find data to identify new vendors
* find dramatic cost savings
* find huge markets
* unionize their workers
\
\-find huge markets

\-find dramatic cost savings
80
New cards
_____are reports that provide regular summaries of information in a predetermined format.

Business intelligence

Custom reports

Canned reports
Canned reports
81
New cards
Record
A single instance of whatever the table keeps track of
82
New cards
Column
categories of data (first name, last name, ID number, Data of birth, etc.)
83
New cards
Link farming is a type of online advertising fraud where fraudsters attempt to:

a. create a series of bogus websites, all linking back to a page, in the hope of increasing that page’s result in organic search

b. pack a website with unrelated keywords in the hope of luring users who wouldn’t normally visit a website

c. search keywords linked to rival ads in the hope of generating impressions without clicks to lower the performance rank of these ads

d. frame a rival by generating bogus clicks or impressions that appear to be associated with the rival, in hope that this rival will be banned from an ad network

e. generate bogus impressions that can be linked back to a rival’s as to exhaust the rival’s CPM ad budget
a. create a series of bogus websites, all linking back to a page, in the hope of increasing that page’s result in organic search
84
New cards
\
Which of the following statements holds true for the term spider? \n a. It refers to the Internet directory service that allows devices and services to be named and \n discoverable. \n b. It refers to the process of improving a page’s organic search results. \n c. It refers to Internet content that can’t be indexed by Google and other search engines. \n d. It refers to a temporary storage space used to speed computing tasks. \n e. It refers to software that traverses available Web links in an attempt to perform a given task.
e. It refers to software that traverses available Web links in an attempt to perform a given task.
85
New cards
3\. Which of the following parameters significantly influences the rank of a Web page in \n Google’s organic search results? \n a. The number of other pages linking to a given page \n b. The maximum bid for click-through rates \n c. The quantity of content on a Web page \n d. The number of keyword matches in the content \n e. The quality of content on a Web page
a. The number of other pages linking to a given page
86
New cards
4\. Which of the following is one of the sources of revenue for open source vendors? \n a. Licensing OSS for incorporation into subsequent open source products \n b. Selling open source products at prices well below commercial products \n c. Marketing versions of open source software masked as proprietary software \n d. Claiming royalties on software based on open source code \n e. Selling support and consulting services
e. Selling support and consulting services
87
New cards
5\. Wall Street traders often choose a colocation facility with the goal to provide high-latency connectivity to their partners. \n a. True \n b. False
b. False
88
New cards
Much of what powers the site is open source software. Give examples:
Linux, Apache, MySQL, PHP/Python
89
New cards
What open source software do you use?
firefox

open office

apache

ubuntu

android

cassandra

hadoop
90
New cards
Do facebook likes predict personality?
Yes; can tell what you like and dislike based upon you ‘likes’ on facebook, can use to advantage to promote certain ads or videos.
91
New cards
_____ is designing, running, and optimizing search engine ad campaigns?
Search Engine Marketing
92
New cards
What percent of clicks go to the top organic result? Number two?
34% to the first: 17% to second
93
New cards
How to customer profile/ target behavoirs?
IP Address

Type of browser used

computer type and operating system

Cookies
94
New cards
What is a cookie?
Line of identifying text, assigned and retrieved by a given web server and stored by ones browser
95
New cards
What does SMTP stand for?
simple mail transfer protocol
96
New cards
____ works at both ends of internet communication to ensure a perfect cope of a message is sent?
TCP
97
New cards
What protocol enables voice communications?
VolP (voice over Internet protocol)
98
New cards
What protocol is an internet directory service that allows devices and services to be named and discovered?
DNS (domain name service)
99
New cards
Solutions for building a better password?
biometrics (measure and analyze human body characteristics for identification or authentication)

mulit-factor authentication (MFA)
100
New cards
What are the top five bad security habits?
\

1. Using the same password for everything
2. Clicking on links and attachments without scrutinizing them
3. Delay patches and updates
4. Using public wifi
5. Thinking of security as IT’s problem