Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

CIS 105( ARIZONA STATE UNIVERSITY ) FINAL EXAMS, Exams of Nursing

CIS 105( ARIZONA STATE UNIVERSITY ) FINAL EXAMS WITH ACTUAL CORRECT QUESTIONS AND VERIFIED DETAILED RATIONALES ANSWERS LATEST 2024(NEWEST) ALREADY GRADED A+CIS 105( ARIZONA STATE UNIVERSITY ) FINAL EXAMS WITH ACTUAL CORRECT QUESTIONS AND VERIFIED DETAILED RATIONALES ANSWERS LATEST 2024(NEWEST) ALREADY GRADED A+CIS 105( ARIZONA STATE UNIVERSITY ) FINAL EXAMS WITH ACTUAL CORRECT QUESTIONS AND VERIFIED DETAILED RATIONALES ANSWERS LATEST 2024(NEWEST) ALREADY GRADED A+CIS 105( ARIZONA STATE UNIVERSITY ) FINAL EXAMS WITH ACTUAL CORRECT QUESTIONS AND VERIFIED DETAILED RATIONALES ANSWERS LATEST 2024(NEWEST) ALREADY GRADED A+CIS 105( ARIZONA STATE UNIVERSITY ) FINAL EXAMS WITH ACTUAL CORRECT QUESTIONS AND VERIFIED DETAILED RATIONALES ANSWERS LATEST 2024(NEWEST) ALREADY GRADED A+CIS 105( ARIZONA STATE UNIVERSITY ) FINAL EXAMS WITH ACTUAL CORRECT QUESTIONS AND VERIFIED DETAILED RATIONALES ANSWERS LATEST 2024(NEWEST) ALREADY GRADED A+CIS 105( ARIZONA STATE UNIVERSITY ) FIN

Typology: Exams

2023/2024

Available from 03/28/2024

chokozilowreh
chokozilowreh 🇺🇸

3.6

(13)

884 documents

1 / 70

Toggle sidebar

Related documents


Partial preview of the text

Download CIS 105( ARIZONA STATE UNIVERSITY ) FINAL EXAMS and more Exams Nursing in PDF only on Docsity! 1 | P a g e CIS 105( ARIZONA STATE UNIVERSITY ) FINAL EXAMS WITH ACTUAL CORRECT QUESTIONS AND VERIFIED DETAILED RATIONALES ANSWERS LATEST 2024(NEWEST) ALREADY GRADED A+ We're now in the "fifth wave" of computing, where computers are so fast and so inexpensive that they have become ubiquitous--woven into products in ways few imagined years before. True Which of the following apply to Moore's Law? (select all that apply) Chip performance per dollar doubles every eighteen months, + Strictly speaking, Moore's Law does not apply to other technology components, but other computing components (such as storage) are also seeing their price versus performance curves skyrocket exponentially From a strategic perspective, the trend of "cheaper and faster" technology suggest that what is impossible from a cost or performance perspective today may be possible in the future. (T/F) True Which of the following can lead to the Halo Effect cognitive bias while electing a leader? Base your judgement solely on advertising, branding, and media "Sasha scores an 'A' on every one of her tests. I bet she could be a good student leader." This is an example of: Halo Effect Social media provides "The Four M's" of engagement. What are they? (select all that apply) Megaphone to send out messages from the firm, Monitoring what's happening online, Magnet to attract inbound communication Social media policies revolve around the "three Rs". What are they? (select all that apply) Responsibility, Respect, Representation Crowdsourcing refers to the process where initially undefined groups of users band together to solve problems, create code, and develop services. (T/F) True 2 | P a g e ______ refers to users working, often collaboratively, to create content and provide services online. Peer Production Examples of peer-production include: (select all that apply) Wikipedia, Linux (open source system) Computing devices increasingly know where you are, with the physical location determined by: (select all that apply) Your phone's global positioning system (GPS) triangulation from nearby cell phone towers proximity to neighboring Wi-Fi hotspots _____ is a mental shortcut that relies on the most immediate examples that might come to mind evaluating a decision. It operates on the notion that if you can recall it, it must be important. Availability Heuristic How can you debias the framing effect? (select all that apply) (ALL CHOICES CORRECT) Decide how to decide up front Do your own analysis Challenge the information you get Think through how you're going to make the decision before you go to make the decision Facebook allows third-party developers to create all sorts of apps to access Facebook data. This can lead to the following issues for Facebook: (select all that apply) A free rider problem where firms mooch off Facebook's infrastructure without offering much in return Security issues in apps leading to backdoor access to users' private data Weakening of data as a strategic asset Perform a search (or query) on Google or another search engine, and the results you will see are referred to by industry professionals as a _________. organic search Google uses PageRank to determine the order of organic search results. What logic is this algorithm based on? Web pages that have more pages linking to them are ranked higher _____ is a free linux-based mobile operating system. Android 5 | P a g e Cloud Computing shared pools of configurable computer system resources and higher-level services that can be rapidly provisioned with minimal management effort, often over the Internet. Cloud computing relies on sharing of resources to achieve coherence and economies of scale, similar to a public utility. Latency a time interval between the stimulation and response, or, from a more general point of view, a time delay between the cause and the effect of some physical change in the system being observed Natural Language Processing (NLP) a subfield of computer science, information engineering, and artificial intelligence concerned with the interactions between computers and human (natural) languages, in particular how to program computers to process and analyze large amounts of natural language data. Reverse Engineering also called back engineering, is the process by which a man-made object is deconstructed to reveal its designs, architecture, or to extract knowledge from the object; similar to scientific research, the only difference being that scientific research is about a natural phenomenon. Big Data a term used to refer to data sets that are too large or complex for traditional data-processing application software to adequately deal with. Data with many cases (rows) offergreater statistical power, while data with higher complexity (more attributes or columns) maylead to a higher false discovery rate. Animatronics to the use of cable pulled devices or motors to emulate a human or an animal, or bring lifelike characteristics to an otherwise inanimate object. What factors can help a firm establish network effects? (select all that apply) Subsidize Adoption Move Early Strategy Encourage the Development of Complementary Goods Backward Compatibility True or False- When network effects are present, the value of a product or service decreases as the number of users grows. False ___ is a term used to refer to data sets that are too large or complex for traditional data processing application software to adequately deal with. Big Data Volatile memory requires power to maintain stored information. Examples of volatile memory include: 6 | P a g e RAM When a firm seeks to make an existing market a subset of its product offering (much like iPhone did with iPod, Email, Browsing), it is called: Envelopment _______ computing stores data as a combination of bits, where a bit is either a one or a zero. ________ computing employs qubits that can be both one and zero at the same time. Conventional; Quantum Instant messaging, where everyone can send and receive messages to one another, is an example of: One-Sided Market Congestion effect occurs when: (select all that apply) -Increasing numbers of users lower the value of a product or service -A key resource becomes increasingly scarce as more users join the network "Sasha scores an 'A' on every one of her tests. I bet she could be a good student leader." This is an example of: The Halo Effect Which of the following are examples of the Halo Effect? (select all that apply) -The packaging of a product influences Ben's opinion of the product -Anna's impression of a brand influences her opinion of the products associated with that brand -Charlie associates lower-priced products with lower quality RAM inside your personal computer volatile memory Instead of competing with established firms in an existing network market, firms should seek uncontested, new market spaces. This is called: Blue Ocean Strategy In ________ markets, users gain benefits from interacting with a separate, complementary class of users. This is called _______ exchange benefit. Two-Sided; Cross-side When eBay was growing, they offered a listing service free for five months and that helped build a larger base of users. This is an example of: Subsidizing Adoption The video game industry where console owners are attracted to platforms with the most games, and innovative developers are attracted to platforms that have the most users, is an example of: 7 | P a g e Two-Sided Market Products or services that add additional value to the network are called: Complimentary Benefits In _______ markets, users gain benefits from interacting with a similar category of users. This is called _______ exchange benefits. One-Sided; Same-Side When two or more markets, once considered distinctly separate, begin to offer similar features and capabilities, it is called: Convergence Which of the following can lead to the Halo Effect cognitive bias while electing a leader? Base your judgement solely on advertising, branding, and media. True or False: Multicore, massively parallel, and grid computing are all related in that each attempts to lash together multiple computing devices so that they can work together to solve problems. While these technologies offer great promise, they're all subject to the same limitation: these problems must be linear--where one part must be solved before moving to the next and the next. False True or False: From a strategic perspective, the trend of "cheaper and faster" technology suggest that what is impossible from a cost or performance perspective today may be possible in the future. True The tendency for an impression created in one area to influence the opinion in another area is called: Halo Effect How can you ensure the Halo Effect does not play into hiring decisions? -Do not base decisions on how the candidate is dressed or how they look -Use stress interviews -Have candidates interact with other employees. __________ or ____________ is the storage of data on a magnetized medium. Magnetic storage uses different patterns of magnetization in a magnetizable material to store data and is a form of non-volatile memory. Magnetic storage; magnetic recording Nonvolatile Memory a more permanent storage media like a hard disk or flash memory Chips are ____________ meaning no moving parts 10 | P a g e Representation, respect and responsibility _____ refers to services targeted at harnessing the power of the internet to empower users to collaborate, create resources, and share information in a distinctly different way from the static web sites and transaction-focused storefronts. Web 2.0 True or False. Crowdsourcing refers to the process where initially undefined groups of users band together to solve problems, create code, and develop services. True ______ refers to users working, often collaboratively, to create content and provide services online. Peer Production True or False. The social media space introduces a tension between allowing expression (among employees and by the broader community) and protecting the brand. True Examples of peer-production include: -Wikipedia, an online encyclopedia -Linux, an open-source computer operating system. Facebook, Twitter, Medium, LinkedIn, and Pinterest are examples of _________. Social Media PLantforms _____ is a mental shortcut that relies on the most immediate examples that might come to mind evaluating a decision. It operates on the notion that if you can recall it, it must be important. The Availability Heuristic How can you debias the framing effect? Decide how to decide up front.Think through how you're going to make the decision before you go to make the decision.Challenge the information you get.Do your own analysis. Groupthink bias can occur due to: Herd Behavior True or False: Wisdom of crowds is the idea that a large, diverse group often has less collective insight than a single or small group of trained professionals. False True or False: Location-based services are increasingly combining geolocated data with social media. Users are always in control of sharing location data, and these services pose no security or privacy issues. 11 | P a g e False What criteria ensures the wisdom of the crowd works? -Be diverse, so that participants bring different pieces of information to the table. -Be decentralized, so that no one at the top is dictating the crowd's answer. -Be independent, so that everyone focuses on information rather than the opinions of others correct -Offer a collective verdict _______ refers to a social network platform feature where someone can follow updates without first getting their approval. Asymmetric Communication __________ is the activity of buying or selling of products on online services or over the Internet. E-commerce ____________________________ is a subsidiary of Amazon.com that provides on-demand cloud computing platforms to individuals, companies and governments, on a paid subscription basis. The technology allows subscribers to have at their disposal a virtual cluster of computers, available all the time, through the Internet. Amazon Web Services A _____________ is an unmanned aerial vehicle (UAV) utilized to transport packages, food or other goods. Delivery Drone _____________ and ____________ are modern terms for a packing warehouse. The terms were coined in the middle of the 1990s, and "fulfilment center" is usually used about an in-house packing warehouse, while "fulfilment house" tends to be used about companies that specialize in warehousing and packing for others. Fulfilment house; fulfilment center ___________ or __________ is a phrase widely used in the telecommunications, cable television and internet industries to refer to the final leg of the telecommunications networks that deliver telecommunication services to retail end-users (customers). More specifically, the last mile refers to the portion of the telecommunications network chain that physically reaches the end-user's premises. The last mile; the last kilometer In business, economics or investment, market _______ is a market's feature whereby an individual or firm can quickly purchase or sell an asset without causing a drastic change in the asset's price. Liquidity In management accounting, the ________________________ measures how long a firm will be deprived of cash if it increases its investment in inventory in order to expand customer sales. It is thus a measure of the liquidity risk entailed by growth. 12 | P a g e Cash Conversion Cycle The _____________________ is an economic indicator that measures the satisfaction of consumers across the U.S. economy. It is produced by the _____________________ based in Ann Arbor, Michigan. American Customer Satisfaction Index (ACSI);American Customer Satisfaction Index (ACSI LLC). ______________ is a paid subscription service offered by Amazon that gives users access to free two- day delivery (one-day in some areas), streaming music and video, and other benefits for a monthly or yearly fee. Amazon Prime A ________ is a small, separated garden pavilion open on some or all sides. The word is now applied to small booths offering goods and services and to freestanding computer terminals. Kiosk In computer science, _______________, sometimes called machine intelligence, is intelligence demonstrated by machines, in contrast to the natural intelligence displayed by humans and other animals. Computer science defines AI research as the study of "intelligent agents": any device that perceives its environment and takes actions that maximize its chance of successfully achieving its goals. Artificial Intelligence A ___________________ is an integrated circuit designed to be configured by a customer or a designer after manufacturing - hence the term "field-programmable". The FPGA configuration is generally specified using a hardware description language (HDL), similar to that used for an application-specific integrated circuit (ASIC). Field-Programmable Gate Array (FPGA). An __________________ is an integrated circuit (IC) customized for a particular use, rather than intended for general-purpose use. Application-Specific Integrated Circuit (ASIC). ____________ occurs when manufacturers (brands) disintermediate their channel partners, such as distributors, retailers, dealers, and sales representatives, by selling their products directly to consumers through general marketing methods and/or over the Internet. Channel conflict. ____________ is shared pools of configurable computer system resources and higher-level services that can be rapidly provisioned with minimal management effort, often over the Internet. ___________ relies on sharing of resources to achieve coherence and economies of scale, similar to a public utility Cloud computing; Cloud computing. On Twitter, users can classify comments on a given topic using _____, allowing others to quickly find related tweets. 15 | P a g e a resource circulation system-they enable customers to both obtain and provide, temporarily or permanently, valuable resources or services through direct interaction with other consumers through a mediator- e.g., like flea markets that have been around a long time, but did not operate on a platform collaborative consumption Metcalfe's Law states the effect of a telecommunications network is proportional to the square of the number of connected users of the system. Network Effect also called network externality or demand-side economies of scale) is the positive effect described in economics and business that an additional user of a good or service has on the value of that product to others. When a network effect is present, the value of a product or service increases according to the number of others using it Total Cost of Ownership a financial estimate intended to help buyers and owners determine the direct and indirect costs of a product or system. It is a management accounting concept that can be used in full cost accounting or even ecological economics where it includes social costs Two-sided market also called a two-sided network, is an intermediary economic platform having two distinct user groups that provide each other with network benefits. The organization that creates value primarily by enabling direct interactions between two (or more) distinct types of affiliated customers is called a multi-sided platform (MSP) Positive Feedback a process that occurs in a feedback loop in which the effects of a small disturbance on a system include an increase in the magnitude of the perturbation Monopoly exists when a specific person or enterprise is the only supplier of a particular commodity Viral Marketing viral advertising is a business strategy that uses existing social networks to promote a product. Its name refers to how consumers spread information about a product with other people in their social networks, much in the same way that a virus spreads from one person to another open source software license a type of computer software in which source code is released under a license in which the copyright holder grants users the rights to study, change, and distribute the software to anyone and for any purpose 16 | P a g e Virtualization the act of creating a virtual version of something, including virtual computer hardware platforms, storage devices, and computer network resources Heartbleed a security bug in the OpenSSL cryptography library, which is a widely used implementation of the Transport Layer Security (TLS) protocol. It was introduced into the software in 2012 and publicly disclosed in April 2014. Heartbleed may be exploited regardless of whether the vulnerable OpenSSL instance is running as a TLS server or client. Linux a family of free and open-source software operating systems built around the Linux kernel. Typically, Linux is packaged in a form known as a Linux distribution for both desktop and server use ______ comes about when we make judgments about the probability of an event under uncertainty. Representative Heuristic True or False. Bob wins the lottery. Since he knows the overall probability of winning the lottery is really low, he does not bother buying another ticket. This is an example of Base Rate Fallacy. False _____ is a free linux-based mobile operating system. Android True or False. The switching costs for a social network like Facebook are extremely low. False _______ is the market value of a publicly traded company. It is the share price multiplied by the number of shares outstanding. Market Capitalization Facebook allows third-party developers to create all sorts of apps to access Facebook data. This can lead to the following issues for Facebook: -A free rider problem where firms mooch off Facebook's infrastructure without offering much in return. -Weakening of data as a strategic asset. -Security issues in apps leading to backdoor access to users' private data. _____ strengthen and deliver user value from the social graph and are considered one of the most vital, value-adding features to Facebook and other social networking sites. Feeds 17 | P a g e At the heart of Facebook's appeal is the _______, which refers to Facebook's ability to collect, express, and leverage the connections between the site's users. It links how users are connected to other users, and captures information about tagged photos, comments, group membership, and apps installed. Social Graph True or False. Word of mouth is considered the most persuasive (and valuable) form of marketing. True True or False. Since "friending" in Facebook requires both users to approve the relationship, the network fosters an incredible amount of trust. True Making initiatives ______ guarantees the largest possible audience, and that is key to realizing the benefits of network effects, data, and scale. Making initiatives ______ creates the risk that not enough users will sign up and that the reach and impact will be limited. Opt-out. Opt-in. True or False. Keyword advertising targets ads based on a user's MAC address. False True or False. Users have every right to be concerned and protective of their privacy. It is the responsibility of firms to engage users on new initiatives and to protect user privacy. Failure to do so risks backlash. True What can reduce online predator risks? -Firm Policies. -Computerized and Human Monitoring. -Aggressive Reporting and Follow-up. -Engagement with Authorities. What was the class action suit against Facebook and Cambridge Analytica about? The unauthorized use of user data. Sites that cannot be indexed by Google and other search engines are referred to as _______. Dark Web Users on Google are typically _______, to collect information that will drive to a specific action. Users on Facebook are typically ________, to look around, explore and enjoy. This can lead to differences in _______ and therefore click-through rates for ads. Task-oriented. Exploration-oriented. User-attention. What factors can lower an ad's chance of being displayed? 20 | P a g e Herd Behavior The social media space introduces a tension between allowing expression (among employees and by the broader community) and protecting the brand. true What criteria ensures the wisdom of the crowd works? (select all that apply) -Be convergent, so when someone in the crowd begins to converge on a way of thinking, the rest of the crowd should follow so a decision can be made quickly -Be diverse, so that participants bring different pieces of information to the table -Be decentralized, so that no one at the top is dictating the crowd's answer -Be independent, so that everyone focuses on information rather than the opinions of others -Be diverse, so that participants bring different pieces of information to the table -Be decentralized, so that no one at the top is dictating the crowd's answer -Be independent, so that everyone focuses on information rather than the opinions of others Prediction markets can be used in: (select all that apply) -the Stock Market -The outcome of political campaigns -The outcome of economic events -The outcome of clinical trials for a development drugs -the Stock Market -The outcome of political campaigns -The outcome of economic events -The outcome of clinical trials for a development drugs The downsides of blogs include: (select all that apply) -Blog comments can be a hotbed for spam -Workers can be fired due to inappropriate posts -They are a medium to rapidly distribute ideas and information -Fake "praise posts" can be created by corporations -Blog comments can be a hotbed for spam -Workers can be fired due to inappropriate posts -Fake "praise posts" can be created by corporations _____ is a mental shortcut that relies on the most immediate examples that might come to mind evaluating a decision. It operates on the notion that if you can recall it, it must be important. The Availability Heuritic What are the M's of Social Media? A) Megaphone for messages B) Magnet for inbound communication C) Monitoring and Mediation of conversations D) All of the answer selections are correct 21 | P a g e D) All of the answer selections are correct ______ comes about when we make judgments about the probability of an event under uncertainty. Representative Heuristic Bob wins the lottery. Since he knows the overall probability of winning the lottery is really low, he does not bother buying another ticket. This is an example of Base Rate Fallacy. false Sites that cannot be indexed by Google and other search engines are referred to as _______. Dark Web Users have every right to be concerned and protective of their privacy. It is the responsibility of firms to engage users on new initiatives and to protect user privacy. Failure to do so risks backlash. true _______ is the market value of a publicly traded company. It is the share price multiplied by the number of shares outstanding. Market Capitalization Facebook's key resources for competitive advantage are ______ and _______. network effects; switching costs How does Google's AdSense ad network work? (select all that apply) A) Content-provider websites run ads for Google in exchange for a cut of the money that Google makes from the ads B) Advertisers place ads on content-provider websites to reach more customers C) More participants bringing in more revenue also helps the ad network firm benefit from scale economies, offering a better ROI from its ad technology and infrastructure D) Advertisers attract content providers, which in turn attracts more advertisers creating strong network effects E) all of the above E) all of the above Users on Google are typically _______, to collect information that will drive to a specific action. Users on Facebook are typically ________, to look around, explore and enjoy. This can lead to differences in _______ and therefore click-through rates for ads. task-oriented; exploration-oriented; user-attention Google uses PageRank to determine the order of organic search results. What logic is this algorithm based on? Web pages that have more pages linking to them are ranked higher 22 | P a g e Global growth is always profitable. Once you have acquired global users, you can always make money from them. false Motivation for information security includes: extortion, espionage, cyberwarfare, pranksters, hactivism, revenge, terrorism, stealing data, and stealing intellectual property. true A _____ defines the data or field that a table can hold. column _______ hackers are the bad guys who try to break into (hack) computer systems. Black Hat _____ refers simply to raw facts and figures. Alone it tells you nothing. The real goal is to turn it into ______ by presenting it in a context where it can answer a question or support decision making. Data; information Encryption scrambles data, making it essentially unreadable to any program that does not have the descrambling password, known as a key. Simply put, the larger the key, the more difficult it is for a bruteforce attack to exhaust all available combinations and crack the code. When well implemented, encryption can be the equivalent of a rock solid vault. true If the environment changes very rapidly, and is very different from when the predictive model was built, then the predictive model may not be very relevant anymore. This is called: Concept Drift What is a Data Warehouse? A system used for reporting and data analysis and is considered a core component of business intelligence What is fraud detection? Uncovering patterns consistent with criminal activity _______ databases are made up of multiple tables related by common keys. Relational Getting data in a format that can be used for analytics is hard, complex, and challenging work. This work should start with: A clear vision with business-focused objectives Web 2.0 25 | P a g e What part of the computer coordinates memory? Random Access Memory Running more than one application at a time is called what? Multitasking What is the most important thing system software does? Enables the operating system Desktop computers are considered what type of computer? Microcomputers Which method of sharing data is dynamic? Object linking A common name for an operating system is what? Platform How is information represented on a monitor? Graphical User Interface The table of contents of a hard drive is called what? FAT Acquiring technology when it is first introduced is called what? Being a leader What is the most important part of an information system? People Waiting to acquire technology until it is proven is called what? Being a follower Does the average businessperson need to be an expert in IT? No, yes, yes, but only in specify areas (all answers are correct What plays an important role when learning IT? Attitude The tangible and physical aspects of a computer are called what? Hardware 26 | P a g e What are the largest and most powerful business computers? Mainframes ch 1 Spreadsheets What software models financial information? Network Connecting two or more computers is called what? Record In a DBMS, what is a row called? Field In a DBMS, what is a column called? Lotus 123 What software did Excel replace as the most popular spreadsheet? Microsoft PowerPoint Which is the leading presentation software? Business Intelligence What technology has made presentation software more popular? Presentation Which software visually communicates a point? NIC Card Which is not a peripheral device? Hyperlink What is a clickable navigation element? Word Processor Which software can provide a table of contents? WorldWideWeb What was the first web browser called? One-to-many relationship Linking the customer and transaction tables is called what? Works on any operating system 27 | P a g e What does platform neutral mean in context of a PDF? Array Document Protocols Which of the following is not a feature of word processing software? Cell What is it called when a row and column intersect in a spreadsheet? Browser Software Which software displays web pages? Adobe What company makes Acrobat? BYU Where was WordPerfect originally developed? Presentation software What software is designed to display on-screen? Microsoft Word What is the most popular word processor in the world? Spreadsheets What application software features a "what-if" analysis? Sir Tim Berners-Lee Who invented the first web browser? Human Intervention What differentiates system software from application software? Apple Word Press Pro Which is not word processing software? ch 2 On the motherboard where does the microprocessor reside? The "box" What is the chassis commonly referred as? Firmware The programming on ROM chips is sometimes called what? 30 | P a g e What is the world's largest network? Internet Which memory coordinates, tracks, allocates other memory? Virtual Which memory helps decrease the time it takes to access memory? CPU Cache Which memory quickens the implementation of computer programs? Registrars Which program unclutters a hard drive? Defragmentation What function stores and organizes a user's work in computer files? File Manager What is it called when a computer runs more than one process at a time? Multitasking Can an embedded operating system be modified? No What is the dominant OS in the operating system market? Windows What is a common name for a hierarchy of directories? Folder What is it called when a computer performs a task? Process TCP/IP breaks file into what? Packets Who developed the earliest Mac OS? Jobs and Wozniak What is the table of contents to a hard drive? fat Is an OS system software or an application software 31 | P a g e System Which is not a major OS in business? Borland System Platform Who sold IBM MS-DOS? Gates and Allen Who can modify Linux? Anyone ch 4 Brontobyte What is bigger than a Yottabyte? archived When data is no longer needed on a daily basis, how is it backed up? Filing cabinets Operating systems have their file management systems modeled after what? Unicode What coding scheme is used for Japanese and Chinese computers? 8 How many bits in a byte? Primary storage In computing, what is best described as where the user works? Secondary storage In computing, what is best described as where the user stores their work? 1.44Mg What was the storage capacity of a floppy disk? RAID Which storage device is a series of stacked platters? Magnetic Tape What storage device is reel-to-reel? EBCDIC What coding scheme do mainframe computers use? 32 | P a g e Magnetic tape What storage device is read sequentially? ASCII What coding scheme is used by most microcomputers? 1024 How many Kilobytes are in a Megabyte? A record player arm A read/write head on a spinning disk is like what? RAM Name a primary storage with no physical movement that can be accessed in any order. Magnetic tape What storage device is considered the slowest? Computer storage What is meant by the variety of ways a computer can save data and information? Tangible property Physical items like desks, computers and tractors constitute what in business? FAT What is the table of contents for a disk drive? NTFS What is the newer version of FAT? Disaster recovery plan What plan is for a future business catastrophes? unlimited What is the capacity of Cloud Storage? File allocation table What does the acronym FAT mean ch 5 cold boot powering a computer up for the first time 35 | P a g e This contains settings like screen savers, appearance, and personalization. sectors Tracks are separated into wedges called what? profile What represents a user's specific preferences? pages Smaller files that represent larger files are called what? tracks Disks have concentric bands called what? ch6 Another term for acceptance of an acknowledged problem is what? Diffusion Which EPEAT criteria require adoption of Energy Star specification? Energy Conservation How many of EPEAT's criteria are optional? 28 How many of EPEAT's criteria are required for certification consideration? 23 Which EPEAT criteria ask manufacturers to design products that can be upgraded with common tools? Product Longevity / Life Cycle Extension What document(s) is based on the idea that business can become environmentally friendly? Green Business Plan What measures a human's impact on the environment? Carbon Footprint What policy promotes efficient energy use in PSUs? 80 Plus Which EPEAT criteria ask manufacturers to take their products back when they are no longer useful? End of Life Management Which EPEAT criteria require manufacturers to adopt sound corporate environmental policies? Corporate Performance 36 | P a g e Who manages EPEAT? GEC How many total criteria in EPEAT? 51 What is the work arrangement that allows an employee to work from home? Telecommunicating The practice of using computing resources efficiently and reducing waste is called what? Green Communicating Environmentally friendly computer systems are called what? Green PCs Who funded EPEAT? EPA Where are EPEAT criteria listed online? EPEAT.net What is the problem with NCAR's climate models? Extremely Unreliable Who is in charge of all computer assets for an organization? CIO When was the Energy Star founded? 1992 What is EPEAT's highest designation? Gold Star Which EPEAT criteria ask manufacturers to make their products last longer? Product Longevity / Life Cycle Extension What does the Materials Selection criteria do? Informs consumers of percentage of renewable / bio-based plastic content Which PC mode uses the least amount of power? Standby Mode 37 | P a g e What is it called when heat cannot escape into space? Greenhouse Effect ch 7 What network is the smallest? LAN What does the acronym LAN mean? Local Area Network What is the mapping of a physical network called? Topology What does the acronym P2P mean? Peer-to-peer Network A computer connected to a server is called what? Client What is the best protocol for transferring a large database file through a network? TCP/IP What is the least used topology? Ring What is the central location of a network? Hub What does the acronym MAN mean? Metropolitan Area Network What topology is also called a linear bus? Bus What does logging in do for a network user? Authenticates them Any device connected to a network is called what? Node What does the acronym WAN mean? Wide Area Network What are "rules" called when referring to a network? 40 | P a g e Web Hosts What are text files used for tracking a WWW user? cookies What is meant by C2C? consumer-to-consumer What is a clickable navigation element? Hyperlink Who invented the World Wide Web? Sir Tim Berners-Lee What does the extension, ".com" mean? commercial What does the acronym URL mean? Uniform Resource locator Where was the university that produced the Internet? UCLA ch 9 What does JavaScript need to work on a website? Java-enabled Browser How does a search engine match keywords to a web user? Meta-words What is the computer used to browse the Web called? Client What is a misnomer when referring to the Internet? That you visit websites What is JavaScript? Client-side Programming Language Which is more powerful between Fat Clients or Thin Clients? Fat What were blogs originally called? Web Logs 41 | P a g e What kind of websites is to sell goods and services? Commerce Websites What is the current version of HTML? 5 Which has better distribution between Fat Clients or Thin Clients? Thin What protocol does YouTube.com use? UDP Which uses more space between Fat Clients or Thin Clients? Fat Where does a search engine get a description of a website? Meta-description Tag What is SEO? Search Engine Optimization With Web Development Platforms, who designs the website? Business Owners What is kept in cache? Web Browsing History What does a user type in to a search engine? Keywords What does the "M" mean in CPM? Thousands Which is not a common plug-in for Gaming Websites? HTML What allows web users to navigate to different parts of the web? Hyperlinks Is HTML considered a strong or weak language? Weak What is the most inexpensive way to make a professional website? 42 | P a g e WDPs Which costs less to display between Fat Clients or Thin Clients? Thin What are tags called in HTML? Elements Who developed HTML? Sir Tim Berners-Lee ch 10 Computer Security Concerned with risk management, confidentiality, integrity and the availability of the electronic information that is processed and stored within a computing system. Denial-of-service Attack (DOS) An attempt to make a computer or any of its resources unavailable to its intended users. Firewall Specialized hardware and software working together that ensures that only authorized personnel and employees within a business can use its Intranet. Hacker Someone who attempts to invade or disable a computer's security measures and then to steal the computer resources at their leisure. Identity Theft A crime concerning the unlawful practice of assuming another individual's identity. Internet Fraud Refers to any fraudulent activity in an online setting. Internet fraud can occur through email systems, message boards, chat rooms, or websites. Reverse Phishing When a perpetrator logs on to a computer workstation and installs a program that simply records every keystroke made at the workstation's keyboard. Shoulder Surfing A criminal in a public place will glance over their victims' shoulder and watch them dial a phone number, type in a password, or listen for a credit card number. Privacy What is the key aspect of an Intranet? 45 | P a g e business' well being. Human Resource Departments Involves recruiting and hiring new employees, evaluating and managing personnel, tracking personnel data, administering payroll and pensions and sometimes providing advice to employees regarding work- related issues. Knowledge Management Systems Collaborative systems that organize, create, and distribute a business' collective knowledge. Marketing Departments The promotion of a business' products and is the third core business functional behavior. Research and Development (R&D) Departments A department that takes a creative and systematic approach to evolve a business' original idea and devise new ones. Sarbanes-Oxley Act of 2002 (SOX) Accounting laws enacted to counter fraudulent reporting. Collaboration Two or more people pursuing a common business goal is called what? Webinar An example of Video Conferencing is called what? Creative and Systematic What kind of approach does R&D take towards business? Knowledge Transfer Distributing ideas is called what? Accounting Which business behavior would focus on GAAP? Brainstorming What is a collaborative thought process? Discussion Board The oldest IT collaboration tool is what? Production Who makes goods and services? 46 | P a g e Feasible R&D ideas need to be what? Services Intangible products are called what? Promotion Advertising a product is called what? Accounting Which business behavior would focus on SOX? E. Jerome McCarthy Who coined the Four P's of Marketing? Collaborate All five business departments must do what? Unified Modeling Language What does the acronym UML stand for? Goods Tangible products are called what? KM Systmes What collect an organization's collective knowledge? Thread The first post on a discussion board is called what? Google Docs & Spreadsheets What is an example of online application software? Placement How a product or service is delivered to a customer is called what? Human Resources (HR) Which business behavior would focus on people? Products What are actual goods and services referred to in business? Gantt Charts Project management software produces road maps called what? 47 | P a g e Microsoft Project Name an example of project management software. Instant Messaging Real-time online communication is called what? ch 12 Graphical Reports What reports are visual in nature? Trend Reporting Reporting tendencies in business is called what? Database TPS systems are based in what application software? Transaction Processing System What does the acronym TPS mean? Highly Detailed Supervisory reports are considered what? Laborers What level uses the most detailed reports? Strategic Reports with the most summarization are for what types of decisions? Tactical What kind of decision requires specific actions? Tactical Reports with only internal data are used for what type of decisions? Tactical What kind of decision is long-term? TPS Report Which report has the highest level of detail? Ad hoc Demand reports are sometimes called what? 50 | P a g e What is often called a blueprint for developing applications? UML What step in UML illustrates how computer processes relate with each other? Sequence Diagrams Who categorizes data requirements? DBAs Which System Development Methodology is considered "develop as you go"? RAD What job used to be called "IT Director?" CIO Which IT job is the highest paid? CIO What is a common axiom for Information Technology professionals? Know the business What is an ERP disadvantage? cost Applying IT to an existing process like printing and distributing is called what? value added What computer programming and software connects the components an applications architect designs? middleware Which IT jobs is considered "board-level"? CIO What is a standardized visual modeling language for developing computer software? UML What does the acronym SDLC stand for? System Development Life Cycle Which is an ERP advantage? increased production Who is in charge of software application development teams? 51 | P a g e Head Application Developer Which IT professional works with Sarbanes-Oxley? IT Auditor Name two types of IT professionals Service & IT Consultants Which step in SDLC includes a feasibility study? initiation Which IT professional works with LANs and WANs? Network Administrator If the Concept Development phase in SDLC fails, what is the next step? initiation ch 14 A column in a table is called what? Field A name of a field is also called what? Atribute "One-to-many" is an example of what? Relationship What is the most widely used database in the world? Oracle What database did Zach choose? Microsoft Access What is used to find specific populations within a database? Queries Why did Zach's database not show all REOs? Filter What does the acronym REO mean? Real Estate Owned In the SQL Statement "SELECT Title," Title refers to what? Field 52 | P a g e The most widely used query language for a DBMS is called what? SQL What does the acronym SQL mean? Structured Query Language In the SQL Statement "ORDER BY Title," Title refers to what? Field In the SQL Statement "FROM Book," Book refers to what? Table The structure of a well thought-out DBMS helps avoid what? Data Redundancy What software did Abby first suggest after Microsoft Word? Microsoft Excel Where does a database hold data? Tables Which is not an SQL function? RELAY Insuring a field is populated with usable data is called what? Data Validation What software did Zach use originally? Microsoft Word What overlays a table for a more specific view? Form In the SQL Statement "WHERE Price," Price refers to what? Field What do database designers use to construct databases? Entity Relationship Diagrams A map of a database that shows tables and relationships is called what? Schema A row in a table is called what? 55 | P a g e Data discovery What is another term for Data Mining? Data warehouse What consolidates disparate data? Customer Relationship Management In BI, what does the acronym CRM mean? Hadoop What is Doug Cutting's son's toy elephant's name? 80% How much data is unstructured? Hadoop What allows a cluster system that allows data to be stored on multiple servers? velocity What refers to how fast data is collected? dashboards What software helps BI become more usable through visualization? 1950s What decade did businesses start DSS? internet speeds What held up the emergence of the Cloud? BI What refers to an assortment of software applications to analyze an organization's raw data? Extract, Transform, Load What does ETL stand for? too expensive Why is keeping enormous amounts of inventory a bad thing? volume What refers to the amount of data an organization stores? Big Data 56 | P a g e Large collected datasets are called what? normalization What provides a standard format to organize data? unstructured What data is disorganized and not easily read? Datamart What is a smaller Data Warehouse? Structured What kind of data resides in fixed formats? variety What refers to different kinds of data? Decision Support System In relation to BI, what does the acronym DSS mean? Dashboard What is a graphical interface that characterizes specific data analysis through visualization? veracity What refers to quality of data? Predictive Analytics What attempts to reveal future patterns in the marketplace? ch17 What is the initial cost to create an iTunes Connect account? $100 Which App store reserves the right to review the app before it goes live? Apple Mobile app prototype testing can be done manually or it can be what? Automated What kind of testing avoids when a mobile apps being incapable of managing its own allocated memory usage that results in poor performance? Memory Leakage Testing What kind of testing is done to check the performance and behavior of the mobile app under specific 57 | P a g e conditions like low battery, bad network coverage, or low available memory? Performance Testing Testing an App for things like notifications, power loss, and network outage are called what? Interruption Testing What guarantees that the mobile app prototype is functioning per requirements? Functional Testing What is also called "friendliness" testing? Usability Testing Once you've chosen a platform, SDK, and language, what do you use first to make a prototype of your mobile app? Storyboard/wireframe Which SDK claims that they " code once" and compile to many platforms? Microsoft's Touch Development What is another term for programming? Coding What is the process of making a prototype of your mobile app? Wireframing What is the easiest and most common way to monetize a mobile app? Selling your app online Selling or licensing programming code to another organizations so they don't go through the trouble of initial development is called what? Licensing your code What monatization model requires a massive user base to generate significant revenues? Advertising Buying additional content within the app itself is called what? In-app purchase What are Constant Contact and MailChimp.com? EMSs Which is not a mobile app language? AppStore Google Tools 60 | P a g e Since running analytics against transactional data can bog down a system, and since most organizations need to combine and reformat data from multiple sources, firms typically need to create separate data repositories for their reporting and analytics work, which is a kind of staging area from which to turn that data into information. true Database Management System (DBMS) A system for managing data that allows the user to store, retrieve, define, manipulate and analyze information. Why is it challenging to leverage data for decision making data is in inconsistent format data sits in incompatible systems Data quality pertains to which of the following questions? Can our data be trusted as accurate? Is it clean, complete, and reasonably free of errors? It is quite common for non-tech employees to work on development teams with technical staff, defining business problems, outlining processes, setting requirements, and determining the kinds of data the firm will need to leverage. True Moore's Law the observation that computing power roughly doubles every two years. massively parallel processing Computers designed with many microprocessors that work together, simultaneously, to solve problems. network effects the value of a product or service for an individual user increases with the number of total users main three sources of value that businesses derive from network effects? Exchange, staying power, and complentary benefits switching costs costs that make customers reluctant to switch to another product or service platform When products and services that encourage others to offer complementary goods this type of ecosystem can emerge One sided markets In one-sided markets, users gain benefits from interacting with a similar category of users 61 | P a g e multi-sided market product requires two or more independent markets to succeed cross-side exchange benefit An increase in the number of users on one side of the market, creating a rise in the other side. technological leapfrogging Competing by offering a new technology that is so superior to existing offerings that the value overcomes the total resistance that older technologies might enjoy via exchange, switching cost, and complementary benefits. Help establish network effect lead establish a network effects lead include subsidizing adoption; leveraging viral marketing, creating alliances to promote a product or to increase a service's user base; redefining the market to appeal to more users; leveraging unique distribution channels to reach new customers; seeding the market with complements; encouraging the development of complements; and maintaining backward compatibility. continuous innovation a modification of an existing product that sets one brand apart from its competitors backward integration takes information entered into a given system and sends it automatically to all upstream systems and processes convergence the state of separate elements joining or coming together congestion An overcrowding; a clogging ebay Subsidized adoption created completmentary goods and services availability heuristic estimating the likelihood of events based on their availability in memory; if instances come readily to mind (perhaps because of their vividness), we presume such events are common peer production and social media These services often leverage the wisdom of crowds to provide insight or production that can be far more accurate or valuable than that provided by a smaller group of professionals folksomonies 62 | P a g e are keyword-based classification systems created by user communities as they generate and review content Mash-ups promote: • the useful combination of different Web services, such as maps and other information feeds. A prediction market involves: polling a diverse crowd and aggregating opinions to form a forecast of an eventual outcome. Crowdsourcing inviting broad communities of people - customers, employees, independent scientists and researchers, and even the public at large - into the new product innovation process online company social media emphasize representation, respect, responsibility sock puppeting a practice where a company executive or other biased source poses as someone else to plug a product in social media Astrosurfing creating a movement controlled by a large organization or group designed to look like a citizen-founded, grassroots campaign social graph a map of all relevant links or connections for one member of a social network • Facebook's key resources for competitive advantage network effects and switching costs word of mouth most persuasive (and valuable) form of marketing Google the most valuable media company by The firm's market capitalization (market cap), the value of the firm calculated by multiplying its share price by the number of shares, Search Engine Optimization (SEO) Combines art along with science to determine how to make URLs more attractive to search engines resulting in higher search engine ranking HTML (Hypertext Markup Language) the written code that creates Web pages and links; a language all computers can read 65 | P a g e Social Engineering hackers use their social skills to trick people into revealing access credentials or other valuable information Public Key Encryption A method of paired key encryption in which the key used to encrypt data is made available to anybody and its corresponding decryption key is kept secret. blended threat is a security threat that combines the characteristics of computer viruses, worms, and other malicious codes with vulnerabilities found on public and private networks. Keylogger using spyware to record a user's keystrokes botnets or zombie networks Hordes of surreptitiously infiltrated computers, linked and controlled remotely. This technique is used to perpetrate click fraud, as well as a variety of other computer security crimes. Phishing the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers. data mining the application of statistical techniques to find patterns and relationships among data for classification and prediction data raw material knowledge experience based and humanistic three orientations of data Descriptive, Predictive, Perscriptive A competent business analytics team should possess three critical skills information technology, statistics, and business knowledge. For data mining to work, two critical conditions need to be present: the organization must have clean, consistent data, and (2) the events in that data should reflect current and future trends. 66 | P a g e Financial modeling building trading systems that adapt to historical trends or risk models to identify customers with the highest likelihood to default on a credit customer churn determining which customers are likely to leave, and what tactics can help the firm avoid unwanted defections collaborative filtering A classification of software that monitors trends among customers and uses this data to personalize an individual customer's experience. market basket analysis analyzes such items as websites and checkout scanner information to detect customers' buying behavior and predict future behavior by identifying affinities among customers' choices of products and services customer segmentation grouping customers based on similar needs data governance refers to the overall management of the availability, usability, integrity, and security of company data Data hosting Where will the systems be housed? What are the hardware and networking requirements for the effort? Data Quality A comprehensive approach to ensuring the accuracy, validity, and timeliness of data. Data relevancy data are useful (quality characteristic) Transactional Data data collected to record the individual transactions of a company or organization legacy system a current or existing system that will become the base for upgrading or integrating with a new system. outdated data aggregation process in which information is gathered and expressed in a summary form for purposes such as statistical analysis Enterprise Software 67 | P a g e source for customer, supply chain and enterprise data. relational database the most common database format enriching fraud meant to line the pockets of the perpetrators depleting fraud meant to waste the ad budgets of rivals disbarring fraud attempting to frame a rival by generating bogus clicks or impressions that appear to be associated with the rival, in hopes that this rival will be banned from an ad network or punished in search engine listings. link fraud Also called "spamdexing" or "link farming." The process of creating a series of bogus Web sites, all linking back to the pages one is trying to promote Rank-based impression fraud on sites where ad rank is based on click performance, fraudsters repeatedly search keywords linked to rival ads or access pages where rival ads appear. The goal is to generate impressions without clicks. This process lowers the performance rank (quality score) of a rival's ads, possibly dropping ads from rank results, and allowing fraudsters to subsequently bid less for the advertising slots previously occupied by rivals. Depleting impression fraud generating bogus impressions to exhaust a rival's CPM ad budget Liquidity the ease with which an asset can be converted into cash e-commerce electronic business or exchange conducted over the internet AWS Amazon Web Services fulfillment houses These entities take orders from sellers then assemble, package, and ship the products based on instructions of the sellers. Last Mile