One of the following is not among the important concepts regarding the web and network privacy:

Scheduled maintenance: Saturday, September 10 from 11PM to 12AM PDT

Show

    Home

    Subjects

    Expert solutions

    Create

    Log in

    Sign up

    Upgrade to remove ads

    Only ₩37,125/year

    • Flashcards

    • Learn

    • Test

    • Match

    • Flashcards

    • Learn

    • Test

    • Match

    Terms in this set (48)

    These have been applied to structured tasks, such as record keeping, simple clerical operations, and inventory control

    Transaction-processing systems

    Understanding the role of information in generating and using business intelligence

    Information Literacy

    Provides historical, current, and predictive views of business operations and environments and gives organizations a competitive advantage in the marketplace

    Business intelligence

    An organized integration of hardware and software technologies, data, processes, and human elements designed to produce timely, integrated, relevant, accurate, and useful information for decision-making purposes

    Management Information systems

    Skill in using productivity software, such as word processors, spreadsheets, database management systems, and presentation software,

    Computer literacy

    A collection of all relevant data organized in a series of integrated files

    A database

    Raw facts and is a component of an information system

    Data

    This component of an information system generates the most useful type of information for decision making, including transaction-processing reports and models for decision analysis

    Process

    Facts that have been analyzed by the process component and, therefore, are more useful for decision making

    Information

    Which of the following is NOT one of the five forces model (Porter)?
    Select one:
    a. Substitutes
    b. New Entrants
    c. Suppliers
    d. Offshoring
    e. Buyers

    D. Offshoring

    This is software that secretly gathers information about users while they browse the Web.

    Spyware

    Using "people skills"—such as being a good listener and assuming a friendly, unthreatening air—to trick others into revealing private information. This is an attack that takes advantage of the human element of security systems.

    Social Engineering

    This is sending fraudulent e-mails that seem to come from legitimate sources, such as a bank or university.

    Phishing

    This is an attempt to gain access to a network by posing as an authorized user in order to find sensitive information, such as passwords and credit card information.

    Spoofing

    This is capturing and recording network traffic.

    Sniffing

    A combination of hardware and software that acts as a filter or barrier between a private network and external computers or networks, including the Internet. A network administrator defines rules for access, and all other data transmissions are blocked.

    Firewall

    A ___ attack floods a network or server with service requests to prevent legitimate users' access to the system.

    Denial-of-service (DoS)

    This outlines procedures for keeping an organization operational in the event of a natural disaster or network attack.

    Business continuity planning

    This security measure uses a physiological element that is unique to a person and cannot be stolen, lost, copied, or passed on to others.

    Biometric

    This transforms data, called plaintext or cleartext, into a scrambled form called ciphertext that cannot be read by others.

    Data encryption

    An unsolicited e-mail sent for advertising purposes.

    Spam

    A set of rules specifying the legal and ethical use of a system and the consequences of noncompliance.

    Acceptable use policy

    Registering, selling, or using a domain name to profit from someone else's trademark is called:

    Cybersquatting

    Small text files with unique ID tags that are embedded in a Web browser and saved on the user's hard drive.

    Cookies

    This protects product names and identifying marks

    Trademark

    This protects tangible material, such as books, drawings, online materials, including Web pages, HTML code, and computer graphics.

    Copyright

    This protects new processes

    Patent

    A legal umbrella covering protections that involve copyrights, trademarks, trade secrets, and patents for "creations of the mind" developed by people or businesses.

    Intellectual property

    Public information, posted by an organization or public agency, can be censored for public policy reasons.
    Select one:
    True
    False

    True

    One of the following is not among the important concepts regarding the Web and network privacy:
    Select one:
    a. Accountability
    b. Data integrity
    c. Nonrepudiation
    d. Acceptable use policies

    B. Data integrity

    This uses highly centralized information systems. Subsidiaries have little autonomy and rely on headquarters for all process and control decisions as well as system design and implementation.

    A global structure (also known as franchiser)

    This is an organization with assets and operations in at least one country other than its home country. It delivers products and services across national borders and is usually centrally managed from its headquarters.

    A multinational corporation (MNC)

    This is an information system that works across national borders, facilitates communication between headquarters and subsidiaries in other countries, and incorporates all the technologies and applications found in a typical information system to gather, store, manipulate, and transmit data across cultural and geographic boundaries.

    A global information system

    An organization with this structure operates much like a multinational corporation, but subsidiaries depend on headquarters more for process and production decisions.

    international structure

    Globalization has become an important factor in purchasing and the supply chain. True or False?
    Select one:
    True
    False

    True

    Transborder data flow (TDF) restricts the type of data that can be captured and transmitted in foreign countries. True or False?
    Select one:
    True
    False

    True

    All of the following organizations do business across national borders except:
    Select one:
    a. Domestic organizations
    b. International organizations
    c. Multinational organizations
    d. Global organizations

    Domestic Organizations

    Which of the following is NOT one of the three obstacles to using global information systems?
    Select one:
    a. Lack of funding
    b. Cultural differences
    c. Diverse regulatory practices
    d. Lack of standardization (including differences in time zones, taxes, language, and work habits)

    Lack of funding

    The central processing unit (CPU) is the heart of a computer. It is divided into two components.
    Select one:
    a. the arithmetic logic unit (ALU) and the control unit
    b. random access memory (RAM) and the control unit
    c. input device and output device
    d. the arithmetic logic unit (ALU) and random access memory (RAM)

    a. the arithmetic logic unit (ALU) and the control unit

    Computers can perform three basic tasks: arithmetic operations, logical operations, and storage and retrieval operations.
    Select one:
    True
    False

    True

    The performs comparison or relational operations as well as arithmetic operations.

    Arithmetic logic unit (ALU)

    The _____ tells the computer what to do, such as instructing the computer which device to read or send output to.

    Control Unit

    This is volatile memory, in which data can be read from and written to; it is also called readwrite memory.

    Random Access Memory (RAM)

    This type of memory is nonvolatile.

    Read-only memory (ROM)

    This is a set of programs for controlling and managing computer hardware and software.

    Operating System (OS)

    This is used to perform a variety of tasks on a personal computer, including word processing, spreadsheets, database, presentation, graphics, etc.

    Application Software

    This resides on the processor. It stores recently accessed memory so the processor is not waiting for the memory transfer.

    Cache Ram

    This stores data and information and is usually volatile; its contents are lost when electrical power is turned off. It plays a major role in a computer's performance.

    Main Memory

    Sets with similar terms

    MIS 3300 UH Exam 1

    64 terms

    nick_patino1

    MIS Test 1

    76 terms

    nicolerusso1022

    IS Exam 1

    58 terms

    emily_gilmer

    CIS 236 CH 1 & 2

    185 terms

    beectee5

    Sets found in the same folder

    Business Information Systems Exam #1

    24 terms

    ned_macdonald

    Business Information Systems Exam 1

    76 terms

    ashley_milanowski

    Chapter 1 Bus Info Systems

    11 terms

    warren_buehler

    Chapter 1 BIS

    11 terms

    MariahG35

    Other sets by this creator

    Test 1 Act. 2

    2 terms

    j_evenhouse

    QUIZES CH. 5-8

    32 terms

    j_evenhouse

    Accounting Test 1 Quizes

    17 terms

    j_evenhouse

    BIS CHAPTER 14, BIS Chapter 13, BIS Ch.12, BIS Cha…

    110 terms

    j_evenhouse

    Verified questions

    SOCIOLOGY

    Provide examples from your own experience to support or contradict the existence of the hidden curriculum.

    Verified answer

    SOCIOLOGY

    How would sociologists explain the fact that on average, African Americans earn $62 for every$100 earned by whites?

    Verified answer

    SOCIOLOGY

    How do sociologists manage to study religion if they can't see the spiritual world?

    Verified answer

    SOCIOLOGY

    Match terms a-e with statements. a. population b. representative sample c. random sample d. sample e. survey. selected on the basis of chance, so that each member of a population has an equal opportunity of being selected.

    Verified answer

    Other Quizlet sets

    6th grade language arts semester 2 part 12

    10 terms

    schokoliese

    Electronic Fetal Monitoring

    29 terms

    Nursing_Student_84

    BLS & CPR

    57 terms

    Lamar_Clayton

    test 2: work and family

    50 terms

    mdduques

    Related questions

    QUESTION

    What type of malware gains control of a computer and creates a backdoor with root privileges?

    8 answers

    QUESTION

    Of the general areas of business, which area deals with human resources and employee engagement?

    3 answers

    QUESTION

    True or False: The IT steering committee is comprised of members from each of the IT groups that is responsible for seeing any given project to completion.

    2 answers

    QUESTION

    Be able to briefly discuss how small schools leverage athletes to increase general revenues (lecture).

    8 answers