One of the following is not among the important concepts regarding the web and network privacy:

Scheduled maintenance: Saturday, September 10 from 11PM to 12AM PDT

Home

Subjects

Expert solutions

Create

Log in

Sign up

Upgrade to remove ads

Only ₩37,125/year

  • Flashcards

  • Learn

  • Test

  • Match

  • Flashcards

  • Learn

  • Test

  • Match

Terms in this set (48)

These have been applied to structured tasks, such as record keeping, simple clerical operations, and inventory control

Transaction-processing systems

Understanding the role of information in generating and using business intelligence

Information Literacy

Provides historical, current, and predictive views of business operations and environments and gives organizations a competitive advantage in the marketplace

Business intelligence

An organized integration of hardware and software technologies, data, processes, and human elements designed to produce timely, integrated, relevant, accurate, and useful information for decision-making purposes

Management Information systems

Skill in using productivity software, such as word processors, spreadsheets, database management systems, and presentation software,

Computer literacy

A collection of all relevant data organized in a series of integrated files

A database

Raw facts and is a component of an information system

Data

This component of an information system generates the most useful type of information for decision making, including transaction-processing reports and models for decision analysis

Process

Facts that have been analyzed by the process component and, therefore, are more useful for decision making

Information

Which of the following is NOT one of the five forces model (Porter)?
Select one:
a. Substitutes
b. New Entrants
c. Suppliers
d. Offshoring
e. Buyers

D. Offshoring

This is software that secretly gathers information about users while they browse the Web.

Spyware

Using "people skills"—such as being a good listener and assuming a friendly, unthreatening air—to trick others into revealing private information. This is an attack that takes advantage of the human element of security systems.

Social Engineering

This is sending fraudulent e-mails that seem to come from legitimate sources, such as a bank or university.

Phishing

This is an attempt to gain access to a network by posing as an authorized user in order to find sensitive information, such as passwords and credit card information.

Spoofing

This is capturing and recording network traffic.

Sniffing

A combination of hardware and software that acts as a filter or barrier between a private network and external computers or networks, including the Internet. A network administrator defines rules for access, and all other data transmissions are blocked.

Firewall

A ___ attack floods a network or server with service requests to prevent legitimate users' access to the system.

Denial-of-service (DoS)

This outlines procedures for keeping an organization operational in the event of a natural disaster or network attack.

Business continuity planning

This security measure uses a physiological element that is unique to a person and cannot be stolen, lost, copied, or passed on to others.

Biometric

This transforms data, called plaintext or cleartext, into a scrambled form called ciphertext that cannot be read by others.

Data encryption

An unsolicited e-mail sent for advertising purposes.

Spam

A set of rules specifying the legal and ethical use of a system and the consequences of noncompliance.

Acceptable use policy

Registering, selling, or using a domain name to profit from someone else's trademark is called:

Cybersquatting

Small text files with unique ID tags that are embedded in a Web browser and saved on the user's hard drive.

Cookies

This protects product names and identifying marks

Trademark

This protects tangible material, such as books, drawings, online materials, including Web pages, HTML code, and computer graphics.

Copyright

This protects new processes

Patent

A legal umbrella covering protections that involve copyrights, trademarks, trade secrets, and patents for "creations of the mind" developed by people or businesses.

Intellectual property

Public information, posted by an organization or public agency, can be censored for public policy reasons.
Select one:
True
False

True

One of the following is not among the important concepts regarding the Web and network privacy:
Select one:
a. Accountability
b. Data integrity
c. Nonrepudiation
d. Acceptable use policies

B. Data integrity

This uses highly centralized information systems. Subsidiaries have little autonomy and rely on headquarters for all process and control decisions as well as system design and implementation.

A global structure (also known as franchiser)

This is an organization with assets and operations in at least one country other than its home country. It delivers products and services across national borders and is usually centrally managed from its headquarters.

A multinational corporation (MNC)

This is an information system that works across national borders, facilitates communication between headquarters and subsidiaries in other countries, and incorporates all the technologies and applications found in a typical information system to gather, store, manipulate, and transmit data across cultural and geographic boundaries.

A global information system

An organization with this structure operates much like a multinational corporation, but subsidiaries depend on headquarters more for process and production decisions.

international structure

Globalization has become an important factor in purchasing and the supply chain. True or False?
Select one:
True
False

True

Transborder data flow (TDF) restricts the type of data that can be captured and transmitted in foreign countries. True or False?
Select one:
True
False

True

All of the following organizations do business across national borders except:
Select one:
a. Domestic organizations
b. International organizations
c. Multinational organizations
d. Global organizations

Domestic Organizations

Which of the following is NOT one of the three obstacles to using global information systems?
Select one:
a. Lack of funding
b. Cultural differences
c. Diverse regulatory practices
d. Lack of standardization (including differences in time zones, taxes, language, and work habits)

Lack of funding

The central processing unit (CPU) is the heart of a computer. It is divided into two components.
Select one:
a. the arithmetic logic unit (ALU) and the control unit
b. random access memory (RAM) and the control unit
c. input device and output device
d. the arithmetic logic unit (ALU) and random access memory (RAM)

a. the arithmetic logic unit (ALU) and the control unit

Computers can perform three basic tasks: arithmetic operations, logical operations, and storage and retrieval operations.
Select one:
True
False

True

The performs comparison or relational operations as well as arithmetic operations.

Arithmetic logic unit (ALU)

The _____ tells the computer what to do, such as instructing the computer which device to read or send output to.

Control Unit

This is volatile memory, in which data can be read from and written to; it is also called readwrite memory.

Random Access Memory (RAM)

This type of memory is nonvolatile.

Read-only memory (ROM)

This is a set of programs for controlling and managing computer hardware and software.

Operating System (OS)

This is used to perform a variety of tasks on a personal computer, including word processing, spreadsheets, database, presentation, graphics, etc.

Application Software

This resides on the processor. It stores recently accessed memory so the processor is not waiting for the memory transfer.

Cache Ram

This stores data and information and is usually volatile; its contents are lost when electrical power is turned off. It plays a major role in a computer's performance.

Main Memory

Sets with similar terms

MIS 3300 UH Exam 1

64 terms

nick_patino1

MIS Test 1

76 terms

nicolerusso1022

IS Exam 1

58 terms

emily_gilmer

CIS 236 CH 1 & 2

185 terms

beectee5

Sets found in the same folder

Business Information Systems Exam #1

24 terms

ned_macdonald

Business Information Systems Exam 1

76 terms

ashley_milanowski

Chapter 1 Bus Info Systems

11 terms

warren_buehler

Chapter 1 BIS

11 terms

MariahG35

Other sets by this creator

Test 1 Act. 2

2 terms

j_evenhouse

QUIZES CH. 5-8

32 terms

j_evenhouse

Accounting Test 1 Quizes

17 terms

j_evenhouse

BIS CHAPTER 14, BIS Chapter 13, BIS Ch.12, BIS Cha…

110 terms

j_evenhouse

Verified questions

SOCIOLOGY

Provide examples from your own experience to support or contradict the existence of the hidden curriculum.

Verified answer

SOCIOLOGY

How would sociologists explain the fact that on average, African Americans earn $62 for every$100 earned by whites?

Verified answer

SOCIOLOGY

How do sociologists manage to study religion if they can't see the spiritual world?

Verified answer

SOCIOLOGY

Match terms a-e with statements. a. population b. representative sample c. random sample d. sample e. survey. selected on the basis of chance, so that each member of a population has an equal opportunity of being selected.

Verified answer

Other Quizlet sets

6th grade language arts semester 2 part 12

10 terms

schokoliese

Electronic Fetal Monitoring

29 terms

Nursing_Student_84

BLS & CPR

57 terms

Lamar_Clayton

test 2: work and family

50 terms

mdduques

Related questions

QUESTION

What type of malware gains control of a computer and creates a backdoor with root privileges?

8 answers

QUESTION

Of the general areas of business, which area deals with human resources and employee engagement?

3 answers

QUESTION

True or False: The IT steering committee is comprised of members from each of the IT groups that is responsible for seeing any given project to completion.

2 answers

QUESTION

Be able to briefly discuss how small schools leverage athletes to increase general revenues (lecture).

8 answers

Toplist

Neuester Beitrag

Stichworte