Which of the following types of security loss is WikiLeaks an example of? Show
A(n) ________ is a measure that individuals or organizations take to block a threat from obtaining an asset. A(n) ________ is a computer program that senses when another computer is attempting to scan a disk or access a computer. Which of the following is considered a personal security
safeguard? Which of the following is a human safeguard against security threats? Backup and
physical security are ________ against computer security threats. With HTTPS, data are encrypted using a protocol called the ________. With HTTPS, data are
encrypted using the Secure Socket Layer (SSL) protocol, which is also known as ________. "The number of transistors per square inch on an integrated chip doubles every 18 months." This observation is known as ________ Law. Which of the following statements states Moore's Law? As a result of Moore's Law, ________. Because of Moore's Law, the cost of data processing, communications, and storage ________. ________ is the ability to make and manipulate models. A group of components that interact to achieve some purpose is referred to as a(n) ________. Which of the following is an example of the
hardware component of an information system? Which of the following is true about the management and use of information systems? Why is it important for business professionals to take an active role in developing and managing information systems? Which of the following distinguishes information systems from information technology? Moore's Law states that the speed of a computer doubles every 18 months. A(n) ________ is a collection of data that is stored within business records. Which of the following statements is true about business process modeling notation? The outermost components
of the IS framework ________. The ________ component of the IS framework provides instructions for people. In an IS framework, ________ is the bridge between the
computer side on the left and the human side on the right. Automation of a process activity consists of moving work from the ________ of the symmetrical five-component framework. When work that was formerly done by people has been moved to computers, it is said to be ________. Which of the following statements is true of using an information system to improve process quality? Which of the following is a characteristic of good information? Which of the following statements is true about data characteristics of quality information? Which of the following statements is true regarding the characteristics of good information? A competitive strategy followed by an organization is derived from the ________ of its industry. Porter originally developed the five forces model to determine the ________. Which of the following statements describes suppliers in a position of strong bargaining power? Simpson's Lawn Services decides to offer two free mowing services for all customers who booked garden landscaping in the fall. Which of the following forces is Simpson's Lawn Services addressing? Porter's five competitive forces can be grouped into two types: forces related to ________ and forces related to supply chain bargaining power. Which of the following groups' bargaining power is considered as one of the five competitive forces in Porter's five forces model? In Porter's five factor model, each of the three competitive forces concerns the danger of ________. The two strength factors that relate to all three competitive forces
are ________ and customer loyalty. Which of the following is true of new entrants? Which of the following statements describes a scenario in which the bargaining power of a supplier is strong? The bargaining power of a customer is weak if ________.
An organization responds to the structure of its industry by choosing a ________ strategy. According to Porter, to be effective, the organization's goals and activities must be consistent with the organization's ________. Porter defined ________ as the amount of money that a customer is willing to pay for a resource, product, or service. Which of the following is true of supporting activities? ________ includes general management, finance, accounting, legal, and government affairs.
Porter's model of business activities includes ________, which are interactions across value activities. A manufacturing system uses sales forecasts to plan production. It uses the production plan to determine
raw material needs and then uses the material needs to schedule purchases. This ultimately leads to reduced inventory costs. Which of the following is being used to reduce the inventory cost? According to Porter, the processes and systems in an organization pursuing differentiation strategy must ________ to avoid negative margins. Jupiter Shop is an online store. Customers have to create an online account to purchase products. The purchased products are delivered free of cost. The address of delivery is stored, so that customers can choose the same address for future purchases. Jupiter Shop features seasonal discounts and exchange
offers. It also accumulates redeemable points for regular shoppers. Which of the following statements describes the use of IS by Jupiter Shop to lock-in customers? Competitive strategy determines an organization's value chain. Porter
originally developed the five forces model in order to understand organizations' competitive environment. According to Porter's five forces model, a company is profitable if all the five competitive forces are strong. The bargaining power of competitors is one of the competitive forces identified by Porter. T or F ? The three competitive forces in Porter's model concern the danger of customers taking their business elsewhere. Computers represent data using binary digits, called ________. The number of bits to represent a single character is referred to as a ________. One ________ is equivalent to 1,024 kilobytes. One ________ is equivalent to 1,024 gigabytes. A ________ is 1,024 bytes. A(n) ________ is a program that controls a computer's resources. When a user needs to load more data into an existing program, which of the following instructions will an operating system direct the CPU to attempt? CPU speed is expressed in cycles called ________. Which of the following is an example of volatile memory? Which of the
following is an example of nonvolatile memory? Which of the following is true of a server? Which of the
following is true about operating systems software? Which of the following is an open-source operating system? Which of the following is the most widely used operating system in business? ) Programs that control a server computer's resources are referred to as ________. ________ is the process whereby multiple operating systems share the same hardware. Which of the following refers to an application that runs on personal computers and does not need to connect to any server to run? Application programs that run within a browser, without the need to be preinstalled on client computers, are referred to as ________. Which of the following is true of thick-client applications? ________ is computer code as written by humans and that is understandable by humans. Which of the following categories are the rights to which creators are entitled for their work?Copyright (or author's right) is a legal term used to describe the rights that creators have over their literary and artistic works.
Which of the following terms is used to describe a set of steps that can convert readable plaintext into unreadable ciphertext?Definition(s): The cryptographic transformation of data to produce ciphertext. Cryptographic transformation of data (called “plaintext”) into a form (called “ciphertext”) that conceals the data's original meaning to prevent it from being known or used.
Which of the following terms refers to someone who access a computer or network illegally with the intent of malicious action?A hacker is an individual who uses computer, networking or other skills to overcome a technical problem. The term also may refer to anyone who uses their abilities to gain unauthorized access to systems or networks in order to commit crimes.
Which of the following is a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network?Spoofing is a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network.
|