CIS 335 Final Exam Fall

Embed Size (px)

Citation preview

  • 7/22/2019 CIS 335 Final Exam Fall

    1/5

    CIS 335 Final Exam FIRST_LAST NAMEPrint out a copy, write your selections to the left of the question number.

    1 | P a g e

    1. A(n) __D__ is a set of processes that combine to yield a profit.

    a. value system c. shipping profile

    b. industry value chain d. business model

    2. A(n) __C__ is a specific collection of business processes used to identify customers, marketto those customers, and generate sales to those customers.

    a. industry value chain c. revenue modelb. strategic alliance d. value-added network

    3. The combination of store design, layout, and product display knowledge is called __C__.

    a. business process c. merchandising

    b. business transaction d. Service

    4. Businesses often calculate __A__ numbers before committing to any new technology.

    a. return-on-investment c. Productivityb. return-to-profit d. return-to-value

    5. __C__ determine how the sending device indicates that it has finished sending a message,

    and how the receiving device indicates that it has received the message.a. Routers c. Protocolsb. Bridges d. Adapters

    6. In networking applications, an 8-bit number is often called a(n) __A__.

    a. octet c. Piconetb. netbit d. Bit

    7. Network engineers have devised a number of stopgap techniques to stretch the supply of IP

    addresses. One of the most popular techniques is __A__.

    a. subnetting c. sub-blocking

    b. subletting d. piconetting

    8. A computer called a ____ converts private IP addresses into normal IP address when it

    forwards packets from those computers to the Internet.a. routing algorithm device c. subnet translation device

    b. network address translation device d. private network device

    9. Stock brokerage firms use a(n) __B__ revenue model, which allow them to charge theircustomers a commission for each trade executed.

    a. fee-for-service c. information sales

    b. fee-for-transaction d. catalog

    10. The U.S. government deregulated the securities trading business in the early __B__.

    a. 1960s c. 1980sb. 1970s d. 1990s

    11. The greatest concerns that most people have when they consider moving their financialtransactions to the Web are __B__ and reliability.a. service c. stickiness

    b. security d. control

  • 7/22/2019 CIS 335 Final Exam Fall

    2/5

    CIS 335 Final Exam FIRST_LAST NAMEPrint out a copy, write your selections to the left of the question number.

    2 | P a g e

    12. __B__ revenue models range from games and entertainment to financial advice and the

    professional services of accountants, lawyers, and physicians.

    a. Catalog c. Fee-for-transactionb. Fee-for-service d. Mail order

    13. A(n) __B__ occurs when a visitor requests a page from the Web site.

    a. page load c. page accessb. visit d. index

    14. The first time that a particular visitor loads a Web site page is called a __A__.

    a. trial visit c. repeat visit

    b. fresh visit d. page visit

    15. Some Web pages have banner ads that continue to load and reload as long as the page is

    open in the visitors Web browser. Each time the banner ad loads is a(n) __C__.a. view c. impressionb. count d. click

    16. The marketing strategy that includes the practice of sending e-mail messages to people who

    have requested information on a particular topic or product is part of __C__ marketing.a. active c. permission

    b. conversion d. passive

    17. The classic objective of __B__ is to provide the right goods in the right quantities in the

    right place at the right time.

    a. procurement c. transaction processingb. logistics d. production

    18. One common support activity that underlies multiple primary activities is __C__.a. record-keeping c. trainingb. auditing d. regulation

    19. __B__ is the intentional collection, classification, and dissemination of information about acompany, its products, and its processes.a. Database management c. Data warehousing

    b. Knowledge management d. Data mining

    20. One trend that is becoming clear in purchasing, logistics, and support activities is the shift

    away from hierarchical structures toward __C__ structures.

    a. vertical c. networkb. horizontal d. matrix

    21. In an auction, a third-party ____ service can be used to hold the buyer's payment until heor she receives and is satisfied with the purchased item.

    a. insurance c. escrowb. risk management d. guarantee

    22. Existing auction sites, such as eBay, are inherently more valuable to customers than new

    auction sites. This is called a(n) __B__.

    a. opt-in effect c. lock-out effectb. lock-in effect d. opt-out effect

  • 7/22/2019 CIS 335 Final Exam Fall

    3/5

    CIS 335 Final Exam FIRST_LAST NAMEPrint out a copy, write your selections to the left of the question number.

    3 | P a g e

    23. Many people think of Priceline.com as a __D__ auction site.

    a. double c. sealed-bid

    b. shill bid d. seller-bid

    24. Large companies sometimes have __A__ who find buyers for unusable inventory items.a. liquidation specialists c. accountants

    b. inventory specialists d. auditors

    25. Smaller businesses often sell their unusable and excess inventory to __B__, which are firmsthat find buyers for these items.

    a. inventory specialists c. inventory removal services

    b. liquidation brokers d. secondary marketers

    26. Disputes that arise when one person has registered a domain name that is an existing

    trademark or company name are settled by __A__.a. WIPO c. statutory lawb. common law d. ACPA

    27. __C__ occurs when owner information maintained by a public domain registrar is changed

    in the registrars database to reflect a new owners name and business address.a. Trademark infringement c. Domain name ownership change

    b. Product disparagement d. Signatory change

    28. A __B__ is a digital code or stream embedded undetectably in a digital image or audio file.

    a. validation code c. patent

    b. watermark d. cookie

    29. A __A__ statement is a statement that is false and that injures the reputation of another

    person or company.a. defamatory c. deceptiveb. fraudulent d. critical

    30. If a statement injures the reputation of a product or service instead of a person, it is called__C__.a. defamatory c. product disparagement

    b. product defamation d. company defamation

    31. A(n) __C__ is a program that attaches itself to another program and can cause damage

    when the host program is activated.

    a. e-mail filter c. computer virusb. challenge-response d. dead link

    32. More than __90__ percent of all e-mail messages (including messages transmitted to bothbusiness and personal users) will continue to be spam until effective technical solutions can

    be implemented.a. 60 c. 80

    b. 70 d. 90

    33. __A__ is also known as unsolicited commercial e-mail.

    a. Spam c. VPNb. CGI d. Java

  • 7/22/2019 CIS 335 Final Exam Fall

    4/5

    CIS 335 Final Exam FIRST_LAST NAMEPrint out a copy, write your selections to the left of the question number.

    4 | P a g e

    34. A __D__ spam filter examines From addresses and compares them to a list of known good

    sender addresses.

    a. black list c. Tracertb. full-privilege d. white list

    35. A program called _C___ tests the connectivity between two computers connected to the

    Internet.a. Telnet c. Ping

    b. Tracert d. Finger

    36. Application servers are usually grouped into two types: page-based and __B__ systems.

    a. server-based c. script-basedb. component-based d. group-based

    37. __A__ is accomplished by programs that transfer information from one application toanother.a. Application integration c. Co-location

    b. Data mining d. Interoperability

    38. Larger businesses often prefer to use a __C__ application system that separates thepresentation logic from the business logic.

    a. monolithic c. component-basedb. database-driven d. client-based

    39. __A__ software packages are business systems that integrate all facets of a business,

    including accounting, logistics, manufacturing, marketing, planning, project management,and treasury functions.a. ERP c. ERT

    b. EML d. HTL

    40. ERP is the acronym for __B__.

    a. electronic record processing c. enterprise record providerb. enterprise resource planning d. electronic resource provider

    41. __D__ is the electronic defacing of an existing Web sites page.

    a. Masquerading c. Cybersquattingb. Steganography d. Cybervandalism

    42. __B__ is pretending to be someone you are not or representing a Web site as an original

    when it is really a fake.a. Hash coding c. Cybersquattingb. Spoofing d. Warchalking

    43. __B__ encryption encodes a message with an algorithm that uses a single numeric key,

    such as 456839420783, to encode and decode data.a. Hash coding c. Asymmetric

    b. Symmetric d. Transformative

    44. A Web server can compromise __C__ if it allows automatic directory listings.

    a. necessity c. secrecyb. integrity d. authenticity

  • 7/22/2019 CIS 335 Final Exam Fall

    5/5

    CIS 335 Final Exam FIRST_LAST NAMEPrint out a copy, write your selections to the left of the question number.

    5 | P a g e

    45. __A__ is an area of memory set aside to hold data read from a file or database.

    a. RAM c. A buffer

    b. A cookie d. Main memory

    46. A disadvantage of __B__ wallets is that they are not portable.a. server-side c. Paypal

    b. client-side d. virtual

    47. A __D__ is a stored-value card that is a plastic card with an embedded microchip that canstore information.

    a. credit card c. charge card

    b. debit card d. smart card

    48. The largest dollar volume of payments today are made using __A__.

    a. paper checks c. credit cardsb. debit cards d. PayPal

    49. __C__ is a technique for committing fraud against the customers of online businesses.

    a. Due diligence c. Phishing

    b. Money laundering d. Chargeback

    50. __B__ is a criminal act in which the perpetrator gathers personal information about a victimand then uses that information to obtain credit.a. Pharming c. Due diligence

    b. Identity theft d. Money laundering