- Description
BIS 221 Week 2 Knowledge Check
Week 2 Knowledge Check
The material presented below is not meant to be a comprehensive list of all you need to know in the content area. Rather it is a starting point for building your knowledge and skills. Additional study materials are recommended in each area below to help you master the material.
Personalized Study Guide Results:
Score: 9 / 9
Concepts | Mastery | Questions |
Data Management | 100% | · 1 · 2 |
Big Data | 100% | · 3 |
E-Business and E-Commerce | 100% | · 4 · 5 · 6 |
IT Security | 100% | · 7 · 8 · 9 |
Concept: Data Management
Mastery : | 100% | Questions : | · 1 · 2 |
Materials on the concept:
- 5.1. Managing Data
- 5.2. The Database Approach
- 7.2. Business-to-Consumer (B2C) Electronic Commerce
1.
For which reason is it difficult to manage data?
Data are scattered throughout organizations.
The decreasing amount of external data needs to be considered.
The amount of data stays about the same over time.
Data security is easy to maintain
2.
When customers access a website and make purchases, they generate
hyperlink data
information
web data
clickstream data
Concept: Big Data
Mastery : | 100% | Questions : | · 3 |
Materials on the concept:
- 5.1. Managing Data
- 5.2. The Database Approach
3.
Big data is a term used to describe
data generated in an accounting system
the superabundance of data available today
the reduction in the amount of data that organizations are interested in
data elements that are too large to fit in database management systems
Concept: E-Business and E-Commerce
Mastery : | 100% | Questions : | · 4 · 5 · 6 |
Materials on the concept:
- 7.1. Overview of E-Business and E-Commerce
- 7.2. Business-to-Consumer (B2C) Electronic Commerce
4.
In which type of e-commerce are buyers and sellers individuals?
Business-to-consumer
Consumer-to-consumer
Business-to-business
Government-to-citizen
5.
Electronic business does not include which of the following?
Electronically buying and selling
Brick and mortar only retailing
Electronic customer services
Government-to-citizen websites
6.
What is e-commerce called when it is done in a wireless environment?
Mobile commerce
Consumer commerce
Location commerce
Wireless commerce
Concept: IT Security
Mastery : | 100% | Questions : | · 7 · 8 · 9 |
Materials on the concept:
- 4.5. Information Security Controls
- 4.3. Deliberate Threats to Information Systems
- 4.4. What Organizations Are Doing to Protect Information Resources
- 4.1. Introduction to Information Security
7.
Which type of remote software attack does not require user action?
Worm
Virus
Phishing attack
Denial-of service attack
8.
The threats to information security are
staying about the same
increasing
decreasing
not a concern to organizations
9.
Which type of alien software uses your computer to send e-mails that look like they came from you to all the people in your address book?
Spamware
Adware
Cookies
Spyware