BIS 221 Week 2 Knowledge Check

0 items
BIS 221 Week 2 Knowledge Check
BIS 221 Week 2 Knowledge Check
$6.99
Year: 2016
  • Description

BIS 221 Week 2 Knowledge Check

Week 2 Knowledge Check

The material presented below is not meant to be a comprehensive list of all you need to know in the content area. Rather it is a starting point for building your knowledge and skills. Additional study materials are recommended in each area below to help you master the material.

Personalized Study Guide Results:

Score: 9 / 9

ConceptsMasteryQuestions
Data Management100%·         1

·         2

Big Data100%·         3
E-Business and E-Commerce100%·         4

·         5

·         6

IT Security100%·         7

·         8

·         9

Concept: Data Management

Mastery :100%Questions :·         1

·         2

Materials on the concept:

  • 5.1. Managing Data
  • 5.2. The Database Approach
  • 7.2. Business-to-Consumer (B2C) Electronic Commerce

1.

For which reason is it difficult to manage data?

Data are scattered throughout organizations.

The decreasing amount of external data needs to be considered.

The amount of data stays about the same over time.

Data security is easy to maintain

2.

When customers access a website and make purchases, they generate

hyperlink data

information

web data

clickstream data

Concept: Big Data

Mastery :100%Questions :·         3

Materials on the concept:

  • 5.1. Managing Data
  • 5.2. The Database Approach

3.

Big data is a term used to describe

data generated in an accounting system

the superabundance of data available today

the reduction in the amount of data that organizations are interested in

data elements that are too large to fit in database management systems

Concept: E-Business and E-Commerce

Mastery :100%Questions :·         4

·         5

·         6

Materials on the concept:

  • 7.1. Overview of E-Business and E-Commerce
  • 7.2. Business-to-Consumer (B2C) Electronic Commerce

4.

In which type of e-commerce are buyers and sellers individuals?

Business-to-consumer

Consumer-to-consumer

Business-to-business

Government-to-citizen

5.

Electronic business does not include which of the following?

Electronically buying and selling

Brick and mortar only retailing

Electronic customer services

Government-to-citizen websites

6.

What is e-commerce called when it is done in a wireless environment?

Mobile commerce

Consumer commerce

Location commerce

Wireless commerce

Concept: IT Security

Mastery :100%Questions :·         7

·         8

·         9

Materials on the concept:

  • 4.5. Information Security Controls
  • 4.3. Deliberate Threats to Information Systems
  • 4.4. What Organizations Are Doing to Protect Information Resources
  • 4.1. Introduction to Information Security

7.

Which type of remote software attack does not require user action?

Worm

Virus

Phishing attack

Denial-of service attack

8.

The threats to information security are

staying about the same

increasing

decreasing

not a concern to organizations

9.

Which type of alien software uses your computer to send e-mails that look like they came from you to all the people in your address book?

Spamware

Adware

Cookies

Spyware