BIS 221 Week 2 Knowledge Check

**********************************************************

BIS/221 Entire Course Link

https://uopcourses.com/category/bis-221/

**********************************************************

BIS 221 Week 2 Knowledge Check

Instructions

Week 2 Knowledge Check

The material presented below is not meant to be a comprehensive list of all you need to know in the content area. Rather it is a starting point for building your knowledge and skills. Additional study materials are recommended in each area below to help you master the material.

Personalized Study Guide Results:

Score: 9 / 9

Concepts Mastery Questions

Data Management 100% • 1• 2

Big Data 100% • 3

E-Business and E-Commerce 100% • 4

• 5• 6

IT Security 100% • 7

• 8• 9

Concept: Data Management

Mastery : 100% Questions : • 1• 2

Materials on the concept:

• 5.1. Managing Data

• 5.2. The Database Approach

• 7.2. Business-to-Consumer (B2C) Electronic Commerce

1.

For which reason is it difficult to manage data?

• A.

Data are scattered throughout organizations.

• B.

The decreasing amount of external data needs to be considered.

• C.

The amount of data stays about the same over time.

• D.

Data security is easy to maintain

2.

When customers access a website and make purchases, they generate

• A.

hyperlink data

• B.

information

• C.

web data

• D.

clickstream data

Concept: Big Data

Mastery : 100% Questions : • 3

Materials on the concept:

• 5.1. Managing Data

• 5.2. The Database Approach

3.

Big data is a term used to describe

• A.

data generated in an accounting system

• B.

the superabundance of data available today

• C.

the reduction in the amount of data that organizations are interested in

• D.

data elements that are too large to fit in database management systems

Concept: E-Business and E-Commerce

Mastery : 100% Questions : • 4

• 5• 6

Materials on the concept:

• 7.1. Overview of E-Business and E-Commerce

• 7.2. Business-to-Consumer (B2C) Electronic Commerce

4.

In which type of e-commerce are buyers and sellers individuals?

• A.

Business-to-consumer

• B.

Consumer-to-consumer

• C.

Business-to-business

• D.

Government-to-citizen

5.

Electronic business does not include which of the following?

• A.

Electronically buying and selling

• B.

Brick and mortar only retailing

• C.

Electronic customer services

• D.

Government-to-citizen websites

6.

What is e-commerce called when it is done in a wireless environment?

• A.

Mobile commerce

• B.

Consumer commerce

• C.

Location commerce

• D.

Wireless commerce

Concept: IT Security

Mastery : 100% Questions : • 7

• 8• 9

Materials on the concept:

• 4.5. Information Security Controls

• 4.3. Deliberate Threats to Information Systems

• 4.4. What Organizations Are Doing to Protect Information Resources

• 4.1. Introduction to Information Security

7.

Which type of remote software attack does not require user action?

• A.

Worm

• B.

Virus

• C.

Phishing attack

• D.

Denial-of service attack

8.

The threats to information security are

• A.

staying about the same

• B.

increasing

• C.

decreasing

• D.

not a concern to organizations

9.

Which type of alien software uses your computer to send e-mails that look like they came from you to all the people in your address book?

• A.

Spamware

• B.

Adware

• C.

Cookies

• D.

Spyware
Powered by