BIS 221 Week 2 Knowledge Check

**********************************************
BIS 221 Entire Course Link
 https://uopcourses.com/category/bis-221/
**********************************************
BIS 221 Week 2 Knowledge Check

Week
2 Knowledge Check

The material presented below is not
meant to be a comprehensive list of all you need to know in the content area.
Rather it is a starting point for building your knowledge and skills.
Additional study materials are recommended in each area below to help you
master the material.

Personalized
Study Guide Results: 

Score: 9 / 9





Concepts


Mastery


Questions





Data
Management


100%


·        
1
·        
2




Big Data


100%


·        
3




E-Business
and E-Commerce


100%


·        
4
·        
5
·        
6




IT Security


100%


·        
7
·        
8
·        
9




Concept: Data
Management




Mastery :


100%


Questions :


·        
1
·        
2




Materials on the concept:


  • 5.1. Managing Data

  • 5.2. The Database Approach

  • 7.2. Business-to-Consumer (B2C) Electronic Commerce





1.

For
which reason is it difficult to manage data?

·        
A.

Data
are scattered throughout organizations.

·        
B.

The
decreasing amount of external data needs to be considered.

·        
C.

The
amount of data stays about the same over time.

·        
D.

Data
security is easy to maintain





2.

When
customers access a website and make purchases, they generate

·        
A.

hyperlink
data

·        
B.

information

·        
C.

web
data

·        
D.

clickstream
data



Concept: Big Data




Mastery :


100%


Questions :


·        
3




Materials on the concept:


  • 5.1. Managing Data

  • 5.2. The Database Approach





3.

Big
data is a term used to describe

·        
A.

data
generated in an accounting system

·        
B.

the
superabundance of data available today

·        
C.

the
reduction in the amount of data that organizations are interested in

·        
D.

data
elements that are too large to fit in database management systems



Concept: E-Business
and E-Commerce




Mastery :


100%


Questions :


·        
4
·        
5
·        
6




Materials on the concept:


  • 7.1. Overview of E-Business and E-Commerce

  • 7.2. Business-to-Consumer (B2C) Electronic Commerce





4.

In
which type of e-commerce are buyers and sellers individuals?

·        
A.

Business-to-consumer

·        
B.

Consumer-to-consumer

·        
C.

Business-to-business

·        
D.

Government-to-citizen





5.

Electronic
business does not include which of the following?

·        
A.

Electronically
buying and selling

·        
B.

Brick
and mortar only retailing

·        
C.

Electronic
customer services

·        
D.

Government-to-citizen
websites





6.

What
is e-commerce called when it is done in a wireless environment?

·        
A.

Mobile
commerce

·        
B.

Consumer
commerce

·        
C.

Location
commerce

·        
D.

Wireless
commerce



Concept: IT
Security




Mastery :


100%


Questions :


·        
7
·        
8
·        
9




Materials on the concept:


  • 4.5. Information Security Controls

  • 4.3. Deliberate Threats to Information Systems

  • 4.4. What Organizations Are Doing to Protect Information Resources

  • 4.1. Introduction to Information Security





7.

Which
type of remote software attack does not require user action?

·        
A.

Worm

·        
B.

Virus

·        
C.

Phishing
attack

·        
D.

Denial-of
service attack





8.

The
threats to information security are

·        
A.

staying
about the same

·        
B.

increasing

·        
C.

decreasing

·        
D.

not
a concern to organizations





9.

Which
type of alien software uses your computer to send e-mails that look like they
came from you to all the people in your address book?

·        
A.

Spamware

·        
B.

Adware

·        
C.

Cookies

·        
D.

Spyware

Powered by