BIS 221 Week 2 Knowledge Check

**********************************************
BIS 221 Entire Course Link
 https://uopcourses.com/category/bis-221/
**********************************************
BIS 221 Week 2 Knowledge Check Week 2 Knowledge Check The material presented below is not meant to be a comprehensive list of all you need to know in the content area. Rather it is a starting point for building your knowledge and skills. Additional study materials are recommended in each area below to help you master the material. Personalized Study Guide Results:  Score: 9 / 9 Concepts Mastery Questions Data Management 100% ·         1 ·         2 Big Data 100% ·         3 E-Business and E-Commerce 100% ·         4 ·         5 ·         6 IT Security 100% ·         7 ·         8 ·         9 Concept: Data Management Mastery : 100% Questions : ·         1 ·         2 Materials on the concept:
  • 5.1. Managing Data
  • 5.2. The Database Approach
  • 7.2. Business-to-Consumer (B2C) Electronic Commerce
1. For which reason is it difficult to manage data? ·         A. Data are scattered throughout organizations. ·         B. The decreasing amount of external data needs to be considered. ·         C. The amount of data stays about the same over time. ·         D. Data security is easy to maintain 2. When customers access a website and make purchases, they generate ·         A. hyperlink data ·         B. information ·         C. web data ·         D. clickstream data Concept: Big Data Mastery : 100% Questions : ·         3 Materials on the concept:
  • 5.1. Managing Data
  • 5.2. The Database Approach
3. Big data is a term used to describe ·         A. data generated in an accounting system ·         B. the superabundance of data available today ·         C. the reduction in the amount of data that organizations are interested in ·         D. data elements that are too large to fit in database management systems Concept: E-Business and E-Commerce Mastery : 100% Questions : ·         4 ·         5 ·         6 Materials on the concept:
  • 7.1. Overview of E-Business and E-Commerce
  • 7.2. Business-to-Consumer (B2C) Electronic Commerce
4. In which type of e-commerce are buyers and sellers individuals? ·         A. Business-to-consumer ·         B. Consumer-to-consumer ·         C. Business-to-business ·         D. Government-to-citizen 5. Electronic business does not include which of the following? ·         A. Electronically buying and selling ·         B. Brick and mortar only retailing ·         C. Electronic customer services ·         D. Government-to-citizen websites 6. What is e-commerce called when it is done in a wireless environment? ·         A. Mobile commerce ·         B. Consumer commerce ·         C. Location commerce ·         D. Wireless commerce Concept: IT Security Mastery : 100% Questions : ·         7 ·         8 ·         9 Materials on the concept:
  • 4.5. Information Security Controls
  • 4.3. Deliberate Threats to Information Systems
  • 4.4. What Organizations Are Doing to Protect Information Resources
  • 4.1. Introduction to Information Security
7. Which type of remote software attack does not require user action? ·         A. Worm ·         B. Virus ·         C. Phishing attack ·         D. Denial-of service attack 8. The threats to information security are ·         A. staying about the same ·         B. increasing ·         C. decreasing ·         D. not a concern to organizations 9. Which type of alien software uses your computer to send e-mails that look like they came from you to all the people in your address book? ·         A. Spamware ·         B. Adware ·         C. Cookies ·         D. Spyware