Thursday, February 6, 2020

BZ400B Assignment 4.... (2019)

Assignment 04

BZ400 Strategic Information Technology

Directions:  Be sure to make an electronic copy of your answer before submitting it to Ashworth College for grading. Unless otherwise stated, answer in complete sentences, and be sure to use correct English spelling and grammar. Sources must be cited in APA format.Your response should be four (4) double-spaced pages in length; refer to the "Format Requirements" page for specific format requirements.

 

Describe three (3) options for organizational strategy. Provide three (3) examples of companies that follow each of the selected strategies. Provide a description of how three (3) companies used their strategies for competitive advantage. 



 

 

BZ400 Week 6 Threaded Discussion...MIS

How does Transaction Processing Information Systems differ from Management Information Systems? Please insert page numbers in the body of your discussion and a list of References at the end.

 


BZ400 Week 5 Threaded Discussion......computer Ethics

Computer Ethics

Explain the term, ethical behavior. Please provide a real life example of ethical behavior that you have observed either in a personal or professional setting.

BZ400 Week 3 Threaded Discussion....

Discuss a secure Infrastructure in the context of Information Systems, and explain what makes an information system secure and indicate page numbers in the body of your discussion and a list of References at the end.

 


 

BZ400 Lesson 8 Exam SCORE 100 PERCENT......MIS

Question 1
Your company uses a fingerprint recognition system instead of an access card. This helps the company prevent unauthorized physical access. Which of the following technologies is used for authentication here?
Question options:

Biometrics

Passwords

Smart cards

Access-control software
Question 2
Violating data belonging to banks or other financial institutions is a crime in the United States. Which of the following legislations prohibit such violations?
Question options:

The Computer Fraud and Abuse Act

The Foreign Intelligence Surveillance Act

The Banking Rights and Privacy Act

The Patriot Act
Question 3
Which of the following is one of the main federal laws in the United States against computer crimes?
Question options:

Satellite Act of 1962

United States Information and Educational Exchange Act

Trade Expansions Act of 1962

Electronic Communications Privacy Act of 1986
Question 4
Which of the following can typically be filed for a copyright?
Question options:

Music by the Beatles

Google Nexus phone

Amazon's one-click buying

iPhone
Question 5
An organization takes active countermeasures to protect its systems, such as installing firewalls. This approach is known as risk:
Question options:

reduction.

acceptance.

transference.

rescheduling.
Question 6
Which of the following types of plans describes how a business resumes operation after a disaster?
Question options:

Emergency operation plan

Business continuity plan

Internal operations plan

Collocation facilities plan
Question 7
Which of the following US laws amended the Computer Fraud and Abuse Act to allow investigators access to voice-related communications?
Question options:

The Espionage Act

The Patriot Act

The Non-detention Act

The Video Privacy Protection Act
Question 8
A hacker takes an individual's Social Security number, credit card number, and other personal information for the purpose of using the victim's credit rating to run up debts that are never repaid. This practice is called:
Question options:

cyberbullying.

bot herding.

cyberstalking.

identity theft.
Question 9
Controls that are used to assess whether anything went wrong, such as unauthorized access attempts, are called __________ controls.
Question options:

detective

corrective

adaptive

preventive
Question 10
__________ by terrorists refers to the use of the vast amount of information available on the Internet regarding virtually any topic for planning, recruitment, and numerous other endeavors.
Question options:

Information sharing

Data mining

Information dissemination

Location monitoring
Question 11
Albitrex Systems is an Asian software consulting firm which develops solutions for companies in the United States and Europe. The company is heavily dependent on the Internet for transporting data. The company wants to ensure that only authorized users access the data and that the data cannot be intercepted and compromised. Which of the following would be most helpful to the company in achieving this goal?
Question options:

Tunneling

Hot backing up

Open transmitting

Spam filtering
Question 12
Employees steal time on company computers to do personal business. This can be considered as an example of:
Question options:

cyberstalking.

hacking.

unauthorized access.

Web vandalism.
Question 13
An organization builds a fully equipped backup facility, having everything from office chairs to a one-to-one replication of the most current data. This facility is called a:
Question options:

botnet.

firewall.

hot backup site.

buying center.
Question 14
Ciscon Telecom is a mobile operator in the European Union. The company provides personalized services to its customers, and its databases contain valuable information about its customers. The loss of customer information that is used to decide services would be extremely harmful to the organization. Which of the following strategies used by Ciscon is an example of risk transference?
Question options:

The company insures any possible data loss for a large sum.

It enforces a strict employee data policy and prohibits employees from unauthorized access.

The company forms a special team of top executives to monitor and correct the information policies.

It installs a corporate firewall to protect unauthorized access to information.
Question 15
Which of the following laws makes it mandatory for organizations to demonstrate that there are controls in place to prevent misuse or fraud, controls to detect any potential problems, and effective measures to correct any problems?
Question options:

Trade Expansions Act of 1962

Sarbanes-Oxley Act

Electronic Communications Privacy Act of 1986

Central Intelligence Agency Act
Question 16
Which of the following can typically be filed for a patent?
Question options:

Literature

Software

Music

Material inventions
Question 17
With __________, employees may be identified by fingerprints, retinal patterns in the eye, facial features, or other bodily characteristics before being granted access to use a computer or to enter a facility.
Question options:

passwords

biometrics

CAPTCHAs

access-control software
Question 18
Ronald downloads a movie from the Internet onto his company's computer. During this process, his system gets affected by a virus. The virus spreads rapidly in the company's network and causes the server to crash. This type of virus is most likely:
Question options:

spam.

adware.

phishing mail.

a worm.
Question 19
A mass cyber attack occurred in a country when it took severe actions against a group of citizens who protested against the country's religious policies. The attack involved a denial-of-service in which selected sites were bombarded with traffic to force them offline. This is an example of:
Question options:

cyberterrorism.

cyberbullying.

hot backing up.

logic bombing.
Question 20
While adding information to the employee information database, Neil's computer crashed and the entire database on his computer was erased along with it. Which of the following types of virus would have caused Neil's computer to crash?
Question options:

Worm

Spyware

Adware

Logic bomb




BZ400 Lesson 3 Exam SCORE 100 PERCENT

Question 1
A __________ provides a way for different components of software to interact and exchange data or functionality using common Web communication protocols.
Question options:

Web API

tag cloud

Web X3D

static website
Question 2
Social presence tools are also known as __________ tools.
Question options:

social bookmarking

microblogging

videoconferencing

instant chatting
Question 3
__________ sites create social online communities where individuals with a broad and diverse set of interests meet and collaborate.
Question options:

Social cataloging

Social networking

Social bookmarking

Crowdsourcing
Question 4
The term __________ marketing was coined by Harvard business professor Jeffrey Rayport to describe how good marketing techniques can be driven by word-of-mouth or person-to-person communication.
Question options:

affiliate

buzz

stealth

viral
Question 5
The network effect refers to the notion that the value of a network is dependent on the:
Question options:

knowledge of the users.

number of other users.

commitment of the users.

speed of the network.
Question 6
Social bookmarking allows users to share Internet bookmarks and to create categorization systems. These categorization systems are referred to as:
Question options:

geospatial metadata.

tag clouds.

podcasts.

folksonomies.
Question 7
Which of the following statements is true about a content management system?
Question options:

The creation of the goods or services is dependent on the incremental contributions of the participants.

It is the creation of goods or services by self-organizing communities.

It allows the assignment of different roles for different users.

Anyone can help in producing or improving the final outcome of the goods and services.
Question 8
Cloud-based collaboration tools:
Question options:

require users to frequently upgrade their software.

reduce the risk of exposing sensitive corporate data.

have well-documented procedures for system complexities.

allow for easy transferability of documents from one person to another.
Question 9
The __________ Web, originally envisioned by Tim Berners-Lee, one of the founders of the Internet, is a set of design principles that will allow computers to be able to better index websites, topics, and subjects.
Question options:

affiliate

collaborative

folksonomy

semantic
Question 10
__________ takes the concept of companies having used self-employed consultants to work on individual projects or provide content a step further by enabling people to work in more flexible ways on a variety of Internet-related projects.
Question options:

E-auction

E-lancing

E-filing

E-tailing
Question 11
Which of the following statements is true about a discussion forum?
Question options:

It started out as a novice's way of expressing himself using very simple Web pages.

It is dedicated to a specific topic, and users can start new threads.

It is the process of creating an online text diary made up of chronological entries that comment on everything.

It is a widely used synchronous groupware tool.
Question 12
An electronic __________ is essentially a collection of personal computers networked together with sophisticated software tools to help group members solve problems and make decisions through interactive electronic idea generation, evaluation, and voting.
Question options:

data interchange

meeting system

fund transfer

folksonomy
Question 13
__________ attempts to increase the relevance of search results by including content from blogs and microblogging services.
Question options:

Metasearch

OpenSearch

Social search

Enterprise search
Question 14
Which of the following statements is true about peer production?
Question options:

It is also known as enterprise content systems.

The creator is responsible for publishing new information.

Only editors have the right to develop new content.

Anyone can help in producing or improving the final outcome.
Question 15
Which of the following facilitates real-time written conversations?
Question options:

Status updates

Blogs

Discussion forums

Instant messaging
Question 16
Which of the following benefits of groupware enables many people to speak and listen at the same time?
Question options:

Parallelism

Anonymity

Group memory

Process structuring
Question 17
__________ is a phenomenon where companies use everyday people as a cheap labor force.
Question options:

Crowdsourcing

Nearshoring

Narrowcasting

Phishing
Question 18
__________ refers to manually adding metadata to media or other content.
Question options:

Tagging

Podcasting

Phishing

Crowdsourcing
Question 19
Which of the following is a consequence of the use of social software?
Question options:

People have increased purchasing power.

People are using environmentally-friendly products.

People are sharing more personal information online.

People are using encyclopedias as sources of unbiased information.
Question 20
Which of the following is a collaboration management tool that is used to facilitate virtual or collocated meetings?
Question options:

Intranets

Blogs

Video conferencing

Internet forums



BZ400 Lesson 2 Exam SCORE 95 PERCENT

Question 1
In the __________ stage of business-to-consumer electronic commerce, dissemination of promotional and marketing material, like providing electronic brochures, takes place.
Question options:

e-transaction

e-subscription

e-information

e-integration
Question 2
With respect to typical revenue models for electronic commerce businesses, Symantec and Norton are using a(n) __________ revenue model.
Question options:

licensing

brokerage

subscription

affiliate marketing
Question 3
A way to ensure that a company's site is on the first page users see when looking for a specific term is using __________ advertising.
Question options:

search

viral

buzz

stealth
Question 4
E-filing is an example of a __________ tool.
Question options:

government-to-government

consumer-to-consumer

government-to-citizen

consumer-to-business
Question 5
Which of the following is a disadvantage of e-tailing?
Question options:

It requires additional time for products to be delivered.

It is limited by physical store and shelf space restrictions.

It complicates the process of comparison shopping.

It restricts companies to effectively compete on price.
Question 6
In grid computing, the slowest computer creates a bottleneck and slows down the entire grid. A(n) __________ grid, consisting of a large number of computers, can help overcome these problems.
Question options:

dedicated

trusted

edged

clustered
Question 7
Which of the following statements is true about the platform as a service model?
Question options:

The customer is provided with the basic capabilities of processing, storage, and networking.

Only the basic capabilities of processing, storage, and networking are provided.

The customer has no knowledge or control over the underlying infrastructure and has only limited ability to control or configure application-specific settings.

The customer can run his or her own applications that are typically designed using tools provided by the service provider.
Question 8
The suffix ".org" is reserved for:
Question options:

educational institutions.

non-profit organizations.

commercial organizations.

governmental entities.
Question 9
The protocol used by the Internet is called the:
Question options:

Dynamic Host Configuration Protocol (DHCP).

Transmission Control Protocol (TCP).

Address Resolution Protocol (ARP).

Trivial File Transfer Protocol (TFTP).
Question 10
Which of the following is likely to have the suffix ".edu" after the domain name in its URL?
Question options:

Harvard Business School

The Federal Reserve

UNICEF

Yahoo!
Question 11
EZBiz, the brainchild of three college friends, is a startup venture which plans to produce and market sports gear. They are currently trying to decide between a bricks-and-clicks strategy and a click-only strategy. Which of the following, if true, would most undermine the decision to adopt a click-only strategy?
Question options:

The public is wary of sharing confidential information after a recent spate of credit card scandals.

Several companies who have switched from brick-and-mortar strategy to a click-only are experiencing severe channel conflicts.

The company has limited access to funds and is looking to keep its costs low.

A competitor is facing severe backlash after inadvertently releasing sensitive data into the public domain.
Question 12
With regard to the World Wide Web, Web pages are stored on Web:
Question options:

consortiums.

rings.

servers.

consoles.
Question 13
Under the __________ computing model, organizations "rent" resources such as processing, data storage, or networking from an external provider on an as-needed basis and pay only for the services used.
Question options:

grid

distributed

cluster

utility
Question 14
Which of the following statements is true about electronic commerce?
Question options:

Business-to-business is by far the largest form of electronic commerce in terms of revenues.

All forms of electronic commerce involve business firms.

Electronic commerce is limited to transactions between businesses and consumers.

Electronic commerce between businesses and their employees is impossible.
Question 15
Provoking bidders to leave a legitimate auction to buy the same item at a lower price outside the auction space, where return policies and buyer protection do not apply, is called:
Question options:

bid luring.

bid shielding.

bid skimming.

rafter bidding.
Question 16
Manufacturers of hardware and software often apply the concept of planned obsolescence, meaning that the:
Question options:

product is designed to avoid obsolescence.

product is designed in such a way as to extend its life span.

product is designed to last only for a certain life span.

companies have already decided when to launch their next product.
Question 17
Which of the following statements is true about servers?
Question options:

They are optimized for visualization and rendering of three-dimensional models.

They are used to provide services to users within large organizations or to Web users.

They are used primarily to assist in solving massive scientific problems.

They are primarily used as the main, central computing system for major corporations.
Question 18
Which of the following occurred in the 1946-1958 generation of computing?
Question options:

The internetworking era ended.

The mainframe era began.

The mainframe era ended and the personal computer era began.

The interpersonal computing era ended and the internetworking era began.
Question 19
Within the context of different types of e-auction fraud, bid shielding is sometimes called:
Question options:

reverse bidding.

bid skimming.

shill bidding.

bid luring.
Question 20
__________ is used to transmit voice and video communication over the Internet.
Question options:

Edge computing

IP routing

Distributed computing

IP convergence




H400 Thesis Revised

Requirement: Write a double-spaced, one-page outline that includes the thesis, major points, supporting points of evidence, and conclusio...