Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

COMM 226 EXAM 2025 | ALL QUESTIONS AND CORRECT ANSWERS | GRADED A+ | VERIFIED ANSWERS, Exams of Information Technology

COMM 226 EXAM 2025 | ALL QUESTIONS AND CORRECT ANSWERS | GRADED A+ | VERIFIED ANSWERS | LATEST VERSION

Typology: Exams

2024/2025

Available from 06/28/2025

rex-smith-1
rex-smith-1 🇺🇸

749 documents

1 / 70

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
COMM 226 EXAM 2025 | ALL QUESTIONS AND
CORRECT ANSWERS | GRADED A+ | VERIFIED
ANSWERS | LATEST VERSION
What is ambient AI and how does it work? ---------CORRECT ANSWER-----
------------Ambient AI is an always-on system that responds to natural inputs
like voice and gestures using sensors embedded in various devices.
What is information systems security? ---------CORRECT ANSWER-----------
------Information systems security is the process of preventing unauthorized
access to an IS or modification of its data. This includes protecting against
threats like hackers, malware, and human errors. Example: A company
uses firewalls, encryption, and strong authentication methods to protect its
data from cyberattacks.
What are the major trade-offs in information security? ---------CORRECT
ANSWER-----------------The major trade-offs in information security are:
1. **Security vs. Cost**: Implementing stronger security measures
increases costs. Example: Installing advanced intrusion detection systems
can be expensive.
2. **Security vs. Convenience**: Stronger security often reduces user
convenience. Example: Two-factor authentication adds an extra step to
logging in, which can be inconvenient but enhances security.
Define threat in the context of IS security. Provide an example. ---------
CORRECT ANSWER-----------------A threat is a person or organization that
seeks to obtain or alter data or other assets illegally, without the owner's
permission and often without the owner's knowledge.
Example: A hacker attempting to steal customer credit card data from an e-
commerce website.
pf3
pf4
pf5
pf8
pf9
pfa
pfd
pfe
pff
pf12
pf13
pf14
pf15
pf16
pf17
pf18
pf19
pf1a
pf1b
pf1c
pf1d
pf1e
pf1f
pf20
pf21
pf22
pf23
pf24
pf25
pf26
pf27
pf28
pf29
pf2a
pf2b
pf2c
pf2d
pf2e
pf2f
pf30
pf31
pf32
pf33
pf34
pf35
pf36
pf37
pf38
pf39
pf3a
pf3b
pf3c
pf3d
pf3e
pf3f
pf40
pf41
pf42
pf43
pf44
pf45
pf46

Partial preview of the text

Download COMM 226 EXAM 2025 | ALL QUESTIONS AND CORRECT ANSWERS | GRADED A+ | VERIFIED ANSWERS and more Exams Information Technology in PDF only on Docsity!

COMM 226 EXAM 2025 | ALL QUESTIONS AND

CORRECT ANSWERS | GRADED A+ | VERIFIED

ANSWERS | LATEST VERSION

What is ambient AI and how does it work? ---------CORRECT ANSWER----- ------------Ambient AI is an always-on system that responds to natural inputs like voice and gestures using sensors embedded in various devices. What is information systems security? ---------CORRECT ANSWER----------- ------Information systems security is the process of preventing unauthorized access to an IS or modification of its data. This includes protecting against threats like hackers, malware, and human errors. Example: A company uses firewalls, encryption, and strong authentication methods to protect its data from cyberattacks. What are the major trade-offs in information security? ---------CORRECT ANSWER-----------------The major trade-offs in information security are:

  1. Security vs. Cost: Implementing stronger security measures increases costs. Example: Installing advanced intrusion detection systems can be expensive.
  2. Security vs. Convenience: Stronger security often reduces user convenience. Example: Two-factor authentication adds an extra step to logging in, which can be inconvenient but enhances security. Define threat in the context of IS security. Provide an example. --------- CORRECT ANSWER-----------------A threat is a person or organization that seeks to obtain or alter data or other assets illegally, without the owner's permission and often without the owner's knowledge. Example: A hacker attempting to steal customer credit card data from an e- commerce website.

What is a vulnerability? Provide an example. ---------CORRECT ANSWER-- ---------------A vulnerability is a weakness in an IS that provides an opportunity for threats to gain access to assets. Example: An outdated software system that hasn't been patched, making it susceptible to malware attacks. What is a safeguard? Provide an example. ---------CORRECT ANSWER----- ------------A safeguard is a measure taken to block a threat from obtaining the asset. Example: Using encryption to protect sensitive customer data during transmission over the internet. What is a target in IS security? Provide an example. ---------CORRECT ANSWER-----------------A target is the asset that is desired by the threat. Example: A company's customer database containing personal and payment information is a target for cybercriminals. Define risk in IS security and provide an example. ---------CORRECT ANSWER-----------------Risk is the chance of loss, which combines the likelihood of a threat occurring and the potential value of the loss. Example: If a company stores sensitive data without encryption, the risk of data theft (high likelihood) and the loss of customer trust (high value) is significant. What is GDPR and why is it important? ---------CORRECT ANSWER--------- --------The General Data Protection Regulation (GDPR) is a European Union law governing the collection, processing, and transfer of personal data. It ensures data privacy and protection for individuals.

Explain a man-in-the-middle attack with an example. ---------CORRECT ANSWER-----------------A man-in-the-middle (MITM) attack occurs when an attacker intercepts communication between two parties. Example: An attacker intercepts login credentials by spoofing a Wi-Fi network at a coffee shop. What is a firewall and how does it work? ---------CORRECT ANSWER-------- ---------A firewall is a security system that monitors and controls incoming and outgoing network traffic. Example: A company's firewall blocks unauthorized traffic from reaching its internal network. What is encryption? Differentiate between symmetric and asymmetric encryption. ---------CORRECT ANSWER-----------------Encryption transforms readable data into coded text to protect it.

  • Symmetric Encryption: Uses the same key to encrypt and decrypt. Example: AES encryption.
  • Asymmetric Encryption: Uses a public key to encrypt and a private key to decrypt. Example: RSA encryption. What is a smart card and how is it used for authentication? --------- CORRECT ANSWER-----------------A smart card is a card with a microchip that stores authentication data. Users insert the card and enter a PIN to authenticate. Example: Accessing a secure office building using a smart card and PIN. What is hashing in authentication? Why is it important? ---------CORRECT ANSWER-----------------Hashing converts input data into a fixed-length string of characters (a hash). It is one-way and irreversible.

Importance: Hashing securely stores passwords so that even if a database is breached, the passwords are not exposed. Why is information security difficult? ---------CORRECT ANSWER------------- ----Information security is challenging because:

  1. Attackers don't follow rules.
  2. Data is designed to be shared.
  3. Technology evolves rapidly.
  4. Security depends on all users following best practices. Example: A weak password by one employee can compromise an entire system. What is a security audit and what does it evaluate? ---------CORRECT ANSWER-----------------A security audit systematically evaluates security safeguards to ensure they meet criteria. Example: Checking if employee mobile devices use encryption and updated passwords. What are the characteristics of a strong password? ---------CORRECT ANSWER-----------------A strong password is at least 12-16 characters long and includes:
  • Uppercase and lowercase letters
  • Numbers
  • Special characters (e.g., !, @, #, $) Avoid common words, personal information, or sequences like '1234'. Why is it important to use different passwords for different accounts? --------
  • CORRECT ANSWER-----------------Using different passwords for different accounts ensures that if one password is compromised, your other accounts remain secure.

What are the key aspects of the Information Age? ---------CORRECT ANSWER-----------------The Information Age is defined by the global production, distribution, and control of information. Two aspects are: 1) A flat global world, where everyone is interconnected and has access to IT resources, and 2) The need for businesses to adapt quickly to survive in a rapidly changing environment. What is the definition of job security according to the text, and how can this course help you achieve it? ---------CORRECT ANSWER-----------------Job security comes from possessing marketable skills and the courage to use them. The course helps develop key skills such as adapting to technology, abstract reasoning, systems thinking, collaboration, and the ability to experiment. What are the four key skills for job security according to Robert Reich? ----- ----CORRECT ANSWER-----------------1) Abstract reasoning: the ability to manipulate models and ideas logically.

  1. Systems thinking: seeing the whole system and understanding the connections.
  2. Collaboration: working effectively with others.
  3. Ability to experiment: analyzing opportunities and developing promising solutions. What is MIS and what does it aim to achieve? ---------CORRECT ANSWER-----------------MIS (Management Information Systems) involves creating, monitoring, and adapting processes, information systems, and information to help organizations achieve their strategies.

What are business processes, information systems, and information? ------- --CORRECT ANSWER-----------------A business process is a way of doing something; an information system is a collection of components that store, retrieve, and process data; and information is meaningful insight that helps employees perform their jobs. Why is it important for all businesspeople, not just MIS professionals, to understand the creation, monitoring, and adapting of systems? --------- CORRECT ANSWER-----------------All businesspeople must be involved in specifying requirements and managing projects to ensure systems and processes meet the needs of the business strategy. What are the five competitive forces that determine industry structure? ------ ---CORRECT ANSWER-----------------1) Threat of substitutes

  1. Threat of new entrants
  2. Existing rivals
  3. Bargaining power of suppliers
  4. Bargaining power of customers What are the four competitive strategies defined by Porter? --------- CORRECT ANSWER-----------------1) Cost leadership
  5. Differentiation
  6. Cost focus
  7. Focused differentiation What is the relationship between a value chain and business processes? --
  • ------CORRECT ANSWER-----------------A value chain is a network of value- creating activities. Business processes are designed to span value- generating activities within this chain and are critical to achieving competitive strategy.

adapt processes, information systems, and information to meet strategic business objectives. It ensures that the business's technology infrastructure is aligned with and supports the goals of the organization. What is the difference between business processes and information systems? ---------CORRECT ANSWER-----------------A business process refers to a specific way of doing something in an organization, while an information system is a set of tools and technologies used to store, process, and manage data to support business processes. How does the "flat" global world concept impact businesses in the Information Age? ---------CORRECT ANSWER-----------------The flat world means that technological access and communication are no longer restricted by geographic boundaries, allowing businesses to operate globally. This creates opportunities for global collaboration and competition but also means companies must adapt rapidly to avoid being outpaced by competitors. Why is it necessary for businesses to focus on competitive strategy when designing information systems? ---------CORRECT ANSWER----------------- Information systems should support the specific competitive strategy of the business. A mismatch between business goals and technology can lead to inefficiencies and missed opportunities, so aligning technology with strategy is essential for success. How do "linkages" in a value chain reduce costs? ---------CORRECT ANSWER-----------------Linkages involve connecting activities across the value chain to optimize efficiency. For example, sales forecasts can influence production planning, which in turn influences inventory management, thus reducing waste and improving cost efficiency.

What is the concept of "value" in the value chain, and how does it impact the cost-benefit analysis of business activities? ---------CORRECT ANSWER-----------------Value refers to the amount of money customers are willing to pay for a product or service. Businesses use this concept to evaluate which activities add value and should be pursued, and which activities may incur unnecessary costs without generating sufficient value. How do the concepts of "substitute" and "switching cost" affect the bargaining power of customers in the five forces model? ---------CORRECT ANSWER-----------------A substitute offers similar benefits at a potentially lower price, increasing customer bargaining power. High switching costs, however, reduce this power by making it harder for customers to switch to competitors. Define a business process and explain how businesses compete using processes. ---------CORRECT ANSWER-----------------A business process is a sequence of activities designed to achieve a specific function or goal. Like sports teams, businesses compete using well-defined processes that enable them to perform consistently and efficiently. Examples include order fulfillment, hiring processes, and customer service. What are two examples of business processes not mentioned in the text? -- -------CORRECT ANSWER------------------ Adding a class to the university curriculum: This process involves reviewing course proposals, aligning with department standards, and obtaining approval.

  • Assigning a class to a classroom: Involves scheduling, ensuring classroom availability, and coordinating with instructors. Define an activity within a business process and give examples. --------- CORRECT ANSWER-----------------An activity is a task within a business process that must be completed to move the process forward.

on a computer). Use external documentation for complex activities when needed. Describe four reasons why organizations standardize business processes. ---------CORRECT ANSWER-----------------Standardizing processes ensures:

  • Efficiency: Reduces redundancy and streamlines operations.
  • Consistency: Ensures processes are performed the same way every time.
  • Quality control: Maintains uniform product or service quality.
  • Scalability: Easier to train employees and scale operations What are the five components of an information system and how do they work together? ---------CORRECT ANSWER-----------------The five components are:
  1. Hardware: Physical devices like computers, servers, and input/output devices.
  2. Software: Programs or applications used to process data and perform tasks.
  3. Data: Facts or figures that are analyzed to generate information.
  4. Procedures: Instructions or guidelines for users to follow when operating the system.
  5. People: Users and IT staff involved in managing and using the system. How does an information system support a business process in real life? --- ------CORRECT ANSWER-----------------An information system (IS) supports business processes by automating tasks, managing data, and providing tools for analysis and decision-making. For example, an IS can help you buy tickets, check in at the airport, and track your flight. Describe structured processes and give examples. ---------CORRECT ANSWER-----------------Structured processes are well-defined, routine activities with set procedures and limited variation. Examples include payroll processing, inventory management, and scheduling work shifts.

Describe dynamic processes and give examples. ---------CORRECT ANSWER-----------------Dynamic processes are flexible, less predictable, and adapt based on changing circumstances. Examples include deciding whether to expand business operations or resolving customer service issues. How does employee behavior vary in structured versus dynamic processes? ---------CORRECT ANSWER-----------------In structured processes, employees follow predefined instructions and procedures, leading to predictable outcomes. In dynamic processes, employees are expected to use judgment, problem-solving skills, and flexibility to adapt to changing situations. Define information and provide an example for each of the 4 definitions. ---- -----CORRECT ANSWER-----------------1. Knowledge derived from data: e.g., understanding market trends from sales data.

  1. Data presented in a meaningful context: e.g., a sales report showing daily revenue.
  2. Processed data: e.g., an average of monthly sales figures.
  3. A difference that makes a difference: e.g., adjusting speed based on the difference between your speed and the speed limit. Where does information exist, and where does data exist? --------- CORRECT ANSWER-----------------Data exists in physical forms (e.g., paper, digital screens) while information exists in the mind, where it is understood and interpreted. Summarize the five critical characteristics of data. ---------CORRECT ANSWER-----------------The five critical data characteristics are:

What is the Internet? ---------CORRECT ANSWER-----------------The Internet is a global network that connects LANs, WANs, and other internets. The public Internet connects millions of networks worldwide, and private internets (called intranets) are often used within organizations to keep their networks isolated and secure. How do you connect a LAN to the Internet? ---------CORRECT ANSWER---- -------------A LAN connects to the Internet through an Internet Service Provider (ISP), which assigns a legitimate IP address, provides gateway services for communication, and helps manage traffic to/from the Internet. What is Bluetooth? ---------CORRECT ANSWER-----------------Bluetooth is a wireless technology used to connect devices over short distances (typically within 30 feet). It's commonly used for connecting devices like wireless headphones, mice, keyboards, and syncing devices like smartphones to car audio systems. What is Wi-Fi? ---------CORRECT ANSWER-----------------Wi-Fi allows devices to connect wirelessly to a Local Area Network (LAN) and is used for Internet access in homes, businesses, and public spaces. It operates over short to medium distances (up to 100 feet) using IEEE 802. protocols. What is Cellular Network? ---------CORRECT ANSWER-----------------A cellular network (or mobile network) is a wireless communication system that connects mobile devices to the Internet and other services using radio waves. It is divided into cells, each served by a base station (cell tower), and it uses frequencies to communicate with mobile users.

What are the four generations of cellular networks? ---------CORRECT ANSWER-----------------1G: Analog network that supported only voice calls. 2G: Digital network that allowed voice calls, texts, and limited data services (e.g., SMS). 3G: Provided faster data speeds, enabling mobile internet access and video calling. 4G: High-speed internet access for mobile devices, supporting streaming, gaming, and advanced services like HD video calls. 5G: The next generation, offering ultra-fast internet speeds, low latency, and the ability to support billions of connected devices (e.g., IoT). What is the Internet of Things (IoT)? ---------CORRECT ANSWER------------- ----The Internet of Things (IoT) refers to the network of physical devices (e.g., cars, thermostats, wearables) that are connected to the Internet and share data with each other. These devices collect and exchange data to improve efficiency, convenience, and safety. What is a protocol? ---------CORRECT ANSWER-----------------A protocol is a set of rules that govern how data is transmitted and received between devices. Examples include:

  • HTTP/HTTPS: Used for communication between browsers and web servers.
  • FTP: Used to transfer files over the Internet.
  • SMTP: Used for sending email messages.
  • IP: Defines the addressing system for devices on the Internet. What is an IP address? ---------CORRECT ANSWER-----------------An IP address is a unique number assigned to every device connected to the Internet. It can be either public (for Internet-facing devices) or private (for devices within a local network). IPv4: 32 - bit address (e.g., 192.168.1.1). IPv6: 128-bit address, providing a much larger address space to accommodate the growing number of devices.

those requests, and serves the corresponding Web pages (HTML, CSS, etc.) to the client's browser. What is cloud computing? ---------CORRECT ANSWER-----------------Cloud computing refers to renting IT resources (servers, storage, applications) over the Internet. The cloud is "elastic," meaning resources can be scaled up or down based on demand, providing cost savings and flexibility. What is IaaS? ---------CORRECT ANSWER-----------------A type of cloud hosting: Infrastructure as a Service (IaaS) provides basic computing resources (e.g., virtual machines, storage) on-demand over the Internet. Amazon AWS is an example of IaaS. What is PaaS? ---------CORRECT ANSWER-----------------A type of cloud hosting: Platform as a Service (PaaS) provides an environment to develop, test, and deploy applications without managing the underlying hardware. An example is Microsoft Azure. What is SaaS? ---------CORRECT ANSWER-----------------A type of cloud hosting: Software as a Service (SaaS) delivers complete software applications over the Internet. Examples include Google Apps and Microsoft 365. What is a private cloud? ---------CORRECT ANSWER-----------------A private cloud is a cloud infrastructure used exclusively by one organization. Unlike public clouds, the resources are not shared with other users, and the organization has full control over the infrastructure.

What is the purpose of a database? ---------CORRECT ANSWER-------------- ---The primary purpose of a database is to keep track of things. It stores data efficiently so that it can be accessed, modified, and managed as needed, especially for large sets of data. When is a database preferred over a spreadsheet? ---------CORRECT ANSWER-----------------A database is preferred when the data involves multiple themes and needs to be related across tables. While a spreadsheet can handle lists with a single theme (e.g., a list of names), a database can handle more complex data with relationships, such as customer orders, inventory, and product details across multiple tables. Define a database. ---------CORRECT ANSWER-----------------A database is a collection of integrated records, which includes multiple tables, relationships among rows in those tables, and metadata that describes the database structure. It allows for efficient data storage, retrieval, and manipulation. What are the three elements of a database hierarchy? ---------CORRECT ANSWER------------------ Byte: A single character of data (e.g., a letter or number).

  • Column (Field): A grouping of bytes that represent a specific attribute or property (e.g., "Customer Name").
  • Row (Record): A group of related columns (e.g., one row contains all details about one customer).
  • A collection of rows is called a table or file. What is the definition of metadata? ---------CORRECT ANSWER--------------- --Metadata is data that describes other data. It provides information about the structure of the data, such as the name and type of each field in a table, and helps define relationships between tables. An example is the header row in a database table that describes the data in each column.