






























































Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
COMM 226 EXAM 2025 | ALL QUESTIONS AND CORRECT ANSWERS | GRADED A+ | VERIFIED ANSWERS | LATEST VERSION
Typology: Exams
1 / 70
This page cannot be seen from the preview
Don't miss anything!
What is ambient AI and how does it work? ---------CORRECT ANSWER----- ------------Ambient AI is an always-on system that responds to natural inputs like voice and gestures using sensors embedded in various devices. What is information systems security? ---------CORRECT ANSWER----------- ------Information systems security is the process of preventing unauthorized access to an IS or modification of its data. This includes protecting against threats like hackers, malware, and human errors. Example: A company uses firewalls, encryption, and strong authentication methods to protect its data from cyberattacks. What are the major trade-offs in information security? ---------CORRECT ANSWER-----------------The major trade-offs in information security are:
What is a vulnerability? Provide an example. ---------CORRECT ANSWER-- ---------------A vulnerability is a weakness in an IS that provides an opportunity for threats to gain access to assets. Example: An outdated software system that hasn't been patched, making it susceptible to malware attacks. What is a safeguard? Provide an example. ---------CORRECT ANSWER----- ------------A safeguard is a measure taken to block a threat from obtaining the asset. Example: Using encryption to protect sensitive customer data during transmission over the internet. What is a target in IS security? Provide an example. ---------CORRECT ANSWER-----------------A target is the asset that is desired by the threat. Example: A company's customer database containing personal and payment information is a target for cybercriminals. Define risk in IS security and provide an example. ---------CORRECT ANSWER-----------------Risk is the chance of loss, which combines the likelihood of a threat occurring and the potential value of the loss. Example: If a company stores sensitive data without encryption, the risk of data theft (high likelihood) and the loss of customer trust (high value) is significant. What is GDPR and why is it important? ---------CORRECT ANSWER--------- --------The General Data Protection Regulation (GDPR) is a European Union law governing the collection, processing, and transfer of personal data. It ensures data privacy and protection for individuals.
Explain a man-in-the-middle attack with an example. ---------CORRECT ANSWER-----------------A man-in-the-middle (MITM) attack occurs when an attacker intercepts communication between two parties. Example: An attacker intercepts login credentials by spoofing a Wi-Fi network at a coffee shop. What is a firewall and how does it work? ---------CORRECT ANSWER-------- ---------A firewall is a security system that monitors and controls incoming and outgoing network traffic. Example: A company's firewall blocks unauthorized traffic from reaching its internal network. What is encryption? Differentiate between symmetric and asymmetric encryption. ---------CORRECT ANSWER-----------------Encryption transforms readable data into coded text to protect it.
Importance: Hashing securely stores passwords so that even if a database is breached, the passwords are not exposed. Why is information security difficult? ---------CORRECT ANSWER------------- ----Information security is challenging because:
What are the key aspects of the Information Age? ---------CORRECT ANSWER-----------------The Information Age is defined by the global production, distribution, and control of information. Two aspects are: 1) A flat global world, where everyone is interconnected and has access to IT resources, and 2) The need for businesses to adapt quickly to survive in a rapidly changing environment. What is the definition of job security according to the text, and how can this course help you achieve it? ---------CORRECT ANSWER-----------------Job security comes from possessing marketable skills and the courage to use them. The course helps develop key skills such as adapting to technology, abstract reasoning, systems thinking, collaboration, and the ability to experiment. What are the four key skills for job security according to Robert Reich? ----- ----CORRECT ANSWER-----------------1) Abstract reasoning: the ability to manipulate models and ideas logically.
What are business processes, information systems, and information? ------- --CORRECT ANSWER-----------------A business process is a way of doing something; an information system is a collection of components that store, retrieve, and process data; and information is meaningful insight that helps employees perform their jobs. Why is it important for all businesspeople, not just MIS professionals, to understand the creation, monitoring, and adapting of systems? --------- CORRECT ANSWER-----------------All businesspeople must be involved in specifying requirements and managing projects to ensure systems and processes meet the needs of the business strategy. What are the five competitive forces that determine industry structure? ------ ---CORRECT ANSWER-----------------1) Threat of substitutes
adapt processes, information systems, and information to meet strategic business objectives. It ensures that the business's technology infrastructure is aligned with and supports the goals of the organization. What is the difference between business processes and information systems? ---------CORRECT ANSWER-----------------A business process refers to a specific way of doing something in an organization, while an information system is a set of tools and technologies used to store, process, and manage data to support business processes. How does the "flat" global world concept impact businesses in the Information Age? ---------CORRECT ANSWER-----------------The flat world means that technological access and communication are no longer restricted by geographic boundaries, allowing businesses to operate globally. This creates opportunities for global collaboration and competition but also means companies must adapt rapidly to avoid being outpaced by competitors. Why is it necessary for businesses to focus on competitive strategy when designing information systems? ---------CORRECT ANSWER----------------- Information systems should support the specific competitive strategy of the business. A mismatch between business goals and technology can lead to inefficiencies and missed opportunities, so aligning technology with strategy is essential for success. How do "linkages" in a value chain reduce costs? ---------CORRECT ANSWER-----------------Linkages involve connecting activities across the value chain to optimize efficiency. For example, sales forecasts can influence production planning, which in turn influences inventory management, thus reducing waste and improving cost efficiency.
What is the concept of "value" in the value chain, and how does it impact the cost-benefit analysis of business activities? ---------CORRECT ANSWER-----------------Value refers to the amount of money customers are willing to pay for a product or service. Businesses use this concept to evaluate which activities add value and should be pursued, and which activities may incur unnecessary costs without generating sufficient value. How do the concepts of "substitute" and "switching cost" affect the bargaining power of customers in the five forces model? ---------CORRECT ANSWER-----------------A substitute offers similar benefits at a potentially lower price, increasing customer bargaining power. High switching costs, however, reduce this power by making it harder for customers to switch to competitors. Define a business process and explain how businesses compete using processes. ---------CORRECT ANSWER-----------------A business process is a sequence of activities designed to achieve a specific function or goal. Like sports teams, businesses compete using well-defined processes that enable them to perform consistently and efficiently. Examples include order fulfillment, hiring processes, and customer service. What are two examples of business processes not mentioned in the text? -- -------CORRECT ANSWER------------------ Adding a class to the university curriculum: This process involves reviewing course proposals, aligning with department standards, and obtaining approval.
on a computer). Use external documentation for complex activities when needed. Describe four reasons why organizations standardize business processes. ---------CORRECT ANSWER-----------------Standardizing processes ensures:
Describe dynamic processes and give examples. ---------CORRECT ANSWER-----------------Dynamic processes are flexible, less predictable, and adapt based on changing circumstances. Examples include deciding whether to expand business operations or resolving customer service issues. How does employee behavior vary in structured versus dynamic processes? ---------CORRECT ANSWER-----------------In structured processes, employees follow predefined instructions and procedures, leading to predictable outcomes. In dynamic processes, employees are expected to use judgment, problem-solving skills, and flexibility to adapt to changing situations. Define information and provide an example for each of the 4 definitions. ---- -----CORRECT ANSWER-----------------1. Knowledge derived from data: e.g., understanding market trends from sales data.
What is the Internet? ---------CORRECT ANSWER-----------------The Internet is a global network that connects LANs, WANs, and other internets. The public Internet connects millions of networks worldwide, and private internets (called intranets) are often used within organizations to keep their networks isolated and secure. How do you connect a LAN to the Internet? ---------CORRECT ANSWER---- -------------A LAN connects to the Internet through an Internet Service Provider (ISP), which assigns a legitimate IP address, provides gateway services for communication, and helps manage traffic to/from the Internet. What is Bluetooth? ---------CORRECT ANSWER-----------------Bluetooth is a wireless technology used to connect devices over short distances (typically within 30 feet). It's commonly used for connecting devices like wireless headphones, mice, keyboards, and syncing devices like smartphones to car audio systems. What is Wi-Fi? ---------CORRECT ANSWER-----------------Wi-Fi allows devices to connect wirelessly to a Local Area Network (LAN) and is used for Internet access in homes, businesses, and public spaces. It operates over short to medium distances (up to 100 feet) using IEEE 802. protocols. What is Cellular Network? ---------CORRECT ANSWER-----------------A cellular network (or mobile network) is a wireless communication system that connects mobile devices to the Internet and other services using radio waves. It is divided into cells, each served by a base station (cell tower), and it uses frequencies to communicate with mobile users.
What are the four generations of cellular networks? ---------CORRECT ANSWER-----------------1G: Analog network that supported only voice calls. 2G: Digital network that allowed voice calls, texts, and limited data services (e.g., SMS). 3G: Provided faster data speeds, enabling mobile internet access and video calling. 4G: High-speed internet access for mobile devices, supporting streaming, gaming, and advanced services like HD video calls. 5G: The next generation, offering ultra-fast internet speeds, low latency, and the ability to support billions of connected devices (e.g., IoT). What is the Internet of Things (IoT)? ---------CORRECT ANSWER------------- ----The Internet of Things (IoT) refers to the network of physical devices (e.g., cars, thermostats, wearables) that are connected to the Internet and share data with each other. These devices collect and exchange data to improve efficiency, convenience, and safety. What is a protocol? ---------CORRECT ANSWER-----------------A protocol is a set of rules that govern how data is transmitted and received between devices. Examples include:
those requests, and serves the corresponding Web pages (HTML, CSS, etc.) to the client's browser. What is cloud computing? ---------CORRECT ANSWER-----------------Cloud computing refers to renting IT resources (servers, storage, applications) over the Internet. The cloud is "elastic," meaning resources can be scaled up or down based on demand, providing cost savings and flexibility. What is IaaS? ---------CORRECT ANSWER-----------------A type of cloud hosting: Infrastructure as a Service (IaaS) provides basic computing resources (e.g., virtual machines, storage) on-demand over the Internet. Amazon AWS is an example of IaaS. What is PaaS? ---------CORRECT ANSWER-----------------A type of cloud hosting: Platform as a Service (PaaS) provides an environment to develop, test, and deploy applications without managing the underlying hardware. An example is Microsoft Azure. What is SaaS? ---------CORRECT ANSWER-----------------A type of cloud hosting: Software as a Service (SaaS) delivers complete software applications over the Internet. Examples include Google Apps and Microsoft 365. What is a private cloud? ---------CORRECT ANSWER-----------------A private cloud is a cloud infrastructure used exclusively by one organization. Unlike public clouds, the resources are not shared with other users, and the organization has full control over the infrastructure.
What is the purpose of a database? ---------CORRECT ANSWER-------------- ---The primary purpose of a database is to keep track of things. It stores data efficiently so that it can be accessed, modified, and managed as needed, especially for large sets of data. When is a database preferred over a spreadsheet? ---------CORRECT ANSWER-----------------A database is preferred when the data involves multiple themes and needs to be related across tables. While a spreadsheet can handle lists with a single theme (e.g., a list of names), a database can handle more complex data with relationships, such as customer orders, inventory, and product details across multiple tables. Define a database. ---------CORRECT ANSWER-----------------A database is a collection of integrated records, which includes multiple tables, relationships among rows in those tables, and metadata that describes the database structure. It allows for efficient data storage, retrieval, and manipulation. What are the three elements of a database hierarchy? ---------CORRECT ANSWER------------------ Byte: A single character of data (e.g., a letter or number).