CIS 105 Final Exam - Questions and Answers
CIS 105 Final Exam - Questions and Answers Sites that cannot be indexed by Google and other search engines are referred to as _______. Dark Web Users have every right to be concerned and protective of their privacy. It is the responsibility of firms to engage users on new initiatives and to protect user privacy. Failure to do so risks backlash. True _______ is the market value of a publicly traded company. It is the share price multiplied by the number of shares outstanding. Market Capitalization Facebook's key resources for competitive advantage are ______ and _______. network effects; switching costs How does Google's AdSense ad network work? (Select all that apply) A) Content-provider websites run ads for Google in exchange for a cut of the money that Google makes from the ads B) Advertisers place ads on content-provider websites to reach more customers C) More participants bringing in more revenue also helps the ad network firm benefit from scale economies, offering a better ROI from its ad technology and infrastructure D) Advertisers attract content providers, which in turn attracts more advertisers creating strong network effects E) all of the above Users on Google are typically _______, to collect information that will drive to a specific action. Users on Facebook are typically ________, to look around, explore and enjoy. This can lead to differences in _______ and therefore click-through rates for ads. task-oriented; exploration-oriented; user-attention Google uses PageRank to determine the order of organic search results. What logic is this algorithm based on? Web pages that have more pages linking to them are ranked higher Global growth is always profitable. Once you have acquired global users, you can always make money from them. False Motivation for information security includes: extortion, espionage, cyberwarfare, pranksters, activism, revenge, terrorism, stealing data, and stealing intellectual property. True A _____ defines the data or field that a table can hold. Column _______ hackers are the bad guys who try to break into (hack) computer systems. Black Hat _____ refers simply to raw facts and figures. Alone it tells you nothing. The real goal is to turn it into ______ by presenting it in a context where it can answer a question or support decision making. Data; information
Escuela, estudio y materia
- Institución
- CIS 105
- Grado
- CIS 105
Información del documento
- Subido en
- 22 de febrero de 2024
- Número de páginas
- 5
- Escrito en
- 2023/2024
- Tipo
- Examen
- Contiene
- Preguntas y respuestas
Temas
-
cis 105 final exam
-
cis 105 final
-
cis 105
Documento también disponible en un lote