Chapt 14 IT Networks and Electornic networks Flashcards

1
Q

All of the following are correct statements regarding velocity-based value except

A

This answer is correct.
The more data businesses have on the customers, both recent and historical, the greater the insights is a correct statement regarding volume-based value.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following is usually a benefit of transmitting transactions in an electronic data interchange (EDI) environment

A

This answer is correct.
EDI transactions are typically transmitted and processed in real time. Thus, EDI compresses the business cycle by eliminating delays. The time required to receive and process an order, ship goods, and receive payment is greatly reduced compared with that of a typical manual system. Accordingly, more rapid receipt of payment minimizes receivables and improves cash flow.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

All of the following are correct statements regarding businesses deciding to utilize cloud computing for big data projects except

A

Analysts are not required to have a detailed understanding of the available data and possess some sense of what answer(s) they’re looking for.
This answer is correct.
Analysts are not required to have a detailed understanding of the available data and possess some sense of what answer(s) they’re looking for is an incorrect statement. Analysts must have a detailed understanding of the available data and possess some sense of the answers they are looking for. The value of data is only as valuable as the business outcomes it makes possible. It is how businesses make use of data that allows full recognition of its true value and the potential to improve decision-making capabilities and measure them against the results of positive business outcomes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a major disadvantage to using a private key to encrypt data?

A

Both sender and receiver must have the private key before this encryption method will work.
This answer is correct.
Private-key, or symmetric, encryption is the less secure of the two encryption methods because only one key is used. This single key must be revealed to both the sender and recipient.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The use of message encryption software

A

Increases system overhead.
This answer is correct.
The machine instructions necessary to encrypt and decrypt data constitute system overhead. As a result, processing speed may be slowed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following is a correct statement regarding in-memory analytics?

A

It analyzes data from system memory instead of hard drives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A digital signature is used primarily to determine that a message is

A

Unaltered in transmission.
This answer is correct.
A digital signature is a means of authenticating an electronic document, such as a purchase order, acceptance of a contract, or financial information. Because digital signatures use public-key encryption, they are a highly secure means of ensuring security over the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

All of the following are correct statements regarding big data except

A

Big data is an evolving term that describes any voluminous amount of structured data that has the potential to be mined for information.
This answer is correct.
Big data is an evolving term that describes any voluminous amount of structured, semi-structured, and unstructured data that has the potential to be mined for information. Thus, the statement is incorrect because big data includes semi-structured and unstructured data in addition to structured data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following areas experienced an increase in risk as personal computers replaced mainframe environments?
Backup and recovery
System incompatibility
Copyright violations

A

I, II, and III.
This answer is correct.
Personal computer users may be unaware of the need to make frequent file back-ups or lack the expertise or hardware to do so. Personal computer use also usually results in an increase in security concerns. Another increased risk pertains to copyright violations. Making unauthorized copies of software is fairly easy and method of reducing software costs for personal computer systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following statements is true concerning the security of messages in an electronic data interchange (EDI) system

A

Encryption performed by physically secure hardware devices is more secure than encryption performed by software.
This answer is correct.
Physically secure hardware devices for performing encryption are under the direct control of the client. Software is not easily controlled because it is portable. More control is achieved with the hardware approach.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly