Outside Readings/Random Exam 2 Flashcards

1
Q

What makes up most of eCommerce business? What is the percentage?

A

B2B ~ Business to Business

Makes up 80%

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are 3 things the CAN-SPAM Act of 2003 required advertisers to do when sending emails?

A
  • Clearly identify themselves (company)
  • Present a workable link to opt-out of future emails
  • Present a valid postal address or phone # so they have a way to be contacted other than via email
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How big are P2P networks?

A
  • can be anywhere from 2 computers to hundreds
  • Any computer on a P2P network is considered a server if it shares a printer, file, video, or some other resource with the network
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

When it comes to networks, Client/Server networks have the advantage over others when it comes to ___

A

Centralized Administration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a disadvantage to the P2P network?

A

Less security and less control because users administer their own systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How does a Star Topology network go down?

A

-HUB goes down

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which type of network Topology is the most expensive?

A

Star Topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What was the name of the CEO of Equifax who was fired due to a security breach?

A

Richard Smith

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Equifax originally reported that the data breach affected ___ users, but a later report said it affected ___ users.

A

First reported 143 million users

Later report reported 145.5 million users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What were the reasons Equifax was hacked?

A
  • Staffers didn’t respond to a public warning about vulnerability in Apache Struts software and malfunctioning scanning tool
  • Staffers emailed notice to IT personnel to patch issue but they didn’t (going against the 48-hour company patching policy)
  • later scan that month failed to identify vulnerability in Apache Struts
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What website can you use to encrypt files?

A

Gnupg.org

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

When should you use Individual File Encryption?

A

When you are absolutely sure where all the confidential information is located on your computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

___ prevents a thief from starting your computer without a passphrase

___ prevents a thief from opening your file without a passphrase

A

Whole Disk Encryption

Individual File Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The term “thin client” refers to ___

A

Software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A ___ is a network computer without a hard disk drive

A

Thin Client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A ___ is one that will perform the bulk of processing in a client/server network

A

Thick Client or Fat Client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A ___ is one that will perform the bulk of processing in a client/server network

A

Thick Client or Fat Client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which are more expensive to deploy, Thin or Thick clients?

A

Thick Clients

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which have more security issues, Thin or Thick Clients?

A

Thick Clients

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which are better at distributing data, Thin or Thick Clients?

A

Thin Clients

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which has more space, Thin or Thick Clients?

A

Thick Clients

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which is better, Thin or Thick Clients?

A

Neither

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which is more powerful, Thin or Thick Clients?

A

Neither

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

How does a browser know if a website is bad?

A

It checks the websites Certificates that they have purchased

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What is pure-play?
Business that offer everything online
26
What is Brick-and-Mortar?
Businesses that offer everything in their physical store
27
What is Showrooming?
Browsing in a physical store before buying online
28
What is Webrooming?
Browsing online before buying product in the physical store
29
What is the latest Pure-Play retailer to convert to Brick-and-Mortar tactics
Birchbox
30
Why are Pure-Play businesses building physical stores (Brick-and-Mortar)?
To enhance customers experience so they will buy more products overall (online and in person) Stores are very nice, employees well-dressed, etc.
31
What is it called when a business is both Pure-Play and Brick-and-Mortar?
Omnichannel
32
What does UPS stand for?
Uninterruptable Power Supply
33
What was Guest Speaker form Fibertown's name?
Sam White
34
What were the job titles of Sam White at FIBERTOWN?
- Director of Marketing and Technical Information | - Project Manager (Texas A&m Engineering Extension Service)
35
The guest speaker, Sam White, used to be a pilot for ___
Southwest Airlines
36
What is FIBERTOWN's smallest client?
2-man office
37
How many desks and chairs does FIBERTOWN have?
156
38
What was the name of the company that sued FIBERTOWN on Sam White's first day of work?
Uptime
39
What is the name of the company that came up with the Tier System?
Uptime Institute
40
What is the temperature in FIBERTOWN's data centers, what is the percentage of humidity?
72 degrees F | 50% Humidity
41
Where is Sam White's office located?
Astin Building
42
According to Sam White, the FIBERTOWN building was once owned by the ___
Coca-Cola company *used it to count quarters
43
What is FIBERTOWN's niche market?
The Hurricane Zone
44
How does FIBERTOWN's business evolve?
Business will have to exercise their DRP plan using FIBERTOWN's Co-location services and end up like the Bryan/College Station area and wanted to stay full time
45
Fibertown's Tier 2 center is ___ | Fibertown's Tier 4 center is ___
Redundant | Concurrent
46
What is the term called when you send packets across the internet?
Pack INternet Groper (PING)
47
Why did Fibertown have pre-drilled holes in the ground when they purchased the building?
Holes were drilled by Bank who used to own FIBERTOWN building
48
FIBERTOWN has ___ power rooms that have ___ transformers and each has a ___ side and a ___ side
has 3 power rooms has 3 transformers each has an "A side" and "B side"
49
What is the name of the employee who is the Hands & Eyes of FIBERTOWN?
Bradely
50
What is resilience?
- admitting you cannot stop bad things from happening | - goal is to survive disasters and cyber attacks
51
Is FIBERTOWN a local internet service provider?
Yes
52
Why didn't FIBERTOWN make tier 4?
They have 30in floors instead of 36 in floors
53
Where is FIBERTOWN located in Houston, TX?
Above 500 year flood plan @ I-45 and Beltway 8
54
Difference between Concurrent and Redundant?
Redundant -means there are multiple things installed to make sure if something goes wrong, then another will pick up the slack Concurrent - means that when something goes wrong, the thing is shut off to prevent the affects of bad thing causes the system to go down - NEVER go down
55
SCADA control centers are the ___
Mission Control rooms
56
What are the 4 services FIBERTOWN offers?
- CoLocation (COLO) - Business Continuity - SCADA control centers - Disaster Recovery (DR)
57
What year were FIBERTOWN's redundant and concurrent facilities built?
Redundant 1997 Concurrent 2007
58
___ allow you to lookup frequently used values on table in Excel.
Reference Functions
59
When using the VLOOKUP function, ___ refers to the information that will use to pull a value from the reference table.
lookup_value
60
What is the first step to use a PivotTable?
Preparing the Source Data
61
When you add Region as the Row Labels of the pivot table, the different regions in the data are displayed as ___
Row headings of the table
62
When two or more computers are connected to communicate and share resources it is called a ___
Computer Network
63
What is a passphrase?
A memorable strong password
64
A secret word or combination of keyboard characters typed in by a user to authenticate one's identity for joining a computer network is a ___
Password
65
A password that contains a specific amount of characters with mixed cases and often requires letters and numbers is a ___
Strong Password
66
Usually a harmless or interesting looking program that, when executed, unleashes harmful viruses into a user's system is a ___
Trojan Horse
67
What is the menu in Excel called that is used to manipulate workbooks?
File
68
Menu tabs that can be added to the Excel menu as you begin to use more of the features included in these groups.
Developer | Add-In Tabs
69
often contain data, formatting and calculations that relate to common spreadsheet tasks (such as managing a budget or expense report).
Templates
70
feature that allows the entire contents of a cell to appear by displaying it on multiple lines within the same cell.
Wrap Text
71
icon that allows you to change important detail elements of your chart such as: titles, legends, data labels, and the axes of your chart.
Add Chart Element
72
___ are used to define how the data will be summarized and arranged on the PivotTable ___ used to screen the data as it is placed in a PivotTable
Column and Row Labels Report Filters