FINAL Flashcards
Roughly one in every three people on the planet has a Facebook account. T OR F?
TRUE
Firms that grow quickly may seem less risky/more likely to succeed; therefore, fast growth may help
an entrepreneur extract better ownership terms from potential investors. T OR F?
TRUE
Facebook founder and CEO Mark Zuckerberg maintains a majority of voting rights in the public
company, virtually guaranteeing that his control of the firm continues, regardless of what investors
say. T OR F?
TRUE
Meta owns four of the Internet’s most widely used apps: Facebook, TikTok, WhatsApp, and Google
Voice. T OR F?
FALSE
When a firm has an IPO, it is said to have
gone public, selling shares on a public stock exchange for
the first time.
A stockbroker trades shares she does not own with an obligation of later repayment, and in the hope
that the price of traded shares will fall. She then repays share debt with shares purchased at a lower
price and pockets the spread between initial share price and repayment price. This attempt to profit
from a falling stock price is known as
SHORT SELLING
Studying Facebook provides a context for understanding which of the following:
network effects
platform partnerships
privacy
business value of social media
All of the above are true.
All of the above are true.
Investor groups that provide funding in exchange for an ownership stake in the firm are called
VENTURE CAPITALIST
Mark Zuckerberg, the founder of Facebook, ensured that he remained in control of the firm even after
it went public by
RETAINING A MAJORITY OF VOTING RIGHTS IN THE PUBLIC COMPANY.
Facebook’s key resources for competitive advantage are the sophisticated technological tools it
provides its users. T OR F?
FALSE
Facebook (and other apps the firm owns) collectively represent the most prominent photo-sharing
service on the Web, ahead of Picasa, Flickr, and Photobucket, even though all of these other efforts
started before Facebook. T OR F?
TRUE
Facebook can be wholly indexed by search engines, like Google and Bing, being able to index all of
Facebook content. T OR F?
TRUE
A significant portion of Facebook’s underlying technical infrastructure consists of open-source
software. T OR F?
TRUE
Facebook’s phenomenal growth implies that it requires minimal infrastructure investment. T OR F?
FALSE
Facebook was one of the first social networking sites where users actually identified themselves
using their real names. T OR F?
TRUE
Facebook purchased Oculus VR because, like Zuckerberg, the firm’s youthful founder had already
built a platform with massive customer base. T OR F?
FALSE
Facebook is especially appealing to organizations looking to share messages with fans since
anyone who has “liked” an organization on Facebook will see all of that organization’s posts in their
news feed. T OR F?
FALSE
Facebook will reduce the rank of posts that request reshares.
TRUE
Facebook’s acquisition of WhatsApp was a way for Zuckerberg’s firm to gain leadership in the
fast-growing mobile messaging market. T OR F?
TRUE
_____ is the biggest photo-sharing site on the Web, taking in around three billion photos each
month.
The deep web refers to
SITES THAT CANNOT BE INDEXED BY GOOGLE AND OTHER SEARCH
ENGINES.
Software that is free and whose code can be accessed and potentially modified by anyone is
referred to as
OPEN SOURCE SOFTWARE
Systems distributed throughout the Internet that help improve the delivery speeds of Web pages and
other media, typically by spreading access across multiple sites located closer to users are known
as
CONTENT DELIVERY NETWORKS
The term “social graph” refers to
THE GLOBAL MAPPING OF USERS AND ORGANIZATIONS AND
HOW THEY ARE RELATED.
Which of the following factors has helped Facebook build up among its users?
MUTUAL AND
RECIPROCAL APPROVAL OF FRIENDS REQUESTS.
What does the term “cloud” refer to?
IT REFERS TO A COLLECTION OF
COMPUTING RESOURCES AVAILABLE FOR ACCESS OVER THE INTERNET.
What are network effects?
IT REFERS TO A SITUATION WHEN
THE VALUE OF PRODUCTS OR SERVICE INCREASES AS THE NUMBER OF ITS USERS EXPANDS.
How are news feeds a source of value for users on Facebook?
IT FOSTERS THE VIRALITY OF
INFORMATION SHARING VITAL TO DELIVERING VALUE FROM THE SOCIAL GRAPH.
Mark Zuckerberg acquired the firms Oculus because
IT WOULD ENSURE FACEBOOK’S PLACE IN
BEING INVOLVED ON THE FOREFRONT OF COMPUTING’S EVOLUTION.
One of Facebook’s key resources for competitive advantage is
NETWORK INTERNALITIES.
In the context of Facebook’s business strategy, the walled garden refers to the connections between
individuals and organizations. T OR F?
FALSE
Most Facebook applications are focused on businesses and educational services. T OR F?
FALSE
The asking price for Facebook acquisition, WhatsApp, was 2 billion dollars. T OR F?
FALSE
Meta attempted to counter the TikTok threat by creating a clone, an app called Lasso. T OR F?
TRUE
TikTok has more daily usage hours than any of Facebook’s platforms. T OR F?
TRUE
Facebook’s growing dominance has given rise to the fear that if increasingly large parts of the Web reside inside a single service, innovation, competition, and exchange may suffer. T OR F?
TRUE
“Reels, a feature integrated into Instagram and Facebook, has displaced TikTok as the dominant short-video platform.” T OR F?
FALSE
“Meta’s Reels feature offers enhanced AI tools to surface content that users are likely to be most interested in.” T OR F?
TRUE
“Since the launch of Reels, users have been spending less time on Meta platforms.” T OR F?
FALSE
“Cross-posting between Meta platforms allows users to access TikTok features without leaving Instagram or Facebook.” T OR F?
TRUE
_____ is a term that refers to a closed network of single set of services controlled by one
dominant firm.
WALLED GARDEN
Facebook has offered a system where website operators can choose to accept a user’s Facebook
credentials for logging in. Website operators appreciate this feature because
USERS CAN ACCESS WEBSITES WITHOUT CREATING AN ACCOUNT, REDUCING A POTENTIAL BARRIER TO CUSTOMER ACQUISITION.
Metaverse is a concept where users experience an immersive, computer-generated environment where they can interact with others. T OR F?
TRUE
Oculus founder Palmer Luckey launched a Kickstarter campaign to generate interest in his product but failed to meet his initial goal of $250,000, which caused the product to fail before it made it to production. T OR F?
FALSE
Facebook Phone and Meta Portal are examples of Meta’s unsuccessful consumer electronics efforts. T OR F?
TRUE
Meta has introduced its second iteration of its smart glasses in a continued partnership with Ray-Ban, which features a smart screen incorporated into the lenses, allowing them to be used for AR and VR. T OR F?
FALSE
The term “metaverse” was first coined by Neal Stephenson in his 1992 novel Snow Crash. T OR F?
TRUE
The term “metaverse” refers to a specific infrastructure or service provided by several firms. T OR F?
FALSE
The metaverse is most commonly associated with environments created using augmented reality headsets. T OR F?
FALSE
Predictions suggest that the metaverse could generate between $2.5 and $15 trillion in revenue annually. T OR F?
TRUE
Meta’s Reality Labs, responsible for building the metaverse future, has accumulated $40 billion in losses so far. T OR F?
TRUE
Microsoft’s largest acquisition in history, justified in part by their hopes to gain “building blocks for the metaverse,” was which firm?
ACTIVISION BLIZZARD
Which of the following is an inconvenience of AR/VR headsets?
They are heavy and uncomfortable to wear for long periods.
They are expensive.
They require a lot of computing power.
They are inconvenient to have on hand.
All of the above.
All of the above.
DALL-E is a term taken from the military where trained team, unaffliated with development staff, play the role of adversaries and try to deliberately compromise systems. T OR F?
FALSE
IDEs are tools used to write software and usually include an editor, debugging tools, a compiler that turns written code into something that a computer can execute and more. T OR F?
TRUE
Meta intends to have Llama AI-powered chatbots available across their messaging platforms including virtual avatars of celebrities who are ready to engage you in all sorts of domain-specific conversations. T OR F?
TRUE
Meta’s lag in AI was in part blamed on the firm’s rushed adoption of GPUs. T ORF?
FALSE
Developers who make applications create ______ that have the potential to add value to Meta beyond what the firm itself provides to its users.
COMPLEMENTARY BENEFITS
Which of the following is a tactic that Meta used to make Llama 2 a safer AI?
They had third-party users perform Red Team exercises.
They had internal employees perform Red Team exercises.
They developed Purple Llama tools to make it harder for bad actors to generate harmful code.
All of the above
None of the above
All of the above
Meta’s custom ASIC chip helps to:
Improve user experience Get videos to user devices more quickly Use less data overall Improve livestream performance for users All of the above
All of the above
Facebook’s revenue share with app vendors for some services involved taking more than half of virtual goods sales. T OR F?
FALSE
Mark Zuckerberg successfully recruited the CEO of PayPal, David Marcus, to run Messenger, which has now become one of the largest messaging platforms. T OR F?
TRUE
Facebook’s attempt to launch a gaming app platform within its iOS app was readily accepted by Apple. T OR F?
FALSE
What are APIs?
APPLICATION PROGRAMMING INTERFACES
What was the primary purpose of Facebook’s publication of APIs at the F8 developers conference?
TO ALLOW DEVELOPERS TO CREATE APPLICATIONS THAT INTERACT WITH FACEBOOK.
Every eighteen months, Meta employees are required to leave their teams and work on something different for at least a month. T OR F?
TRUE
Facebook’s “no-beta” culture seldom tolerates mistakes on the road to progress. T OR F?
FALSE
Facebook’s Beacon effort was a failure largely because it was “opt-out” instead of “opt-in.” T OR F?
TRUE
_______ is considered to be the most persuasive and valuable method of promoting products and services.
WORD OF MOUTH
Meta’s algorithms for liking like-minded users and finding what they may be interested in has:
Surfaced conspiracy theories and hate
Allowed for the spread of misinformation around COVID-19
Given way to fast-spreading conspiracy theories around elections
All of the above are true
All of the above are true
Figures released by Meta showed its AI had a difficult time detecting ____
HATE SPEECH
Near field communication refers to a short-range, wireless communication standard. T OR F?
TRUE
The EU has fined Google over $13.4 billion since 2017, including $4.13 billion for using its Android mobile operating system to the detriment of any rivals. T OR F?
TRUE
Generative AI is the biggest existential threat to Google’s search business that it has ever faced. T OR F?
TRUE
The ‘T’ in ChatGPT stads for _________
TRANSFORMER
Ad networks enforce exclusivity. Once a content provider selects one ad network it cannot implement other forms of advertising on its website. T OR F?
FALSE
The base service of Google Analytics is offered free to websites of all sizes, with premium offerings and support available for a fee. T OR F?
TRUE
The _______ refers to a situation where ads appear alongside text the advertiser would like to avoid.
CONTENT ADJACENCY PROBLEM
Dynamic search ads:
Are generated automatically
Are based on the content of the website
Are useful for firms with rapidly changing inventory
All of the above are true
All of the above are true
Which of the statements holds true for the term click-through rate?
IT REFERS TO THE NUMBER OF USERS WHO CLICKED AN AD DIVIDED BY THE NUMBER OF TIMES THE AD WAS DELIVERED.
Which of the following is true for the cost-per-click?
IT REFERS TO THE MAXIMUM AMOUNT OF MONEY AN ADVERTISER IS WILLING TO PAY FOR EACH CLICK ON THEIR AD.
Law firms are consistently the lowest cost-per-click rate bidders for keyword ads, but they run the most ads, making them significant contributors by volume. T OR F?
FALSE
JCPenney was one of Google’s largest advertisers, spending millions a month in ads, yet Google punished the firm in search rankings when it detected that Penney violated Google’s policies on gaming search engines. T OR F?
TRUE
PageRank is an algorithm developed by Google co-founder Larry Page to rank websites. T OR F?
TRUE
Google, who has a best-in-class AI team, was not prepared to compete with the capabilities of OpanAI’s ChatGPT. T OR F?
TRUE
Google profits from advertising allow it to:
Experiment and innovate Tolerate failure Acquire aggressively Patiently build new markets All of the above are true
All of the above are true
Almost all security breaches can be tracked back to technology lapses; personnel or procedural factors rarely factor in. T OR F?
FALSE
The malware used to breach Target was described by one security expert as “absolutely unsophisticated and uninteresting.” T OR F?
TRUE
The Equifax hack mainly impacted people from:
The US Canada The UK All of the above are true None of the above are true
All of the above are true
Hackers might infiltrate computer systems to enlist hardware for subsequent illegal acts. T OR F?
TRUE
The term ISO 27000 refers to a series of standards representing the set of best practices for implementing, maintaining, and improving organizational security. T OR F?
TRUE
Data harvesters are cybercriminals who infiltrate systems and collect data for illegal resale. T OR F?
TRUE
The MOVEit exploit is considered one of the costliest hacks of all time. T OR F?
TRUE
A team working on organizational security should include representatives from general counsel, audit, public relations, and human resources, in addition to those from specialized security and broader technology and infrastructure functions. T OR F?
TRUE
Online backup services are considered a poor choice for end-users since this only increases the likelihood that an individual’s data will be hacked. T OR F?
FALSE
The Hydra dark web market, which at its peak did over $1 billion in annual business, is still active despite law enforcement efforts since 2022. T OR F?
FALSE
Cybercriminals who infiltrate systems and collect data for illegal resale are called ____
DATA HARVESTERS
A firm’s suppliers, buyers, or partners may also require a degree of certification. T OR F?
TRUE
Hordes of surreptitiously infiltrated computers, linked and controlled remotely, are known as zombie networks or _________
BOTNETS
System and Organization Controls (SOC) can involve certification by a third-party organization. T OR F?
TRUE
Dumpster diving refers to physically trawling through trash to mine any valuable data or insights that can be stolen or used in a security attack. T OR F?
TRUE
One of the reasons organizations delay patches to plug holes in their security applications is ________.
THE FEAR THAT HE NEW TECHNOLOGY CONTAINS A CHANGE THAT WILL CAUSE PROBLEMS DOWN THE ROAD.
Because of Moore’s Law, widely used encryption programs currency employed by banks and e-commerce sites are now easily penetrated by brute-force attacks that can be employed by hackers using just a handful of simple desktop computers. T OR F?
FALSE
It’s bad when a firm’s e-mail and password files are stolen; however, the impact is minimized because user passwords set up for one system cannot be used in others. T OR F?
FALSE
Systems that deny the entry or exit of specific IP addresses, products, Internet domains, and other communication restrictions are said to employ a(n) _____
BLACKLIST
What type of tool enforces access privileges and helps verify that systems are not being accessed by unauthorized or suspicious ways?
ACCESS CONTROL TOOLS
The term deepfake refers to sophisticated media created by AI that tempts to look or sound like a real person or event. T OR F?
TRUE
Cybersecurity experts have just recently started using artificial intelligence, and they are unsure of its promise. T OR F?
FALSE
Computer criminals, state-sponsored infiltrators, corporate spies, and other malfeasants are often motivated by:
Account theft and illegal funds transfer
Terrorism
Surreptitiously hijacking hacked hardware for cryptocurrency mining
Cyberwarfare
Any of the above are true.
Any of the above are true.
Which of the following is an example of Russia’s use of cyberwarfare?
Taking out Ukaine’s Viasat satellite Interrupting internet service across Europe Causing outages in German wind turbine power grid All of the above are true.
All of the above are true.
Which of the following types of infiltration techniques does one open up to by posting sensitive personal information and details about one’s workplace on social networking sites?
SOCIAL ENGINEERING
Which of the following are considered sources of information that can potentially be used by social engineers?
LinkedIn Corporate directories Social media posts Contests or surveys All of the above are true
All of the above are true
Some of the most common guidelines issued by websites when designing a secure password include which of the following?
THE PASSWORD SHOULD BE AT LEAST EIGHT CHARACTERS LONG AND INCLUDE AT LEAST ONE NUMBER AND OTHER NON ALPHABET CHARACTER
Technologies that measure and analyze human body characteristics for identification or authentication are known as _____.
BIOMETRICS
The e-mail password of a senior employee in an organization was compromised by someone observing this user as the employee accessed his account. This is most likely a case of ________.
SHOULDER SURFING
Which of the following statements holds true for the term spoof?
IT REFERS TO E-MAIL TRANSMISSIONS AND PACKETS THAT HAVE BEEN ALTERED TO SEEM AS IF THEY CAME FROM ANOTHER SOURCE.
One of the major problems with the Heartbleed bug in OpenSSL software is that _______.
THE SOFTWARE WAS EMBEDDED IN MANY HARDWARE PRODUCTS THAT COULD NOT BE EASILY PATCHED WITH AUTOMATIC SOFTWARE UPDATES.
A common example of 2FA is _________ .
A PASSWORD, PLUS THE USE OF SEPARATE VERIFICATION CODE.
Which of the following is a potential drawback of using passkeys?
Passkey libraries are tied to your device or a specific vendor Passkeys do not allow you to share passwords with others Passkeys are not yet being implemented by all websites All of the above are true.
All of the above are true.
An alternative to terrestrial networks is Starlink. T OR F?
TRUE
China has complained to the United Nations that SpaceX’s Starlink is unfairly crowding other efforts in space. T OR F?
TRUE
The routing protocol that is in charge of forwarding packets on the Internet is known as voice over Internet protocol. T OR F?
FALSE
Wall Street traders often choose a colocation facility with the goal of providing high-latency connectivity to their partners. T OR F?
FALSE
Starlink does not use equipment in a fixed position above a spot. The satellites zoom in and out of range, passing signals to each other using _______.
LASERS
ISPs and IXPs that carry out peering are required by the FCC to charge each other fees based on their traffic contribution. T OR F?
FALSE
The internet has no center, and no one owns it. T OR F?
TRUE
Computer programs making decisions without any human intervention conduct most US stock trading. T OR F?
TRUE
Circuit-switched networks provide a connection between two parties that ______.
IS DEDICATED FOR USE BY THE PARTIES FOR THE DURATION OF A CONNECTION.
A device gets its IP address from whichever organization is currently connecting it to the Internet. T OR F?
TRUE
______ repeatedly sends a cluster of three packets starting at the first router connected to a computer, then the next, and so on, building out the path that packets take to their destination.
TRACEROUTE
The US Federal Aviation Administration sought to delay some 5G C-band use near airports over aviation safety concerns and has proposed additional upgrades for aircraft to prevent possible interference. T OR F?
TRUE
“Cyber hygiene” refers to fairly straightforward precautions that should be taken for site safety. T OR F?
TRUE
A(n) _______ is a temporary storage space used to speed computing tasks.
CACHE
The fault-tolerant nature of the DNS ensures that _________.
THE SERVICE CONTINUES FUNCTIONING EVEN IF ONE NAMESERVER GOES DOWN.
The exploit referred to as _________ allowed hackers to leverage vulnerability in DNS software to redirect users to sites they did not request.
CACHE POISONING
A firm that provides hardware and services to run websites of others is known as a(n) ________.
WEB HOSTING SERVICE.
Popular sites like Google and Yahoo! Have several computers assigned to their host names because _________ .
IT ENSURES THAT THE LOAD OF REQUESTS TO THEIR SITES DOES NOT OVERWHELM A SINGLE COMPUTER.
A __________ enables communication by defining the format of data and rules for exchange.
PROTOCOL
The most dominant standard for 4G technology worldwide is _____.
LTE
GeoTLDs are associated with geographical, geopolitical, ethnic, linguistic, or cultural community. T OR F?
TRUE
___________ technology is broadband technology that can use the wires of a local telephone network.
DIGITAL SUBSCRIBER LINE (DSL)
Under IPv6, IP addresses are expressed as a string of four numbers between 0 and 255, separated by a period. T OR F?
FALSE
The acronym HFT refers to __________.
HIGH FREQUENCY TRADING.
Unfortunately, IPv6 isn’t backward compatible with IPv4. T OR F?
TRUE
Peering refers to ________.
A SITUATION WHEN SEPARATE ISPS CONNECT THEIR NETWORKING EQUIPMENT TOGETHER TO SHARE TRAFFIC.
Which of the following applications is most likely to use UDP instead if TCP?
WEB-BASED PHONE CALLS
One of the function of the IP is to ________.
ROUTE MESSAGE PACKETS TO THE FINAL DESTINATION.
Apple has imposed what it calls “Data Authorization Labels” on app developers, requiring them
to have easy-to-read, consistent, and clear notices on what data is collected and how it is used. T OR F?
FALSE
Meta has been fined $400 million for collecting Facebook and Instagram data without explicit
consent. T OR F?
TRUE
SKAdNetwork shares conversion data with advertisers without revealing any user-level or
device-level data and is much easier to implement than old cookie schemes. T OR F?
FALSE
Apple is now automatically removing link trackers from URLs sent via its email client and its text
messaging platform. T OR F?
TRUE
Due to the complexities of consumer data privacy policy, organizations should ___________ .
ASSEMBLE AN
INTERNAL TEAM THAT WILL MONITOR RELEVANT AND COMPLEX ISSUES RELATED TO
INFORMATION SYSTEMS.
The five components of information systems needed to fully understand organizational privacy
policies include _________.
DATA, SOFTWARE, HARDWARE, PROCEDURES, PEOPLE.
How will Apple’s IDFA identifier impact advertising sales in the gaming industry?
IF GAMERS
DONT OPT-IN WHEN USING APPS, ADVERTISING NETWORKS WILL NOT HAVE
DETAILED PROFILES FOR GAME ADVERTISERS.
A VPN is a service that creates a public connection across the private Internet, encrypting
transmission and making your Internet communication appear as if it is connected to the
organizations that provides VPN software. T OR F?
FALSE
Identifying a user’s physical location for the purpose of delivering tailored ads or other content is
known as ________.
GEOTARGETING
Advertisers use ____________ to deliver targeted ads to your television based on
your profile.
DYNAMIC AD INSERTION
All devices that connect to the internet are identified by an assigned numeric value. The numeric
value is known as the _____
IP address
As an advertiser, you have acquired the services of Google to display your ads. You have set a
budget for the campaign, and Google will charge you when users click on your ad. This form of
online advertising is known as ______.
CPC
An ad that runs before a user arrives at his intended destination on a website or in an app is
known as _________.
AN INTERSTITIAL
Data that is collected by one form and shared with a partner organization is known as _______ .
SECOND
PARTY DATA
If Rent the Runway receives an invoice for 450,000 impressions, their sales quote was for ____
CPMs.
450
Suppose you have a popular blog, and you want to leverage it to make extra money. Because
your web traffic is high, you have decided to add links to direct users to online storefronts. If the
user makes a purchase at the storefront, the seller has agreed to share a percentage of
revenue with you. This form of marketing is known as ____________ .
AFFLIATE PROGRAMS.
Second-party data is data that is collected by one firm and shared with a partner organization. T OR F?
TRUE
Enhancing productivity, improving efficiency, and automating mundane tasks are benefits of AI. T OR F?
TRUE
Change management seeks to identify how workflows and processes are to be altered and how
to manage the worker and organizational transition from one system to another. T OF F?
TRUE
Potential risks and ethical implications of AI issues concerning job displacement, algorithmic
bias, and misuse for malicious purposes. T OR F?
TRUE
AI-related job displacement may create new employment opportunities and career pathways in
areas like AI development and data analysis. T OR F?
TRUE
What example of AI benefits is not mentioned in the text?
AI-ASSISTED VEHICLES
MAINTAINING HEALTHY BODY TEMPERATURE FOR PASSENGERS.
Generative AI is predicted to have a significant impact on various job sectors, including
knowledge-based professions like analysis, accounting, legal, medical, software development,
and education. T OR F?
TRUE
Which of the following is not a potential issue related to AI’s risks and unknowns?
OVERRELIANCE ON AI FOR DECISION-MAKING
Which of the following is not mentioned as a potential challenge associated with leveraging AI
and machine learning?
OVERABUNDANCE OF AVAILABLE TRAINING DATA
How does the text characterize the future of AI?
TRANSFORMATION OF INDUSTRIES AND
CREATION OF NEW OPPORTUNITIES.
Despite the transformative abilities of GenAI, why is it still crucial for individuals to always fact
check results given by GenAI?
Generative AI tends to seemingly make things up, a process often referred to as
hallucination.
Since AI systems “learn” based on data, then any biases in data can become part of the
model, which can result in sexist and racist results.
Results may contain copyrighted material which could open firms up to legal penalties.
Sometimes results can give dangerous information, such as reported cases of
generating recipes that would be poisonous if eaten.
All of the above are correct
All of the above are correct
Some concerns about GenAI include its tendency to provide incorrect answers and sometime
produce biased or harmful results. T RO F?
TRUE
The foundation model used to train LLMs like ChatGPT-3 is the same model used for end-user
interaction. T OR F?
FALSE
Auditing technology and training data is unnecessary, especially if a firm trust its developers and
suppliers. T OR F?
FALSE
In which scenario might machine learning be legally prohibited?
USING DEMOGRAPHIC DATA
FOR RISK PREDICTION
Why could banks using AI in their loan process potentially create unintended consequences?
SUCH SYSTEMS CAN INCREASE DISPARITIES BASED ON SOCIOECONOMIC
BACKGROUND, ETHNIC CATEGORY, OR EDUCATIONAL LEVEL
Organizations should incorporate new tools and best practices as they are developed, rather
than sticking to established methods. T OR F?
TRUE
Meta made its GenAI model, Llama, open source, stirring controversy in the tech industry. T OR F?
TRUE
Which statement about generative AI (GenAI) is not true?
GenAI ALWAYS PROVIDES
FACTUALLY ACCURATE ANSWERS.
COBIT is an IT infrastructure library, which covers best practices for delivering IT service. T OR F?
FALSE
Since 2018, technologists are required to have had significant training in technology ethics. T OR F?
FALSE
Which of these is a challenge associated with training AI models?
INABILITY TO INTEGRATE
DATA SOURCES
How are parameters described in the text?
RELATIONSHIPS BETWEEN TEXT ELEMENTS
A large language model (LLM) is a type of __________ .
AI USED FOR GENERAL-PURPOSE LANGUAGE
UNDERSTANDING AND GENERATION.
What is the foundation model used to train ChatGPT-3?
GPT-3
Which step is not suggested for developing more ethical, less risk-prone systems?
IGNORING
EMPLOYEE FEEDBACK
What is the purpose of a “Red Team” in the context of AI development?
TESTING THE
SECURITY OF SYSTEMS
Logistics is the term that describes the extensive use of data, statistical, and quantitative
analysis, explanatory and predictive models, and fact-based management to drive decisions
and actions. T OR F?
FALSE
Data obtained from outside sources, when combined with a firm’s proprietary internal data
assets, can give the firm a competitive edge. T OR F?
TRUE
Firms that base decisions on hunches are said to be gambling, not managing. T OR F?
TRUE
Random occurrences in data mining results can be detected by dividing the data and building a
model with one portion and using another portion to verify the results. T OR F?
TRUE
A ____________ is a system that provides rewards and usage incentives, typically in
exchange for a method that provides a more detailed tracking and recording of consumer
activity.
LOYALTY PROGRAM
___________ refer to older information systems that are often incompatible with other
systems, technologies, and ways of conducting business.
LEGACY SYSTEMS
__________ refer to databases focused on addressing the concerns of a specific problem or
business unit.
DATA MARTS
___________ is a class of computer software that seeks to reproduce or mimic
human thought, decision-making, or brain functions.
ARTIFICIAL INTELLIGENCE
Which of the following is not considered an advantage of Hadoop?
RELATIONAL STRUCTURE
Data are raw facts that must be turned into information in order to be useful and valuable. T OR F?
TRUE
_____________ refers to the process of combining aspects of reporting, data
exploration and ad hoc queries, and sophisticated data modeling and analysis.
BUSINESS INTELLIGENCE
A data cube refers to a ______.
SPECIAL DATABASE USED TO STORE DATA IN OLAP REPORTING.
___________ is the process of using computers to identify hidden patterns in and to build
models from large data sets.
DATA MINING
Computer-driven investment models can be very effective when the market behaves as it has in
the past. However, in terms of historical consistency, they are vulnerable to failure in the face of:
BLACK SWANS
_________ refers to software for creating, maintaining, and manipulating data.
DBMS
The graphical representation of data and information is known as:
DATA VISUALIZATION
In database systems, a ______ refers to a list of data.
FILE
In database systems, a row is also known as a:
RECORD
In database systems, a ______ defines the data that a table can hold.
FIELD
Which of the following describes serverless computing?
a type of cloud computing
a third-party vendor manages servers, replication, and fault-tolerance
a third-party vendor manages computing scalability
a third-party vendor manages certain aspects of security
ALL OF THE ABOVE ARE CORRECT
ALL OF THE ABOVE ARE CORRECT
Most organizations do not opt for IT configurations that are purely in-house, packaged, or SaaS
models. T OR F?
TRUE
Linux is one of the most used operating systems in desktop computers, but it can be found only in a
tiny fraction of mobile phones, and consumer electronics. T OR F?
FALSE
Linux is one of the most used operating systems in desktop computers, but it can be found only in a
tiny fraction of mobile phones, and consumer electronics. T OR F?
FALSE
Many SaaS vendors have improved system customization options and integration with standard
software packages. T OR F?
TRUE
The marginal cost to produce an additional copy of a software product is effectively zero. T OR F?
TRUE
Some of the largest technology companies now support open source software initiatives. T OR F?
TRUE
With SaaS, firms get the most basic offerings but can also do the most customization, putting their
own tools (operating systems, databases, programming languages) on top. T OR F?
FALSE
With the advent of cloud computing and SaaS, smaller firms no longer have access to the kinds of
sophisticated computing power they had access to in the past. T OR F?
FALSE
Virtualization is unsuitable for use on desktop applications. T OR F?
FALSE
Which of the following is not true about apps and the app economy?
App stores are “always open.”
Apps have been vital to the rise of several high-valued efforts, including Uber, Instagram, and
WhatsApp.
Apps developed for one platform typically cannot be used on another platform.
Apps have been criticized as creating consumer switching costs vs. browser-based
alternatives.
APP STORE ACCESS IS LIMITED TO INDUSTRIALIZED NATIONS WITH LARGE
SMARTPHONE USER POPULATIONS.
APP STORE ACCESS IS LIMITED TO INDUSTRIALIZED NATIONS WITH LARGE
SMARTPHONE USER POPULATIONS.
A slang derogatory term for an uninformed or unskilled person is “greenie.” T OR F?
FALSE
Oracle, a firm that sells commercial ERP and database products, provides Linux for free, selling
high-margin Linux support contracts for as much as five hundred thousand dollars. Oracle’s
motivation for this lies in ________________________ .
USING OPEN SOURCE SOFTWARE TO WEAN CUTOMERS AWAY FROM
COMPETITORS.
Which of the following refers to a variant of utility computing where vendors provide the operating
system and supporting software like database management systems but where client firms write
their own code?
PLATFORM AS A SERVICE
Consumerization of corporate technology stifles employee creativity. T OR F?
FALSE
Which of the following is one of the sources of revenue for open source vendors?
SELLING
SUPPORT AND CONSULTING SERVICES.
One important thing that managers should understand about SaaS is that _________________________.
MANY OF THESE
VENDORS WILL NOT LAST IN THE MARKET.
A server running ________________ can create smaller compartments in memory that
each behave as a separate computer with its own operating system and resources.
VIRTUALIZATION SOFTWARE
Which of the following is true of software as a service (SaaS)?
IT REFERS TO SOFTWARE THAT IS
MADE AVAILABLE BY THIRD PARTY ONLINE.
______________ allow(s) a server to run what amounts to a copy of a PC—OS, applications, and
all—and simply deliver an image of what’s executing to a PC or other connected device.
VIRTUAL DESKTOPS
Vendors frequently sign _________________ with their customers to ensure a guaranteed
uptime and define their ability to meet demand spikes.
SERVICE LEVEL AGREEMENTS
Which of the following statements relating to open-source software is true?
THE FLAGSHIP OSS
PRODUCT IS THE LINUX OPERATING SYSTEM, NOW AVAILABLE ON ALL SCALES OF COMPUTING
DEVICES.
Cloud vendors that are hosting hardware, operating system, database, and other software, which
clients can then use to build their own applications, are said to be providing _________________________.
SOFTWARE AS A
SERVICE.
The LAMP stack of open-source products is used ________________________.
TO POWER MANY OF THE INTERNET’s MOST
POPULAR WEBSITES.
chnology products with particularly strong security features are said to be ______________________.
HARDENEND.
The scalability of a software product is defined as the ____________________________.
ABILITY TO BE EASILY EXPANDED TO
MANAGE WORKLOAD INCREASES.
___________ is a term used to describe unpredictable but highly impactful events.
BLACK SWANS
Vendors who use open source as part of their product offerings can expect to bring new products to
the market faster because __________________.
THEY CAN SKIP WHOLE SEGMENTS OF THE SOFTWARE DEVELOPMENT
PROCESS.
Which of the following was considered a contributor to vulnerabilities in the OpenSSL security
product, known as the Heartbleed bug?
FEW DEVELOPERS WERE WORKING ON THE PROJECT, SO
THE IDEAL THAT “GIVEN ENOUGH EYEBALLS, ALL BUGSARE SHALLOW” WASN’T MET WITH
OPENSSL.
Which of the following is not one of the three major cloud-computing service models?
CAAS
Scrum defines functions or roles (for management and development, meetings, or ceremonies), and
how the process is documented and tracked or artifacts. T OR F?
TRUE
A scrum master represents the “voice of the customer,” advocates for the needs of the organization
helps in setting requirements, and is ultimately held accountable for deliverables. T OR F?
FALSE
What are software development methodologies?
THODS TO DIVIDE TASKS RELATED TO
SOFTWARE CREATION AND DEPLOYMENT INTO TASKS TARGETED AT BUILDING BETTER
PRODUCTS WITH STRONGER PRODUCT MANAGEMENT GUIDELINES AND TECHNIQUES.
Operating systems are computer programs that have a set of precise instructions that tell computer
hardware what to do. T OR F?
FALSE