Professional Documents
Culture Documents
Quiz 2-12e Chapters 4-7 (Page 3 of 5)
Quiz 2-12e Chapters 4-7 (Page 3 of 5)
/ Week 8 - Omnichannel Retailing, E-commerce, and Mobile Commerce Technology [Due date (Oct 10 - 16th, 2022)] / Quiz 2-12e chapters 4-7
Question 11
Answer saved
Sometimes system failures and data or information loss can result from reasons other than an intentional attempt to breach
security. Unintentional threats are all of the following except ___________.
Select one:
a. Political/civic unrest
b. Human errors
c. Environmental hazards
d. Computer systems failures
Clear my choice
Question 12
Answer saved
Social networks and cloud computing increase vulnerabilities by providing a single point of failure and attack for organized
criminal networks.
Select one:
True
False
Question 13
Answer saved
The capture and misuse of credentials, such as user’s IDs and passwords, is one of the foundation skills hackers use to execute
numerous types of cyberthreats, such as phishing, leaving organizations open to data breaches.
Select one:
True
False
https://courses.campbellsville.edu/mod/quiz/attempt.php?attempt=2392107&cmid=3465209&page=2#question-2436678-14 1/2
15/10/2022, 11:56 Quiz 2-12e chapters 4-7 (page 3 of 5)
Question 14
Answer saved
The integration of two or more data sets from various business systems and external sources without relying on the middle step
of ETL (extract, transform, and load) into a data warehouse or help from IT refers to:
Select one:
a. Dashboard
b. Data science
c. Data mashup
d. Data visualization
Clear my choice
Question 15
Answer saved
_______ is the process of reading input text such as an address and converting it to output in the form of a latitude/longitude
coordinate.
Select one:
a. Affinity analysis
b. Geocoding
c. Text mining
d. Augmented reality
Clear my choice
https://courses.campbellsville.edu/mod/quiz/attempt.php?attempt=2392107&cmid=3465209&page=2#question-2436678-14 2/2