Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

1. In the context of network effects, the term network refers to either wired or wireless systems that connect computing components. O True O False

1. In the context of network effects, the term "network" refers to either wired or wireless systems that connect computing components. O True O False 2. Network effects do not influence all consumer products or services. O True O False 3. In the absence of network effects, the value of a product or service increases as the number of users grows. O True O False 4. High switching costs serve to weaken the value of network effects as a value asset. O True O False 5. The higher the value of a user's overall investment, the more they are likely to consider the staying power of any offering before choosing to adopt it. O True O False 6. A firm can spend no money and time, vet expect to enhance its offerings, by: O outsourcing critical processes to third parties. O adopting an envelopment strategy. O going public through an initial public stock offering. O preannouncing a forthcoming product to lower sales of current offerings. O allowing other firms to contribute to its platform. 7. 8. Firms classified as being part of the sharing economy and collaborative consumption are still considered too risky to attract substantial venture capital investment. O True O False 9. Which of the following is not true regarding the competitive dynamics of most sharing economy marketplaces? O Ratings represent a switching cost built over time by early participants in sharing economy marketplaces. O These are two-sided markets. O Network effects should grow over time, favoring firms that got a successful, early start over rivals who arrived late doing the same thing. O None of the above - all statements are true. O Late-movers have a substantial advantage in this market since inventory should be cheaper to acquire for those firms that have entered markets more recently. 10. Another maior concern for firms in the sharing economy is uncertainty around the ability of these firms to continue to consider their workers as and not employees. O liabilities O independent contractors O none of the above O critics O investors 11. A research scientist with a major pharmaceutical firm in New Jersey is caught passing on sensitive information, worth millions of dollars, regarding the composition and test results of his firm's latest drug to a rival company. What crime is he being held responsible for? O Cyber-fraud O Carrying out technology disruptions O Corporate espionage O Illegal funds transfer 12. An attack on the US power grid by terrorists or a foreign power is indicative of: O espionage. O phishing. O cyberwarfare. O DoS attacks. O extortion. O Extortion 13. Which of these would be an example of a DDoS attack? O Overloading a popular social networking site with inbound messages in order to shut down access to the site. O Launching tough-to-track click-fraud efforts O Launching a targeted phishing campaign on a department of defense or other surveillance network. O Stealing proprietary data directly from mobile phones using a distributed network of difficult-to-trace online services. O An extortion attempt where hackers threaten to reveal names and social security information stolen from medical records databases 14. One of the reasons one should be careful about clicking on any URL in an e-mail is that hackers can easily embed a redirection in e-mail links, rerouting a user to an alternate online destination. O True O False 15. Spear phishing attacks specifically target a given organization or group of users. O True O False 16. Because of Moore's Law, widely-used encryption programs currently employed by banks and ecommerce sites are now easily penetrated by brute-force attacks that can be employed by hackers using just a handful of simple desktop computers. O True O False 17. Which of the following statements holds true for the term spoof? O It refers to e-mail transmissions and packets that have been altered to seem as if they came from another source. O It refers to highly restrictive programs that permit communication only with approved entities and/or in an approved manner. O It refers to a con executed using technology, typically targeted at acquiring sensitive information or tricking someone into installing malicious software. O It refers to a seemingly tempting, but bogus target meant to draw hacking attempts. O It refers to scrambling data using a code or formula, known as a cipher, such that it is hidden from those who do not have the unlocking key. 18. Which of the following statements holds true for the term encryption? O It refers to e-mail transmissions and packets that have been altered to seem as if they came from another source. O It refers to a seemingly tempting, but bogus target meant to draw hacking attempts. O It refers to scrambling data using a code or formula, known as a cipher, such that it is hidden from those who do not have the unlocking key. O It refers to highly restrictive programs that permit communication only with approved entities and/or in an approved manner. O It refers to a con executed using technology, typically targeted at acquiring sensitive information or tricking someone into installing malicious software

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access with AI-Powered Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Advanced Accounting

Authors: Gail Fayerman

1st Canadian Edition

9781118774113, 1118774116, 111803791X, 978-1118037911

Students also viewed these General Management questions