Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

1. In the context of network effects, the term network refers to either wired or wireless systems that connect computing components True False 2. Network

1. In the context of network effects, the term "network" refers to either wired or wireless systems that connect computing components

  1. True
  2. False

2. Network effects do not influence all consumer products or services.

  1. True
  2. False

3. In the absence of network effects, the value of a product or service increases as the number of users grows.

  1. True
  2. Fase

4. High switching costs serve to weaken the value of network effects as a value asset.

  1. True
  2. False

5. The higher the value of a user's overall investment, the more they are likely to consider the staying power of any offering before choosing to adopt it.

  1. True
  2. False

6. A firm can spend no money and time, yet expect to enhance its offerings, by:

  1. outsourcing critical processes to third parties.
  2. going public through an initial public stock offering.
  3. preannouncing a forthcoming product to lower sales of current offerings.
  4. adopting an envelopment strategy.
  5. allowing other firms to contribute to its platform.

7. What are the primary sources of value for network effects? Give a brief description of how each of these factors provides value for network effects.

8. Firms classified as being part of the sharing economy and collaborative consumption are still considered too risky to attract substantial venture capital investment.

  1. True
  2. False

9. Which of the following isnottrue regarding the competitive dynamics of most sharing economy marketplaces?

  1. These are two-sided markets.
  2. None of the above - all statements are true.
  3. Ratings represent a switching cost built over time by early participants in sharing economy marketplaces.
  4. Network effects should grow over time, favoring firms that got a successful, early start over rivals who arrived late doing the same thing.
  5. Late-movers have a substantial advantage in this market since inventory should be cheaper to acquire for those firms that have entered markets more recently.

10. Another major concern for firms in the sharing economy is uncertainty around the ability of these firms to continue to consider their workers as ____________ and not employees.

  1. liabilities
  2. none of the above
  3. investors
  4. critics
  5. independent contractors

11. A research scientist with a major pharmaceutical firm in New Jersey is caught passing on sensitive information, worth millions of dollars, regarding the composition and test results of his firm's latest drug to a rival company. What crime is he being held responsible for?

1. Cyber-fraud

2. Corporate espionage

3. Carrying out technology disruptions

4. Extortion

5. Illegal funds transfer

An attack on the US power grid by terrorists or a foreign power is indicative of:

1. espionage.

2. phishing.

3. extortion.

4. DDoS attacks.

5. cyberwarfare.

Which of these would be an example of a DDoS attack?

  1. Launching a targeted phishing campaign on a department of defense or other surveillance network.
  2. An extortion attempt where hackers threaten to reveal names and social security information stolen from medical records databases
  3. Overloading a popular social networking site with inbound messages in order to shut down access to the site.
  4. Launching tough-to-track click-fraud efforts
  5. Stealing proprietary data directly from mobile phones using a distributed network of difficult-to-trace online services.

One of the reasons one should be careful about clicking on any URL in an e-mail is that hackers can easily embed a redirection in e-mail links, rerouting a user to an alternate online destination.

  1. True
  2. False

Spear phishing attacks specifically target a given organization or group of users.

1. True

2. False

Because of Moore's Law, widely-used encryption programs currently employed by banks and ecommerce sites are now easily penetrated by brute-force attacks that can be employed by hackers using just a handful of simple desktop computers.

1. True

2. False

Which of the following statements holds true for the term spoof?

1. It refers to e-mail transmissions and packets that have been altered to seem as if they came from another source.

2. It refers to scrambling data using a code or formula, known as a cipher, such that it is hidden from those who do not have the unlocking key.

3. It refers to a seemingly tempting, but bogus target meant to draw hacking attempts.

4. It refers to highly restrictive programs that permit communication only with approved entities and/or in an approved manner.

5. It refers to a con executed using technology, typically targeted at acquiring sensitive information or tricking someone into installing malicious software.

Which of the following statements holds true for the term encryption?

  1. It refers to a seemingly tempting, but bogus target meant to draw hacking attempts.
  2. It refers to e-mail transmissions and packets that have been altered to seem as if they came from another source.
  3. It refers to highly restrictive programs that permit communication only with approved entities and/or in an approved manner.
  4. It refers to scrambling data using a code or formula, known as a cipher, such that it is hidden from those who do not have the unlocking key.
  5. It refers to a con executed using technology, typically targeted at acquiring sensitive information or tricking someone into installing malicious software.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Business Management

Authors: Lokyie Lomine, Martin Mwenda Muchena, Robert Pierce

1st Edition

1382016832, 978-1382016834

More Books

Students also viewed these General Management questions

Question

If you had her job, how would you prevent these?

Answered: 1 week ago

Question

3.2 Discuss the strategic importance of technology in HRM.

Answered: 1 week ago