digm3325 exam 1
Identify a topology used by traditional mainframe networks.
A hierarchical topology
Which of the following intentional computer and network threats is a type of Trojan program used to release a virus, worm, or other destructive code?
A logic bomb
_____ is a set of rules that governs data communication, including error detection, message length, and transmission speed.
A protocol
_____ is a type of data encryption that enables users of the Internet to securely and privately exchange data through the use of a pair of keys that is obtained from a trusted authority and shared through that authority.
A public key infrastructure
_____ allows data to be stored in multiple places to improve a system's reliability.
A redundant array of independent disks
_____ is a form of spyware that collects information about a user (without the user's consent) to determine which commercials to display in the user's Web browser.
Adware
Distributed processing maintains decentralized control and centralized operations.
False Distributed processing maintains centralized control and decentralized operations.
Any computer that stores hypermedia documents and makes them available to other computers on the Internet is called a client.
False It is called a server, not a client
The fulfillment function of the business-to-consumer (B2C) e-commerce cycle is responsible for secured electronic payments.
False It is responsible for delivering products or services to customers.
Level 1 security protects back-end systems to ensure confidentiality, accuracy, and integrity of data.
False Level 2, not Level 1
True or False: In designing a management information system (MIS), the first task is to collect data and analyze it.
False The first task is to clearly define the system's objectives.
True or False: The arithmetic logic unit and the control unit are part of the Basic Input/Output System.
False They are part of the central processing unit.
Which is essential for information to be useful?
Relevance
_____ is an example of antispyware software.
STOPzilla
In data encryption, the https in a browser address bar indicates a safe HTTP connection over _____.
Secure Sockets Layer
A common way to index and link databases is by using _____.
Social Security numbers
_____ is a voice-grade transmission channel capable of transmitting a maximum of 56,000 bps.
Narrowband
Which principle states that Internet service providers (ISPs) and government agencies should treat all data on the Internet equally?
Net neutrality
Internet Protocol (IP) operates at the _____ of the Open Systems Interconnection (OSI) model.
Network layer
Which is a supporting activity in a value chain?
Technological development
Which of the following is true of mobile commerce (m-commerce) applications?
They are supported by short-range wireless communication technologies.
Which statement is true of geographic top-level domains (TLDs)?
They are used to promote business and tourism.
Which statement is true of extranets?
They facilitate information exchange among business partners.
Which is true of virtual organizations?
They let independent suppliers share skills and have access to each other's markets via information technologies.
Identify a true statement about the different forms of sender and receiver devices.
Thin clients have no processing power.
In the context of the technologies developed to improve the efficiency and quality of digital communications, _____ divides each channel into six time slots.
Time Division Multiple Access
If a drive in a redundant array of independent disks (RAID) system fails, data stored on it can be reconstructed from data stored on the remaining drives.
True
Terminal resource security is a software feature that erases the screen and signs a user off automatically after a specified length of inactivity.
True
Terrestrial microwave systems use Earth-based transmitters and receivers for transmitting data.
True
The World Wide Web changed the Internet by introducing a graphical interface to the largely text-based Internet.
True
With employee-monitoring systems, managers can supervise employees' work speeds.
True
_____ is a technique that combines the strongest features of Wired Equivalent Privacy (WEP) and Extensible Authentication Protocol (EAP) techniques and helps improve the security of wireless networks.
Wi-Fi Protected Access
In the context of Web and network privacy issues, new employees in an organization have to sign a(n) _____ before they access the network.
acceptable use policy
In the context of Web and network privacy, _____ refers to issues involving both the user's and the organization's responsibilities and liabilities.
accountability
In a level 2 security system, _____ must be protected to ensure confidentiality, accuracy, and integrity of data.
back-end systems
A _____ is a type of an intentional computer and network threat.
backdoor
A _____ is a journal or newsletter that is updated frequently and intended for the general public.
blog
Ryan, an employee of Widget Corp., makes and sells customized paper notebooks. He uses the company's intranet to advertise the notebooks and sell them to the employees of the company. This is an example of _____ e-commerce.
consumer-to-consumer
The _____ tells the computer what to do, such as instructing the computer which device to read or send output to.
control unit
In data communication, _____ refers to integrating voice, video, and data so that multimedia information can be used for decision making.
convergence
E-commune, an e-commerce company, uses small text files with unique ID tags to collect users' data. These text files are embedded in a Web browser and saved on the user's hard drive. They make it possible for E-commune to customize its Web page for its customers. Given this information, it can be concluded that E-commune uses _____ to collect data.
cookies
Intranets are also called _____.
corporate portals
In the context of intentional computer and network threats, a _____ floods a network or server with service requests to prevent legitimate users' access to the system.
denial-of-service attack (DoS)
Information technology and the Internet have, in essence, resulted in two groups-the information rich and the information poor. This gap between the two groups is called _____.
digital divide
Job deskilling occurs when _____.
experienced labor is eliminated by high technology.
In the universal resource locator (URL) https://www.exsat.org, the domain name is _____.
exsat.org
A(n) _____ is a secure network that uses the Internet and Web technologies to connect intranets of business partners so that communication between organizations is possible.
extranet
When planning a comprehensive security system, the first step is designing _____, which use a combination of hardware and software for improving reliability, a way of ensuring availability in case of a system failure.
fault-tolerant systems
In the 1997 Reno v. ACLU case, the U.S. Supreme Court unanimously voted to strike down the anti-indecency provisions of the Communications Decency Act (CDA) because they violated the _____.
freedom of speech provisions of the First Amendment.
A _____ works well for companies that are geographically dispersed.
hierarchical topology
A data _____ is the structure and organization of data, which involves fields, records, and files.
hierarchy
URL _____ is a technique that relies on typographical errors made by Web users when typing a Web site address into a Web browser.
hijacking
In the context of Web marketing, any element of a Web page that is clicked counts as a _____ to a server.
hit
Local area networks (LANs) are used to _____.
integrate services to a single building or campus
Second-generation computers used _____.
integrated circuits
In the context of computer and network security, _____ refers to the accuracy of information resources within an organization.
integrity
A(n) _____ is a common output device for soft copy.
liquid crystal display
In the context of intellectual property, _____ are categorized as industrial property.
logos
A _____ is a network operating on a radio frequency (RF), consisting of radio cells, each served by a fixed transmitter.
mobile network
A(n) _____ is a device that connects a user to the Internet.
modem
A _____ is a hardware device that allows several nodes to share one communication channel.
multiplexer
In a(n) _____, each record can have multiple parent and child records.
network model
The main function of Cyber Incident Response Capability (CIRC) is to _____.
provide information on security incidents
In a relational database model, which operation searches data in a table and retrieves records based on certain criteria?
select operation
A _____ is an intellectual property that protects product names and identifying marks.
trademark
Price _____, in e-commerce, means all market participants can trade at the same price.
transparency
A hierarchical topology is also called a _____ topology.
tree
A _____ consists of self-propagating program code that is triggered by a specified time or event.
virus
A _____ is a type of Web site that allows users to add, delete, and sometimes modify content.
wiki
Code Red, Melissa, and Sasser are examples of _____.
worms
Which is a generic top-level domain (TLD) name used for backbone, regional, and commercial networks?
.net
Auction fraud is sending fraudulent e-mails that seem to come from legitimate sources, such as a bank or university.
False Phishing, not auction fraud
In the context of intentional computer and network threats, social engineers protects the integrity of information resources.
False Social engineering takes advantage of the human element of security to steal data
True or False: The hardware component of a computer system consists of programs written in computer languages.
False Software, not hardware
True or False: Because sending spam is expensive, a small response-a fraction of a percent, for example-is an inadequate return on the investment.
False Spam is inexpensive, so even a small response is a worthwhile return.
The bus topology connects nodes along a network segment, with the ends connected in a manner similar to a ring topology.
False The ends are not connected
Identify a true statement about virtual medicine on the Internet.
It enables specialists at major hospitals to operate on patients remotely.
In the context of using information technologies for a competitive advantage, which statement is true of a bottom- line strategy?
It focuses on improving efficiency by reducing overall costs.
Voice over Internet Protocol (VoIP) is used to route traffic starting and ending at conventional public switched telephone network phones.
True
_____ are networks of independent companies, suppliers, customers, and manufacturers connected via information technologies so that they can share skills and costs and have access to each other's markets.
Virtual organizations
Which statement is true of Extensible Markup Language (XML)?
XML tags represent the kind of content being posted and transmitted.
In the context of information privacy, which of the following is true of spam?
It is sent in bulk using automated mailing software.
Which statement is true of asymmetric encryption?
It requires a large amount of processing power.
In the context of data communication, which is true of convergence?
It requires major network upgrades, because video requires much more bandwidth.
Which is true of magnetic tape?
It stores data sequentially.
In the context of the common intentional security threats, which statement best describes a worm?
It travels from computer to computer in a network, but it does not usually erase data.
Which problem is resolved by distributed processing?
Lack of responsiveness in centralized processing
_____ are compatible with the IBM System/360 line introduced in 1965.
Mainframe computers
The Committee on National Security Systems (CNSS) proposed a model known as the _____ for evaluating information security.
McCumber cube
_____ is a method for advertisers to pay for cost per view or cost per click, which is typically one-tenth of a cent.
Micropayment
Which is a key factor that has contributed to the growth and popularity of big data?
Mobile and wireless technology
_____ is a primary activity in a value chain that involves processing raw materials into finished goods and services.
Operations
Service and support are more important in e-commerce than in traditional commerce because e-commerce companies _____.
do not have a physical location to help maintain current customers
In the context of the seller-side marketplace model, _____ prevents purchases from suppliers that are not on the approved list of sellers.
e-procurement
In order to overcome concerns about hackers getting access to the accounts of online shoppers, electronic payment systems such as _____ are being developed.
e-wallets
For a business that is properly designing and using a social media information system (SMIS), the SMIS would most likely:
enable it to share new and dynamic contents with customers in real time.
Tax filing and payments; completing, submitting, and downloading forms; and requests for records are all categorized as _____.
government-to-citizen
In the context of e-government applications, e-training for government officials is categorized as a _____ application.
government-to-employee
In the context of e-government applications, crisis response is categorized as a _____ application.
government-to-government
Buyline is an e-commerce Web site. It has come up with a promotional offer where buyers get a 60 percent discount on refrigerators if a minimum of 100 buyers agree to buy the product within 24 hours of the offer being announced. In this case, it is evident that BuyLine is a _____.
group buying platform
The embedded references in hypermedia documents are called _____.
hypertext
E-commerce activities that take place within an organization's data communication network are part of _____ e- commerce.
intrabusiness
Gallium arsenide _____ than silicon.
is more fragile
Housed at server farms, search engines use _____ to index data coming in from crawlers.
keywords
In the context of data communication, a _____ is based on "line of sight."
satellite
A _____ is an information system that enables users to retrieve data from the Web by using keywords related to their topic of interest.
search engine
Which type of access control is used to protect systems from unauthorized access?
Passwords
_____ is a popular online payment system used on many online auction sites.
PayPal
_____ are community-based marketplaces that enable individuals to communicate directly with each other and conduct e-commerce operations.
Peer-to-peer e-commerce platforms
Which healthcare system can make interactive medical tools available to the public?
Personal health information systems
_____ primarily control access to computers and networks and include devices for securing computers and peripherals from theft.
Physical security measures
Joey, a businessman, designs cases and covers for cell phones. He wishes to showcase his products so that more people know about his work. Which will help Joey promote his products?
In the context of Internet services, which protocol is used for retrieving messages?
Post Office Protocol
Which is a country code top-level domain?
.fr
An Extended ASCII data code allows representation of maximum _____ characters.
256
A petabyte is equal to _____ bytes.
2^50
_____ aggregate customers' opinions related to products or services that they have purchased and then suggest them to others with the same interest.
Recommendation Web sites
_____ is a commonly used encryption protocol that manages transmission security on the Internet.
Secure Sockets Layer
_____ is a primary activity in Michael Porter's value chain.
Service
Which are not allowed in domain names?
Spaces
_____ is an attempt to gain access to a network by posing as an authorized user in order to find sensitive information, such as passwords and credit card information.
Spoofing
Which security measure uses a physiological element that is unique to a person and cannot be stolen, lost, copied, or passed on to others?
A biometric security measure
Identify the type of computers that has the highest storage capability.
Supercomputers
_____ is the physical link between a network and a workstation.
An adapter card
Which is a type of interorganizational system?
An extranet
Which statement is true of the types of client/server architectures?
An n-tier architecture helps improve network performance.
_____ is an example of a secondary memory device.
An optical disc
_____, also known as virtual work, has enabled some people to perform their jobs from home.
Telecommuting
Which is a smart device that can tell the user's heart rate and lung capacity?
The Under Armour Armour39 shirt
The _____ layer of the Open Systems Interconnection (OSI) model provides services that support users' tasks, such as file transfers, database access, and e-mail.
Application
_____ uses a public key known to everyone and a private key known only to the recipient.
Asymmetric encryption
_____ is the loss of power in a signal as it travels from the sending device to the receiving device.
Attenuation
_____ is the unauthorized use of system data for personal gain, such as transferring money from another's account or charging purchases to someone else's account.
Computer fraud
_____ laws give only the creator exclusive privileges, meaning no one else can reproduce, distribute, or perform the literary and artistic work without permission.
Copyright
_____ check to see what links are on the user's Web page and make sure they work; if a link is broken, they identify it and include this information as part of the data about that page.
Crawlers
_____, software used by search engines, can go through the other pages that are part of your Web site, as long as there are links to those pages.
Crawlers
_____ is a high-speed carrier service that uses ordinary phone circuits to send and receive data.
Digital subscriber line
_____ are indexes of information, based on keywords embedded in documents, that allow search engines to find what Internet users are looking for.
Directories
_____ are usually formed for people to exchange opinions and ideas on a specific topic, usually of a technical or scholarly nature.
Discussion groups
_____ are used to connect computers, hubs, switches, and routers to a network in a local area network (LAN).
Ethernet cables
A virtual organization needs an organizational hierarchy for participants to contribute their expertise.
False
Application-filtering firewalls are less expensive than packet-filtering firewalls.
False
Combinations of spaces and special characters can be used in domain names of uniform resource locators (URLs).
False
Government and nonbusiness organizations are prohibited from using e-commerce applications.
False
In a centralized processing system, processing power is distributed among several locations.
False
In the context of directories on the Web, a human-powered directory uses crawlers to collect data.
False
The use of e-wallets is restricted to nonportable devices.
False
True or False: Computers cannot store massive amounts of data in small spaces.
False
True or False: E-wallets and smart cards increase the risks of exposing consumers' information on the Web.
False
When using mirror disks, if one of the two disks containing the same data fails, the other disk also fails.
False
In the context of mobile networking, 3G networks have decreased the quality of Internet telephony or Voice over Internet Protocol (VoIP).
False 3G networks increased the quality
A ring topology needs more cables to connect the nodes within a network than a star topology.
False A ring topology needs less cable than a star topology
The third-party exchange marketplace model is controlled by sellers and buyers.
False A third-party exchange marketplace model is controlled by a third-party.
True or False: In network-attached storage (NAS), as the number of users increases, its performance increases.
False As the number of users increase, its performance decreases.
Click-and-brick e-commerce struggles to incorporate online interaction.
False Click-and-brick e-commerce capitalizes on the advantages of online interaction.
True or False: Data in a database is used for analytical purposes, whereas data in a data warehouse is used for capturing and managing transactions.
False Data warehouse = analytical purposes Database = capturing and managing transactions
Mobile commerce (m-commerce) predominantly relies on voice recognition and text-to-speech technologies.
False M-commerce relies on WWANs, 3G/4G Networks, and short-range wireless communication.
In the context of directories on the Web, Open Directory is an example of an automated directory.
False Open Directory is an example of a human-powered directory.
Protocols are devices that connect users to the Internet.
False Protocols are rules that govern data communication
True or False: Database marketing works by using multivariate analysis, data segmentation, and automated tools to transform marketing from a proactive to a reactive process.
False Reactive to proactive process
One of the ways in which green computing can be achieved is by replacing meetings over computer networks with actual face-to-face meetings.
False Replace face-to-face meetings w/ meetings over computer networks
Social engineering is an attack that takes advantage of the backdoors in security systems.
False Social engineering takes advantage of the human element of security
True or False: In the context of information systems jobs, a database administrator is responsible for developing an entire information system by writing computer programs.
False (computer programmer)
_____ include gallium arsenide chips that run at higher speeds and consume less power than silicon chips and optical technologies.
Fifth-generation computers
Truzan Creations, one of the leading names in the handicraft industry, recently launched a new artifact in the market. The company uses a database to store information on the number of products manufactured, the weekly sales, the list of suppliers, and the profits achieved. The process component of the information system is used to conduct analysis on the data to generate information about sales. Which can be used by Truzan Creations to generate predictions for its next sales period?
Forecasting models
Which of the following statements is true of the data component of an information system?
Future data is predicted for budgets or cash flow reports.
What kind of computing promotes a sustainable environment and consumes the least amount of energy?
Green computing
Which biometric security measure compares the length of each finger, the translucence of fingertips, and the webbing between fingers against stored data to verify users' identities?
Hand geometry
_____ is a supporting activity in Michael Porter's value chain.
Human resource management
Which can help offset the digital divide?
Increasing the number of computers in public places
_____, used in object-oriented databases, refers to new objects being created faster and more easily by entering new data in attributes.
Inheritance
_____ is a legal umbrella covering protections that involve copyrights, trademarks, trade secrets, and patents for "creations of the mind" developed by people or businesses.
Intellectual property
When information is transferred from one network to another, domain names are converted to _____ by the Domain Name System (DNS) protocol.
Internet Protocol addresses
_____ is an Internet service that enables users in chat rooms to exchange text messages with people in other locations in real time.
Internet Relay Chat
The _____ refers to the physical objects that are connected to the Internet and, therefore, to all the other physical objects.
Internet of Things
_____ is a service that uses the Internet rather than the telephone network to exchange spoken conversations.
Internet telephony
Identify a true statement about information and communications technology (ICT).
It generates approximately two percent of the world's carbon dioxide emissions.
Identify an advantage of the bus topology.
It handles steady traffic well.
Identify a true statement about information technology.
It has cut down production costs.
Which statement is true of an intranet?
It helps organizations move from a calendar-based document-publishing strategy to one that is based on events.
Which is a potential benefit of telecommuting?
It increases productivity.
Which statement is true of phishing?
It involves sending fraudulent e-mails that seem to come from legitimate sources.
The protocol that is used for Internet telephony is _____.
Voice over Internet Protocol
_____ relies on text-to-speech technologies.
Voice-based e-commerce
The Internet is playing an important role in helping organizations reduce expenses, because _____.
Web applications can be used with minimum costs
_____ enables a user to access his or her e-mail account from any computer and, in some cases, store the e-mails on a Web server.
Web-based e-mail
Mobile commerce (m-commerce) is based on the _____.
Wireless Application Protocol
_____ support m-commerce applications.
Wireless wide area networks
Which component of a database management system (DBMS) is used to design elements of an application using a database, such as data entry screens, interactive menus, and interfaces with other programming languages?
application generation
Codes written for one type of computer using _____ do not work on another type of computer.
assembly language
In the context of computer and network security, _____ means a quick recovery in the event of a system failure or disaster.
availability
Bandwidth is often expressed as _____.
bits per second
A _____ is a security threat that may launch a worm through a Trojan horse or launch a denial-of-service attack at a targeted IP address.
blended threat
In the context of intentional computer and network threats, a _____ combines the characteristics of computer viruses, worms, and other malicious codes with vulnerabilities found on public and private networks.
blended threat
According to the 1980 revisions to the Copyright Act of 1976, _____.
both people and organizations can be held liable for unauthorized duplication and use of copyrighted programs
In _____ data transmission, multiple pieces of data are sent simultaneously to increase the transmission rate.
broadband
Electronic data interchange (EDI) and electronic funds transfer (EFT) are forms of _____ e-commerce.
business-to-business
A _____ is initiated by a group of consumers and enables a customer to bid on specific products or make a request for quotation (RFQ) at a common place for selling products.
buyer-side marketplace
By participating in _____, sellers can automate the fulfillment function of business-to-business (B2B) e-commerce.
buyer-side marketplaces
In _____ routing, one node is in charge of selecting the path for all packets.
centralized
Microsoft Outlook is an example of a _____.
client-based e-mail program
Computers requesting hypermedia documents on the Internet are called _____
clients
A similarity between e-commerce and traditional commerce is that both _____.
concentrate on selling products to generate profit.
In the context of computer and network security, _____ means that a system must not allow the disclosing of information by anyone who is not authorized to access it.
confidentiality
Online auction sites that involve business transactions between users of products and services are categorized as _____ e-commerce.
consumer-to-consumer
A level 3 security system focuses on protecting the _____ against intrusion, denial-of-service attacks, and unauthorized access.
corporate network
When a Web page changes, _____ update their indexes and databases automatically to reflect the change.
crawler-based directories
Jack is a gamer, and every time he plays at a gaming center, he pays five dollars using a card that he recharges electronically every week. It is evident that Jack uses _____ as the mode of payment.
e-cash
The Internet backbone is a foundation network linked with _____ cables that can support very high bandwidth.
fiber-optic
A(n) _____ is a combination of hardware and software that acts as a filter or barrier between a private network and external computers or networks.
firewall
The Web organizes information by using _____, meaning documents that include embedded references to audio, text, images, video, or other documents.
hypermedia
Jared makes two copies of an antivirus software package he just bought and sells one of the copies to Joshua. In this scenario, Jared's actions are considered _____.
illegal and unethical
E-commerce sites that use the _____ model collect data on consumers and businesses and then sell this data to other companies for marketing purposes.
infomediary
In the context of computer and network security, a security system is said to possess _____ when it does not allow data to be corrupted or allow unauthorized changes to a corporate database.
integrity
In the context of information technology in workplaces, clerical workers using computers for word-processing tasks is an example of _____.
job upgrading
Alfred, a software programmer at Gamma Inc., develops a program that spreads Trojan viruses to the organization's network. When Liam, his manager, discovers that Alfred had intentionally spread the virus, he immediately fires Alfred. In this scenario, Liam's behavior is considered _____.
legal and ethical
A credit card company sells its customers' mailing addresses to its competitors. In this scenario, the company's action is considered _____.
legal, but unethical
The four Ms of resources in information systems are _____.
manpower, machinery, materials, and money
In data warehouses, _____ is information about data-its content, quality, condition, origin, and other characteristics.
metadata
A _____ is designed to handle data communication for multiple organizations in a city and sometimes nearby cities as well.
metropolitan area network
A routing table lists _____.
nodes on a network
Compared with a star topology, a hierarchical topology _____.
offers a great deal of network control and lower cost.
For each database, there is _____.
only one physical view of data.
A write once, read many (WORM) disc is a common type of _____.
optical storage
A _____ is a collection of binary digits, including message data and control characters for formatting and transmitting, sent from computer to computer over a network.
packet
A _____ is an intellectual property that protects new processes.
patent
A(n) electronic _____ is the electronic exchange of money or scrip.
payment
In the context of the data component of an information system, internal data sources include _____.
personnel records
Syndication feeds are one way of announcing the availability of a _____.
podcast
In the context of Web marketing, _____ are display ads that appear on top of a browser window, blocking the user's view.
pop-up ads
The purpose of an information system's _____ component is generating the most useful type of information for making decisions.
process
In the context of firewall as a nonbiometric security measure, a _____ is software that acts as an intermediary between two systems.
proxy server
What do both Wireless LANs (WLANs) and Wireless WANs (WWANs) rely on as the communication medium?
radio frequency spectrum
The Clipboard's contents are typically stored in _____.
random access memory
A potential benefit of telecommuting is that it _____.
reduces employee turnover
The process of deciding which path data takes on a network is called _____.
routing
A popular application of the _____ model, which is a major business-to-business (B2B) e-commerce model, is e-procurement.
seller-side marketplace
In the context of Web and network privacy, an acceptable use policy is a _____.
set of rules specifying the legal and ethical use of a system and the consequences of noncompliance.
The cost of hiring additional employees in virtual organizations is reduced because _____.
skills are shared among the participating companies
The process of capturing and recording network traffic is referred to as _____.
sniffing
In the context of security, _____ is an attack that takes advantage of the human element of security systems.
social engineering
In the context of information privacy, junk e-mail is also known as _____.
spam
John downloaded Alten Cleaner, a program that poses as a computer registry cleaner, on his computer. Once he installed the program on his computer, the program illegitimately gained access to John's passwords and credit card information. In this scenario, it is evident that John was a victim of _____.
spoofing
Search engines and directories offer space that companies can purchase for advertising purposes. This process is called _____.
spot leasing
In comparison with a flat file system, _____ in a database.
storage space is reduced
Which system is an application of Internet2 (I2) that allows people in different locations to share a virtual environment created on the Web?
teleimmersion
In the bus topology, a hardware device called _____ is used at each end of the cable to absorb the transmitted signal.
terminator
In the context of Web marketing, a cookie is:
the information a Web site stores on a user's hard drive.
The _____ model generates revenue from the fees charged for matching buyers and sellers.
third-party exchange marketplace
When a user accidentally enters an incorrect Web site address, he or she may be directed to an alternative Web site. This is an example of _____.
typosquatting
To minimize the invasion of privacy, users and organizations should _____.
use verification procedures to ensure data accuracy.
To minimize the invasion of privacy, _____.
users should be able to review their records and correct any inaccuracies
Green computing can be achieved by _____.
using video conferencing, electronic meeting systems, and groupware.
Beginning in the 1940s, first-generation computers used _____.
vacuum tube technology
Which concept, introduced by Michael Porter, consists of a series of activities designed to meet business needs by adding cost in each phase of the e-commerce process?
value chain
In the third-party exchange marketplace model, a _____ market concentrates on a specific industry or market.
vertical
In the third-party exchange marketplace model, the sale of medical products is an example of a _____.
vertical market
In the context of information privacy, which is true of cookies?
They provide information about users' location.
In the context of computer literacy and information literacy, which statement is true of knowledge workers?
They should know how data should be indexed and updated.
Which statement is true of laser printers?
They use toners to create high-quality outputs.
In the context of intellectual property, which of the following is categorized as industrial property?
Trademarks
_____ allows the linking of devices running on many different platforms.
Transmission Control Protocol/Internet Protocol
The _____ of the Open Systems Interconnection (OSI) model generates the receiver's address and ensures the integrity of messages by making sure packets are delivered without error, in sequence, and with no loss or duplication.
Transport layer
Transmission Control Protocol operates at the _____ of the Open Systems Interconnection (OSI) model.
Transport layer
In the context of intentional security threats, _____ can erase data and wreak havoc on computers and networks but do not replicate themselves.
Trojan programs
An intranet is an application or service that uses an organization's computer network.
True
An intrusion detection system (IDS) can protect networks against both external and internal access.
True
Copyright laws cover online materials that can be printed or saved on a storage device.
True
Data communication technologies make Web and video conferencing easier, which can reduce the costs of business travel.
True
E-commerce is part of e-business.
True
Ergonomics experts believe that using better-designed furniture can solve many of the health problems related to computer equipment.
True
Hypermedia documents can be stored anywhere in the world.
True
The data transfer speeds of local area networks (LANs) typically range from 100 Mbps to 10 Gbps.
True
True or False: According to the Children's Online Privacy Protection Act (COPPA), any information collected from children must have parental consent.
True
True or False: ENIAC is an example of a first-generation computer.
True
True or False: Information technologies have led to job deskilling.
True
True or False: To be useful, information must be able to integrate with other data and information.
True
Viruses can be transmitted through a network or through e-mail attachments.
True
When a program containing a virus is used, the virus attaches itself to other files, and the cycle continues.
True
When an organization develops a comprehensive security plan, it should set up a security committee with representatives from all departments as well as upper management.
True
Wireless network traffic can be captured with sniffers.
True
Which decision is supported by a financial information system (FIS)?
Determining portfolio structures
_____ is the amount of data that can be transferred from one point to another in one second.
Bandwidth
Which is a nonbiometric security measure?
Callback modems
Which statement is true of Voice over Internet Protocol (VoIP)?
Callers can be screened even with blocked caller IDs.
In the early days of computer technology, which system was justified because data-processing personnel were in short supply, hardware and software were expensive, and only large organizations could afford computers?
Centralized processing
Identify a program used by parents to prevent their children's access to certain Web sites.
CYBERSitter
_____ is a mix of traditional commerce and e-commerce.
Click-and-brick e-commerce
_____ are conducted media that can be used for both data and voice transmissions.
Coaxial cables
In the context of the operators used in a query by example (QBE) form, the _____ is used when only one of the conditions in the QBE form must be met.
OR operator
_____ is a short-range wireless communication technology that acts as a supporting technology for mobile commerce (m-commerce) applications.
Bluetooth
_____ analysis is used to discover patterns and relationships.
Data-mining
Which term is used for unique identifiers of computer or network addresses on the Internet?
Domain names
Which is an example of a client-based e-mail program?
Mozilla Thunderbird
To guard against possible legal ramifications and the consequences of using the Web and networks, an organization usually establishes a(n) _____.
acceptable use policy
In a value chain, service involves _____.
activities to support customers after the sale of products
Which model of e-commerce is an extension of traditional marketing media, such as radio and television?
advertising model
A _____ acts as an interface to a database, retrieving data for users and allowing users to enter data in the database.
data-driven Web site
A(n) _____ , the heart of an information system, is a collection of all relevant facts organized in a series of integrated files.
database
A _____ converts logical requests from users into their physical equivalents by interacting with other components of the database management system (DBMS)
database engine