IS Exam 2

¡Supera tus tareas y exámenes ahora con Quizwiz!

Ratings, reviews, and recommendations Are always provided by businesses on their Web site. Are posted by experts. Are posted without compensation. Are an aspect of social shopping. Are not beneficial to the business

Are an aspect of social shopping.

Intelligent agents: Assist in performing repetitive computer-related tasks. Do not cross over with any of the other types of intelligent systems. Are still in the design stages. Do not integrate directly with tasks, but rather with users.

Assist in performing repetitive computer-related tasks.

What area of e-commerce is especially conducive to fraud? Auctions. Online Storefronts. E-mail. Advertisements.

Auctions.

_____ is a wireless standard that enables temporary, short-range connection between mobile devices. Bluetooth Wireless application protocol Short message service Wi-Fi Global positioning system

Bluetooth

_______ e-commerce is also known as e-tailing. Business-to-business Collaborative commerce Intrabusiness Business-to-consumer Consumer-to-business

Business-to-consumer

_____ refers to efforts by unauthorized users to access data traveling over wireless networks. RF jamming War driving Eavesdropping Telemetry Installing rogue access devices

Eavesdropping

_____, which is a broader concept than _____, is the buying and selling of goods and services, as well as servicing customers, collaborating with business partners, and performing transactions within an organization. Business-to-business electronic commerce, business-to-customer electronic commerce Electronic commerce, electronic business Business-to-customer electronic commerce, business-to-business electronic commerce Business-to-business electronic commerce, intrabusiness electronic commerce Electronic business, electronic commerce

Electronic business, electronic commerce

_____ are a payment mechanism that are similar to regular bank checks but are transmitted electronically, with a signature in digital form. Electronic checks Electronic credit cards Electronic cash transactions Electronic wallets Electronic debit cards

Electronic checks

_____ use credit card numbers, transmitted electronically over the Internet, to pay for goods and services. They are either unencrypted or encrypted, with coded data readable by an intermediary between the buyer's and seller's banks. Electronic checks Electronic credit cards Electronic cash transactions Electronic wallets Electronic debit cards

Electronic credit cards

A business that wants to create a forum allowing employees to interact with coworkers would benefit from utilizing__________. RSS Mashups Enterprise Social Networks Microblogs

Enterprise Social Networks

Using fuzzy logic, two values will be considered the same even if They are in different data ranges. Only if they are within 10 data points of each other. Only if they are within a factor of 2 of each other. Even if they are at the extreme ends of a particular data range.

Even if they are at the extreme ends of a particular data range.

Although rogue access devices can be installed innocently, they can also be installed by an attacker trying to gain unauthorized access to a wireless network. In such cases, these devices are called an _____. Unencrypted node Evil twin Open node Illegal server Unauthorized rogue access point

Evil twin

The major problem with RFID has been _______. Expense Bandwidth Location RFID readers

Expense

The area of the earth reached by a satellite's transmission is referred to as its _____. Hotspot Coverage Footprint Zone Wireless area

Footprint

Banner advertising: Is sent directly to potential customers via e-mail. Forces customers to click on an ad to get more information. Is of limited value because it cannot be customized to the target audience. Is another name for pop-up advertising.

Forces customers to click on an ad to get more information.

_____ refer(s) to computer reasoning that deals with uncertainties by simulating the process of human reasoning. Expert systems Artificial neural networks Speech understanding systems Fuzzy logic Computer vision systems

Fuzzy logic

A genetic algorithm: Is a method of problem solving that involves only one step. Generates increasingly better solutions to a problem. Converts inputs directly to outputs. Decreases the number of babies conceived with genetic deficiencies.

Generates increasingly better solutions to a problem.

Which type of satellite has the largest footprint? Low-earth-orbit Medium-earth-orbit Geostationary Polar orbit Equatorial orbit

Geostationary

_____ is a satellite-based tracking system that enables users to determine a person's position. Bluetooth Wireless application protocol Short message service Wi-Fi Global positioning system

Global positioning system

Which of the following is not an example of social shopping? Group shopping Going to Amazon.com to buy a book Shopping communities and clubs Social marketplaces Peer-to-peer shopping models

Going to Amazon.com to buy a book

Groupon is an example of ________________ Shopping communities and clubs Social marketplace Group shopping Peer-to-peer shopping Collaborative consumption

Group shopping

With regard to mobile computing, _____ means that knowing where a user is physically located is a key to offering relevant products and services. Ubiquity Convenience Instant connectivity Personalization Localization of products and services

Localization of products and services

Putting ads on top of taxicabs in New York City that change as the cabs travel around the city is an example of ________. Viral marketing Permission advertising Geographical advertising Location-based advertising Direct marketing

Location-based advertising

Which of the following is a lure of e-commerce? Limited number of products offered to customers. Easy fulfillment. Lower transaction costs. No returns.

Lower transaction costs.

Artificial Intelligence is exemplified when Machines can think. Machines are smarter than people are. Machines show the ability to learn. All of these answers are correct.

Machines show the ability to learn.

Which of the following wireless broadcast media do global positioning systems (GPSs) use? RFID chips and readers to track automobiles Microwave signals to determine longitude and latitude of objects Radio signals to determine positions and to "talk" to drivers with directions Medium earth orbit (MEO) satellites

Medium earth orbit (MEO) satellites

_____ networks use multiple Wi-Fi access points to create a wide area network. Mesh Pervasive Global Fixed Ubiquitous

Mesh

The two major characteristics that differentiate mobile computing from other forms of computing are ______ and ________. Mobility, broad reach Mobility, lack of expense Security, broad reach Security, mobility Broad reach, localization

Mobility, broad reach

Predictive agents are also called: Monitoring and surveillance agents. Personal agents. Information agents. Genetic agents.

Monitoring and surveillance agents.

_____, with the shortest range of any wireless network, is designed to be used with contactless credit cards. Near-field communications Bluetooth Ultra-wideband Wi-Fi Infrared

Near-field communications

Monitoring and surveillance agents: Are utilized primarily by law enforcement and intelligence agencies. Observe and report an item of interest. Are a type of shopping bot. Can be employed only by certified users.

Observe and report an item of interest.

Pure-play organizations: Only sell their products in traditional brick-and-mortar stores. Sell their products both online and in traditional brick-and-mortar stores. Only sell their products online. Only sell their products to other businesses.

Only sell their products online.

Which of the following social shopping methods contributes to environmental sustainability? Group shopping Peer-to-peer shopping Shopping clubs Social marketplaces

Peer-to-peer shopping

_____ offer(s) consumers incentives to accept advertising and e-mail voluntarily. Viral marketing Personalized marketing Permission marketing Paper catalogs Direct mail

Permission marketing

_____ enable two individuals to transfer funds without using a credit card. Electronic checks Stored-value money cards Purchasing cards Smart cards Person-to-person payments

Person-to-person payments

Unfortunately, many managers consider smart phones as only _____, rather than as _____ that can transmit wirelessly. Phones, digital cameras Phones, pagers Digital cameras, phones Digital cameras, pagers Cheap, expensive devices

Phones, digital cameras

Genetic algorithms: Determine what a good solution is. Process more possibilities than a human can. Require more time than human decision making due to the lengthy decision-making process. Produce the correct solution 75% of the time.

Process more possibilities than a human can.

Which of the following is not one of the three layers of a neural network? Input layer. Processing layer. Middle Layer. Output layer.

Processing layer.

The greatest problem with GEO satellites is which of the following? Propagation delay Expense Orbital life Size of the footprint Relative speed with respect to a point on the earth's surface

Propagation delay

_____ are typically used for unplanned B2B purchases for amounts under $2000. Electronic checks Stored-value money cards Purchasing cards Smart cards Person-to-person payments

Purchasing cards

Watson can be best be described as a(n): Research engine. Analytical tool. Question-answering system. Information-processing system.

Question-answering system.

In _____, a person or a device intentionally or unintentionally interferes with your wireless network transmissions. RF jamming War driving Eavesdropping Telemetry Installing rogue access devices

RF jamming

Which of the following tools are not used by marketing professionals to compile market research? Blogs Wikis Online forums Social networking sites RSS

RSS

All of the following wireless media require an unobstructed line of sight except Microwave Satellite Radio Infrared

Radio

Which of the following is not an advantage of radio? No metallic wires are needed. Radio waves propagate easily through office walls. Radio devices are inexpensive. Radio waves do not create electrical interference problems. Radio devices are easy to install.

Radio waves do not create electrical interference problems.

The generic term for technologies that use radio waves to automatically identify individual items is __________. Telemetry Bar codes Shipping labels Radio-frequency identification Wireless access points

Radio-frequency identification

_____ is the science that measures physical remoteness by means of wireless transmission from a remote source to a receiving station. Telemetry Wireless access point Near-field communications Microwave Wireless positioning

Telemetry

Which of the following statements concerning expert systems is false? The knowledge base contains facts. The knowledge base contains rules. An expert system can explain its recommendation. The blackboard displays the recommendation. Expert systems cannot learn from their own mistakes.

The blackboard displays the recommendation.

Which of the following is not inhibiting faster Wi-Fi expansion? Users cannot roam from hotspot to hotspot if the hotspots use different Wi-Fi network services. A lack of security. The growth of WiMAX Unless the service is free, users have to log on to separate accounts for each hotspot. Wi-Fi services may not survive in the face of free hotspot access.

The growth of WiMAX

Of the following, which is the major problem with smart phones? They are too slow. They are too expensive. They can be used to compromise security. Their screens are too small. Their browsers are not fully functional.

They can be used to compromise security.

Which of the following is not a limitation of barcodes? They require line-of-sight to the scanning device. They are printed on paper. They identify the manufacturer, product, and item. They are difficult to use in a manufacturing plant. They are useless in determining expiration date.

They identify the manufacturer, product, and item.

Social computing has allowed customers To be advocates and influencers. To continue to have to be passive with their interactions with companies To be forced to interact more often with customer service. To be restricted to only posting positive feedback about products.

To be advocates and influencers.

Which of the following is not an intelligent agent? Surveillance agent. Monitoring agent. User agent. Information agent.

User agent.

_____ refers to online word-of-mouth marketing. Permission marketing One-to-one marketing Personalized marketing Viral marketing Direct mail

Viral marketing

The act of locating wireless local area networks while moving around a city is called ____. Eavesdropping War driving RF jamming Cybersquatting Installing rogue access devices

War driving

What is the name of IBM's computer is learning about medical practices? Wilson. Watson. Wilbur. Wendy.

Watson.

Neural networks learn by adjusting ___________ over time. Dependent variables. Independent variables. Counter weights. Weights.

Weights.

The main problem with radio transmission is which of the following? Radio waves cannot travel through walls. When you travel too far from the source, the signal fades. Devices are difficult to install. Radio waves are slow. Devices are expensive to install.

When you travel too far from the source, the signal fades.

An inference engine is: a data mining strategy used by intelligent agents the programming environment of an expert system a method of organizing expert system knowledge into chunks a methodology used to search through the rule base of an expert system the user interface of an expert system

a methodology used to search through the rule base of an expert system

The web development technique that enables portions of web pages to reload with fresh data rather than requiring the entire Web page to reload is known as: a) AJAX b) RSS c) Tagging d) Web 2.0

a) AJAX

_____ issues involve the authenticity and fidelity of information that is collected and processed. a) Privacy b) Accuracy c) Transferability d) Property e) Accessibility

b) Accuracy

The relationship between ethics and legality can best be described in which of the following statements? a) If an act is unethical it is always illegal. b) An act can be unethical but still be legal. c) An ethical act is always legal. d) None of the above

b) An act can be unethical but still be legal.

Which of the following is an advantage of social commerce over traditional e-commerce? a) Loyalty b) The ability to predict buying habits based on real-time data c) Processing speed d) Crowdsourcing e) Reduced expenses

b) The ability to predict buying habits based on real-time data

In order to get feedback from customers, some companies make use of social computing tools providing feedback via blogs, wikis, online forums and social network sites. This is known as: a) mashing b) conversational marketing c) social advertising d) peer-to-peer shopping

b) conversational marketing

Customers using social commerce benefit from _____________. a) greater privacy b) faster responses from vendors c) unbiased opinions on products d) none of the choices is correct

b) faster responses from vendors

In _______ e-commerce, the sellers and buyers are organizations. government-to-citizen consumer-to-consumer business-to-business business-to-consumer consumer-to-business

business-to-business

Which type of electronic commerce is the largest by volume? business-to-employee consumer-to-consumer business-to-business business-to-consumer none of the above

business-to-business

Difficulties in order fulfillment are most closely associated with which type of electronic commerce? business-to-business business-to-consumer government-to-citizen business-to-employee mobile commerce

business-to-consumer

Which type of electronic commerce does Amazon practice? business-to-employee consumer-to-consumer consumer- to-business business-to-consumer employee-to-business

business-to-consumer

If you are a worker managing your fringe benefits over your company's intranet, you are engaging in _________ e-commerce. business-to-business business-to-consumer consumer-to-consumer business-to-employee government-to-citizen

business-to-employee

In ________ e-commerce, an organization provides information and services to its workers. business-to-employee consumer-to-consumer consumer-to-business business-to-consumer government-to-business

business-to-employee

In the _____ marketplace model, EC technology is used to streamline the purchasing process in order to reduce the cost of items purchased, the administrative cost of procurement, and the purchasing cycle time. buy-side sell-side auctions group purchasing electronic exchange

buy-side

In the _____ marketplace model, the reverse auction is typically used. buy-side sell-side group purchasing desktop purchasing electronic exchange

buy-side

Mobile computing has two major characteristics that differentiate it from other forms of computing. What are these two characteristics? mobility, broad reach mobility, lack of expense security, broad reach security, mobility broad reach, localization

mobility, broad reach

A(n) _____ is automatically launched by some trigger and appears in front of the active window. keyword banner random banner pop-up ad pop-under adtext box

pop-up ad

In order to get customers to visit retail stores, some have resorted to: hiring clowns. providing electronic incentives via smart phones. eliminating online stores. providing refreshments.

providing electronic incentives via smart phones

Wireless broadcast media include satellites, radios, and fiber-optic cable RFID transmitters, satellites, and fiber-optic cable radios, TV remotes, and satellites fiber-optic cable, infrared, and GPS

radios, TV remotes, and satellites

Crowdsourcing is: a) Controlling the crowd at a congested venue. b) Controlling the users attempting to visit a Web site at the same time. c) Offering a problem to a group to solve. d) Hiring a substantial number of employees at one time through a job fair.

c) Offering a problem to a group to solve.

The practice of using similar but not identical domain names is called _____. domain spoofing domain masquerading domain tasting cybersquatting domain fraud

domain tasting

_____ issues involve who may obtain information and how much they should pay for this information. a) Privacy b) Accuracy c) Transferability d) Property e) Accessibility

e) Accessibility

______________ is a legal concept that gives individuals the right to recover the damages done to them by other individuals, organizations, or systems. a) Privacy b) Responsibility c) Transferability d) Accountability e) Liability

e) Liability

A Web site that combines content from other Web sites to form new content is called a(n) ______. a) Social network b) Aggregator c) Blog d) E-commerce site e) Mashup

e) Mashup

Ethical issues may be categorized into which of the following types? a) privacy b) accuracy c) property d) accessibility e) all of the above

e) all of the above

All of the following are used to provide online market research except Recommendations Voting Emails Blogs Reviews

Blogs

Identifying IT trends and determining which ones are most beneficial and can help an organization to keep from doing what? (a) Jumping off the latest IT bandwagon. (b) Jumping on the latest IT bandwagon. (c) Preferring to be a late adopter. (d) Just watching and mirroring the competition.

(b) Jumping on the latest IT bandwagon.

Wi-Fi sets up a wireless local area network (WLAN). Bluetooth sets up a (a) Wireless personal area network (WPAN). (b) Personal area network (PAN). (c) Impersonal area network (IAN). (d) My area network (MAN).

(b) Personal area network (PAN).

Which of the following is difficult to measure concerning technology? (a) Net profit. (b) Net loss. (c) Return on investment. (d) Total cost.

(c) Return on investment.

Today, most wireless local area networks use the _____ standard, which can transmit up to 54 Mbps and has a range of about 300 feet. 802.11a 802.11b 802.11c 802.11g WiMAX

802.11g

Which of the following statements concerning artificial intelligence (AI) is not true? AI is concerned with studying human thought processes. AI attempts to re-create human processes in a machine. AI is being studied, but it has not yet been successfully implemented. Based on the Turing test, the intelligent systems exemplified in commercial AI products are far from exhibiting any significant intelligence.

AI is being studied, but it has not yet been successfully implemented.

Business-to-business electronic commerce involves electronic relationships with: Customers. Suppliers. Resellers. All of these

All of these

Compared to a human driver, an automated driver would Stay alert. Never get distracted by emotion. Be able to look all directions at once. All of these answers are correct.

All of these answers are correct.

What are the advantages of using a shopping bot? Fast results. Many options. Reviews available. All of these are correct.

All of these are correct.

User agents: Can check and sort a user's e-mail. Take action on behalf of a user. Can automatically fill out forms for a user. All of these.

All of these.

Which of the following items has the highest degree of digitization? A book that is out of stock in a store and is being shipped to your home. A book that is advertised on the Internet but that you buy in a store. A book you order online to be shipped to your home An e-book you order online for a reader such as a Kindle or Nook.

An e-book you order online for a reader such as a Kindle or Nook.

Which of the following is the most appropriate wireless networking standard for creating personal area networks? Wi-Fi Cellular radio Microwave Bluetooth WiMAX

Bluetooth

With _______ sales, the sale is almost instantaneous. B2C. B2B. Both B2C and B2B. Neither B2C nor B2B.

B2C.

Which of the following is not an example of social commerce? Wendy offers gift cards to online users for funniest response to various challenges. Pepsi Co. sends live notifications to customers when they are close to a store that sells their products. Disney allows people to book tickets on Facebook without leaving the site. Best Buy has a Web site which can be used to purchase products for pick up in a store. Zappo's uses Twitter to send customers coupons when they mention a Zappo's product.

Best Buy has a Web site which can be used to purchase products for pick up in a store.

Which of the following is true about social commerce? Social commerce only benefits customers. Social commerce only benefits businesses. Businesses can easily learn about customers' experiences. Social commerce is only concerned with the selling process. New products are never tested via social commerce.

Businesses can easily learn about customers' experiences.

Purchasing cards are most often used by: Individuals making online purchases. Businesses making online purchases. Businesses making relatively small, unplanned purchases. Businesses buying items that are on their current year's budget.

Businesses making relatively small, unplanned purchases.

Expert systems: Are always used to replace decision makers. Are always used to support decision makers. Are typically used to support an entire company. Can be used to support or replace decision makers.

Can be used to support or replace decision makers.

Using social computing tools to do market research Is only done by consumers Is only done by businesses Is expensive Can foster closer customer relationships Uses only data provided to the business.

Can foster closer customer relationships

_____ communicate(s) via radio waves using radio antennas placed within adjacent geographic areas. Bluetooth Cell phones A satellite Ultra-wideband Near-field communications

Cell phones

Which of the following best describes a genetic algorithm? Creating categories of data ranges. Using data and past situations to think like a human. Processing data and digging deeper into a scenario. Changing variables and running simulations.

Changing variables and running simulations.

Which of the following is a risk of social computing? The content posted will not be found with a search engine. Employees will be willing to participate. Employees will maintain company privacy. Ignoring negative posts is easy to do. Consumer-generated content is not edited or filtered

Consumer-generated content is not edited or filtered

The functional characteristics of genetic algorithms include all of the following except: Crossover. Mutation. Selection. Conversion.

Conversion.

The capabilities of smart phones include all of the following except _________. A calculator E-mail A global positioning system Corporate transaction processing A full-function Internet browser

Corporate transaction processing

Watson, an expert system developed by IBM, appeared on the TV show Jeopardy. Watson: Narrowly lost to its competitor. Could produce only one answer to each question. Tied with its competitor. Froze up during the show because the questions were coming too rapidly.

Could produce only one answer to each question.

Which of the following is a type of collaborative consumption? Buying a new book from Amazon Craigslist Renting a car from Hertz or Avis Buying a e-textbook from your bookstore

Craigslist

Which of the following is true about the impact of social computing on customer service? It's harder for customers to be heard by a company. Businesses can take their time responding to social media posts. Customers themselves can be used to reduce problems. Businesses will only get negative comments on social media posts.

Customers themselves can be used to reduce problems.

Which of the following characteristics distinguishes mobile computing from other forms of computing? Mobile computing offers greater security. Connectivity is slower but more reliable than in other forms of computing. Mobile computing is limited to relatively short SMS messages. Customized information can be sent to individuals as an SMS.

Customized information can be sent to individuals as an SMS.

_____ refers to the practice of registering or using domain names for the purpose of profiting from the goodwill or trademark belonging to someone else. Domain spoofing Domain masquerading Domain tasting Cybersquatting Domain fraud

Cybersquatting

_____ are software mechanisms that provide security measures and convenience for electronic commerce purchasing. Electronic checks Digital wallets Purchasing cards Smart cards Person-to-person payments

Digital wallets

Inputs to the manufacturing process are known as: Direct materials. Indirect materials. Public exchanges. Maintenance supplies.

Direct materials.

Purchasing products and services online often cuts out the middleman, who has traditionally sold the product and/or service. This is process is called: Straight-to-consumer services. Replacement of brick-and-mortar stores. Disintermediation. Dysfunctionalization.

Disintermediation.

_________ is a broad term that refers to the buying and selling of goods and services over the Internet, as well as servicing customers and collaborating with partners. Electronic commerce E-business Digitization Social networking

E-business

Which of the following is not an effect that E-commerce has had on organizations? E-commerce enables smaller businesses to operate in areas dominated by larger companies. E-commerce increases the number of potential customers to whom the company can market its products. E-commerce is a costly medium for increasing market share. E-commerce removes many barriers for start-up businesses. E-commerce makes it easy to reach customers around the world.

E-commerce is a costly medium for increasing market share.

Which of the following statements is false? Expert systems cannot replace decision makers. Expert systems apply expertise in a specific domain. Expert systems capture the expertise from a domain expert (a person). Expert systems can be embedded in larger systems. Expert systems follow a logical path towards a recommendation.

Expert systems cannot replace decision makers.

Which of the following is not a limitation of expert systems? Expert systems cannot work with incomplete or uncertain data. A process might contain too many rules to work as an expert system. A process might be too vague to work as an expert system. Decisions made by expert systems might be a potential liability. Expert systems need to learn from their own mistakes.

Expert systems cannot work with incomplete or uncertain data.

Expert systems use what components in their inference engine? Knowledge and rumors. Facts and rules. Facts and figures. Equations and percentages.

Facts and rules.

Microwave transmission systems are used for _____ volume, _____ distance, _____ communications. Low, long, broadcast Low, short, line-of-sight High, long, broadcast High, short, broadcast High, long, line-of-sight

High, long, line-of-sight

_____ connect buyers and sellers across many industries and are used mainly for indirect materials. Horizontal exchanges Vertical exchanges Buy-side marketplaces Functional exchanges Sell-side marketplaces

Horizontal exchanges

A small geographical perimeter within which a wireless access point provides service to a number of users is called a ________. Transceiver Hotspot Local reception node Wireless network GPS location

Hotspot

Which of the following is not one of the major benefits provided by expert systems? Increased output and productivity Reliability Increased downtime Decreased decision-making time

Increased downtime

The development of mobile commerce is driven by all of the following factors except: The widespread availability of mobile devices. The cell phone culture. Increasing prices. Bandwidth improvement. It eliminates the need for a PC.

Increasing prices.

A(n) _________ is type of intelligent agent that searches for information and then displays it to the users. Monitoring and surveillance agent. Personal agent. Information agent. Genetic agent.

Information agent.

Which of the following statements is false? Information agents search for information and store it for the user. Information agents are used by Google to surf the Web sites in Google's index. Monitoring-and-surveillance agents are also called predictive agents. Personal agents take action on behalf of the user. User agents automatically fill out forms on the Web from stored information.

Information agents search for information and store it for the user.

The most common wireless technology for TV and DVD remote control devices is _______. Bluetooth Ultra-wideband Near-field communications WiMAX Infrared

Infrared

Which of the following statements is false? An intelligent agent is a software program. Intelligent agents are also called bots. Intelligent agents are always helpful. Intelligent agents use export systems and fuzzy logic. Intelligent agents perform repetitive computer-related tasks.

Intelligent agents are always helpful.

Internet advertising improves on traditional advertising in all of the following ways except: Internet ads can be updated at any time at minimal cost. Internet ads can reach large numbers of potential buyers all over the world. Internet ads are always more effective than other types of advertising. Internet ads can make effective use of multimedia. Internet ads are current.

Internet ads are always more effective than other types of advertising.

Which of the following is not a characteristic of natural intelligence? It is perishable from an organizational point of view. It is easy, fast, and inexpensive. It is erratic and inconsistent. It is highly creative. It makes use of a wide context of experiences.

It is easy, fast, and inexpensive.

Which of the following is not a characteristic of artificial intelligence? It is permanent. It is easy, fast, and inexpensive. It is highly creative. It tends to be effective only in narrow domains. It is consistent and thorough.

It is highly creative.

Cyberbanking offers all of the following advantages except: It is convenient for customers. It saves time for customers. It includes inexpensive transactions for the bank. It can help recruit remote customers. It is more expensive for the customer.

It is more expensive for the customer.

All of the following are limitations of traditional payment methods in electronic commerce except: Cash cannot be used because there is no face-to-face contact. Paying for goods and services via the mail takes more time. Not all organizations accept credit cards. It is more secure for the buyer to use the telephone than to complete a secure transaction on a computer. None of the above

It is more secure for the buyer to use the telephone than to complete a secure transaction on a computer.

Which of the following is not an expert system activity? Knowledge acquisition Knowledge domain Knowledge inferencing Knowledge representation Knowledge transfer

Knowledge domain

Which of the following takes place when someone uses the expert system? Knowledge acquisition. Knowledge inferencing. Knowledge representation. Knowledge transfer.

Knowledge transfer.

Fuzzy logic uses data ranges and gives them a(n) Average. Median. Label. Variable.

Label.

Which of the following statements regarding the relationship between electronic commerce and search is not correct? Purchases often follow successful online searches. Shopping carts are often abandoned after unsuccessful online searches. Retailers will provide fewer product details to avoid information overload for customers. Customers will be able to find the closest store offering the product that they want. Customers will have more relevant product information in the near future.

Retailers will provide fewer product details to avoid information overload for customers.

A(n) _____ allows unauthorized entry into a wireless network. Lack of encryption Disgruntled employee Open node Illegal server Rogue access point

Rogue access point

Neural networks: Can solve only relatively simple problems. Simulate the concepts of the biological brain. Can identify only longstanding patterns. Are still in the planning stages.

Simulate the concepts of the biological brain.

A neural network is one that Simulates a group of people working together. Simulates a biological brain. Simulates a fuzzy network. Simulates an expert system.

Simulates a biological brain.

_____ contain a chip that can store information and be used for several purposes. Electronic checks Stored-value money cards Purchasing cards Smart cards Person-to-person payments

Smart cards

The monitoring, collection, and analysis of socially generated data is called Social networking Social commerce Social intelligence Social advertising Social capital

Social intelligence

The indiscriminate distribution of electronic ads without the permission of the receiver is referred to as: Advertising abuse. Harassment. E-harassment. Spamming.

Spamming.

A device that plugs into an iPad to accept credit cards is called a(n): Tweet Circle Square Rectangle

Square

______ are a form of e-cash that enable you to store a fixed amount of prepaid money and then spend it as necessary. Electronic checks Stored-value money cards Purchasing cards Smart cards Person-to-person payments

Stored-value money cards

What would be the best use of RFID in a business? Transaction processing Supply chain management Personnel tracking Enabling communications with customers Decreasing network costs

Supply chain management

Companies use Web sites for commerce for all of the following reasons except: To reduce operational and transaction costs. To enhance their reputation. To sell goods and services. To reduce the amount of actual cash they need to deal with. To induce people to visit a physical location.

To reduce the amount of actual cash they need to deal with.

Sense networks track users via all of the following technologies except _______. GPS Traffic cameras Cell towers Wi-Fi networks None of the above

Traffic cameras

Which of the following is not a mobile application in financial services? Transaction processing systems Mobile banking Wireless electronic payment systems Micropayments Wireless wallets

Transaction processing systems

Which of the following is not a characteristic of genetic algorithms? Selection Crossover Transformation Mutation

Transformation

Which of the following is the most appropriate wireless technology for real-time location of caregivers and mobile equipment in health-care environments? Wi-Fi Microwave Ultra wideband Infrared Bluetooth

Ultra wideband

Which of the following is the most appropriate wireless technology for real-time location of caregivers and mobile equipment in healthcare environments? Wi-Fi Microwave Ultra-wideband Infrared Bluetooth

Ultra-wideband

Which of the following statements about Wi-Fi is not correct? Wi-Fi provides simple Internet access. Laptop PC scans contain chips that can send and receive Wi-Fi signals. Many companies offer free Wi-Fi access in their stores. Wi-Fi requires encryption for secure transmissions. Wi-Fi is expensive to set up.

Wi-Fi is expensive to set up.

The _____ standard can transmit up to 75 Mbps and has a range of 31 miles. Wi-Fi 802.11b 802.11c 802.11g WiMAX

WiMAX

Two questions a buyer in a B2B purchase would be asking are When can I get it? Will it make me money? Will it make me money? Will it save me money? Will it save me money? When can I get it? How much money will it save me? What will my ROI be?

Will it make me money? Will it save me money?

_____ is the standard that enables wireless devices to access Web-based information and services. TCP/IP Ethernet World Wide Web Wireless Application Protocol T-Carrier

Wireless Application Protocol

If you buy a hot dog at a concession stand using your contactless credit card, you are using a ________. Wireless money transfer Wireless wallet Wireless bill payment Micropayment Wireless electronic payment system

Wireless electronic payment system

_____ networks collect data from many points over an extended space. Bluetooth Ultra-wideband Wireless sensor WiMAX Wi-Fi

Wireless sensor

Which of the following is not an advantage of e-tailing? You can buy from home, 24 hours per day. You have only a few products to choose from. You can obtain detailed information on products. You can compare competitors' products and prices. All of the above

You have only a few products to choose from.

The rights approach for ethical standards states: a) An ethical action is the one that best protects and respects the moral rights of the affected parties. b) An ethical action is one that shows respect and compassion for all others. c) An ethical action is the one that provides the most good or does the least harm. d) An ethical action is one that treats all human beings equally, or, if unequally, then fairly based on some defensible standard.

a) An ethical action is the one that best protects and respects the moral rights of the affected parties.

Various organizations that promote fair and responsible use of information systems often develop a _____. a) Code of ethics b) Strategic plan c) Mission statement d) Responsibility charter e) Goals outline

a) Code of ethics

The _______________ ethical standard states that respect and compassion for all others is the basis for ethical actions. a) Common good b) Fairness c) Rights d) Utilitarian e) Well-being

a) Common good

Privacy advocates prefer which model of informed consent? a) Opt-in b) Opt-out c) Either A or B d) Neither A nor B

a) Opt-in

_____ issues involve collecting, storing, and disseminating information about individuals. a) Privacy b) Accuracy c) Transferability d) Property e) Accessibility

a) Privacy

The potential benefits a company receives from crowdsourcing include: (select all that apply) a) Problems can be explored at a relatively low cost. b) Results are guaranteed to be high quality. c) The organization can tap a wide range to talented individuals. d) Organizations gain firsthand insight on their customers' desires e) Copyrights are always protected in the process

a) Problems can be explored at a relatively low cost. c) The organization can tap a wide range to talented individuals. d) Organizations gain firsthand insight on their customers' desires

What are the four ethical issues that the ever-expanding use of IT applications have created? a) Property, accuracy, privacy, and accessibility. b) Property, accuracy, theft, accessibility. c) Patents, property, patients, and access codes. d) Accuracy, privacy, accessibility, and ownership .

a) Property, accuracy, privacy, and accessibility.

Netcasting is: a) The distribution of audio files and video files. b) Accessing real simple syndication feeds. c) Used in educational settings only. d) A way to view a lecture at the same time it is being given in another place.

a) The distribution of audio files and video files.

A vendor asks its business partners to place logos or banners on their Web sites. If customers click on a logo, visit the vendor's site, and make a purchase, then the vendor pays a commission to the partner. This scenario illustrates which business model? find-the-best-price electronic tendering system name-your-own-price online direct marketing affiliate marketing

affiliate marketing

Which of the following statements concerning blogging is false? a) Anyone can blog. b) A reader can believe all of the details in a blog. c) A company can maintain an internal blog site. d) Blogging can be used in marketing. e) Tweets are replacing blogging.

b) A reader can believe all of the details in a blog.

The common good approach for ethical standards states: a) An ethical action is the one that best protects and respects the moral rights of the affected parties. b) An ethical action is one that shows respect and compassion for all others. c) An ethical action is the one that provides the most good or does the least harm. d) An ethical action is one that treats all human beings equally, or, if unequally, then fairly based on some defensible standard.

b) An ethical action is one that shows respect and compassion for all others.

The comments of consumers in the blogosphere concerning a company's products are called ____________________. a) Free advertising b) Consumer-generated media. c) Consumer-generated PR d) Rumors e) Reliable feedback

b) Consumer-generated media.

The process of profiling: a) Increases individual privacy. b) Decreases individual privacy. c) Has no effect on individual privacy. d) Is illegal in more than half of the states. e) Is legal but unethical.

b) Decreases individual privacy.

Which of the following statements is correct? a) An individual's right to privacy is absolute. b) Determining and enforcing privacy regulations can be difficult. c) An individual's right to privacy supersedes the needs of society. d) Advances in information technologies have not affected individual privacy. e) The Internet has increased individuals' privacy.

b) Determining and enforcing privacy regulations can be difficult.

When comparing data protection laws internationally, which laws are stricter? a) US laws b) EU laws c) US and EU laws are equally as strict.

b) EU laws

The _____________ ethical standard states that ethical actions treat all human beings equally. a) Common good b) Fairness c) Rights d) Utilitarian e) Well-being

b) Fairness

Accuracy issues: a) Involve collecting, storing, and disseminating information about individuals. b) Involve the authenticity, fidelity, and accuracy of information that is collected and processed. c) Involve the ownership and value of information. d) Involve who can access information and whether they should have to pay for that access.

b) Involve the authenticity, fidelity, and accuracy of information that is collected and processed.

The blogosphere is defined as: a) The program that allows you to post and maintain blogs on the Web. b) Millions of blogs on the Web. c) A list of the most popular blogs on the Web. d) The group of people whose opinions are influenced by blogs.

b) Millions of blogs on the Web.

With Web 1.0 sites, users _________________, whereas with Web 2.0 sites, users ______________. a) Use HTML, use CCS b) Passively receive information, participate with the site. c) Use wired connections, use wireless connections. d) Have to know the address of the site, can use search engines to find a site e) Did not have to login to find information, have to login in to find information.

b) Passively receive information, participate with the site.

Social networking Web sites: a) Are limited to Facebook and MySpace at this time. b) Provide an easy, interactive tool for communicating and collaborating with other people on the Web. c) Allow users to share text and pictures with their friends, but do not permit video posting. d) Are used almost exclusively by individuals rather than businesses.

b) Provide an easy, interactive tool for communicating and collaborating with other people on the Web.

When comparing market research using social computing as opposed to traditional focus groups, which of the following statements is true? a) Social computing generates faster results but is more expensive. b) Social computing generates faster and cheaper results. c) Social computing takes longer but is less expensive. d) Participation by customers is more limited when using social computing.

b) Social computing generates faster and cheaper results.

A wiki is: a) An online encyclopedia. b) A collection of blog postings on a subject. c) A Web site on which anyone can post material and make changes to already posted material. d) A site to access podcasts and netcasts.

c) A Web site on which anyone can post material and make changes to already posted material.

Which of the following is a true statement about the impact of social computing on a business? a) There is a high cost to using viral marketing b) It is difficult to gain information about customers c) A small minority of individuals contribute the majority of feedback and can provide skewed data d) Social computing does not allow for rapid feedback from customers.

c) A small minority of individuals contribute the majority of feedback and can provide skewed data

Which of the following is not an ethical issue related to IT? a) Privacy b) Accuracy c) Accountability d) Property (such as intellectual property) e) Accessibility to information

c) Accountability

_______________ is the tenet of ethics that refers to determining who is responsible for actions that were taken. a) The code of ethics b) Liability c) Accountability d) Responsibility

c) Accountability

The utilitarian approach for ethical standards states: a) An ethical action is the one that best protects and respects the moral rights of the affected parties. b) An ethical action is one that shows respect and compassion for all others. c) An ethical action is the one that provides the most good or does the least harm. d) An ethical action is one that treats all human beings equally, or, if unequally, then fairly based on some defensible standard.

c) An ethical action is the one that provides the most good or does the least harm.

LinkedIn is a _______________________ social networking site that makes money from advertising and services. a) Training b) College c) Business-oriented d) Video-upload e) Blogging

c) Business-oriented

Data aggregators sell digital dossiers to companies that want to know their customers better, which is a process called ________. a) Customer relationships b) Customer profiling c) Customer intimacy d) Customer knowledge e) Spying

c) Customer intimacy

An electronic portfolio of you and your habits is called a(n): a) Profile. b) Electronic master record. c) Digital dossier. d) Surveillance report.

c) Digital dossier.

How does society keep owners of electronic bulletin boards from disseminating offensive or untrue content? This is a difficult question because it involves the conflict between _____ on the one hand and _____ on the other. a) The public, the individual b) The public, ethics c) Freedom of speech, privacy d) The individual, freedom of speech e) Ethics, security

c) Freedom of speech, privacy

Property issues: a) Involve collecting, storing, and disseminating information about individuals. b) Involve the authenticity, fidelity, and accuracy of information that is collected and processed. c) Involve the ownership and value of information. d) Involve providing information about individuals.

c) Involve the ownership and value of information.

The ____________ ethical standard states that an ethical action is the one that best protects and respects the moral rights of the affected parties. a) Common good b) Fairness c) Rights d) Utilitarian e) Well-being

c) Rights

____________ act as online intermediaries that harness the power of social networks for introducing, buying, and selling products and services. a) Group shopping sites b) Shopping Communities c) Social marketplaces d) Peer-to-peer shopping models

c) Social marketplaces

What is _____ is not necessarily _____. a) Illegal, unethical b) Ethical, illegal c) Unethical, illegal d) Unethical, legal e) Ethical, legal

c) Unethical, illegal

Which type of privacy policy restricts an organization from collecting personal information until the customer specifically authorizes it? a) electronic surveillance b) opt-out model c) opt-in model d) profiling

c) opt-in model

Facebook is a__________. a) blog b) wiki c) social networking site d) mash up

c) social networking site

Blogs and wikis fundamentally differ in terms of a) their size b) their potential to be shared with the public c) their ability of users to post content d) their use of AJAX

c) their ability of users to post content

One of the problems that HR departments have with using social computing to recruit is a) all candidates seek them out b) they only receive qualified applications c) they receive many more applications than they can process. d) social sites each have their own special niche e) they cannot be used for internal tasks.

c) they receive many more applications than they can process.

The _________ approach to ethics maintains that an ethical action is the one that provides the most good or does the least harm: a) common good approach b) rights approach c) utilitarian approach d) fairness approach

c) utilitarian approach

A wireless sensor network uses satellites to enable users to determine their position anywhere on earth. consists of interconnected, battery-powered motes that relay data to other motes. is a type of transmission that uses red light that is not commonly visible to human eyes. is a type of chip technology that enables short-range data and voice connections between wireless devices.

consists of interconnected, battery-powered motes that relay data to other motes.

eBay is an example of which type of e-commerce? government-to-citizen consumer-to-consumer consumer-to-business business-to-consumer business-to-business

consumer-to-consumer

______________ determines who is responsible for the actions taken. a) Privacy b) Responsibility c) Transferability d) Accountability e) Liability

d) Accountability

What is the relationship between advances in information technology and the practice of profiling? a) Advances in IT make it more difficult to profile individuals. b) Advances in IT have no impact on profiling. c) Advances in IT make it more expensive to profile individuals. d) Advances in IT make it easier to profile individuals.

d) Advances in IT make it easier to profile individuals.

Organizations are using social computing in which of the following functions? a) Marketing b) Customer Relationship Management c) Human Resource Management d) All of these.

d) All of these.

The fairness approach for ethical standards states: a) An ethical action is the one that best protects and respects the moral rights of the affected parties. b) An ethical action is one that shows respect and compassion for all others. c) An ethical action is the one that provides the most good or does the least harm. d) An ethical action is one that treats all human beings equally, or, if unequally, then fairly based on some defensible standard.

d) An ethical action is one that treats all human beings equally, or, if unequally, then fairly based on some defensible standard.

Which of the following statements is not correct? a) Employees have limited protection against surveillance by employers. b) The large majority of organizations monitor employee Internet usage. c) The large majority of organizations use URL filtering. d) As with normal first-class mail, employers cannot read employee e-mail. e) Employees should be aware that surveillance is legal.

d) As with normal first-class mail, employers cannot read employee e-mail.

Which of the following statements is correct? a) International privacy and security laws are very consistent. b) Consistent international privacy and security laws help companies with their regulatory requirements from country to country. c) Consistent international privacy and security laws enable information to flow freely among countries. d) The absence of consistent international privacy and security laws has led to a complex global legal framework. e) Consistent international privacy and security laws are followed by all countries.

d) The absence of consistent international privacy and security laws has led to a complex global legal framework.

Refer to Opening Case -- Pinterest: Which of the following statements is false? a) Users pinning pictures from other sites raises an ethical issue. b) Pinterest's users agree to only post their own original work. c) Pinterest will revoke access if the company discovers downloaded copyrighted material. d) Users can claim they aren't responsible because they didn't read the user agreement before they agreed to accept it.

d) Users can claim they aren't responsible because they didn't read the user agreement before they agreed to accept it.

The ____________ ethical standard states that an ethical action is the one that provides the most good or does the least harm. a) Common good b) Fairness c) Rights d) Utilitarian e) Well-being

d) Utilitarian

Which of the following is not a social networking site? a) Facebook b) YouTube c) Flickr d) Wikipedia e) LinkedIn

d) Wikipedia

You sign up for an RSS feed from CNN.com. Which of the following would you expect to happen? a) When you sign up, you will need to download print templates. b) You won't be able to search RSS content. c) You will be able to choose only one topic area. d) You will be notified of updates in the content areas you selected. e) You will get content sent to you via e-mail.

d) You will be notified of updates in the content areas you selected.

In which of the following business models do businesses request quotes from suppliers and use B2B with a reverse auction mechanism? find-the-best-price electronic tendering system name-your-own-price online direct marketing affiliate marketing

electronic tendering system

Which of the following is not an electronic commerce application? home banking buying stocks evaluating an employee conducting an auction buying real estate

evaluating an employee

eBay uses a _____ auction. forward static reverse physical simple

forward

In _____, needed services such as temporary help or extra space are traded on an as-needed basis. horizontal exchanges vertical exchanges buy-side marketplaces functional exchanges sell-side marketplaces

functional exchanges

With which type of satellite is there a propagation delay? low earth orbit medium earth orbit geostationary polar orbit equatorial orbit

geostationary

Direct payment of Social Security benefits is an example of ______ e-commerce. government-to-citizen consumer-to-consumer consumer-to-business business-to-consumer business-to-business

government-to-citizen

In the _____ B2B application, the orders of many buyers are aggregated so that they comprise a large volume, in order to merit more seller attention. buy-side sell-side auctions group purchasing electronic exchange

group purchasing

Which of the following is not a benefit of expert systems? increased output and productivity capture and dissemination of scarce expertise increased decision-making time reliability works with incomplete, uncertain information

increased decision-making time

Which type of satellite has the shortest orbital life? low earth orbit medium earth orbit geostationary polar orbit equatorial orbit

low earth orbit

Which type of satellite requires the highest number of satellites to cover the earth? low earth orbit medium earth orbit geostationary polar orbit equatorial orbit

low earth orbit

Pervasive computing refers to a real-time, wireless connection between a mobile device and other computing environments, such as an intranet. refers to e-commerce transactions that are conducted with a mobile device. means that virtually every device has processing power with wireless or wired connections to a global network. None of these statements are correct.

means that virtually every device has processing power with wireless or wired connections to a global network.

Using your cell phone to purchase a Coke from a vending machine is an example of: mobile banking wireless wallet micropayment brokerage service money transfer

micropayment

Mobile computing refers to a real-time, wireless connection between a mobile device and other computing environments, such as an intranet. refers to e-commerce transactions that are conducted with a mobile device. means that virtually every device has processing power with wireless or wired connections to a global network. None of these statements are correct.

refers to a real-time, wireless connection between a mobile device and other computing environments, such as an intranet.

In _____ auctions, there is one buyer who wants to buy a product. Suppliers submit bids, and the lowest bid wins. forward static reverse physical simple

reverse

The major security threats to wireless communications include rogue access points, telemetry, and WSNs rogue access points, war driving, and eavesdropping rogue access points, telemetry and eavesdropping rogue access points, WSNs, and RF jamming

rogue access points, war driving, and eavesdropping

In the _____ marketplace model, organizations attempt to sell their products or services to other organizations electronically. buy-side sell-side group purchasing desktop purchasing electronic exchange

sell-side

A(n) _____ is a new class of digital communication device that provides an organizer, cell phone, digital camera, access to e-mail, Internet access, and short message service. Blackberry pager personal digital assistant smart phone cell phone

smart phone

The monitoring, collection, and analysis of socially generated data, and the resultant strategic decisions are combined in a process known as_________. social commerce social intelligence social capital social networking

social intelligence

The degree of digitization relates to all of the following except: the product or service sold the process by which the product is produced the delivery agent or intermediary the size of e-commerce transactions

the size of e-commerce transactions

In _____, direct and indirect materials in one industry are purchased on an as-needed basis. horizontal exchanges vertical exchanges buy-side marketplaces functional exchanges sell-side marketplaces

vertical exchanges

Expert systems: solve problems that are too difficult for human experts are based on procedural computer programming languages work in specific domains can apply to any business problem share characteristics with mainframe computing

work in specific domains


Conjuntos de estudio relacionados

Scientific Inquiry Test Review (5th Grade)

View Set

World War 1 And Spanish-American War

View Set

Spanisch Encuentros 3 Módulo 1C

View Set

Mental Health: Mostly Personality Disorders NCLEX Questions

View Set

practice exam 3 - missed questions

View Set