K321 Final
eBay is an example of an online company that has been faced with numerous security issues. For example, imagine you purchase a digital camera on eBay. Three months later you might receive an email asking you to log in to the system to update your credit card or PayPal information. Of course, this email is not actually from eBay and as soon as you log in your information will be stolen. What type of information security breach would you consider this to be? A. An Insider B. Dumpster diving C. Social engineering D. Phishing
D. Phishing
Which of the following operational CRM technologies does the sales department typically use? A. Campaign management, contact management, opportunity management B. Sales management, contact management, contact center C. Sales management, call scripting, opportunity management D. Sales management, contact management, opportunity management
D. Sales management, contact management, opportunity management
What combines art along with science to determine how to make URLs more attractive to search engines resulting in higher search engine ranking? A. Dot-com B. Search engine C. Search engine ranking D. Search engine optimization
D. Search engine optimization
What verifies that the units or pieces of code function correctly when integrated together? A. Alpha testing B. Development testing C. Integration testing D. System testing
D. System testing
What is interoperability? A. A business-driven enterprise architecture that supports integrating a business as linked, repeatable activities, tasks, or services. B. A business task. C. The capability of services to be joined together on demand to create composite services, or disassembled just as easily into their functional component. D. The capability of two or more computer systems to share data and resources, even though they are made by different manufacturers.
D. The capability of two or more computer systems to share data and resources, even though they are made by different manufacturers.
What is interoperability? A. An intelligent connecting device that examines each packet of data it receives and then decides which way to send it onward toward its destination. B. The geometric arrangement of the actual physical organization of the computers and other network devices in a network. C. A standard that specifies the format of data as well as the rules to be followed during transmission. D. The capability of two or more computer systems to share data and resources, even though they are made by different manufacturers.
D. The capability of two or more computer systems to share data and resources, even though they are made by different manufacturers.
What is a form of predictive analytics for marketing campaigns that attempts to identify target markets or people who could be convinced to buy products? A. Contact center B. Web-based self-service C. Call scripting system D. Uplift modeling
D. Uplift modeling
Many industries have been forced to change due to technology advances. Which of the following industries has felt the lowest amount of economic impact from ebusiness? A. Auto industry B. Retail industry C. Travel industry D. Waste or recycling industry
D. Waste or recycling industry
What is a telecommunications system? A. A system that enables the transmission of data over public or private networks. B. A communications, data exchange, and resource-sharing system created by linking two or more computers and establishing standards, or protocols, so that they can work together. C. Any network without a central file server and in which all computers in the network have access to the public files located on all other workstations. D. A computer that is designed to request information from a server.
A. A system that enables the transmission of data over public or private networks.
Which of the following best describes Web 3.0? A. User-generated online business. B. Based on the "intelligent" web where applications use natural language processing. C. Collaboration and social media. D. All of these
B. Based on the "intelligent" web where applications use natural language processing
What are the three primary models that a B2C can use to operate? A. Click-and-brick, click-and-mortar, pure-play. B. Brick-and-mortar, click-and-mortar, virtual. C. Brick-and-mortar, click-and-consumer, virtual-and-consumer. D. Brick-and-click, brick-and-mortar, brick-and-virtual.
B. Brick-and-mortar, click-and-mortar, virtual.
What is the difference between a business model and an ebusiness model? A. A business model details how a company creates, delivers, and generates revenue, an ebusiness model does all of the same except on the Internet. B. A business model and an ebusiness model are identical. C. A business model and an ebusiness model are complete opposites. D. An ebusiness model details how a company creates, delivers, and generates revenue, a business model does all the same except on the Internet.
A. A business model details how a company creates, delivers, and generates revenue, an ebusiness model does all of the same except on the Internet.
What are the four main types of ebusiness models A. Business-to-borrower, business-to-consumer, consumer-to-business, and consumer-to-consumer B. Business-to-business, business-to-consumer, consumer-to-business, and consumer-to-consumer C. Business-to-business, business collaboration, collective business, and consumer-to-consumer D. Ebusiness-to-ebusiness, ebusiness-to-ebusiness, econsumer-to-ebusiness, and econsumer-to-econsumer
B. Business-to-business, business-to-consumer, consumer-to-business, and consumer-to-consumer
Which of the following is a component ERP vendors offer to differentiate themselves in the marketplace? A. Accounting B. CRM C. Sales D. Human resources
B. CRM
What is an organization performing when it asks questions such as "why was customer revenue so high"? A. CRM reporting technologies B. CRM analyzing technologies C. CRM processing technologies D. CRM predicting technologies
B. CRM analyzing technologies
What is the project scope? A. An individual who is an expert in project planning and management, defines and develops the project plan, and tracks the plan to ensure that the project is completed on time and on budget. B. Description of the business need (the problem the project will solve) and the justification, requirements, and current boundaries for the project. C. A formal, approved document that manages and controls the entire project. D. Graphic representation of the processes that capture, manipulate, store, and distribute information between a system and its environment.
B. Description of the business need (the problem the project will solve) and the justification, requirements, and current boundaries for the project.
What is the difference between ecommerce and ebusiness? A. Ecommerce includes Internet network effects, ebusiness includes ecommerce and all activities related to internal and external business operations. B. Ecommerce is buying and selling of goods or services online, ebusiness includes ecommerce and all activities related to internal and external business operations. C. Ecommerce includes ecommerce and all activities related to internal and external business operations, ebusiness includes all of the of knowledge management systems. D. Ebusiness is buying and selling of goods or services online, ecommerce includes ecommerce and all activities related to internal and external business operations.
B. Ecommerce is buying and selling of goods or services online, ebusiness includes ecommerce and all activities related to internal and external business operations.
Which gate in the RUP methodology expands on the agreed-upon details of the system, including the ability to provide an architecture to support and build it? A. Inception B. Elaboration C. Construction D. Transition
B. Elaboration
What are policies and procedures that address information management along with the ethical use of computers and the Internet in the business environment? A. Information systems policy B. Epolicies C. Technology applied policy D. Emastery
B. Epolicies
What is another name for an eshop? A. C2C B. Estore or etailer C. Ecustomer D. Econsumer
B. Estore or etailer
What is forging of someone's identity for the purpose of fraud? A. Identity crisis B. Identity theft C. Ediscovery D. All of these
B. Identity theft
What caused Polaroid to go bankrupt? A. It failed to have innovative technology and a captive customer base. B. One-hour film processing and digital cameras stole its market share. C. People who want instant access to their pictures also want a third party involved. D. Internet websites such as Flickr and Facebook stole its market share.
B. One-hour film processing and digital cameras stole its market share.
What is software whose source code is available free for any third party to review and modify? A. Free source B. Open source C. Code source D. Network source
B. Open source
Which of the following is not a characteristic of Business 2.0? A. Encourages user participation. B. Requires technical skills. C. Eliminates entry barriers to publishing on the web. D. Provides an exciting and vibrant virtual environment.
B. Requires technical skills.
Which application's primary business benefits include market demand, resource and capacity constraints, and real-time scheduling? A. CRM B. SCM C. ERP D. All of these
B. SCM
What do SMART criteria for successful objective creation include? A. Specific, metrics, agreed upon, real, time valued B. Specific, measurable, agreed upon, realistic, time framed C. Specific, measurable, accurate, real, time valued D. Specific, metrics, agreed upon, realistic, time framed
B. Specific, measurable, agreed upon, realistic, time framed
What spans a large geographic area, such as a state, province, or country? A. Local area network B. Wide area network C. Metropolitan area network D. Peer-to-peer network
B. Wide area network
What targets sales opportunities by finding new customers or companies for future sales? A. Sales management system B. Contact management system C. Opportunity management system D. Sales force automation system
C. Opportunity management system
What occurs when a new radical form of business enters the market that reshapes the way companies and organizations behave? A. Ecommerce model B. Eshop sale C. Paradigm shift D. Web 1.0
C. Paradigm shift
What is the difference between phishing and pharming? A. Phishing is not illegal, pharming is illegal. B. Phishing is the right of the company, where pharming is the right of the individual. C. Phishing is a technique to gain personal information for the purpose of identity theft, and pharming reroutes requests for legitimate websites to false websites. D. All of these.
C. Phishing is a technique to gain personal information for the purpose of identity theft, and pharming reroutes requests for legitimate websites to false websites
What is the number one reason that IT projects fall behind schedule or fail? A. Change in business goals during the project. B. Lack of support from business management. C. Poor planning or poor project management. D. Change in technology during the project.
C. Poor planning or poor project management.
What is network topology? A. A phenomenon that occurs when the sending computer divides a message into a number of efficiently sized units called packets, each of which contains the address of the destination computer. B. An intelligent connecting device that examines each packet of data it receives and then decides which way to send it onward toward its destination. C. Refers to the geometric arrangement of the actual physical organization of the computers and other network devices in a network. D. A model for applications in which the bulk of the back-end processing, such as performing a physical search of a database, takes place on a server, while the front-end processing, which involves communicating with the users, is handled by the clients.
C. Refers to the geometric arrangement of the actual physical organization of the computers and other network devices in a network.
Which document prioritizes all of the business requirements by order of importance to the company? A. Requirements documentation B. Requirements management C. Requirements definition document D. All of the above
C. Requirements definition document
Which of the following best describes Web 2.0? A. Static websites B. Intelligent websites C. Social media and user-generated web content D. Hypertext markup language
C. Social media and user-generated web content
What is loose coupling? A. A business-driven enterprise architecture that supports integrating a business as linked, repeatable activities, tasks, or services. B. A business task. C. The capability of services to be joined together on demand to create composite services, or disassembled just as easily into their functional component. D. The capability of two or more computer systems to share data and resources, even though they are made by different manufacturers.
C. The capability of services to be joined together on demand to create composite services, or disassembled just as easily into their functional component.
What are the three primary variables (or triple constraints) in any project? A. Time, cost, expense B. Time, expense, requirements C. Time, cost, scope D. Time, cost, quality
C. Time, cost, scope
What is McDonald's performing when it asks its customers if they would like to super-size their meals? A. Campaign management B. Cross-selling C. Up-selling D. Down-selling
C. Up-selling
What is an activity-based process in which each phase in the SDLC is performed sequentially from planning through implementation and maintenance? A. RAD methodology B. Agile methodology C. Waterfall methodology D. Extreme programming
C. Waterfall methodology
What is a client/server network? A. A series of efficiently sized units, each of which contains the address of the destination computer. B. An intelligent connecting device that examines each packet of data it receives and then decides which way to send it onward toward its destination. C. The geometric arrangement of the actual physical organization of the computers and other network devices in a network. D. A model for applications in which the bulk of the back-end processing, such as performing a physical search of a database, takes place on a server, while the front-end processing, which involves communicating with the users, is handled by the clients.
D. A model for applications in which the bulk of the back-end processing, such as performing a physical search of a database, takes place on a server, while the front-end processing, which involves communicating with the users, is handled by the clients.
Which of the following does a project manager perform? A. Defines and develops the project plan. B. Tracks the plan to ensure all key project milestones are completed on time. C. Expert in project planning and management. D. All of the above.
D. All of the above.
Which of the following is a characteristic of a successful project? A. Delivered on time. B. Delivered within budget. C. Meets the business's requirements. D. All of the above.
D. All of the above.
Which of the following is a fundamental of the RAD methodology? A. Focus initially on creating a prototype that looks and acts like the desired system. B. Actively involve system users in the analysis, design, and development phases. C. Accelerate collecting the business requirements through an interactive and iterative construction approach. D. All of the above
D. All of the above.
Which of the following are challenges of Business 2.0? A. Information vandalism B. Technology dependence C. Violations of copyright and plagiarism D. All of these
D. All of these
Which of the following describes an ERP system? A. ERP systems provide a foundation for collaboration between departments. B. ERP systems enable people in different business areas to communicate. C. ERP systems have been widely adopted in large organizations to store critical knowledge used to make the decisions that drive the organization's performance. D. All of these.
D. All of these
Which of the following is an example of a way to maintain information security that a company should include in its information security policies? A. Requiring computer users to log off before leaving for lunch B. Never sharing user or password information with anyone C. Changing passwords every 30 to 60 days D. All of these
D. All of these
Which of the following is an extended ERP component? A. Business intelligence B. Ebusiness C. Customer relationship management D. All of these
D. All of these
Which of the following represents a form of disruptive technology? A. Entering the marketplace at the low end. B. A new way of doing things that initially doesn't meet the needs of existing customers. C. Tendency to open new markets and destroy old ones. D. All of these are included.
D. All of these are included.
What is the ebusiness model that represents 80% of all online businesses and is typically more complex, requiring greater security needs? A. Consumer-to-consumer B. Business-to-consumer C. Consumer-to-business D. Business-to-business
D. Business-to-business
What is a person or event that is the catalyst for implementing major changes for a system to meet business changes? A. Change controller B. Change over C. Change management D. Change agent
D. Change agent
Lisa loves her job as an executive recruiter for a large hospital located in Dallas, Texas. Part of Lisa's job requires her to gather industry information, collaborate with partners, compare competitors, and tap into the knowledge of prospective employees, partners, and customers. Which of the following would Lisa use to perform her job? A. Interactivity metrics B. Source code C. Network effect D. Collective intelligence
D. Collective intelligence
What is project scope? A. Quantifiable criteria that must be met for the project to be considered a success. B. Products, services, or processes that are not specifically a part of the project. C. Any measurable, tangible, verifiable outcome, result or item that is produced to complete a project or part of a project. D. Defines the work that must be completed to deliver a product with the specified features and functions.
D. Defines the work that must be completed to deliver a product with the specified features and functions.
Which of the following is not one of the six epolicies that a company should implement for information protection as discussed in the text? A. Information privacy policy B. Workplace monitoring policy C. Acceptable use policy D. Downtime monitoring policy
D. Downtime monitoring policy
What compiles customer information from a variety of sources and segments the information for different marketing campaigns? A. Campaign management system B. Cross-selling C. Up-selling D. List generator
D. List generator
What runs a network, steering information between computers and managing security and users? A. Client B. Server C. Peer-to-peer network D. Network operating system
D. Network operating system
What is the system that consists of nonproprietary hardware and software based on publicly known standards that allows third parties to create add-on products to plug into or interoperate with the system? A. Management system B. Reputation system C. Knowledge system D. Open system
D. Open system
What are the first two lines of defense a company should take when addressing security risks? A. Technology first, customers second. B. Technology first, people second. C. Innovation first, technology second. D. People first, technology second.
D. People first, technology second.
What is a project manager? A. An individual who is an expert in project planning and management, defines and develops the project plan, and tracks the plan to ensure that the project is completed on time and on budget. B. Description of the business need (the problem the project will solve) and the justification, requirements, and current boundaries for the project. C. A formal, approved document that manages and controls the entire project. D. Graphic representation of the processes that capture, manipulate, store, and distribute information between a system and its environment.
A. An individual who is an expert in project planning and management, defines and develops the project plan, and tracks the plan to ensure that the project is completed on time and on budget.
What is predictive dialing? A. Automatically dials outbound calls and when someone answers, the call is forwarded to an available agent B. Directs customers to use touch-tone phones or keywords to navigate or provide information C. A phone switch routes inbound calls to available agents D. All of these
A. Automatically dials outbound calls and when someone answers, the call is forwarded to an available agent
What is a set of best practices that helps an organization to maximize the benefits of an information system, while at the same time establishing appropriate controls to ensure minimum errors? A. COBIT B. CASE C. IEEE D. All of the above
A. COBIT
What helps an organization identify its customers across applications? A. CRM reporting technologies B. CRM analyzing technologies C. CRM processing technologies D. CRM predicting technologies
A. CRM reporting technologies
What defines the how, what, when, and who regarding the flow of project information to stakeholders and is key for managing expectations? A. Communication plan B. Executive sponsor C. Project assumptions D. Project deliverable
A. Communication plan
How do prevention and resistance technologies stop intruders from accessing and reading sensitive information? A. Content filtering, encryption, and firewalls B. Calculating, locking, and firewalls C. Content prohibiting, and cookies D. None of these
A. Content filtering, encryption, and firewalls
What is selling additional products or services to an existing customer? A. Cross-selling B. Up-selling C. Campaign management system D. Customer service and support
A. Cross-selling
Which of the following began as an essential emergency military communications system operated by the U.S. Department of Defense (DARPA)? A. Internet B. Ecommerce C. Ebusiness D. WWW
A. Internet
What is a session in which employees meet, sometimes for several days, to define or review the business requirements for the system? A. Joint application development B. Requirements management C. Process modeling D. Data flow diagram
A. Joint application development
Which of the following will help an organization maintain consistent business operations? A. Marketing, sales, and accounting departments decide to use the same vendor for a new system. B. Sales decides to implement a new system without considering other departments. C. A new office policy states that all managers can implement their own policies for purchasing supplies and materials. D. Marketing decides to save customer's email addresses in the marketing system, even though other organizational systems do not have this capability.
A. Marketing, sales, and accounting departments decide to use the same vendor for a new system.
Which implementation uses both the legacy system and new system until all users verify that the new system functions correctly? A. Parallel implementation B. Plunge implementation C. Pilot implementation D. Phased implementation
A. Parallel implementation
What represents key dates by which a certain group of activities must be performed? A. Project milestones B. Project objectives C. Project assumptions D. Project deliverable
A. Project milestones
eBay buyers voluntarily comment to other users and sellers on the quality of service, promptness of shipping, and their general satisfaction with the product. This is one of the most popular examples of user-generated content and is called ____________. A. Reputation system B. Knowledge system C. Explicit system D. User-generated sales cycle
A. Reputation system
What is the overall process for developing information systems, from planning and analysis through implementation and maintenance? A. SDLC B. Software customization C. Off-the-shelf application D. Sign-off
A. SDLC
What is a business-driven enterprise architecture that supports integrating a business as linked, repeatable activities, tasks, or services? A. Service-oriented architecture B. Service C. Loose coupling D. Interoperability
A. Service-oriented architecture
Using one's social skills to trick people into revealing access credentials or other valuable information is called ______________. A. Social engineering B. Social media C. Social viruses D. Social processes
A. Social engineering
Which of the following produces an improved product customers are eager to buy, such as a faster car or larger hard drive? A. Sustaining technology B. Disruptive technology C. Reputation system D. Personalization
A. Sustaining technology
Which term describes the WWW during its first few years of operation between 1991 and 2003? A. Web 1.0 B. Eshop C. Open source D. All of these
A. Web 1.0
Which methodology uses small teams to produce small pieces of deliverable software using sprints, or 30-day intervals, to achieve an appointed goal? A. scrum B. XP C. RUP D. RAD
A. scrum
What is a method for confirming users' identities? A. Phishing B. Authentication C. Authorization D. Programming
B. Authentication
What is the difference between asynchronous and synchronous communication? A. Asynchronous is real-time communication, synchronous is one-way technology. B. Asynchronous is communication that does not occur at the same time, synchronous communication occurs at the same time. C. Asynchronous communication includes instant messaging, synchronous communication includes email. D. Asynchronous communication is fast and instant, synchronous communication is collected at a single point in time.
B. Asynchronous is communication that does not occur at the same time, synchronous communication occurs at the same time.
What is a network? A. A system that enables the transmission of data over public or private networks. B. A communications, data exchange, and resource-sharing system created by linking two or more computers and establishing standards, or protocols, so that they can work together. C. Any network without a central file server and in which all computers in the network have access to the public files located on all other workstations. D. A computer that is designed to request information from a server.
B. A communications, data exchange, and resource-sharing system created by linking two or more computers and establishing standards, or protocols, so that they can work together.
Which methodology aims for customer satisfaction through early and continuous delivery of useful software components developed by an iterative process with a design point that uses the bare minimum requirements? A. RAD methodology B. Agile methodology C. Waterfall methodology D. Extreme programming
B. Agile methodology
Angela works for an identity protection company that maintains large amounts of sensitive customer information such as usernames, passwords, personal information, and social security numbers. Angela and a coworker decide to use the sensitive information to open credit cards in a few of her customer's names. This is a classic example of which of the following security breaches? A. A social engineer B. An insider C. A spammer D. A dumpster diver
B. An insider
What is a router? A. A series of efficiently sized units, each of which contains the address of the destination computer. B. An intelligent connecting device that examines each packet of data it receives and then decides which way to send it onward toward its destination. C. The geometric arrangement of the actual physical organization of the computers and other network devices in a network. D. A model for applications in which the bulk of the back-end processing, such as performing a physical search of a database, takes place on a server, while the front-end processing, which involves communicating with the users, is handled by the clients.
B. An intelligent connecting device that examines each packet of data it receives and then decides which way to send it onward toward its destination.
What is the World Wide Web Consortium? A. A markup language that delivers everything from animation to graphics and music to movies. B. An international community that develops open standards to ensure the long-term growth of the web. C. A nonprofit organization that has assumed the responsibility for Internet Protocol (IP) address space allocation, protocol parameter assignment, and domain name system management. D. The Internet protocol web browsers use to request and display web pages using universal resource locators.
B. An international community that develops open standards to ensure the long-term growth of the web.
What is enterprise resource planning? A. The analysis and redesign of workflow within and between enterprises. B. A standardized set of activities that accomplish a specific task, such as processing a customer's order. C. A system that integrates all departments and functions throughout an organization into a single IT system so that employees can make decisions by viewing enterprise wide information on all business operations. D. A system that involves managing all aspects of a customer's relationship with an organization to increase customer loyalty and retention and an organization's profitability.
C. A system that integrates all departments and functions throughout an organization into a single IT system so that employees can make decisions by viewing enterprise wide information on all business operations.
What is a peer-to-peer network? A. A system that enables the transmission of data over public or private networks. B. A communications, data exchange, and resource-sharing system created by linking two or more computers and establishing standards, or protocols, so that they can work together. C. Any network without a central file server and in which all computers in the network have access to the public files located on all other workstations. D. A computer that is designed to request information from a server.
C. Any network without a central file server and in which all computers in the network have access to the public files located on all other workstations.
What is the process that provides a user with permission including access levels and abilities such as file access, hours of access, and amount of allocated storage space? A. Pharming B. Authentication C. Authorization D. Programming
C. Authorization
Which of the following is a common customer service CRM metric? A. Number of new prospective customers. B. Number of marketing campaigns. C. Average time to resolution. D. Revenue generated by marketing campaigns.
C. Average time to resolution.
Carfax is an example of a company that sells its products or services directly to its consumers online. Which ebusiness model is Carfax using? A. C2B B. C2C C. B2C D. B2B
C. B2C
What is the difference between a B2C and a C2B? A. B2C focuses on companies as customers and C2B focuses on consumers as customers. A. B2C focuses on companies as customers and C2B focuses on consumers as customers. C. B2C focuses on business to consumers and C2B focuses on consumers to business. D. B2C focuses on consumers as customers and C2B focuses on companies as customers.
C. B2C focuses on business to consumers and C2B focuses on consumers to business.
Which of the following is not one of the three most common core ERP components focusing on internal operations? B. Production and materials management C. Business intelligence D. Human resources
C. Business intelligence
Which type of ebusiness model best describes Apple? A. Pure-play B. Brick-and-mortar C. Click-and-mortar D. Virtual
C. Click-and-mortar
What are the four most common Business 2.0 characteristics? A. Content sharing, user-contributed content, collaboration competition elimination, web browser organization. B. Content sharing through open source, specialty-contributed content only, collaboration inside the community, specialized collaboration. C. Content sharing through open source, user-contributed content, collaboration inside the organization, collaboration outside the organization. D. Consumer sharing through open systems, company-contributed content, collaboration inside the organization, collaboration throughout the organization.
C. Content sharing through open source, user-contributed content, collaboration inside the organization, collaboration outside the organization.
Who are the primary users of SCM systems? A. Sales, marketing, customer service B. Accounting, finance, logistics, and production C. Customers, resellers, partners, suppliers, and distributors D. All of these
C. Customers, resellers, partners, suppliers, and distributors
What are two of the primary features of ebusiness components? A. Eprocurement B. Elogistics C. Eprocurement and elogistics D. None of these
C. Eprocurement and elogistics
Which of the following contains general principles to guide computer user behavior? A. Information technology code B. Technology policy C. Ethical computer use policy D. Information systems
C. Ethical computer use policy
What is a markup language for documents, containing structured information? A. Service-oriented architecture B. Service C. Extensible markup language D. Interoperability
C. Extensible markup language
What are the primary business benefits of an ERP system? A. Sales forecasts, sales strategies, and marketing campaigns. B. Market demand, resource and capacity constraints, and real-time scheduling. C. Forecasting, planning, purchasing, material management, warehousing, inventory, and distribution. D. All of these.
C. Forecasting, planning, purchasing, material management, warehousing, inventory, and distribution.
What languages are programming languages that look similar to human languages? A. Scripting language B. Object-oriented language C. Fourth-generation language D. All of the above
C. Fourth-generation language
What is the Internet protocol web browsers use to request and display web pages using universal resource locators? A. Hypertext markup language (HTML) B. URL C. Hypertext transport protocol (HTTP) D. DARPA
C. Hypertext transport protocol (HTTP)
What is the capability of services to be joined together on demand to create composite services, or disassembled just as easily into their functional component? A. Service-oriented architecture B. Service C. Loose coupling D. Interoperability
C. Loose coupling
Which of the following terms refers to a contractual stipulation to ensure that ebusiness participants do not deny their online actions? A. Compliance B. Noncommittal C. Nonrepudiation D. Repudiation
C. Nonrepudiation