MIS Final Practice Questions
Which of the following involves collecting and maintaining data in such a way that the information can be used as evidence in a court of law? A. Data warehousing B. Computer forensics C. Computer analysis D. Business intelligence E. Business analytics
B. Computer forensics Correct. Computer forensics is the scientific collection, examination, authentication, preservation, and analysis of data from storage that can be used as evidence in a court of law.
Which technology trend that triggers ethical concerns is raised when a consumer receives coupons based on buying patterns? A. Networking advances B. Data analysis advances C. Data storage costs rapidly decline D. Computing power doubles every 18 months E. Mobile device growth impact
B. Data analysis advances
Which of the following is a critical security function of senior management in an organization? A. Managing security programs on a real-time basis B. Establishing the security policy and managing risk C. Developing IS security software D. Safeguarding computer hardware and software E. Monitoring potential malicious activity continuously
B. Establishing the security policy and managing risk
Which of the following prevents unauthorized users from accessing private networks by using hardware and software to control the flow of network traffic? A. Unified threat management systems B. Firewalls C. Anti-malware programs D. Secure sockets layer (SSL) E. Secure Hypertext Transfer Protocol (S-HTTP)
B. Firewalls
If your doctor shares your medical records without your permission, this is considered a ________________ violation. A. Sarbanes-Oxley B. HIPAA C. S-HTTP D. FERPA E. Gramm-Leach-Bliley
B. HIPAA Correct. HIPAA outlines medical security and privacy rules and procedures for simplifying the administration of health care billing and automating the transfer of health care data between health care providers, payers, and plans.
The _____________ virus was written in Visual Basic script and transmitted as an attachment to an email. A. ZeuS B. ILOVEYOU C. Sasser.ftp D. Conficker E. ComputerLocker
B. ILOVEYOU
Two people are trading coins, and one has far more knowledge about the hobby than the other. What does this situation illustrate? A. Dynamic knowledge management B. Information asymmetry C. Marketplace asymmetry D. Cost-to-price symmetry E. Information distribution
B. Information asymmetry
Security challenges for Internet of Things (IoT) include all the following EXCEPT ________. A. IoT devices have a much longer service life compared to traditional equipment B. IoT devices are deployed in a narrow scale, creating only a few interconnections that can be exploited C. IoT installations often consist of collections of identical devices D. many IoT devices are difficult to upgrade E. users may not be aware that the IoT devices actually exist
B. IoT devices are deployed in a narrow scale, creating only a few interconnections that can be exploited Correct. IoT devices are deployed in a much wider scale than are traditional Internet connected devices, creating a vast number of interconnections that can be exploited
Among the five identified moral dimensions of the information age, which addresses the question "which cultural values are supported by information technology?" A. Accountability and control B. Quality of life C. Information rights and obligations D. Property rights and obligations E. System quality
B. Quality of life Correct. Quality of life incorporates values that need to be preserved in a knowledge-based society as well as questions related to which cultural values and practices does the new information technology support.
Which type of revenue model involves sending customers to a website for a referral fee? A. Micropayment B. Network C. Affiliate D. Advertising E. Partners
C. Affiliate
Which of the following involves businesses retailing products and services directly via the Internet to individual consumers? A. M-commerce B. Disintermediation C. B2C e-commerce D. B2B e-commerce E. C2C e-commerce
C. B2C e-commerce
eBay utilizes the ___________ form of electronic commerce. A. display ad B. m-commerce C. C2C D. click-and-mortar E. B2C
C. C2C
________ are methods, policies, and organizational procedures that ensure the safety of the organization's assets. A. Targets B. Safeguards C. Controls D. Security measures E. Vulnerabilities
C. Controls
________ services can tell you the price of a house you are looking at or about special exhibits at a museum you are passing. A. Spatial mapping B. Geosocial C. Geoinformation D. Location specific advertising E. Geopositioning
C. Geoinformation
Which social commerce feature creates an environment that allows friends and advertisers to send notifications to social users' home pages? A. Network notification B. Timelines C. Newsfeed D. Collaborative shopping E. E-tailing
C. Newsfeed
Which wireless security concern involves eavesdroppers who park outside buildings in order to intercept wireless network traffic? A. Trojan horse B. Battle driving C. War driving D. Phishing E. Drive listening
C. War driving
You enjoy coin collecting and you notice more and more banner ads related to this hobby appearing on websites you visit. Companies are using _______________ to improve ad placement and effectiveness. A. crowdsourcing B. worms C. behavioral targeting D. cognitive tracking E. keyloggers
C. behavioral targeting
Gaining access to a safety deposit box using iris scanning is an example of _____________ authentication. A. token B. password C. biometric D. smart card E. two-factor
C. biometric
Principles of right and wrong that you use to make choices are called _____________. A. politics B. laws C. ethics D. beliefs E. options
C. ethics
If you receive an email asking for your social security number in return for a million dollars, this is an example of ____________. A. war driving B. pharming C. phishing D. IP spoofing E. evil twins
C. phishing
When a consumer is being engaged with an immersive multimedia experience, the consumer is enjoying the _________ feature of e-commerce. A. social technology B. ubiquity C. richness D. universal standards E. global reach
C. richness
Establishing some understanding of the threats an organization faces is an example of a(n) __________. A. threat prediction B. information systems control C. risk assessment D. security policy E. security goal
C. risk assessment
Tricking employees to reveal their passwords by pretending to be a legitimate member of a company is referred to as ________. A. phishing B. pharming C. social engineering D. IP spoofing E. sniffing
C. social engineering
When securing data in the cloud, most providers use encryption to secure data, with ultimate responsibility for protecting sensitive data residing ____________. A. with the DDoS specialists B. equally between the company that owns the data and the cloud provider C. with the company that owns the data D. with the Interactive Session on Organizations E. with the cloud provider
C. with the company that owns the data Correct. When processing takes place in the cloud, accountability and responsibility for protection of sensitive data still reside with the company that owns that data.
________ was created because of financial scandals such as Enron and WorldCom. A. Gramm-Leach-Bliley Act B. Sarbanes-Oxley C. FIP D. HIPAA E. FERPA
B. Sarbanes-Oxley Correct. Sarbanes-Oxley was designed to protect investors after the financial scandals at Enron, WorldCom, and other public companies. It imposes responsibility on companies and their management to safeguard the accuracy and integrity of financial information that is used internally and released externally.
Which law provides rules related to the creation of financial statements to help avoid fraud? A. Gramm-Leach-Bliley Act B. Sarbanes-Oxley Act C. HIPAA D. Public Company Accounting Reform and Investor Protection Act E. Federal Information Protection Act
B. Sarbanes-Oxley Act
E-commerce began in ________ when Netscape earned their first online advertisement from a major corporation. A. 2000 B. 2001 C. 1987 D. 1995 E. 1990
D. 1995
Which of the following businesses uses the portal Internet business model? A. Expedia B. Priceline.com C. Google Docs D. Google E. ETrade.com
D. Google
Which of the following is a powerful analysis technology that crunches data from multiple sources to find hidden connections and is typically used by the government? A. SEC_DBA B. FIP C. ERP D. NORA E. TCP-IP
D. NORA Correct. Non-obvious relationship awareness (NORA) will pull data from employment, telephone records, and Internet interactions to develop connections about individuals.
Some web marketplaces focus on indirect goods. Which of the following would be the best example of an indirect good? A. Foam used for car seats at an auto manufacturing plant B. Wood used to build custom cabinets C. Silicon used to create computer chips D. Paper used to print paychecks E. Tires needed for airplane production
D. Paper used to print paychecks
________________ is an increasing problem where hackers lock parts of your computer and then demand money to unlock the system. A. Distributed Denial of Service (DDoS) B. Spam C. Phishing D. Ransomware E. Identity theft
D. Ransomware
________ reflects the idea in e-commerce that large numbers of people can make better decisions about a wide range of topics or products than a single person or even a small committee of experts. A. Partnerships B. E-cooperation C. Social shopping D. Social graphing E. Crowdsourcing
D. Social graphing
What type of filtering provides additional security by determining whether packets are part of an ongoing dialogue between a sender and a receiver? A. Intrusion detection systems B. Packet filtering C. Application proxy filtering D. Stateful inspection E. Network Address Translation (NAT)
D. Stateful inspection
Recurring payments to access a company's offerings is found with which revenue model? A. Sales B. Community provider C. Advertising D. Subscription E. Affiliate
D. Subscription
A ____________ is a program that seems nonthreatening but then does something completely unexpected. A. spoof B. virus C. worm D. Trojan horse E. phishing email
D. Trojan horse
Purchasing aftermarket tickets from Stubhub is an example of a ____________ electronic commerce model. A. business-to-consumer B. business-to-business C. consumer-to-consumer D. family-to-family E. consumer-to-business
A. business-to-consumer
Taking over computers and directing those systems to overload a network is defined as a _________ attack. A. denial-of-service B. cybervandalism C. Trojan horse D. worm E. keylogging
A. denial-of-service
Public key encryption uses ___________. A. one key B. two public keys C. three private keys D. one public and one private key E. one public and two private keys
D. one public and one private key Correct. The keys are mathematically related so that data encrypted with one key can be decrypted using only the other key. To send and receive messages, communicators first create separate pairs of private and public keys. The public key is kept in a directory, and the private key must be kept secret.
A(n) __________ policy identifies and ranks information risks and goals. A. acceptable use B. identity management C. business continuity plan D. security E. risk assessment
D. security Correct. A security policy consists of statements ranking information risks, identifying acceptable security goals, and identifying the mechanisms for achieving these goals.
Which act requires financial institutions to ensure the security and confidentiality of customer data and mandates that data must be stored on a secure medium and protected during storage and transmittal? A. Sarbanes-Oxley Act B. HIPAA C. Public Company Accounting Reform and Investor Protection Act D. Gramm-Leach-Bliley Act E. Federal Information Protection Act
D. Gramm-Leach-Bliley Act
If your financial institution shares your financial records without your permission, this is considered a ________________ violation. A. FERPA B. HIPAA C. Sarbanes-Oxley D. Gramm-Leach-Bliley Act E. Fair Information Practice
D. Gramm-Leach-Bliley Act Correct. This act requires financial institutions to ensure the security and confidentiality of customer data. Data must be stored on a secure medium, and special security measures must be enforced to protect such data on storage media and during transmittal.
In 2022, ________ million Americans will shop online. A. 189 B. 92 C. 141 D. 219 E. 240
E. 240
Among the five identified moral dimensions of the information age, which addresses the question of liability related to information systems? A. System quality B. Information rights and obligations C. Quality of life D. Property rights and obligations E. Accountability and control
E. Accountability and control Correct. Accountability and control addresses who can and will be held accountable and liable for the harm done to individual and collective information and property rights.
What is the main mass-market retailing driver of mobile e-commerce? A. Microsoft B. eBay C. Dell D. Yahoo E. Amazon
E. Amazon
__________ are industry-owned intermediaries between buyers and sellers. A. Service providers B. Market creators C. Community providers D. E-tailers E. B2B e-commerce marketplaces
E. B2B e-commerce marketplaces
Which term refers to the social commerce feature that creates an environment to discuss, view, and text about products? A. E-tailing B. Timelines C. CRM D. Network notification E. Collaborative shopping
E. Collaborative shopping
A(n) __________ is a unique type of malware that replicates itself from one computer to another and does NOT rely on human behavior. A. worm B. Trojan horse C. bug D. virus E. SQL attack
A. worm
__________ is the ability to determine that a person is who he or she claims to be through a variety of means. A. Authentication B. Identity management C. User auditing D. Network monitoring E. User identification tagging
A. Authentication
Which of the following is used by a computer that reads and interprets fingerprints to grant access? A. Biometric authentication B. A token C. A smart card D. Credit authentication E. Password protection
A. Biometric authentication Correct. Biometric authentication uses systems that read and interpret individual human traits such as fingerprints, irises, and voices to grant or deny access.
What technology trend raises ethical issues related to the limitless data that can be collected about you? A. Data storage costs rapidly declining B. Mobile device growth C. Computer power doubling every 18 months D. Dynamic web pages E. Networking advances
A. Data storage costs rapidly declining
Which of the following is a 1973 report that served as the basis for most U.S. privacy laws? A. Fair Information Practices (FIP) B. Structured Query Language (SQL) C. Central processing unit (CPU) D. Federal Trade Commission (FTC) E. Generally Accepted Accounting Principles (GAAP)
A. Fair Information Practices (FIP) Correct. Most American and European privacy law is based on a regime called Fair Information Practices (FIP) first set forth in a report written in 1973 by a federal government advisory committee.
Which of the following involves using your mobile phone and global positioning systems to identify where your friends are meeting for dinner? A. Geosocial services B. Net marketplaces C. Geoadvertising D. E-tailing E. Geoinformation services
A. Geosocial services
_______________ requires that your medical patient records be protected and saved for six years. A. HIPAA B. The Gramm-Leach-Bliley Act C. FERPA D. The Sarbanes-Oxley act E. DARPA
A. HIPAA
Electronic evidence on computer storage media that is not visible to the average user is called ________. A. ambient data B. backup data C. recovery data D. forensic data E. defragmented data
A. ambient data
Because so many web pages use databases, ____________ is a major malware threat since poorly coded web application software is vulnerable. A. an SQL injection attack B. spyware C. spoofing D. war driving E. a Trojan horse
A. an SQL injection attack Correct. Web developers may get careless in writing code and not use simple controls to eliminate this vulnerability.
If you return to a website that welcomes you back by name, you likely have a small text file on your computer with information about your prior visits called a ___________. A. cookie B. safe harbor C. network D. malware E. customization
A. cookie
A(n) ______________ specifically addresses plans for power outages, floods, fire, and other calamities. A. disaster recovery plan B. identity management C. risk assessment D. attack plan E. acceptable use policy
A. disaster recovery plan Correct. Disaster recovery planning devises plans for the restoration of disrupted computing and communications services. Disaster recovery plans focus primarily on the technical issues involved in keeping systems up and running, such as which files to back up and the maintenance of backup computer systems or disaster recovery services.
Companies such as Amazon and Walmart set prices based on ________, where the prices often change based on product demand and other variables. A. dynamic pricing B. menu costs C. search to switch pricing D. transaction costs E. network effects
A. dynamic pricing
In the transaction fee revenue model a company receives a fee for enabling or executing a transaction. Which of the following companies relies extensively on this business model? A. eBay B. Netflix C. Gap.com D. Amazon E. Hulu.com
A. eBay
The use and regulation of trade secrets, copyrights, and patents is the U.S. government's attempt to protect ________. A. intellectual property B. consumer rights C. government secrets D. consumer data E. capitalism
A. intellectual property Correct. The Internet makes it very easy to copy and distribute intellectual property and, therefore, challenging to protect.
Paying an online journal a monthly fee for access to its content is called the ________ revenue model. A. subscription B. transaction fee C. freemium D. premium E. sales
A. subscription
Shopkick helps retailers with m-commerce by ________. A. using location-based services to deliver coupons to mobile users when they are near a store B. using location-based services to determine who comes into stores C. posting customer information on social sites to let friends know they are shopping at a store D. gathering exit survey information from customers using mobile phone surveys E. using geosocial services to build a community of customers for companies
A. using location-based services to deliver coupons to mobile users when they are near a store
In the United State alone, _______ million people are expected to shop online in 2022. A. 2.40 B. 240 C. 2,400 D. 0.24 E. 24.0
B. 240
Which of the following businesses uses the content provider Internet business model? A. eBay B. Apple Music C. Dropbox D. Twitter E. Amazon
B. Apple Music
Which statement about digital certificates is FALSE? A. The recipient decodes the encrypted message by using the certificate authority's public key. B. The certificate authority (CA) verifies a digital certificate user's identity online. C. Digital certificates help a user and a merchant to validate that their digital certificates were issued by an authorized and trusted third party before they exchange data. D. Digital certificates contain the owner's identification and a copy of the owner's public key. E. Digital certificates authenticate that the public key belongs to the designated owner.
B. The certificate authority (CA) verifies a digital certificate user's identity online.
Which of the following is NOT addressed by a business continuity plan? A. How the company can restore business operations after a disaster strikes B. The technical issues involved in keeping systems up and running C. Action plans for handling mission-critical functions if systems go down D. When and how the plan is to be updated and refined E. The identification of critical business processes
B. The technical issues involved in keeping systems up and running
Which unique feature of e-commerce is related to the ability to interact with web technology everywhere? A. Global reach B. Ubiquity C. Richness D. Universal standards E. Interactivity
B. Ubiquity
Andrew analyzes an ethical issue at work, evaluates the outcomes of various options, and chooses the one that achieves the greatest value. Which ethical principle is Andrew applying? A. Descartes' rule of change B. Utilitarian principle C. Risk aversion principle D. Golden Rule principle E. Kant's categorical imperative
B. Utilitarian principle Correct. Andrew is taking a "greater good" perspective.
A formal name to describe self-regulating policies is called _____________. A. due process B. a safe harbor C. accountability D. liability E. privacy
B. a safe harbor Correct. A safe harbor is a private, self-regulating policy and enforcement mechanism that meets the objectives of government regulators and legislation but does not involve government regulation or enforcement.
A(n) ________ policy would indicate if you are allowed to use your work computer to access social media websites. A. identity management B. acceptable use C. disaster recovery plan D. risk assessment E. security
B. acceptable use Correct. An acceptable use policy defines acceptable uses of the firm's information resources and computing equipment, including desktop and laptop computers, wireless devices, telephones, and the Internet. A good AUP defines unacceptable and acceptable actions for every user and specifies consequences for noncompliance.
When advertisers analyze user clickstream data to intentionally place ads on websites, the advertisers are employing ___________ techniques. A. affiliation B. behavioral targeting C. search engine D. lead generation E. curve tail marketing
B. behavioral targeting
Apple Music is considered a successful _________________. A. e-tailer B. content provider C. community provider D. market creator E. service provider
B. content provider
In many cases, the Internet has enabled customers to see what merchants have paid for products. This is called _____________. A. supply curving B. cost transparency C. product lensing D. price transparency E. demand curving
B. cost transparency
Kickstarter.com is a popular _______________ site where start-up companies' ideas are presented to perspective investors. A. social media B. crowdsourcing C. clickstream D. social shopping E. loud crowd
B. crowdsourcing
E-commerce technologies enable consumers to look online to find a variety of different prices for the same product. This ability is called ____________. A. global scale B. price transparency C. information drilldown D. price discrimination E. price check
B. price transparency
Large firms may create a secure website known as a ____________ to link to suppliers and key business partners. A. data interchange model B. private B2B network C. transaction broker D. content provider E. disintermediation site
B. private B2B network
Professional organizations like the American Medical Association have ___________, which include specific conduct guidelines such as, do no harm. A. golden rules B. professional codes of conduct C. liability codes D. no-free-lunch rules E. utilitarian principles
B. professional codes of conduct Correct. When groups of people claim to be professionals, they take on special rights and obligations because of their special claims to knowledge, wisdom, and respect. Professional codes of conduct are promulgated by associations of professionals such as the American Medical Association (AMA), the American Bar Association (ABA), the Association of Information Technology Professionals (AITP), and the Association for Computing Machinery (ACM).
An individual imitating a trusted employee by using a similar, but fake, email address in an effort to obtain protected information, is using a(n) ___________ technique. A. pharming B. spear phishing C. sniffing D. click fraud E. evil twins
B. spear phishing Correct. In a more targeted form of phishing called spear phishing, messages appear to come from a trusted source, such as an individual within the recipient's own company or a friend.
One of the unique features of e-commerce is information density, which refers to ________. A. the fact that the web is available everywhere, increasing the amount of information available B. the total amount and quality of information available to all market participants, consumers, and merchants alike C. the way technology has standardized Internet information communication methods D. the social networks that have created a community where everyone is brought closer together even though they may live all over the world E. how technology has increased the amount of information that can travel across the Internet
B. the total amount and quality of information available to all market participants, consumers, and merchants alike Correct. E-commerce technologies reduce information collection, storage, processing, and communication costs while greatly increasing the currency, accuracy, and timeliness of information.
Which of the following statements comparing digital markets to traditional markets is FALSE? A. In traditional markets, information asymmetry is high; in digital markets, information asymmetry is reduced. B. In traditional markets, sellers can dynamically change prices quickly and inexpensively; in digital markets, dynamically pricing goods is delayed and expensive. C. In traditional markets, search costs are high; in digital markets, search costs are low. D. In traditional markets, network effects are somewhat weak; in digital markets, network effects can be strong. E. In traditional markets, disintermediation is unlikely; in digital markets, disintermediation is more possible and likely to occur.
Correct. This statement is false. Dynamic pricing of goods is fast and cheap in digital markets but is delayed and costly in traditional markets.
Which of the following statements about Electronic Data Interchange (EDI) is FALSE? A. EDI is a computer-to-computer exchange of standard transactions such as invoices between two organizations. B. Standards define the structure and information fields of electronic documents. C. About 80% of online B2B commerce is based on EDI. D. EDI supports the automatic transmission of transactions from one information system to another through a network. E. EDI is a large firm that uses a secure website to link to its suppliers and other key business partners.
E. EDI is a large firm that uses a secure website to link to its suppliers and other key business partners.
_____________ is a general security term that includes computer viruses, worms, and Trojan horses. A. Drive-by-download B. Conficker C. Sasser.ftp D. Cryptolocker E. Malware
E. Malware
Which of the following is the fastest growing type of business-to-consumer e-commerce? A. Geoadvertising service B. E-tailing C. Geosocial service D. Net marketplaces E. Mobile
E. Mobile
Tracking your movements without consent may be unethical and is most related to which technology trend? A. Networking advances B. Decline of data storage costs C. Data analysis advances D. Computing power doubling every 18 months E. Mobile device growth
E. Mobile device growth
Which of the following is NOT one of the phases in the timeline for the development of an e-commerce presence? A. Planning B. Social media implementation C. Website development D. Web implementation E. Mobile implementation
E. Mobile implementation
Which statement about public key encryption is FALSE? A. The public key is shared using a directory. B. The private key is kept secret. C. It uses two keys that are mathematically related. D. The sender encrypts the message with the recipient's public key. E. On receiving the message, the recipient uses the public key to decrypt it.
E. On receiving the message, the recipient uses the public key to decrypt it.
Which social commerce feature uses a stream of events to create a history for friends to view? A. Newsfeed B. Network notification C. Social search D. Collaborative experiences E. Timeline
E. Timeline
In addition to developing a policy for restoring computer and communication services, some companies go a step further with ________, which focuses on how to get the business operations up and running again after a disaster. A. a hot site B. disaster recovery planning C. an information system audit D. a mirror server E. business continuity planning
E. business continuity planning Correct. Business continuity planning entails more than just getting the hardware and software up and running.
E-commerce technologies enable consumers to discover the actual costs merchants pay for products. This ability is called ____________. A. cost discrimination B. information drilldown C. global pricing D. cost customization E. cost transparency
E. cost transparency
Companies can increase brand loyalty using a _____marketing strategy where a company asks customers to generate, then review and rate, suggestions about a company issue, such as what their next product should be. A. clickstreaming B. referral C. viral D. long tail E. crowdsourcing
E. crowdsourcing
Someone hacking into your Facebook account to add terrible photos and messages is taking part in ____________. A. spoofing B. sniffing C. hacking D. keylogging E. cybervandalism
E. cybervandalism
For an automobile manufacturer, steel is considered a(n) _______________ because it is directly involved in the production process. A. optional input B. indirect waste C. indirect good D. primary good E. direct good
E. direct good
If a co-worker accuses you of sending inappropriate emails, you should be afforded __________________. A. liability B. accountability C. responsibility D. a third chance E. due process
E. due process Correct. Due process is a related feature of law-governed societies and is a process in which laws are known and understood, and the ability exists to appeal to higher authorities to ensure that the laws are applied correctly.
majority of businesses working with other businesses (e-commerce) use __________________ to enable company systems to share invoices, shipment schedules, and purchase orders. A. traditional phone-based voice orders B. traditional paper-based orders C. HTML D. spreadsheets E. electronic data interchange
E. electronic data interchange
A phishing technique known as ________ are wireless networks that pretend to offer trusty Wi-fi but actually are fraudulent and may enable passwords or credit card numbers to be stolen. A. click fraud B. keylogging C. denial of service (DoS) D. spyware E. evil twins
E. evil twins
A(n) ___________ is a type of spyware that records keystrokes to steal sensitive information such as social security numbers. A. cryptolocker B. textlogger C. cryptologger D. SS logger E. keylogger
E. keylogger
Use of the Internet to inexpensively find potential customers for products with very low demand is termed ________. A. prediction marketing B. social network marketing C. behavioral targeting D. website personalization E. long tail marketing
E. long tail marketing
If you accept a position as an information systems manager, you have a(n) ____________ to accept the costs, benefits, and obligations for the decisions you make. A. accountability B. liability C. due process D. preference E. responsibility
E. responsibility Correct. Responsibility is a key element of ethical action. Responsibility means that you accept the potential costs, duties, and obligations for the decisions you make.
eBay is a major organization that allows individuals to sell products to other individuals. This business model is called __________. A. consumer-to-business B. family-to-family C. business-to-consumer D. business-to-business E. consumer-to-consumer
E. consumer-to-consumer
Security in an information systems context refers to ____________, which are used to prevent unauthorized access or theft. A. policies only B. policies and procedures only C. processing, access, and confidentially D. hardware, software, and technical measures E. policies, procedures, and technical measures
E. policies, procedures, and technical measures