MIS Gallaugher CH 10-18 Quiz

¡Supera tus tareas y exámenes ahora con Quizwiz!

Most e-commerce shoppers buy brands they are already familiar; however, ____ percent of Rent the Runway customers rent brands they've never bought before. a.75 b.78 c.98 d.50 e.none of the above

98%

Which of the following is not an example of larger, conventional firms working with sharing economy startups? a.Apple's purchase of Beats to give new musical artists more exposure. b.Condé Nast's investment in Rent the Runway. c.Google's investment in Uber. d.Walgreens' partnership with TaskRabbit. e.W Hotel partnering with Desks Near Me.

Apple's purchase of Beats to give new musical artists more exposure

_____ perform the work that users and firms are directly interested in accomplishing and can be thought of as places where a user's real work is done. a.Emulators b.Applications c.Platforms d.Embedded systems e.Operating systems

Applications

_____ refers to the practice of ensuring that an organization's systems operate within required legal constraints, and organizational obligations. a.Security b.Compliance c.Integration d.Parallelism e.Immunity

Compliance

Employees, at their own initiative, can go to SocialText or Google Sites and set up a wiki, WordPress to start blogging, or subscribe to a SaaS offering like SalesForce.com, all without corporate oversight and approval. This _____ of technology is one of the challenges associated with the adoption of SaaS models. a.crowdsourcing b.disintermediation c.integration d.scalability e.consumerization

Consumerization

Analysts are so bullish on Facebook's mobile advertising prospects because: a.Mobile ad revenue from the Facebook app has grown steadily since the firm's IPO. b.Instagram is new to advertising and WhatsApp hasn't advertised much, suggesting that Facebook has lots of unrealized growth potential in its app stable. c.Ads on Facebook mobile show up in a user's feed, the area of the screen they pay most attention to, suggesting mobile ads will be tougher to ignore than those on the side of a browser screen. d.All of the above e.None of the above—analysts remain very pessimistic about Facebook's prospects for mobile advertising.

D. All of the above

_____ is the biggest photo-sharing site on the Web, taking in around three billion photos each month. a.Facebook b.Picasa c.Shutterfly d.Flickr e.Photobucket

Facebook

A black hat hacker looks for weaknesses in security mechanisms, with a view to help plug the holes that might be exploited by cyber-criminals. Select one: True False

False

Ad networks enforce exclusivity. Once a content provider selects one ad network it cannot implement other forms of advertising on its website. Select one: True False

False

Ads in Google search are exclusively geotargeted based on GPS data. Select one: True False

False

Advertisers have relatively low performance on Facebook because they must rely entirely on Facebook-provided data. Ads on Facebook cannot be targeted using any data collected outside of Facebook. Select one: True False

False

Airbnb's technology does not allow the firm to monitor to see if hosts are trying to arrange a stay and payment outside of the system. Select one: True False

False

App stores are exclusively focused on smart-phone markets. Select one: True False

False

CPM is cost per million impressions. Select one: True False

False

Challenge questions offered by websites to automate password distribution and resets are formidable in protecting the privacy of email accounts. Select one: True False

False

Circuit-switched networks are advantageous because they offer an inexhaustible supply of bandwidth for telecommunications. Select one: True False

False

Communication between people results in time saving, cost reductions, and fewer errors than communication between computers. Select one: True False

False

Consumerization of corporate technology stifles employee creativity. Select one: True False

False

Data warehouses are composed entirely of proprietary corporate data, while data marts take advantage of data purchased from third-party firms. Select one: True False

False

Enterprise Resource Planning software has proven popular in part because the standardization these products impose makes them exceptionally easy to deploy. Select one: True False

False

Enterprise software tends to be less integrated and standardized than the prior era of proprietary systems that many firms developed themselves. Select one: True False

False

Facebook is especially appealing to organizations looking to share messages with fans since anyone who has "liked" an organization on Facebook will see all of that organization's posts in their news feed. Select one: True False

False

Facebook's key resources for competitive advantage are the sophisticated technological tools it provides to its users. Select one: True False

False

Facebook's phenomenal growth implies that it requires minimal infrastructure investment. Select one: True False

False

Firms classified as being part of the sharing economy and collaborative consumption are still considered too risky to attract substantial venture capital investment. Select one: True False

False

Firms that adopt software as a service actually buy a system's software and hardware, so these systems become a fixed operating expense. Select one: True False

False

General Motors/OnStar successfully partnered with car-sharing service RelayRides (now called Turo). Select one: True False

False

Google ads are embedded in the Android OS. Select one: True False

False

Google's largest source of income is allowing any organization to pay for higher placement in search engine query results. Select one: True False

False

Hardware failure is the least likely of threats to one's data. Select one: True False

False

In public-key encryption systems, the functions of the public and private keys are interchangeable. Select one: True False

False

It can be said that many organizations are data rich but information abundant. Select one: True False

False

Legacy systems are popular among large firms because they have a large storage capacity and are designed to share data. Select one: True False

False

Linux is one of the most used operating systems in desktop computers, but it can be found only in a tiny fraction of mobile phones, and consumer electronics. Select one: True False

False

Logistics is the term that describes the extensive use of data, statistical and quantitative analysis, explanatory and predictive models, and fact-based management to drive decisions and actions. Select one: True False

False

Most mobile large cell phone carriers are exempted from having to license the wireless spectrum for transmission. Select one: True False

False

OLAP technology is primarily used for transaction processing. Select one: True False

False

Online backup services are considered a poor choice for end-users, since this only increases the likelihood that an individual's data will be hacked. Select one: True False

False

Organizations that have created a robust set of Web services and APIs around their processes and procedures are often said to have a service-independent architecture. Select one: True False

False

Payment continues to represent a barrier to widespread adoption of the sharing economy, since many consumers feel uncomfortable exchanging cash or financial information with strangers. Select one: True False

False

Project Entrepreneur, created by Facebook, aims to help female entrepreneurs build high-growth, high-impact businesses. Select one: True False

False

Rent the Runway only hires newly-minted college graduates for its Data Analytics Team, choosing to home grow talent. Select one: True False

False

Rent the Runway rentals are often only 25 percent of a dress's retail price. Select one: True False

False

SaaS and the utility computing-style efforts differ widely in terms of the benefits and risks they offer. Select one: True False

False

SaaS offerings usually work well when the bulk of computing happens at the client end of a distributed system. Select one: True False

False

Social media has been largely immune from fraud, given the human element of content and curation. Select one: True False

False

Surge pricing allows Uber to increase the supply of drivers when demand is high. Select one: True False

False

Tesco is the planet's largest retailer. Select one: True False

False

The black box nature of AI makes it easy to transparently demonstrate how machine learning software has arrived at decisions. Select one: True False

False

The language "http" is used to create and format Web pages. Select one: True False

False

The more application software that is available for a platform, the less valuable it potentially becomes. Select one: True False

False

Turning data into useable information is hindered by transactional databases set up to be simultaneously accessed for reporting and analysis. Select one: True False

False

Wall Street traders often choose a colocation facility with the goal to provide high-latency connectivity to their partners. Select one: True False

False

When others take advantage of a user or a service without providing any sort of reciprocal benefit, it is called localization. Select one: True False

False

When the Internet really took off, much of the Internet's operating infrastructure transitioned to be supported by government grants rather than private firms. Select one: True False

False

When using a public wireless network, using VPN software is not advisable as it can reveal your communications to any network eavesdroppers. Select one: True False

False

While most tech firms are still overwhelmingly male-dominated, AI education is made up of nearly 50 percent women. Select one: True False

False

While spreadsheets are popular tools, they cannot effectively be used for "what if" analysis. Select one: True False

False

While unions and hotel chains might not like Airbnb and feel threatened by its offerings, Airbnb is legal in nearly every market worldwide since private citizens are fully empowered to rent property that they own. Select one: True False

False

With SaaS, firms get the most basic offerings but can also do the most customization, putting their own tools (operating systems, databases, programming languages) on top. Select one: True False

False

Worms require an executable (a running program) to spread, attaching to other executables. Select one: True False

False

If a computer system can be equated to a layered cake, which of the following combinations represents the computer system in the bottom-to-top order? a.Hardware, operating system, application, user b.User, application, hardware, operating system c.User, operating system, hardware, application d.Application, operating system, hardware, user e.Operating system, hardware, user, application

Hardware, operating system, application, user

Which of the following is one of the reasons for the failure of technology projects? a.Inadequate testing of systems before deployment b.Insufficient expenditure on information systems c.Use of matured technology d.Prolonged project periods e.Disallowing "feature creep" during development

Inadequate testing of systems before deployment

Which of the following is not true regarding the competitive dynamics of most sharing economy marketplaces? a.Ratings represent a switching cost built over time by early participants in sharing economy marketplaces. b.Late-movers have a substantial advantage in this market since inventory should be cheaper to acquire for those firms that have entered markets more recently. c.Network effects should grow over time, favoring firms that got a successful, early start over rivals who arrived late doing the same thing. d.These are two-sided markets. e.None of the above - all statements are true.

Late-movers have a substantial advantage in this market since inventory should be cheaper to acquire for those firms that have entered markets more recently.

For years, which of the following is the only major media category that has seen an increase in spending? a.Online advertising b.Radio jingles c.Television ads d.Print media e.Telemarketing

Online advertising

Android is a software product developed by Google that allows cell phone manufacturers to control hardware and establishes standards for developing and executing applications on its platform. Android is thus an example of a(n) _____. a.operating system b.programming language c.user interface d.distributed system e.database management system

Operating System

Which of the following characteristics is said to be Java's biggest selling point? a.Open source nature b.Interpretability c.Platform independence d.Service-oriented architecture e.Data portability

Platform Independence

_____ provide the standards, syntax, statements, and instructions for writing computer software. a.Operating systems b.Application servers c.Database management systems d.Platforms e.Programming languages

Programming Languages

Which of the following is not a component of the scrum approach? a.Roles b.Reviews c.Artifacts d.Ceremonies

Reviews

A PC, laptop, or any other small computer can be set up to run server software. Select one: True False

True

A company does not have to install all of the modules of an ERP suite, but it might add functions over time. Select one: True False

True

A firm's information systems can influence the likelihood of partnering with other firms and its attractiveness as a merger or acquisition target. Select one: True False

True

A manager should take a vendor's reputation and financial position into consideration while making an IT outsourcing decision. Select one: True False

True

A significant portion of Facebook's underlying technical infrastructure consists of open source software. Select one: True False

True

AI systems may reveal biases in processes and workforce that firms aren't even aware exist. Select one: True False

True

App stores can lower distribution costs compared to packaged software alternatives. Select one: True False

True

Changing the letter case when typing in host and domain names does not affect the user's ability to reach the destination. Select one: True False

True

Conventional database technologies often choke when trying to sift through the massive amounts of data collected by many of today's firms, leading to the rise of Hadoop and other "Big Data" technologies. Select one: True False

True

Crime networks cannot commit enriching click fraud using AdWords on Google.com. Select one: True False

True

Critics of Internet.org worry that for billions of low-income users, Facebook will come to represent the only Internet they know and have access to, deepening the roots and entanglement vines of the firm's walled garden. Select one: True False

True

Customers who are on the fence about a choice can choose a second style as a backup for an additional fee. Select one: True False

True

DSL technology is less efficient for service providers in the United States because many of their customers live in less-densely populated suburbs and rural areas. Select one: True False

True

Desktop applications are typically designed for a single user. Select one: True False

True

Dumpster diving refers to physically trawling through trash to mine any valuable data or insights that can be stolen or used in a security attack. Select one: True False

True

Every eighteen months, employees are required to leave their teams and work on something different for at least a month. Select one: True False

True

Expedia used APIs to increase the distribution of travel products that it sells, relying on partners to plug into its technology and inventory. Select one: True False

True

Facebook founder and CEO Mark Zuckerberg maintains a majority of voting rights in the public company, virtually guaranteeing that his control of the firm continues, regardless of what investors say. Select one: True False

True

Facebook was one of the first social networking sites where users actually identified themselves using their real names. Select one: True False

True

Facebook will reduce the rank of posts that request reshares. Select one: True False

True

Firms adopting OSS may be at risk if they distribute code and aren't aware of the licensing implications. Select one: True False

True

Firms that grow quickly may seem less risky/more likely to succeed; therefore fast growth may help an entrepreneur extract better ownership terms from potential investors. Select one: True False

True

Firms that want significant control over the operating system and applications they put 'in the cloud' should choose an IaaS service over an SaaS offering. Select one: True False

True

General Motors backed Lyft with more than 450 million dollars. Select one: True False

True

Google has launched new formats to capture markets such as travel bookings and car shopping from within search, but by doing so, it risks alienating large advertisers who run competing services. Select one: True False

True

Google will dramatically lower the search rankings of firms that it feels have unfairly gamed organic search rankings. Select one: True False

True

Google's Project Link initiative has built massive fiber optic networks in Ghana and Uganda. Select one: True False

True

Hackers might infiltrate computer systems to enlist hardware for subsequent illegal acts. Select one: True False

True

Having too much inventory or insufficient inventory is known as a retailer's "twin nightmares." Select one: True False

True

If a website is not the first page on a public server, it isn't linked to from another public page, and no one has submitted the link to Google for indexing, then it will not appear in Google results. Select one: True False

True

JCPenny was one of Google's largest advertisers, spending millions a month in ads, yet Google punished the firm in search rankings when it detected that Penny violated Google's policies on gaming search results. Select one: True False

True

Java is not preferred for programming fast-executing, native desktop applications. Select one: True False

True

Just about every type of commercial product has an open source equivalent. Select one: True False

True

Many SaaS vendors have improved system customization options and integration with standard software packages. Select one: True False

True

Many residential providers of cable technology use a system that requires customers to share bandwidth with neighbors. Select one: True False

True

Most firms spend 70 to 80 percent of their information systems (IS) budgets just to keep their systems running. Select one: True False

True

Most messages sent between Web services are coded in XML. Select one: True False

True

Most of the time users spend on mobile phone is spent in apps, presenting a threat to Google's dominance in search as mobile use increases. Select one: True False

True

Much of the technology used by Google consists of components such as microprocessors and hard drives that might be found in conventional home computers. Select one: True False

True

Near field communication refers to a short-range, wireless communication standard. Select one: True False

True

One of the challenges of Rent the Runway Unlimited is that it will require women to further rethink their relationship with fashion and ownership. Select one: True False

True

One of the reasons one should be careful about clicking on any URL in an e-mail is that hackers can easily embed a redirection in e-mail links, rerouting a user to an alternate online destination. Select one: True False

True

Random occurrences in data mining results can be detected by dividing the data and building a model with one portion and using another portion to verify the results. Select one: True False

True

Rent the Runway's logistics and operations are so efficient that many items arriving by 8 a.m. can be turned around in twelve hours for same-day send-out. Select one: True False

True

Rent the Runway's primary warehouse; is the largest single dry cleaning operation in the United States. Select one: True False

True

Routers don't have perfect, end-to-end information on all points in the Internet. Select one: True False

True

Scalability allows a firm to scale from startup to blue chip without having to significantly rewrite its code. Select one: True False

True

Servers or organizations do not need to be housed within a country in order to use a country code as part of their domain name. Select one: True False

True

Social media profiles can also be used to fight online fraud. Select one: True False

True

Social networking sites such as Facebook and LinkedIn form valuable sources of vital information that can be used to craft a scam by con artists. Select one: True False

True

Some 65 percent of the top 200 ad-supported websites use AdSense for at least a portion of their ad revenue. Select one: True False

True

Spear phishing attacks specifically target a given organization or group of users. Select one: True False

True

Studies have shown that online advertising can significantly influence offline purchases. Select one: True False

True

Systems that can absorb any type of data, structured or not, from any type of source are often called schema-less. Select one: True False

True

The TCP works at both ends of Internet communication. Select one: True False

True

The data a firm can leverage is a true strategic asset when it is valuable, rare, imperfectly imitable, and non-substitutable. Select one: True False

True

The diversity of systems development staff can influence model development. Select one: True False

True

The more activity an ad network can monitor, the greater the chance that it can uncover patterns that are anomalous. Select one: True False

True

The rise of the Internet and distributed computing has led to an explosion in security losses by organizations worldwide. Select one: True False

True

Today, mobile makes up the vast majority of Facebook advertising revenue. Select one: True False

True

Uber's CEO views itself as software platform for shipping and logistics. Select one: True False

True

Unfortunately, IPv6 isn't backward compatible with IPv4. Select one: True False

True

Users spend the majority of their time on smart phone using apps, and apps are increasingly creating content-specific alternatives to Google's web-based search. Select one: True False

True

Users tend to have more focused intent (often focused on purchase decision-making) when using Google as compared to Facebook. Select one: True False

True

Web developers can easily block Google from indexing their otherwise publicly accessible content. Select one: True False

True

While some fear Airbnb is taking jobs away from hotel chains, the firm is also creating jobs and driving demand for a whole array of platform-enhancing services, including photographers, key-exchange coordinators, in-home chefs, house cleaners, and ride-sharing services. Select one: True False

True

App developers often lament the ______________ created within apps where data is more tightly controlled by a service provider and where firms must comply to the usage policies of the platform provided. a.network effects. b.SaaS revenues. c.security vulnerabilities d.walled garden. e.user interface.

Walled garden

_____ is a term that refers to a closed network or single set of services controlled by one dominant firm. a.Walled garden b.Cloud c.Network effects d.Free rider problem e.Localization

Walled garden

_____ are software systems designed to support interoperable machine-to-machine interaction over a network. a.Scripting languages b.Client-servers c.Web services d.Caches e.Business intelligence systems

Web Services

While Kalanick was the CEO of Uber, the company environment was best described as: a.a close-knit family b.a testosterone-fueled bad frat c.a competitive team d.a group of distant acquaintances e.a cohesive, forward-thinking band of entrepreneurs

a testosterone-fueled bad frat

How are news feeds a source of value for users on Facebook? a.It fosters the virality of information sharing vital to delivering value from the social graph. b.They are innovative and Facebook is the only social network to offer the feature. c.They are effective in protecting a user's personal information from others. d.They ensure that a single post will reach all friends and fans. e.They offer cross connectivity for users across several social networking sites.

a. It fosters the virality of information sharing vital to delivering value from the social graph.

E-discovery refers to: a.identifying and retrieving relevant electronic information to support litigation efforts. b.something a firm does not account for in its archiving and data storage plans. c.older information systems that are often incompatible with other systems, technologies, and ways of conducting business. d.collecting and reselling data. e.rewards and usage incentive, typically in exchange for a method that provides a more detailed tracking and recording of consumer activity.

a. identifying and retrieving relevant electronic information to support litigation efforts.

Which of the following is not a complication associated with implementing 5G services? a.5G transmission points are much larger than even the massive towers used to support 4G. b.Building infrastructure and related operating expenses are proving much costlier than previously expected. c.Many 5G firms in the US had planned to use technology from the Chinese firm Huawei, a firm banned by the Trump administration citing security concerns. d.Each wireless access point only covers a limited distance. e.All of the above are complications associated with implementing 5G services.

a. 5G transmission points are much larger than even the massive towers used to support 4G.

_____ is a set of standards for exchanging messages containing formatted data between computer applications. a.EDI b.DBMS c.CPM d.SCM e.ERP

a. EDI

Ad rank on Google is calculated using the equation: Ad Rank = f (_______________, Quality Score, expected impact of extensions and formats). a.Maximum CPC b.Maximum CPM c.CTR d.Impression e.PageRank

a. Maximum CPC

Updates that plug existing holes in a software are called: a.patches. b.compliance. c.maculations. d.keys. e.dongles.

a. Patches

Which of the following is not a step in developing and deploying more ethical and less risk-prone systems? a.Use AI in the hiring process. b.Develop a code of technology ethics. c.Create a systems review board. d.Hire ethicists. e.All of the above are steps in developing more ethical systems.

a. Use AI in the hiring process

_____ allow(s) a server to run what amounts to a copy of a PC—OS, applications, and all—and simply deliver an image of what's executing to a PC or other connected device. a.Virtual desktops b.Cloudbursting c.Hardware clouds d.Vertical niches e.Black swans

a. Virtual desktops

Information security policies would be ineffective without _____ and _____. a.audit; enforcement b.accountability; flexibility c.compliance; subjectivity d.protocols; the backing of ISO e.rigidity; adaptability

a. audit; enforcement

Link farming is a type of online advertising fraud where fraudsters attempt to: a.create a series of bogus websites, all linking back to a page, in the hope of increasing that page's results in organic search. b.pack a website with unrelated keywords in the hope of luring users who wouldn't normally visit a website. c.search keywords linked to rival ads in the hope of generating impressions without clicks to lower the performance rank of these ads. d.frame a rival by generating bogus clicks or impressions that appear to be associated with the rival, in the hope that this rival will be banned from an ad network. e.generate bogus impressions that can be linked back to a rival's ad to exhaust the rival's CPM ad budget.

a. create a series of bogus websites, all linking back to a page, in the hope of increasing that page's results in organic search.

_____ refer to databases focused on addressing the concerns of a specific problem or business unit. a.Data marts b.Dashboards c.Hadoop d.Data aggregators e.Data analytics

a. data marts

Providers of ________________ may need to spend more effort convincing customers to try their offerings. a.experience goods b.commodity products c.digital goods d.minimum viable products

a. experience goods

The website displayed when a user clicks on an ad is called the: a.landing page. b.organic result. c.home page. d.start page. e.redirecting page.

a. landing page

In security circles the phrase "compliance" refers to: a.legal or professionally binding steps that an organization must take. b.security audit practices used by the tech divisions of Big Four accounting firms. c.a firm's installing software to fulfill government surveillance requirements. d.the U.S. government legislation requiring organizations to share security breaches with law enforcement and industry trade organizations. e.only deploying open source software that is downloaded from approved GitHub locations.

a. legal or professionally binding steps that an organization must take.

One of the functions of the IP is to: a.route message packets to the final destination. b.slice up the message into smaller chunks of data called packets, to be sent over the network. c.check for damaged or corrupt message packets and request for replacements, if needed. d.label message packets with source and destination addresses. e.rearrange message packets in the same sequence as they were sent.

a. route message packets to the final destination.

The software business is extremely profitable compared to the hardware business because: a.the marginal cost to produce an additional copy of a software product is effectively zero. b.of the lack of market price regulations and guidelines. c.software producers serve niche businesses sectors with high profit margins. d.software development is a one-time process with no upgrade costs. e.software firms benefit from special tax exemptions that aid profitability.

a. the marginal cost to produce an additional copy of a software product is effectively zero.

Which of the following is not true about apps and the app economy? a.App store access is limited to industrialized nations with large smartphone user populations. b.Apps have been criticized as creating consumer switching costs vs. browser-based alternatives. c.App stores are "always open." d.Apps developed for one platform typically cannot be used on another platform. e.Apps have been vital to the rise of several high-valued efforts, including Uber, Instagram, and WhatsApp.

a.App store access is limited to industrialized nations with large smartphone user populations.

Which of the following statements is true of the term "cloud"? a.It refers to a collection of computing resources available for access over the Internet. b.It refers to the phenomenon of adapting products and services for different languages and regional differences. c.It refers to a situation when the value of a product or service increases as the number of its users expands. d.It refers to a situation when others take advantage of a user or a service without providing any sort of reciprocal benefit. e.It refers to a closed network or a single set of services controlled by one dominant firm.

a.It refers to a collection of computing resources available for access over the Internet.

Which of the following is true of the difference between operating systems and application software? a.Operating systems control the hardware, while application software performs the work that users and firms are directly interested in accomplishing. b.Operating systems support tasks performed by a single user, while application software support tasks performed by multiple users. c.Operating systems control the hardware elements visible to the human eye, while application software controls the hardware elements invisible to the human eye. d.Operating systems are software packages that integrate the many functions of a business, while application software works with a minimal degree of overlap. e.Operating systems are software packages offered by a third party, while application software contains programs that are designed in-house.

a.Operating systems control the hardware, while application software performs the work that users and firms are directly interested in accomplishing.

Some of the most common guidelines issued by websites when designing a secure password include: a.The password should be at least eight characters long and include at least one number and other nonalphabet character. b.The password should be short and straightforward. c.The password should include names of family members or pets, so as to be easily remembered. d.Choose a hard-to-guess password, then re-use this hardened password across websites. This minimize instances of calling systems professionals for a password reset, hence eliminating an additional potential vulnerability. e.The password should be the same as your name so as to trick the hacker.

a.The password should be at least eight characters long and include at least one number and other nonalphabet character.

Which of the following is true of scripting languages? a.They are often designed to be interpreted within their applications. b.They are compiled to run directly by a microprocessor. c.They typically execute outside an application. d.They are faster than the development efforts found in most commercial software. e.Most of these languages are complicated with respect to user friendliness.

a.They are often designed to be interpreted within their applications.

Facebook feeds: a.are limiting the reach of organic posts, prompting many firms to spend on Facebook ads to connect with more users. b.ensure that any post from an organization's fan page will arrive in the feed of anyone who has "Liked" that page. c.prohibit content promoting apps that run outside the Facebook platform, since such content competes with user attention and Facebook wants users to spend as much time as possible on its own services. d.will show identical ads to all users, worldwide, if they are of the same age and gender. e.are entirely ad-free. Zuckerberg refuses to run ads in feeds because he feels this will degrade the user experience, even though Facebook would likely earn significantly more if it did so.

a.are limiting the reach of organic posts, prompting many firms to spend on Facebook ads to connect with more users.

Installing a complex set of an organization's legacy systems on someone else's hardware can be a brutal challenge. For that reason, we can expect most cloud computing efforts to focus on: a.new software development projects. b.bettering the options for old software. c.improving quality of existing code. d.migrating to a set of robust and well-defined standards. e.the development of large pools of in-house specially-suited hardware.

a.new software development projects.

Mobile providers can be susceptible to poor coverage indoors as a result of: a.spectrum used by most mobile phone firms that does not travel well through solid objects. b.a high degree of latency. c.network congestion that clogs up the network traffic. d.a lack of sufficient number of towers owing to the not-in-my-backyard problem. e.an increase in bandwidth demand placed on their networks.

a.spectrum used by most mobile phone firms that does not travel well through solid objects.

Studying Facebook provides a context for understanding which of the following: a.network effects b.platform partnerships c.privacy d.business value of social media e.all of the above

all of the above

The sharing economy consists of which of the following? a.recirculation of goods b.increased utilization of durable assets c.exchange of services d.sharing of productive assets e.all of the above

all of the above

Which of the following statements is true of the term "FTTH"? a.It refers to high-speed data lines provided by many firms all across the world that interconnect and collectively form the core of the Internet. b.It refers to broadband service provided via light-transmitting fiber-optic cables. c.It refers to the language used to compose Web pages. d.It refers to a situation when separate ISPs link their networks to swap traffic on the Internet. e.It refers to a system that connects end users to the Internet.

b. It refers to broadband service provided via light-transmitting fiber-optic cables.

When a firm has an IPO, it is said to have: a.been liquidated due to short selling. b.gone public, selling shares on a public stock exchange for the first time. c.received government funding. d.been liquidated due to switching costs. e.issued a dividend.

b. gone public, selling shares on a public stock exchange for the first time.

_____ put(s) users in control so that they can create custom reports on an as-needed basis by selecting fields, ranges, summary conditions, and other parameters. a.Canned reports b.Ad hoc reporting tools c.Dashboards d.Data cubes e.Online analytical processing

b. Ad hoc reporting tools

_____ allows users to pay for goods, store gift cards, and redeem coupons using their mobile phones. a.Google+ b.Android Pay c.Google Currents d.Android e.Takeout

b. Android Pay

_____ is the insulated copper cable commonly used by cable television providers with shielding to reduce electrical interference. a.Optical fiber cable b.Coaxial cable c.Ribbon cable d.FTTH cable e.Amdahl cable

b. Coaxial cable

_____ technology is a broadband technology that can use the wires of a local telephone network. a.Fiber to the Home (FTTH) b.Digital Subscriber Line (DSL) c.Coaxial cable d.Telecom-broadband hybrid e.Broadband over power line (BPL)

b. Digital Subscriber Line (DSL)

Which of the following was considered a contributor to vulnerabilities in the OpenSSL security product, known as the Heartbleed bug: a.Overseas hackers modified the open source code and uploaded a compromise version to the Internet, which became widely used. b.Few developers were working on the project, so the ideal that "given enough eyeballs, all bugs are shallow" wasn't met with OpenSSL. c.Developers failed to see a major incompatibility with versions of the Windows operating system and Chrome browser. d.There was no commercial entity overseeing the project. e.A Linux update was not coordinated with OpenSSL, leaving a gaping hole when the two products were used together to transmit content over the Internet.

b. Few developers were working on the project, so the ideal that "given enough eyeballs, all bugs are shallow" wasn't met with OpenSSL.

Which of the following statements holds true for the term opt-out? a.It refers to a program that requires customer consent. b.It refers to a program that enrolls all customers by default, but that allows consumers to discontinue participation if they want to. c.It refers to the generation of bogus clicks, either for financial gain or to attack rivals by draining their online ad budget. d.It refers to a small computer program that extends the feature set or capabilities of another application. e.It refers to recruiting a network of users with the goal of spreading IP addresses across several systems and making a fraud effort more difficult to detect.

b. It refers to a program that enrolls all customers by default, but that allows consumers to discontinue participation if they want to.

__________ is a type of AI often broadly defined as software with the ability to learn or improve without being explicitly programmed. a.Deep learning b.Machine learning c.OCR d.Neural networking

b. Machine learning

_____________ occurs by repeatedly searching keywords linked to rival ads with the goal of reducing the rival's click through rate. a.Spamdexing b.Rank-based impression fraud c.Keyword stuffing d.Depleting impression fraud e.Disbarring fraud

b. Rank-based impression fraud

Which of the following is not considered an advantage of Hadoop? a.Flexibility b.Relational structure c.Scalability d.Cost effectiveness e.Fault tolerance

b. Relational structure

A server running _____ can create smaller compartments in memory that each behave as a separate computer with its own operating system and resources. a.private clouds b.virtualization software c.genetic algorithms d.neural networks e.open source software

b. Virtualization software

The bulk of Google's revenue comes from _____. a.licensing b.advertising c.registration charges d.Android e.user fees

b. advertising

Technologies that measure and analyze human body characteristics for identification or authentication are known as _____. a.overlamination processes b.biometrics c.smart tags d.bio-embedded systems e.holographs

b. biometrics

Computer-driven investment models can be very effective when the market behaves as it has in the past. However, in terms of historical consistency, they are vulnerable to failure in the face of: a.brute force attacks. b.black swans. c.zero-day exploits. d.calendar rivalry metrics. e.distributed denial of service.

b. black swans

Every dollar spent on technology may lead to five to seven more dollars on ____________. a.Advertising b.consulting and other services c.facility space d.none of the above e.all of the above

b. consulting and other services

The process of computers identifying a user's physical location for the purpose of delivering tailored ads or other content is called _____. a.parallelism b.geotargeting c.triangulation d.network parallax e.trilateration

b. geotargeting

Google's stated mission is to: a.establish itself as the most valuable media company in the world. b.organize the world's information and make it universally accessible and useful. c.pair Internet surfers with advertisers and earn revenue along the way. d.foster technological innovation to promote a knowledge-driven culture. e.make the world more open and connected.

b. organize the world's information and make it universally accessible and useful.

Which of the following is one of the characteristics of using software as a service model? a.Longer deployment times b.Scalable systems c.Fixed operating expenses d.Heightened financial risk e.Higher maintenance costs

b. scalable systems

Computer systems are often infected with malware by means of exploits that sneak in masquerading as something they are not. These exploits are called: a.rootkits. b.trojans. c.viruses. d.worms. e.honeypots.

b. trojans

Which of the following statements holds true for the term spoof? a.It refers to a con executed using technology, typically targeted at acquiring sensitive information or tricking someone into installing malicious software. b.It refers to e-mail transmissions and packets that have been altered to seem as if they came from another source. c.It refers to scrambling data using a code or formula, known as a cipher, such that it is hidden from those who do not have the unlocking key. d.It refers to a seemingly tempting, but bogus target meant to draw hacking attempts. e.It refers to highly restrictive programs that permit communication only with approved entities and/or in an approved manner.

b.It refers to e-mail transmissions and packets that have been altered to seem as if they came from another source.

Systems that use data created by other systems to provide reporting and analysis for organizational decision-making are called _____ systems. a.application server b.supply chain management c.enterprise resource management d.business intelligence e.customer relationship management

business intelligence

Which of the following did not help create demand for Rent the Runway? a.Designers struggled to expand their market to reach younger consumers b.Many customers were interested in high-end fashion but couldn't afford it c.Flash sales sites were on the rise, creating tremendous interest in the flash-sales model of Rent the Runway d.Social media was increasing pressure on women to wear something new

c. Flash sales sites were on the rise, creating tremendous interest in the flash-sales model of Rent the Runway

What is Facebook's motivation for offering new features under an opt-out scheme? a.It gives users a sense of control of their online activities. b.It is easier for users to manage, as opposed to complex opt-in programs. c.It ensures a larger audience, and helps enhance network effects and data advantages. d.Internet laws stipulate that all new features offered by social networks should be based on an opt-out format. e.Users are seldom bothered about managing their personal data and tracking of their online activities.

c. It ensures a larger audience, and helps enhance network effects and data advantages.

Which of the following conditions is essential for data mining to work? a.The data must be collected from proprietary sources and not from data aggregators. b.The organization must leverage standard relational databases as opposed to inferior hierarchical and analytical databases. c.The events in the data should reflect current and future trends. d.The data mining software must necessarily incorporate ad hoc reporting tools and dashboards. e.The data should have passed the Diehard suite of stringent tests for randomness.

c. The events in the data should reflect current and future trends.

Cookies: a.small computer programs that extend the features or capabilities of another application. b.the design and content components of an advertisement. c.a line of identifying text, assigned and retrieved by a given Web server and stored by a user's browser. d.terms that prevent specific ads from being published. e.a temporary storage space used to keep a running count of the number of ad impressions.

c. a line of identifying text, assigned and retrieved by a given Web server and stored by a user's browser.

Attacks that exhaust all possible password combinations in order to break into an account are called _____ attacks. a.strong arm b.permuted c.brute-force d.zero-day e.infinity

c. brute-force

The _____ measures the percentage of people who clicked on an ad to arrive at a destination-site. a.click churn rate b.link c.click-through rate d.click landing-page rate e.impression score

c. click-through rate

Google assumes individual components that make up the servers in its server farms will regularly fail, but no single failure should interrupt the firm's operations. By doing so, Google can ensure its network is: a.data optimized. b.traffic efficient. c.fault-tolerant. d.service-regulated. e.organically searched.

c. fault-tolerant

In database systems, a table is also known as a _____. a.field b.record c.file d.row e.key

c. file

The term _____ originally referred to a particularly skilled programmer. a.data harvester b.cracke c.hacker d.black hat e.hacktivist

c. hacker

Which of the following is not a factor that has contributed to the explosion of machine learning? a.open source tools b.low-cost cloud computing c.lack of new talent in tech jobs d.high-volume data crunching e.All of the above contribute to the explosion of machine learning.

c. lack of new talent in tech jobs

Less popular open source products are not likely to attract the community of users and contributors necessary to help improve these products over time. This situation reiterates the belief that _____ are a key to success. a.proprietary products b.brand strategies c.network effects d.technology expenses e.advertising campaigns

c. network effects

To overcome reception and availability problems, mobile telecom services firms have begun _____ that provide a "five bar" coverage in a roughly 5,000-square-foot footprint. a.providing incentives to communities that allow the construction of towers b.leveraging GEO and LEO technologies c.offering femtocells d.providing wi-fi base stations at very low costs e.switching from Wi-Fi to WiMax

c. offering femtocells

A _____ enables communication by defining the format of data and rules for exchange. a.nomenclature b.regulation c.protocol d.dialect e.convention

c. protocol

The deep Web refers to: a. peer-to-peer file sharing networks that are used to illegally share copyrighted material. b. seemingly innocent websites, containing malware that infects computers. c. sites that cannot be indexed by Google and other search engines. d. networks that allow only mutually trusted peers to participate in file-sharing activities. e. websites that advocate violence toward people of a specific race, ethnicity, or religion.

c. sites that cannot be indexed by Google and other search engines.

Search engines use _____, or Web crawlers, to discover documents for indexing and retrieval. a.caches b.landing pages c.spiders d.proxy servers e.interstitials

c. spiders

Which of the following is a valid statement on information security? a.Security breaches cannot be prevented despite the adoption of the best security policies. b.Technology lapses are solely responsible for almost all security breaches. c.Information security is everybody's responsibility. d.Greater expenditure on security products is the only way to contain security breaches. e.A reactive, rather than proactive, approach is better suited for dealing with security breaches.

c.Information security is everybody's responsibility.

Which of the following statements holds true for the term encryption? a.It refers to a con executed using technology, typically targeted at acquiring sensitive information or tricking someone into installing malicious software. b.It refers to e-mail transmissions and packets that have been altered to seem as if they came from another source. c.It refers to scrambling data using a code or formula, known as a cipher, such that it is hidden from those who do not have the unlocking key. d.It refers to a seemingly tempting, but bogus target meant to draw hacking attempts. e.It refers to highly restrictive programs that permit communication only with approved entities and/or in an approved manner.

c.It refers to scrambling data using a code or formula, known as a cipher, such that it is hidden from those who do not have the unlocking key.

In database terminology, a record represents: a.a list of data, arranged in columns and rows. b.all of the data in a given column. c.a single instance of whatever the table keeps track of. d.a field or combination of fields used to uniquely identify a file. e.one or more keys that relate separate tables in a database.

c.a single instance of whatever the table keeps track of.

Vendors who use open source as part of their product offerings can expect to bring new products to the market faster because: a.open source products have lower product lifecycles. b.the large number of people who look at the code help speed up product development. c.they can skip whole segments of the software development process. d.open source software programming is based on simpler code than commercial products. e.the open source nature of the products ensures they don't have to conduct debugging tests.

c.they can skip whole segments of the software development process.

Facebook has offered a system where website operators can choose to accept a user's Facebook credentials for logging in. Website operators appreciate this feature because: a.they can charge users for accessing their content and hence, generate revenue. b.they can afford to spend less on website maintenance. c.users can access websites without creating an account, reducing a potential barrier to customer acquisition. d.Facebook's advertising programs offer better revenue for viewed content. e.they can associate their offerings with the Facebook brand.

c.users can access websites without creating an account, reducing a potential barrier to customer acquisition.

Brand advertisers largely consider user-generated content as low-quality, brand-unsafe inventory for running advertisements. This can be attributed to: a.content adjacency. b.audience matching. c.collaborative filtering. d.search engine marketing. e.negative keyword usage.

content adjacency

Systems distributed throughout the Internet that help improve the delivery speeds of Web pages and other media, typically by spreading access across multiple sites located closer to users are known as: a.Internet exchange points. b.private clouds. c.colocation centers. d.content delivery networks. e.cookies.

content delivery networks

The term "content adjacency" refers to: a.placing advertisements to reach consumers based on various traits such as demographics and purchase history. b.a technique used by online publishers to increase the effectiveness of their campaigns. c.advertisements that are targeted based on a user's query. d.a concern that an advertisement will run near offensive material, embarrassing an advertiser and/or degrading their products or brands. e.problems associated with advertisements that run before a user arrives at the home page of a website.

d. a concern that an advertisement will run near offensive material, embarrassing an advertiser and/or degrading their products or brands.

The acronym HFT refers to: a.High Finance Telecommunications b.High Fidelity Transmissions c.Hedge Fund Transfers d.High Frequency Trading e.Hypertext File Transfer

d. High Frequency Trading

Peering usually takes place at neutral sites called _____. a.https b.IPs c.ISPs d.IXPs e.STPs

d. IXPs

_____ can be either software-based or deployed via hardware, such as a recording "dongle" that is plugged in between a keyboard and a PC. a.Shadow-keyboards b.Bootloggers c.KitRoots d.Keyloggers e.Adwares

d. Keyloggers

_____ is a method of querying and reporting that takes data from standard relational databases, calculates and summarizes the data, and then stores the data in a special database called a data cube. a.Ad hoc reporting b.E-discovery c.Data aggregation d.Online analytical processing e.Data adjacency

d. Online analytical processing

_____ are third-party computers that pass traffic to and from specific addresses without revealing the address of the connected users. a.Routers b.Web crawlers c.Spiders d.Proxy servers e.Subnetwork masks

d. Proxy servers

A firm that provides hardware and services to run websites of others is known as a(n) _____. a.Website incubator b.Internet service facilitator c.Web domain name registrar d.Web hosting service e.Internet Web fab

d. Web hosting service

Supporters of net neutrality believe: a.it will improve innovation. b.it will keep costs low. c.it will level the playing field among competitive services offered over the Internet. d.all of the above. e.none of the above.

d. all of the above

In online advertising, the term "impression" refers to: a.the website displayed when a user clicks on an advertisement. b.the measure of a user's perception of ad effectiveness. c.ads that run before a user arrives at a website's main content. d.each time an ad is shown. e.the design and content of an advertisement.

d. each time an ad is shown

An early version of the "Einstein" AI model being developed at Salesforce identified the top predictor of a sales opportunity was if a client: a.had a large disposable income. b.had purchased from a particular firm in the past. c.was between the ages of 30 and 55. d.had the name "John." e.None of the above.

d. had the name "John."

A(n) _____ is an AI system that examines data and hunts down and exposes patterns, in order to build models to exploit findings. a.Hadoop b.canned report c.data aggregator d.neural network e.e-discovery

d. neural network

Internet networks are _____. a.bit-switched networks b.circuit-switched networks c.data-switched networks d.packet-switched networks e.byte-switched networks

d. packet-switched networks

In database systems, a row is also known as a _____. a.table b.column c.key d.record e.field

d. record

Vendors frequently sign _____ with their customers to ensure a guaranteed uptime and define their ability to meet demand spikes. a.infrastructure provider contracts b.host vendor terms c.open source contracts d.service level agreements e.requests for information

d. service level agreements

Attacks that are so new that they have not been clearly identified, and so have not made it into security screening systems are called _____. a.novel attacks b.first mover attacks c.non-precedent breaches d.zero-day exploits e.brute force attacks

d. zero-day exploits

Which of the following statements is consistent with ground realities regarding information security? a.Cyber-crime is not yet considered a serious enough threat to warrant the attention of law-enforcement agencies. b.Law-enforcement agencies are well-resourced to fight cyber-crimes effectively. c.Governments usually outmatch private industry in terms of retaining top talent with incentives and generous pay. d.Law-enforcement agencies struggle to hire, train, and retain staff capable of keeping pace with today's cyber-criminals. e.Cyber-crime is not rewarding in terms of financial gain.

d.Law-enforcement agencies struggle to hire, train, and retain staff capable of keeping pace with today's cyber-criminals.

What are the implications for firms that do not have common database systems with consistent formats across their enterprise? a.They can save infrastructural and operational costs. b.They can expect to leverage economies of scale by serving more customers. c.They can hedge against the risk of data redundancy. d.They struggle to manage their value chain efficiently. e.They profit from the aggregation of diverse data sets and enhance their repositories.

d.They struggle to manage their value chain efficiently.

Linking envelope return codes to inventory systems allows Rent the Runway to do all but which of the following: a.prioritize items that need to be sent out for immediate inspection, cleaning, and repair b.prioritize items for optimized shipping—getting an item prepped early if it allows for less expensive but slightly slower shipping. c.print more expensive, but faster shipping return envelopes for garments that will be urgently needed for a scheduled rental. d.queue garments for robotic repair by custom machines that can mend zippers, replace buttons, and dye tarnished clothing to exact specifications.

d.queue garments for robotic repair by custom machines that can mend zippers, replace buttons, and dye tarnished clothing to exact specifications.

Oracle, a firm that sells commercial ERP and database products, provides Linux for free, selling high-margin Linux support contracts for as much as five hundred thousand dollars. Oracle's motivation for this lies in: a.accelerating the shift of open source software towards a proprietary regime. b.using open source software to fuel sales of hardware. c.impoverishing other open source developers and furthering its own proprietary offerings. d.using open source software to wean customers away from competitors. e.protecting itself from the risks of distributing code while unaware of legal implications.

d.using open source software to wean customers away from competitors.

Which of the following is an example of computer hardware? a.Malware b.Operating system c.Application d.Platform e.A video game console

e. A video game console

Which of the following are considered sources of information that can potentially be used by social engineers? a.LinkedIn b.Corporate directories c.Social media posts d.Contests or surveys e.All of the above

e. All of the above

Which of the following technologies is(are) being used to replace the older EDI for specifying data standards? a.JavaScript object notation b.Hypertext transfer protocol c.Extensible markup language d.Both (a) and (b) e.Both (a) and (c)

e. Both (a) and (c)

_____ is the process of using computers to identify hidden patterns in and to build models from large data sets. a.Data harvesting b.E-discovery c.Optimization d.Report canning e.Data mining

e. Data mining

"Cookies cannot reliably identify individual users."Which of the following is the reason for the statement shown above? a.Cookies assigned by Web servers are prone to duplication. b.The US government has banned the use of cookies for user identification. c.The explosion in Internet-enabled mobile devices has resulted in an acute shortage of IP addresses. d.Internet service providers assign arbitrary IP addresses to devices accessing the Internet from the same network. e.Individual users use different browsers on the same computer to surf the Web.

e. Individual users use different browsers on the same computer to surf the Web.

Which of the following statements holds true for the term click farm? a.It refers to a program that requires customer consent. b.It refers to a program that enrolls all customers by default, but that allows consumers to discontinue participation if they want to. c.It refers to the generation of bogus clicks, either for financial gain or to attack rivals by draining their online ad budget. d.It refers to a small computer program that extends the feature set or capabilities of another application. e.It refers to recruiting a network of users with the goal of spreading IP addresses across several systems and making a fraud effort more difficult to detect.

e. It refers to recruiting a network of users with the goal of spreading IP addresses across several systems and making a fraud effort more difficult to detect.

Which of the following statements holds true for the term spider? a.It refers to the Internet directory service that allows devices and services to be named and discoverable. b.It refers to the process of improving a page's organic search results. c.It refers to Internet content that can't be indexed by Google and other search engines. d.It refers to a temporary storage space used to speed computing tasks. e.It refers to software that traverses available Web links in an attempt to perform a given task.

e. It refers to software that traverses available Web links in an attempt to perform a given task.

The most dominant standard for 4G technology worldwide is: a.Wi-Fi b.WiMax c.GPRS d.Circuit switching e.LTE

e. LTE

Which of the following was an outdated notion regarding open source software and has been shown to be inaccurate? a.Open source software is free and its code is available for anyone to look at and potentially modify. b.Open source software code can be changed and redistributed, provided the modified software remains open and free. c.Open source software is to technology what capitalism is to economics. d.The majority of persons who work on open source projects are paid by commercially motivated employers. e.Open source is fueled on the contributions of loners tooling away for the glory of contributing to better code.

e. Open source is fueled on the contributions of loners tooling away for the glory of contributing to better code.

_____ involves allowing voice packets to gain delivery importance over packets for applications like e-mail. a.Voice precedence b.Data rationing c.Right-of-way for voice d.Information queuing e.Packet prioritization

e. Packet prioritization

____ repeatedly sends a cluster of three packets starting at the first router connected to a computer, then the next, and so on, building out the path that packets take to their destination. a.Firewall b.Router c.Pathfinder d.Mapper e.Traceroute

e. Traceroute

The use of public wireless connections can increase a user's vulnerability to monitoring and compromise. ____________ software can be used to encrypt transmissions over public networks, making it more difficult for a user's PC to be penetrated. a.DDos b.Rootkit c.Keylogging d.CAPTCHA e.VPN

e. VPN

Which of the following applications is most likely to use UDP instead of TCP? a.E-mail b.Web transmissions c.File transfer d.Peer-to-peer downloads e.Web-based phone calls

e. Web-based phone calls

Viruses are programs that infect other software or files and require: a.a large file size to spread. b.the computer to be shutdown to spread. c.Windows as an operating system to spread. d.a disk based operating system to spread. e.an executable program to spread.

e. an executable program to spread

Systems that deny the entry or exit of specific IP addresses, products, Internet domains, and other communication restrictions are said to employ a(n): a.intrusion detection software. b.access restriction software. c.whitelists. d.anti-virus software. e.blacklists.

e. blacklists

This process of converting a code into machine-readable form is known as: a.integrating. b.assimilating. c.debugging. d.sequencing. e.compiling.

e. compiling

A(n) _____ refers to a heads-up display of critical indicators that allow managers to get a graphical glance at key performance metrics. a.interstitial b.embassy c.canned report d.prediction interface e.dashboard

e. dashboard

Firms that collect and resell data are known as: a.data barons. b.data mongers. c.knowledge consultancies. d.data miners. e.data aggregators.

e. data aggregators

Horizontally oriented banners and vertically oriented "skyscraper" ads are typically examples of: a.interstitials. b.buzz marketing ads. c.text ads. d.affiliate ads. e.display ads.

e. display ads

In database systems, a _____ defines the data that a table can hold. a.row b.key c.record d.file e.field

e. field

If a customer pays a retailer in cash, he is likely to remain a mystery to the retailer because his name is not attached to the money. Retailers can tie the customer to cash transactions and track the customer's activity if they can convince the customer to use a _____. a.transaction processing system b.point-of-sale terminal c.data cube d.dashboard e.loyalty card

e. loyalty card

A _____ is a system that provides rewards and usage incentives, typically in exchange for a method that provides a more detailed tracking and recording of consumer activity. a.sugging report b.canned report c.dashboard d.legacy system e.loyalty program

e. loyalty program

The domain name service (DNS) is a distributed database that allows users to communicate with other computers by: a.assigning IP addresses to different domain names. b.mapping host names to domain names. c.creating IP addresses that are unique to servers. d.assigning domain names to different IP addresses. e.mapping host and domain names to IP addresses of computers.

e. mapping host and domain names to IP addresses of computers.

Software that is free and whose code can be accessed and potentially modified by anyone is referred to as _____. a.shared source files b.proprietary software c.available files d.licensed documents e.open source software

e. open source software

If a firm's pages are not near the top of query results, customers may never discover its website. This has led to _____ becoming a critical function for many marketing organizations. a.last mile access b.geotargeting c.outsourcing d.content adjacency e.search engine optimization

e. search engine optimization

Which of the following is not a reason why Rent the Runway appeals to designers? a.The firm introduces high-end designer brands to new customers. b.The firm brings in younger customers, averaging about a decade younger than department store customers. c.Most Rent the Runway customers rent brands they've never bought before. d.Some designers have used Rent the Runway to test new looks. e.None of the above—all convey the site's appeal to designers

e.None of the above—all convey the site's appeal to designers

The LAMP stack of open source products is used: a.as a template for most operating systems. b.to provide guidelines for programming databases. c.in debugging most of the software tools available today. d.as a global set of standards for software product improvements and official releases. e.to power many of the Internet's most popular websites.

e.to power many of the Internet's most popular websites.

Which of the following should an organization consider when making make/buy/rent decisions for a given software system? a.Competitive advantage b.Legal and Compliance c.Skills, expertise, and labor d.Cost e.Time f.All of the above g.None of the above

f. all of the above

Another major concern for firms in the sharing economy is uncertainty around the ability of these firms to continue to consider their workers as ____________ and not employees. a.investors b.critics c.independent contractors d.liabilities e.none of the above

independent contractors


Conjuntos de estudio relacionados

Exam 7 (Pathologies/Special tests of the Elbow, Wrist, and Hand joints)

View Set

AP Bio Ch.17 Gene to Protein Test

View Set

3: Judicial, Alternative, and E-Dispute Resolution

View Set

The Sciences of Anatomy and Physiology

View Set