BIS Quizzes - Final

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

In the ___ model of informed consent, personal information cannot be collected until he consumer specifically agrees that his or her data can be collected. A: opt-in B: opt-out C: opt-up D: opt-down

A: opt-in

How can you protect your online privacy? Opt-out from cookies for advertising Use privacy-centric browser like Tor Use browser add-ons to block third-party cookies Carefully check your social network settings All of them

All of them

Which of the following concepts encompass all the others? Machine learning Artificial intelligence Supervised learning Unsupervised learning

Artificial intelligence

____ cryptography uses a pair of mathematically related keys to encrypt and decrypt the messages. Symmetric Permutation Substitution Asymmetric

Asymmetric

Which of the following types of e-commerce involves businesses selling goods and services directly to individuals via the Internet? P2P e-commerce B2C e-commerce B2B e-commerce C2C e-commerce

B2C e-commerce

Which of the following descriptions about Macrotasks is not correct: A: tasks that can be done independently B: most effective when the problem is novel C: require special skill D: worker paid by task

B: most effective when the problem is novel

Which of the following has a hidden layer that processes inputs? A: Business intelligence system B: Expert system C: Neural network D: Knowledge management system E: Genetic algorithm

C: Neural network

Which of the following is not a major benefit of expert systems? A: improved decisions B: better quality and service C: ability to scale to deal with very large data sets D: reduced errors E: reduced training time

C: ability to scale to deal with very large data sets

Which of the following is NOT a feature of the General Data Protection Regulation (GDPR)? A: It applies to all firms doing business in the EU. B: Its protections of the privacy rights of EU citizens apply worldwide, regardless of where processing of the data takes places C: It imposes fines on companies for violating the regulation up to 40% of a fir's global revenue. D: It creates a single EU privacy policy D: It prevents firms from using cookies.

D: It prevents firms from using cookies.

InnoCentive is a ___ platform where companies can crowdsource a complex data-related problem. A: crowdfunding B: macrotasks C: microtasks D: crowd contests E: sharing economy

D: crowd contests

A chatbot is an example of which of the following? A: Computer vision system B: Genetic algorithm C: Augmented reality D: Virtual reality system E: Intelligent agent

E: Intelligent agent

Conversion rate doesn't depend on the user inference of e-commerce site.

False

Smartphones are NOT vulnerable to malicious software or penetration from outsiders.

False

_____ is a set of hardware and software to prevent unauthorized users from accessing private networks. Transport Layer Security (TLS) Identify management & authentication Firewalls Wi-Fi encryption standard WPA2

Firewalls

Which of the following statement is NOT part of California Consumer Privacy Act (CCPA)? Allow users to opt-out from data collection for marketing purposes Report data breaches Review and delete personal data Must ask for users consent before collecting data

Must ask for users consent before collecting data

Which of the following tools is NOT an example of user authentication? Biometric login Password Two-factor login Tokens

Tokens

A computer worm is a program that can copy itself to other computers on the network.

True

A firewall is a combination of hardware and software that controls the flow of incoming and outgoing network traffic.

True

Advertising networks such as Google, Facebook and Apple are capable of tracking personal browsing behavior across the Internet and devices.

True

The latest scandal on Facebook for it ignoring the negative impact of social networks on teenagers reveals a conflict between consumer welfare and company's profit.

True

The term 'usability' is normally used interchangeably with user experience (UX).

True

To build an online community with long-term viability, the firm should encourage diversity.

True

When preparing the system flowchart for current business processes, an important step is to list all activities in chronological order.

True

AI applications are used by search engines and social networks to target ads.

True.

Which of the following factors that affects the conversion rate is NOT related to usability? Slow page load Unclear marketing message Clumsy site navigation Ineffective presentation

Unclear marketing message

___ is an application that directly utilizes natural language processing. Loan approval decision Facebook's DeepFace Voice assistant like Siri and Alexa Google's AlphaGo

Voice assistant like Siri and Alexa

Which of the following company (or brand) is an example of 'pure' crowdsourcing business as described in the lecture? Upwork Google Wikipedia Fiverr Airbnb

Wikipedia

In digital markets: transaction costs increase search costs increase information asymmetry increases menu costs are lower network effects decline

menu costs are lower

reCAPTCHA is a brilliant example of using ____ to crowdsourcing a business problem. microtasks crowd contests gig economy macrotasks crowdfunding

microtasks

Compared to traditional goods, digital goods (or information goods) have: nearly zero marginal cost higher marketing cost. higher costs of distribution. high inventory costs.

nearly zero marginal cost

It is suggested to incorporate ___ in security & privacy trainings. positive reinforcement theoretical material You Answered standardized training material one-time practice

positive reinforcement

Advanced encryption standard (AES) specifies a(n) ____ encryption algorithm. substitution symmetric asymmetric permutation public key

symmetric

Deep learning networks: use multiple layers of neural networks to detect patterns in input data. rely on experts to tell the system what patterns to expect in the data. rely on humans to help it identify patterns. require labeled data as input.

use multiple layers of neural networks to detect patterns in input data.

Which of the following descriptions about system flowchart is NOT an advantage of using it to document business processes? Help business to identify manual processes that are susceptible to human errors. Given the business narrative, there is only one way to draw the flowchart. Easy to communicate the business process within the organization. Help business to identify processes that may increase manual workload.

Given the business narrative, there is only one way to draw the flowchart.

Which of the following best describes the effect that new information technology has on society? It has a waterfall effect in raising ever more complex ethical issues. It has a magnifying effect, creating increasing numbers of ethical issues. It has a dampening effect on the discourse of business ethics. It has a ripple effect, raising new ethical, social, and political issues.

It has a ripple effect, raising new ethical, social, and political issues.

Which of the following phenomena is NOT part of our lecture on the ethical issues of IS? Personal data & privacy Discrimination Moral dilemma in self-driving cars Piracy

Piracy

WannaCry is an example of which of the following? Worm Evil twin Phishing Ransomware SQL injection attack

Ransomware

____ means webpages can adjust to different sizes of screen (e.g., laptop vs phone) automatically while displaying the same content.

Responsive design


Kaugnay na mga set ng pag-aaral

Quiz Unit 9 - Government Sponsored and Other Financing

View Set

Bibl 1200 His of Is Owens Final Exam

View Set