Management Exam 2 Test ?

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Which process is used to protect transmitted data in a VPN? A) Tunneling B) PPP C) VOIP D) Packet-switching E) Chaining

A) Tunneling

Advertisers use ________ in order to display more relevant ads based on a user's search and browsing history. A) behavioral targeting B) Web bugs C) NORA D) intelligent agents E) FIP principles

A) behavioral targeting

Which of the following refers to the ability of a computer, product, or system to expand to serve a larger number of users without breaking down? A) Modality B) Scalability C) Expandability D) Disintermediation E) Customizability

B) Scalability

A VPN: A) is an encrypted private network configured within a public network. B) is more expensive than a dedicated network. C) provides secure, encrypted communications using Telnet. D) is an Internet-based service for delivering voice communications. E) is a proprietary networking service technology developed by individual corporations.

A) is an encrypted private network configured within a public network.

) In the ________ model of informed consent, personal information cannot be collected until the consumer specifically agrees that his or her data can be collected. A) opt-in B) opt-out C) P3P D) PGP E) safe harbor

A) opt-in

The practice of contracting custom software development to an outside firm is commonly referred to as: A) outsourcing. B) scaling. C) service-oriented architecture. D) application integration. E) utility computing.

A) outsourcing.

Prewritten, commercially available sets of software programs that eliminate the need for a firm to write its own software programs for certain functions, are referred to as: A) software packages. B) mashups. C) outsourced software. D) open-source software. E) service level agreements.

A) software packages.

When a cookie is created during a website visit, it is stored: A) on the website's server. B) on the hard drive of the visitor's computer. C) on the ISP's servers. D) in the browser's application settings. E) nowhere, because they are only used during a visit and are discarded once a visitor leaves the website.

B) on the hard drive of the visitor's computer.

In the domain name "http://books.pearson.com", which element is the second-level domain? A) books B) pearson.com C) com D) none; there is no second-level domain in this name E) books.pearson

B) pearson.com

The domain .gov is a(n): A) Internet root domain. B) top-level domain. C) host domain. D) network domain. E) third level domain.

B) top-level domain.

Which of the following involves practices and technologies to minimize the environmental effects of manufacturing and managing computing devices? A) Edge computing B) Cloud computing C) Green computing D) Utility computing E) On-demand computing

C) Green computing

Which of the following is a data analysis technology that finds obscure connections between data in disparate sources? A) HIPAA B) FIP C) NORA D) COPPA E) Spyware

C) NORA

Which of the following enables a single physical resource (such as a server or a storage device) to appear to the user as multiple logical resources? A) Cloud computing B) Autonomic computing C) Virtualization D) Multicore processing E) Ubiquitous computing

C) Virtualization

Bandwidth is the: A) number of frequencies that can be broadcast through a medium. B) number of cycles per second that can be sent through a medium. C) difference between the highest and lowest frequencies that can be accommodated on a single channel. D) total number of bytes that can be sent through a medium per second. E) geographical distance spanned by a network.

C) difference between the highest and lowest frequencies that can be accommodated on a single channel.

Which of the following involves slicing digital messages into parcels, transmitting them along different communication paths, and reassembling them at their destinations? A) Multiplexing B) Packet shifting C) Packet routing D) ATM E) Packet switching

E) Packet switching

Which model can be used to analyze the direct and indirect costs to help firms determine the actual cost of specific technology implementations? A) Supply and demand B) Return on investment C) Breakeven point D) Cost-benefit analysis E) Total cost of ownership

E) Total cost of ownership

T1 and T3 lines: A) operate over existing telephone lines to carry voice, data, and video. B) operate over coaxial lines to deliver Internet access. C) do not provide guaranteed service levels, but simply "best effort." D) have up to twenty-four 64-Kbps channels. E) are high-speed, leased data lines providing guaranteed service levels.

E) are high-speed, leased data lines providing guaranteed service levels.

A(n) ________ signal is a discrete, binary waveform that transmits data coded into two discrete states: 1-bits and 0-bits. A) modulated B) broadband C) T1 D) analog E) digital

E) digital

Predictive search in Google's search engine: A) maintains a history of your searches and then predicts what you will search on next. B) uses a tracking service and cookies on your browser to predict search results. C) uses a knowledge graph of what similar people searched on to predict your search interests. D) uses a semantic approach to predict what you are looking for. E) predicts what you are looking for as you enter words into the query box.

E) predicts what you are looking for as you enter words into the query box.

T/F A computer network consists of at least three computers.

False

T/F COPPA is a set of five principles developed by the FTC that most American and European privacy law is based on.

False

T/F Computer networks are based on the same principles as traditional telephone networks.

False

T/F IT infrastructure consists of only those physical computing devices and software required to operate the enterprise.

False

T/F Quantum computing is a common method of reducing technology costs by providing the ability to host multiple systems on a single physical machine.

False

T/F TCO refers just to the original cost of purchased technology: both hardware and software.

False

T/F Use of standalone server computers is increasing as organizations transition to cloud computing services.

False

T/F The Internet of Things is based on billions of Internet-connected sensors throughout the physical world.

TRUE

T/F Because of their special claims to knowledge, wisdom, and respect, professionals take on special rights and obligations.

True

T/F Cloud computing is the fastest growing form of computing.

True

T/F Downtime is a component of TCO.

True

T/F Enterprise infrastructure requires software that can link disparate applications and enable data to flow freely among different parts of the business.

True

T/F Ethics describes the principles of right and wrong that can be used by individuals to make choices to guide their behavior.

True

T/F Fiber-optic cable is more expensive and harder to install than other physical transmission media.

True

T/F In a large company today, you will often find an infrastructure that includes a large number of small LANs linked to each other as well as to corporate-wide networks.

True

T/F Malicious software that can secretly install itself on an Internet user's computer by piggybacking on other applications and then report the user's movements on the Internet to other computers. is called spyware.

True

T/F The claim to privacy is protected by the U.S. Constitution.

True

T/F Web beacons are tiny, invisible software programs embedded in email messages and web pages that are used to track and report a user's online behavior.

True

T/F Wikis allow visitors to change or add to the original posted material.

True

T/F Apple Pay uses an RFID-related technology called near field communication.

true

T/F Today, many business firms continue to operate legacy systems because they meet a business need and would be costly to replace.

true

T/F Two computers using TCP/IP can communicate even if they are based on different hardware and software platforms.

true

Which of the following types of computing involves purchasing computing power from a remote provider and paying only for the computing power used? A) On-demand B) Grid C) Edge D) Autonomic E) Quantum

A) On-demand

The use of computers to assemble data from different sources to create digital dossiers of detailed information about individuals is known as which of the following? A) Profiling B) Phishing C) Spamming D) Targeting E) Spyware

A) Profiling

Which of the following statements about cookies is not true? A) Cookies are installed only at the user's request. B) Cookies are stored on the user's computer. C) It is possible to prevent a client computer from accepting cookies. D) Cookies are used to support the user experience on websites. E) Cookies can be combined with other website data to develop detailed profiles of customers.

A) Cookies are installed only at the user's request.

Which of the following U.S. laws gives patients access to personal medical records and the right to authorize how this information can be used or disclosed? A) HIPAA B) Gramm-Leach-Bliley Act C) Privacy Protection Act D) Freedom of Information Act E) COPPA

A) HIPAA

Firms that allow employees to use their own devices are embracing which of the following? A) Wearable computing B) Mobile consolidation C) Cloud computing D) BYOD E) Self computing

D) BYOD

Which of the following is a primary drawback to the "do anything anywhere" computing environment? A) It makes work environments less pleasant. B) It creates a digital divide. C) It centralizes power at corporate headquarters. D) It blurs the traditional boundaries between work and family time. E) It leads to employees being paid less for the total amount of work performed.

D) It blurs the traditional boundaries between work and family time.

Which of the following statements about RFID is not true? A) RFIDs transmit only over a short range. B) RFIDs use an antenna to transmit data. C) Microchips embedded in RFIDs are used to store data. D) RFIDs require line-of-sight contact to be read. E) RFID tags and antennas come in a variety of shapes and sizes.

D) RFIDs require line-of-sight contact to be read.

Which of the following can be used to help a website achieve a higher ranking with the major search engines? A) VPN B) shopping bots C) SEM D) SEO E) RSS

D) SEO

Client/server computing is a: A) network that connects sensors to desktop computers. B) network where centralized mainframe computers serve local devices. C) centralized model of computing for large corporations. D) distributed computing model where clients are linked to one another through a network that is controlled by a network server computer. E) centralized computing model where local computers are connected to one another by a network.

D) distributed computing model where clients are linked to one another through a network that is controlled by a network server computer.

The ethical no-free-lunch rule states that: A) if an action cannot be taken repeatedly, then it is not right to be taken at any time. B) one should take the action that produces the least harm or incurs the least cost. C) one can put values in rank order and understand the consequences of various courses of action. D) if something someone else has created is useful to you, it has value, and you should assume the creator wants compensation for this work. E) if an action is not right for everyone to take, it is not right for anyone to take.

D) if something someone else has created is useful to you, it has value, and you should assume the creator wants compensation for this work.

Which signal types are represented by a continuous waveform? A) Laser B) Optical C) Digital D) RFID E) Analog

E) Analog

Which of the following is by far the most common source of business system failure? A) Software bugs B) Software errors C) Hardware failures D) Facilities failures E) Data quality

E) Data quality

Which of the following is not a feature of the General Data Protection Regulation (GDPR)? A) It applies to all firms doing business in the EU. B) Its protections of the privacy rights of EU citizens apply worldwide, regardless of where processing of the data takes places. C) It imposes fines on companies for violating the regulation up to 4 percent of a firm's global revenue. D) It creates a single EU privacy policy. E) It prevents firms from using cookies.

E) It prevents firms from using cookies.


Kaugnay na mga set ng pag-aaral

Managerial accounting smart book 3

View Set

Real Estate Practice Test Questions

View Set

period 7 test multiple choice questions

View Set

Neuropharmacology 3 practice questions

View Set