Chapter 16: Concept Check Quiz

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

In the context of a cybermediary, _____, operated by PayPal, is used to handle companies' web and mobile payments. a. Braintree b. Venmo c. Xoom d. Ezetap

a. Braintree

Which of the following is true of pharming? a. It is a scam that attempts to steal identities by routing Internet traffic to fake websites. b. It is an attempt to obtain private usernames and passwords by using official-looking emails. c. It is the use of Internet-based computer applications to supplement a firm's internal resources. d. It is the use of powerful statistical and mathematical techniques to analyze vast amounts of data.

a. It is a scam that attempts to steal identities by routing Internet traffic to fake websites.

Which of the following best describes spyware? a. It is software that installs itself on a computer and tracks the user's Internet search history. b. It is software that allows the transfer of files from one computer to another without the knowledge of the user. c. It is software or hardware designed to prevent unwanted access to a computer or computer system. d. It is self-replicating software that can spread on its own from one computer to another through peripheral devices.

a. It is software that installs itself on a computer and tracks the user's Internet search history.

Which of the following is one of the roles of the information technology (IT) department within an organization? a. It maintains the information resources of the company and provides technical support to the employees. b. It provides managers with the insight needed to carry out a project. c. It is responsible for training the employees in technical skills. d. It constantly innovates new technology for the seamless functioning of the organization.

a. It maintains the information resources of the company and provides technical support to the employees.

Which of the following statements is true of Web 2.0? a. Many Web 2.0 sites rely on users to provide most of their content. b. It is an association of hackers who invent newer and more sophisticated malicious software. c. It is an advanced form of Internet that is available to only a consortium of member organizations. d. Most Web 2.0 sites offer little opportunity for user participation or involvement.

a. Many Web 2.0 sites rely on users to provide most of their content.

_____ of intellectual property occurs when someone reproduces and distributes copyrighted work without obtaining permission from—or providing compensation to—the owner of the copyrighted material. a. Piracy b. Phishing c. Hacking d. Pharming

a. Piracy

Barcode scanners, printers, routers, and smartphones are examples of: a. hardware. b. an extranet. c. the graphical user interface. d. system software.

a. hardware.

In the context of tokenization, Apple Pay uses secure fingerprint scanners on iPhones and iPads to authenticate a purchase approval. Then, a(n) _____ is sent to the retailer who authorizes the funds. a. one-time code b. item listing c. anti-hacking key d. transaction ID

a. one-time code

_____ are skilled computer users who try to gain unauthorized access to other people's computers, sometimes with malicious intent. a. Compilers b. Hackers c. Spammers d. Networkers

b. Hackers

Which of the following is a limitation of an expert system? a. It cannot solve problems in areas such as medical diagnoses or fraud detection. b. It has little flexibility and no common sense. c. It takes problem-solving decisions without giving the user an option for feedback. d. It invariably requires human experts to solve problems.

b. It has little flexibility and no common sense.

Which of the following best defines an expert system? a. It is a large, organization-wide database that stores data in a centralized location. b. It is a decision support system that helps managers make better decisions in an area where they lack skill or knowledge. c. It is system software that controls the overall operation of a computer and provides user interface. d. It is a decision support system that helps decision makers discover subtle and complex relationships hidden in their data.

b. It is a decision support system that helps managers make better decisions in an area where they lack skill or knowledge.

Which of the following best describes an extranet? a. It is a perimeter network used to increase security in virtual communication. b. It is a private network that allows firms to provide additional services to their external stakeholders. c. It is a local area network that links a small number of personal computers and accessories. d. It is a global system that connects various smaller networks.

b. It is a private network that allows firms to provide additional services to their external stakeholders.

Property that is the result of creative effort, such as books, musical works, inventions, and computer software, is known as: a. immovable property. b. intellectual property. c. intangible property. d. taxable property.

b. intellectual property.

Which of the following statements is true of decision support systems (DSS)? a. They are most useful when the problem to be solved lies beyond the scope and understanding of a manager. b. They are a type of system hardware. c. They give managers access to large amounts of data and the processing power to convert them into high-quality information quickly. d. They mimic the approach of experts in the relevant area to guide a manager in decision making.

c. They give managers access to large amounts of data and the processing power to convert them into high-quality information quickly.

A(n) _____ is a private network that has the same look and feel as the Web and uses the same web browser software to display documents, but limits access to the employees of a single firm. a. extranet b. screened subnet c. intranet d. perimeter network

c. intranet

Unsolicited commercial emails, which are usually sent to huge numbers of people with little regard for whether they are interested in the product or not, can be detected and eliminated with the use of _____. a. caches b. spyware applications c. spam filters d. malware applications

c. spam filters

_____ gives the creators of intellectual work the exclusive right to produce, record, perform, and sell musical works for a specified time period. a. The patent law b. The Fair Use Project c. Creative barcode d. Copyright law

d. Copyright law

Which of the following best defines a cybermediary? a. It is a firm that typically engages in phishing activities. b. It is a decision support firm that allows managers to convert large amounts of data into high-quality information. c. It is an online platform that allows a seller to market business products. d. It is an Internet-based firm that specializes in the secure electronic transfer of funds.

d. It is an Internet-based firm that specializes in the secure electronic transfer of funds.

Which of the following statements is true of viral marketing? a. The Internet is the least appropriate medium for viral marketing. b. Legitimate viral marketing involves the use of computer viruses to market products. c. The earliest form of viral marketing was door-to-door selling. d. Many viral marketing campaigns use social media extensively.

d. Many viral marketing campaigns use social media extensively.

A(n) _____ is an Internet connection that is capable of transmitting large amounts of information very quickly. a. intranet b. extranet c. dial-up Internet connection d. broadband Internet connection

d. broadband Internet connection

The use of Internet-based storage capacity, processing power, and computer applications to supplement or replace internally owned information technology resources is known as _____. a. data mining b. data extraction c. enterprise resource planning d. cloud computing

d. cloud computing


Ensembles d'études connexes

ASREB - A4 - Liens & Encumbrances

View Set

FBLA Sports management and Marketing

View Set

chapter 4 the external environment

View Set

11.2.2014, stats ch 7, probability

View Set