Comp Final

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Cheng is starting a new website that will provide payroll and legal services to small companies. What type of e-commerce website is Cheng building?

Business-to-business (B2B)

Jorge is starting a new website that provides home loans to first-time homebuyers. What type of e-commerce website is Jorge building?

Business-to-consumer (B2C)

In the U.S., the _____ law allows unsolicited marketing email but requires such email to have an unsubscribe mechanism.

CAN-SPAM

Which of the following is the use of computer networks to promote a social or political cause?

Hacktivism

_____ is a common protocol for retrieving email messages via the Internet.

IMAP

_____ is the business practice where work is performed within an company rather than performed by an external source.

In-house

Which effective email tip was NOT followed by the Kaylee? "Jayne sends Kaylee an email asking Kaylee to look over the next inventory shipment and verify that an adequate supply of parts is on hand. Kaylee replies indicating that a spare compression coil needs be ordered, and ends the email by asking Jayne if he knows to what time the staff meeting was moved."

Keep threads separate

_____ is a social networking site intended primarily for professionals to post online resumes and develop professional connections.

LinkedIn

Which of the following is a protocol for encrypting data sent over WiFi networks?

WPA2

Which example is likely fair use?

Writing a book based on a factual newspaper article.

____ relies on crowdsourcing to provide reviews of restaurants, hotels, and more.

Yelp

Encrypted email messages can be viewed by _____ .

a user with the appropriate decryption keys

Most video sharing sites earn revenues through _____.

advertisements

An encrypted message can be viewed by _____ .

an authorized user

Live streaming means to record and share a video of an event _____.

as the event happens

A _____ is a website organized into entries (called posts) that can be written by a single person, a small group of people, or a company.

blog

Many companies outsource work to areas where labor is _____.

cheaper

If a work has a _____ license, then any derivative work must use the same license.

copyleft

A _____ breaks into computer systems for malicious purposes, such as to steal or destroy data.

cracker

Search engines are getting better at doing "_____" searching of more types of data, such as images and videos.

deeper

Ransomware is is a type of software typically used to commit _____.

extortion

The amount of information on the internet is _____ .

growing

#puppies is an example of a(n) _____.

hashtag

Which of the following websites is likely used to carry out secure transmissions?

https://www.amazon.com

Some browsers allow you to open windows in _____ mode, which means the browser will not save your browsing history.

incognito

The objectives of a(n) _____ degree typically include how to design processes to develop, manage, and disseminate information to help meet organizational goals.

information systems

One of the reasons that the digital divide is larger for those in developing nations is because of the _____ .

lack of training in how to use technology

On demand audio streaming allows users to _____.

listen to specific songs or albums specifically selected by the user

Most mobile devices can track your location unless you turn off the so-called _____ services.

location

An Internet scam may trick a user into downloading an executable file, such as a supposed package delivery label, which then installs _____ .

malware

Information systems degree programs typically fall into the computer, business, or _____ category.

management

Good passwords _____ .

mix letters, numbers, and special characters

"Knowledge" workers spend nearly _____ of their time writing and reading emails.

30%

Texting is extremely popular among teenagers, with the average teenager sending about _____ text messages per day in 2012.

60

A text message containing characters from alphabets such as Chinese, Arabic, or Cyrillic is limited to _____ characters.

70

What is a security breach?

A case of unauthorized computer access.

The advantages of crowdsourcing may include _____ .

All of the above

Which of the following could be used to infer more about a user than what the user intentionally posts online?

All of the above

Which of the following statements is true?

All of the above

Which of the following is NOT an example of cyberbullying?

An audience member heckles a stand-up comedian at a live show.

Unlawfully distributing copyrighted work is called _____.

piracy

A _____ is an article, image, or other regularly added content to a blog, which is typically added in reverse chronological order.

post

A computer virus is most likely to _____ .

quietly use the computer for illicit tasks

A vacation message is a form of an email filter that automatically _____ .

replies to any incoming email with a user-specified message

An email _____ is text automatically added to the end of every email you send.

signature

Developers can use the _____ method where each phase of the SDLC sequence is repeated one or more times.

spiral

A thread is a group of emails having the same _____ .

subject

A denial of service attack (DoS) attack is achieved by _____ .

submitting huge numbers of access requests simultaneously to overload a particular site's web server

An MMS-based text message can be composed of _____.

text, images, pictures, video, and audio

Typically, a user's post on Facebook are published for _____ to view.

the user's friends/connections

Users can apply _____ , which contain predefined color palettes and text formatting to provide blogs with a consistent look and feel.

themes

Clicking on the _____ symbol on Pandora Internet Radio, the site will add similar songs and artists to the user's playlist.

thumbs up

YouTube is a widely-used _____ sharing website.

video

Developers can use the _____ method where each phase of SDLC is done in sequence, entirely completing one phase before moving to the next phase.

waterfall

According to Juniper Research, the financial impact of cybercrime is estimated to reach _____ by 2019.

$2 trillion

For what are wiki-based platforms typically used?

Collaborative development of content by multiple users

Kristy is starting a new website that will connect families with nearby babysitters. What type of e-commerce website is Kristy building?

Consumer-to-consumer (C2C)

_____ is a type of e-commerce business/company that enables people to sells goods and services to each other.

Consumer-to-consumer (C2C)

MS Word software falls under what form of intellectual property protection?

Copyright

Which of the following statements is most true?

Craigslist is a type of C2C e-commerce company, which started as a way to place "classified" ads online.

Which of the following is NOT a good strategy to protect a user's personal identity?

Create multiple accounts so the user's information cannot be linked to a single individual.

____ is when someone requests money for a company, product, idea, cause, etc., and users choose to contribute.

Crowdfunding

Which is a general approach that uses a community of users via the Internet to perform a particular task, such as developing articles for an online encyclopedia?

Crowdsourcing

Which of the following is a technique that strives to analyze language usage, faces, locations, and other items to match information to a unique individual?

Data mining

Which of the following is NOT a good strategy to contain personal information on the Internet?

Delete old posts that are no longer relevant to a user's changing interests.

_____ is primarily a service that allows a user to store files in cloud storage.

Dropbox

Which of the following is true about cloud storage?

Dropbox is a type of cloud storage.

Which of the following is NOT an example of a crowdsourcing website?

Ebay

Which of the following is NOT a tip for effective email communication?

Email subjects should be omitted, unless absolutely necessary

_____ scrambles plaintext into a cyphertext so that a packet transmitted through the network is not readable along the route.

Encryption

_____ is the science of designing things for easy safe use by people.

Ergonomics

Which of the following statements is most true?

Every piece of information, public or not, may have value to somebody.

Which type of website is most likely to have the real purpose of spreading viruses?

Free games site

Which of the following is a browser mode that keeps a user fully anonymous on the Internet?

No such mode. Information such as browser settings and app requests may still be transmitted by the web browser.

_____ is the business practice where company A uses company B to do work that company A's employees might otherwise do.

Outsourcing

_____ is a type of business model where users pay to access vendor's platforms or toolkits to develop and deploy new applications.

Platform as a service (Paas)

_____ is a common protocol for sending email messages via the Internet.

SMTP

_____ is a type of malware that collects information from a computer without the user's knowledge.

Spyware

If a child is being cyberbullied by a classmate, what should the child do?

Tell a parent

Twitter's 140-character limit for tweets stems from which of the following?

The character limit imposed on cell phone text messages

An email replier can select reply all (or group reply) to ensure all recipients on the _____ list, and only those recipients, receive the reply.

To and cc

The Yahoo! Logo falls under what form of intellectual property protection?

Trademark

Which of the following describes a phishing scam?

Tricking an email recipient into providing valuable information by posing as a legitimate organization.


Ensembles d'études connexes

Leadership, Leadership: Q5, Leadership: Q1, Delegation EAQs, Leadership/Management EAQ's, Leadership EAQ's, Leadership EAQs, Leadership EAQs, Leadership: Q2

View Set

Regular Howard Russian Revolution!

View Set

Psych Videbeck Chapter 4: Treatment Settings and Therapeutic Programs

View Set

Ch. 22 - Spirituality - Sherpath, Evolve, EOC

View Set

1.4.5 Windows File and Folder Management

View Set

Sacred Scriptures - Test 1:Unit 1-2 U.T.S. Chapters 1-4, 30

View Set

Cerebrum: Largest Part of the Brain

View Set

MPO- Individual Differences and Emotions

View Set

Fundamentals of Nursing Chapter 8 Course Point +

View Set