Final Exam

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

business processing reeengineering (BPR)

the analysis and redesign of workflow within and between enterprises; analogy: foot ->horse ->car ->airplane (better, faster, cheaper)

Information Security

A broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization

What can an information systems model accomplish? manipulate time All of these are correct. understand uncertainty calculate risks

All of these are correct.

Which of the following is one of the four basic options included in a bring your own device policy?

All of these are correct.

Which of the following should be included in a company email privacy policy?

All of these are correct.

Which of the following would you find in a typical Internet use policy?

All of these are correct.

At a local marketing firm, Steve is the lead web developer & is responsible for working with customers on their web designs, development, & graphics. Which of the following would be a critical skill Steve must have to be able to perform his job?

All of these: a. understanding that he must create a unique domain name for each client b. being able to work with HTML (Hypertext Markup Language) c. Understanding the WWW and how hyperlinks work

Ebusiness was characterized by a few companies or user posting content for the masses. What characterized Business 2.0?

The masses posting content for the masses

Ebusiness was characterized by few companies or users posting content for the masses. What characterizes Business 2.0?

The masses posting content for the masses.

What occurs when business data flows across international boundaries over the telecommunications networks of global information systems?

Transborder data flows

Which of the following represents a form of disruptive technology?

a. is a new way of doing things that initially does not meet the needs of existing customers b. Tends to open new markets & destroy old ones c. enters the marketplace at the low end d. all of the above*

What is a policy that a user must agree to follow in order to be provided access to a network or to the internet?

acceptable use policy

Which of the following policies states that users agree to follow it in order to be given access to corporate email, information systems, and the Internet?

acceptable use policy

Many believe that US tax policy should provide a level playing field for traditional retail businesses, mail-order companies, and online merchants. What form of ebusiness challenge is this statement referring to?

adhering to taxation rules

What includes the hardware, software, and telecommunications equipment that, when combine, provide the underlying foundation to support the organization's goals?

agile MIS infrastructure

Jackie is the head teller at ABC Bank and her responsibilities include overseeing and managing the tellers, resolving customer issues, and developing and implementing systems for an optimal and efficient team. She notices a steady increase in customer complaints and tracks back to find that the complaints started right around the time ABC Bank provided Internet access to all employees. Jackie watched the tellers closely and found that they were spending significant amounts of time playing Internet games and posting on Facebook. Which policy should the company implement to help eliminate this problem?

an Internet use policy

What is a threat?

an act or object that poses a danger to assets

Which of the following defines teergrubing?

an antispamming approach where the receiving computer launches a return attack against the spammer, sending email messages back to the computer that originated the suspected spam

Which of the choices below represents the definition of information property?

an ethical issue that focuses on who owns information about individuals and how information can be sold and exchanged

What is a backup?

an exact copy of a system's information

What is a project management office (PMO)?

an internal department that oversees all organizational projects

Which is not a type of organizational information system? transactional processing system analysis processing system decisions support system executive information system

analysis processing system

What types of information do Whole Foods' regional managers use to make purchasing decisions from local suppliers? analytical information OLTP DSS transactional information

analytical information

Which of the following is not considered an epolicy?

anti-hacker use policy

What kind of policy can a company implement that can help diminish the activity of sending unsolicited email?

anti-spam policy

What is a project deliverable?

any measurable, tangible, verifiable outcome, result, or item that is produced to complete a project or part of a project

business process improvement

attempts to understand and measure the current process and measure the current process and make performance improvements accordingly

What addresses the time frames when systems can be accessed by employees, customers, and partners?

availability

business-facing processes

back-office processes; invisible to the external customer but essential for the effective management of a business; examples: goal setting, day-to-day planning, giving performance feedback and rewards, allocating resources

benchmarks

baseline values the system seeks to attain

What uses data about people's behaviors to understand intent and predict future action?

behavioral data

At a local marketing firm, Steve is the lead web developer and is responsible for working with customers on their web designs, development, and graphics. Which of the following would be a critical skill Steve must have to be able to perform his job?

being able to work with HTML; understanding that he must create a unique domain name for each client; understanding the World Wide Web and how hyperlinks work

What is a detailed process for recovering information or an IT system in the event of a catastrophic disaster such as a fire or flood?

disaster recovery plan

Which of the following was the original design for the Internet?

document exchange; email; display of static content

What is the practice of buying a domain name and not using the web page but waiting to profit from the trademark?

domain 0r cyber squatting

Which of the following choices is not one of the six epolicies that a company should implement for information protection as discussed in the text?

downtime monitoring policy

What is a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network?

drive-by hacking

What are the policies & procedures that address the ethical use of computers & Internet usage in the business environment?

ePolicies

What are the policies and procedures that address the ethical use of computers and Internet usage in the business environment?

ePolicies

Which of the following is not an additional benefit of virtualization?

ease of use for customer relationship management systems

Trust between companies, customers, partners, and suppliers are the support structure of which of the following?

ebusiness

What is a plan that details how a company creates, delivers, and generates revenues on the Internet?

ebusiness model

Ebusiness?

ecommerce and all activities related to internal and external business operations

What refers to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry?

ediscovery

Which of the following refers to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or an information inquiry?

ediscovery

What is a technique for identifying and tracking assets and individuals via technologies such as RFID and smart cards?

electronic tagging

Which of the following policies details the extent to which email messages may be read by others?

email privacy policy

Which policy details the extent to which email messages may be read by others?

email privacy policy

Which data types are typically found in the human resources department?

employee data, promotion data, vacation data.

analytical information

encompasses all organizational information, and its primary purpose is to support the performance of managerial analysis or semistructured decisions; includes transactional information; examples are trends, sales, product statistics and future growth projections

transactional information

encompasses all the information contained within a single business process or unit of work; primary purpose is to support the performance of daily operational or structured decisions

value delivery

ensuring the IT department delivers the promised benefits for every project or investment

What are policies and procedures that address information management along with the ethical use of computers and the Internet in the business environment?

epolicies

What is another name for an eshop?

estore or etailer

If an organization implemented only one policy, which one would it want to implement?

ethical computer use policy

Which of the following contains general principles to guide computer user behavior?

ethical computer use policy

Which of the following key terms represents the principles and standards that guide our behavior toward other people?

ethics

Which of the following represents the two fundamental building blocks that protect organizational information?

ethics and security

What is historical analysis?

events are studied to anticipate the outcome of current developments

Which of the choices below represents the definition of information management?

examines the organizational resource of information and regulates its definitions, uses, values, and distribution, ensuring that it has the types of data/information required to function and grow effectively

What are the 4 global IT business drivers that should be included in all global business strategies?

global customers, products, operations and resources, and collaberation

What are material items or products that customers will buy to satisfy a want or need?

goods

Which of the following definitions represents Internet censorship?

government attempts to control Internet traffic, thus preventing some material from being viewed by a country's citizens

What enables organizations to optimize computing and data resources, pool them for large capacity workloads, share them across networks, and enable collaboration?

grid computing

What is an aggregation of geographically dispersed computing, storage, and network resources, coordinated to deliver improved performance, higher quality of service, better utilization, and easier access to data?

grid computing

All of the following are challenges of outsourcing except...?

reduced frustration and expense related to hiring and retaining employees in an exceptionally tight job market

Telematics

- Blending of computers and wireless telecommunications technologies with the goal of efficientily conveying information over cast networks to improve business operations.

What maps group contacts, identifying who knows each other & who works together?

Social networking analysis

What key questions should IT governance answer?

What key metrics management requires

What key questions about IT governance anser?

What key metrics management requires?

virtual reality

a computer stimulated environment that can be a simulation of the real world or an imaginary world

metrics

measurements that evaluate results to determine whether a project is meeting its goals

What is the practice of buying a domain name & not using the web page but waiting to profit from the trademark?

Domain or Cyber Squatting

What is it called when a company uses organizations from developing countries to write code and develop systems?

offshore outsourcing

__________ is a statement about what will happen or might happen in the future, for example, future sales or employee turnover.

prediction

Social media can be a very valuable tool for a company if used properly. Which of the following represents social media uses for a company?

- Building a strong brand identity - Protecting the company reputation through counter-damage control - Engaging directly with customers and prospective customers

Information Privacy

- Concerns the legal right or general expectation of individuals, groups, or institutions to determine for themselves when and to what extent ifnromation about them is communicated to others.

Which of the below should be included in a company email privacy policy?

- Defines legitimate email users and explains what happens to accounts after a person leaves the organization - Discourages sending junk email or spam to anyone who doesn't want to receive it. - Informs users that the organization has no control over email once it has been transmitted outside the organization.

Sustainable IT disposal

- Refers to safe IT disposal of IT assets at the end of their life cycle.

Mobile Commerce

- ability to purchase goods and services through a wireless internet enabled device

Compliance

- act of conforming, acquiescing, or yielding.

Sustainable IT

- describes the manufacture, management, use, and disposal of information technology in a way that minimizes damage to the environment, which is a critical part of a corporation's responsibility.

Corporate responsibility

- dimension of social responsibility that includes everything from hiring minority workers to making safe products.

Corporate policy

- dimension of social responsibility that refers to the position a firm takes on social and political issues

Virtualization

- framework of dividing resources of a computer into a multiple execution environments.

Social responsibility

- implies that an entity whether it is a government, corporation, organization, or individual has a responsibility to society.

Enterprise Architecture

- includes the plans for how an organization will build deploy, use, and share its data, processes and IT assets.

Innovation

- introduction of new equipment or methods

Governance

- method or system of government for management or control.

Transborder data flows

- occur when business data flows across international boundaries over the telecommunications networks of global information systems.

Deperimeterization

- occurs when an organization moves employees outside its firewall, a growing movement to change the way corporations address technology security.

Ewaste

- old computer equipment,

Geoeconomic

- refers to the effects of geography on the economic realities of international business activities

Electronic Tagging

- technique for identifying and tracking assets and individuals via technologies such as radio frequency identificationa and smart cards.

What is the policy that contains general principles to guide computer user behavior?

-Acceptable use policy -Information privacy policy -Internet use policy -*None of these

Which of the following describes Workplace MIS monitoring?

-Tracking people's activities by such measures as number of transactions processed -Tracking people's activities by such measures as number of keystrokes -Tracking people's activities by such measures as error rate -*All of these

global IT business management areas

-global IT business strategies -global enterprise architectures -global info issues -global systems development

global MIS business drivers

-global products -global operations and resources -global collaboration -global customers

US - EU Data privacy requirements

-notice of purpose and use of data collected -ability to opt out of third party distribution of data -access for consumers to their information -adequate security, data integrity and enforcement provisions

MIS governance institute five focus areas

-strategic alignment -risk management -performance measures -resource management -value delivery

Which of the following is included in the four quadrants of ethical and legal behavior?

. All of these are correct.

What is a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution?

. digital rights management

What is the method or system of government for information management or control?

. information governance

As the president of a local trade company, Kristin is faced with leadership, ethical, and operational decisions on a daily basis. Kristen's responsibilities include examining the organizational resource of information and regulating its definitions, uses, value, and distribution ensuring it has the types of information required to function and grow effectively. What is Kristin overseeing for the company?

. information management

What refers to choosing to allow permissions to incoming emails

. opt in

What is the Child Online Protection Act?

. passed to protect minors from accessing inappropriate material on the Internet

What caused Polaroid to go bankrupt?

1-hour film processing & digital cameras stole its market share

What is Bluetooth's max range?

30 feet

Nonrepudiation

A contractual stipulation to ensure that ebusiness participants do not deny (repudiate) their online actions

Digital Certificate

A data file that identifies individuals or organizations online and is comparable to a digital signature

Smart Card

A device about the size of a credit card, containing embedded technologies that can store information and small amounts of software to perform some limited processing

What is a primary key?

A field (or group of fields) that uniquely identifies a given entity in a table.

What is spam?

A form of unsolicited email

Authentication

A method for confirming users' identities

Information Governance

A method or system of government for information management or control

Which of the following clauses is typically contained in an acceptable use policy?

A nonrepudiation clause

Which of the following definitions represents typosquatting?

A problem that occurs when someone registers purposely misspelled variations of well-known domain names.

Spyware

A special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission

Phishing

A technique to gain personal information for the purpose of identity theft, usually by means of fraudulent emails that look as though they came from legitimate businesses

What is radio frequency identification (RFID)?

A technology that uses active or passive tags in the form of chips or smart labels that can store unique identifiers & relay this info to electronic reasers

Certificate Authority

A trusted third party, such as VeriSign, that validates user identities by means of digital certificates

What is the primary difference between a worm and a virus?

A virus must attach to something to spread, where a worm does not need to attach to anything to spread and can tunnel itself into the computer.

What is Google glass? A. The viewing of the physical world with computer-generated layers of information added to it. B. A wearable computer with an optical head-mounted display (OHMD). C. Uses technology allowing humans to interact with a computer through bodily sensations and movements. D. A work environment that is not located in any one physical space.

A wearable computer with an optical head-mounted display (OHMD)

What is a virtual workplace? A. The viewing of the physical world with computer-generated layers of information added to it. B. A wearable computer with an optical head-mounted display (OHMD). C. Technology that allows humans to interact with a computer through bodily sensations and movements. D. A work environment that is not located in any one physical space.

A work environment that is not located in any one physical space

What is a bar chart? A. A chart or graph that presents grouped data with rectangular bars with lengths proportional to the values that they represent B. A graphical display of data using bars of different heights. It is similar to a bar chart, but a histogram groups numbers into ranges C. A type of graph in which a circle is divided into sectors that each represent a proportion of the whole D. A small embedded line graph that illustrates a single trend

A. A chart or graph that presents grouped data with rectangular bars with lengths proportional to the values that they represent

What is a pie chart? A. A type of graph in which a circle is divided into sectors that each represent a proportion of the whole B. A graphical display of data using bars of different heights. It is similar to a bar chart, but a histogram groups numbers into ranges C. A chart or graph that presents grouped data with rectangular bars with lengths proportional to the values that they represent D. A small embedded line graph that illustrates a single trend

A. A type of graph in which a circle is divided into sectors that each represent a proportion of the whole

What is anything that happens during the course of a business process? A. BPMN Event B. BPMN Flow C. BPMN Activity D. BPMN Gateway

A. BPMN Event

At which level of an organization are employees continuously evaluating company operations to hone the firm's abilities to identify, adapt to, and leverage change? A. Managerial level B. Strategic level C. Operational level D. All of the above

A. Managerial level

At which level do managers develop the overall business strategies and monitor the performance of the organization and the competitive business environment? A. Strategic B. Operational C. Managerial D. Communications

A. Strategic

What are three primary types of management information systems available to support decision making across the company levels? A. Transaction Processing Systems, Decision Support Systems, Executive Information Systems B. Analytical Information, Decision Support Systems, Executive Information Systems C. Transaction Processing Systems, Drill-Down Systems, Expert Systems D. What-If Analysis, Sensitivity Analysis, Goal-Seeking Analysis

A. Transaction Processing Systems, Decision Support Systems, Executive Information Systems

Universities were among some of the first users of the Internet. What was the Internet first called?

ARPANET

Which policy is it common practice for many businesses & educational facilities to require employees or students to sign before being granted a network ID?

Acceptable use policy

An organization processing personal data of a person living in the EU must comply with which of the following principles?

Adequate, relevant, & not excessive

An organization processing personal data of a person living in the EU must comply with which of the following principles? Processed for extended purposes Adequate, relevant, and not excessive Processed without the accordance of data subject's rights All of these

Adequate, relevant, and not excessive

Which of the following represents the primary ebusiness revenue models?

Advertising fees, license fees, subscription fees, transaction fees, value-added services fees.

Social media can be a very valuable tool for a company if used properly. Which of the following represents social media uses for a company?

All of these are correct.

Which of the following is a question a company should ask when creating a global website? Will the site require new navigational logic to accommodate cultural preferences? Will content be translated? Which country will the server be located in to support local user needs? All of these

All of these

Which of the following is an example of an intelligent system? A. The firefighter robot that can extinguish flames at chemical plants. B. Shell Oil's Smart Pump robot that pumps gas for the customer. C. A robot that cleans and sweeps at a local airport. D. All of these.

All of these

Which of the following is one of the fundamental issues surrounding the struggle between Internet censorship and openness? Controlling the conduits Filtering the flows Punishing the purveyors All of these

All of these

Which of the following offers an example of an intelligent agent that uses a multi-agent system? A. A cargo transport system B. Book distribution center C. A flu epidemic D. All of these

All of these

Which of the following is a reason for the growth of the WWW?

All of these a. Advancements in networking hardware b. Web pages being easy to create & flexible c. The microcomputer revolution

Which of the following countries in internet access banned or subject to tight limitation through government-controlled ISPs?

All of these a. Burma b. Libya C. Syria

which of the following is an example of a clickstream data metric?

All of these a. Dates & times of visits b. The number of page views c. Number of customer with shopping carts

Which of the following is an example of a disruptive technology?

All of these a. Oracle's database software b. Sony's transistor-based consumer electronics (transistor radio) c. Intel's low-end microprocessor

What is a potential problem or impact of technology dependence?

All of these a. Outages create potentially great havoc for people, businesses, & educational institutions that rely heavily on technology b. Many have a need to be continuously connected for every activity, which potentially eliminates crucial in-person social skills & could stunt psychological growth c. How do people or businesses function if the connection is down?

Which of the following are challenges of Business 2.0?

All of these a. Violations of copyright & plagiarism b. Information vandalism c. Technology dependence

Which of the following is considered a location based services market segment?

All of these a. emergency services b. navigation services c. tracking services

Which of the following is one of the fundamental issues surrounding the struggle between Internet censorship & openness?

All of these a. filtering the flows b. punishing the purveyors c. controlling the conduits

Which of the following is a common GIS use?

All of these a. info alerts b. routing info c. finding what is nearby

Which of the following is a US-EU data privacy requirement?

All of these a. notice of the purpose & use of data collected b. access for consumers to their info c. adequate security, data integrity, & enforcement provisions

Which of the following represents an unusual use of RFID?

All of these a. preventing toilets from overflowing b. identifying human remains c. timing athletic events

Which of the following is one of the rights granted to European Union members under the directive on the protection of personal data grants?

All of these a. the right to know the course of personal data processing & the purpose of such processing b. the right to access &/or rectify inaccuracies in one's own personal data c. the right the disallow the use of personal data

Which of the below represents an example of why an employer would use social media?

All of these a. to find potential job candidates via LinkedIn b. To attract new job candidates via YouTube c. To review potential job candidates by viewing their Facebook page

What is the role of a mashup editor?

All of these a. to provide a visual interface to build up a mashup. b. WYSIWYG's often it allows the user to drag & drop data points into a web application.

Which of the following can be completed by encryption?

All of these a. use a mathematical formula to convert info into some sort of code b. replace character with other characters c. switch order of characters

Social tagging describes the collaborative activity of marking shared online content with keywords or tags as a way to ____.

All of these organize it for future search, navigation, filtering

In the information technology world, which of the following are examples of ethical issues that a company may have to manage?

All of these are correct.

Jackie is the head teller at ABC Bank and her responsibilities include overseeing and managing the tellers, resolving customer issues, and developing and implementing systems for an optimal and efficient team. She notices a steady increase in customer complaints and tracks back to find that the complaints started right around the time ABC Bank provided Internet access to all employees. Jackie watched the tellers closely and found that they were spending significant amounts of time playing Internet games and posting on Facebook. Which policy should the company implement to help eliminate this problem?

An Internet use policy.

What is a project manager?

An individual who is an expert in project planning and management, defines and develops the project plan, and tracks the plan to ensure that the project is completed on time and on budget.

How would the airline industry use business intelligence?

Analyze popular vacation locations with current flight listings.

What does social media analytics do?

Analyzes text flowing across the Internet, including unstructured text from blogs and messages.

Teergrubing

And anti-spamming approach by which the receiving computer launch is a return attack against a spammer, sending email messages back to the computer that originated the suspected spam

Patent

And exclusive rights to make, use, and Santa invention and is granted by the government to the inventor

What is the most common type of defense within detection & response technologies?

Antivirus software

What is the difference between asynchronous & synchronous communication?

Asynchronous is communication that does not occur at the same time. Synchronous communication occurs at the same time.

What is the difference between asynchronous and synchronous communication?

Asynchronous is communication that does not occur at the same time; synchronous communication occurs at the same time.

What is the viewing of the physical world with computer-generated layers of information added to it? A. Augmented reality B. Google Glass C. Haptic interface D. Virtual reality

Augmented reality

What is the viewing of the physical world with computer-generated layers of information added to it? A. Virtual reality B. Augmented reality C. Virtual workforce D. All of these

Augmented reality

What is a method for confirming users' identities?

Authentication

What refers to any type of electrical or electronic operation that is accomplished without the use of a 'hard-wired' connection?

wireless

What is a virtual workplace? A. Uses technology allowing humans to interact with a computer through bodily sensations and movements B. A work environment that is not located in any one physical space C. The viewing of the physical world with computer-generated layers of information added to it D. A wearable computer with an optical head-mounted display (OHMD)

B. A work environment that is not located in any one physical space

What is a task in a business process? A. BPMN Flow B. BPMN Activity C. BPMN Event D. BPMN Gateway

B. BPMN Activity

What is represented by a diamond shape in a business process model? A. BPMN Event B. BPMN Gateway C. BPMN Flow D. BPMN Activity

B. BPMN Gateway

What is a common tool that is used to support visualizations and tracks KPIs and CSFs by compiling information from multiple sources? A. Neural networks B. Digital dashboards C. Models D. Verified graphs

B. Digital dashboards

What are strategic business processes? A. Semidynamic, semiroutine, monthly business processes such as resource allocation, sales strategy, or manufacturing process improvements. B. Dynamic, nonroutine, long-term business processes such as financial planning, strategies, and stakeholder interactions. C. Static, routine, daily-business processes such as stocking inventory, checking out customers, or daily opening and closing processes. D. None of the above

B. Dynamic, nonroutine, long-term business processes such as financial planning, strategies, and stakeholder interactions.

What is an algorithm? A. Refers to the field of artificial intelligence that works toward providing brain like powers to AI machines; in effect, it works to make machines as intelligent as the humans B. Refers to a set of instructions that completes a task C. A type of artificial intelligence that enables computers to both understand concepts in the environment, and also to learn D. Machines can still make their own decisions based on reasoning and past sets of data

B. Refers to a set of instructions that completes a task

What is strong AI? A. A type of artificial intelligence that enables computers to both understand concepts in the environment, and also to learn B. Refers to the field of artificial intelligence that works toward providing brain like powers to AI machines; in effect, it works to make machines as intelligent as the humans C. Refers to a set of instructions that completes a task D. Machines can still make their own decisions based on reasoning and past sets of data

B. Refers to the field of artificial intelligence that works toward providing brain like powers to AI machines; in effect, it works to make machines as intelligent as the humans

At which level of an organization do manages develop overall business strategies, goals, and objectives as part of the company's strategic plan? A. Operational level B. Strategic level C. Managerial level D. All of the above

B. Strategic level

What is a computer-simulated environment that can be a simulation of the real world or an imaginary world? A. Augmented reality B. Virtual reality C. Virtual workforce D. All of the above

B. Virtual reality

Which category below represents the three common forms of business operations, brick-and-mortar, click-and-mortar, and pure play?

B2C

What is the difference between a B2C and a C2B?

B2C focuses on business to consumers and C2B focuses on consumers to business

What is the difference between a B2C and a C2B?

B2C focuses on business to consumers and C2B focuses on consumers to business.

Which is a virus that opens a way into the network for future attacks?

Backdoor programs

Which of the following best describes Web 3.0?

Based on the "intelligent" web where application use natural language processing

Where do organizations typically place firewalls?

Between the server & the internet

What is a collection of large, complex data sets, including structured and unstructured data, that cannot be analyzed using traditional database methods and tools?

Big data

What is the identification of a user based on a physical characteristic, such as a fingerprint, iris, face, voice, or handwriting?

Biometrics

What is the process of learning from ecosystems and adapting their characteristics to human and organization situations? A. Data collection B. Artificial intelligence C. Biomimicry D. Intelligent system

Biomimicry

What is a hacker who breaks into other peoples computer systems and may just look around or steal and destroy information

Black hat Hacker

Who breaks into other people's computer systems & just looks around or steals & destroys info?

Black-hat hacker

Which of the following identifies Business 2.0 communication & collaboration tools?

Blogs, wikis, mashup

Which act prohibits the use of video rental information on customer for any purpose other than that of marketing goods & services directly to the consumer?

Bork Bill

A company's internal wiki can be a great tool for all of the following except:

Building software applications.

An API is a set of routines, protocols, & tools for _____.

Building software applications.

What are the 4 global IT business management areas critical to running multinational companies?

Business strategies, enterprise architectures, information issues, system development

What are the four global IT business management areas critical to running multinational companies? Business strategies, enterprise architectures, information issues, systems development Business strategies, information architectures, economic issues, telecommunication issues Business politics, enterprise architectures, telecommunication issues, systems development Business economics, enterprise architectures, information issues, telecommunication issues

Business strategies, enterprise architectures, information issues, systems development

How would a company like Flickr use social tagging on its website?

By allowing users to upload images and tag the images with their own keywords.

What technology provides connectivity for portable & mobile applications, both personal & business?

Cellular phones & pagers

Internet ________ is a government attempt to control Internet traffic, thus preventing some material from being viewed by countries citizens

Censorship

What is the process of computerizing manual tasks, making them more efficient and effective and dramatically lowering operational costs A. Streamlining B. Workflow C. Automation D. Swim lane

C. Automation

What do usability effectiveness MIS metrics measure? A. The number of hours a system is available for users B. The number of customers an organization "touches" for the first time and persuades to purchase its products or services C. The ease with which people perform transactions and find information D. The amount of time a system takes to perform a transaction

C. The ease with which people perform transactions and find information

The majority of eBay's customers are using a_____________rbusiness model

C2C

Which state recognizes an individual's right to privacy?

California

Which state recognizes an individual's right to privacy? Colorado New York California Florida

California

What is a process improvement approach that contains 22 process areas created by a group from government, Industry, and Carnegie Mellon's Software Engineering Institute?

Capability Maturity Model Integration Method

What is a process improvement approach that contains 22 process areas?

Capability Maturity Model Integration method

What passed to protect minors from accessing inappropriate material on the Internet?

Child Online Protection Act

What is the name of the highly publicized survey administered by the Institute for Citizen-Centered Services and the Institute for Public Administration in Canada?

Citizens First

Which of the following forms of data mining assigns records to one of a predefined set of classes?

Classification analysis

What type of Internet monitoring technique records information about a customer during a web surfing session such as what websites were visited and how long the visit was, what ads were viewed, and what was purchased?

Clickstream

What is the exact pattern of a consumer's navigation through a site?

Clickstream data

Which company was the victim of a distributed denial-of-service attack that forced the company to close operations and eventually transfer over 2,500 customers to a rival organization?

CloudNine Communication

What is the techique used to divide information sets into mutually exclusive groups such that members of each group are as close together as possible to one another and that different groups are as far apart as possible?

Cluster analysis

What is a set of guidelines & supporting tools for IT governance that is accepted worldwide & generally used by auditors & companies as a way to integrate technology to implement controls & meet specific business objectives?

CoBIT Information Systems Audit & Control Association

Lisa loves her job as an executive recruiter for a large hospital located in Dallas. Part of her job is to gather industry info, collaborate with partners, compare competitors, and tap into the knowledge of prospective employees, partners, & customers. Which of the below would Lisa use to perform her job?

Collective intelligence

What i th most secure type of authentication?

Combination of all of the above a. ...part of the user such as fingerprint/voice signature b. ...user has such as smart card/token c. ..user knows such as user ID & password

Which framework is key for evaluating internal controls such as human resources, logistics, information technology, risk, legal, marketing and sales, operations, financial functions, procurement, and reporting?

Committee of Sponsoring Organizations

What are the factors included in the global operations & resources category of global IT business drivers?

Common equipment, facilities, assembly processes, & people are shared by a global company & IT can track shared resources

Backdoor programs, denial of service attack, distributed denial of service attack, polymorphic viruses and warms, Trojan horse virus

Common forms of viruses

Black hat hackers, crackers, cyber terrorist, hactivists, script kiddies, white hat hackers

Common types of hackers

What is the act of conforming, acquiescing, or yielding?

Compliance

What is the assurance that messages & information remain available only to those authorized to view them?

Confidentiality

What is the assurance that messages and information remain available only to those authorized to view them?

Confidentiality

Which of the following does not represent a category of AI? A. Genetic algorithms B. Neural networks C. Expert systems D. Consolidation

Consolidation

Which of the following is NOT a primary difference between traditional satellites & low-orbit satellites?

Consumes more power

Information Privacy Policy

Contains general principles regarding information privacy

Ethical Computer Use Policy

Contains general principles to guide computer user behavior

Internet Use Policy

Contains general principles to guide the proper use of the Internet

What is a small file deposited on a hard drive by a website containing information about customers & their web activities?

Cookie

What is a small file deposited on a hard drive by a website containing information about customers and their web activities?

Cookie

What is the legal protection afforded an expression of an idea, such as a song, video game, & some types of proprietary documents?

Copyright

What is software that is manufactured to look like the real thing and sold as such?

Counterfeit software

Who are hackers with criminal intent?

Crackers

What are the 3 primary challenges facing 21st century global businesses?

Cultural, political, geoeconomic

What are the three primary challenges facing global businesses? Cultural, environmental, developmental Cultural, political, geoeconomic Political, environmental, compliance Political, cultural, architecture

Cultural, political, geoeconomic

What are the factors included in the global customer's category of global IT business drivers?

Customers who travel anywhere or companies with global operations & global IT systems help provide fast, convenient, homogeneous service

What are the factors included in the global customer's category of global IT business drivers?

Customers who travel anywhere or companies with global operations and global IT systems help provide fast, convenient, homogeneous service.

What is the electronic defacing of an existing website

Cyber vandalism

What refers to the creation of new kinds of intermediaries that simply could not have existed before the advent of ebusiness, including comparison-shopping sites such as Froogle & bank account aggregation services such as Citibank?

Cybermediation

What type of mediation refers to the creation of new kinds of intermediaries that simply could not have existed before the advent of ebusiness?

Cybermediation

Who are those who seek to cause harm to other people or to destroy critical systems of information & use the Internet as a weapon of mass destruction?

Cyberterrorists

Online Transaction Processing (OLTP) is the capturing of transaction and event information using technology to _______. A. Update existing information to reflect the new information B. Process the information according to defined business rules C. Store the information D. All of the above

D. All of the above

What is the analysis and redesign of workflow within and between enterprises? A. Decision support interfaces (DSI) B. Benchmarking metrics C. Critical success factors (CSFs) D. Business process reengineering (BPR)

D. Business process reengineering (BPR)

A transaction processing system (TPS) is the basic business system that assists operational level analysts when making structured decisions. Which of the below is not an example of a TPS? A. Stewart Sport's order entry system B. Target's internal company payroll system C. First Bank's overall accounting system D. Comfort Dental's patient diagnosis system

D. Comfort Dental's patient diagnosis system

Transaction processing systems are primarily used to automate business processes. Automation increases efficiency and effectiveness, while reducing head count which in turn reduces the overall operational _______. A. Revenues B. Systems C. Intelligence D. Costs

D. Costs

Decision making at the executive or strategic level requires business intelligence and knowledge to support the uncertainty and complexity of the business. What is a specialized DSS that supports senior-level executives and unstructured decisions requiring judgment, evaluation, and insight? A. Decision Support System (DSS) B. Transaction Support System (TSS) C. OLTP D. Executive Information System (EIS)

D. Executive Information System (EIS)

What improves managerial level business processes? A. Bottlenecks B. Performance measures C. Redundancy D. Streamlining

D. Streamlining

What is slice-and-dice capability? A. Enables users to get details, and details of details, of information B. Involves the aggregation of information and features simple roll-ups to complex groupings of interrelated information C. Finds the inputs necessary to achieve a goal such as a desired level of output D. The ability to look at information from different perspectives

D. The ability to look at information from different perspectives

What are the three primary types of management information systems to support decision making across the company levels? A. Analytical Information, Decision Support Systems, Executive Information Systems B. Transaction Processing Systems, Drill-Down Systems, Expert Systems C. What-If Analysis, Sensitivity Analysis, Goal-Seeking Analysis D. Transaction Processing Systems, Decision Support Systems, Executive Information Systems

D. Transaction Processing Systems, Decision Support Systems, Executive Information Systems

Sensitivity analysis, what-if analysis, optimization analysis, and goal-seeking analysis are the common________________________________.

DSS analysis techniques.

Which of the following is considered an unstructured decision or strategic decision?

Deciding to enter a new market

Which company is expecting to gain the majority of its returns on new investments?

Dell

What floods a website with so many requests for service that is slows down or crashes the site?

Denial-of-service attack (DOS)

____________ occurs when an organization moves employees outside its firewall, a growing movement to change the way corporations address technology security.

Deperimeterization

What does the design phase in the SDLC involve?

Describing the desired features and operations of the system.

Information Security Plan

Details how an organization will implement the information security policies

Email Privacy Policy

Details the extent to which email messages may be read by others

Which of the following is not a cultural business challenge?

Differences in architectures

Which of the following is not a cultural business challenge? Differences in social attitudes Differences in political philosophies Differences in architectures Differences in customs

Differences in architectures

Select two cultural business challenges.

Differences in cultural interests Differences in languages

Which of the following is NOT a political business challenge?

Differences in social attitudes

Which of the following terms implies that organizations that cannot adapt to the new demands placed on them for surviving in the information age are doomed to extinction?

Digital Darwinism

What is a data file that identifies individuals or organizations online and is comparable to a digital signature

Digital certificate

What is the technological solutions but allows publishers to controll their digital media to discourage, limit, or prevent illegal copying and distribution

Digital rights management

What is the business strategy that lets a company shorten the order process & add value with reduces costs or a more responsive & efficient service, & occurs when a business sells directly to the customer online?

Disintermediation

The Innovator's Dilemma suggests that established companies can take advantage of _____without hindering existing relationships with customers, partners, & stakeholders.

Disruptive technology

What processes and manages algorithms across many machines in a computing environment?

Distributed computing

Which of the following is not one of the six epolicies that a company should implement for information protection as discussed in the text?

Downtime monitoring policy

What company monitors the operation of its vending machines via wireless technology?

Dr. Pepper/Seven Up Inc

What company monitors the operation of its vending machines via wireless technology?

Dr. Pepper/Seven Up inc.

What occurs when a hacker looks through your trash to find personal information

Dumpster diving

________ occurs when a hacker looks through your trash to find personal information.

Dumpster diving

Information privacy policy, acceptable use policy, Internet use policy, anti-spam a policy

E policies a business should implement to protect itself

What technology uses radio waves rather than wires to transmit information across a local area network?

wireless local area network

Which of the following is not a type of information security breach?

E-discovery, BYOD

How does DIS differ from EIS?

EIS requires data from external sources to support unstructured decisions. Typically DSS decisions rely on internal data only (from operational level)

What is the difference between ecommerce & ebusiness?

Ecommerce is buying & selling of goods or services online. Ebusiness includes ecommerce & all activities related to internal & external business operations.

operational

Employee Types: lower management, department managers, analysts Metrics:Key performance indicators focusing on efficiency Examples: How many people are out sick? How much inventory is in warehouse?

managerial

Employee Types: middle management, managers, directors Metrics: key performance indicators focusing on efficiency, and critical success factors focusing on effectivness Examples: Who are our best customers by region, by sales representation, by product? What are the sales forecast for next month? How do they compare to last years? Why types of ad hoc or unplanned reports might the company require next month?

strategic

Employee Types: senior management, presidents, leaders Metrics: critical success factors focusing on effectiveness Examples: What industry trends are worth analyzing? How will a recession over the next three years impact business? What measures will the company need to prepare for due to new tax laws?

Which of the following is not an example of explicit knowledge?

Employee opinion

What includes the plans for how an organization will build, deploy, use, and share its data, processes, and IT assets?

Enterprise architecture

The policy that ensures the users know how to behave at work and the organization has a published standard regarding computer user behavior is called __________ computer use policy.

Ethical

The policy that ensures users know how to behave at work and the published standard an organization has regarding computer user behavior is called the _________ computer use policy

Ethical

If an organization were to have only one policy, which one would it want?

Ethical Computer use policy

Which policy ensures that the users know how to behave at work and that the organization has a published standard through which to deal with user infractions?

Ethical computer use policy

What are the principles and standards that guide our behavior toward other people?

Ethics

Information Management

Examines the organizational resource of information and regulates its definitions, uses, value, and distribution ensuring it has the types of data/information required to function and grow effectively

Power outages, tornadoes, network failure

Examples of unplanned downtime

What is a system that uses computerized advisory programs to imitate the reasoning processes of experts in solving difficult problems? A. Expert system B. Virtual reality C. Neural network D. Genetic algorithm

Expert system

Which of the following is the most commonly used form of AI in the business arena? A. Intelligent system B. Artificial intelligence C. Expert system D. Neural network

Expert system

Hackers

Experts in technology who use their knowledge to break into computers and computer networks, either for profit or just motivated by the challenge

What is the type of knowledge that consists of anything that can be documented, archived, & codified, often with the help of an MIS dept?

Explicit Knowledge

What are the 2 categories that include intellectual & knowledge-based assets?

Explicit knowledge & tacit knowledge

Employee Monitoring Policy

Explicitly state how, when, and where the company monitors its employees

what does a data scientist do?

Extracts knowledge from data by performing statistical analysis, data mining, and advanced analytics on big data to identify trends, market changes, and other relevant information.

Which of the below is NOT an example of a social bookmarking website?

Facebook

Which of the below is not an ISP?

Facebook

A certificate authority is a data file that identifies individuals or organizations online and is comparable to a digital signature.

False

A firewall scrambles information into an alternative form that requires a key or password to decrypt

False

A voiceprint is a data file that identifies individuals or organizations online and is comparable to a digital signature.

False

Identity theft is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity.

False

Multifactor authentication is the traditional security process, which requires a user name and passworD.

False

Prediction is a statistical process that finds the way to make a design, system, or decision as effective as possible, for example, finding the values of controllable variables that determine maximal productivity or minimal waste.

False

Single-factor authentication requires more than two means of authentication such as what the user knows (password), what the user has (security token), and what the user is (biometric verification).

False

Intrusion Detection Software (IDS)

Features full-time monitoring tools that search for patterns in network traffic to identify intruders

Which industry has been relying on neural network technology for over two decades? A. Food service B. Hotels C. Finance D. Healthcare

Finance

What website was the primary catalyst for growing electronic government & is the official US gateway to all government information?

FirstGov.gov

What is the term that is similar to taxonomy except that crowdsourcing determines the tag or keyword-based classification system?

Folksonomy

Identity Theft

Forging of someone's identity for the purpose of fraud

Which act allows any person to examine government records unless it would cause an invasion of privacy?

Freedom of Information Act

What is the mathematical method of handling imprecise or subjective information? A. Fuzzy logic B. Virtual reality C. Expert system D. Genetic algorithm

Fuzzy logic

Which type of AI system assigns values of 0 and 1 to vague or ambiguous information? A. Genetic algorithms B. Artificial intelligence C. Fuzzy logic D. Intelligent agents

Fuzzy logic

What is an optimizing system that can find and evaluate solutions with many more possibilities, faster and more thoroughly than a human? A. Genetic algorithm B. Expert system C. Intelligent agent D. Virtual reality

Genetic algorithm

___________ refers to the effects of geography on the economic realities of international business activities.

Geoeconomic

What is the definition of geoeconomic? Geopolitical and environmental business challenges Geopolitical and economic business challenges Geographic and environmental business challenges Geographic and economic business challenges

Geographic and economic business challenges

Select the four global IT business management areas.

Global Systems Development Global Information Issues Global IT Business Strategies Global Enterprise Architectures

What are the four global IT business drivers that should be included in all global IT business strategies?

Global customers, global products, global operations and resources, global collaboration

What is a wearable computer with an optical head-mounted display (OHMD)? A. Augmented reality B. Google Glass C. Haptic interface D. Virtual reality

Google Glass

Information Ethics

Govern the ethical and moral issues arising from the development and use of information technologies, as well as the creation, collection, duplication, distribution, and processing of information itself

What is a method or system of government for management or control?

Governance

Which act protects health insurance information?

HIPAA

Which act protects health insurance information? HIPAA COPPA CIPPA All of these

HIPAA

Social Engineering

Hackers use their social skills to trick people into revealing access credentials or other valuable information

What uses technology allowing humans to interact with a computer through bodily sensations and movements—for example, a cell phone vibrating in your pocket? A. Augmented reality B. Google Glass C. Haptic interface D. Virtual reality

Haptic interface

Firewall

Hardware and/or software that guard a private network by analyzing incoming and outgoing information for the correct markings

What is a hardware device that captures keystrokes on their journey from the keyboard on the motherboard?

Hardware key logger

What attacks computer systems by transmitting a virus hoax, with a real virus attached?

Hoaxes

Information Security Policies

Identify the rules required to maintain information security, such as requiring users to log off before leaving for lunch or meetings, never sharing passwords with anyone, and changing passwords every 30 days

What is one simplification that has occurred with Business 2.0?

Improving access to information

What is an enterprise architecture?

Includes the plans for how an organization will build, deploy, use, & share its data, processes, & IT assets.

Which of the following offers a disadvantage for working virtually? A. Increases in worker productivity. B. Increases in feelings of seclusion. C. Decreases in expenses for the company. D. Alleviation of congested roadways.

Increases in feelings of seclusion

All of the following are countries expected to have the largest increases in population between 2000 and 2050, except...?

India

What is a set of guidelines and supporting tools for IT governance that is accepted worldwide and generally used by auditors and companies as a way to integrate technology to implement controls and meet specific business objectives?

Information Systems Audit and Control Association

What is a framework provided by the government of the United Kingdom and offers eight sets of management procedures? CoBIT Information Systems Audit and Control Association Information Technology Infrastructure Library Committee of Sponsoring Organizations Capability Maturity Model Integration Method

Information Technology Infrastructure Library

What concerns the legal right or general expectation of individuals, groups, or institutions to determine for themselves when & to what extent information about them is communicated to others?

Information privacy

What policy contains the general principles regarding information privacy

Information privacy policy

Which of the following are epolicies a business should implement to protect itself?

Information privacy policy,Acceptable use policy, Internet use policy, Anti-spam policy

What is the depth & breadth of details contained in a piece of textual, graphic, audio, or video?

Information richness

What identifies the rules required to maintain info security?

Information security policies

According to the ethical computer use policy, users should be _____of the rules &, by agreeing to use the system on that basis, _____to abide by the rules.

Informed; consent

Which term describes legitimate users who purposely or accidentally misuse their access to the environment & cause some kind of business-affecting incident?

Insiders

Intellectual property is __________ creative work that is embodied in physical form and includes copyrights, trademarks, and patents

Intangible

Intellectual Property

Intangible creative work that is embodied in physical form and includes copyrights, trademarks, and patents

What is intangible creative work that is embodied in physical form?

Intellectual property

What is the intangible creative work that is embodied in physical form and includes trademarks and patents?

Intellectual property

What is a special-purpose knowledge-based information system that accomplishes specific tasks on behalf of its users? A. Intelligent system B. Artificial intelligence C. Neural network D. Intelligent agent

Intelligent agent

Which of the following is a special-purpose knowledge based information system that accomplishes specific tasks on behalf of its users? A. Intelligent agent B. Executive agent C. Expert agent D. Modeling system

Intelligent agent

What are agents, software, or businesses that provide a trading infrastructure to bring buyer & sellers together?

Intermediaries

When evaluating the business value of disintermediation, the more ____that are cut from the distribution chain, the lower the product price.

Intermediaries

Which of the following began as an essential emergency military communications system operated by the US Dept. of Defense (DARPA)?

Internet

Which of the following began as an essential emergency military communications system operated by the US Dept. of Defense Advanced Research Project Agency (DARPA)?

Internet

What is government attempts to control Internet traffic, thus preventing some material from being viewed by a country's citizens?

Internet censorship

What is it called when government attempts to control Internet traffic, thus preventing some material from being viewed by a country's citizens?

Internet censorship

Managing global enterprise architectures is a key global IT challenge for the 21st century. What is included in the term global enterprise architectures?

Internet, intranet, extranet, & other telecommunication networks

Managing global enterprise architectures is a key global IT challenge for the 21st century. What is included in the term global enterprise architectures? Internet, intranet, economics, and politics Internet, intranet, extranet, and other telecommunication networks Internet, extranet, regulatory, and compliance All of these

Internet, intranet, extranet, and other telecommunication networks

A __________ is a session where employees meet, sometimes for several days, to define or review the business requirements for the system.

Joint application development

Which of the below statements is correct?

Just putting up a website does not create an ebusiness.

Which of the following is the key result from the highly publicized survey administered by the Institute for Citizen-Centered Services & the Institute for Public Administration in Canada?

Key drivers that directly impact online transaction are security & privacy

Which of the following is the key result of the highly publicized survey administered by the Institute for Citizen-Centered Services and the Institute for Public Administration in Canada?

Key drivers that directly impact online transactions are security and privacy.

What is a program, which installed on a computer, records every keystroke and mouse click?

Key logger software

What is the most common form of collective intelligence found inside the organization?

Knowledge Management (system)

Which system supports the capture, organization, & dissemination of knowledge throughout an organization?

Knowledge management system

What are wireless mobile content services that provide location-specific info to mobile users moving from location to location?

LBS (location based service)

Determining what is ethical can sometimes be difficult because certain actions can be justified or condemned depending on how you view the relationship between ___________.

Legal and ethical

Determining what is ethical can sometimes be difficult because certain actions can be justified or condemned depending on how you view the relationship between what is ________ and _______

Legal and ethical

Insiders

Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident

Dumpster Diving

Looking through people's trash

Which of the following is NOT a benefit of WiMAX?

Low bandwidth

Using the collective power of a community to identify & classify content significantly _____content categorization costs.

Lowers

Which of the following is the most common function outsourced?

MIS

What must managers be able to do to compete in today's global marketplace?

Make decisions to gain competitive advantages. Make decision that can help forecast future business needs. Make decision that can help forecast future business requirements.

What is a distractive agent

Malicious agents designed by spammers and other Internet attackers to farm email addresses off websites or deposit spyware on machines

What includes a variety of threats such as viruses, worms, and Trojan horses?

Malicious code

Jenny Welch works at a retail store selling sports equipment. Her daily tasks include opening the store, creating the work schedules, processing payroll, overseeing sales and inventory, and training employees. At what level of the organizational pyramid would you categorize Jenny?

Managerial

At which level of an organization are employees continuously evaluating company operations to hone the firm's abilities to identify, adapt to, and leverage change?

Managerial level

Challenges

Many challenges that must be confronted to succeed in a global business environment including: • Cultural • Political • Geo-economic (geographic and economic) Cultural business challenges include differences in... Languages • Cultural interests • Religions • Customs • Social attitudes • Political philosophies POLITICAL BUSINESS CHALLENGES • Numerous rules and regulations surrounding data transfers across national boundaries (especially personal information) • Tax implications • Hardware and software importing and exporting • Trade agreements Geoeconomic refers to the effects of geography on the economic realities of international business activities. Even with the Internet, telecommunications, and air travel, the sheer physical distances across the globe make it difficult to operate multinational business.

What is a website or web application that uses content form more than one source to create a completely new product or service?

Mashup

Nike offers people the opportunity to visit its website to create running shoes in the style & color they choose. How would you classify Nike's ebusiness strategy?

Mass Customization

What is the ability of an organization to tailor its products or services to the customers' specifications?

Mass Customization

Which company created several different websites to respond to sensitive cultural differences?

McDonalds

Which of the below is not a characteristic associated with Mozilla Firefox?

Mozilla Firefox is a prime example of a reputation system

What is the process within a genetic algorithm of randomly trying combinations and evaluating the success (or failure) of the outcome? A. Augmented reality B. Mutation C. Fuzzy logic D. Shopping bot

Mutation

What describes how products in a network increase in value to users as the number of users increase?

Network effect

What is a category of AI that attempts to emulate the way the human brain works? A. Intelligent system B. Artificial intelligence C. Expert systems D. Neural network

Neural network

Which of the below categories of AI is used extensively in the finance industry to analyze situations where the logic or rules are unknown? A. Expert system B. Virtual reality C. Neural network D. Genetic algorithm

Neural network

Which of the following is not a feature of a neural network? A. Neural networks can cope with huge volumes of information with many variables. B. Neural networks can function without complete or well-structured information. C. Neural networks can analyze linear relationships only. D. Neural networks can learn and adjust to new circumstance on their own.

Neural networks can analyze linear relationships only

What clause is typically contained in an acceptable use policy

Non-repudiation

Which of the following is not considered a type of biometrics?

None of the above face, iris, voice are all biometrics

Which of the following authentication methods is 100% accurate?

None of the above (nothing is 100%)

Which act strengthened criminal laws against identity theft?

None of these a. bork bill b. sarbanes-oxley act c. cable communnications act

Which of the following is NOT included in the 4 quadrants of ethical & legal behavior?

None of these a. illegal behavior & ethical behavior b. legal behavior and ethical behavior c. legal behavior & unethical behavior

What is a contractual stipulation that ensures that ebusiness participants do not deny their online actions?

Nonrepudiation

Which of the following is part of the acceptable use policy stipulations?

Not attempting to mail bomb a site

What is one of the guidelines an organization can follow when creating an information privacy policy?

Notice & disclosure

What is deperimeterization? Occurs when an organization moves employees outside its network Occurs when an organization moves partners and suppliers outside its firewall Occurs when an organization moves partners and suppliers outside its network Occurs when an organization moves employees outside its firewall

Occurs when an organization moves employees outside its firewall

Content Filtering

Occurs when organizations use software that filters content, such as emails, to prevent the accidental or malicious transmission of unauthorized information

What is software whose source code is available for free by any third party to review & modify?

Open Source

What is a system that consists of nonproprietary hardware & software based on publicly known standards that allows third parties to create add-on products to plug into or interoperate with the system?

Open system

___________ is a statistical process that finds the way to make a design, system, or decision as effective as possible, for example, finding the values of controllable variables that determine maximal productivity or minimal waste.

Optimization

Social Media Policy

Outlining the corporate guidelines or principles governing employee online communications

What are the first two lines of defense a company should take when addressing security risks?

People first, technology second

What is NOT a reason for the growth of decision-making information systems? People no longer have to worry about protecting the corporate asset of organizational information. People must apply sophisticated analysis techniques to make good decisions. People must make decisions quickly. People need to analyze large amounts of information.

People no longer have to worry about protecting the corporate asset of organizational information.

A company should be able to calculate the cost of downtime by which of the following?

Per hour, per day, and per week

What IT governance focus area puts structure around measuring business performance, such as a balanced scorecard, which uses both qualitative & quantitative measures?

Performance measures

Amazon creates a unique recommendation listing for each customer that revisits its website. How would you classify Amazon's ebusiness strategy?

Personalization

Which company had an employee's spouse load file-sharing software onto a company laptop creating a security hole that appears to have compromised the names and Social Security numbers 17,000 current and former employees? McDonalds Pfizer CloudNine Communications Apple

Pfizer

Which company has an employee's spouse load file-sharing software onto a company laptop creating a security hole that appears to have compromised the names and Social Security numbers of 17,000 current and former employees?

Pfizer

Imagine you accidentally mistype the URL for your bank and you are redirected to a fake website that collects your information. You have just been a victim of _________ identity theft.

Pharming

Which company is expecting to gain the majority of its returns on existing investments?

Phillips Petroleum

What is the difference between pirated and counterfeit software?

Pirated is the unauthorized use, duplication, distribution, or sale of copyrighted software, where counterfeit is software that is manufactured to look like the real thing and sold as such.

What is the unauthorized use, duplication, or sale of copyrighted software?

Pirated software

Which of the following describes the benefits of MIS governance?

Places structure around how organizations align IT strategy with business strategy. Ensures companies stay on track to achieve their strategies and goals. Implements good ways to measure IT's performance.

Epolicies

Policies and procedures that address information management along with the ethical use of computers and the Internet in the business environment

What clearly dominates as the primary problem hindering international telecommunication issues as reported by IT executives at 300 Fortune 500 multinational companies?

Political issues dominate

Which of the following is an example of sustaining technology?

Porsche's faster car

What is the right to be left alone when you want to be, to have control over your own personal possessions, & not to be observed without your consent?

Privacy

Which act restricts what information the federal government can collect?

Privacy Act

Which of the following is not one of the 5 focus areas from the IT Governance Institute?

Product delivery

Which of the following is not one of the five focus areas from the MIS Governance Institute?

Product delivery

What are the factors included in the global products category of global IT business drivers?

Products are the same world wide & global IT can help manage worldwide marketing, sales, & quality control

Which of the following is a challenge of sustaining technology?

Provides a product that does not meet existing customers' future needs

Many websites use _____ to constantly feed new to consumer instead of having the consumer search for the news.

RSS

What does RSS stand for?

Real Simple Syndication

Downtime

Refers to a period of time when a system is unavailable

What occurs when steps are added to the value chain as new players find ways to add value to the business process?

Reintermediation

What uses the Internet to reassemble buyers, sellers, & other partners in a traditional supply chain in new ways?

Reintermediation

eBay buyers voluntarily comment to other users & sellers on the quality of service, promptness of shipping, & their general satisfaction with the product. This is one of the most popular examples of user-generated content & is called a(n) ____.

Reputation system

Acceptable Use Policy (AUP)

Requires a user to agree to follow it to be provided access to corporate email, information systems, and the Internet

Pharming

Reroutes requests for legitimate websites to false websites

A company can reduce its costs by using ebusiness to change its business processes. Which of the following does not represent an example of how a company can reduce its costs through ebusiness?

Researching products to find the lowest price & visiting the store to purchase the item.

Spoofing is the forging of the ________ address on an email so that the email message appears to come from someone other than the actual sander

Return

Mail bomb

Sans a massive amounts of email tree specific person or system that can cause that users server to stop functioning

Which act protects investors by improving the accuracy & reliability of corporate disclosures?

Sarbanes-Oxley Act

What technology allows viewers in almost any location to select from hundreds of channels?

Satellite TV

Antivirus Software

Scans and searches hard drives to prevent, detect, and remove known viruses, adware, and spyware

What is encryption?

Scrambles info into an alternative form that requires a key or password to decrypt the info

Encryption

Scrambles information into an alternative form that requires a key or password to decrypt

Who finds hacking code on the Internet & click-and-points their way into systems to cause damage or spread viruses?

Script Kiddies

What is a programming method that provides for interactive modules to a website?

Scripting language

Which of the following is not considered an ePolicy?

Security badge policy

What is a component of Web 3.0 that describes things in a way that computer can understand?

Semantic web

What occurs in situations in which a few established processes help to evaluate potential solutions, but not enough to lead to a definite recommended decision?

Semistructured decisions

What is a mail bomb?

Sending a massive amount of email to a specific person or system resulting in filling up the recipient's disk space

What is a mail bomb?

Sending a massive amount of email to a specific person or system that can cause that user's server to stop functioning.

What is software that will search several retailer websites and provide a comparison of each retailer's offerings including prices and availability? A. Augmented reality B. Mutation C. Fuzzy logic D. Shopping bot

Shopping bot

What is the type of authentication that requires a user name and password?

Single-factor authentication

Tokens

Small electronic devices that change user passwords automatically

What is a device that is around the same size as a credit card, containing embedded technologies that can store info & small amounts of software to perform some limited processing?

Smart card

Which of the following is a program or devices that can monitor data traveling over a network?

Sniffer

_________is the process of monitoring and responding to what is being said about a company, indivdual, product, or brand.

Social Media monitoring

To find out your company policy regarding such a website that's YouTube, Facebook, and Twitter, you would have to refer to the __________ policy

Social media

Which of the following best describes Web 2.0?

Social media & user-generated web content

What is the process of monitoring and responding to what is being said about a company, individual, product, or brand

Social media monitoring

What is the practice of expanding your business & social contacts by constructing a personal network?

Social networking

Counterfeit Software

Software that is manufactured to look like the real thing and sold as such

Virus

Software written with malicious intent to cause annoyance or damage

What is the most costly & intrusive form of authentication?

Something that is part of the user such as a fingerprint or voice signature

Erik is the president & owner of Watch Out, a local website development company that helps clients create & build unique websites. Many of his daily tasks are heavily technical in nature & require a high level of computer programming & internet knowledge. Which of the below would Erik primarily use when performing his daily tasks?

Source code

What is the unsolicited email that plagues employees at all levels and glogs email systems

Spam

What is unsolicited email that plagues employees at all levels and clogs email system

Spam

What is the forging of the return address on an email so that the email message appears to come from someone other than the actual sender?

Spoofing

What is a special class of adware that collects data about the user in transmits it over the Internet without the users knowledge or permission

Spyware

Anti-Spam Policy

States that email users will not send unsolicited emails (or spam)

Which of the following best describes Web 1.0?

Static text-based information websites

Which of the following is not a component of a RFID architecture?

Store

Which of the following represents the 5 focus areas from the IT Governance Institute?

Strategic alignment, risk management, performance measures, resource management, value delivery

________________decisions are made frequently and are almost repetitive in nature; they affect short-term business strategies.

Structured

________ asks users to write lines of code to answer questions against a database?

Structured query language

Which social media site works by allowing content to find the users, instead of the users having to search for the content?

StumbleUpon

Which of the following produces an improved product customers are eager to buy, such as a faster car or larger hard drive?

Sustaining Technology

What is the overall process for developing information systems from planning and analysis through implementation and maintenance?

Systems development life cycle

Which of the following represents a brick-and-mortar business?

T. J. Maxx

What is the type of knowledge that is contained in people's heads?

Tacit knowledge

Many social media websites use ____ or specific keywords or phrases incorporated into website content for means of a classification or taxonomy.

Tags

Which of the following definitions represents physical security?

Tangible protection such as alarms, guards, fireproof doors, fences, and vaults.

Which of the below is NOT a characteristic of Business 2.0?

Technical skills are required

Cell phone manufacturers often refer to their products as mobile devices. Which of the below would not be included in the folksonomy for a cell phone?

Technology platform

What is a haptic interface? A. The viewing of the physical world with computer-generated layers of information added to it. B. A wearable computer with an optical head-mounted display (OHMD). C. Technology that allows humans to interact with a computer through bodily sensations and movements. D. A work environment that is not located in any one physical space.

Technology that allows humans to interact with a computer through bodily sensations and movements

What is a framework provided by the government of the United Kingdom and offers eight sets of management procedures: (1) service delivery, (2) service support, (3) service management, (4) Information and Communication Technology (ICT) infrastructure management, (5) software asset management, (6) business perspective, (7) security management, and (8) application management?

The Information Technology Infrastructure Library

Which act restricts what information the federal government can collect?

The Privacy Act

Which act protects investors by improving the accuracy and reliability of corporate disclosures?

The Sarbanes-Oxley Act

Different organizations and countries have their own terms for fair information practices. Which of the following is correct?

The United Kingdom terms it "Data Protection."

Ediscovery

The ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry

What statement below describes Web 3.0's feature that ensures the "integration of legacy devices"?

The ability to use current devices such as iPhones & laptops as credit cards or tickets

What is click-fraud?

The abuse of pay-per-click, pay-per-call, and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser.

Information Compliance

The act of conforming, acquiescing, or yielding information

Confidentially

The assurance that messages and information remain available only to those authorized to view them

Legal behavior and ethical behavior, illegal behavior but ethical behavior, legal behavior but unethical behavior, Illegal behavior and unethical behavior

The four quadrants of ethical and legal behavior

Biometrics

The identification of a user based on a physical characteristic, such as fingerprint, iris, face, voice, or handwriting

What are the factors included in the global collaboration category of global IT business drivers?

The knowledge & expertise of colleagues in a global company can only be accessed, shared, & organized by global IT systems

Copyright

The legal protection afforded And expression of an idea, such as a song, book, or video game

Copyright

The legal protection afforded an expression of an idea, such as a song, book, or video game

Ethics

The principles and standards that guide our behavior toward other people

Authorization

The process of providing a user with permission including access levels and abilities such as file access, hours of access, and amount of allocated storage space

Privacy

The right to be left alone when you want to be, to have control over your personal possessions, and not to be observed without your consent

Which statement below is incorrect?

The semantic web captures, organizes, & disseminates knowledge (i.e. know-how) throughout an organization.

What is a business requirement?

The specific business requests the system must meet to be successful.

Pirated Software

The unauthorized use, duplication, distribution, or sale of copyrighted software

What is augmented reality? A. The viewing of the physical world with computer-generated layers of information added to it. B. A wearable computer with an optical head-mounted display (OHMD). C. Uses technology allowing humans to interact with a computer through bodily sensations and movements. D. A work environment that is not located in any one physical space.

The viewing of the physical world with computer-generated layers of information added to it

What do cargo transport systems, book distribution centers, the video game market, a flu epidemic, and an ant colony have in common? A. They are all expert systems and thus share some characteristics. B. They are all genetic algorithm systems and thus share some characteristics. C. They are all neural network systems and thus share some characteristics. D. They are all complex adaptive systems and thus share some characteristics.

They are all complex adaptive systems and thus share some characteristics

Artificial intelligence simulates human thinking and behavior, such as the ability to reason and learn. What is the ultimate goal of AI? A. To build an intelligent system. B. To build an intelligent agent. C. To build a system that can mimic human intelligence. D. To build a system that can mimic an expert agent.

To build a system that can mimic human intelligence

Information Technology Monitoring

Tracks people's activities by such measures as number of keystrokes, error rate, and number of transactions processed

. Identity theft is the forging of someone's identity for the purpose of frauD.

True

A certificate authority is a trusted third party, such as VeriSign, that validates user identities by means of digital certificates.

True

A dynamic process continuously changes and provides business solutions to ever-changing business operations. True False

True

A sparkline is a small embedded line graph that illustrates a single trend. Sparklines are often used in reports, presentations, dashboards, and scoreboards. They do not include axis or labels; context comes from the related content. True False

True

A time-series chart is a graphical representation showing change of a variable over time. Time-series charts are used for data that changes continuously, such as stock prices. They allow for a clear visual representation of a change in one variable over a set amount of time. True False

True

An algorithm refers to a set of instructions that completes a task. True False

True

Benchmarks re baseline values the system seeks to attain. True False

True

Big data is a collection of large, complex data sets, including structured and unstructured data, that cannot be analyzed using traditional database methods and tools.

True

Biometrics is the identification of a user based on a physical characteristic, such as a fingerprint, iris, face, voice, or handwriting.

True

Classification analysis assigns information or data into one of a predefined set of classes.

True

Core processes are business processes, such as manufacturing goods, selling products, and providing services that make up the primary activities in a value chain. True False

True

Granularity refers to the level of detail in the model or the decision-making process. True False

True

Key performance indicators can focus on external and internal measurements. True False

True

Machine learning is a type of artificial intelligence that enables computers to both understand concepts in the environment, and also to learn. True False

True

Multifactor authentication requires more than two means of authentication such as what the user knows (password), what the user has (security token), and what the user is (biometric verification).

True

One of the most important and challenging questions confronting managers today is how to lay the foundation for tomorrow's success while competing to win in today's business environment. True False

True

One of the most important and challenging questions confronting managers today is how to lay the foundation for tomorrow's success while competing to win in today's business environment. True False

True

Open source and sharing are both advantages and disadvantages of Business 2.0.

True

The goal of multifactor authentication is to make it difficult for an unauthorized person to gain access to a system because, if one security level is broken, the attacker will still have to break through additional levels.

True

Two-factor authentication requires the user to provide two means of authentication, what the user knows (password) and what the user has (security token).

True

What is a problem that occurs when someone registers purposely misspelled variations of well-known domain names

Typo squatting

What is a problem that occurs when someone registers purposely misspelled variations of well-known domain names?

Typosquatting

What is a service that enables instant or real-time communication between people?

URL

Which of the following terms could you use to synonymously when referring to the web?

URL (Universal Resource Locator), domain name

Spam

Unsolicited email

What types of business decisions would an EIS use AI for? A. Semistructured decisions B. Multistructured decisions C. Structured decisions D. Unstructured decisions

Unstructured decisions

Included in the information security policy, managers should consider including virus protection, which includes how often the system should be scanned and how frequently the software should be __________.

Updated

What is one of the major problems with email?

User's expectation of privacy

What do Netflix & Amazon use to drive their recommendation tools?

User-generated content

What is advanced analytics?

Uses data patterns to make forward-looking predictions to explain to the organization where it is headed.

Public Key Encryption (PKE)

Uses two keys: a public key that everyone can have and a private key for only the recipient

What is social engineering?

Using one's social skills to trick people into revealing access credentials or other info valuable to the attacker

Black hat, script Kiddles, cracker

Valid types of hackers

Black hat, back door, script kiddles , polymorphic, cracker, and Trojan horse

Valid types of viruses

What IT governance focus area ensures the IT department delivers the promised benefits for every project or investment? Strategic alignment Risk management Resource management Value delivery

Value delivery

Bob Silver loves playing a game called World of Warcraft where he has the capability to create his own character and even his own life-like environment. Which AI system would you categorize World of Warcraft? A. Multi-agent system B. Expert system C. Virtual reality D. Fuzzy logic system

Virtual reality

What is a computer-simulated environment that can be a simulation of the real world or an imaginary world? A. Virtual reality B. Augmented reality C. Virtual workforce D. All of these

Virtual reality

What is the one of the most common forms of computer vulnerabilities that can cause massive computer damage?

Virus

Which of the below would not be considered a company operating in the long tail of a typical sales curve?

Walmart

Child online protection act (COPA)

Was passed to protect minors from accessing inappropriate material on the Internet

Requiring computer users to log off before leaving for lunch, never sharing user or password information with anyone, changing passwords every 30 days

Ways to maintain information security that a company should include in their information security policies

Which statement below is inaccurate?

Web 2.0 is a simple static website without any interaction with its user

Which of the below is not a characteristic of Business 2.0?

Web Browser

What is the theft of a website's name that occurs when someone, posing as a site's administrator, changes the ownership of the domain name assigned to the website to another website owner?

Website name stealing

What key questions should IT governance answer? How the finance department is functioning overall? What key metrics management requires? What return the business is getting from its personnel investment? All of these.

What key metrics management requires?

Jensen is a senior developer for HackersRUs, a company that helps secure management information systems. Jensen's new task is to break into the computer system of one of HackersRUs' top clients to identify system vulnerabilities and plug the holes. What type of hacker is Jensen?

White-hat hacker

Who works at the request of the system owners to find system vulnerabilities & plug the holes?

White-hat hackers

What is a telecommunications technology aimed at providing wireless data over long distances in a variety of ways, from point-to-point links to full mobile cellular type access?

WiMAX

What are the 2 components of a WiMAX system?

WiMAX tower, WiMAX receiver

What technology enables wireless networks to extend as far as 30 miles & transfer information, voice, & video at faster speeds than cable?

WiMAX wireless broadband

What technology enables wireless networks to extend as far as 30 miles and transfer information, voice, and video at faster speeds than cable?

WiMAX wireless broadband

Which of the following is a question a company should ask when creating a global website?

Will the site require new navigational logic to accommodate cultural preference?; Will content be translated?; Which country will the server be located in to support local user needs?

What refers to any type of electrical or electronic operation that is accomplished without the use of "hard-wired" connection?

Wireless

What technology uses radio waves rather than wires to transmit information across a local area network?

Wireless local area network

What is a type of virus that spreads itself, not just file to file, but from computer to computer?

Worm

What is a failover?

a backup operational mode in which the functions of a computer component (such as a processor, server, network, or database) is assumed by secondary system components when the primary component becomes unavailable through either failure or scheduled down time

What is the diference between a business model and an ebusiness model?

a business model details how a company creates, delivers, and generates revenue. An ebusiness model does all of the same except on the Internet

neural networks

a category of AI that attempts to emulate the way the human brain works

digital dashboard

a common tool that supports visualization; tracks KPIs and CSFs by compiling information from multiple sources and tailoring them to meet user needs

What is Mozilla Firefox?

a competitor to Internet Explorer

What is competitive click-fraud?

a computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link

What is a global positioning system (GPS)?

a constellation of 24 well-spaced satellites that orbit the Earth & make it possible for people with ground receivers to pinpoint their geographic location

business process model

a graphic description of a process showing the sequence of process tasks, which is developed for a specific purpose and from a selected viewpoint

What is a project milestone?

a key date by which a certain group of activities must be performed

What is wireless fidelity?

a means of linking computers using infrared or radio signals

Which of the choices below represents the definition of information governance?

a method or system of government for information management or control

Governance

a method or system of government for management or control IT Governance Institute Five focus areas: 1. Strategic alignment: Linking business and IT so they work well together. True alignment can occur only when the corporate side of the business communicates effectively with IT leaders about costs, reporting, and impacts. 2. Risk management: Instituting a formal risk framework that puts some rigor around how IT measures, accepts, and manages risk. 3. Performance measures: Putting structure around measuring business performance, such as a balanced scorecard, which uses both qualitative and quantitative measures. 4. Resource management: Managing resources more effectively and efficiently. This allows organizations to deploy employees to various projects on a demand basis. 5. Value delivery: Ensuring the IT department delivers the promised benefits for every project or investment.

Which of the following clauses is typically contained in an acceptable use policy?

a nonrepudiation clause

Which of the following definitions represents typosquatting?

a problem that occurs when someone registers purposely misspelled variations of well-known domain names

benchmarking

a process of continuously measuring system results, comparing those results to optimal system performance, and identifying steps and procedures to improve system performance; helps asses how an MIS project performs over time

What is a SOA service?

a simple business task

shopping bot

a software that will search several retailer websites and provide a comparison of each retailer's offerings including price and availability (think Progressive)

sensitivity analysis

a special case of what-if analysis; the study of the impact on other variables when one variable is changed REPEATEDLY; useful when users are uncertain about the assumptions made in estimating the value of certain key variables

intelligent agent

a special-purpose knowledge-based information system that accomplishes specific tasks on bahalf of its users (the "Sherlock Holmes" for an information search agent)

executive information system (EIS)

a specialized DSS that supports senior-level executives and unstructured, long-term, nonroutine decisions requiring judgement, evaluation, and insight. (Not thought of as right and wrong, but instead as efficient and effective answers)

What is digital rights management?

a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution

What is Bluetooth?

a telecommunications industry specification that descries how mobile phones, computers, & personal digital assistants (PDAs) can be easily interconnected using a short-range wireless connection

What is trend analysis?

a trend is examined to identify its nature, causes, speed of development, and potential impacts

Which of the following is the most uncommon reason why companies outsource?

better manage the costs of internal processes

What is a collection of large, complex data sets, including structured and unstructured data, which cannot be analyzed using traditional database methods and tools?

big data

_________ is a hacker who breaks into other people's computer systems and may just look around or steal and destroy information.

black-hat hacker

Where is the position of IT infrastructure within the organization?

bottom

What is a policy that allows employees to use their personal mobile devices and computers to access enterprise data and applications?

bring your own device

A company's internal wiki can be a great tool for all of the following except...?

building software applications

What is information collected from multiple sources such as suppliers, customers, competitors, partners, and industries that analyzes patterns, trends, and relationships for strategic decision making?

business intelligence

What are the four global IT business management areas critical to running multinational companies?

business strategies, enterprise architectures, information issues, systems development

Ecommerce?

buying and selling of goods or service online

How would a company like Flickr use social tagging on its website?

by allowing users to upload images and tag the images with their own key words

How do decision-making information systems work? by building models out of organizational information to lend insight into important business issues and opportunities by building models out of analytical information only to lend insight into important business issues and opportunities None of these are correct. by building models out of transactional information only to lend insight into important business issues and opportunities

by building models out of organizational information to lend insight into important business issues and opportunities

What determines the future environmental infrastructure requirements to ensure high-quality system performance?

capacity planning

Which of the following is not one of Whole Foods' four separate organizational hierarchies? facilities employment regional offices centralized employment global headquarters

centralized employment

what-if analysis

checks the impact of a change in a variable or assumption on the model

The _________ Online Protection Act was passed to protect minors from accessing inappropriate material on the Internet.

child

Which of the following definitions represents opt-out?

choosing to deny permission to incoming emails.

Which of the following forms of data mining assigns records to one of a predefined set of classes?

classification

________ is a form of data mining that assigns records to one of a predefined set of classes.

classification

What type of Internet monitoring technique records information about a customer during a web surfing session, such as what websites were visited and how long the visit was, or what ads were viewed and what was purchased

click stream

Which type of ebusiness model is Barnes and Noble using?

click-and-mortar

What is the abuse of pay-per-click, pay-per-call, and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser?

click-fraud

What is the exact pattern of a consumer's navigation through a site?

clickstream data

What refers to resources and applications hosted remotely as a shared service over the Internet?

cloud computing

market share

common external KPI; the proportion of the market that a firm captures; calculated by dividing the firm's sales bu the total market sales for the entire industry

Asynchronous communication?

communication that does not occur at the same time

Synchronous communication?

communication that occurs at the same time

What is a computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link?

competitive click-fraud

What is a computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link?

competitive click-freud

What is the act of conforming, acquiescing, or yielding?

compliance

expert systems

computerized advisory programs that imitate the reasoning processes of experts in solving difficult problems; most common form of AI

In relation to privacy, which of the following is the assurance that messages and information remain available only to those authorized to view them?

confidentiality

Which of the following is one of the primary reasons for the increase in Internet use?

connectivity technology

Internet marketers must develop ______ _____to build strong relationships with customers to ensure loyalty?

consumer trust

What is an RFID tag?

contains a microchip & an antenna

What are the technologies available to help prevent & build resistance to attacks?

content filtering, encryption, firewalls

Which of the following is not considered an advantage of a content management system?

content management systems increase order entry speed

What are the 4 most common Business 2.0 characteristics?

content sharing through open source, user-contributed content, collaboration inside the organization, & collaboration outside the organization.

Websites sometimes deposit on a customer's hard drive a small file containing information about the customer and the customer's web activities. What is that small file called?

cookie

What is the legal protection afforded an expression of an idea, such as a song, book, or video game?

copyright

examples of CSFs

create high-quality retain competitive advantages reduce product costs increase customer satisfaction higher and retain the best business professionals

Whole Foods stated it strives to provide the highest quality natural and organic product available. This is an example of a(n) _________. critical success factor efficiency MIS metric key performance indicator effectiveness MIS metric

critical success factor

What are the two core metrics?

critical success factors (CSFs) and key performance indicators (KPIs)

critical success factors (CSFs)

crucial steps companies perform to achieve their goals and objectives and implement their strategies

What are the 3 primary challenges facing global businesses?

cultural; political; geoeconomic

What are the factors included in the global customer's category of global IT business drivers?

customers who travel anywhere or companies with global operations and global IT systems help provided fast, convenient, homogeneous service

What includes threats, negative remarks, or defamatory comments transmitted via the Internet or posted on the website?

cyberbullying

What type of mediation refers to the creation of new kinds of intermediaries that simply could not have existed before the advent of ebusiness?

cybermediation

Who are individuals that seek to cause harm to people or to destroy critical systems or information and use the Internet as a weapon of mass destruction?

cyberterrorists

What is the electronic defacing of an existing website?

cybervandalism

What is the ultimate outcome of a data warehouse?

data marts

Which of the following tools use a variety of techniques to find patterns and relationships in large volumes of information that predict future behavior and guide decision making?

data-mining

Which of the following is not one of the primary information technology areas on which organizations are focusing?

database

_________ maintains information about various types of objects, events, people, and places.

database

Whole Foods' organizational structure is ______________ and the majority of decisions are made by the ___________. decentralized, regional managers centralized, executives pyramid, executives pyramid, regional managers

decentralized, regional managers

Which of the following is not part of a typical SOA solution?

decrease people productivity with better business integration

What is a geographic information system (GIS)?

designed to work with info that can be shown on a map

Which of the following is not a cultural business challenge?

differences in architectures

Which of the following is NOT one of the Internets' impacts on information?

digital divide

Which of the following serves as key evidence in many legal cases today and also provides a faster, easier way to search and organize paper documents?

digital information

What is any paper that is optimized for any type of digital printing?

digital paper

What is a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution?

digital rights management

What are the 2 categories that include intellectual and knowledge-based assets?

explicit and tacit knowledge

optimization analysis

extension of goal-seeking analysis; finds the OPTIMUM value for a target variable by repeatedly changing other variables, subject to specific constraints

What is the confirmation or validation of an event or object?

fact

What is a general term for a set of standards governing the collection and use of personal data and addressing issues of privacy and accuracy?

fair information practices

Single-factor authentication requires the user to provide two means of authentication, what the user knows (password) and what the user has (security token).

false

Which of the following is a benefit a business can receive by deploying the latest in security technology?

fewer disruptions to organizational systems; increased productivity of employees; greater advances in administration

business process management (BPM) systems

focus on evaluating and improving processes that include both person-to-person workflow and system-to-system communications

What is the term that is similar to taxonomy except that crowd-sourcing determines the tag or keyword-based classification system?

folksonomy

customer-facing processes

front-office processes; result in a product or service received by an organization's external customer; examples: fulfilling orders, communicating with customers, sending out bills and marketing information

What refers to the effects of geography on the economic realities of international business activities?

geoeconomic

What are the 4 global IT business driver that should be included in all global IT business strategies?

global customers, global products, global operations & resources, global collaboration

Which of the following is an example of Whole Foods' MIS effectiveness metrics? quick response time of systems quick transaction speed for cash registers high customer satisfaction high system availability

high customer satisfaction

Which of the following is an example of Whole Foods' MIS efficiency metrics? easy to use systems high system availability high conversion rates of customers high customer satisfaction

high system availability

Which type of metric measures when a visitor reaches a website and their computer sends a request to the site's computer server to begin displaying pages?

hit metric

What is a separate and fully equipped facility where the company can move immediately after a disaster and resume business

hot site

What type of backup strategy would you recommend to an organization that deals with large volumes of critical information?

hourly

Which of the following is the least common function outsourced?

human resources

What are the 4 challenges facing ebusinesses outlined in the text?

identifying limited market segments, managing consumer trust, ensuring consumer protection, and adhering to taxation rules

Which of the following is not a privacy issues associated with location based info?

identity theft

streamlinig

improves business process efficiencies by simplifying or elimiates unnecessary steps

In terms of big data what is variety?

includes different forms of structured and unstructured data.

enterprise architecture

includes the plans for how an org will build, deploy, use and share its data, processes and MIS assets

workflow

includes the tasks, activities and responsibilities required to execute each step in a business process

Which of the following is a benefit an organization can receive from outsourcing?

increased technical abilities; financial savings; market agility

Which of the following is a reason why businesses want to have the appropriate levels of authentication, access control, and encryption?

individuals cannot understand or alter information while in transit; only authorized individuals can access applications for which they are entitled; only authorized individuals can gain access to the network

Which of the following are the influential driver(s) affecting the growth of outsourcing markets?

industry changes; rapid growth; core competencies

What can present the results of large data analysis looking for patterns and relationships that monitor changes in variables over time?

infographics

Which of the following governs the ethical and moral issues arising from the development and use of information technologies, and the creation, collection, duplication, distribution, and processing of information?

information ethics

Which of the following occurs when a system produces incorrect, inconsistent, or duplicate data?

information integrity issue

Which of the following examines the organizational resource of information and regulates its definitions, uses, value, and distribution ensuring it has the types of data or information required to function and grow effectively?

information management

Which policy contains general principles regarding information privacy?

information privacy policy

efficiency MIS metrics

measure the performance of MIS itself, such as throughput, transaction speed and system availability; focuses on the extent to which a firm is using its resources in an optimal way

What measures the number of people a firm can communicate with all over the world?

information reach

What is the depth and breadth of details contained in a piece of textual, graphic, audio, or video?

information richness

What is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity?

information secrecy

According to the ethical computer use policy, users should be ___ of the rules and, by agreeing to use the system on the basis, ___ to abide by the rules.

informed; consent

According to the ethical computer use policy, users should be ________ of the rules and, by agreeing to use the system on that basis, ________ to abide by the rules

informed; consent

According to the ethical computer use policy, users should be ______________ of the rules and, by agreeing to use the system on that basis, _______________ to abide by the rules.

informed; consent

source documents

input for a TPS; the original transaction record

risk management

instituting a formal risk framework that puts some rigor around how IT measures, accepts and manages risk

Intellectual property is _________________ creative work that is embodied in physical form and includes copyrights, trademarks, and patents.

intangible

What verifies that separate systems can work together passing data back and forth correctly?

integration testing

Which report presents data that is distributed inside the organization and is intended for employees within an organization?

internal reports

What is a world where interconnected, Internet-enabled devices or "things" can collect and share data without human intervention?

internet things

governance

is a method or system of governmetn for management or control

Which of the following would not be considered part of the unique characteristic of high-quality information?

is aggregate information in agreement with detailed information?

compliance

is the act of conforming, acquiescing or yielding

What is extraction, transformation, and loading?

it is a process that extracts information from internal and external databases, transforms it using a common set of enterprise definitions, and loads it into a data warehouse.

All of the following jobs will be increasingly performed by robots, except...?

jobs performed by scientists, engineers, and technicians

Which of the below statements is correct?

just putting up a website does not create an ebusiness

What kind of society is being created by the growth in information industries?

knowledge-dependent global society

swim lane

layout arranges the steps of a business process into a set of rows depicting the various elements

Determining what is ethical can sometimes be difficult because certain actions can be justified or condemned depending on how you view the relationship between ________ and ________.

legal and ethical

Determining what is ethical can sometimes be difficult because certain actions can be justified or condemned depending on how you view the relationship between _____ and ________.

legal; ethical

strategic alignment

linking business and IT so they work well together; can occur only when the corporate side of the business communicates effectively with IT leaders about costs, reporting and impacts

Using the collective power of a community to identify and classify content significantly _______ content categorization costs?

lowers

What is data created by a machine without human intervention?

machine-generated data

What sends massive amounts of email to a specific person or system that can cause that user's server to stop functioning?

mail bomb

What includes a variety of threats such as viruses, worms, & Trojan horses?

malicious code

MIS is a business function, like accounting or sales, which moves information about people, products, and processes across the company to facilitate decision making and problem solving. What does MIS stand for?

management information system

decision support systems (DSSs)

managerial; model information using OLAP, which provides assistance in evaluation and choosing among different courses of action

Which of the following is a challenge facing an ebusiness?

managing consumer trust

resource management

managing resources more effectively and efficiently. this allows orgs to deploy employees to various projects on a demand basis

business process modeling

mapping; is the activity of creating a detailed flowchart or process map of a work process that shows its inputs, tasks and activities in a structured sequence

What is a website or web application that uses content from more than one source to create a completely new product or service?

mashup

What is the practice of gathering data and ensuring that it is uniform, accurate, consistent, and complete, including such entities as customers, suppliers, products, sales, employees, and other critical entities that are commonly integrated across organizational systems?

master data mangement

fuzzy logic

mathematical method of handling imprecise or subjective information

effectiveness MIS metrics

measure the impact MIS has on business processes and activities, including customer satisfaction and customer conversion rates; focuses on how well a firm is achieving its goals and objectives

genetic algorithm

mimics the evolutionary, survival-of-the-fittest process to generate increasingly better solutions to a problem

How would you categorize mobile entertainment, mobile sales, mobile ticketing, and mobile banking?

mobile business; mcommerce; mbusiness

What is the ability to purchase goods and services through a wireless Internet-enabled device?

mobile commerce

Which of the following is not a technology company but used technology to revamp the business process of renting videos?

netflix

Which of the following reflects Moore's Law?

new generations of chips deliver double the processing power as the previous generation

. Which of the following terms refers to a contractual stipulation to ensure that ebusiness participants do not deny their online actions?

nonrepudiation

A(n) ___________clause is tyically contained in an acceptable use policy.

nonrepudiation

What is an anti-spamming approach whereby the receiving computer launches a return attack against the spammer, sending email messages back to the computer that originated the suspected spam?

nonrepudiation

. Users would agree to all of the following in a typical acceptable use policy except ________.

not posting commercial messages to groups where the employee has received user consent

. What is one of the guidelines an organization can follow when creating an information privacy policy?

notice and disclosure

What does 50% of what a student learns about innovative technology in their freshman year of college become by their senior year?

obsolete; taken for granted; revised

semistructured decisions

occur in situations in which a few established processed help to evaluate potential solutions, but not enough to lead a definite recommended decision

What are transborder data flows?

occur when business data flows across international boundaries over the telecommunications networks for global information systems

trans-border data flows

occur when business data flows across international boundaries over the telecommunications networks of global info system

Transborder Data Flows

occur when business data flows across international boundaries over the telecommunications networks of global information systems Many countries view TDF as violating their national sovereignty

unstructured decision

occurring in situations in which no procedures or rules exist to guide decision makers toward correct choice

deperimeterization

occurs when an org moves employees outside its firewall, a growing movement to change the way corporations address technology security

What is deperimeterization?

occurs when an organization moves employees outside its firewall

Deperimeteriazation

occurs when an organization moves employees outside its firewall, a growing movement to change the way corporations address technology security

What are transborder data flows?

occurs when business data flows across international boundaries over the telecommunications networks for global information systems

redundancy

occurs when task or activity is unnecessarily repeated; example: if both sales and accounting department check customer credit

structured decision

operational decisions, arise in situations where established processes offer potential

transaction processing system

operational; the basic business system that assists in making structured decisions; most common example is payroll system

Which department manages the process of converting or transforming resources into goods or services?

operations management

What refers to choosing to allow permissions to incoming emails?

opt in

What occurs when a person chooses to deny permission to incoming emails?

opt out

What refers to denying permissions to incoming emails?

opt out

Which of the following is one of the new series of business success factors and challenges that are helping to determine marketplace winners and losers?

organization agility; instantaneous business response; a focus on core competencies and processes

What does digital Darwinism imply?

organizations that cannot adapt to the new demands placed on them for surviving in the information age are doomed to extinction

What is a potential problem or impact of technology dependence?

outages create potentially great havoc for people, businesses, and educational institutions that rely heavily on technology; many have a need to be continuously connected for every activity, which potentially eliminates crucial in-person social skills and could stunt psychological growth; how do people or businesses function if the connection is down?

What is an arrangement by which one organization provides a service or services for another organization that chooses not to perform them in-house?

outsourcing

Which trend has the following potential business impact: The time to get products and services to market is being shortened by technology?

pace of technological innovation is increasing

What occurs when a new radical form of business enters the market that reshapes the way companies and organizations behave?

paradigm shift

Which implementation uses both the legacy system and new system until all users verify that the new system functions correctly?

parallel implementation

What is the recommended way to implement info security lines of defense?

people first, technology second

What measures how quickly a system performs a certain process or transaction in terms of efficiency IT metrics of both speed and throughput?

performance

Amazon creates a unique recommendation listing for each customer that revisits its website. How would you classify Amazon's ebusiness strategy?

personalization

Netflix creates a unique recommendation listing for each customer that revisits its website. How would you classify Netflix's ebusiness strategy?

personalization

Sophie Black works as a computer programmer for a software company. Her boss, Mike Jones, is responsible for developing a new software game for the Wii. After completion of the project, Mike gives all of the team members a free copy of the game without consent from the company. Sophie is a little hesitant and unsure about accepting the game because legally it would be considered ________.

pirated software

What is the unauthorized use, duplication, distribution, or sale of copyrighted software? A. ediscovery

pirated software

Companies use ________ as marketing communication channels, discussing everything from corporate strategies to detailed product overviews?

podcasting

What converts an audio broadcast for use by a digital music player?

podcasting

What is the number 1 reason that IT projects fall behind schedule or fail?

poor planning or poor project management

How would the technology industry use business intelligence?

predict hardware failures

Information _________ concerns the legal right or general expectation of individuals, groups, or institutions to determine for themselves when and to what extent information about them is communicated to others.

privacy

Which of the following means the right to be left alone when you want to be, to have control over your personal possessions, and not to be observed without your consent?

privacy

Which of the following is an outsourcing challenge caused by contract length?

problems in foreseeing future issues; difficulties in getting out of a contract; problems in reforming an internal IT department

visualization

produces graphical displays of patterns and complex relationships in large amounts of data

What is the rate at which goods and services are produced based upon total output given total inputs?

productivity

Which data types are typically found in the marketing department?

promotion data, sales data, advertising data.

What is the primary business advantage of using email?

providing the ability to inform and communicate with many people simultaneously, immediately, and with ease

Which type of ebusiness model is Amazon using?

pure-play

performance measures

putting structure around measuring business performance, such as balanced scorecard, which uses both qualitative and quantitative measures

When studying the figure of the four quadrants of ethical and legal behavior, the goal is for organizations to make decisions in which of the following quadrants?

quadrant I

What uses active or passive tags in the form of chips or smart labels?

radio frequency identification

What is immediate, up-to-date information?

real-time information

What is ediscovery?

refers to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry

geoeconomic

refers to the effects of geography on the economic realities of international business activities

granularity

refers to the level of detail in the model or the decision-making process; greater granularity means greater detail granularity, visualization, digital dashboard

What uses the Internet to reassemble buyers, sellers, and other partners in a traditional supply chain in new ways?

reintermediation

Which of the following systems allows users to create, read, update, and delete data in a relational database?

relational database management system

What ensures all systems are functioning correctly and providing accurate information?

reliability

as-is process model

represents the current state of the operation that has been mapped, without any specific improvements or changes to existing processes

eBay buyers voluntarily comment to other users and sellers on the quality of service, promptness of shipping, and their general satisfaction with the product. This is one of the most popular examples of user-generated content and is called a...?

reputation system

bottlenecks

resources reach full capacity and cannot handle any additional demands; they limit throughput and impede operations

Spoofing is the forging of the _________ address on an email so that the email message appears to come from someone other than the actual sender.

return

goal-seeking analysis

reverse of what-if analysis; finds the inputs necessary to achieve a goal e.g. desired level of outputs

What is a component of Web 3.0 that describes things in a way that computers can understand?

semantic web

What is a mail bomb?

sending a massive amount of email to a specific person or system resulting in filling up the recipient's disk space

What is a business-driven IT architectural approach that supports organizational computing needs with utility-based computing concepts?

service oriented architecture

What are the key technical concepts of SOA?

services, interoperability, loose coupling

What is the simplest example of an intelligent agent?

shopping bot

to-be process model

show the results of applying change improvement to the current process model

artificial intelligence

simulates human thinking and behavior e.g. the ability to reason and learn

Which of the following represents the classic example of unintentional information reuse?

social Security number

To find out your company's policy regarding such websites as YouTube, Facebook, and Twitter, you would have to refer to the ________ policy.

social media policy

What is the practice of expanding your business and social contacts by constructing a personal network?

social networking

Which of the following is not a topic or feature that is included in Web 3.0?

social networking

Which of the following represents the classic example of unintentional information reuse?

social security number

What is a model of software deployment, where an application is licensed for use as a service, provided to customers on-demand?

software as a service

Adware

software that, while purporting to serve some useful function and often fulfilling that function, also allows Internet advertisers to display advertisements without the consent of the computer user

Which of the below statements is accurate when considering the ebusiness challenge of adhering to taxation rules?

some online companies have to charge sales tax

What is unsolicited email that plagues employees at all levels and clogs email systems?

spam

What is a special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission?

spyware

What is another name for an eshop?

store or etailer

Which data type has a defined length, type, and format and includes numbers, dates, or strings such as customer address?

structured data

Large wikis, such as Wikipedia, can protect the quality and accuracy of their information by assigning users roles such as...?

subject matter expert; reader; editor

All of the following are forms of ebusiness except...?

subscription fee

Which of the following produces an improved product, customers are eager to buy, such as a faster car or larger hard drive?

sustaining technology

What is the ability to present the resources of a single computer as if it is a collection of separate computers, each with its own virtual CPUs, network interfaces, storage, and operating system?

system virtualization

What is the type of knowledge that is contained in people's heads?

tacit knowledge

Which of the following is the primary reason why companies outsource?

tap outside sources of expertise

Which of the following is a type of backup/recovery media?

tape; disk; DVD

What is a well-planned strategy that ensures the search and navigation functions are easy to use and user-friendly on a website?

taxonomy

Cell phone manufactures often refer to their products as mobile devices. Which of the below would not be included in the folksonomy for a cell phone?

technology platform

What is the blending of computers and wireless telecommunications technologies with the goal of efficiently conveying information over vast networks to improve business operations?

telematics

project

temporary activity a company undertakes to create a unique product, service or result

Why is the global economy becoming more integrated?

the Internet; international outsourcing; relaxed borders in the EU

What is recovery?

the ability to get a system up and running in the event of a system crash; the ability to get a system up and running in the event of a system failure; restoring the information backup

What statement below describes Web 3.0's feature that ensures the "integration of legacy devices"?

the ability to use current devices such as iPhones and laptops as credit cards or tickets

What is click-fraud?

the abuse of pay-per-click, pay-per-call, and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser

Compliance

the act of conforming, acquiescing, or yielding

Which of the choices below represents the definition of information compliance?

the act of conforming, acquiescing, or yielding information

The factor that significantly contributed to people's needs to use information systems to make decisions is ______. the amount of information people must understand to make good decisions is increasing exponentially. impossible to answer because it depends on the industry. the amount of information people must understand to make good decisions has remained unchanged. the amount of information people must understand to make good decisions is decreasing exponentially.

the amount of information people must understand to make good decisions is increasing exponentially.

online transaction processing (OLTP)

the capture of transaction and event information using technology to process the information according to defined business rules, store the information and update existing information to reflect the new information

What is information secrecy?

the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity

Which of the choices below represents the definition of information secrecy?

the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity

If you were thinking about a washing machine as a system, which of the following represents the outputs?

the clean clothes

Employees need to understand that email privacy exists to an extent and that corporate email is solely owned by ________.

the company

Employees need to understand that email privacy exists to an extent and that corporate email is solely owned by _________.

the company

Which of the following is not a potential business impact from people in developed countries living longer?

the cost of health care will decrease

What does the disaster recovery cost curve chart?

the cost to the organization of recovering from a disaster over time; the cost to the organization of the unavailability of technology; the cost to the organization of the unavailability of information

What is cybervandalism?

the electronic defacing of an existing website

online analytical processing (OLAP)

the manipulation of information to create business intelligence in support of strategic decision making

Ebusiness was characterized by a few companies or users posting content for the masses. What characterized Business 2.0?

the masses posting content for the masses

automation

the process of computerizing manual tasks, making them more efficient and effective and dramatically lowering operational costs; example: payroll

key performance indicators (KPIs)

the quantifiable metrics a company uses to evaluate progress toward CSFs; more specific than CSFs

Which of the following definitions represents website name stealing?

the theft of a website's name that occurs when someone, posing as a site's administrator, changes the ownership of the domain name assigned to the website to another website owner

cycle time

the time required to process an order, is common KPI for operations management

What is pirated software?

the unauthorized use, duplication, distribution, or sale of copyrighted software

Core business relationships and models are dramatically changing, including shifts from which of the following?

the value in material things to the value of knowledge and intelligence; mass customization to mass production; customer-centricity to product-centricity

What is an act or object that poses a danger to assets?

threat

On average, how many years longer does each generation live than the previous in the US?

three

What are the 3 primary variables (or triple constraints) in any project?

time, cost, scope

Why are Fortune 500 companies engaging in blogging?

to gather feedback and share ideas

What is the purpose of PIPEDA?

to provide Canadian citizens with a right of privacy with respect to how their personal info is collected, used, or disclosed by an organization

A social bookmarking site is dedicated to providing all of the following except...?

to reconnect with colleagues for business progress

What is also provided for the system users and can be online or in a classroom?

training

Managers use ____________ information when making structured decisions at the operational level, such as when analyzing daily sales reports to determine how much inventory to carry. supply-side transactional uncertain structured

transactional

What type of information is produced by the point-of-sale systems (cash registers) Whole Foods' employees use to process customer sales? OLAP transactional information analytical information DSS

transactional information

Which of the following industries has technology changed the way business is performed?

travel; education; training

All of the following are scientific methods organizations use to anticipate, forecast, and asses the future, except...?

trend simulation

What is trend monitoring?

trends viewed as particularly important in a specific community, industry, or sector are carefully monitored, watched and reported to key decision makers

examples of KPIs

turnover rates of employees percentage of help desk calls answered in the first minute # of product returns # of new customers average customer spending

What is a problem that occurs when someone registers purposely misspelled variations of well-known domain names?

typosquatting

Which of the following is one of the 21st century organizational trends on the business side?

uncertainty in terms of future business scenarios and economic outlooks; focus on improved business resiliency via the application of enhanced security; emphasis on strategic analysis for cost reduction and productivity enhancement

All of the following are types of website visitors except...?

usability visitor

What is one of the major problems with email?

user's expectation of privacy

What is web content that is created & updated by many users for many users?

user-contributed content

What is a microwave transmitter?

uses the atmosphere (or outer space) as the transmission medium to send the signal to a microwave receiver

intelligent systems

various commercial applications of artificial intelligence

In terms of big data what includes the uncertainty of data, including biases, noise, and abnormalities?

veracity

What category of website metrics does stickiness, or visit duration time, belong to?

visit metric

Many industries have been forced to change due to technology advances. Which of the below industries has felt the lowest amount of economic impact from ebusiness?

waste or recycling industry

__________ analyzes unstructured data associated with websites to identify consumer behavior and website navigation.

web analytics

What allows users to access the WWW?

web browser

As a trainer for Exempla Healthcare, Tina is faced with many challenges to properly training her new hires. There are over 40 different locations where Exempla employees work across the Chicago metro area. Tina decides to implement some valuable ebusiness tools to help reduce traveling costs, increase speed, and provide flexibility for completing training sessions with all the new hires. Tina primarily uses PowerPoints and videos during her training modules. What is the most effective ebusiness tool for Tina to implement and accomplish all of her training goals?

webinar

What is a locally stored URL or the address of a file or Internet page saved as a shortcut?

website bookmark

What is the theft of a website's name that occurs when someone, posing as a site's administrator, changes the ownership of the domain name assigned to the website to another website owner?

website name stealing

What type of backup strategy would you recommend to an organization that deals with small amounts of noncritical information?

weekly

Which of the following is a potential business impact from teleliving?

will take over routine tasks such as writing a letter, retrieving a file, and making a phone call


Ensembles d'études connexes

PrepU Ch 59: Male Reproductive Disorders

View Set

Human Behavior Exam 3: Practice Questions

View Set

Colorado Statutes, Rules, & Regulations Common to All Lines

View Set

Period 3 (1754 - 1800) - Road to Revolution and the New Republic (APUSH)

View Set

motor learning review questions Chapter 4,5,6

View Set