IS Exam 2
1. What are the four ethical issues that the ever-expanding use of IT applications have created? a) Property, accuracy, privacy, and accessibility. b) Property, accuracy, theft, accessibility. c) Patents, property, patients, and access codes. d) Accuracy, privacy, accessibility, and ownership .
A
13. The _______________ ethical standard states that respect and compassion for all others is the basis for ethical actions. a) Common good b) Fairness c) Rights d) Utilitarian e) Well-being
A
13. What area of e-commerce is especially conducive to fraud? a) Auctions. b) Online Storefronts. c) E-mail. d) Advertisements.
A
14. Various organizations that promote fair and responsible use of information systems often develop a _____. a) Code of ethics b) Strategic plan c) Mission statement d) Responsibility charter e) Goals outline
A
16. _____ issues involve collecting, storing, and disseminating information about individuals. a) Privacy b) Accuracy c) Transferability d) Property e) Accessibility
A
19. In ________ e-commerce, an organization provides information and services to its workers. a) business-to-employee b) consumer-to-consumer c) consumer-to-business d) business-to-consumer e) government-to-business
A
2. The web development technique that enables portions of web pages to reload with fresh data rather than requiring the entire Web page to reload is known as: a) AJAX b) RSS c) Tagging d) Web 2.0
A
20. Direct payment of Social Security benefits is an example of ______ e-commerce. a) government-to-citizen b) consumer-to-consumer c) consumer-to-business d) business-to-consumer e) business-to-business
A
24. Social computing has allowed customers a) To be advocates and influencers. b) To continue to have to be passive with their interactions with companies c) To be forced to interact more often with customer service. d) To be restricted to only posting positive feedback about products.
A
24. eBay uses a _____ auction. a) forward b) static c) reverse d) physical e) simple
A
27. Privacy advocates prefer which model of informed consent? a) Opt-in b) Opt-out c) Either A or B d) Neither A nor B
A
3. With _______ sales, the sale is almost instantaneous. a) B2C. b) B2B. c) Both B2C and B2B. d) Neither B2C nor B2B.
A
5. The rights approach for ethical standards states: a) An ethical action is the one that best protects and respects the moral rights of the affected parties. b) An ethical action is one that shows respect and compassion for all others. c) An ethical action is the one that provides the most good or does the least harm. d) An ethical action is one that treats all human beings equally, or, if unequally, then fairly based on some defensible standard.
A
6. In the _____ marketplace model, the reverse auction is typically used. a) buy-side b) sell-side c) group purchasing d) desktop purchasing e) electronic exchange
A
Netcasting is: a) The distribution of audio files and video files. b) Accessing real simple syndication feeds. c) Used in educational settings only. d) A way to view a lecture at the same time it is being given in another place.
A
12. The _____________ ethical standard states that ethical actions treat all human beings equally. a) Common good b) Fairness c) Rights d) Utilitarian e) Well-being
B
13. In order to get feedback from customers, some companies make use of social computing tools providing feedback via blogs, wikis, online forums and social network sites. This is known as: a) mashing b) conversational marketing c) social advertising d) peer-to-peer shopping
B
15. With Web 1.0 sites, users _________________, whereas with Web 2.0 sites, users ______________. a) Use HTML, use CCS b) Passively receive information, participate with the site. c) Use wired connections, use wireless connections. d) Have to know the address of the site, can use search engines to find a site e) Did not have to login to find information, have to login in to find information.
B
17. _____ issues involve the authenticity and fidelity of information that is collected and processed. a) Privacy b) Accuracy c) Transferability d) Property e) Accessibility
B
2. Two questions a buyer in a B2B purchase would be asking are a) When can I get it? Will it make me money? b) Will it make me money? Will it save me money? c) Will it save me money? When can I get it? d) How much money will it save me? What will my ROI be?
B
22. Which of the following statements is correct? a) An individual's right to privacy is absolute. b) Determining and enforcing privacy regulations can be difficult. c) An individual's right to privacy supersedes the needs of society. d) Advances in information technologies have not affected individual privacy. e) The Internet has increased individuals' privacy.
B
23. The process of profiling: a) Increases individual privacy. b) Decreases individual privacy. c) Has no effect on individual privacy. d) Is illegal in more than half of the states. e) Is legal but unethical.
B
25. In which of the following business models do businesses request quotes from suppliers and use B2B with a reverse auction mechanism? a) find-the-best-price b) electronic tendering system c) name-your-own-price d) online direct marketing e) affiliate marketing
B
26. The monitoring, collection, and analysis of socially generated data, and the resultant strategic decisions are combined in a process known as_________. a) social commerce b) social intelligence c) social capital d) social networking
B
3. The common good approach for ethical standards states: a) An ethical action is the one that best protects and respects the moral rights of the affected parties. b) An ethical action is one that shows respect and compassion for all others. c) An ethical action is the one that provides the most good or does the least harm. d) An ethical action is one that treats all human beings equally, or, if unequally, then fairly based on some defensible standard.
B
31. Which of the following social shopping methods contributes to environmental sustainability? a) Group shopping b) Peer-to-peer shopping c) Shopping clubs d) Social marketplaces
B
32. Which of the following is a type of collaborative consumption? a) Buying a new book from Amazon b) Craigslist c) Renting a car from Hertz or Avis d) Buying a e-textbook from your bookstore
B
35. Accuracy issues: a) Involve collecting, storing, and disseminating information about individuals. b) Involve the authenticity, fidelity, and accuracy of information that is collected and processed. c) Involve the ownership and value of information. d) Involve who can access information and whether they should have to pay for that access.
B
35. Which of the following is not an example of social shopping? a) Group shopping b) Going to Amazon.com to buy a book c) Shopping communities and clubs d) Social marketplaces e) Peer-to-peer shopping models
B
40. Which of the following is an advantage of social commerce over traditional e-commerce? a) Loyalty b) The ability to predict buying habits based on real-time data c) Processing speed d) Crowdsourcing e) Reduced expenses
B
5. Customers using social commerce benefit from _____________. a) greater privacy b) faster responses from vendors c) unbiased opinions on products d) none of the choices is correct
B
6. The relationship between ethics and legality can best be described in which of the following statements? a) If an act is unethical it is always illegal. b) An act can be unethical but still be legal. c) An ethical act is always legal. d) None of the above
B
7. When comparing market research using social computing as opposed to traditional focus groups, which of the following statements is true? a) Social computing generates faster results but is more expensive. b) Social computing generates faster and cheaper results. c) Social computing takes longer but is less expensive. d) Participation by customers is more limited when using social computing.
B
9. Banner advertising: a) Is sent directly to potential customers via e-mail. b) Forces customers to click on an ad to get more information. c) Is of limited value because it cannot be customized to the target audience. d) Is another name for pop-up advertising.
B
9. The blogosphere is defined as: a) The program that allows you to post and maintain blogs on the Web. b) Millions of blogs on the Web. c) A list of the most popular blogs on the Web. d) The group of people whose opinions are influenced by blogs.
B
9. When comparing data protection laws internationally, which laws are stricter? a) US laws b) EU laws c) US and EU laws are equally as strict.
B
Social networking Web sites: a) Are limited to Facebook and MySpace at this time. b) Provide an easy, interactive tool for communicating and collaborating with other people on the Web. c) Allow users to share text and pictures with their friends, but do not permit video posting. d) Are used almost exclusively by individuals rather than businesses.
B
14. Which of the following is not an effect that E-commerce has had on organizations? a) E-commerce enables smaller businesses to operate in areas dominated by larger companies. b) E-commerce increases the number of potential customers to whom the company can market its products. c) E-commerce is a costly medium for increasing market share. d) E-commerce removes many barriers for start-up businesses. e) E-commerce makes it easy to reach customers around the world.
C
18. In _______ e-commerce, the sellers and buyers are organizations. a) government-to-citizen b) consumer-to-consumer c) business-to-business d) business-to-consumer e) consumer-to-business
C
18. The comments of consumers in the blogosphere concerning a company's products are called ____________________. a) Free advertising b) Consumer-generated media. c) Consumer-generated PR d) Rumors e) Reliable feedback
C
2. The utilitarian approach for ethical standards states: a) An ethical action is the one that best protects and respects the moral rights of the affected parties. b) An ethical action is one that shows respect and compassion for all others. c) An ethical action is the one that provides the most good or does the least harm. d) An ethical action is one that treats all human beings equally, or, if unequally, then fairly based on some defensible standard.
C
20. Which of the following is not an ethical issue related to IT? a) Privacy b) Accuracy c) Accountability d) Property (such as intellectual property) e) Accessibility to information
C
21. LinkedIn is a _______________________ social networking site that makes money from advertising and services. a) Training b) College c) Business-oriented d) Video-upload e) Blogging
C
32. The _________ approach to ethics maintains that an ethical action is the one that provides the most good or does the least harm: a) common good approach b) rights approach c) utilitarian approach d) fairness approach
C
33. _______________ is the tenet of ethics that refers to determining who is responsible for actions that were taken. a) The code of ethics b) Liability c) Accountability d) Responsibility
C
34. Groupon is an example of ________________ a) Shopping communities and clubs b) Social marketplace c) Group shopping d) Peer-to-peer shopping e) Collaborative consumption
C
34. Property issues: a) Involve collecting, storing, and disseminating information about individuals. b) Involve the authenticity, fidelity, and accuracy of information that is collected and processed. c) Involve the ownership and value of information. d) Involve providing information about individuals.
C
5. Pure-play organizations: a) Only sell their products in traditional brick-and-mortar stores. b) Sell their products both online and in traditional brick-and-mortar stores. c) Only sell their products online. d) Only sell their products to other businesses.
C
6. ____________ act as online intermediaries that harness the power of social networks for introducing, buying, and selling products and services. a) Group shopping sites b) Shopping Communities c) Social marketplaces d) Peer-to-peer shopping models
C
7. An electronic portfolio of you and your habits is called a(n): a) Profile. b) Electronic master record. c) Digital dossier. d) Surveillance report.
C
7. Purchasing cards are most often used by: a) Individuals making online purchases. b) Businesses making online purchases. c) Businesses making relatively small, unplanned purchases. d) Businesses buying items that are on their current year's budget.
C
8. Purchasing products and services online often cuts out the middleman, who has traditionally sold the product and/or service. This is process is called: a) Straight-to-consumer services. b) Replacement of brick-and-mortar stores. c) Disintermediation. d) Dysfunctionalization.
C
8. Which type of privacy policy restricts an organization from collecting personal information until the customer specifically authorizes it? a) electronic surveillance b) opt-out model c) opt-in model d) profiling
C
Facebook is a__________. a) blog b) wiki c) social networking site d) mash up
C
16. You sign up for an RSS feed from CNN.com. Which of the following would you expect to happen? a) When you sign up, you will need to download print templates. b) You won't be able to search RSS content. c) You will be able to choose only one topic area. d) You will be notified of updates in the content areas you selected. e) You will get content sent to you via e-mail.
D
17. The degree of digitization relates to all of the following except: a) the product or service sold b) the process by which the product is produced c) the delivery agent or intermediary d) the size of e-commerce transactions
D
19. ______________ determines who is responsible for the actions taken. a) Privacy b) Responsibility c) Transferability d) Accountability e) Liability
D
20. Which of the following is not a social networking site? a) Facebook b) YouTube c) Flickr d) Wikipedia e) LinkedIn
D
21. If you are a worker managing your fringe benefits over your company's intranet, you are engaging in _________ e-commerce. a) business-to-business b) business-to-consumer c) consumer-to-consumer d) business-to-employee e) government-to-citizen
D
24. What is the relationship between advances in information technology and the practice of profiling? a) Advances in IT make it more difficult to profile individuals. b) Advances in IT have no impact on profiling. c) Advances in IT make it more expensive to profile individuals. d) Advances in IT make it easier to profile individuals.
D
25. Which of the following statements is not correct? a) Employees have limited protection against surveillance by employers. b) The large majority of organizations monitor employee Internet usage. c) The large majority of organizations use URL filtering. d) As with normal first-class mail, employers cannot read employee e-mail. e) Employees should be aware that surveillance is legal.
D
27. Using social computing tools to do market research a) Is only done by consumers b) Is only done by businesses c) Is expensive d) Can foster closer customer relationships e) Uses only data provided to the business.
D
28. All of the following are used to provide online market research except a) Recommendations b) Voting c) Emails d) Blogs e) Reviews
D
28. Which of the following statements is correct? a) International privacy and security laws are very consistent. b) Consistent international privacy and security laws help companies with their regulatory requirements from country to country. c) Consistent international privacy and security laws enable information to flow freely among countries. d) The absence of consistent international privacy and security laws has led to a complex global legal framework. e) Consistent international privacy and security laws are followed by all countries.
D
30. Refer to Opening Case -- Pinterest: Which of the following statements is false? a) Users pinning pictures from other sites raises an ethical issue. b) Pinterest's users agree to only post their own original work. c) Pinterest will revoke access if the company discovers downloaded copyrighted material. d) Users can claim they aren't responsible because they didn't read the user agreement before they agreed to accept it.
D
33. Ratings, reviews, and recommendations a) Are always provided by businesses on their Web site. b) Are posted by experts. c) Are posted without compensation. d) Are an aspect of social shopping. e) Are not beneficial to the business
D
4. The fairness approach for ethical standards states: a) An ethical action is the one that best protects and respects the moral rights of the affected parties. b) An ethical action is one that shows respect and compassion for all others. c) An ethical action is the one that provides the most good or does the least harm. d) An ethical action is one that treats all human beings equally, or, if unequally, then fairly based on some defensible standard.
D
4. Which of the following items has the highest degree of digitization? a) A book that is out of stock in a store and is being shipped to your home. b) A book that is advertised on the Internet but that you buy in a store. c) A book you order online to be shipped to your home d) An e-book you order online for a reader such as a Kindle or Nook.
D
Which of the following is not an example of social commerce? a) Wendy offers gift cards to online users for funniest response to various challenges. b) Pepsi Co. sends live notifications to customers when they are close to a store that sells their products. c) Disney allows people to book tickets on Facebook without leaving the site. d) Best Buy has a Web site which can be used to purchase products for pick up in a store. e) Zappo's uses Twitter to send customers coupons when they mention a Zappo's product.
D
16. _____, which is a broader concept than _____, is the buying and selling of goods and services, as well as servicing customers, collaborating with business partners, and performing transactions within an organization. a) Business-to-business electronic commerce, business-to-customer electronic commerce b) Electronic commerce, electronic business c) Business-to-customer electronic commerce, business-to-business electronic commerce d) Business-to-business electronic commerce, intrabusiness electronic commerce e) Electronic business, electronic commerce
E
18. _____ issues involve who may obtain information and how much they should pay for this information. a) Privacy b) Accuracy c) Transferability d) Property e) Accessibility
E
19. A Web site that combines content from other Web sites to form new content is called a(n) ______. a) Social network b) Aggregator c) Blog d) E-commerce site e) Mashup
E
21. ______________ is a legal concept that gives individuals the right to recover the damages done to them by other individuals, organizations, or systems. a) Privacy b) Responsibility c) Transferability d) Accountability e) Liability
E
30. Which of the following tools are not used by marketing professionals to compile market research? a) Blogs b) Wikis c) Online forums d) Social networking sites e) RSS
E
Which of the following is a risk of social computing? a) The content posted will not be found with a search engine. b) Employees will be willing to participate. c) Employees will maintain company privacy. d) Ignoring negative posts is easy to do. e) Consumer-generated content is not edited or filtered
E
31. Which of the following statements is false? (a) An intelligent agent is a software program. (b) Intelligent agents are also called bots. (c) Intelligent agents are always helpful. (d) Intelligent agents use export systems and fuzzy logic. (e) Intelligent agents perform repetitive computer-related tasks.
C
34. Watson can be best be described as a(n): (a) Research engine. (b) Analytical tool. (c) Question-answering system. (d) Information-processing system.
C
34. Which of the following is the most appropriate wireless technology for real-time location of caregivers and mobile equipment in healthcare environments? a. Wi-Fi b. Microwave c. Ultra-wideband d. Infrared e. Bluetooth
C
35. Which type of electronic commerce is the largest by volume? a) business-to-employee b) consumer-to-consumer c) business-to-business d) business-to-consumer e) none of the above
C
38. Which of the following is not an electronic commerce application? a) home banking b) buying stocks c) evaluating an employee d) conducting an auction e) buying real estate
C
39. Which of the following is a true statement about the impact of social computing on a business? a) There is a high cost to using viral marketing b) It is difficult to gain information about customers c) A small minority of individuals contribute the majority of feedback and can provide skewed data d) Social computing does not allow for rapid feedback from customers.
C
The potential benefits a company receives from crowdsourcing include: (select all that apply) a) Problems can be explored at a relatively low cost. b) Results are guaranteed to be high quality. c) The organization can tap a wide range to talented individuals. d) Organizations gain firsthand insight on their customers' desires e) Copyrights are always protected in the process
ACD
13. A wireless sensor network a) uses satellites to enable users to determine their position anywhere on earth. b) consists of interconnected, battery-powered motes that relay data to other motes. c) is a type of transmission that uses red light that is not commonly visible to human eyes. d) is a type of chip technology that enables short-range data and voice connections between wireless devices.
B
14. The major security threats to wireless communications include a) rogue access points, telemetry, and WSNs b) rogue access points, war driving, and eavesdropping c) rogue access points, telemetry and eavesdropping d) rogue access points, WSNs, and RF jamming
B
16. Which of the following is not one of the three layers of a neural network? a) Input layer. b) Processing layer. c) Middle Layer. d) Output layer.
B
17. Which of the following statements concerning blogging is false? a) Anyone can blog. b) A reader can believe all of the details in a blog. c) A company can maintain an internal blog site. d) Blogging can be used in marketing. e) Tweets are replacing blogging.
B
19. Monitoring and surveillance agents: a) Are utilized primarily by law enforcement and intelligence agencies. b) Observe and report an item of interest. c) Are a type of shopping bot. d) Can be employed only by certified users.
B
2. Identifying IT trends and determining which ones are most beneficial and can help an organization to keep from doing what? (a) Jumping off the latest IT bandwagon. (b) Jumping on the latest IT bandwagon. (c) Preferring to be a late adopter. (d) Just watching and mirroring the competition.
B
20. Which of the following is not a characteristic of natural intelligence? a) It is perishable from an organizational point of view. b) It is easy, fast, and inexpensive. c) It is erratic and inconsistent. d) It is highly creative) e) It makes use of a wide context of experiences.
B
24. Which of the following is not an expert system activity? a) Knowledge acquisition b) Knowledge domain c) Knowledge inferencing d) Knowledge representation e) Knowledge transfer
B
29. _____ use credit card numbers, transmitted electronically over the Internet, to pay for goods and services. They are either unencrypted or encrypted, with coded data readable by an intermediary between the buyer's and seller's banks. a) Electronic checks b) Electronic credit cards c) Electronic cash transactions d) Electronic wallets e) Electronic debit cards
B
3. Expert systems use what components in their inference engine? (a) Knowledge and rumors. (b) Facts and rules. (c) Facts and figures. (d) Equations and percentages.
B
3. Wi-Fi sets up a wireless local area network (WLAN). Bluetooth sets up a (a) Wireless personal area network (WPAN). (b) Personal area network (PAN). (c) Impersonal area network (IAN). (d) My area network (MAN).
B
30. The main problem with radio transmission is which of the following? a. Radio waves cannot travel through walls. b. When you travel too far from the source, the signal fades. c. Devices are difficult to install. d. Radio waves are slow. e. Devices are expensive to install.
B
31. ______ are a form of e-cash that enable you to store a fixed amount of prepaid money and then spend it as necessary. a) Electronic checks b) Stored-value money cards c) Purchasing cards d) Smart cards e) Person-to-person payments
B
33. Watson, an expert system developed by IBM, appeared on the TV show Jeopardy. Watson: (a) Narrowly lost to its competitor. (b) Could produce only one answer to each question. (c) Tied with its competitor. (d) Froze up during the show because the questions were coming too rapidly.
B
34. _____ are software mechanisms that provide security measures and convenience for electronic commerce purchasing. a) Electronic checks b) Digital wallets c) Purchasing cards d) Smart cards e) Person-to-person payments
B
35. Neural networks: (a) Can solve only relatively simple problems. (b) Simulate the concepts of the biological brain. (c) Can identify only longstanding patterns. (d) Are still in the planning stages.
B
36. A genetic algorithm: (a) Is a method of problem solving that involves only one step. (b) Generates increasingly better solutions to a problem. (c) Converts inputs directly to outputs. (d) Decreases the number of babies conceived with genetic deficiencies.
B
37. Genetic algorithms: (a) Determine what a good solution is. (b) Process more possibilities than a human can. (c) Require more time than human decision making due to the lengthy decision-making process. (d) Produce the correct solution 75% of the time.
B
38. A small geographical perimeter within which a wireless access point provides service to a number of users is called a ________. a. Transceiver b. Hotspot c. Local reception node d. Wireless network e. GPS location
B
39. Which of the following is not an advantage of e-tailing? a) You can buy from home, 24 hours per day. b) You have only a few products to choose from. c) You can obtain detailed information on products. d) You can compare competitors' products and prices. e) All of the above
B
41. Difficulties in order fulfillment are most closely associated with which type of electronic commerce? a) business-to-business b) business-to-consumer c) government-to-citizen d) business-to-employee e) mobile commerce
B
41. _____ communicate(s) via radio waves using radio antennas placed within adjacent geographic areas. a. Bluetooth b. Cell phones c. A satellite d. Ultra-wideband e. Near-field communications
B
45. In the _____ marketplace model, organizations attempt to sell their products or services to other organizations electronically. a) buy-side b) sell-side c) group purchasing d) desktop purchasing e) electronic exchange
B
48. In _____, direct and indirect materials in one industry are purchased on an as-needed basis. a) horizontal exchanges b) vertical exchanges c) buy-side marketplaces d) functional exchanges e) sell-side marketplaces
B
49. Sense networks track users via all of the following technologies except _______. a. GPS b. Traffic cameras c. Cell towers d. Wi-Fi networks e. None of the above
B
5. What is the name of IBM's computer is learning about medical practices? (a) Wilson. (b) Watson. (c) Wilbur. (d) Wendy.
B
52. _________ is a broad term that refers to the buying and selling of goods and services over the Internet, as well as servicing customers and collaborating with partners. a) Electronic commerce b) E-business c) Digitization d) Social networking
B
53. eBay is an example of which type of e-commerce? a) government-to-citizen b) consumer-to-consumer c) consumer-to-business d) business-to-consumer e) business-to-business
B
54. What would be the best use of RFID in a business? a. Transaction processing b. Supply chain management c. Personnel tracking d. Enabling communications with customers e. Decreasing network costs
B
56. In order to get customers to visit retail stores, some have resorted to: a) hiring clowns. b) providing electronic incentives via smart phones c) eliminating online stores. d) providing refreshments.
B
6. A neural network is one that (a) Simulates a group of people working together. (b) Simulates a biological brain. (c) Simulates a fuzzy network. (d) Simulates an expert system.
B
60. Although rogue access devices can be installed innocently, they can also be installed by an attacker trying to gain unauthorized access to a wireless network. In such cases, these devices are called an _____. a. Unencrypted node b. Evil twin c. Open node d. Illegal server e. Unauthorized rogue access point
B
The act of locating wireless local area networks while moving around a city is called ____. a. Eavesdropping b. War driving c. RF jamming d. Cybersquatting e. Installing rogue access devices
B
1. Artificial Intelligence is exemplified when (a) Machines can think. (b) Machines are smarter than people are. (c) Machines show the ability to learn. (d) All of these answers are correct.
C
1. Which of the following is a lure of e-commerce? a) Limited number of products offered to customers. b) Easy fulfillment. c) Lower transaction costs. d) No returns.
C
1. Which of the following is difficult to measure concerning technology? (a) Net profit. (b) Net loss. (c) Return on investment. (d) Total cost.
C
10. A wiki is: a) An online encyclopedia. b) A collection of blog postings on a subject. c) A Web site on which anyone can post material and make changes to already posted material. d) A site to access podcasts and netcasts.
C
10. Which of the following is the most appropriate wireless technology for real-time location of caregivers and mobile equipment in health-care environments? a) Wi-Fi b) Microwave c) Ultra wideband d) Infrared e) Bluetooth
C
11. A(n) _____ is automatically launched by some trigger and appears in front of the active window. a) keyword banner b) random banner c) pop-up ad d) pop-under ad e) text box
C
11. The ____________ ethical standard states that an ethical action is the one that best protects and respects the moral rights of the affected parties. a) Common good b) Fairness c) Rights d) Utilitarian e) Well-being
C
11. Using your cell phone to purchase a Coke from a vending machine is an example of: a) mobile banking b) wireless wallet c) micropayment d) brokerage service e) money transfer
C
12. Which of the following is not an intelligent agent? a) Surveillance agent. b) Monitoring agent. c) User agent. d) Information agent.
C
13. Which of the following statements concerning artificial intelligence (AI) is not true? a) AI is concerned with studying human thought processes. b) AI attempts to re-create human processes in a machine. c) AI is being studied, but it has not yet been successfully implemented. d) Based on the Turing test, the intelligent systems exemplified in commercial AI products are far from exhibiting any significant intelligence.
C
14. Crowdsourcing is: a) Controlling the crowd at a congested venue. b) Controlling the users attempting to visit a Web site at the same time. c) Offering a problem to a group to solve. d) Hiring a substantial number of employees at one time through a job fair.
C
15. A device that plugs into an iPad to accept credit cards is called a(n): a) Tweet b) Circle c) Square d) Rectangle
C
15. What is _____ is not necessarily _____. a) Illegal, unethical b) Ethical, illegal c) Unethical, illegal d) Unethical, legal e) Ethical, legal
C
15. Which of the following is not one of the major benefits provided by expert systems? a) Increased output and productivity b) Reliability c) Increased downtime d) Decreased decision-making time
C
17. Pervasive computing a) refers to a real-time, wireless connection between a mobile device and other computing environments, such as an intranet. b) refers to e-commerce transactions that are conducted with a mobile device. c) means that virtually every device has processing power with wireless or wired connections to a global network. d) None of these statements are correct.
C
18. A(n) _________ is type of intelligent agent that searches for information and then displays it to the users. a) Monitoring and surveillance agent. b) Personal agent. c) Information agent. d) Genetic agent.
C
18. All of the following wireless media require an unobstructed line of sight except a) Microwave b) Satellite c) Radio d) Infrared
C
20. Wireless broadcast media include a) satellites, radios, and fiber-optic cable b) RFID transmitters, satellites, and fiber-optic cable c) radios, TV remotes, and satellites d) fiber-optic cable, infrared, and GPS
C
21. Of the following, which is the major problem with smart phones? a. They are too slow. b. They are too expensive. c. They can be used to compromise security. d. Their screens are too small. e. Their browsers are not fully functional.
C
21. Which of the following is not a characteristic of artificial intelligence? a) It is permanent. b) It is easy, fast, and inexpensive. c) It is highly creative. d) It tends to be effective only in narrow domains. e) It is consistent and thorough.
C
22. A business that wants to create a forum allowing employees to interact with coworkers would benefit from utilizing__________. a) RSS b) Mashups c) Enterprise Social Networks d) Microblogs
C
22. Expert systems: a) solve problems that are too difficult for human experts b) are based on procedural computer programming languages c) work in specific domains d) can apply to any business problem e) share characteristics with mainframe computing
C
22. Which of the following statements regarding the relationship between electronic commerce and search is not correct? a) Purchases often follow successful online searches. b) Shopping carts are often abandoned after unsuccessful online searches. c) Retailers will provide fewer product details to avoid information overload for customers. d) Customers will be able to find the closest store offering the product that they want. e) Customers will have more relevant product information in the near future.
C
23. In _____ auctions, there is one buyer who wants to buy a product. Suppliers submit bids, and the lowest bid wins. a) forward b) static c) reverse d) physical e) simple
C
23. One of the problems that HR departments have with using social computing to recruit is a) all candidates seek them out b) they only receive qualified applications c) they receive many more applications than they can process. d) social sites each have their own special niche e) they cannot be used for internal tasks.
C
25. Which of the following is true about the impact of social computing on customer service? a) It's harder for customers to be heard by a company. b) Businesses can take their time responding to social media posts. c) Customers themselves can be used to reduce problems. d) Businesses will only get negative comments on social media posts.
C
25. Which type of satellite has the largest footprint? a. Low-earth-orbit b. Medium-earth-orbit c. Geostationary d. Polar orbit e. Equatorial orbit
C
26. How does society keep owners of electronic bulletin boards from disseminating offensive or untrue content? This is a difficult question because it involves the conflict between _____ on the one hand and _____ on the other. a) The public, the individual b) The public, ethics c) Freedom of speech, privacy d) The individual, freedom of speech e) Ethics, security
C
26. The area of the earth reached by a satellite's transmission is referred to as its _____. a. Hotspot b. Coverage c. Footprint d. Zone e. Wireless area
C
27. Which of the following is not a benefit of expert systems? a) increased output and productivity b) capture and dissemination of scarce expertise c) increased decision-making time d) reliability e) works with incomplete, uncertain information
C
29. Data aggregators sell digital dossiers to companies that want to know their customers better, which is a process called ________. a) Customer relationships b) Customer profiling c) Customer intimacy d) Customer knowledge e) Spying
C
29. The monitoring, collection, and analysis of socially generated data is called a) Social networking b) Social commerce c) Social intelligence d) Social advertising e) Social capital
C
3. Blogs and wikis fundamentally differ in terms of a) their size b) their potential to be shared with the public c) their ability of users to post content d) their use of AJAX
C
30. Which of the following is not a characteristic of genetic algorithms? (a) Selection (b) Crossover (c) Transformation (d) Mutation
C
30. _____ are typically used for unplanned B2B purchases for amounts under $2000. a) Electronic checks b) Stored-value money cards c) Purchasing cards d) Smart cards e) Person-to-person payments
C
25. An inference engine is: a) a data mining strategy used by intelligent agents b) the programming environment of an expert system c) a method of organizing expert system knowledge into chunks d) a methodology used to search through the rule base of an expert system e) the user interface of an expert system
D
48. Putting ads on top of taxicabs in New York City that change as the cabs travel around the city is an example of ________. a. Viral marketing b. Permission advertising c. Geographical advertising d. Location-based advertising e. Direct marketing
D
51. The generic term for technologies that use radio waves to automatically identify individual items is __________. a. Telemetry b. Bar codes c. Shipping labels d. Radio-frequency identification e. Wireless access points
D
51. _____ refers to the practice of registering or using domain names for the purpose of profiting from the goodwill or trademark belonging to someone else. a) Domain spoofing b) Domain masquerading c) Domain tasting d) Cybersquatting e) Domain fraud
D
54. The indiscriminate distribution of electronic ads without the permission of the receiver is referred to as: a) Advertising abuse. b) Harassment. c) E-harassment. d) Spamming.
D
7. A(n) _____ is a new class of digital communication device that provides an organizer, cell phone, digital camera, access to e-mail, Internet access, and short message service. a) Blackberry b) pager c) personal digital assistant d) smart phone e) cell phone
D
7. Neural networks learn by adjusting ___________ over time. (a) Dependent variables. (b) Independent variables. (c) Counter weights. (d) Weights.
D
9. Using fuzzy logic, two values will be considered the same even if (a) They are in different data ranges. (b) Only if they are within 10 data points of each other. (c) Only if they are within a factor of 2 of each other. (d) Even if they are at the extreme ends of a particular data range.
D
9. Which of the following characteristics distinguishes mobile computing from other forms of computing? a) Mobile computing offers greater security. b) Connectivity is slower but more reliable than in other forms of computing. c) Mobile computing is limited to relatively short SMS messages. d) Customized information can be sent to individuals as an SMS.
D
_____, with the shortest range of any wireless network, is designed to be used with contactless credit cards. a. Near-field communications b. Bluetooth c. Ultra-wideband d. Wi-Fi e. Infrared
a
Which of the following is true about social commerce? a) Social commerce only benefits customers. b) Social commerce only benefits businesses. c) Businesses can easily learn about customers' experiences. d) Social commerce is only concerned with the selling process. e) New products are never tested via social commerce.
C
_____ networks collect data from many points over an extended space. a. Bluetooth b. Ultra-wideband c. Wireless sensor d. WiMAX e. Wi-Fi
C
1. Organizations are using social computing in which of the following functions? a) Marketing b) Customer Relationship Management c) Human Resource Management d) All of these.
D
10. In _____, needed services such as temporary help or extra space are traded on an as-needed basis. a) horizontal exchanges b) vertical exchanges c) buy-side marketplaces d) functional exchanges e) sell-side marketplaces
D
10. The ____________ ethical standard states that an ethical action is the one that provides the most good or does the least harm. a) Common good b) Fairness c) Rights d) Utilitarian e) Well-being
D
10. Which of the following best describes a genetic algorithm? (a) Creating categories of data ranges. (b) Using data and past situations to think like a human. (c) Processing data and digging deeper into a scenario. (d) Changing variables and running simulations. .
D
11. What are the advantages of using a shopping bot? a) Fast results. b) Many options. c) Reviews available. d) All of these are correct.
D
12. Business-to-business electronic commerce involves electronic relationships with: a) Customers. b) Suppliers. c) Resellers. d) All of these
D
14. Expert systems: a) Are always used to replace decision makers. b) Are always used to support decision makers. c) Are typically used to support an entire company. d) Can be used to support or replace decision makers.
D
15. Companies use Web sites for commerce for all of the following reasons except: a) To reduce operational and transaction costs. b) To enhance their reputation. c) To sell goods and services. d) To reduce the amount of actual cash they need to deal with. e) To induce people to visit a physical location.
D
17. The functional characteristics of genetic algorithms include all of the following except: a) Crossover. b) Mutation. c) Selection. d) Conversion.
D
19. Which of the following wireless broadcast media do global positioning systems (GPSs) use? a) RFID chips and readers to track automobiles b) Microwave signals to determine longitude and latitude of objects c) Radio signals to determine positions and to "talk" to drivers with directions d) Medium earth orbit (MEO) satellites
D
2. Compared to a human driver, an automated driver would (a) Stay alert. (b) Never get distracted by emotion. (c) Be able to look all directions at once. (d) All of these answers are correct.
D
22. The capabilities of smart phones include all of the following except _________. a. A calculator b. E-mail c. A global positioning system d. Corporate transaction processing e. A full-function Internet browser
D
12. Mobile computing has two major characteristics that differentiate it from other forms of computing. What are these two characteristics? a) mobility, broad reach b) mobility, lack of expense c) security, broad reach d) security, mobility e) broad reach, localization
A
16. Mobile computing a) refers to a real-time, wireless connection between a mobile device and other computing environments, such as an intranet. b) refers to e-commerce transactions that are conducted with a mobile device. c) means that virtually every device has processing power with wireless or wired connections to a global network. d) None of these statements are correct.
A
23. Unfortunately, many managers consider smart phones as only _____, rather than as _____ that can transmit wirelessly. a. Phones, digital cameras b. Phones, pagers c. Digital cameras, phones d. Digital cameras, pagers e. Cheap, expensive devices
A
23. Which of the following statements is false? a) Expert systems cannot replace decision makers. b) Expert systems apply expertise in a specific domain. c) Expert systems capture the expertise from a domain expert (a person). d) Expert systems can be embedded in larger systems. e) Expert systems follow a logical path towards a recommendation.
A
27. The greatest problem with GEO satellites is which of the following? a. Propagation delay b. Expense c. Orbital life d. Size of the footprint e. Relative speed with respect to a point on the earth's surface
A
28. Which of the following is not a limitation of expert systems? a) Expert systems cannot work with incomplete or uncertain data. b) A process might contain too many rules to work as an expert system. c) A process might be too vague to work as an expert system. d) Decisions made by expert systems might be a potential liability. e) Expert systems need to learn from their own mistakes.
A
28. _____ are a payment mechanism that are similar to regular bank checks but are transmitted electronically, with a signature in digital form. a) Electronic checks b) Electronic credit cards c) Electronic cash transactions d) Electronic wallets e) Electronic debit cards
A
32. Which of the following statements is false? (a) Information agents search for information and store it for the user. (b) Information agents are used by Google to surf the Web sites in Google's index. (c) Monitoring-and-surveillance agents are also called predictive agents. (d) Personal agents take action on behalf of the user. (e) User agents automatically fill out forms on the Web from stored information.
A
32. _____ is a wireless standard that enables temporary, short-range connection between mobile devices. a. Bluetooth b. Wireless application protocol c. Short message service d. Wi-Fi e. Global positioning system
A
38. Intelligent agents: (a) Assist in performing repetitive computer-related tasks. (b) Do not cross over with any of the other types of intelligent systems. (c) Are still in the design stages. (d) Do not integrate directly with tasks, but rather with users.
A
39. Predictive agents are also called: (a) Monitoring and surveillance agents. (b) Personal agents. (c) Information agents. (d) Genetic agents.
A
40. _____ networks use multiple Wi-Fi access points to create a wide area network. a) Mesh b) Pervasive c) Global d) Fixed e) Ubiquitous
A
43. The two major characteristics that differentiate mobile computing from other forms of computing are ______ and ________. a. Mobility, broad reach b. Mobility, lack of expense c. Security, broad reach d. Security, mobility e. Broad reach, localization
A
46. In the _____ marketplace model, EC technology is used to streamline the purchasing process in order to reduce the cost of items purchased, the administrative cost of procurement, and the purchasing cycle time. a) buy-side b) sell-side c) auctions d) group purchasing e) electronic exchange
A
46. Which of the following is not a mobile application in financial services? a. Transaction processing systems b. Mobile banking c. Wireless electronic payment systems d. Micropayments e. Wireless wallets
A
49. _____ connect buyers and sellers across many industries and are used mainly for indirect materials. a) Horizontal exchanges b) Vertical exchanges c) Buy-side marketplaces d) Functional exchanges e) Sell-side marketplaces
A
5. Which type of satellite requires the highest number of satellites to cover the earth? a) low earth orbit b) medium earth orbit c) geostationary d) polar orbit e) equatorial orbit
A
50. _____ is the science that measures physical remoteness by means of wireless transmission from a remote source to a receiving station. a. Telemetry b. Wireless access point c. Near-field communications d. Microwave e. Wireless positioning
A
53. The major problem with RFID has been _______. a. Expense b. Bandwidth c. Location d. RFID readers
A
55. Inputs to the manufacturing process are known as: a) Direct materials. b) Indirect materials. c) Public exchanges. d) Maintenance supplies.
A
8. Which type of satellite has the shortest orbital life? a) low earth orbit b) medium earth orbit c) geostationary d) polar orbit e) equatorial orbit
A
In _____, a person or a device intentionally or unintentionally interferes with your wireless network transmissions. a. RF jamming b. War driving c. Eavesdropping d. Telemetry e. Installing rogue access devices
A
42. Internet advertising improves on traditional advertising in all of the following ways except: a) Internet ads can be updated at any time at minimal cost. b) Internet ads can reach large numbers of potential buyers all over the world. c) Internet ads are always more effective than other types of advertising. d) Internet ads can make effective use of multimedia. e) Internet ads are current.
C
43. _____ offer(s) consumers incentives to accept advertising and e-mail voluntarily. a) Viral marketing b) Personalized marketing c) Permission marketing d) Paper catalogs e) Direct mail
C
45. The development of mobile commerce is driven by all of the following factors except: a. The widespread availability of mobile devices. b. The cell phone culture. c. Increasing prices. d. Bandwidth improvement. e. It eliminates the need for a PC.
C
50. The practice of using similar but not identical domain names is called _____. a) domain spoofing b) domain masquerading c) domain tasting d) cybersquatting e) domain fraud
C
52. Which of the following is not a limitation of barcodes? a. They require line-of-sight to the scanning device. b. They are printed on paper. c. They identify the manufacturer, product, and item. d. They are difficult to use in a manufacturing plant. e. They are useless in determining expiration date.
C
58. _____ refers to efforts by unauthorized users to access data traveling over wireless networks. a. RF jamming b. War driving c. Eavesdropping d. Telemetry e. Installing rogue access devices
C
6. With which type of satellite is there a propagation delay? a) low earth orbit b) medium earth orbit c) geostationary d) polar orbit e) equatorial orbit
C
8. Fuzzy logic uses data ranges and gives them a(n) (a) Average. (b) Median. (c) Label. (d) Variable.
C
Which of the following is not inhibiting faster Wi-Fi expansion? a. Users cannot roam from hotspot to hotspot if the hotspots use different Wi-Fi network services. b. A lack of security. c. The growth of WiMAX d. Unless the service is free, users have to log on to separate accounts for each hotspot. e. Wi-Fi services may not survive in the face of free hotspot access.
C
26. Which of the following statements concerning expert systems is false? a) The knowledge base contains facts. b) The knowledge base contains rules. c) An expert system can explain its recommendation. d) The blackboard displays the recommendation. e) Expert systems cannot learn from their own mistakes.
D
27. All of the following are limitations of traditional payment methods in electronic commerce except: a) Cash cannot be used because there is no face-to-face contact. b) Paying for goods and services via the mail takes more time. c) Not all organizations accept credit cards. d) It is more secure for the buyer to use the telephone than to complete a secure transaction on a computer. e) None of the above
D
29. Which of the following is not an advantage of radio? a. No metallic wires are needed. b. Radio waves propagate easily through office walls. c. Radio devices are inexpensive. d. Radio waves do not create electrical interference problems. e. Radio devices are easy to install.
D
29. _____ refer(s) to computer reasoning that deals with uncertainties by simulating the process of human reasoning. (a) Expert systems (b) Artificial neural networks (c) Speech understanding systems (d) Fuzzy logic (e) Computer vision systems
D
32. _____ contain a chip that can store information and be used for several purposes. a) Electronic checks b) Stored-value money cards c) Purchasing cards d) Smart cards e) Person-to-person payments
D
33. Which of the following is the most appropriate wireless networking standard for creating personal area networks? a. Wi-Fi b. Cellular radio c. Microwave d. Bluetooth e. WiMAX
D
36. Which type of electronic commerce does Amazon practice? a) business-to-employee b) consumer-to-consumer c) consumer- to-business d) business-to-consumer e) employee-to-business
D
37. _______ e-commerce is also known as e-tailing. a) Business-to-business b) Collaborative commerce c) Intrabusiness d) Business-to-consumer e) Consumer-to-business
D
39. Today, most wireless local area networks use the _____ standard, which can transmit up to 54 Mbps and has a range of about 300 feet. a. 802.11a b. 802.11b c. 802.11c d. 802.11g e. WiMAX
D
4. Which of the following takes place when someone uses the expert system? (a) Knowledge acquisition. (b) Knowledge inferencing. (c) Knowledge representation. (d) Knowledge transfer.
D
4. _____ is the standard that enables wireless devices to access Web-based information and services. a) TCP/IP b) Ethernet c) World Wide Web d) Wireless Application Protocol e) T-Carrier
D
40. Cyberbanking offers all of the following advantages except: a) It is convenient for customers. b) It saves time for customers. b) It includes inexpensive transactions for the bank. c) It can help recruit remote customers. d) It is more expensive for the customer.
D
40. User agents: (a) Can check and sort a user's e-mail. (b) Take action on behalf of a user. (c) Can automatically fill out forms for a user. (d) All of these.
D
44. _____ refers to online word-of-mouth marketing. a) Permission marketing b) One-to-one marketing c) Personalized marketing d) Viral marketing e) Direct mail
D
47. In the _____ B2B application, the orders of many buyers are aggregated so that they comprise a large volume, in order to merit more seller attention. a) buy-side b) sell-side c) auctions d) group purchasing e) electronic exchange
D
1. Ethical issues may be categorized into which of the following types? a) privacy b) accuracy c) property d) accessibility e) all of the above
E
24. Microwave transmission systems are used for _____ volume, _____ distance, _____ communications. a. Low, long, broadcast b. Low, short, line-of-sight c. High, long, broadcast d. High, short, broadcast e. High, long, line-of-sight
E
26. A vendor asks its business partners to place logos or banners on their Web sites. If customers click on a logo, visit the vendor's site, and make a purchase, then the vendor pays a commission to the partner. This scenario illustrates which business model? a) find-the-best-price b) electronic tendering system c) name-your-own-price d) online direct marketing e) affiliate marketing
E
28. _____ is a satellite-based tracking system that enables users to determine a person's position. a. Bluetooth b. Wireless application protocol c. Short message service d. Wi-Fi e. Global positioning system
E
31. The most common wireless technology for TV and DVD remote control devices is _______. a. Bluetooth b. Ultra-wideband c. Near-field communications d. WiMAX e. Infrared
E
33. _____ enable two individuals to transfer funds without using a credit card. a) Electronic checks b) Stored-value money cards c) Purchasing cards d) Smart cards e) Person-to-person payments
E
42. The _____ standard can transmit up to 75 Mbps and has a range of 31 miles. a. Wi-Fi b. 802.11b c. 802.11c d. 802.11g e. WiMAX
E
44. With regard to mobile computing, _____ means that knowing where a user is physically located is a key to offering relevant products and services. a. Ubiquity b. Convenience c. Instant connectivity d. Personalization e. Localization of products and services
E
47. If you buy a hot dog at a concession stand using your contactless credit card, you are using a ________. a. Wireless money transfer b. Wireless wallet c. Wireless bill payment d. Micropayment e. Wireless electronic payment system
E
57. A(n) _____ allows unauthorized entry into a wireless network. a. Lack of encryption b. Disgruntled employee c. Open node d. Illegal server e. Rogue access point
E
Which of the following statements about Wi-Fi is not correct? a. Wi-Fi provides simple Internet access. b. Laptop PC scans contain chips that can send and receive Wi-Fi signals. c. Many companies offer free Wi-Fi access in their stores. d. Wi-Fi requires encryption for secure transmissions. e. Wi-Fi is expensive to set up.
E