MIS Final Practice Questions

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which of the following involves collecting and maintaining data in such a way that the information can be used as evidence in a court of​ law? A. Data warehousing B. Computer forensics C. Computer analysis D. Business intelligence E. Business analytics

B. Computer forensics Correct. Computer forensics is the scientific​ collection, examination,​ authentication, preservation, and analysis of data from storage that can be used as evidence in a court of law.

Which technology trend that triggers ethical concerns is raised when a consumer receives coupons based on buying​ patterns? A. Networking advances B. Data analysis advances C. Data storage costs rapidly decline D. Computing power doubles every 18 months E. Mobile device growth impact

B. Data analysis advances

Which of the following is a critical security function of senior management in an​ organization? A. Managing security programs on a​ real-time basis B. Establishing the security policy and managing risk C. Developing IS security software D. Safeguarding computer hardware and software E. Monitoring potential malicious activity continuously

B. Establishing the security policy and managing risk

Which of the following prevents unauthorized users from accessing private networks by using hardware and software to control the flow of network​ traffic? A. Unified threat management systems B. Firewalls C. ​Anti-malware programs D. Secure sockets layer​ (SSL) E. Secure Hypertext Transfer Protocol​ (S-HTTP)

B. Firewalls

If your doctor shares your medical records without your​ permission, this is considered a​ ________________ violation. A. ​Sarbanes-Oxley B. HIPAA C. ​S-HTTP D. FERPA E. ​Gramm-Leach-Bliley

B. HIPAA Correct. HIPAA outlines medical security and privacy rules and procedures for simplifying the administration of health care billing and automating the transfer of health care data between health care​ providers, payers, and plans.

The​ _____________ virus was written in Visual Basic script and transmitted as an attachment to an email. A. ZeuS B. ILOVEYOU C. Sasser.ftp D. Conficker E. ComputerLocker

B. ILOVEYOU

Two people are trading​ coins, and one has far more knowledge about the hobby than the other. What does this situation​ illustrate? A. Dynamic knowledge management B. Information asymmetry C. Marketplace asymmetry D. ​Cost-to-price symmetry E. Information distribution

B. Information asymmetry

Security challenges for Internet of Things​ (IoT) include all the following EXCEPT​ ________. A. IoT devices have a much longer service life compared to traditional equipment B. IoT devices are deployed in a narrow​ scale, creating only a few interconnections that can be exploited C. IoT installations often consist of collections of identical devices D. many IoT devices are difficult to upgrade E. users may not be aware that the IoT devices actually exist

B. IoT devices are deployed in a narrow​ scale, creating only a few interconnections that can be exploited Correct. IoT devices are deployed in a much wider scale than are traditional Internet connected​ devices, creating a vast number of interconnections that can be exploited

Among the five identified moral dimensions of the information​ age, which addresses the question​ "which cultural values are supported by information​ technology?" A. Accountability and control B. Quality of life C. Information rights and obligations D. Property rights and obligations E. System quality

B. Quality of life Correct. Quality of life incorporates values that need to be preserved in a​ knowledge-based society as well as questions related to which cultural values and practices does the new information technology support.

Which type of revenue model involves sending customers to a website for a referral​ fee? A. Micropayment B. Network C. Affiliate D. Advertising E. Partners

C. Affiliate

Which of the following involves businesses retailing products and services directly via the Internet to individual​ consumers? A. ​M-commerce B. Disintermediation C. B2C​ e-commerce D. B2B​ e-commerce E. C2C​ e-commerce

C. B2C​ e-commerce

eBay utilizes the​ ___________ form of electronic commerce. A. display ad B. ​m-commerce C. C2C D. ​click-and-mortar E. B2C

C. C2C

________ are​ methods, policies, and organizational procedures that ensure the safety of the​ organization's assets. A. Targets B. Safeguards C. Controls D. Security measures E. Vulnerabilities

C. Controls

​________ services can tell you the price of a house you are looking at or about special exhibits at a museum you are passing. A. Spatial mapping B. Geosocial C. Geoinformation D. Location specific advertising E. Geopositioning

C. Geoinformation

Which social commerce feature creates an environment that allows friends and advertisers to send notifications to social​ users' home​ pages? A. Network notification B. Timelines C. Newsfeed D. Collaborative shopping E. ​E-tailing

C. Newsfeed

Which wireless security concern involves eavesdroppers who park outside buildings in order to intercept wireless network​ traffic? A. Trojan horse B. Battle driving C. War driving D. Phishing E. Drive listening

C. War driving

You enjoy coin collecting and you notice more and more banner ads related to this hobby appearing on websites you visit. Companies are using​ _______________ to improve ad placement and effectiveness. A. crowdsourcing B. worms C. behavioral targeting D. cognitive tracking E. keyloggers

C. behavioral targeting

Gaining access to a safety deposit box using iris scanning is an example of​ _____________ authentication. A. token B. password C. biometric D. smart card E. ​two-factor

C. biometric

Principles of right and wrong that you use to make choices are called​ _____________. A. politics B. laws C. ethics D. beliefs E. options

C. ethics

If you receive an email asking for your social security number in return for a million​ dollars, this is an example of​ ____________. A. war driving B. pharming C. phishing D. IP spoofing E. evil twins

C. phishing

When a consumer is being engaged with an immersive multimedia​ experience, the consumer is enjoying the​ _________ feature of​ e-commerce. A. social technology B. ubiquity C. richness D. universal standards E. global reach

C. richness

Establishing some understanding of the threats an organization faces is an example of​ a(n) __________. A. threat prediction B. information systems control C. risk assessment D. security policy E. security goal

C. risk assessment

Tricking employees to reveal their passwords by pretending to be a legitimate member of a company is referred to as​ ________. A. phishing B. pharming C. social engineering D. IP spoofing E. sniffing

C. social engineering

When securing data in the​ cloud, most providers use encryption to secure​ data, with ultimate responsibility for protecting sensitive data residing​ ____________. A. with the DDoS specialists B. equally between the company that owns the data and the cloud provider C. with the company that owns the data D. with the Interactive Session on Organizations E. with the cloud provider

C. with the company that owns the data Correct. When processing takes place in the​ cloud, accountability and responsibility for protection of sensitive data still reside with the company that owns that data.

​________ was created because of financial scandals such as Enron and WorldCom. A. ​Gramm-Leach-Bliley Act B. ​Sarbanes-Oxley C. FIP D. HIPAA E. FERPA

B. ​Sarbanes-Oxley Correct.​ Sarbanes-Oxley was designed to protect investors after the financial scandals at​ Enron, WorldCom, and other public companies. It imposes responsibility on companies and their management to safeguard the accuracy and integrity of financial information that is used internally and released externally.

Which law provides rules related to the creation of financial statements to help avoid​ fraud? A. ​Gramm-Leach-Bliley Act B. ​Sarbanes-Oxley Act C. HIPAA D. Public Company Accounting Reform and Investor Protection Act E. Federal Information Protection Act

B. ​Sarbanes-Oxley Act

​E-commerce began in​ ________ when Netscape earned their first online advertisement from a major corporation. A. 2000 B. 2001 C. 1987 D. 1995 E. 1990

D. 1995

Which of the following businesses uses the portal Internet business​ model? A. Expedia B. Priceline.com C. Google Docs D. Google E. ETrade.com

D. Google

Which of the following is a powerful analysis technology that crunches data from multiple sources to find hidden connections and is typically used by the​ government? A. ​SEC_DBA B. FIP C. ERP D. NORA E. ​TCP-IP

D. NORA Correct.​ Non-obvious relationship awareness​ (NORA) will pull data from​ employment, telephone​ records, and Internet interactions to develop connections about individuals.

Some web marketplaces focus on indirect goods. Which of the following would be the best example of an indirect​ good? A. Foam used for car seats at an auto manufacturing plant B. Wood used to build custom cabinets C. Silicon used to create computer chips D. Paper used to print paychecks E. Tires needed for airplane production

D. Paper used to print paychecks

​________________ is an increasing problem where hackers lock parts of your computer and then demand money to unlock the system. A. Distributed Denial of Service​ (DDoS) B. Spam C. Phishing D. Ransomware E. Identity theft

D. Ransomware

​________ reflects the idea in​ e-commerce that large numbers of people can make better decisions about a wide range of topics or products than a single person or even a small committee of experts. A. Partnerships B. ​E-cooperation C. Social shopping D. Social graphing E. Crowdsourcing

D. Social graphing

What type of filtering provides additional security by determining whether packets are part of an ongoing dialogue between a sender and a​ receiver? A. Intrusion detection systems B. Packet filtering C. Application proxy filtering D. Stateful inspection E. Network Address Translation​ (NAT)

D. Stateful inspection

Recurring payments to access a​ company's offerings is found with which revenue​ model? A. Sales B. Community provider C. Advertising D. Subscription E. Affiliate

D. Subscription

A​ ____________ is a program that seems nonthreatening but then does something completely unexpected. A. spoof B. virus C. worm D. Trojan horse E. phishing email

D. Trojan horse

Purchasing aftermarket tickets from Stubhub is an example of a​ ____________ electronic commerce model. A. ​business-to-consumer B. ​business-to-business C. ​consumer-to-consumer D. ​family-to-family E. ​consumer-to-business

A. ​business-to-consumer

Taking over computers and directing those systems to overload a network is defined as a​ _________ attack. A. ​denial-of-service B. cybervandalism C. Trojan horse D. worm E. keylogging

A. ​denial-of-service

Public key encryption uses​ ___________. A. one key B. two public keys C. three private keys D. one public and one private key E. one public and two private keys

D. one public and one private key Correct. The keys are mathematically related so that data encrypted with one key can be decrypted using only the other key. To send and receive​ messages, communicators first create separate pairs of private and public keys. The public key is kept in a​ directory, and the private key must be kept secret.

A(n) __________ policy identifies and ranks information risks and goals. A. acceptable use B. identity management C. business continuity plan D. security E. risk assessment

D. security Correct. A security policy consists of statements ranking information​ risks, identifying acceptable security​ goals, and identifying the mechanisms for achieving these goals.

Which act requires financial institutions to ensure the security and confidentiality of customer data and mandates that data must be stored on a secure medium and protected during storage and​ transmittal? A. ​Sarbanes-Oxley Act B. HIPAA C. Public Company Accounting Reform and Investor Protection Act D. ​Gramm-Leach-Bliley Act E. Federal Information Protection Act

D. ​Gramm-Leach-Bliley Act

If your financial institution shares your financial records without your​ permission, this is considered a​ ________________ violation. A. FERPA B. HIPAA C. ​Sarbanes-Oxley D. ​Gramm-Leach-Bliley Act E. Fair Information Practice

D. ​Gramm-Leach-Bliley Act Correct. This act requires financial institutions to ensure the security and confidentiality of customer data. Data must be stored on a secure​ medium, and special security measures must be enforced to protect such data on storage media and during transmittal.

In​ 2022, ________ million Americans will shop online. A. 189 B. 92 C. 141 D. 219 E. 240

E. 240

Among the five identified moral dimensions of the information​ age, which addresses the question of liability related to information​ systems? A. System quality B. Information rights and obligations C. Quality of life D. Property rights and obligations E. Accountability and control

E. Accountability and control Correct. Accountability and control addresses who can and will be held accountable and liable for the harm done to individual and collective information and property rights.

What is the main​ mass-market retailing driver of mobile​ e-commerce? A. Microsoft B. eBay C. Dell D. Yahoo E. Amazon

E. Amazon

​__________ are​ industry-owned intermediaries between buyers and sellers. A. Service providers B. Market creators C. Community providers D. ​E-tailers E. B2B​ e-commerce marketplaces

E. B2B​ e-commerce marketplaces

Which term refers to the social commerce feature that creates an environment to​ discuss, view, and text about​ products? A. ​E-tailing B. Timelines C. CRM D. Network notification E. Collaborative shopping

E. Collaborative shopping

A(n) __________ is a unique type of malware that replicates itself from one computer to another and does NOT rely on human behavior. A. worm B. Trojan horse C. bug D. virus E. SQL attack

A. worm

__________ is the ability to determine that a person is who he or she claims to be through a variety of means. A. Authentication B. Identity management C. User auditing D. Network monitoring E. User identification tagging

A. Authentication

Which of the following is used by a computer that reads and interprets fingerprints to grant​ access? A. Biometric authentication B. A token C. A smart card D. Credit authentication E. Password protection

A. Biometric authentication Correct. Biometric authentication uses systems that read and interpret individual human traits such as​ fingerprints, irises, and voices to grant or deny access.

What technology trend raises ethical issues related to the limitless data that can be collected about​ you? A. Data storage costs rapidly declining B. Mobile device growth C. Computer power doubling every 18 months D. Dynamic web pages E. Networking advances

A. Data storage costs rapidly declining

Which of the following is a 1973 report that served as the basis for most U.S. privacy​ laws? A. Fair Information Practices (FIP) B. Structured Query Language​ (SQL) C. Central processing unit​ (CPU) D. Federal Trade Commission​ (FTC) E. Generally Accepted Accounting Principles​ (GAAP)

A. Fair Information Practices (FIP) Correct. Most American and European privacy law is based on a regime called Fair Information Practices​ (FIP) first set forth in a report written in 1973 by a federal government advisory committee.

Which of the following involves using your mobile phone and global positioning systems to identify where your friends are meeting for​ dinner? A. Geosocial services B. Net marketplaces C. Geoadvertising D. ​E-tailing E. Geoinformation services

A. Geosocial services

_______________ requires that your medical patient records be protected and saved for six years. A. HIPAA B. The​ Gramm-Leach-Bliley Act C. FERPA D. The​ Sarbanes-Oxley act E. DARPA

A. HIPAA

Electronic evidence on computer storage media that is not visible to the average user is called​ ________. A. ambient data B. backup data C. recovery data D. forensic data E. defragmented data

A. ambient data

Because so many web pages use​ databases, ____________ is a major malware threat since poorly coded web application software is vulnerable. A. an SQL injection attack B. spyware C. spoofing D. war driving E. a Trojan horse

A. an SQL injection attack Correct. Web developers may get careless in writing code and not use simple controls to eliminate this vulnerability.

If you return to a website that welcomes you back by​ name, you likely have a small text file on your computer with information about your prior visits called a​ ___________. A. cookie B. safe harbor C. network D. malware E. customization

A. cookie

A(n) ______________ specifically addresses plans for power​ outages, floods,​ fire, and other calamities. A. disaster recovery plan B. identity management C. risk assessment D. attack plan E. acceptable use policy

A. disaster recovery plan Correct. Disaster recovery planning devises plans for the restoration of disrupted computing and communications services. Disaster recovery plans focus primarily on the technical issues involved in keeping systems up and​ running, such as which files to back up and the maintenance of backup computer systems or disaster recovery services.

Companies such as Amazon and Walmart set prices based on​ ________, where the prices often change based on product demand and other variables. A. dynamic pricing B. menu costs C. search to switch pricing D. transaction costs E. network effects

A. dynamic pricing

In the transaction fee revenue model a company receives a fee for enabling or executing a transaction. Which of the following companies relies extensively on this business​ model? A. eBay B. Netflix C. Gap.com D. Amazon E. Hulu.com

A. eBay

The use and regulation of trade​ secrets, copyrights, and patents is the U.S.​ government's attempt to protect​ ________. A. intellectual property B. consumer rights C. government secrets D. consumer data E. capitalism

A. intellectual property Correct. The Internet makes it very easy to copy and distribute intellectual property​ and, therefore, challenging to protect.

Paying an online journal a monthly fee for access to its content is called the​ ________ revenue model. A. subscription B. transaction fee C. freemium D. premium E. sales

A. subscription

Shopkick helps retailers with​ m-commerce by​ ________. A. using​ location-based services to deliver coupons to mobile users when they are near a store B. using​ location-based services to determine who comes into stores C. posting customer information on social sites to let friends know they are shopping at a store D. gathering exit survey information from customers using mobile phone surveys E. using geosocial services to build a community of customers for companies

A. using​ location-based services to deliver coupons to mobile users when they are near a store

In the United State​ alone, _______ million people are expected to shop online in 2022. A. 2.40 B. 240 C. ​2,400 D. 0.24 E. 24.0

B. 240

Which of the following businesses uses the content provider Internet business​ model? A. eBay B. Apple Music C. Dropbox D. Twitter E. Amazon

B. Apple Music

Which statement about digital certificates is​ FALSE? A. The recipient decodes the encrypted message by using the certificate​ authority's public key. B. The certificate authority​ (CA) verifies a digital certificate​ user's identity online. C. Digital certificates help a user and a merchant to validate that their digital certificates were issued by an authorized and trusted third party before they exchange data. D. Digital certificates contain the​ owner's identification and a copy of the​ owner's public key. E. Digital certificates authenticate that the public key belongs to the designated owner.

B. The certificate authority​ (CA) verifies a digital certificate​ user's identity online.

Which of the following is NOT addressed by a business continuity​ plan? A. How the company can restore business operations after a disaster strikes B. The technical issues involved in keeping systems up and running C. Action plans for handling​ mission-critical functions if systems go down D. When and how the plan is to be updated and refined E. The identification of critical business processes

B. The technical issues involved in keeping systems up and running

Which unique feature of​ e-commerce is related to the ability to interact with web technology​ everywhere? A. Global reach B. Ubiquity C. Richness D. Universal standards E. Interactivity

B. Ubiquity

Andrew analyzes an ethical issue at​ work, evaluates the outcomes of various​ options, and chooses the one that achieves the greatest value. Which ethical principle is Andrew​ applying? A. ​Descartes' rule of change B. Utilitarian principle C. Risk aversion principle D. Golden Rule principle E. ​Kant's categorical imperative

B. Utilitarian principle Correct. Andrew is taking a​ "greater good" perspective.

A formal name to describe​ self-regulating policies is called​ _____________. A. due process B. a safe harbor C. accountability D. liability E. privacy

B. a safe harbor Correct. A safe harbor is a​ private, self-regulating policy and enforcement mechanism that meets the objectives of government regulators and legislation but does not involve government regulation or enforcement.

​A(n) ________ policy would indicate if you are allowed to use your work computer to access social media websites. A. identity management B. acceptable use C. disaster recovery plan D. risk assessment E. security

B. acceptable use Correct. An acceptable use policy defines acceptable uses of the​ firm's information resources and computing​ equipment, including desktop and laptop​ computers, wireless​ devices, telephones, and the Internet. A good AUP defines unacceptable and acceptable actions for every user and specifies consequences for noncompliance.

When advertisers analyze user clickstream data to intentionally place ads on​ websites, the advertisers are employing​ ___________ techniques. A. affiliation B. behavioral targeting C. search engine D. lead generation E. curve tail marketing

B. behavioral targeting

Apple Music is considered a successful​ _________________. A. ​e-tailer B. content provider C. community provider D. market creator E. service provider

B. content provider

In many​ cases, the Internet has enabled customers to see what merchants have paid for products. This is called​ _____________. A. supply curving B. cost transparency C. product lensing D. price transparency E. demand curving

B. cost transparency

Kickstarter.com is a popular​ _______________ site where​ start-up companies' ideas are presented to perspective investors. A. social media B. crowdsourcing C. clickstream D. social shopping E. loud crowd

B. crowdsourcing

​E-commerce technologies enable consumers to look online to find a variety of different prices for the same product. This ability is called​ ____________. A. global scale B. price transparency C. information drilldown D. price discrimination E. price check

B. price transparency

Large firms may create a secure website known as a​ ____________ to link to suppliers and key business partners. A. data interchange model B. private B2B network C. transaction broker D. content provider E. disintermediation site

B. private B2B network

Professional organizations like the American Medical Association have​ ___________, which include specific conduct guidelines such​ as, do no harm. A. golden rules B. professional codes of conduct C. liability codes D. ​no-free-lunch rules E. utilitarian principles

B. professional codes of conduct Correct. When groups of people claim to be​ professionals, they take on special rights and obligations because of their special claims to​ knowledge, wisdom, and respect. Professional codes of conduct are promulgated by associations of professionals such as the American Medical Association​ (AMA), the American Bar Association​ (ABA), the Association of Information Technology Professionals​ (AITP), and the Association for Computing Machinery​ (ACM).

An individual imitating a trusted employee by using a​ similar, but​ fake, email address in an effort to obtain protected​ information, is using​ a(n) ___________ technique. A. pharming B. spear phishing C. sniffing D. click fraud E. evil twins

B. spear phishing Correct. In a more targeted form of phishing called spear​ phishing, messages appear to come from a trusted​ source, such as an individual within the​ recipient's own company or a friend.

One of the unique features of​ e-commerce is information​ density, which refers to​ ________. A. the fact that the web is available​ everywhere, increasing the amount of information available B. the total amount and quality of information available to all market​ participants, consumers, and merchants alike C. the way technology has standardized Internet information communication methods D. the social networks that have created a community where everyone is brought closer together even though they may live all over the world E. how technology has increased the amount of information that can travel across the Internet

B. the total amount and quality of information available to all market​ participants, consumers, and merchants alike Correct.​ E-commerce technologies reduce information​ collection, storage,​ processing, and communication costs while greatly increasing the​ currency, accuracy, and timeliness of information.

Which of the following statements comparing digital markets to traditional markets is​ FALSE? A. In traditional​ markets, information asymmetry is​ high; in digital​ markets, information asymmetry is reduced. B. In traditional​ markets, sellers can dynamically change prices quickly and​ inexpensively; in digital​ markets, dynamically pricing goods is delayed and expensive. C. In traditional​ markets, search costs are​ high; in digital​ markets, search costs are low. D. In traditional​ markets, network effects are somewhat​ weak; in digital​ markets, network effects can be strong. E. In traditional​ markets, disintermediation is​ unlikely; in digital​ markets, disintermediation is more possible and likely to occur.

Correct. This statement is false. Dynamic pricing of goods is fast and cheap in digital markets but is delayed and costly in traditional markets.

Which of the following statements about Electronic Data Interchange​ (EDI) is​ FALSE? A. EDI is a​ computer-to-computer exchange of standard transactions such as invoices between two organizations. B. Standards define the structure and information fields of electronic documents. C. About​ 80% of online B2B commerce is based on EDI. D. EDI supports the automatic transmission of transactions from one information system to another through a network. E. EDI is a large firm that uses a secure website to link to its suppliers and other key business partners.

E. EDI is a large firm that uses a secure website to link to its suppliers and other key business partners.

_____________ is a general security term that includes computer​ viruses, worms, and Trojan horses. A. ​Drive-by-download B. Conficker C. Sasser.ftp D. Cryptolocker E. Malware

E. Malware

Which of the following is the fastest growing type of​ business-to-consumer e-commerce? A. Geoadvertising service B. ​E-tailing C. Geosocial service D. Net marketplaces E. Mobile

E. Mobile

Tracking your movements without consent may be unethical and is most related to which technology​ trend? A. Networking advances B. Decline of data storage costs C. Data analysis advances D. Computing power doubling every 18 months E. Mobile device growth

E. Mobile device growth

Which of the following is NOT one of the phases in the timeline for the development of an​ e-commerce presence? A. Planning B. Social media implementation C. Website development D. Web implementation E. Mobile implementation

E. Mobile implementation

Which statement about public key encryption is​ FALSE? A. The public key is shared using a directory. B. The private key is kept secret. C. It uses two keys that are mathematically related. D. The sender encrypts the message with the​ recipient's public key. E. On receiving the​ message, the recipient uses the public key to decrypt it.

E. On receiving the​ message, the recipient uses the public key to decrypt it.

Which social commerce feature uses a stream of events to create a history for friends to​ view? A. Newsfeed B. Network notification C. Social search D. Collaborative experiences E. Timeline

E. Timeline

In addition to developing a policy for restoring computer and communication​ services, some companies go a step further with​ ________, which focuses on how to get the business operations up and running again after a disaster. A. a hot site B. disaster recovery planning C. an information system audit D. a mirror server E. business continuity planning

E. business continuity planning Correct. Business continuity planning entails more than just getting the hardware and software up and running.

​E-commerce technologies enable consumers to discover the actual costs merchants pay for products. This ability is called​ ____________. A. cost discrimination B. information drilldown C. global pricing D. cost customization E. cost transparency

E. cost transparency

Companies can increase brand loyalty using a​ _____marketing strategy where a company asks customers to​ generate, then review and​ rate, suggestions about a company​ issue, such as what their next product should be. A. clickstreaming B. referral C. viral D. long tail E. crowdsourcing

E. crowdsourcing

Someone hacking into your Facebook account to add terrible photos and messages is taking part in​ ____________. A. spoofing B. sniffing C. hacking D. keylogging E. cybervandalism

E. cybervandalism

For an automobile​ manufacturer, steel is considered​ a(n) _______________ because it is directly involved in the production process. A. optional input B. indirect waste C. indirect good D. primary good E. direct good

E. direct good

If a​ co-worker accuses you of sending inappropriate​ emails, you should be afforded​ __________________. A. liability B. accountability C. responsibility D. a third chance E. due process

E. due process Correct. Due process is a related feature of​ law-governed societies and is a process in which laws are known and​ understood, and the ability exists to appeal to higher authorities to ensure that the laws are applied correctly.

majority of businesses working with other businesses​ (e-commerce) use​ __________________ to enable company systems to share​ invoices, shipment​ schedules, and purchase orders. A. traditional​ phone-based voice orders B. traditional​ paper-based orders C. HTML D. spreadsheets E. electronic data interchange

E. electronic data interchange

A phishing technique known as​ ________ are wireless networks that pretend to offer trusty​ Wi-fi but actually are fraudulent and may enable passwords or credit card numbers to be stolen. A. click fraud B. keylogging C. denial of service​ (DoS) D. spyware E. evil twins

E. evil twins

A(n) ___________ is a type of spyware that records keystrokes to steal sensitive information such as social security numbers. A. cryptolocker B. textlogger C. cryptologger D. SS logger E. keylogger

E. keylogger

Use of the Internet to inexpensively find potential customers for products with very low demand is termed​ ________. A. prediction marketing B. social network marketing C. behavioral targeting D. website personalization E. long tail marketing

E. long tail marketing

If you accept a position as an information systems​ manager, you have​ a(n) ____________ to accept the​ costs, benefits, and obligations for the decisions you make. A. accountability B. liability C. due process D. preference E. responsibility

E. responsibility Correct. Responsibility is a key element of ethical action. Responsibility means that you accept the potential​ costs, duties, and obligations for the decisions you make.

eBay is a major organization that allows individuals to sell products to other individuals. This business model is called​ __________. A. ​consumer-to-business B. ​family-to-family C. ​business-to-consumer D. ​business-to-business E. ​consumer-to-consumer

E. ​consumer-to-consumer

Security in an information systems context refers to​ ____________, which are used to prevent unauthorized access or theft. A. policies only B. policies and procedures only C. ​processing, access, and confidentially D. ​hardware, software, and technical measures E. ​policies, procedures, and technical measures

E. ​policies, procedures, and technical measures


Ensembles d'études connexes

Five of the fastest cars in the world

View Set

BIOCHEM Lab Final- Lab 9, prelab 6 , prelab 7, Prelab 8, prelab10

View Set

AMSCO- AP WORLD HISTORY- PERIOD 0

View Set