cob 204 2

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Which of the following is a true statement about the impact of social computing on a business?

A small minority of individuals contribute the majority of feedback and can provide skewed data, both positive and negative..

LinkedIn is a _______________________ social networking site that makes money from advertising and services.

Business-oriented

_____ refers to efforts by unauthorized users to access data traveling over wireless networks.

Eavesdropping

Although rogue access points can be installed innocently, they can also be installed by an attacker trying to simulate a legitimate access point for nefarious purposes. In such cases, these devices are called an _____.

Evil Twin

What would be the best use of RFID in a business?

Inventory tracking

With regard to mobile computing, _____ means that knowing where a user is physically located is a key to offering relevant products and services.

Localization of products and services

The two major characteristics that differentiate mobile computing from other forms of computing are ______ and ________.

Mobility, broad reach

With Web 1.0 sites, users _________________, whereas with Web 2.0 sites, users _________________.

Passively receive information, participate with the site.

In _____, a person or a device intentionally or unintentionally interferes with your wireless network transmissions.

RF jamming

_____ is the wireless transmission and receipt of data gathered from remote sensors. The Find My iPhone is uses this.

Telemetry

Which of the following is an advantage of social commerce over traditional e-commerce?

The ability to predict buying habits based on real-time data

The act of locating wireless local area networks while moving around a city is called ____.

War driving

___________ foster easy collaboration and harness the collective intelligence of Internet users.

Wikis

You sign up for an RSS feed from CNN.com. Which of the following would you expect to happen?

You will be notified of updates in the content areas you selected.

B2B

both sellers and organizations are organizations

By making it easier to store and transfer personal information, e-business presents some threats to privacy. Two examples of personal information that is often stored and transferred are ______ and _____.

buyer's identity and tracking history

Smart Cards

contain a chip that can store considerable amount of data

Online websites such as http://www.pricegrabber.com/, which provide one website address for possibly thousands of vendors are known as a(n) ______________.

electronic mall

C2C

individuals sell products or services to other individuals. Estsy.com is an example

Twitter, Snapchat and Instagram are examples of ________________.

microbolgging

When you purchase a song from a website for $.99, you have made a(n) ____________.

micropayment

E-Commerce

process of buying, selling, transferring or exchanging products, services or information via computer networks, including the internet

You have been monitoring, collecting, and analyzing socially generated data and making strategic decisions based on the results.You have been using ___________.

social intelligence

Facebook is a ______________.

social networking site

Clicks-and-Mortar

some e-commerce is conducted, but primary business is carried out in the physical world

Point of Sale

time of place where a retail transaction is completed

Twitter is made up or comprised of postings called _______.

tweets

Which of the following might be an example of domain tasting?

www.utube.com

The web development technique that enables portions of web pages to reload with fresh data rather than requiring the entire Web page to reload is known as:

AJAX

Cyberbanking is an example of ______________.

B2C

PayPal is an example of making a _____________.

Person-to-Person Payment

The technology that allows manufacturers to attach tags with antennas and computer chips on goods and then track their movement through radio signals is known as __________. This technology was developed to replace bar codes.

Radio-frequency identification

"Domain tasting" is an example of cybersquatting that could be unethical but not necessarily illegal. This is a result of the five-day grace period policy established by ICANN in 2000.

True

You just started to work on a project with three other people. You realize that everyone has their own notes about each element of the project, which makes it hard for you to keep track of what has been done and what still needs to be done. Which of the following applications would you suggest the team use?

Wikis

The development of mobile commerce (or m-commerce) is driven by widespread availability of mobile devices, declining prices, and ___________.

bandwidth improvement.

You walk into a store and your mobile phone receives ads specific to sales currently available at that store. The store might use an application called iBeacon. This service is an example of _________________.

location-based service

According to the textbook, which of the following is NOT an example of internet fraud?

not paying taxes on an interet-based purchase

B2C

sellers are organizations and buys are individuals

Person-to-Person Payments

two individuals or an individual and a business can transfer funds without using a credit card


संबंधित स्टडी सेट्स

Lit - NAQT You Gotta Know These Authors of Speculative Fiction

View Set

Financing: conventional, FHA, and VA loans chapter 14

View Set