Comp Final
Cheng is starting a new website that will provide payroll and legal services to small companies. What type of e-commerce website is Cheng building?
Business-to-business (B2B)
Jorge is starting a new website that provides home loans to first-time homebuyers. What type of e-commerce website is Jorge building?
Business-to-consumer (B2C)
In the U.S., the _____ law allows unsolicited marketing email but requires such email to have an unsubscribe mechanism.
CAN-SPAM
Which of the following is the use of computer networks to promote a social or political cause?
Hacktivism
_____ is a common protocol for retrieving email messages via the Internet.
IMAP
_____ is the business practice where work is performed within an company rather than performed by an external source.
In-house
Which effective email tip was NOT followed by the Kaylee? "Jayne sends Kaylee an email asking Kaylee to look over the next inventory shipment and verify that an adequate supply of parts is on hand. Kaylee replies indicating that a spare compression coil needs be ordered, and ends the email by asking Jayne if he knows to what time the staff meeting was moved."
Keep threads separate
_____ is a social networking site intended primarily for professionals to post online resumes and develop professional connections.
Which of the following is a protocol for encrypting data sent over WiFi networks?
WPA2
Which example is likely fair use?
Writing a book based on a factual newspaper article.
____ relies on crowdsourcing to provide reviews of restaurants, hotels, and more.
Yelp
Encrypted email messages can be viewed by _____ .
a user with the appropriate decryption keys
Most video sharing sites earn revenues through _____.
advertisements
An encrypted message can be viewed by _____ .
an authorized user
Live streaming means to record and share a video of an event _____.
as the event happens
A _____ is a website organized into entries (called posts) that can be written by a single person, a small group of people, or a company.
blog
Many companies outsource work to areas where labor is _____.
cheaper
If a work has a _____ license, then any derivative work must use the same license.
copyleft
A _____ breaks into computer systems for malicious purposes, such as to steal or destroy data.
cracker
Search engines are getting better at doing "_____" searching of more types of data, such as images and videos.
deeper
Ransomware is is a type of software typically used to commit _____.
extortion
The amount of information on the internet is _____ .
growing
#puppies is an example of a(n) _____.
hashtag
Which of the following websites is likely used to carry out secure transmissions?
https://www.amazon.com
Some browsers allow you to open windows in _____ mode, which means the browser will not save your browsing history.
incognito
The objectives of a(n) _____ degree typically include how to design processes to develop, manage, and disseminate information to help meet organizational goals.
information systems
One of the reasons that the digital divide is larger for those in developing nations is because of the _____ .
lack of training in how to use technology
On demand audio streaming allows users to _____.
listen to specific songs or albums specifically selected by the user
Most mobile devices can track your location unless you turn off the so-called _____ services.
location
An Internet scam may trick a user into downloading an executable file, such as a supposed package delivery label, which then installs _____ .
malware
Information systems degree programs typically fall into the computer, business, or _____ category.
management
Good passwords _____ .
mix letters, numbers, and special characters
"Knowledge" workers spend nearly _____ of their time writing and reading emails.
30%
Texting is extremely popular among teenagers, with the average teenager sending about _____ text messages per day in 2012.
60
A text message containing characters from alphabets such as Chinese, Arabic, or Cyrillic is limited to _____ characters.
70
What is a security breach?
A case of unauthorized computer access.
The advantages of crowdsourcing may include _____ .
All of the above
Which of the following could be used to infer more about a user than what the user intentionally posts online?
All of the above
Which of the following statements is true?
All of the above
Which of the following is NOT an example of cyberbullying?
An audience member heckles a stand-up comedian at a live show.
Unlawfully distributing copyrighted work is called _____.
piracy
A _____ is an article, image, or other regularly added content to a blog, which is typically added in reverse chronological order.
post
A computer virus is most likely to _____ .
quietly use the computer for illicit tasks
A vacation message is a form of an email filter that automatically _____ .
replies to any incoming email with a user-specified message
An email _____ is text automatically added to the end of every email you send.
signature
Developers can use the _____ method where each phase of the SDLC sequence is repeated one or more times.
spiral
A thread is a group of emails having the same _____ .
subject
A denial of service attack (DoS) attack is achieved by _____ .
submitting huge numbers of access requests simultaneously to overload a particular site's web server
An MMS-based text message can be composed of _____.
text, images, pictures, video, and audio
Typically, a user's post on Facebook are published for _____ to view.
the user's friends/connections
Users can apply _____ , which contain predefined color palettes and text formatting to provide blogs with a consistent look and feel.
themes
Clicking on the _____ symbol on Pandora Internet Radio, the site will add similar songs and artists to the user's playlist.
thumbs up
YouTube is a widely-used _____ sharing website.
video
Developers can use the _____ method where each phase of SDLC is done in sequence, entirely completing one phase before moving to the next phase.
waterfall
According to Juniper Research, the financial impact of cybercrime is estimated to reach _____ by 2019.
$2 trillion
For what are wiki-based platforms typically used?
Collaborative development of content by multiple users
Kristy is starting a new website that will connect families with nearby babysitters. What type of e-commerce website is Kristy building?
Consumer-to-consumer (C2C)
_____ is a type of e-commerce business/company that enables people to sells goods and services to each other.
Consumer-to-consumer (C2C)
MS Word software falls under what form of intellectual property protection?
Copyright
Which of the following statements is most true?
Craigslist is a type of C2C e-commerce company, which started as a way to place "classified" ads online.
Which of the following is NOT a good strategy to protect a user's personal identity?
Create multiple accounts so the user's information cannot be linked to a single individual.
____ is when someone requests money for a company, product, idea, cause, etc., and users choose to contribute.
Crowdfunding
Which is a general approach that uses a community of users via the Internet to perform a particular task, such as developing articles for an online encyclopedia?
Crowdsourcing
Which of the following is a technique that strives to analyze language usage, faces, locations, and other items to match information to a unique individual?
Data mining
Which of the following is NOT a good strategy to contain personal information on the Internet?
Delete old posts that are no longer relevant to a user's changing interests.
_____ is primarily a service that allows a user to store files in cloud storage.
Dropbox
Which of the following is true about cloud storage?
Dropbox is a type of cloud storage.
Which of the following is NOT an example of a crowdsourcing website?
Ebay
Which of the following is NOT a tip for effective email communication?
Email subjects should be omitted, unless absolutely necessary
_____ scrambles plaintext into a cyphertext so that a packet transmitted through the network is not readable along the route.
Encryption
_____ is the science of designing things for easy safe use by people.
Ergonomics
Which of the following statements is most true?
Every piece of information, public or not, may have value to somebody.
Which type of website is most likely to have the real purpose of spreading viruses?
Free games site
Which of the following is a browser mode that keeps a user fully anonymous on the Internet?
No such mode. Information such as browser settings and app requests may still be transmitted by the web browser.
_____ is the business practice where company A uses company B to do work that company A's employees might otherwise do.
Outsourcing
_____ is a type of business model where users pay to access vendor's platforms or toolkits to develop and deploy new applications.
Platform as a service (Paas)
_____ is a common protocol for sending email messages via the Internet.
SMTP
_____ is a type of malware that collects information from a computer without the user's knowledge.
Spyware
If a child is being cyberbullied by a classmate, what should the child do?
Tell a parent
Twitter's 140-character limit for tweets stems from which of the following?
The character limit imposed on cell phone text messages
An email replier can select reply all (or group reply) to ensure all recipients on the _____ list, and only those recipients, receive the reply.
To and cc
The Yahoo! Logo falls under what form of intellectual property protection?
Trademark
Which of the following describes a phishing scam?
Tricking an email recipient into providing valuable information by posing as a legitimate organization.