digm3325 exam 1

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Identify a topology used by traditional mainframe networks.

A hierarchical topology

Which of the following intentional computer and network threats is a type of Trojan program used to release a virus, worm, or other destructive code?

A logic bomb

_____ is a set of rules that governs data communication, including error detection, message length, and transmission speed.

A protocol

_____ is a type of data encryption that enables users of the Internet to securely and privately exchange data through the use of a pair of keys that is obtained from a trusted authority and shared through that authority.

A public key infrastructure

_____ allows data to be stored in multiple places to improve a system's reliability.

A redundant array of independent disks

_____ is a form of spyware that collects information about a user (without the user's consent) to determine which commercials to display in the user's Web browser.

Adware

Distributed processing maintains decentralized control and centralized operations.

False Distributed processing maintains centralized control and decentralized operations.

Any computer that stores hypermedia documents and makes them available to other computers on the Internet is called a client.

False It is called a server, not a client

The fulfillment function of the business-to-consumer (B2C) e-commerce cycle is responsible for secured electronic payments.

False It is responsible for delivering products or services to customers.

Level 1 security protects back-end systems to ensure confidentiality, accuracy, and integrity of data.

False Level 2, not Level 1

True or False: In designing a management information system (MIS), the first task is to collect data and analyze it.

False The first task is to clearly define the system's objectives.

True or False: The arithmetic logic unit and the control unit are part of the Basic Input/Output System.

False They are part of the central processing unit.

Which is essential for information to be useful?

Relevance

_____ is an example of antispyware software.

STOPzilla

In data encryption, the https in a browser address bar indicates a safe HTTP connection over _____.

Secure Sockets Layer

A common way to index and link databases is by using _____.

Social Security numbers

_____ is a voice-grade transmission channel capable of transmitting a maximum of 56,000 bps.

Narrowband

Which principle states that Internet service providers (ISPs) and government agencies should treat all data on the Internet equally?

Net neutrality

Internet Protocol (IP) operates at the _____ of the Open Systems Interconnection (OSI) model.

Network layer

Which is a supporting activity in a value chain?

Technological development

Which of the following is true of mobile commerce (m-commerce) applications?

They are supported by short-range wireless communication technologies.

Which statement is true of geographic top-level domains (TLDs)?

They are used to promote business and tourism.

Which statement is true of extranets?

They facilitate information exchange among business partners.

Which is true of virtual organizations?

They let independent suppliers share skills and have access to each other's markets via information technologies.

Identify a true statement about the different forms of sender and receiver devices.

Thin clients have no processing power.

In the context of the technologies developed to improve the efficiency and quality of digital communications, _____ divides each channel into six time slots.

Time Division Multiple Access

If a drive in a redundant array of independent disks (RAID) system fails, data stored on it can be reconstructed from data stored on the remaining drives.

True

Terminal resource security is a software feature that erases the screen and signs a user off automatically after a specified length of inactivity.

True

Terrestrial microwave systems use Earth-based transmitters and receivers for transmitting data.

True

The World Wide Web changed the Internet by introducing a graphical interface to the largely text-based Internet.

True

With employee-monitoring systems, managers can supervise employees' work speeds.

True

_____ is a technique that combines the strongest features of Wired Equivalent Privacy (WEP) and Extensible Authentication Protocol (EAP) techniques and helps improve the security of wireless networks.

Wi-Fi Protected Access

In the context of Web and network privacy issues, new employees in an organization have to sign a(n) _____ before they access the network.

acceptable use policy

In the context of Web and network privacy, _____ refers to issues involving both the user's and the organization's responsibilities and liabilities.

accountability

In a level 2 security system, _____ must be protected to ensure confidentiality, accuracy, and integrity of data.

back-end systems

A _____ is a type of an intentional computer and network threat.

backdoor

A _____ is a journal or newsletter that is updated frequently and intended for the general public.

blog

Ryan, an employee of Widget Corp., makes and sells customized paper notebooks. He uses the company's intranet to advertise the notebooks and sell them to the employees of the company. This is an example of _____ e-commerce.

consumer-to-consumer

The _____ tells the computer what to do, such as instructing the computer which device to read or send output to.

control unit

In data communication, _____ refers to integrating voice, video, and data so that multimedia information can be used for decision making.

convergence

E-commune, an e-commerce company, uses small text files with unique ID tags to collect users' data. These text files are embedded in a Web browser and saved on the user's hard drive. They make it possible for E-commune to customize its Web page for its customers. Given this information, it can be concluded that E-commune uses _____ to collect data.

cookies

Intranets are also called _____.

corporate portals

In the context of intentional computer and network threats, a _____ floods a network or server with service requests to prevent legitimate users' access to the system.

denial-of-service attack (DoS)

Information technology and the Internet have, in essence, resulted in two groups-the information rich and the information poor. This gap between the two groups is called _____.

digital divide

Job deskilling occurs when _____.

experienced labor is eliminated by high technology.

In the universal resource locator (URL) https://www.exsat.org, the domain name is _____.

exsat.org

A(n) _____ is a secure network that uses the Internet and Web technologies to connect intranets of business partners so that communication between organizations is possible.

extranet

When planning a comprehensive security system, the first step is designing _____, which use a combination of hardware and software for improving reliability, a way of ensuring availability in case of a system failure.

fault-tolerant systems

In the 1997 Reno v. ACLU case, the U.S. Supreme Court unanimously voted to strike down the anti-indecency provisions of the Communications Decency Act (CDA) because they violated the _____.

freedom of speech provisions of the First Amendment.

A _____ works well for companies that are geographically dispersed.

hierarchical topology

A data _____ is the structure and organization of data, which involves fields, records, and files.

hierarchy

URL _____ is a technique that relies on typographical errors made by Web users when typing a Web site address into a Web browser.

hijacking

In the context of Web marketing, any element of a Web page that is clicked counts as a _____ to a server.

hit

Local area networks (LANs) are used to _____.

integrate services to a single building or campus

Second-generation computers used _____.

integrated circuits

In the context of computer and network security, _____ refers to the accuracy of information resources within an organization.

integrity

A(n) _____ is a common output device for soft copy.

liquid crystal display

In the context of intellectual property, _____ are categorized as industrial property.

logos

A _____ is a network operating on a radio frequency (RF), consisting of radio cells, each served by a fixed transmitter.

mobile network

A(n) _____ is a device that connects a user to the Internet.

modem

A _____ is a hardware device that allows several nodes to share one communication channel.

multiplexer

In a(n) _____, each record can have multiple parent and child records.

network model

The main function of Cyber Incident Response Capability (CIRC) is to _____.

provide information on security incidents

In a relational database model, which operation searches data in a table and retrieves records based on certain criteria?

select operation

A _____ is an intellectual property that protects product names and identifying marks.

trademark

Price _____, in e-commerce, means all market participants can trade at the same price.

transparency

A hierarchical topology is also called a _____ topology.

tree

A _____ consists of self-propagating program code that is triggered by a specified time or event.

virus

A _____ is a type of Web site that allows users to add, delete, and sometimes modify content.

wiki

Code Red, Melissa, and Sasser are examples of _____.

worms

Which is a generic top-level domain (TLD) name used for backbone, regional, and commercial networks?

.net

Auction fraud is sending fraudulent e-mails that seem to come from legitimate sources, such as a bank or university.

False Phishing, not auction fraud

In the context of intentional computer and network threats, social engineers protects the integrity of information resources.

False Social engineering takes advantage of the human element of security to steal data

True or False: The hardware component of a computer system consists of programs written in computer languages.

False Software, not hardware

True or False: Because sending spam is expensive, a small response-a fraction of a percent, for example-is an inadequate return on the investment.

False Spam is inexpensive, so even a small response is a worthwhile return.

The bus topology connects nodes along a network segment, with the ends connected in a manner similar to a ring topology.

False The ends are not connected

Identify a true statement about virtual medicine on the Internet.

It enables specialists at major hospitals to operate on patients remotely.

In the context of using information technologies for a competitive advantage, which statement is true of a bottom- line strategy?

It focuses on improving efficiency by reducing overall costs.

Voice over Internet Protocol (VoIP) is used to route traffic starting and ending at conventional public switched telephone network phones.

True

_____ are networks of independent companies, suppliers, customers, and manufacturers connected via information technologies so that they can share skills and costs and have access to each other's markets.

Virtual organizations

Which statement is true of Extensible Markup Language (XML)?

XML tags represent the kind of content being posted and transmitted.

In the context of information privacy, which of the following is true of spam?

It is sent in bulk using automated mailing software.

Which statement is true of asymmetric encryption?

It requires a large amount of processing power.

In the context of data communication, which is true of convergence?

It requires major network upgrades, because video requires much more bandwidth.

Which is true of magnetic tape?

It stores data sequentially.

In the context of the common intentional security threats, which statement best describes a worm?

It travels from computer to computer in a network, but it does not usually erase data.

Which problem is resolved by distributed processing?

Lack of responsiveness in centralized processing

_____ are compatible with the IBM System/360 line introduced in 1965.

Mainframe computers

The Committee on National Security Systems (CNSS) proposed a model known as the _____ for evaluating information security.

McCumber cube

_____ is a method for advertisers to pay for cost per view or cost per click, which is typically one-tenth of a cent.

Micropayment

Which is a key factor that has contributed to the growth and popularity of big data?

Mobile and wireless technology

_____ is a primary activity in a value chain that involves processing raw materials into finished goods and services.

Operations

Service and support are more important in e-commerce than in traditional commerce because e-commerce companies _____.

do not have a physical location to help maintain current customers

In the context of the seller-side marketplace model, _____ prevents purchases from suppliers that are not on the approved list of sellers.

e-procurement

In order to overcome concerns about hackers getting access to the accounts of online shoppers, electronic payment systems such as _____ are being developed.

e-wallets

For a business that is properly designing and using a social media information system (SMIS), the SMIS would most likely:

enable it to share new and dynamic contents with customers in real time.

Tax filing and payments; completing, submitting, and downloading forms; and requests for records are all categorized as _____.

government-to-citizen

In the context of e-government applications, e-training for government officials is categorized as a _____ application.

government-to-employee

In the context of e-government applications, crisis response is categorized as a _____ application.

government-to-government

Buyline is an e-commerce Web site. It has come up with a promotional offer where buyers get a 60 percent discount on refrigerators if a minimum of 100 buyers agree to buy the product within 24 hours of the offer being announced. In this case, it is evident that BuyLine is a _____.

group buying platform

The embedded references in hypermedia documents are called _____.

hypertext

E-commerce activities that take place within an organization's data communication network are part of _____ e- commerce.

intrabusiness

Gallium arsenide _____ than silicon.

is more fragile

Housed at server farms, search engines use _____ to index data coming in from crawlers.

keywords

In the context of data communication, a _____ is based on "line of sight."

satellite

A _____ is an information system that enables users to retrieve data from the Web by using keywords related to their topic of interest.

search engine

Which type of access control is used to protect systems from unauthorized access?

Passwords

_____ is a popular online payment system used on many online auction sites.

PayPal

_____ are community-based marketplaces that enable individuals to communicate directly with each other and conduct e-commerce operations.

Peer-to-peer e-commerce platforms

Which healthcare system can make interactive medical tools available to the public?

Personal health information systems

_____ primarily control access to computers and networks and include devices for securing computers and peripherals from theft.

Physical security measures

Joey, a businessman, designs cases and covers for cell phones. He wishes to showcase his products so that more people know about his work. Which will help Joey promote his products?

Pinterest

In the context of Internet services, which protocol is used for retrieving messages?

Post Office Protocol

Which is a country code top-level domain?

.fr

An Extended ASCII data code allows representation of maximum _____ characters.

256

A petabyte is equal to _____ bytes.

2^50

_____ aggregate customers' opinions related to products or services that they have purchased and then suggest them to others with the same interest.

Recommendation Web sites

_____ is a commonly used encryption protocol that manages transmission security on the Internet.

Secure Sockets Layer

_____ is a primary activity in Michael Porter's value chain.

Service

Which are not allowed in domain names?

Spaces

_____ is an attempt to gain access to a network by posing as an authorized user in order to find sensitive information, such as passwords and credit card information.

Spoofing

Which security measure uses a physiological element that is unique to a person and cannot be stolen, lost, copied, or passed on to others?

A biometric security measure

Identify the type of computers that has the highest storage capability.

Supercomputers

_____ is the physical link between a network and a workstation.

An adapter card

Which is a type of interorganizational system?

An extranet

Which statement is true of the types of client/server architectures?

An n-tier architecture helps improve network performance.

_____ is an example of a secondary memory device.

An optical disc

_____, also known as virtual work, has enabled some people to perform their jobs from home.

Telecommuting

Which is a smart device that can tell the user's heart rate and lung capacity?

The Under Armour Armour39 shirt

The _____ layer of the Open Systems Interconnection (OSI) model provides services that support users' tasks, such as file transfers, database access, and e-mail.

Application

_____ uses a public key known to everyone and a private key known only to the recipient.

Asymmetric encryption

_____ is the loss of power in a signal as it travels from the sending device to the receiving device.

Attenuation

_____ is the unauthorized use of system data for personal gain, such as transferring money from another's account or charging purchases to someone else's account.

Computer fraud

_____ laws give only the creator exclusive privileges, meaning no one else can reproduce, distribute, or perform the literary and artistic work without permission.

Copyright

_____ check to see what links are on the user's Web page and make sure they work; if a link is broken, they identify it and include this information as part of the data about that page.

Crawlers

_____, software used by search engines, can go through the other pages that are part of your Web site, as long as there are links to those pages.

Crawlers

_____ is a high-speed carrier service that uses ordinary phone circuits to send and receive data.

Digital subscriber line

_____ are indexes of information, based on keywords embedded in documents, that allow search engines to find what Internet users are looking for.

Directories

_____ are usually formed for people to exchange opinions and ideas on a specific topic, usually of a technical or scholarly nature.

Discussion groups

_____ are used to connect computers, hubs, switches, and routers to a network in a local area network (LAN).

Ethernet cables

A virtual organization needs an organizational hierarchy for participants to contribute their expertise.

False

Application-filtering firewalls are less expensive than packet-filtering firewalls.

False

Combinations of spaces and special characters can be used in domain names of uniform resource locators (URLs).

False

Government and nonbusiness organizations are prohibited from using e-commerce applications.

False

In a centralized processing system, processing power is distributed among several locations.

False

In the context of directories on the Web, a human-powered directory uses crawlers to collect data.

False

The use of e-wallets is restricted to nonportable devices.

False

True or False: Computers cannot store massive amounts of data in small spaces.

False

True or False: E-wallets and smart cards increase the risks of exposing consumers' information on the Web.

False

When using mirror disks, if one of the two disks containing the same data fails, the other disk also fails.

False

In the context of mobile networking, 3G networks have decreased the quality of Internet telephony or Voice over Internet Protocol (VoIP).

False 3G networks increased the quality

A ring topology needs more cables to connect the nodes within a network than a star topology.

False A ring topology needs less cable than a star topology

The third-party exchange marketplace model is controlled by sellers and buyers.

False A third-party exchange marketplace model is controlled by a third-party.

True or False: In network-attached storage (NAS), as the number of users increases, its performance increases.

False As the number of users increase, its performance decreases.

Click-and-brick e-commerce struggles to incorporate online interaction.

False Click-and-brick e-commerce capitalizes on the advantages of online interaction.

True or False: Data in a database is used for analytical purposes, whereas data in a data warehouse is used for capturing and managing transactions.

False Data warehouse = analytical purposes Database = capturing and managing transactions

Mobile commerce (m-commerce) predominantly relies on voice recognition and text-to-speech technologies.

False M-commerce relies on WWANs, 3G/4G Networks, and short-range wireless communication.

In the context of directories on the Web, Open Directory is an example of an automated directory.

False Open Directory is an example of a human-powered directory.

Protocols are devices that connect users to the Internet.

False Protocols are rules that govern data communication

True or False: Database marketing works by using multivariate analysis, data segmentation, and automated tools to transform marketing from a proactive to a reactive process.

False Reactive to proactive process

One of the ways in which green computing can be achieved is by replacing meetings over computer networks with actual face-to-face meetings.

False Replace face-to-face meetings w/ meetings over computer networks

Social engineering is an attack that takes advantage of the backdoors in security systems.

False Social engineering takes advantage of the human element of security

True or False: In the context of information systems jobs, a database administrator is responsible for developing an entire information system by writing computer programs.

False (computer programmer)

_____ include gallium arsenide chips that run at higher speeds and consume less power than silicon chips and optical technologies.

Fifth-generation computers

Truzan Creations, one of the leading names in the handicraft industry, recently launched a new artifact in the market. The company uses a database to store information on the number of products manufactured, the weekly sales, the list of suppliers, and the profits achieved. The process component of the information system is used to conduct analysis on the data to generate information about sales. Which can be used by Truzan Creations to generate predictions for its next sales period?

Forecasting models

Which of the following statements is true of the data component of an information system?

Future data is predicted for budgets or cash flow reports.

What kind of computing promotes a sustainable environment and consumes the least amount of energy?

Green computing

Which biometric security measure compares the length of each finger, the translucence of fingertips, and the webbing between fingers against stored data to verify users' identities?

Hand geometry

_____ is a supporting activity in Michael Porter's value chain.

Human resource management

Which can help offset the digital divide?

Increasing the number of computers in public places

_____, used in object-oriented databases, refers to new objects being created faster and more easily by entering new data in attributes.

Inheritance

_____ is a legal umbrella covering protections that involve copyrights, trademarks, trade secrets, and patents for "creations of the mind" developed by people or businesses.

Intellectual property

When information is transferred from one network to another, domain names are converted to _____ by the Domain Name System (DNS) protocol.

Internet Protocol addresses

_____ is an Internet service that enables users in chat rooms to exchange text messages with people in other locations in real time.

Internet Relay Chat

The _____ refers to the physical objects that are connected to the Internet and, therefore, to all the other physical objects.

Internet of Things

_____ is a service that uses the Internet rather than the telephone network to exchange spoken conversations.

Internet telephony

Identify a true statement about information and communications technology (ICT).

It generates approximately two percent of the world's carbon dioxide emissions.

Identify an advantage of the bus topology.

It handles steady traffic well.

Identify a true statement about information technology.

It has cut down production costs.

Which statement is true of an intranet?

It helps organizations move from a calendar-based document-publishing strategy to one that is based on events.

Which is a potential benefit of telecommuting?

It increases productivity.

Which statement is true of phishing?

It involves sending fraudulent e-mails that seem to come from legitimate sources.

The protocol that is used for Internet telephony is _____.

Voice over Internet Protocol

_____ relies on text-to-speech technologies.

Voice-based e-commerce

The Internet is playing an important role in helping organizations reduce expenses, because _____.

Web applications can be used with minimum costs

_____ enables a user to access his or her e-mail account from any computer and, in some cases, store the e-mails on a Web server.

Web-based e-mail

Mobile commerce (m-commerce) is based on the _____.

Wireless Application Protocol

_____ support m-commerce applications.

Wireless wide area networks

Which component of a database management system (DBMS) is used to design elements of an application using a database, such as data entry screens, interactive menus, and interfaces with other programming languages?

application generation

Codes written for one type of computer using _____ do not work on another type of computer.

assembly language

In the context of computer and network security, _____ means a quick recovery in the event of a system failure or disaster.

availability

Bandwidth is often expressed as _____.

bits per second

A _____ is a security threat that may launch a worm through a Trojan horse or launch a denial-of-service attack at a targeted IP address.

blended threat

In the context of intentional computer and network threats, a _____ combines the characteristics of computer viruses, worms, and other malicious codes with vulnerabilities found on public and private networks.

blended threat

According to the 1980 revisions to the Copyright Act of 1976, _____.

both people and organizations can be held liable for unauthorized duplication and use of copyrighted programs

In _____ data transmission, multiple pieces of data are sent simultaneously to increase the transmission rate.

broadband

Electronic data interchange (EDI) and electronic funds transfer (EFT) are forms of _____ e-commerce.

business-to-business

A _____ is initiated by a group of consumers and enables a customer to bid on specific products or make a request for quotation (RFQ) at a common place for selling products.

buyer-side marketplace

By participating in _____, sellers can automate the fulfillment function of business-to-business (B2B) e-commerce.

buyer-side marketplaces

In _____ routing, one node is in charge of selecting the path for all packets.

centralized

Microsoft Outlook is an example of a _____.

client-based e-mail program

Computers requesting hypermedia documents on the Internet are called _____

clients

A similarity between e-commerce and traditional commerce is that both _____.

concentrate on selling products to generate profit.

In the context of computer and network security, _____ means that a system must not allow the disclosing of information by anyone who is not authorized to access it.

confidentiality

Online auction sites that involve business transactions between users of products and services are categorized as _____ e-commerce.

consumer-to-consumer

A level 3 security system focuses on protecting the _____ against intrusion, denial-of-service attacks, and unauthorized access.

corporate network

When a Web page changes, _____ update their indexes and databases automatically to reflect the change.

crawler-based directories

Jack is a gamer, and every time he plays at a gaming center, he pays five dollars using a card that he recharges electronically every week. It is evident that Jack uses _____ as the mode of payment.

e-cash

The Internet backbone is a foundation network linked with _____ cables that can support very high bandwidth.

fiber-optic

A(n) _____ is a combination of hardware and software that acts as a filter or barrier between a private network and external computers or networks.

firewall

The Web organizes information by using _____, meaning documents that include embedded references to audio, text, images, video, or other documents.

hypermedia

Jared makes two copies of an antivirus software package he just bought and sells one of the copies to Joshua. In this scenario, Jared's actions are considered _____.

illegal and unethical

E-commerce sites that use the _____ model collect data on consumers and businesses and then sell this data to other companies for marketing purposes.

infomediary

In the context of computer and network security, a security system is said to possess _____ when it does not allow data to be corrupted or allow unauthorized changes to a corporate database.

integrity

In the context of information technology in workplaces, clerical workers using computers for word-processing tasks is an example of _____.

job upgrading

Alfred, a software programmer at Gamma Inc., develops a program that spreads Trojan viruses to the organization's network. When Liam, his manager, discovers that Alfred had intentionally spread the virus, he immediately fires Alfred. In this scenario, Liam's behavior is considered _____.

legal and ethical

A credit card company sells its customers' mailing addresses to its competitors. In this scenario, the company's action is considered _____.

legal, but unethical

The four Ms of resources in information systems are _____.

manpower, machinery, materials, and money

In data warehouses, _____ is information about data-its content, quality, condition, origin, and other characteristics.

metadata

A _____ is designed to handle data communication for multiple organizations in a city and sometimes nearby cities as well.

metropolitan area network

A routing table lists _____.

nodes on a network

Compared with a star topology, a hierarchical topology _____.

offers a great deal of network control and lower cost.

For each database, there is _____.

only one physical view of data.

A write once, read many (WORM) disc is a common type of _____.

optical storage

A _____ is a collection of binary digits, including message data and control characters for formatting and transmitting, sent from computer to computer over a network.

packet

A _____ is an intellectual property that protects new processes.

patent

A(n) electronic _____ is the electronic exchange of money or scrip.

payment

In the context of the data component of an information system, internal data sources include _____.

personnel records

Syndication feeds are one way of announcing the availability of a _____.

podcast

In the context of Web marketing, _____ are display ads that appear on top of a browser window, blocking the user's view.

pop-up ads

The purpose of an information system's _____ component is generating the most useful type of information for making decisions.

process

In the context of firewall as a nonbiometric security measure, a _____ is software that acts as an intermediary between two systems.

proxy server

What do both Wireless LANs (WLANs) and Wireless WANs (WWANs) rely on as the communication medium?

radio frequency spectrum

The Clipboard's contents are typically stored in _____.

random access memory

A potential benefit of telecommuting is that it _____.

reduces employee turnover

The process of deciding which path data takes on a network is called _____.

routing

A popular application of the _____ model, which is a major business-to-business (B2B) e-commerce model, is e-procurement.

seller-side marketplace

In the context of Web and network privacy, an acceptable use policy is a _____.

set of rules specifying the legal and ethical use of a system and the consequences of noncompliance.

The cost of hiring additional employees in virtual organizations is reduced because _____.

skills are shared among the participating companies

The process of capturing and recording network traffic is referred to as _____.

sniffing

In the context of security, _____ is an attack that takes advantage of the human element of security systems.

social engineering

In the context of information privacy, junk e-mail is also known as _____.

spam

John downloaded Alten Cleaner, a program that poses as a computer registry cleaner, on his computer. Once he installed the program on his computer, the program illegitimately gained access to John's passwords and credit card information. In this scenario, it is evident that John was a victim of _____.

spoofing

Search engines and directories offer space that companies can purchase for advertising purposes. This process is called _____.

spot leasing

In comparison with a flat file system, _____ in a database.

storage space is reduced

Which system is an application of Internet2 (I2) that allows people in different locations to share a virtual environment created on the Web?

teleimmersion

In the bus topology, a hardware device called _____ is used at each end of the cable to absorb the transmitted signal.

terminator

In the context of Web marketing, a cookie is:

the information a Web site stores on a user's hard drive.

The _____ model generates revenue from the fees charged for matching buyers and sellers.

third-party exchange marketplace

When a user accidentally enters an incorrect Web site address, he or she may be directed to an alternative Web site. This is an example of _____.

typosquatting

To minimize the invasion of privacy, users and organizations should _____.

use verification procedures to ensure data accuracy.

To minimize the invasion of privacy, _____.

users should be able to review their records and correct any inaccuracies

Green computing can be achieved by _____.

using video conferencing, electronic meeting systems, and groupware.

Beginning in the 1940s, first-generation computers used _____.

vacuum tube technology

Which concept, introduced by Michael Porter, consists of a series of activities designed to meet business needs by adding cost in each phase of the e-commerce process?

value chain

In the third-party exchange marketplace model, a _____ market concentrates on a specific industry or market.

vertical

In the third-party exchange marketplace model, the sale of medical products is an example of a _____.

vertical market

In the context of information privacy, which is true of cookies?

They provide information about users' location.

In the context of computer literacy and information literacy, which statement is true of knowledge workers?

They should know how data should be indexed and updated.

Which statement is true of laser printers?

They use toners to create high-quality outputs.

In the context of intellectual property, which of the following is categorized as industrial property?

Trademarks

_____ allows the linking of devices running on many different platforms.

Transmission Control Protocol/Internet Protocol

The _____ of the Open Systems Interconnection (OSI) model generates the receiver's address and ensures the integrity of messages by making sure packets are delivered without error, in sequence, and with no loss or duplication.

Transport layer

Transmission Control Protocol operates at the _____ of the Open Systems Interconnection (OSI) model.

Transport layer

In the context of intentional security threats, _____ can erase data and wreak havoc on computers and networks but do not replicate themselves.

Trojan programs

An intranet is an application or service that uses an organization's computer network.

True

An intrusion detection system (IDS) can protect networks against both external and internal access.

True

Copyright laws cover online materials that can be printed or saved on a storage device.

True

Data communication technologies make Web and video conferencing easier, which can reduce the costs of business travel.

True

E-commerce is part of e-business.

True

Ergonomics experts believe that using better-designed furniture can solve many of the health problems related to computer equipment.

True

Hypermedia documents can be stored anywhere in the world.

True

The data transfer speeds of local area networks (LANs) typically range from 100 Mbps to 10 Gbps.

True

True or False: According to the Children's Online Privacy Protection Act (COPPA), any information collected from children must have parental consent.

True

True or False: ENIAC is an example of a first-generation computer.

True

True or False: Information technologies have led to job deskilling.

True

True or False: To be useful, information must be able to integrate with other data and information.

True

Viruses can be transmitted through a network or through e-mail attachments.

True

When a program containing a virus is used, the virus attaches itself to other files, and the cycle continues.

True

When an organization develops a comprehensive security plan, it should set up a security committee with representatives from all departments as well as upper management.

True

Wireless network traffic can be captured with sniffers.

True

Which decision is supported by a financial information system (FIS)?

Determining portfolio structures

_____ is the amount of data that can be transferred from one point to another in one second.

Bandwidth

Which is a nonbiometric security measure?

Callback modems

Which statement is true of Voice over Internet Protocol (VoIP)?

Callers can be screened even with blocked caller IDs.

In the early days of computer technology, which system was justified because data-processing personnel were in short supply, hardware and software were expensive, and only large organizations could afford computers?

Centralized processing

Identify a program used by parents to prevent their children's access to certain Web sites.

CYBERSitter

_____ is a mix of traditional commerce and e-commerce.

Click-and-brick e-commerce

_____ are conducted media that can be used for both data and voice transmissions.

Coaxial cables

In the context of the operators used in a query by example (QBE) form, the _____ is used when only one of the conditions in the QBE form must be met.

OR operator

_____ is a short-range wireless communication technology that acts as a supporting technology for mobile commerce (m-commerce) applications.

Bluetooth

_____ analysis is used to discover patterns and relationships.

Data-mining

Which term is used for unique identifiers of computer or network addresses on the Internet?

Domain names

Which is an example of a client-based e-mail program?

Mozilla Thunderbird

To guard against possible legal ramifications and the consequences of using the Web and networks, an organization usually establishes a(n) _____.

acceptable use policy

In a value chain, service involves _____.

activities to support customers after the sale of products

Which model of e-commerce is an extension of traditional marketing media, such as radio and television?

advertising model

A _____ acts as an interface to a database, retrieving data for users and allowing users to enter data in the database.

data-driven Web site

A(n) _____ , the heart of an information system, is a collection of all relevant facts organized in a series of integrated files.

database

A _____ converts logical requests from users into their physical equivalents by interacting with other components of the database management system (DBMS)

database engine


संबंधित स्टडी सेट्स

Learning Curve: 10c Coping with Stress

View Set

The Legend of Sleepy Hollow and Washington Irving

View Set

Domain: Development with AWS Services

View Set