Final Exam
business processing reeengineering (BPR)
the analysis and redesign of workflow within and between enterprises; analogy: foot ->horse ->car ->airplane (better, faster, cheaper)
Information Security
A broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization
What can an information systems model accomplish? manipulate time All of these are correct. understand uncertainty calculate risks
All of these are correct.
Which of the following is one of the four basic options included in a bring your own device policy?
All of these are correct.
Which of the following should be included in a company email privacy policy?
All of these are correct.
Which of the following would you find in a typical Internet use policy?
All of these are correct.
At a local marketing firm, Steve is the lead web developer & is responsible for working with customers on their web designs, development, & graphics. Which of the following would be a critical skill Steve must have to be able to perform his job?
All of these: a. understanding that he must create a unique domain name for each client b. being able to work with HTML (Hypertext Markup Language) c. Understanding the WWW and how hyperlinks work
Ebusiness was characterized by a few companies or user posting content for the masses. What characterized Business 2.0?
The masses posting content for the masses
Ebusiness was characterized by few companies or users posting content for the masses. What characterizes Business 2.0?
The masses posting content for the masses.
What occurs when business data flows across international boundaries over the telecommunications networks of global information systems?
Transborder data flows
Which of the following represents a form of disruptive technology?
a. is a new way of doing things that initially does not meet the needs of existing customers b. Tends to open new markets & destroy old ones c. enters the marketplace at the low end d. all of the above*
What is a policy that a user must agree to follow in order to be provided access to a network or to the internet?
acceptable use policy
Which of the following policies states that users agree to follow it in order to be given access to corporate email, information systems, and the Internet?
acceptable use policy
Many believe that US tax policy should provide a level playing field for traditional retail businesses, mail-order companies, and online merchants. What form of ebusiness challenge is this statement referring to?
adhering to taxation rules
What includes the hardware, software, and telecommunications equipment that, when combine, provide the underlying foundation to support the organization's goals?
agile MIS infrastructure
Jackie is the head teller at ABC Bank and her responsibilities include overseeing and managing the tellers, resolving customer issues, and developing and implementing systems for an optimal and efficient team. She notices a steady increase in customer complaints and tracks back to find that the complaints started right around the time ABC Bank provided Internet access to all employees. Jackie watched the tellers closely and found that they were spending significant amounts of time playing Internet games and posting on Facebook. Which policy should the company implement to help eliminate this problem?
an Internet use policy
What is a threat?
an act or object that poses a danger to assets
Which of the following defines teergrubing?
an antispamming approach where the receiving computer launches a return attack against the spammer, sending email messages back to the computer that originated the suspected spam
Which of the choices below represents the definition of information property?
an ethical issue that focuses on who owns information about individuals and how information can be sold and exchanged
What is a backup?
an exact copy of a system's information
What is a project management office (PMO)?
an internal department that oversees all organizational projects
Which is not a type of organizational information system? transactional processing system analysis processing system decisions support system executive information system
analysis processing system
What types of information do Whole Foods' regional managers use to make purchasing decisions from local suppliers? analytical information OLTP DSS transactional information
analytical information
Which of the following is not considered an epolicy?
anti-hacker use policy
What kind of policy can a company implement that can help diminish the activity of sending unsolicited email?
anti-spam policy
What is a project deliverable?
any measurable, tangible, verifiable outcome, result, or item that is produced to complete a project or part of a project
business process improvement
attempts to understand and measure the current process and measure the current process and make performance improvements accordingly
What addresses the time frames when systems can be accessed by employees, customers, and partners?
availability
business-facing processes
back-office processes; invisible to the external customer but essential for the effective management of a business; examples: goal setting, day-to-day planning, giving performance feedback and rewards, allocating resources
benchmarks
baseline values the system seeks to attain
What uses data about people's behaviors to understand intent and predict future action?
behavioral data
At a local marketing firm, Steve is the lead web developer and is responsible for working with customers on their web designs, development, and graphics. Which of the following would be a critical skill Steve must have to be able to perform his job?
being able to work with HTML; understanding that he must create a unique domain name for each client; understanding the World Wide Web and how hyperlinks work
What is a detailed process for recovering information or an IT system in the event of a catastrophic disaster such as a fire or flood?
disaster recovery plan
Which of the following was the original design for the Internet?
document exchange; email; display of static content
What is the practice of buying a domain name and not using the web page but waiting to profit from the trademark?
domain 0r cyber squatting
Which of the following choices is not one of the six epolicies that a company should implement for information protection as discussed in the text?
downtime monitoring policy
What is a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network?
drive-by hacking
What are the policies & procedures that address the ethical use of computers & Internet usage in the business environment?
ePolicies
What are the policies and procedures that address the ethical use of computers and Internet usage in the business environment?
ePolicies
Which of the following is not an additional benefit of virtualization?
ease of use for customer relationship management systems
Trust between companies, customers, partners, and suppliers are the support structure of which of the following?
ebusiness
What is a plan that details how a company creates, delivers, and generates revenues on the Internet?
ebusiness model
Ebusiness?
ecommerce and all activities related to internal and external business operations
What refers to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry?
ediscovery
Which of the following refers to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or an information inquiry?
ediscovery
What is a technique for identifying and tracking assets and individuals via technologies such as RFID and smart cards?
electronic tagging
Which of the following policies details the extent to which email messages may be read by others?
email privacy policy
Which policy details the extent to which email messages may be read by others?
email privacy policy
Which data types are typically found in the human resources department?
employee data, promotion data, vacation data.
analytical information
encompasses all organizational information, and its primary purpose is to support the performance of managerial analysis or semistructured decisions; includes transactional information; examples are trends, sales, product statistics and future growth projections
transactional information
encompasses all the information contained within a single business process or unit of work; primary purpose is to support the performance of daily operational or structured decisions
value delivery
ensuring the IT department delivers the promised benefits for every project or investment
What are policies and procedures that address information management along with the ethical use of computers and the Internet in the business environment?
epolicies
What is another name for an eshop?
estore or etailer
If an organization implemented only one policy, which one would it want to implement?
ethical computer use policy
Which of the following contains general principles to guide computer user behavior?
ethical computer use policy
Which of the following key terms represents the principles and standards that guide our behavior toward other people?
ethics
Which of the following represents the two fundamental building blocks that protect organizational information?
ethics and security
What is historical analysis?
events are studied to anticipate the outcome of current developments
Which of the choices below represents the definition of information management?
examines the organizational resource of information and regulates its definitions, uses, values, and distribution, ensuring that it has the types of data/information required to function and grow effectively
What are the 4 global IT business drivers that should be included in all global business strategies?
global customers, products, operations and resources, and collaberation
What are material items or products that customers will buy to satisfy a want or need?
goods
Which of the following definitions represents Internet censorship?
government attempts to control Internet traffic, thus preventing some material from being viewed by a country's citizens
What enables organizations to optimize computing and data resources, pool them for large capacity workloads, share them across networks, and enable collaboration?
grid computing
What is an aggregation of geographically dispersed computing, storage, and network resources, coordinated to deliver improved performance, higher quality of service, better utilization, and easier access to data?
grid computing
All of the following are challenges of outsourcing except...?
reduced frustration and expense related to hiring and retaining employees in an exceptionally tight job market
Telematics
- Blending of computers and wireless telecommunications technologies with the goal of efficientily conveying information over cast networks to improve business operations.
What maps group contacts, identifying who knows each other & who works together?
Social networking analysis
What key questions should IT governance answer?
What key metrics management requires
What key questions about IT governance anser?
What key metrics management requires?
virtual reality
a computer stimulated environment that can be a simulation of the real world or an imaginary world
metrics
measurements that evaluate results to determine whether a project is meeting its goals
What is the practice of buying a domain name & not using the web page but waiting to profit from the trademark?
Domain or Cyber Squatting
What is it called when a company uses organizations from developing countries to write code and develop systems?
offshore outsourcing
__________ is a statement about what will happen or might happen in the future, for example, future sales or employee turnover.
prediction
Social media can be a very valuable tool for a company if used properly. Which of the following represents social media uses for a company?
- Building a strong brand identity - Protecting the company reputation through counter-damage control - Engaging directly with customers and prospective customers
Information Privacy
- Concerns the legal right or general expectation of individuals, groups, or institutions to determine for themselves when and to what extent ifnromation about them is communicated to others.
Which of the below should be included in a company email privacy policy?
- Defines legitimate email users and explains what happens to accounts after a person leaves the organization - Discourages sending junk email or spam to anyone who doesn't want to receive it. - Informs users that the organization has no control over email once it has been transmitted outside the organization.
Sustainable IT disposal
- Refers to safe IT disposal of IT assets at the end of their life cycle.
Mobile Commerce
- ability to purchase goods and services through a wireless internet enabled device
Compliance
- act of conforming, acquiescing, or yielding.
Sustainable IT
- describes the manufacture, management, use, and disposal of information technology in a way that minimizes damage to the environment, which is a critical part of a corporation's responsibility.
Corporate responsibility
- dimension of social responsibility that includes everything from hiring minority workers to making safe products.
Corporate policy
- dimension of social responsibility that refers to the position a firm takes on social and political issues
Virtualization
- framework of dividing resources of a computer into a multiple execution environments.
Social responsibility
- implies that an entity whether it is a government, corporation, organization, or individual has a responsibility to society.
Enterprise Architecture
- includes the plans for how an organization will build deploy, use, and share its data, processes and IT assets.
Innovation
- introduction of new equipment or methods
Governance
- method or system of government for management or control.
Transborder data flows
- occur when business data flows across international boundaries over the telecommunications networks of global information systems.
Deperimeterization
- occurs when an organization moves employees outside its firewall, a growing movement to change the way corporations address technology security.
Ewaste
- old computer equipment,
Geoeconomic
- refers to the effects of geography on the economic realities of international business activities
Electronic Tagging
- technique for identifying and tracking assets and individuals via technologies such as radio frequency identificationa and smart cards.
What is the policy that contains general principles to guide computer user behavior?
-Acceptable use policy -Information privacy policy -Internet use policy -*None of these
Which of the following describes Workplace MIS monitoring?
-Tracking people's activities by such measures as number of transactions processed -Tracking people's activities by such measures as number of keystrokes -Tracking people's activities by such measures as error rate -*All of these
global IT business management areas
-global IT business strategies -global enterprise architectures -global info issues -global systems development
global MIS business drivers
-global products -global operations and resources -global collaboration -global customers
US - EU Data privacy requirements
-notice of purpose and use of data collected -ability to opt out of third party distribution of data -access for consumers to their information -adequate security, data integrity and enforcement provisions
MIS governance institute five focus areas
-strategic alignment -risk management -performance measures -resource management -value delivery
Which of the following is included in the four quadrants of ethical and legal behavior?
. All of these are correct.
What is a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution?
. digital rights management
What is the method or system of government for information management or control?
. information governance
As the president of a local trade company, Kristin is faced with leadership, ethical, and operational decisions on a daily basis. Kristen's responsibilities include examining the organizational resource of information and regulating its definitions, uses, value, and distribution ensuring it has the types of information required to function and grow effectively. What is Kristin overseeing for the company?
. information management
What refers to choosing to allow permissions to incoming emails
. opt in
What is the Child Online Protection Act?
. passed to protect minors from accessing inappropriate material on the Internet
What caused Polaroid to go bankrupt?
1-hour film processing & digital cameras stole its market share
What is Bluetooth's max range?
30 feet
Nonrepudiation
A contractual stipulation to ensure that ebusiness participants do not deny (repudiate) their online actions
Digital Certificate
A data file that identifies individuals or organizations online and is comparable to a digital signature
Smart Card
A device about the size of a credit card, containing embedded technologies that can store information and small amounts of software to perform some limited processing
What is a primary key?
A field (or group of fields) that uniquely identifies a given entity in a table.
What is spam?
A form of unsolicited email
Authentication
A method for confirming users' identities
Information Governance
A method or system of government for information management or control
Which of the following clauses is typically contained in an acceptable use policy?
A nonrepudiation clause
Which of the following definitions represents typosquatting?
A problem that occurs when someone registers purposely misspelled variations of well-known domain names.
Spyware
A special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission
Phishing
A technique to gain personal information for the purpose of identity theft, usually by means of fraudulent emails that look as though they came from legitimate businesses
What is radio frequency identification (RFID)?
A technology that uses active or passive tags in the form of chips or smart labels that can store unique identifiers & relay this info to electronic reasers
Certificate Authority
A trusted third party, such as VeriSign, that validates user identities by means of digital certificates
What is the primary difference between a worm and a virus?
A virus must attach to something to spread, where a worm does not need to attach to anything to spread and can tunnel itself into the computer.
What is Google glass? A. The viewing of the physical world with computer-generated layers of information added to it. B. A wearable computer with an optical head-mounted display (OHMD). C. Uses technology allowing humans to interact with a computer through bodily sensations and movements. D. A work environment that is not located in any one physical space.
A wearable computer with an optical head-mounted display (OHMD)
What is a virtual workplace? A. The viewing of the physical world with computer-generated layers of information added to it. B. A wearable computer with an optical head-mounted display (OHMD). C. Technology that allows humans to interact with a computer through bodily sensations and movements. D. A work environment that is not located in any one physical space.
A work environment that is not located in any one physical space
What is a bar chart? A. A chart or graph that presents grouped data with rectangular bars with lengths proportional to the values that they represent B. A graphical display of data using bars of different heights. It is similar to a bar chart, but a histogram groups numbers into ranges C. A type of graph in which a circle is divided into sectors that each represent a proportion of the whole D. A small embedded line graph that illustrates a single trend
A. A chart or graph that presents grouped data with rectangular bars with lengths proportional to the values that they represent
What is a pie chart? A. A type of graph in which a circle is divided into sectors that each represent a proportion of the whole B. A graphical display of data using bars of different heights. It is similar to a bar chart, but a histogram groups numbers into ranges C. A chart or graph that presents grouped data with rectangular bars with lengths proportional to the values that they represent D. A small embedded line graph that illustrates a single trend
A. A type of graph in which a circle is divided into sectors that each represent a proportion of the whole
What is anything that happens during the course of a business process? A. BPMN Event B. BPMN Flow C. BPMN Activity D. BPMN Gateway
A. BPMN Event
At which level of an organization are employees continuously evaluating company operations to hone the firm's abilities to identify, adapt to, and leverage change? A. Managerial level B. Strategic level C. Operational level D. All of the above
A. Managerial level
At which level do managers develop the overall business strategies and monitor the performance of the organization and the competitive business environment? A. Strategic B. Operational C. Managerial D. Communications
A. Strategic
What are three primary types of management information systems available to support decision making across the company levels? A. Transaction Processing Systems, Decision Support Systems, Executive Information Systems B. Analytical Information, Decision Support Systems, Executive Information Systems C. Transaction Processing Systems, Drill-Down Systems, Expert Systems D. What-If Analysis, Sensitivity Analysis, Goal-Seeking Analysis
A. Transaction Processing Systems, Decision Support Systems, Executive Information Systems
Universities were among some of the first users of the Internet. What was the Internet first called?
ARPANET
Which policy is it common practice for many businesses & educational facilities to require employees or students to sign before being granted a network ID?
Acceptable use policy
An organization processing personal data of a person living in the EU must comply with which of the following principles?
Adequate, relevant, & not excessive
An organization processing personal data of a person living in the EU must comply with which of the following principles? Processed for extended purposes Adequate, relevant, and not excessive Processed without the accordance of data subject's rights All of these
Adequate, relevant, and not excessive
Which of the following represents the primary ebusiness revenue models?
Advertising fees, license fees, subscription fees, transaction fees, value-added services fees.
Social media can be a very valuable tool for a company if used properly. Which of the following represents social media uses for a company?
All of these are correct.
Which of the following is a question a company should ask when creating a global website? Will the site require new navigational logic to accommodate cultural preferences? Will content be translated? Which country will the server be located in to support local user needs? All of these
All of these
Which of the following is an example of an intelligent system? A. The firefighter robot that can extinguish flames at chemical plants. B. Shell Oil's Smart Pump robot that pumps gas for the customer. C. A robot that cleans and sweeps at a local airport. D. All of these.
All of these
Which of the following is one of the fundamental issues surrounding the struggle between Internet censorship and openness? Controlling the conduits Filtering the flows Punishing the purveyors All of these
All of these
Which of the following offers an example of an intelligent agent that uses a multi-agent system? A. A cargo transport system B. Book distribution center C. A flu epidemic D. All of these
All of these
Which of the following is a reason for the growth of the WWW?
All of these a. Advancements in networking hardware b. Web pages being easy to create & flexible c. The microcomputer revolution
Which of the following countries in internet access banned or subject to tight limitation through government-controlled ISPs?
All of these a. Burma b. Libya C. Syria
which of the following is an example of a clickstream data metric?
All of these a. Dates & times of visits b. The number of page views c. Number of customer with shopping carts
Which of the following is an example of a disruptive technology?
All of these a. Oracle's database software b. Sony's transistor-based consumer electronics (transistor radio) c. Intel's low-end microprocessor
What is a potential problem or impact of technology dependence?
All of these a. Outages create potentially great havoc for people, businesses, & educational institutions that rely heavily on technology b. Many have a need to be continuously connected for every activity, which potentially eliminates crucial in-person social skills & could stunt psychological growth c. How do people or businesses function if the connection is down?
Which of the following are challenges of Business 2.0?
All of these a. Violations of copyright & plagiarism b. Information vandalism c. Technology dependence
Which of the following is considered a location based services market segment?
All of these a. emergency services b. navigation services c. tracking services
Which of the following is one of the fundamental issues surrounding the struggle between Internet censorship & openness?
All of these a. filtering the flows b. punishing the purveyors c. controlling the conduits
Which of the following is a common GIS use?
All of these a. info alerts b. routing info c. finding what is nearby
Which of the following is a US-EU data privacy requirement?
All of these a. notice of the purpose & use of data collected b. access for consumers to their info c. adequate security, data integrity, & enforcement provisions
Which of the following represents an unusual use of RFID?
All of these a. preventing toilets from overflowing b. identifying human remains c. timing athletic events
Which of the following is one of the rights granted to European Union members under the directive on the protection of personal data grants?
All of these a. the right to know the course of personal data processing & the purpose of such processing b. the right to access &/or rectify inaccuracies in one's own personal data c. the right the disallow the use of personal data
Which of the below represents an example of why an employer would use social media?
All of these a. to find potential job candidates via LinkedIn b. To attract new job candidates via YouTube c. To review potential job candidates by viewing their Facebook page
What is the role of a mashup editor?
All of these a. to provide a visual interface to build up a mashup. b. WYSIWYG's often it allows the user to drag & drop data points into a web application.
Which of the following can be completed by encryption?
All of these a. use a mathematical formula to convert info into some sort of code b. replace character with other characters c. switch order of characters
Social tagging describes the collaborative activity of marking shared online content with keywords or tags as a way to ____.
All of these organize it for future search, navigation, filtering
In the information technology world, which of the following are examples of ethical issues that a company may have to manage?
All of these are correct.
Jackie is the head teller at ABC Bank and her responsibilities include overseeing and managing the tellers, resolving customer issues, and developing and implementing systems for an optimal and efficient team. She notices a steady increase in customer complaints and tracks back to find that the complaints started right around the time ABC Bank provided Internet access to all employees. Jackie watched the tellers closely and found that they were spending significant amounts of time playing Internet games and posting on Facebook. Which policy should the company implement to help eliminate this problem?
An Internet use policy.
What is a project manager?
An individual who is an expert in project planning and management, defines and develops the project plan, and tracks the plan to ensure that the project is completed on time and on budget.
How would the airline industry use business intelligence?
Analyze popular vacation locations with current flight listings.
What does social media analytics do?
Analyzes text flowing across the Internet, including unstructured text from blogs and messages.
Teergrubing
And anti-spamming approach by which the receiving computer launch is a return attack against a spammer, sending email messages back to the computer that originated the suspected spam
Patent
And exclusive rights to make, use, and Santa invention and is granted by the government to the inventor
What is the most common type of defense within detection & response technologies?
Antivirus software
What is the difference between asynchronous & synchronous communication?
Asynchronous is communication that does not occur at the same time. Synchronous communication occurs at the same time.
What is the difference between asynchronous and synchronous communication?
Asynchronous is communication that does not occur at the same time; synchronous communication occurs at the same time.
What is the viewing of the physical world with computer-generated layers of information added to it? A. Augmented reality B. Google Glass C. Haptic interface D. Virtual reality
Augmented reality
What is the viewing of the physical world with computer-generated layers of information added to it? A. Virtual reality B. Augmented reality C. Virtual workforce D. All of these
Augmented reality
What is a method for confirming users' identities?
Authentication
What refers to any type of electrical or electronic operation that is accomplished without the use of a 'hard-wired' connection?
wireless
What is a virtual workplace? A. Uses technology allowing humans to interact with a computer through bodily sensations and movements B. A work environment that is not located in any one physical space C. The viewing of the physical world with computer-generated layers of information added to it D. A wearable computer with an optical head-mounted display (OHMD)
B. A work environment that is not located in any one physical space
What is a task in a business process? A. BPMN Flow B. BPMN Activity C. BPMN Event D. BPMN Gateway
B. BPMN Activity
What is represented by a diamond shape in a business process model? A. BPMN Event B. BPMN Gateway C. BPMN Flow D. BPMN Activity
B. BPMN Gateway
What is a common tool that is used to support visualizations and tracks KPIs and CSFs by compiling information from multiple sources? A. Neural networks B. Digital dashboards C. Models D. Verified graphs
B. Digital dashboards
What are strategic business processes? A. Semidynamic, semiroutine, monthly business processes such as resource allocation, sales strategy, or manufacturing process improvements. B. Dynamic, nonroutine, long-term business processes such as financial planning, strategies, and stakeholder interactions. C. Static, routine, daily-business processes such as stocking inventory, checking out customers, or daily opening and closing processes. D. None of the above
B. Dynamic, nonroutine, long-term business processes such as financial planning, strategies, and stakeholder interactions.
What is an algorithm? A. Refers to the field of artificial intelligence that works toward providing brain like powers to AI machines; in effect, it works to make machines as intelligent as the humans B. Refers to a set of instructions that completes a task C. A type of artificial intelligence that enables computers to both understand concepts in the environment, and also to learn D. Machines can still make their own decisions based on reasoning and past sets of data
B. Refers to a set of instructions that completes a task
What is strong AI? A. A type of artificial intelligence that enables computers to both understand concepts in the environment, and also to learn B. Refers to the field of artificial intelligence that works toward providing brain like powers to AI machines; in effect, it works to make machines as intelligent as the humans C. Refers to a set of instructions that completes a task D. Machines can still make their own decisions based on reasoning and past sets of data
B. Refers to the field of artificial intelligence that works toward providing brain like powers to AI machines; in effect, it works to make machines as intelligent as the humans
At which level of an organization do manages develop overall business strategies, goals, and objectives as part of the company's strategic plan? A. Operational level B. Strategic level C. Managerial level D. All of the above
B. Strategic level
What is a computer-simulated environment that can be a simulation of the real world or an imaginary world? A. Augmented reality B. Virtual reality C. Virtual workforce D. All of the above
B. Virtual reality
Which category below represents the three common forms of business operations, brick-and-mortar, click-and-mortar, and pure play?
B2C
What is the difference between a B2C and a C2B?
B2C focuses on business to consumers and C2B focuses on consumers to business
What is the difference between a B2C and a C2B?
B2C focuses on business to consumers and C2B focuses on consumers to business.
Which is a virus that opens a way into the network for future attacks?
Backdoor programs
Which of the following best describes Web 3.0?
Based on the "intelligent" web where application use natural language processing
Where do organizations typically place firewalls?
Between the server & the internet
What is a collection of large, complex data sets, including structured and unstructured data, that cannot be analyzed using traditional database methods and tools?
Big data
What is the identification of a user based on a physical characteristic, such as a fingerprint, iris, face, voice, or handwriting?
Biometrics
What is the process of learning from ecosystems and adapting their characteristics to human and organization situations? A. Data collection B. Artificial intelligence C. Biomimicry D. Intelligent system
Biomimicry
What is a hacker who breaks into other peoples computer systems and may just look around or steal and destroy information
Black hat Hacker
Who breaks into other people's computer systems & just looks around or steals & destroys info?
Black-hat hacker
Which of the following identifies Business 2.0 communication & collaboration tools?
Blogs, wikis, mashup
Which act prohibits the use of video rental information on customer for any purpose other than that of marketing goods & services directly to the consumer?
Bork Bill
A company's internal wiki can be a great tool for all of the following except:
Building software applications.
An API is a set of routines, protocols, & tools for _____.
Building software applications.
What are the 4 global IT business management areas critical to running multinational companies?
Business strategies, enterprise architectures, information issues, system development
What are the four global IT business management areas critical to running multinational companies? Business strategies, enterprise architectures, information issues, systems development Business strategies, information architectures, economic issues, telecommunication issues Business politics, enterprise architectures, telecommunication issues, systems development Business economics, enterprise architectures, information issues, telecommunication issues
Business strategies, enterprise architectures, information issues, systems development
How would a company like Flickr use social tagging on its website?
By allowing users to upload images and tag the images with their own keywords.
What technology provides connectivity for portable & mobile applications, both personal & business?
Cellular phones & pagers
Internet ________ is a government attempt to control Internet traffic, thus preventing some material from being viewed by countries citizens
Censorship
What is the process of computerizing manual tasks, making them more efficient and effective and dramatically lowering operational costs A. Streamlining B. Workflow C. Automation D. Swim lane
C. Automation
What do usability effectiveness MIS metrics measure? A. The number of hours a system is available for users B. The number of customers an organization "touches" for the first time and persuades to purchase its products or services C. The ease with which people perform transactions and find information D. The amount of time a system takes to perform a transaction
C. The ease with which people perform transactions and find information
The majority of eBay's customers are using a_____________rbusiness model
C2C
Which state recognizes an individual's right to privacy?
California
Which state recognizes an individual's right to privacy? Colorado New York California Florida
California
What is a process improvement approach that contains 22 process areas created by a group from government, Industry, and Carnegie Mellon's Software Engineering Institute?
Capability Maturity Model Integration Method
What is a process improvement approach that contains 22 process areas?
Capability Maturity Model Integration method
What passed to protect minors from accessing inappropriate material on the Internet?
Child Online Protection Act
What is the name of the highly publicized survey administered by the Institute for Citizen-Centered Services and the Institute for Public Administration in Canada?
Citizens First
Which of the following forms of data mining assigns records to one of a predefined set of classes?
Classification analysis
What type of Internet monitoring technique records information about a customer during a web surfing session such as what websites were visited and how long the visit was, what ads were viewed, and what was purchased?
Clickstream
What is the exact pattern of a consumer's navigation through a site?
Clickstream data
Which company was the victim of a distributed denial-of-service attack that forced the company to close operations and eventually transfer over 2,500 customers to a rival organization?
CloudNine Communication
What is the techique used to divide information sets into mutually exclusive groups such that members of each group are as close together as possible to one another and that different groups are as far apart as possible?
Cluster analysis
What is a set of guidelines & supporting tools for IT governance that is accepted worldwide & generally used by auditors & companies as a way to integrate technology to implement controls & meet specific business objectives?
CoBIT Information Systems Audit & Control Association
Lisa loves her job as an executive recruiter for a large hospital located in Dallas. Part of her job is to gather industry info, collaborate with partners, compare competitors, and tap into the knowledge of prospective employees, partners, & customers. Which of the below would Lisa use to perform her job?
Collective intelligence
What i th most secure type of authentication?
Combination of all of the above a. ...part of the user such as fingerprint/voice signature b. ...user has such as smart card/token c. ..user knows such as user ID & password
Which framework is key for evaluating internal controls such as human resources, logistics, information technology, risk, legal, marketing and sales, operations, financial functions, procurement, and reporting?
Committee of Sponsoring Organizations
What are the factors included in the global operations & resources category of global IT business drivers?
Common equipment, facilities, assembly processes, & people are shared by a global company & IT can track shared resources
Backdoor programs, denial of service attack, distributed denial of service attack, polymorphic viruses and warms, Trojan horse virus
Common forms of viruses
Black hat hackers, crackers, cyber terrorist, hactivists, script kiddies, white hat hackers
Common types of hackers
What is the act of conforming, acquiescing, or yielding?
Compliance
What is the assurance that messages & information remain available only to those authorized to view them?
Confidentiality
What is the assurance that messages and information remain available only to those authorized to view them?
Confidentiality
Which of the following does not represent a category of AI? A. Genetic algorithms B. Neural networks C. Expert systems D. Consolidation
Consolidation
Which of the following is NOT a primary difference between traditional satellites & low-orbit satellites?
Consumes more power
Information Privacy Policy
Contains general principles regarding information privacy
Ethical Computer Use Policy
Contains general principles to guide computer user behavior
Internet Use Policy
Contains general principles to guide the proper use of the Internet
What is a small file deposited on a hard drive by a website containing information about customers & their web activities?
Cookie
What is a small file deposited on a hard drive by a website containing information about customers and their web activities?
Cookie
What is the legal protection afforded an expression of an idea, such as a song, video game, & some types of proprietary documents?
Copyright
What is software that is manufactured to look like the real thing and sold as such?
Counterfeit software
Who are hackers with criminal intent?
Crackers
What are the 3 primary challenges facing 21st century global businesses?
Cultural, political, geoeconomic
What are the three primary challenges facing global businesses? Cultural, environmental, developmental Cultural, political, geoeconomic Political, environmental, compliance Political, cultural, architecture
Cultural, political, geoeconomic
What are the factors included in the global customer's category of global IT business drivers?
Customers who travel anywhere or companies with global operations & global IT systems help provide fast, convenient, homogeneous service
What are the factors included in the global customer's category of global IT business drivers?
Customers who travel anywhere or companies with global operations and global IT systems help provide fast, convenient, homogeneous service.
What is the electronic defacing of an existing website
Cyber vandalism
What refers to the creation of new kinds of intermediaries that simply could not have existed before the advent of ebusiness, including comparison-shopping sites such as Froogle & bank account aggregation services such as Citibank?
Cybermediation
What type of mediation refers to the creation of new kinds of intermediaries that simply could not have existed before the advent of ebusiness?
Cybermediation
Who are those who seek to cause harm to other people or to destroy critical systems of information & use the Internet as a weapon of mass destruction?
Cyberterrorists
Online Transaction Processing (OLTP) is the capturing of transaction and event information using technology to _______. A. Update existing information to reflect the new information B. Process the information according to defined business rules C. Store the information D. All of the above
D. All of the above
What is the analysis and redesign of workflow within and between enterprises? A. Decision support interfaces (DSI) B. Benchmarking metrics C. Critical success factors (CSFs) D. Business process reengineering (BPR)
D. Business process reengineering (BPR)
A transaction processing system (TPS) is the basic business system that assists operational level analysts when making structured decisions. Which of the below is not an example of a TPS? A. Stewart Sport's order entry system B. Target's internal company payroll system C. First Bank's overall accounting system D. Comfort Dental's patient diagnosis system
D. Comfort Dental's patient diagnosis system
Transaction processing systems are primarily used to automate business processes. Automation increases efficiency and effectiveness, while reducing head count which in turn reduces the overall operational _______. A. Revenues B. Systems C. Intelligence D. Costs
D. Costs
Decision making at the executive or strategic level requires business intelligence and knowledge to support the uncertainty and complexity of the business. What is a specialized DSS that supports senior-level executives and unstructured decisions requiring judgment, evaluation, and insight? A. Decision Support System (DSS) B. Transaction Support System (TSS) C. OLTP D. Executive Information System (EIS)
D. Executive Information System (EIS)
What improves managerial level business processes? A. Bottlenecks B. Performance measures C. Redundancy D. Streamlining
D. Streamlining
What is slice-and-dice capability? A. Enables users to get details, and details of details, of information B. Involves the aggregation of information and features simple roll-ups to complex groupings of interrelated information C. Finds the inputs necessary to achieve a goal such as a desired level of output D. The ability to look at information from different perspectives
D. The ability to look at information from different perspectives
What are the three primary types of management information systems to support decision making across the company levels? A. Analytical Information, Decision Support Systems, Executive Information Systems B. Transaction Processing Systems, Drill-Down Systems, Expert Systems C. What-If Analysis, Sensitivity Analysis, Goal-Seeking Analysis D. Transaction Processing Systems, Decision Support Systems, Executive Information Systems
D. Transaction Processing Systems, Decision Support Systems, Executive Information Systems
Sensitivity analysis, what-if analysis, optimization analysis, and goal-seeking analysis are the common________________________________.
DSS analysis techniques.
Which of the following is considered an unstructured decision or strategic decision?
Deciding to enter a new market
Which company is expecting to gain the majority of its returns on new investments?
Dell
What floods a website with so many requests for service that is slows down or crashes the site?
Denial-of-service attack (DOS)
____________ occurs when an organization moves employees outside its firewall, a growing movement to change the way corporations address technology security.
Deperimeterization
What does the design phase in the SDLC involve?
Describing the desired features and operations of the system.
Information Security Plan
Details how an organization will implement the information security policies
Email Privacy Policy
Details the extent to which email messages may be read by others
Which of the following is not a cultural business challenge?
Differences in architectures
Which of the following is not a cultural business challenge? Differences in social attitudes Differences in political philosophies Differences in architectures Differences in customs
Differences in architectures
Select two cultural business challenges.
Differences in cultural interests Differences in languages
Which of the following is NOT a political business challenge?
Differences in social attitudes
Which of the following terms implies that organizations that cannot adapt to the new demands placed on them for surviving in the information age are doomed to extinction?
Digital Darwinism
What is a data file that identifies individuals or organizations online and is comparable to a digital signature
Digital certificate
What is the technological solutions but allows publishers to controll their digital media to discourage, limit, or prevent illegal copying and distribution
Digital rights management
What is the business strategy that lets a company shorten the order process & add value with reduces costs or a more responsive & efficient service, & occurs when a business sells directly to the customer online?
Disintermediation
The Innovator's Dilemma suggests that established companies can take advantage of _____without hindering existing relationships with customers, partners, & stakeholders.
Disruptive technology
What processes and manages algorithms across many machines in a computing environment?
Distributed computing
Which of the following is not one of the six epolicies that a company should implement for information protection as discussed in the text?
Downtime monitoring policy
What company monitors the operation of its vending machines via wireless technology?
Dr. Pepper/Seven Up Inc
What company monitors the operation of its vending machines via wireless technology?
Dr. Pepper/Seven Up inc.
What occurs when a hacker looks through your trash to find personal information
Dumpster diving
________ occurs when a hacker looks through your trash to find personal information.
Dumpster diving
Information privacy policy, acceptable use policy, Internet use policy, anti-spam a policy
E policies a business should implement to protect itself
What technology uses radio waves rather than wires to transmit information across a local area network?
wireless local area network
Which of the following is not a type of information security breach?
E-discovery, BYOD
How does DIS differ from EIS?
EIS requires data from external sources to support unstructured decisions. Typically DSS decisions rely on internal data only (from operational level)
What is the difference between ecommerce & ebusiness?
Ecommerce is buying & selling of goods or services online. Ebusiness includes ecommerce & all activities related to internal & external business operations.
operational
Employee Types: lower management, department managers, analysts Metrics:Key performance indicators focusing on efficiency Examples: How many people are out sick? How much inventory is in warehouse?
managerial
Employee Types: middle management, managers, directors Metrics: key performance indicators focusing on efficiency, and critical success factors focusing on effectivness Examples: Who are our best customers by region, by sales representation, by product? What are the sales forecast for next month? How do they compare to last years? Why types of ad hoc or unplanned reports might the company require next month?
strategic
Employee Types: senior management, presidents, leaders Metrics: critical success factors focusing on effectiveness Examples: What industry trends are worth analyzing? How will a recession over the next three years impact business? What measures will the company need to prepare for due to new tax laws?
Which of the following is not an example of explicit knowledge?
Employee opinion
What includes the plans for how an organization will build, deploy, use, and share its data, processes, and IT assets?
Enterprise architecture
The policy that ensures the users know how to behave at work and the organization has a published standard regarding computer user behavior is called __________ computer use policy.
Ethical
The policy that ensures users know how to behave at work and the published standard an organization has regarding computer user behavior is called the _________ computer use policy
Ethical
If an organization were to have only one policy, which one would it want?
Ethical Computer use policy
Which policy ensures that the users know how to behave at work and that the organization has a published standard through which to deal with user infractions?
Ethical computer use policy
What are the principles and standards that guide our behavior toward other people?
Ethics
Information Management
Examines the organizational resource of information and regulates its definitions, uses, value, and distribution ensuring it has the types of data/information required to function and grow effectively
Power outages, tornadoes, network failure
Examples of unplanned downtime
What is a system that uses computerized advisory programs to imitate the reasoning processes of experts in solving difficult problems? A. Expert system B. Virtual reality C. Neural network D. Genetic algorithm
Expert system
Which of the following is the most commonly used form of AI in the business arena? A. Intelligent system B. Artificial intelligence C. Expert system D. Neural network
Expert system
Hackers
Experts in technology who use their knowledge to break into computers and computer networks, either for profit or just motivated by the challenge
What is the type of knowledge that consists of anything that can be documented, archived, & codified, often with the help of an MIS dept?
Explicit Knowledge
What are the 2 categories that include intellectual & knowledge-based assets?
Explicit knowledge & tacit knowledge
Employee Monitoring Policy
Explicitly state how, when, and where the company monitors its employees
what does a data scientist do?
Extracts knowledge from data by performing statistical analysis, data mining, and advanced analytics on big data to identify trends, market changes, and other relevant information.
Which of the below is NOT an example of a social bookmarking website?
Which of the below is not an ISP?
A certificate authority is a data file that identifies individuals or organizations online and is comparable to a digital signature.
False
A firewall scrambles information into an alternative form that requires a key or password to decrypt
False
A voiceprint is a data file that identifies individuals or organizations online and is comparable to a digital signature.
False
Identity theft is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity.
False
Multifactor authentication is the traditional security process, which requires a user name and passworD.
False
Prediction is a statistical process that finds the way to make a design, system, or decision as effective as possible, for example, finding the values of controllable variables that determine maximal productivity or minimal waste.
False
Single-factor authentication requires more than two means of authentication such as what the user knows (password), what the user has (security token), and what the user is (biometric verification).
False
Intrusion Detection Software (IDS)
Features full-time monitoring tools that search for patterns in network traffic to identify intruders
Which industry has been relying on neural network technology for over two decades? A. Food service B. Hotels C. Finance D. Healthcare
Finance
What website was the primary catalyst for growing electronic government & is the official US gateway to all government information?
FirstGov.gov
What is the term that is similar to taxonomy except that crowdsourcing determines the tag or keyword-based classification system?
Folksonomy
Identity Theft
Forging of someone's identity for the purpose of fraud
Which act allows any person to examine government records unless it would cause an invasion of privacy?
Freedom of Information Act
What is the mathematical method of handling imprecise or subjective information? A. Fuzzy logic B. Virtual reality C. Expert system D. Genetic algorithm
Fuzzy logic
Which type of AI system assigns values of 0 and 1 to vague or ambiguous information? A. Genetic algorithms B. Artificial intelligence C. Fuzzy logic D. Intelligent agents
Fuzzy logic
What is an optimizing system that can find and evaluate solutions with many more possibilities, faster and more thoroughly than a human? A. Genetic algorithm B. Expert system C. Intelligent agent D. Virtual reality
Genetic algorithm
___________ refers to the effects of geography on the economic realities of international business activities.
Geoeconomic
What is the definition of geoeconomic? Geopolitical and environmental business challenges Geopolitical and economic business challenges Geographic and environmental business challenges Geographic and economic business challenges
Geographic and economic business challenges
Select the four global IT business management areas.
Global Systems Development Global Information Issues Global IT Business Strategies Global Enterprise Architectures
What are the four global IT business drivers that should be included in all global IT business strategies?
Global customers, global products, global operations and resources, global collaboration
What is a wearable computer with an optical head-mounted display (OHMD)? A. Augmented reality B. Google Glass C. Haptic interface D. Virtual reality
Google Glass
Information Ethics
Govern the ethical and moral issues arising from the development and use of information technologies, as well as the creation, collection, duplication, distribution, and processing of information itself
What is a method or system of government for management or control?
Governance
Which act protects health insurance information?
HIPAA
Which act protects health insurance information? HIPAA COPPA CIPPA All of these
HIPAA
Social Engineering
Hackers use their social skills to trick people into revealing access credentials or other valuable information
What uses technology allowing humans to interact with a computer through bodily sensations and movements—for example, a cell phone vibrating in your pocket? A. Augmented reality B. Google Glass C. Haptic interface D. Virtual reality
Haptic interface
Firewall
Hardware and/or software that guard a private network by analyzing incoming and outgoing information for the correct markings
What is a hardware device that captures keystrokes on their journey from the keyboard on the motherboard?
Hardware key logger
What attacks computer systems by transmitting a virus hoax, with a real virus attached?
Hoaxes
Information Security Policies
Identify the rules required to maintain information security, such as requiring users to log off before leaving for lunch or meetings, never sharing passwords with anyone, and changing passwords every 30 days
What is one simplification that has occurred with Business 2.0?
Improving access to information
What is an enterprise architecture?
Includes the plans for how an organization will build, deploy, use, & share its data, processes, & IT assets.
Which of the following offers a disadvantage for working virtually? A. Increases in worker productivity. B. Increases in feelings of seclusion. C. Decreases in expenses for the company. D. Alleviation of congested roadways.
Increases in feelings of seclusion
All of the following are countries expected to have the largest increases in population between 2000 and 2050, except...?
India
What is a set of guidelines and supporting tools for IT governance that is accepted worldwide and generally used by auditors and companies as a way to integrate technology to implement controls and meet specific business objectives?
Information Systems Audit and Control Association
What is a framework provided by the government of the United Kingdom and offers eight sets of management procedures? CoBIT Information Systems Audit and Control Association Information Technology Infrastructure Library Committee of Sponsoring Organizations Capability Maturity Model Integration Method
Information Technology Infrastructure Library
What concerns the legal right or general expectation of individuals, groups, or institutions to determine for themselves when & to what extent information about them is communicated to others?
Information privacy
What policy contains the general principles regarding information privacy
Information privacy policy
Which of the following are epolicies a business should implement to protect itself?
Information privacy policy,Acceptable use policy, Internet use policy, Anti-spam policy
What is the depth & breadth of details contained in a piece of textual, graphic, audio, or video?
Information richness
What identifies the rules required to maintain info security?
Information security policies
According to the ethical computer use policy, users should be _____of the rules &, by agreeing to use the system on that basis, _____to abide by the rules.
Informed; consent
Which term describes legitimate users who purposely or accidentally misuse their access to the environment & cause some kind of business-affecting incident?
Insiders
Intellectual property is __________ creative work that is embodied in physical form and includes copyrights, trademarks, and patents
Intangible
Intellectual Property
Intangible creative work that is embodied in physical form and includes copyrights, trademarks, and patents
What is intangible creative work that is embodied in physical form?
Intellectual property
What is the intangible creative work that is embodied in physical form and includes trademarks and patents?
Intellectual property
What is a special-purpose knowledge-based information system that accomplishes specific tasks on behalf of its users? A. Intelligent system B. Artificial intelligence C. Neural network D. Intelligent agent
Intelligent agent
Which of the following is a special-purpose knowledge based information system that accomplishes specific tasks on behalf of its users? A. Intelligent agent B. Executive agent C. Expert agent D. Modeling system
Intelligent agent
What are agents, software, or businesses that provide a trading infrastructure to bring buyer & sellers together?
Intermediaries
When evaluating the business value of disintermediation, the more ____that are cut from the distribution chain, the lower the product price.
Intermediaries
Which of the following began as an essential emergency military communications system operated by the US Dept. of Defense (DARPA)?
Internet
Which of the following began as an essential emergency military communications system operated by the US Dept. of Defense Advanced Research Project Agency (DARPA)?
Internet
What is government attempts to control Internet traffic, thus preventing some material from being viewed by a country's citizens?
Internet censorship
What is it called when government attempts to control Internet traffic, thus preventing some material from being viewed by a country's citizens?
Internet censorship
Managing global enterprise architectures is a key global IT challenge for the 21st century. What is included in the term global enterprise architectures?
Internet, intranet, extranet, & other telecommunication networks
Managing global enterprise architectures is a key global IT challenge for the 21st century. What is included in the term global enterprise architectures? Internet, intranet, economics, and politics Internet, intranet, extranet, and other telecommunication networks Internet, extranet, regulatory, and compliance All of these
Internet, intranet, extranet, and other telecommunication networks
A __________ is a session where employees meet, sometimes for several days, to define or review the business requirements for the system.
Joint application development
Which of the below statements is correct?
Just putting up a website does not create an ebusiness.
Which of the following is the key result from the highly publicized survey administered by the Institute for Citizen-Centered Services & the Institute for Public Administration in Canada?
Key drivers that directly impact online transaction are security & privacy
Which of the following is the key result of the highly publicized survey administered by the Institute for Citizen-Centered Services and the Institute for Public Administration in Canada?
Key drivers that directly impact online transactions are security and privacy.
What is a program, which installed on a computer, records every keystroke and mouse click?
Key logger software
What is the most common form of collective intelligence found inside the organization?
Knowledge Management (system)
Which system supports the capture, organization, & dissemination of knowledge throughout an organization?
Knowledge management system
What are wireless mobile content services that provide location-specific info to mobile users moving from location to location?
LBS (location based service)
Determining what is ethical can sometimes be difficult because certain actions can be justified or condemned depending on how you view the relationship between ___________.
Legal and ethical
Determining what is ethical can sometimes be difficult because certain actions can be justified or condemned depending on how you view the relationship between what is ________ and _______
Legal and ethical
Insiders
Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident
Dumpster Diving
Looking through people's trash
Which of the following is NOT a benefit of WiMAX?
Low bandwidth
Using the collective power of a community to identify & classify content significantly _____content categorization costs.
Lowers
Which of the following is the most common function outsourced?
MIS
What must managers be able to do to compete in today's global marketplace?
Make decisions to gain competitive advantages. Make decision that can help forecast future business needs. Make decision that can help forecast future business requirements.
What is a distractive agent
Malicious agents designed by spammers and other Internet attackers to farm email addresses off websites or deposit spyware on machines
What includes a variety of threats such as viruses, worms, and Trojan horses?
Malicious code
Jenny Welch works at a retail store selling sports equipment. Her daily tasks include opening the store, creating the work schedules, processing payroll, overseeing sales and inventory, and training employees. At what level of the organizational pyramid would you categorize Jenny?
Managerial
At which level of an organization are employees continuously evaluating company operations to hone the firm's abilities to identify, adapt to, and leverage change?
Managerial level
Challenges
Many challenges that must be confronted to succeed in a global business environment including: • Cultural • Political • Geo-economic (geographic and economic) Cultural business challenges include differences in... Languages • Cultural interests • Religions • Customs • Social attitudes • Political philosophies POLITICAL BUSINESS CHALLENGES • Numerous rules and regulations surrounding data transfers across national boundaries (especially personal information) • Tax implications • Hardware and software importing and exporting • Trade agreements Geoeconomic refers to the effects of geography on the economic realities of international business activities. Even with the Internet, telecommunications, and air travel, the sheer physical distances across the globe make it difficult to operate multinational business.
What is a website or web application that uses content form more than one source to create a completely new product or service?
Mashup
Nike offers people the opportunity to visit its website to create running shoes in the style & color they choose. How would you classify Nike's ebusiness strategy?
Mass Customization
What is the ability of an organization to tailor its products or services to the customers' specifications?
Mass Customization
Which company created several different websites to respond to sensitive cultural differences?
McDonalds
Which of the below is not a characteristic associated with Mozilla Firefox?
Mozilla Firefox is a prime example of a reputation system
What is the process within a genetic algorithm of randomly trying combinations and evaluating the success (or failure) of the outcome? A. Augmented reality B. Mutation C. Fuzzy logic D. Shopping bot
Mutation
What describes how products in a network increase in value to users as the number of users increase?
Network effect
What is a category of AI that attempts to emulate the way the human brain works? A. Intelligent system B. Artificial intelligence C. Expert systems D. Neural network
Neural network
Which of the below categories of AI is used extensively in the finance industry to analyze situations where the logic or rules are unknown? A. Expert system B. Virtual reality C. Neural network D. Genetic algorithm
Neural network
Which of the following is not a feature of a neural network? A. Neural networks can cope with huge volumes of information with many variables. B. Neural networks can function without complete or well-structured information. C. Neural networks can analyze linear relationships only. D. Neural networks can learn and adjust to new circumstance on their own.
Neural networks can analyze linear relationships only
What clause is typically contained in an acceptable use policy
Non-repudiation
Which of the following is not considered a type of biometrics?
None of the above face, iris, voice are all biometrics
Which of the following authentication methods is 100% accurate?
None of the above (nothing is 100%)
Which act strengthened criminal laws against identity theft?
None of these a. bork bill b. sarbanes-oxley act c. cable communnications act
Which of the following is NOT included in the 4 quadrants of ethical & legal behavior?
None of these a. illegal behavior & ethical behavior b. legal behavior and ethical behavior c. legal behavior & unethical behavior
What is a contractual stipulation that ensures that ebusiness participants do not deny their online actions?
Nonrepudiation
Which of the following is part of the acceptable use policy stipulations?
Not attempting to mail bomb a site
What is one of the guidelines an organization can follow when creating an information privacy policy?
Notice & disclosure
What is deperimeterization? Occurs when an organization moves employees outside its network Occurs when an organization moves partners and suppliers outside its firewall Occurs when an organization moves partners and suppliers outside its network Occurs when an organization moves employees outside its firewall
Occurs when an organization moves employees outside its firewall
Content Filtering
Occurs when organizations use software that filters content, such as emails, to prevent the accidental or malicious transmission of unauthorized information
What is software whose source code is available for free by any third party to review & modify?
Open Source
What is a system that consists of nonproprietary hardware & software based on publicly known standards that allows third parties to create add-on products to plug into or interoperate with the system?
Open system
___________ is a statistical process that finds the way to make a design, system, or decision as effective as possible, for example, finding the values of controllable variables that determine maximal productivity or minimal waste.
Optimization
Social Media Policy
Outlining the corporate guidelines or principles governing employee online communications
What are the first two lines of defense a company should take when addressing security risks?
People first, technology second
What is NOT a reason for the growth of decision-making information systems? People no longer have to worry about protecting the corporate asset of organizational information. People must apply sophisticated analysis techniques to make good decisions. People must make decisions quickly. People need to analyze large amounts of information.
People no longer have to worry about protecting the corporate asset of organizational information.
A company should be able to calculate the cost of downtime by which of the following?
Per hour, per day, and per week
What IT governance focus area puts structure around measuring business performance, such as a balanced scorecard, which uses both qualitative & quantitative measures?
Performance measures
Amazon creates a unique recommendation listing for each customer that revisits its website. How would you classify Amazon's ebusiness strategy?
Personalization
Which company had an employee's spouse load file-sharing software onto a company laptop creating a security hole that appears to have compromised the names and Social Security numbers 17,000 current and former employees? McDonalds Pfizer CloudNine Communications Apple
Pfizer
Which company has an employee's spouse load file-sharing software onto a company laptop creating a security hole that appears to have compromised the names and Social Security numbers of 17,000 current and former employees?
Pfizer
Imagine you accidentally mistype the URL for your bank and you are redirected to a fake website that collects your information. You have just been a victim of _________ identity theft.
Pharming
Which company is expecting to gain the majority of its returns on existing investments?
Phillips Petroleum
What is the difference between pirated and counterfeit software?
Pirated is the unauthorized use, duplication, distribution, or sale of copyrighted software, where counterfeit is software that is manufactured to look like the real thing and sold as such.
What is the unauthorized use, duplication, or sale of copyrighted software?
Pirated software
Which of the following describes the benefits of MIS governance?
Places structure around how organizations align IT strategy with business strategy. Ensures companies stay on track to achieve their strategies and goals. Implements good ways to measure IT's performance.
Epolicies
Policies and procedures that address information management along with the ethical use of computers and the Internet in the business environment
What clearly dominates as the primary problem hindering international telecommunication issues as reported by IT executives at 300 Fortune 500 multinational companies?
Political issues dominate
Which of the following is an example of sustaining technology?
Porsche's faster car
What is the right to be left alone when you want to be, to have control over your own personal possessions, & not to be observed without your consent?
Privacy
Which act restricts what information the federal government can collect?
Privacy Act
Which of the following is not one of the 5 focus areas from the IT Governance Institute?
Product delivery
Which of the following is not one of the five focus areas from the MIS Governance Institute?
Product delivery
What are the factors included in the global products category of global IT business drivers?
Products are the same world wide & global IT can help manage worldwide marketing, sales, & quality control
Which of the following is a challenge of sustaining technology?
Provides a product that does not meet existing customers' future needs
Many websites use _____ to constantly feed new to consumer instead of having the consumer search for the news.
RSS
What does RSS stand for?
Real Simple Syndication
Downtime
Refers to a period of time when a system is unavailable
What occurs when steps are added to the value chain as new players find ways to add value to the business process?
Reintermediation
What uses the Internet to reassemble buyers, sellers, & other partners in a traditional supply chain in new ways?
Reintermediation
eBay buyers voluntarily comment to other users & sellers on the quality of service, promptness of shipping, & their general satisfaction with the product. This is one of the most popular examples of user-generated content & is called a(n) ____.
Reputation system
Acceptable Use Policy (AUP)
Requires a user to agree to follow it to be provided access to corporate email, information systems, and the Internet
Pharming
Reroutes requests for legitimate websites to false websites
A company can reduce its costs by using ebusiness to change its business processes. Which of the following does not represent an example of how a company can reduce its costs through ebusiness?
Researching products to find the lowest price & visiting the store to purchase the item.
Spoofing is the forging of the ________ address on an email so that the email message appears to come from someone other than the actual sander
Return
Mail bomb
Sans a massive amounts of email tree specific person or system that can cause that users server to stop functioning
Which act protects investors by improving the accuracy & reliability of corporate disclosures?
Sarbanes-Oxley Act
What technology allows viewers in almost any location to select from hundreds of channels?
Satellite TV
Antivirus Software
Scans and searches hard drives to prevent, detect, and remove known viruses, adware, and spyware
What is encryption?
Scrambles info into an alternative form that requires a key or password to decrypt the info
Encryption
Scrambles information into an alternative form that requires a key or password to decrypt
Who finds hacking code on the Internet & click-and-points their way into systems to cause damage or spread viruses?
Script Kiddies
What is a programming method that provides for interactive modules to a website?
Scripting language
Which of the following is not considered an ePolicy?
Security badge policy
What is a component of Web 3.0 that describes things in a way that computer can understand?
Semantic web
What occurs in situations in which a few established processes help to evaluate potential solutions, but not enough to lead to a definite recommended decision?
Semistructured decisions
What is a mail bomb?
Sending a massive amount of email to a specific person or system resulting in filling up the recipient's disk space
What is a mail bomb?
Sending a massive amount of email to a specific person or system that can cause that user's server to stop functioning.
What is software that will search several retailer websites and provide a comparison of each retailer's offerings including prices and availability? A. Augmented reality B. Mutation C. Fuzzy logic D. Shopping bot
Shopping bot
What is the type of authentication that requires a user name and password?
Single-factor authentication
Tokens
Small electronic devices that change user passwords automatically
What is a device that is around the same size as a credit card, containing embedded technologies that can store info & small amounts of software to perform some limited processing?
Smart card
Which of the following is a program or devices that can monitor data traveling over a network?
Sniffer
_________is the process of monitoring and responding to what is being said about a company, indivdual, product, or brand.
Social Media monitoring
To find out your company policy regarding such a website that's YouTube, Facebook, and Twitter, you would have to refer to the __________ policy
Social media
Which of the following best describes Web 2.0?
Social media & user-generated web content
What is the process of monitoring and responding to what is being said about a company, individual, product, or brand
Social media monitoring
What is the practice of expanding your business & social contacts by constructing a personal network?
Social networking
Counterfeit Software
Software that is manufactured to look like the real thing and sold as such
Virus
Software written with malicious intent to cause annoyance or damage
What is the most costly & intrusive form of authentication?
Something that is part of the user such as a fingerprint or voice signature
Erik is the president & owner of Watch Out, a local website development company that helps clients create & build unique websites. Many of his daily tasks are heavily technical in nature & require a high level of computer programming & internet knowledge. Which of the below would Erik primarily use when performing his daily tasks?
Source code
What is the unsolicited email that plagues employees at all levels and glogs email systems
Spam
What is unsolicited email that plagues employees at all levels and clogs email system
Spam
What is the forging of the return address on an email so that the email message appears to come from someone other than the actual sender?
Spoofing
What is a special class of adware that collects data about the user in transmits it over the Internet without the users knowledge or permission
Spyware
Anti-Spam Policy
States that email users will not send unsolicited emails (or spam)
Which of the following best describes Web 1.0?
Static text-based information websites
Which of the following is not a component of a RFID architecture?
Store
Which of the following represents the 5 focus areas from the IT Governance Institute?
Strategic alignment, risk management, performance measures, resource management, value delivery
________________decisions are made frequently and are almost repetitive in nature; they affect short-term business strategies.
Structured
________ asks users to write lines of code to answer questions against a database?
Structured query language
Which social media site works by allowing content to find the users, instead of the users having to search for the content?
StumbleUpon
Which of the following produces an improved product customers are eager to buy, such as a faster car or larger hard drive?
Sustaining Technology
What is the overall process for developing information systems from planning and analysis through implementation and maintenance?
Systems development life cycle
Which of the following represents a brick-and-mortar business?
T. J. Maxx
What is the type of knowledge that is contained in people's heads?
Tacit knowledge
Many social media websites use ____ or specific keywords or phrases incorporated into website content for means of a classification or taxonomy.
Tags
Which of the following definitions represents physical security?
Tangible protection such as alarms, guards, fireproof doors, fences, and vaults.
Which of the below is NOT a characteristic of Business 2.0?
Technical skills are required
Cell phone manufacturers often refer to their products as mobile devices. Which of the below would not be included in the folksonomy for a cell phone?
Technology platform
What is a haptic interface? A. The viewing of the physical world with computer-generated layers of information added to it. B. A wearable computer with an optical head-mounted display (OHMD). C. Technology that allows humans to interact with a computer through bodily sensations and movements. D. A work environment that is not located in any one physical space.
Technology that allows humans to interact with a computer through bodily sensations and movements
What is a framework provided by the government of the United Kingdom and offers eight sets of management procedures: (1) service delivery, (2) service support, (3) service management, (4) Information and Communication Technology (ICT) infrastructure management, (5) software asset management, (6) business perspective, (7) security management, and (8) application management?
The Information Technology Infrastructure Library
Which act restricts what information the federal government can collect?
The Privacy Act
Which act protects investors by improving the accuracy and reliability of corporate disclosures?
The Sarbanes-Oxley Act
Different organizations and countries have their own terms for fair information practices. Which of the following is correct?
The United Kingdom terms it "Data Protection."
Ediscovery
The ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry
What statement below describes Web 3.0's feature that ensures the "integration of legacy devices"?
The ability to use current devices such as iPhones & laptops as credit cards or tickets
What is click-fraud?
The abuse of pay-per-click, pay-per-call, and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser.
Information Compliance
The act of conforming, acquiescing, or yielding information
Confidentially
The assurance that messages and information remain available only to those authorized to view them
Legal behavior and ethical behavior, illegal behavior but ethical behavior, legal behavior but unethical behavior, Illegal behavior and unethical behavior
The four quadrants of ethical and legal behavior
Biometrics
The identification of a user based on a physical characteristic, such as fingerprint, iris, face, voice, or handwriting
What are the factors included in the global collaboration category of global IT business drivers?
The knowledge & expertise of colleagues in a global company can only be accessed, shared, & organized by global IT systems
Copyright
The legal protection afforded And expression of an idea, such as a song, book, or video game
Copyright
The legal protection afforded an expression of an idea, such as a song, book, or video game
Ethics
The principles and standards that guide our behavior toward other people
Authorization
The process of providing a user with permission including access levels and abilities such as file access, hours of access, and amount of allocated storage space
Privacy
The right to be left alone when you want to be, to have control over your personal possessions, and not to be observed without your consent
Which statement below is incorrect?
The semantic web captures, organizes, & disseminates knowledge (i.e. know-how) throughout an organization.
What is a business requirement?
The specific business requests the system must meet to be successful.
Pirated Software
The unauthorized use, duplication, distribution, or sale of copyrighted software
What is augmented reality? A. The viewing of the physical world with computer-generated layers of information added to it. B. A wearable computer with an optical head-mounted display (OHMD). C. Uses technology allowing humans to interact with a computer through bodily sensations and movements. D. A work environment that is not located in any one physical space.
The viewing of the physical world with computer-generated layers of information added to it
What do cargo transport systems, book distribution centers, the video game market, a flu epidemic, and an ant colony have in common? A. They are all expert systems and thus share some characteristics. B. They are all genetic algorithm systems and thus share some characteristics. C. They are all neural network systems and thus share some characteristics. D. They are all complex adaptive systems and thus share some characteristics.
They are all complex adaptive systems and thus share some characteristics
Artificial intelligence simulates human thinking and behavior, such as the ability to reason and learn. What is the ultimate goal of AI? A. To build an intelligent system. B. To build an intelligent agent. C. To build a system that can mimic human intelligence. D. To build a system that can mimic an expert agent.
To build a system that can mimic human intelligence
Information Technology Monitoring
Tracks people's activities by such measures as number of keystrokes, error rate, and number of transactions processed
. Identity theft is the forging of someone's identity for the purpose of frauD.
True
A certificate authority is a trusted third party, such as VeriSign, that validates user identities by means of digital certificates.
True
A dynamic process continuously changes and provides business solutions to ever-changing business operations. True False
True
A sparkline is a small embedded line graph that illustrates a single trend. Sparklines are often used in reports, presentations, dashboards, and scoreboards. They do not include axis or labels; context comes from the related content. True False
True
A time-series chart is a graphical representation showing change of a variable over time. Time-series charts are used for data that changes continuously, such as stock prices. They allow for a clear visual representation of a change in one variable over a set amount of time. True False
True
An algorithm refers to a set of instructions that completes a task. True False
True
Benchmarks re baseline values the system seeks to attain. True False
True
Big data is a collection of large, complex data sets, including structured and unstructured data, that cannot be analyzed using traditional database methods and tools.
True
Biometrics is the identification of a user based on a physical characteristic, such as a fingerprint, iris, face, voice, or handwriting.
True
Classification analysis assigns information or data into one of a predefined set of classes.
True
Core processes are business processes, such as manufacturing goods, selling products, and providing services that make up the primary activities in a value chain. True False
True
Granularity refers to the level of detail in the model or the decision-making process. True False
True
Key performance indicators can focus on external and internal measurements. True False
True
Machine learning is a type of artificial intelligence that enables computers to both understand concepts in the environment, and also to learn. True False
True
Multifactor authentication requires more than two means of authentication such as what the user knows (password), what the user has (security token), and what the user is (biometric verification).
True
One of the most important and challenging questions confronting managers today is how to lay the foundation for tomorrow's success while competing to win in today's business environment. True False
True
One of the most important and challenging questions confronting managers today is how to lay the foundation for tomorrow's success while competing to win in today's business environment. True False
True
Open source and sharing are both advantages and disadvantages of Business 2.0.
True
The goal of multifactor authentication is to make it difficult for an unauthorized person to gain access to a system because, if one security level is broken, the attacker will still have to break through additional levels.
True
Two-factor authentication requires the user to provide two means of authentication, what the user knows (password) and what the user has (security token).
True
What is a problem that occurs when someone registers purposely misspelled variations of well-known domain names
Typo squatting
What is a problem that occurs when someone registers purposely misspelled variations of well-known domain names?
Typosquatting
What is a service that enables instant or real-time communication between people?
URL
Which of the following terms could you use to synonymously when referring to the web?
URL (Universal Resource Locator), domain name
Spam
Unsolicited email
What types of business decisions would an EIS use AI for? A. Semistructured decisions B. Multistructured decisions C. Structured decisions D. Unstructured decisions
Unstructured decisions
Included in the information security policy, managers should consider including virus protection, which includes how often the system should be scanned and how frequently the software should be __________.
Updated
What is one of the major problems with email?
User's expectation of privacy
What do Netflix & Amazon use to drive their recommendation tools?
User-generated content
What is advanced analytics?
Uses data patterns to make forward-looking predictions to explain to the organization where it is headed.
Public Key Encryption (PKE)
Uses two keys: a public key that everyone can have and a private key for only the recipient
What is social engineering?
Using one's social skills to trick people into revealing access credentials or other info valuable to the attacker
Black hat, script Kiddles, cracker
Valid types of hackers
Black hat, back door, script kiddles , polymorphic, cracker, and Trojan horse
Valid types of viruses
What IT governance focus area ensures the IT department delivers the promised benefits for every project or investment? Strategic alignment Risk management Resource management Value delivery
Value delivery
Bob Silver loves playing a game called World of Warcraft where he has the capability to create his own character and even his own life-like environment. Which AI system would you categorize World of Warcraft? A. Multi-agent system B. Expert system C. Virtual reality D. Fuzzy logic system
Virtual reality
What is a computer-simulated environment that can be a simulation of the real world or an imaginary world? A. Virtual reality B. Augmented reality C. Virtual workforce D. All of these
Virtual reality
What is the one of the most common forms of computer vulnerabilities that can cause massive computer damage?
Virus
Which of the below would not be considered a company operating in the long tail of a typical sales curve?
Walmart
Child online protection act (COPA)
Was passed to protect minors from accessing inappropriate material on the Internet
Requiring computer users to log off before leaving for lunch, never sharing user or password information with anyone, changing passwords every 30 days
Ways to maintain information security that a company should include in their information security policies
Which statement below is inaccurate?
Web 2.0 is a simple static website without any interaction with its user
Which of the below is not a characteristic of Business 2.0?
Web Browser
What is the theft of a website's name that occurs when someone, posing as a site's administrator, changes the ownership of the domain name assigned to the website to another website owner?
Website name stealing
What key questions should IT governance answer? How the finance department is functioning overall? What key metrics management requires? What return the business is getting from its personnel investment? All of these.
What key metrics management requires?
Jensen is a senior developer for HackersRUs, a company that helps secure management information systems. Jensen's new task is to break into the computer system of one of HackersRUs' top clients to identify system vulnerabilities and plug the holes. What type of hacker is Jensen?
White-hat hacker
Who works at the request of the system owners to find system vulnerabilities & plug the holes?
White-hat hackers
What is a telecommunications technology aimed at providing wireless data over long distances in a variety of ways, from point-to-point links to full mobile cellular type access?
WiMAX
What are the 2 components of a WiMAX system?
WiMAX tower, WiMAX receiver
What technology enables wireless networks to extend as far as 30 miles & transfer information, voice, & video at faster speeds than cable?
WiMAX wireless broadband
What technology enables wireless networks to extend as far as 30 miles and transfer information, voice, and video at faster speeds than cable?
WiMAX wireless broadband
Which of the following is a question a company should ask when creating a global website?
Will the site require new navigational logic to accommodate cultural preference?; Will content be translated?; Which country will the server be located in to support local user needs?
What refers to any type of electrical or electronic operation that is accomplished without the use of "hard-wired" connection?
Wireless
What technology uses radio waves rather than wires to transmit information across a local area network?
Wireless local area network
What is a type of virus that spreads itself, not just file to file, but from computer to computer?
Worm
What is a failover?
a backup operational mode in which the functions of a computer component (such as a processor, server, network, or database) is assumed by secondary system components when the primary component becomes unavailable through either failure or scheduled down time
What is the diference between a business model and an ebusiness model?
a business model details how a company creates, delivers, and generates revenue. An ebusiness model does all of the same except on the Internet
neural networks
a category of AI that attempts to emulate the way the human brain works
digital dashboard
a common tool that supports visualization; tracks KPIs and CSFs by compiling information from multiple sources and tailoring them to meet user needs
What is Mozilla Firefox?
a competitor to Internet Explorer
What is competitive click-fraud?
a computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link
What is a global positioning system (GPS)?
a constellation of 24 well-spaced satellites that orbit the Earth & make it possible for people with ground receivers to pinpoint their geographic location
business process model
a graphic description of a process showing the sequence of process tasks, which is developed for a specific purpose and from a selected viewpoint
What is a project milestone?
a key date by which a certain group of activities must be performed
What is wireless fidelity?
a means of linking computers using infrared or radio signals
Which of the choices below represents the definition of information governance?
a method or system of government for information management or control
Governance
a method or system of government for management or control IT Governance Institute Five focus areas: 1. Strategic alignment: Linking business and IT so they work well together. True alignment can occur only when the corporate side of the business communicates effectively with IT leaders about costs, reporting, and impacts. 2. Risk management: Instituting a formal risk framework that puts some rigor around how IT measures, accepts, and manages risk. 3. Performance measures: Putting structure around measuring business performance, such as a balanced scorecard, which uses both qualitative and quantitative measures. 4. Resource management: Managing resources more effectively and efficiently. This allows organizations to deploy employees to various projects on a demand basis. 5. Value delivery: Ensuring the IT department delivers the promised benefits for every project or investment.
Which of the following clauses is typically contained in an acceptable use policy?
a nonrepudiation clause
Which of the following definitions represents typosquatting?
a problem that occurs when someone registers purposely misspelled variations of well-known domain names
benchmarking
a process of continuously measuring system results, comparing those results to optimal system performance, and identifying steps and procedures to improve system performance; helps asses how an MIS project performs over time
What is a SOA service?
a simple business task
shopping bot
a software that will search several retailer websites and provide a comparison of each retailer's offerings including price and availability (think Progressive)
sensitivity analysis
a special case of what-if analysis; the study of the impact on other variables when one variable is changed REPEATEDLY; useful when users are uncertain about the assumptions made in estimating the value of certain key variables
intelligent agent
a special-purpose knowledge-based information system that accomplishes specific tasks on bahalf of its users (the "Sherlock Holmes" for an information search agent)
executive information system (EIS)
a specialized DSS that supports senior-level executives and unstructured, long-term, nonroutine decisions requiring judgement, evaluation, and insight. (Not thought of as right and wrong, but instead as efficient and effective answers)
What is digital rights management?
a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution
What is Bluetooth?
a telecommunications industry specification that descries how mobile phones, computers, & personal digital assistants (PDAs) can be easily interconnected using a short-range wireless connection
What is trend analysis?
a trend is examined to identify its nature, causes, speed of development, and potential impacts
Which of the following is the most uncommon reason why companies outsource?
better manage the costs of internal processes
What is a collection of large, complex data sets, including structured and unstructured data, which cannot be analyzed using traditional database methods and tools?
big data
_________ is a hacker who breaks into other people's computer systems and may just look around or steal and destroy information.
black-hat hacker
Where is the position of IT infrastructure within the organization?
bottom
What is a policy that allows employees to use their personal mobile devices and computers to access enterprise data and applications?
bring your own device
A company's internal wiki can be a great tool for all of the following except...?
building software applications
What is information collected from multiple sources such as suppliers, customers, competitors, partners, and industries that analyzes patterns, trends, and relationships for strategic decision making?
business intelligence
What are the four global IT business management areas critical to running multinational companies?
business strategies, enterprise architectures, information issues, systems development
Ecommerce?
buying and selling of goods or service online
How would a company like Flickr use social tagging on its website?
by allowing users to upload images and tag the images with their own key words
How do decision-making information systems work? by building models out of organizational information to lend insight into important business issues and opportunities by building models out of analytical information only to lend insight into important business issues and opportunities None of these are correct. by building models out of transactional information only to lend insight into important business issues and opportunities
by building models out of organizational information to lend insight into important business issues and opportunities
What determines the future environmental infrastructure requirements to ensure high-quality system performance?
capacity planning
Which of the following is not one of Whole Foods' four separate organizational hierarchies? facilities employment regional offices centralized employment global headquarters
centralized employment
what-if analysis
checks the impact of a change in a variable or assumption on the model
The _________ Online Protection Act was passed to protect minors from accessing inappropriate material on the Internet.
child
Which of the following definitions represents opt-out?
choosing to deny permission to incoming emails.
Which of the following forms of data mining assigns records to one of a predefined set of classes?
classification
________ is a form of data mining that assigns records to one of a predefined set of classes.
classification
What type of Internet monitoring technique records information about a customer during a web surfing session, such as what websites were visited and how long the visit was, or what ads were viewed and what was purchased
click stream
Which type of ebusiness model is Barnes and Noble using?
click-and-mortar
What is the abuse of pay-per-click, pay-per-call, and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser?
click-fraud
What is the exact pattern of a consumer's navigation through a site?
clickstream data
What refers to resources and applications hosted remotely as a shared service over the Internet?
cloud computing
market share
common external KPI; the proportion of the market that a firm captures; calculated by dividing the firm's sales bu the total market sales for the entire industry
Asynchronous communication?
communication that does not occur at the same time
Synchronous communication?
communication that occurs at the same time
What is a computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link?
competitive click-fraud
What is a computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link?
competitive click-freud
What is the act of conforming, acquiescing, or yielding?
compliance
expert systems
computerized advisory programs that imitate the reasoning processes of experts in solving difficult problems; most common form of AI
In relation to privacy, which of the following is the assurance that messages and information remain available only to those authorized to view them?
confidentiality
Which of the following is one of the primary reasons for the increase in Internet use?
connectivity technology
Internet marketers must develop ______ _____to build strong relationships with customers to ensure loyalty?
consumer trust
What is an RFID tag?
contains a microchip & an antenna
What are the technologies available to help prevent & build resistance to attacks?
content filtering, encryption, firewalls
Which of the following is not considered an advantage of a content management system?
content management systems increase order entry speed
What are the 4 most common Business 2.0 characteristics?
content sharing through open source, user-contributed content, collaboration inside the organization, & collaboration outside the organization.
Websites sometimes deposit on a customer's hard drive a small file containing information about the customer and the customer's web activities. What is that small file called?
cookie
What is the legal protection afforded an expression of an idea, such as a song, book, or video game?
copyright
examples of CSFs
create high-quality retain competitive advantages reduce product costs increase customer satisfaction higher and retain the best business professionals
Whole Foods stated it strives to provide the highest quality natural and organic product available. This is an example of a(n) _________. critical success factor efficiency MIS metric key performance indicator effectiveness MIS metric
critical success factor
What are the two core metrics?
critical success factors (CSFs) and key performance indicators (KPIs)
critical success factors (CSFs)
crucial steps companies perform to achieve their goals and objectives and implement their strategies
What are the 3 primary challenges facing global businesses?
cultural; political; geoeconomic
What are the factors included in the global customer's category of global IT business drivers?
customers who travel anywhere or companies with global operations and global IT systems help provided fast, convenient, homogeneous service
What includes threats, negative remarks, or defamatory comments transmitted via the Internet or posted on the website?
cyberbullying
What type of mediation refers to the creation of new kinds of intermediaries that simply could not have existed before the advent of ebusiness?
cybermediation
Who are individuals that seek to cause harm to people or to destroy critical systems or information and use the Internet as a weapon of mass destruction?
cyberterrorists
What is the electronic defacing of an existing website?
cybervandalism
What is the ultimate outcome of a data warehouse?
data marts
Which of the following tools use a variety of techniques to find patterns and relationships in large volumes of information that predict future behavior and guide decision making?
data-mining
Which of the following is not one of the primary information technology areas on which organizations are focusing?
database
_________ maintains information about various types of objects, events, people, and places.
database
Whole Foods' organizational structure is ______________ and the majority of decisions are made by the ___________. decentralized, regional managers centralized, executives pyramid, executives pyramid, regional managers
decentralized, regional managers
Which of the following is not part of a typical SOA solution?
decrease people productivity with better business integration
What is a geographic information system (GIS)?
designed to work with info that can be shown on a map
Which of the following is not a cultural business challenge?
differences in architectures
Which of the following is NOT one of the Internets' impacts on information?
digital divide
Which of the following serves as key evidence in many legal cases today and also provides a faster, easier way to search and organize paper documents?
digital information
What is any paper that is optimized for any type of digital printing?
digital paper
What is a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution?
digital rights management
What are the 2 categories that include intellectual and knowledge-based assets?
explicit and tacit knowledge
optimization analysis
extension of goal-seeking analysis; finds the OPTIMUM value for a target variable by repeatedly changing other variables, subject to specific constraints
What is the confirmation or validation of an event or object?
fact
What is a general term for a set of standards governing the collection and use of personal data and addressing issues of privacy and accuracy?
fair information practices
Single-factor authentication requires the user to provide two means of authentication, what the user knows (password) and what the user has (security token).
false
Which of the following is a benefit a business can receive by deploying the latest in security technology?
fewer disruptions to organizational systems; increased productivity of employees; greater advances in administration
business process management (BPM) systems
focus on evaluating and improving processes that include both person-to-person workflow and system-to-system communications
What is the term that is similar to taxonomy except that crowd-sourcing determines the tag or keyword-based classification system?
folksonomy
customer-facing processes
front-office processes; result in a product or service received by an organization's external customer; examples: fulfilling orders, communicating with customers, sending out bills and marketing information
What refers to the effects of geography on the economic realities of international business activities?
geoeconomic
What are the 4 global IT business driver that should be included in all global IT business strategies?
global customers, global products, global operations & resources, global collaboration
Which of the following is an example of Whole Foods' MIS effectiveness metrics? quick response time of systems quick transaction speed for cash registers high customer satisfaction high system availability
high customer satisfaction
Which of the following is an example of Whole Foods' MIS efficiency metrics? easy to use systems high system availability high conversion rates of customers high customer satisfaction
high system availability
Which type of metric measures when a visitor reaches a website and their computer sends a request to the site's computer server to begin displaying pages?
hit metric
What is a separate and fully equipped facility where the company can move immediately after a disaster and resume business
hot site
What type of backup strategy would you recommend to an organization that deals with large volumes of critical information?
hourly
Which of the following is the least common function outsourced?
human resources
What are the 4 challenges facing ebusinesses outlined in the text?
identifying limited market segments, managing consumer trust, ensuring consumer protection, and adhering to taxation rules
Which of the following is not a privacy issues associated with location based info?
identity theft
streamlinig
improves business process efficiencies by simplifying or elimiates unnecessary steps
In terms of big data what is variety?
includes different forms of structured and unstructured data.
enterprise architecture
includes the plans for how an org will build, deploy, use and share its data, processes and MIS assets
workflow
includes the tasks, activities and responsibilities required to execute each step in a business process
Which of the following is a benefit an organization can receive from outsourcing?
increased technical abilities; financial savings; market agility
Which of the following is a reason why businesses want to have the appropriate levels of authentication, access control, and encryption?
individuals cannot understand or alter information while in transit; only authorized individuals can access applications for which they are entitled; only authorized individuals can gain access to the network
Which of the following are the influential driver(s) affecting the growth of outsourcing markets?
industry changes; rapid growth; core competencies
What can present the results of large data analysis looking for patterns and relationships that monitor changes in variables over time?
infographics
Which of the following governs the ethical and moral issues arising from the development and use of information technologies, and the creation, collection, duplication, distribution, and processing of information?
information ethics
Which of the following occurs when a system produces incorrect, inconsistent, or duplicate data?
information integrity issue
Which of the following examines the organizational resource of information and regulates its definitions, uses, value, and distribution ensuring it has the types of data or information required to function and grow effectively?
information management
Which policy contains general principles regarding information privacy?
information privacy policy
efficiency MIS metrics
measure the performance of MIS itself, such as throughput, transaction speed and system availability; focuses on the extent to which a firm is using its resources in an optimal way
What measures the number of people a firm can communicate with all over the world?
information reach
What is the depth and breadth of details contained in a piece of textual, graphic, audio, or video?
information richness
What is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity?
information secrecy
According to the ethical computer use policy, users should be ___ of the rules and, by agreeing to use the system on the basis, ___ to abide by the rules.
informed; consent
According to the ethical computer use policy, users should be ________ of the rules and, by agreeing to use the system on that basis, ________ to abide by the rules
informed; consent
According to the ethical computer use policy, users should be ______________ of the rules and, by agreeing to use the system on that basis, _______________ to abide by the rules.
informed; consent
source documents
input for a TPS; the original transaction record
risk management
instituting a formal risk framework that puts some rigor around how IT measures, accepts and manages risk
Intellectual property is _________________ creative work that is embodied in physical form and includes copyrights, trademarks, and patents.
intangible
What verifies that separate systems can work together passing data back and forth correctly?
integration testing
Which report presents data that is distributed inside the organization and is intended for employees within an organization?
internal reports
What is a world where interconnected, Internet-enabled devices or "things" can collect and share data without human intervention?
internet things
governance
is a method or system of governmetn for management or control
Which of the following would not be considered part of the unique characteristic of high-quality information?
is aggregate information in agreement with detailed information?
compliance
is the act of conforming, acquiescing or yielding
What is extraction, transformation, and loading?
it is a process that extracts information from internal and external databases, transforms it using a common set of enterprise definitions, and loads it into a data warehouse.
All of the following jobs will be increasingly performed by robots, except...?
jobs performed by scientists, engineers, and technicians
Which of the below statements is correct?
just putting up a website does not create an ebusiness
What kind of society is being created by the growth in information industries?
knowledge-dependent global society
swim lane
layout arranges the steps of a business process into a set of rows depicting the various elements
Determining what is ethical can sometimes be difficult because certain actions can be justified or condemned depending on how you view the relationship between ________ and ________.
legal and ethical
Determining what is ethical can sometimes be difficult because certain actions can be justified or condemned depending on how you view the relationship between _____ and ________.
legal; ethical
strategic alignment
linking business and IT so they work well together; can occur only when the corporate side of the business communicates effectively with IT leaders about costs, reporting and impacts
Using the collective power of a community to identify and classify content significantly _______ content categorization costs?
lowers
What is data created by a machine without human intervention?
machine-generated data
What sends massive amounts of email to a specific person or system that can cause that user's server to stop functioning?
mail bomb
What includes a variety of threats such as viruses, worms, & Trojan horses?
malicious code
MIS is a business function, like accounting or sales, which moves information about people, products, and processes across the company to facilitate decision making and problem solving. What does MIS stand for?
management information system
decision support systems (DSSs)
managerial; model information using OLAP, which provides assistance in evaluation and choosing among different courses of action
Which of the following is a challenge facing an ebusiness?
managing consumer trust
resource management
managing resources more effectively and efficiently. this allows orgs to deploy employees to various projects on a demand basis
business process modeling
mapping; is the activity of creating a detailed flowchart or process map of a work process that shows its inputs, tasks and activities in a structured sequence
What is a website or web application that uses content from more than one source to create a completely new product or service?
mashup
What is the practice of gathering data and ensuring that it is uniform, accurate, consistent, and complete, including such entities as customers, suppliers, products, sales, employees, and other critical entities that are commonly integrated across organizational systems?
master data mangement
fuzzy logic
mathematical method of handling imprecise or subjective information
effectiveness MIS metrics
measure the impact MIS has on business processes and activities, including customer satisfaction and customer conversion rates; focuses on how well a firm is achieving its goals and objectives
genetic algorithm
mimics the evolutionary, survival-of-the-fittest process to generate increasingly better solutions to a problem
How would you categorize mobile entertainment, mobile sales, mobile ticketing, and mobile banking?
mobile business; mcommerce; mbusiness
What is the ability to purchase goods and services through a wireless Internet-enabled device?
mobile commerce
Which of the following is not a technology company but used technology to revamp the business process of renting videos?
netflix
Which of the following reflects Moore's Law?
new generations of chips deliver double the processing power as the previous generation
. Which of the following terms refers to a contractual stipulation to ensure that ebusiness participants do not deny their online actions?
nonrepudiation
A(n) ___________clause is tyically contained in an acceptable use policy.
nonrepudiation
What is an anti-spamming approach whereby the receiving computer launches a return attack against the spammer, sending email messages back to the computer that originated the suspected spam?
nonrepudiation
. Users would agree to all of the following in a typical acceptable use policy except ________.
not posting commercial messages to groups where the employee has received user consent
. What is one of the guidelines an organization can follow when creating an information privacy policy?
notice and disclosure
What does 50% of what a student learns about innovative technology in their freshman year of college become by their senior year?
obsolete; taken for granted; revised
semistructured decisions
occur in situations in which a few established processed help to evaluate potential solutions, but not enough to lead a definite recommended decision
What are transborder data flows?
occur when business data flows across international boundaries over the telecommunications networks for global information systems
trans-border data flows
occur when business data flows across international boundaries over the telecommunications networks of global info system
Transborder Data Flows
occur when business data flows across international boundaries over the telecommunications networks of global information systems Many countries view TDF as violating their national sovereignty
unstructured decision
occurring in situations in which no procedures or rules exist to guide decision makers toward correct choice
deperimeterization
occurs when an org moves employees outside its firewall, a growing movement to change the way corporations address technology security
What is deperimeterization?
occurs when an organization moves employees outside its firewall
Deperimeteriazation
occurs when an organization moves employees outside its firewall, a growing movement to change the way corporations address technology security
What are transborder data flows?
occurs when business data flows across international boundaries over the telecommunications networks for global information systems
redundancy
occurs when task or activity is unnecessarily repeated; example: if both sales and accounting department check customer credit
structured decision
operational decisions, arise in situations where established processes offer potential
transaction processing system
operational; the basic business system that assists in making structured decisions; most common example is payroll system
Which department manages the process of converting or transforming resources into goods or services?
operations management
What refers to choosing to allow permissions to incoming emails?
opt in
What occurs when a person chooses to deny permission to incoming emails?
opt out
What refers to denying permissions to incoming emails?
opt out
Which of the following is one of the new series of business success factors and challenges that are helping to determine marketplace winners and losers?
organization agility; instantaneous business response; a focus on core competencies and processes
What does digital Darwinism imply?
organizations that cannot adapt to the new demands placed on them for surviving in the information age are doomed to extinction
What is a potential problem or impact of technology dependence?
outages create potentially great havoc for people, businesses, and educational institutions that rely heavily on technology; many have a need to be continuously connected for every activity, which potentially eliminates crucial in-person social skills and could stunt psychological growth; how do people or businesses function if the connection is down?
What is an arrangement by which one organization provides a service or services for another organization that chooses not to perform them in-house?
outsourcing
Which trend has the following potential business impact: The time to get products and services to market is being shortened by technology?
pace of technological innovation is increasing
What occurs when a new radical form of business enters the market that reshapes the way companies and organizations behave?
paradigm shift
Which implementation uses both the legacy system and new system until all users verify that the new system functions correctly?
parallel implementation
What is the recommended way to implement info security lines of defense?
people first, technology second
What measures how quickly a system performs a certain process or transaction in terms of efficiency IT metrics of both speed and throughput?
performance
Amazon creates a unique recommendation listing for each customer that revisits its website. How would you classify Amazon's ebusiness strategy?
personalization
Netflix creates a unique recommendation listing for each customer that revisits its website. How would you classify Netflix's ebusiness strategy?
personalization
Sophie Black works as a computer programmer for a software company. Her boss, Mike Jones, is responsible for developing a new software game for the Wii. After completion of the project, Mike gives all of the team members a free copy of the game without consent from the company. Sophie is a little hesitant and unsure about accepting the game because legally it would be considered ________.
pirated software
What is the unauthorized use, duplication, distribution, or sale of copyrighted software? A. ediscovery
pirated software
Companies use ________ as marketing communication channels, discussing everything from corporate strategies to detailed product overviews?
podcasting
What converts an audio broadcast for use by a digital music player?
podcasting
What is the number 1 reason that IT projects fall behind schedule or fail?
poor planning or poor project management
How would the technology industry use business intelligence?
predict hardware failures
Information _________ concerns the legal right or general expectation of individuals, groups, or institutions to determine for themselves when and to what extent information about them is communicated to others.
privacy
Which of the following means the right to be left alone when you want to be, to have control over your personal possessions, and not to be observed without your consent?
privacy
Which of the following is an outsourcing challenge caused by contract length?
problems in foreseeing future issues; difficulties in getting out of a contract; problems in reforming an internal IT department
visualization
produces graphical displays of patterns and complex relationships in large amounts of data
What is the rate at which goods and services are produced based upon total output given total inputs?
productivity
Which data types are typically found in the marketing department?
promotion data, sales data, advertising data.
What is the primary business advantage of using email?
providing the ability to inform and communicate with many people simultaneously, immediately, and with ease
Which type of ebusiness model is Amazon using?
pure-play
performance measures
putting structure around measuring business performance, such as balanced scorecard, which uses both qualitative and quantitative measures
When studying the figure of the four quadrants of ethical and legal behavior, the goal is for organizations to make decisions in which of the following quadrants?
quadrant I
What uses active or passive tags in the form of chips or smart labels?
radio frequency identification
What is immediate, up-to-date information?
real-time information
What is ediscovery?
refers to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry
geoeconomic
refers to the effects of geography on the economic realities of international business activities
granularity
refers to the level of detail in the model or the decision-making process; greater granularity means greater detail granularity, visualization, digital dashboard
What uses the Internet to reassemble buyers, sellers, and other partners in a traditional supply chain in new ways?
reintermediation
Which of the following systems allows users to create, read, update, and delete data in a relational database?
relational database management system
What ensures all systems are functioning correctly and providing accurate information?
reliability
as-is process model
represents the current state of the operation that has been mapped, without any specific improvements or changes to existing processes
eBay buyers voluntarily comment to other users and sellers on the quality of service, promptness of shipping, and their general satisfaction with the product. This is one of the most popular examples of user-generated content and is called a...?
reputation system
bottlenecks
resources reach full capacity and cannot handle any additional demands; they limit throughput and impede operations
Spoofing is the forging of the _________ address on an email so that the email message appears to come from someone other than the actual sender.
return
goal-seeking analysis
reverse of what-if analysis; finds the inputs necessary to achieve a goal e.g. desired level of outputs
What is a component of Web 3.0 that describes things in a way that computers can understand?
semantic web
What is a mail bomb?
sending a massive amount of email to a specific person or system resulting in filling up the recipient's disk space
What is a business-driven IT architectural approach that supports organizational computing needs with utility-based computing concepts?
service oriented architecture
What are the key technical concepts of SOA?
services, interoperability, loose coupling
What is the simplest example of an intelligent agent?
shopping bot
to-be process model
show the results of applying change improvement to the current process model
artificial intelligence
simulates human thinking and behavior e.g. the ability to reason and learn
Which of the following represents the classic example of unintentional information reuse?
social Security number
To find out your company's policy regarding such websites as YouTube, Facebook, and Twitter, you would have to refer to the ________ policy.
social media policy
What is the practice of expanding your business and social contacts by constructing a personal network?
social networking
Which of the following is not a topic or feature that is included in Web 3.0?
social networking
Which of the following represents the classic example of unintentional information reuse?
social security number
What is a model of software deployment, where an application is licensed for use as a service, provided to customers on-demand?
software as a service
Adware
software that, while purporting to serve some useful function and often fulfilling that function, also allows Internet advertisers to display advertisements without the consent of the computer user
Which of the below statements is accurate when considering the ebusiness challenge of adhering to taxation rules?
some online companies have to charge sales tax
What is unsolicited email that plagues employees at all levels and clogs email systems?
spam
What is a special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission?
spyware
What is another name for an eshop?
store or etailer
Which data type has a defined length, type, and format and includes numbers, dates, or strings such as customer address?
structured data
Large wikis, such as Wikipedia, can protect the quality and accuracy of their information by assigning users roles such as...?
subject matter expert; reader; editor
All of the following are forms of ebusiness except...?
subscription fee
Which of the following produces an improved product, customers are eager to buy, such as a faster car or larger hard drive?
sustaining technology
What is the ability to present the resources of a single computer as if it is a collection of separate computers, each with its own virtual CPUs, network interfaces, storage, and operating system?
system virtualization
What is the type of knowledge that is contained in people's heads?
tacit knowledge
Which of the following is the primary reason why companies outsource?
tap outside sources of expertise
Which of the following is a type of backup/recovery media?
tape; disk; DVD
What is a well-planned strategy that ensures the search and navigation functions are easy to use and user-friendly on a website?
taxonomy
Cell phone manufactures often refer to their products as mobile devices. Which of the below would not be included in the folksonomy for a cell phone?
technology platform
What is the blending of computers and wireless telecommunications technologies with the goal of efficiently conveying information over vast networks to improve business operations?
telematics
project
temporary activity a company undertakes to create a unique product, service or result
Why is the global economy becoming more integrated?
the Internet; international outsourcing; relaxed borders in the EU
What is recovery?
the ability to get a system up and running in the event of a system crash; the ability to get a system up and running in the event of a system failure; restoring the information backup
What statement below describes Web 3.0's feature that ensures the "integration of legacy devices"?
the ability to use current devices such as iPhones and laptops as credit cards or tickets
What is click-fraud?
the abuse of pay-per-click, pay-per-call, and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser
Compliance
the act of conforming, acquiescing, or yielding
Which of the choices below represents the definition of information compliance?
the act of conforming, acquiescing, or yielding information
The factor that significantly contributed to people's needs to use information systems to make decisions is ______. the amount of information people must understand to make good decisions is increasing exponentially. impossible to answer because it depends on the industry. the amount of information people must understand to make good decisions has remained unchanged. the amount of information people must understand to make good decisions is decreasing exponentially.
the amount of information people must understand to make good decisions is increasing exponentially.
online transaction processing (OLTP)
the capture of transaction and event information using technology to process the information according to defined business rules, store the information and update existing information to reflect the new information
What is information secrecy?
the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity
Which of the choices below represents the definition of information secrecy?
the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity
If you were thinking about a washing machine as a system, which of the following represents the outputs?
the clean clothes
Employees need to understand that email privacy exists to an extent and that corporate email is solely owned by ________.
the company
Employees need to understand that email privacy exists to an extent and that corporate email is solely owned by _________.
the company
Which of the following is not a potential business impact from people in developed countries living longer?
the cost of health care will decrease
What does the disaster recovery cost curve chart?
the cost to the organization of recovering from a disaster over time; the cost to the organization of the unavailability of technology; the cost to the organization of the unavailability of information
What is cybervandalism?
the electronic defacing of an existing website
online analytical processing (OLAP)
the manipulation of information to create business intelligence in support of strategic decision making
Ebusiness was characterized by a few companies or users posting content for the masses. What characterized Business 2.0?
the masses posting content for the masses
automation
the process of computerizing manual tasks, making them more efficient and effective and dramatically lowering operational costs; example: payroll
key performance indicators (KPIs)
the quantifiable metrics a company uses to evaluate progress toward CSFs; more specific than CSFs
Which of the following definitions represents website name stealing?
the theft of a website's name that occurs when someone, posing as a site's administrator, changes the ownership of the domain name assigned to the website to another website owner
cycle time
the time required to process an order, is common KPI for operations management
What is pirated software?
the unauthorized use, duplication, distribution, or sale of copyrighted software
Core business relationships and models are dramatically changing, including shifts from which of the following?
the value in material things to the value of knowledge and intelligence; mass customization to mass production; customer-centricity to product-centricity
What is an act or object that poses a danger to assets?
threat
On average, how many years longer does each generation live than the previous in the US?
three
What are the 3 primary variables (or triple constraints) in any project?
time, cost, scope
Why are Fortune 500 companies engaging in blogging?
to gather feedback and share ideas
What is the purpose of PIPEDA?
to provide Canadian citizens with a right of privacy with respect to how their personal info is collected, used, or disclosed by an organization
A social bookmarking site is dedicated to providing all of the following except...?
to reconnect with colleagues for business progress
What is also provided for the system users and can be online or in a classroom?
training
Managers use ____________ information when making structured decisions at the operational level, such as when analyzing daily sales reports to determine how much inventory to carry. supply-side transactional uncertain structured
transactional
What type of information is produced by the point-of-sale systems (cash registers) Whole Foods' employees use to process customer sales? OLAP transactional information analytical information DSS
transactional information
Which of the following industries has technology changed the way business is performed?
travel; education; training
All of the following are scientific methods organizations use to anticipate, forecast, and asses the future, except...?
trend simulation
What is trend monitoring?
trends viewed as particularly important in a specific community, industry, or sector are carefully monitored, watched and reported to key decision makers
examples of KPIs
turnover rates of employees percentage of help desk calls answered in the first minute # of product returns # of new customers average customer spending
What is a problem that occurs when someone registers purposely misspelled variations of well-known domain names?
typosquatting
Which of the following is one of the 21st century organizational trends on the business side?
uncertainty in terms of future business scenarios and economic outlooks; focus on improved business resiliency via the application of enhanced security; emphasis on strategic analysis for cost reduction and productivity enhancement
All of the following are types of website visitors except...?
usability visitor
What is one of the major problems with email?
user's expectation of privacy
What is web content that is created & updated by many users for many users?
user-contributed content
What is a microwave transmitter?
uses the atmosphere (or outer space) as the transmission medium to send the signal to a microwave receiver
intelligent systems
various commercial applications of artificial intelligence
In terms of big data what includes the uncertainty of data, including biases, noise, and abnormalities?
veracity
What category of website metrics does stickiness, or visit duration time, belong to?
visit metric
Many industries have been forced to change due to technology advances. Which of the below industries has felt the lowest amount of economic impact from ebusiness?
waste or recycling industry
__________ analyzes unstructured data associated with websites to identify consumer behavior and website navigation.
web analytics
What allows users to access the WWW?
web browser
As a trainer for Exempla Healthcare, Tina is faced with many challenges to properly training her new hires. There are over 40 different locations where Exempla employees work across the Chicago metro area. Tina decides to implement some valuable ebusiness tools to help reduce traveling costs, increase speed, and provide flexibility for completing training sessions with all the new hires. Tina primarily uses PowerPoints and videos during her training modules. What is the most effective ebusiness tool for Tina to implement and accomplish all of her training goals?
webinar
What is a locally stored URL or the address of a file or Internet page saved as a shortcut?
website bookmark
What is the theft of a website's name that occurs when someone, posing as a site's administrator, changes the ownership of the domain name assigned to the website to another website owner?
website name stealing
What type of backup strategy would you recommend to an organization that deals with small amounts of noncritical information?
weekly
Which of the following is a potential business impact from teleliving?
will take over routine tasks such as writing a letter, retrieving a file, and making a phone call