INFO Exam 2
A(n) ___________ allows people at two or more locations to interact via two-way video and audio transmissions simultaneously as well as share documents, data, computer displays, and whiteboards. videoconference podcasting email messaging
videoconference
What occurs when a machine learning model matches the training data so closely that the model fails to make correct predictions on new data? Overfitting Underfitting Data augmentation Artificial intelligence
Overfitting
Match the revenue generation term on the left with its correct definition on the right.
Pay-per-click- Generates revenue each time a user clicks on a link to a retailer's website. Pay-per-call- Generates revenue each time a user clicks on a link that takes the user directly to an online agent waiting for a call. Pay-per-conversion- Generates revenue each time a website visitor is converted to a customer.
________ occurs when a machine learning model has poor predictive abilities because it did not learn the complexity in the training data. Multiple choice question. Bias Overfitting Underfitting Augmentation
Underfitting
A mail ______ sends a massive amount of email to a specific person or system that can cause that user's server to stop functioning. Multiple choice question. spam bomb teergrubing
bomb
A website ____________ is a locally stored URL or the address of a file or Internet page saved as a shortcut. bookmark tag taxonomy manager
bookmark
A(n) ___________ model is a plan that details how a company creates, delivers, and generates revenues. employee customer data business
business
Internet _________ is government attempts to control Internet traffic, thus preventing some material from being viewed by a country's citizens. Multiple choice question. censorship vandalism governance
censorship
Source ________ contains instructions written by a programmer specifying the actions to be performed by computer software. code content system
code
Real-time _________ occurs when a system updates information at the same rate it receives it. emails podcasting communication messaging
communication
A(n) ___________ model is a plan that details how a company creates, delivers, and generates revenues on the Internet. ebusiness consumer employee data
ebusiness
A(n) ____________ monitoring policy states explicitly how, when, and where the company monitors its employees. Multiple choice question. email employee information
employee
A search ________ is website software that finds other pages based on keyword matching similar to Google. engine rank click conversion
engine
A(n) _________ computer use policy contains general principles to guide computer user behavior. Multiple choice question. ethical information privacy nonrepudiation
ethical
A(n) ________ information system is a specialized DSS that supports senior-level executives and unstructured, long-term, nonroutine decisions requiring judgment, evaluation,and insight. informational managerial operational executive
executive
the ______ block is the first block created in the blockchain. proof-of-stake genesis hash immutable
genesis
Google _____ is a wearable computer with an optical head-mounted display. Multiple choice question. reality haptic glass
glass
Social _________ refers to websites that rely on user participation and user-contributed content, such as Facebook, YouTube, and Digg. media network networking
media
Trend _________ are trends viewed as particularly important in a specific community, industry, or sector are carefully monitored, watched, and reported to key decision makers. monitoring analysis projection
monitoring
At the ___________ level, employees develop, control, and maintain core business activities required to run the day-to-day operations. managerial strategic operational
operational
A(n) _________ is an exclusive right to make, use, and sell an invention and is granted by a government to the inventor. Multiple choice question. digital rights management patent copyright
patent
An information _______ policy contains general principles regarding information privacy. Multiple choice question. publicity privacy redundancy nonrepudiation
privacy
Trend ______ occurs when numerical data are available and a trend can be plotted to display changes through time and into the future. projection monitoring analysis
projection
Intellectual ___________ is intangible creative work that is embodied in physical form and includes copyrights, trademarks, and patents. Multiple choice question. ethics copyright property patent
property
Search engine __________ evaluates variables that search engines use to cyborg ranking conversion optimization
ranking
A(n) ______ is a self-photograph placed on a social media website. selfie manager blog microblogging
selfie
What applies to customers offering goods and services to each other on the Internet? B2C C2B B2B C2C
C2C
What is the first block created in the blockchain? Immutable Hash Proof-of-stake Genesis block
Genesis block
__________ messaging is a service that enables instant or real-time Consumer Internet Instant Content
Instant
Select the two terms that refer to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry. Multiple select question. Ediscovery Electronic Protection Act Information discovery Electronic discovery
1. Ediscovery 2. Electronic discovery
What is a set of tools that supports the work of teams or groups by facilitating the sharing and flow of information? A collaboration system A knowledge base A collective intelligence
A collaboration system
What is a data structure containing a hash, previous hash, and data? Hash Immutable Genesis block Blocks
Blocks
What is the abuse of pay-per-click, pay-per-call, and pay-per-conversion revenue models by repeatedly clicking a link to increase charges or costs for the advertiser? Affiliate program Click fraud Competitive click fraud Hitbot
Click fraud
What is the abuse of pay-per-click, pay-per-call, and pay-per-conversion revenue models by repeatedly clicking a link to increase charges or costs for the advertiser? Competitive click fraud Click fraud Affiliate program Hitbot
Click fraud
What is the abuse of pay-per-click, pay-per-call, and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser? Multiple choice question. Competitive click-fraud Click-fraud Cyberbullying
Click-fraud
Match the ebusiness form on the left with its correct definition on the right.
Content providers
The _____ web is the portion of the Internet that is intentionally hidden from search engines, uses masked IP addresses, and is accessible only with a special web browser. deep semantic dark
Dark
What is the portion of the Internet that is intentionally hidden from search engines, uses masked IP addresses, and is accessible only with a special web browser? Semantic web Dark web Deep web
Dark web
__________ -seeking analysis finds the inputs necessary to achieve a goal such as a desired level of output. Sensitivity Optimization What Goal
Goal
What finds the inputs necessary to achieve a goal such as a desired level of output? Sensitivity analysis What-if analysis Goal-seeking analysis
Goal-seeking analysis
What finds the inputs necessary to achieve a goal such as a desired level of output? Multiple choice question. What-if analysis Sensitivity analysis Goal-seeking analysis
Goal-seeking analysis
What is a company that provides access to the Internet for a monthly fee? Internet service provider Instant messaging Videoconference Podcasting
Internet service provider
Which policy contains general principles to guide the proper use of the Internet? Multiple choice question. Email privacy policy Internet use policy Information privacy policy Social media policy
Internet use policy
__________ management involves capturing, classifying, evaluating, retrieving, and sharing information assets in a way that provides context for effective decisions and actions. Reputation Native Collective Knowledge
Knowledge
_______ occurs when a user choses to receive emails and allows permissions to incoming emails. Multiple choice question. Teergrubing Opt out Opt in
Opt in
What is it called when you chose to not receive emails and deny permission to incoming emails? Multiple choice question. Opt out Opt In Mail bomb Spam
Opt out
________ occurs when you chose to not receive emails and deny permission to incoming emails. Multiple choice question. Opt out Mail bomb Opt In Spam
Opt out
What is website software that finds other pages based on keyword matching similar to Google? Search engine ranking Pay-per-click Pay-per-call Search engine
Search engine
What contains instructions written by a programmer specifying the actions to be performed by computer software? Source code Open system Open source
Source code
What are specific keywords or phrases incorporated into website content for means of classification or taxonomy? Tags Social media Social bookmarks
Tags
________ are specific keywords or phrases incorporated into website content for means of classification or taxonomy. Taxonomy Folksonomy Tags Tacit
Tags
_________ are small electronic devices that change user passwords automatically. Multiple choice question. Cards Tokens Passwords
Tokens
What spreads itself not only from file to file but also from computer to computer? Multiple choice question. worm script kiddie virus hacker
Worm
Business-to-________ applies to businesses buying from and selling to each other over the Internet. business broker customer consumer
business
A(n)__________ system is a set of tools that supports the work of teams or groups by facilitating the sharing and flow of information. collaboration networking contributed native
collaboration
Business-to-__________ applies to any business that sells its products or services directly to consumers online. government business employee consumer
consumer
A(n) ___________ is an organized attempt by a country's military to disrupt or destroy information and communication systems for another country. Multiple choice question. cyberterrorism cyberwar firewall
cyberwar
Proof-of-stake is a way to validate transactions and achieve a ____________ consensus. hash genesis immutability distributed
distributed
Mashup _______ are WYSIWYG tools, or what You See Is What You Get tools. networks programs interfaces editors
editors
A(n) ______ is a simplified representation or abstraction of reality. metric model project
model
Data ___________ describes technologies that allow users to "see" or visualize data to transform information into a business perspective. dashboard analysis paralysis visualization
visualization
Select the four characteristics of Web 2.0. Collaboration outside the organization Identifying limited market segments Adhering to taxation rules Content sharing through open sourcing Collaboration inside the organization User-contributed content
1. Collaboration outside the organization 2. Content sharing through open sourcing 3. Collaboration inside the organization 4. User-contributed content
Select the three primary decision-making challenges facing managers today. Multiple select question. Manager must make decisions quickly Managers need to make decisions based on instinct and intuition because they do not have access to large amounts of information Managers have infinite time to make decisions Managers must apply sophisticated analysis techniques, such as Porter's strategies or forecasting, to make strategic decisions Managers need to analyze large amounts of information
1. Manager must make decisions quickly 2. Managers must apply sophisticated analysis techniques, such as Porter's strategies or forecasting, to make strategic decisions 3. Managers need to analyze large amounts of information
Select three items typically found in an acceptable use policy. Multiple select question. Not performing any nonrepudiation. Describes the Internet services available to users. Defines the organization's position on the purpose of Internet access Not using the service as part of violating any law. Not attempting to break the security of any computer network or user.
1. Not performing any nonrepudiation. 2. Not using the service as part of violating any law. 3. Not attempting to break the security of any computer network or user.
Select three epolicies. Social media policy Password protection policy Ethical computer use policy COPA policy Acceptable use policy
1. Social media policy 2.Ethical computer use policy 3.Acceptable use policy
What are the three types of machine learning? What are the three types of machine learning? Multiple select question. Neural network machine learning Supervised machine learning Bias machine learning Artificial machine learning Unsupervised machine learning Transfer machine learning
1. Supervised machine learning 2. Unsupervised machine learning 3. Transfer machine learning
Select two terms for content created and updated by many users for many users. User-generated content User reputation content User-contributed content
1. User-generated content 2. User-contributed content
Select all that apply Select two terms that blends videoconferencing with document sharing and allows the user to deliver a presentation over the web to a group of geographically dispersed participants. Taxonomy Web conferencing Podcasting Webinar
1. Web conferencing 2. Webinar
Select two items typically contained in an employee monitoring policy.
1.Always enforce the policy the same for everyone. 2.State the consequences of violating the policy.
Select three items typically contained in a social media policy.
1.Employee Twitter, corporate Twitter, and personal Twitter policies. 2.Employee blog and personal blog policies. 3. Employee social network and personal social network policies.
Select three different ebusiness forms. Online marketplaces Search engine optimization Infomediaries Content providers Cyborg
1.Online marketplaces 2.Infomediaries 3.Content providers
Select the three types of revenue generation strategies websites can pursue.
1.Pay-per-call 2.Pay-per-conversion 3.Pay-per-click
Select all that apply Select four trends according to the World Future Society that have the potential to change our world, our future, and our lives. The global economy is becoming more dispersed. The world's population will double in the next 40 years. Time is becoming one of the world's most precious commodities The pace of technological innovation is increasing. The world's population will decrease over the next 40 years. The pace of technological innovation is decreasing. The global economy is becoming more integrated.
1.The world's population will double in the next 40 years. 2. Time is becoming one of the world's most precious commodities 3. The pace of technological innovation is increasing. 4. The global economy is becoming more integrated.
Who is a business analytics specialist who uses visual tools to help people understand complex data? A data governor A data artist A data scientist
A data artist
The National Institute of Standards and Technology (NIST) introduced an ________________ designed tokeep government information secure. Multiple choice question. PKE AES NIST
AES
The National Institute of Standards and Technology (NIST) introduced an ________________ designed tokeep government information secure. Multiple choice question. PKE NIST AES
AES
Which epolicy requires a user to agree to follow it to be provided access to corporate email, information systems, and the Internet? Multiple choice question. Acceptable use policy Email privacy policy Information privacy policy Internet use policy
Acceptable use policy
________ programs allow a business to generate commissions or referral fees when a customer visiting its website clicks a link to another merchant's website. Affirmation Advertising Affiliate Hitbots
Affiliate
What allow a business to generate commissions or referral fees when a customer visiting its website clicks a link to another merchant's website? Click fraud Value-added services fees Hitbots Affiliate program
Affiliate program
What is a blend of the physical, virtual, and electronic environments creating a real-time ambient environment that changes as the user moves from one place to another? Augmented reality Ambient digital experience Virtual reality experience Digital mesh
Ambient digital experience
What is a blend of the physical, virtual, and electronic environments creating a real-time ambient environment that changes as the user moves from one place to another? Augmented reality Digital mesh Virtual reality experience Ambient digital experience
Ambient digital experience
________ paralysis occurs when the user goes into an emotional state of over-analysis (or over-thinking) a situation so that a decision or action is never taken, in effect paralyzing the outcome. Data Analysis Anomaly
Analysis
__________ information encompasses all organizational information, and its primary purpose is to support the performance of managerial analysis or semistructured decisions. Analytical Transactional
Analytical
What encompasses all organizational information, and its primary purpose is to support the performance of managerial analysis or semistructured decisions? Analytical information Transactional information
Analytical information
Which policy simply states that email users will not send unsolicited emails? Multiple choice question. Workplace monitoring policy Anti-spam policy Information privacy policy Mail bomb policy
Anti-spam policy
What is a set of routines, protocols, and tools for building software applications? Mashup Network effect Application programming interface Real simple syndication
Application programming interface
_________ intelligence simulates human thinking and behavior, such as the ability to reason and learn. Artificial Decision Executive
Artificial
What simulates human thinking and behavior, such as the ability to reason and learn? Multiple choice question. Decision support systems Artificial intelligence Transaction processing systems
Artificial intelligence
_________ communications, or communication such as email in which the message and the response do not occur at the same time. Crowdfunding Tacit Synchronous Asynchronous
Asynchronous
Which form of communication do the message and the response not occur at the same time? Synchronous communication Social communication Asynchronous communication
Asynchronous communication
What is the process of providing a user with permission including access levels and abilities such as file access, hours of access, and amount of allocated storage space? Multiple choice question. Authentication Authorization Resistance Prevention
Authorization
What is a self-managing computing model named after, and patterned on, the human body's autonomic nervous system? Virtual assistant Autonomic computing Teleliving
Autonomic computing
What is software that carries out some set of operations on behalf of a user or another program with some degree of independence or autonomy, and employ some knowledge or representation of the user's goals or desires? Biological 3D printing Autonomous agent Virtual assistant Machine learning
Autonomous agent
Match the ebusiness term on the left with its correct definition on the right.
B2B- Applies to businesses buying from and selling to each other over the Internet. B2C- Applies to any business that sells its products or services directly to consumers online. C2C- Applies to sites primarily offering goods and services to assist consumers interacting with each other over the Internet. C2B- Applies to any consumer that sells a product or service to a business over the Internet.
What applies to any business that sells its products or services directly to consumers online? C2C C2B B2C B2B
B2C
___________ 3D printing includes the printing of skin and organs and is progressing from theory to reality, however, politicians and the public do not have a full understanding of the implications.. Biological Virtual Augmented Digital
Biological
What includes the printing of skin and organs and is progressing from theory to reality, however, politicians and the public do not have a full understanding of the implications? Internet of Things Internet of Everything Biological 3D printing Machine learning
Biological 3D printing
What is a type of digital currency in which a record of transactions is maintained and new units of currency are generated by the computational solution of mathematical problems and which operates independently of a central bank? Digital trust Bitcoin Hash Immutable
Bitcoin
___________ is a type of digital currency in which a record of transactions is maintained and new units of currency are generated by the computational solution of mathematical problems and which operates independently of a central bank. Immutable Bitcoin Hash Digital trust
Bitcoin
What is a type of distribution ledger, consisting of blocks of data that maintain a permanent and tamper-proof record of transactional data? Immutable Blockchain Hash Ledger
Blockchain
A(n) ________ is an online journal that allows users to post their own comments, graphics, and video. email mashup blog wiki
Blog
Select the term for an online journal that allows users to post their own comments, graphics, and video. Blog VPN Mashup Wiki
Blog
Match the B2C on the left with its correct definition on the right.
Brick-and-Mortar- A business that operates in a physical store without an Internet presence. Click-and-Mortar- A business that operates in a physical store and on the Internet. Example: Barnes & Noble Pure-Play- A business that operates on the Internet only without a physical store. Example: Google
Which policy allows employees to use their personal mobile devices and computers to access enterprise data and applications? Multiple choice question. Ethical use policy Information privacy policy Acceptable user policy Bring your own device policy
Bring your own device policy
What tracks corporate metrics such as critical success factors and key performance indicators and include advanced capabilities such as interactive controls allowing users to manipulate data for analysis? Data visualization tools Business intelligence dashboards Data visualization
Business intelligence dashboards
What is a plan that details how a company creates, delivers, and generates revenues? Dot-com Business model Eshop Ebusiness model
Business model
Which term applies to businesses buying from and selling to each other over the Internet? Business-to-consumer Business-to-business Consumer-to-business Consumer-to-consumer
Business-to-business
______ fraud is the abuse of pay-per-click, pay-per-call, and pay-per-conversion revenue models by repeatedly clicking a link to increase charges or costs for the advertiser. Click Affiliate Competitive Hitbot
Click
__________-fraud is the abuse of pay-per-click, pay-per-call, and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser. Multiple choice question. Click COPA Cyberbullying
Click
Match the term on the left with its correct definition on the right. Instructions
Click fraud- The abuse of pay-per-click, pay-per-call, and pay-per-conversion revenue models by repeatedly clicking a link to increase charges or costs for the advertiser. Competitive click-fraud- A computer crime in which a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking the advertiser's link. Hitbots- Create the illusion that a large number of potential customers are clicking the advertiser's links when in fact there is no likelihood that any of the clicks will lead to profit for the advertiser. Affiliate program- Allow a business to generate commissions or referral fees when a customer visiting its website clicks a link to another merchant's website.
___ source is any proprietary software licensed under exclusive legal right of the copyright holder. Closed Code Open
Closed
__________ intelligence is collaborating and tapping into the core knowledge of all employees, partners, and customers. Reputation Content Collective Knowledge
Collective
What is collaborating and tapping into the core knowledge of all employees, partners, and customers? Collective intelligence Knowledge management system Reputation system
Collective intelligence
____ click fraud is a computer crime in which a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking the advertiser's link. Client Customer Competitive Consumer
Competitive
__________ click-fraud is a computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link. Multiple choice question. Criminal Competitive Cyber
Competitive
What is a computer crime in which a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking the advertiser's link? Hitbot Competitive click fraud Affiliate programs Click fraud
Competitive click fraud
What is a computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link? Multiple choice question. Child Online Protection Act Click-fraud Competitive click-fraud
Competitive click-fraud
_______ simulation occurs when a complex systems, such as the U.S. economy, can be modeled by means of mathematical equations and different scenarios can be run against the model to conduct "what if" analysis. Monitoring Computer Projection Analysis
Computer
What occurs when a complex systems, such as the U.S. economy, can be modeled by means of mathematical equations and different scenarios can be run against the model to conduct "what if" analysis? Computer simulation Trend monitoring Trend analysis Trend projection
Computer simulation
What applies to any consumer who sells a product or service to a business on the Internet? Consumer-to-consumer Consumer-to-business Business-to-business Business-to-consumer
Consumer-to-business
_________ management systems help companies manage the creation, storage, editing, and publication of their website content. Internet Content Email Web
Content
What occurs when organizations use software that filters content, such as emails, to prevent the accidental or malicious transmission of unauthorized information? Multiple choice question. Cryptography Time bombs Content filtering Public key encryption
Content filtering
What helps companies manage the creation, storage, editing, and publication of their website content? Internet service providers Content management systems Web conferencing
Content management systems
What helps companies manage the creation, storage, editing, and publication of their website content? Web conferencing Content management systems Internet service providers
Content management systems
_________ sources capital for a project by raising many small amounts from a large number of individuals, typically via the Internet. Tacit knowledge Crowdfunding Videoconferencing Podcasting
Crowdfunding
What refers to the wisdom of the crowd? Crowdsourcing Explicit knowledge Tacit knowledge Social media
Crowdsourcing
___________ refers to the wisdom of the crowd. Asynchronous Crowdsourcing Tacit knowledge Taxonomy
Crowdsourcing
What is the science that studies encryption, which is the hiding of messages so that only the sender and receiver can read them? Multiple choice question. Decrypt Public key encryption Certificate authority Cryptography
Cryptography
____________ is the science that studies encryption, which is the hiding of messages so that only the sender and receiver can read them. Multiple choice question. Content Certificate Cryptography
Cryptography
What are malicious attempts to access or damage a computer system? Multiple choice question. digital trust downtime cyberattacks ediscovery
Cyberattacks
___________ are malicious attempts to access or damage a computer system. Multiple choice question. Cyberattacks Downtime Viruses Hackers ediscovery
Cyberattacks
What includes threats, negative remarks, or defamatory comments transmitted via the Internet or posted on the website? Multiple choice question. Click-fraud Threat Cyberbullying Competitive click-fraud
Cyberbullying
_________ includes threats, negative remarks, or defamatory comments transmitted via the Internet or posted on the website. Multiple choice question. Cyberbullying Click-fraud Information privacy
Cyberbullying
What is the electronic defacing of an existing website? Multiple choice question. Internet censorship Typosquatting Website name stealing Cybervandalism
Cybervandalism
___________ is the electronic defacing of an existing website. Multiple choice question. Nonrepudiation Typosquatting Cybervandalism
Cybervandalism
____________ is an organized attempt by a country's military to disrupt or destroy information and communication systems for another country. Multiple choice question. Cybercriminal cyberterrorism Cyberwar
Cyberwar
What is an individual who studies the interaction between humans and technology, observing how technology can shape humans' lives? Internet service provider Cyborg anthropologist Search engine probe
Cyborg anthropologist
What occurs when adding additional training examples by transforming existing examples? Underfitting Machine learning Data augmentation Transfer machine learning
Data augmentation
What describes technologies that allow users to "see" or visualize data to transform information into a business perspective? Informing Intelligence dashboards Data visualization Infographics
Data visualization
What moves beyond Excel graphs and charts into sophisticated analysis techniques such as pie charts, controls, instruments, maps, time-series graphs, and more? Forecast Informing Data visualization tools Business intelligence dashboards
Data visualization tools
_________ support systems model information using OLAP, which provides assistance in evaluating and choosing among different courses of action. Multiple choice question. Executive Decision Digital
Decision
Select the system that models information using OLAP, which provides assistance in evaluating and choosing among different courses of action? Decision support system Executive information system Transactional processing system
Decision support system
What decodes information and is the opposite of encrypt? Multiple choice question. Certificate authority Public key encryption Digital certificate Decrypt
Decrypt
What decodes information and is the opposite of encrypt? Multiple choice question. Public key encryption Decrypt Digital certificate Certificate authority
Decrypt
___ web is the large part of the Internet that is inaccessible to conventional search engines. Deep Dark Semantic
Deep
What is the large part of the Internet that is inaccessible to conventional search engines? Dark web Internet Semantic web Deep web
Deep web
What tracks KPIs and CSFs by compiling information from multiple sources and tailoring it to meet user needs? Multiple choice question. Granularity Optimization Digital dashboard Sensitivity
Digital dashboard
__________ computing processes and manages algorithms across many machines in a computing environment. Centralized Distributed Query
Distributed
What refers to a period of time when a system is unavailable? Multiple choice question. Hackers Downtime Uptime VIruses
Downtime
______ refers to a period of time when a system is unavailable. Multiple choice question. Security Uptime Downtime
Downtime
_________-by hacking is a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network. Multiple choice question. Data Hackers Drive
Drive
What is a plan that details how a company creates, delivers, and generates revenues specifically on the Internet? Ebusiness model Customer model Business data Business model
Ebusiness model
Which privacy policy details the extent to which email messages may be read by others? Multiple choice question. Internet use policy Email privacy policy Information privacy policy Social media policy
Email privacy policy
Which policy stating explicitly how, when, and where the company monitors its employees? Multiple choice question. Information monitoring policy Employee monitoring policy Email monitoring policy
Employee monitoring policy
What scrambles information into an alternative form that requires a key or password to decrypt? Multiple choice question. Decryption Cryptography Encryption
Encryption
__________ scrambles information into an alternative form that requires a key or password to decrypt. Multiple choice question. Cryptography Decrypt Encryption
Encryption
Which of the following are policies and procedures that address information management along with the ethical use of computers and the Internet in the business environment? Multiple choice question. Information governance Epolicies Information discovery Ediscovery
Epolicies
________ are policies and procedures that address information management along with the ethical use of computers and the Internet in the business environment. Multiple choice question. Ethics Cyberbulling Clickfraud Epolicies
Epolicies
Which policy contains general principles to guide computer user behavior? Information privacy policy Social media policy Ethical computer use policy Employee monitoring policy
Ethical computer use policy
Which policy contains general principles to guide computer user behavior? Multiple choice question. Employee monitoring policy Information privacy policy Social media policy Ethical computer use policy
Ethical computer use policy
Who is a person who hacks into a computer system to find vulnerabilities to help a company test its security? Multiple choice question. Unethical hacker Ethical hacker Ethical virus
Ethical hacker
What is a specialized DSS that supports senior-level executives and unstructured, long-term, nonroutine decisions requiring judgment, evaluation,and insight? Managerial support system Executive information system Transaction processing system
Executive information system
_________ knowledge consists of anything that can be documented, archived, and codified, often with the help of MIS. Explicit Social Intelligent Tacit
Explicit
What consists of anything that can be documented, archived, and codified, often with the help of MIS? Tacit knowledge Collective intelligence Crowdsourcing Explicit knowledge
Explicit knowledge
__________ information practices is a general term for a set of standards governing the collection and use of personal data and addressing issues of privacy and accuracy. Multiple choice question. Ethical Fair Illegal
Fair
What is a general term for a set of standards governing the collection and use of personal data and addressing issues of privacy and accuracy? Multiple choice question. Acceptable use policy Fair information practices Nonrepudiation Internet use policy
Fair information practices
What is similar to taxonomy except that crowdsourcing determines the tags or keyword-based classification system? Folksonomy Mashup editors Social media analysis
Folksonomy
______ is similar to taxonomy except that crowdsourcing determines the tags or keyword-based classification system. Folksonomy Social tagging Bookmarks Tags
Folksonomy
What is a wearable computer with an optical head-mounted display? Multiple choice question. Google Glass Haptic Interface Virtual Reality
Google Glass
What refers to the level of detail in the model or the decision-making process? Optimization Granularity Visualization
Granularity
______ refers to the level of detail in the model or the decision-making process. Optimization Granularity Sensitivity
Granularity
What are experts in technology who use their knowledge to break into computers and computer networks, either for profit or just motivated by the challenge? Multiple choice question. Virus Adware Hackers Spyware
Hackers
What is a function that converts an input of letters and numbers into an encrypted output of a fixed length? Bitcoin Hash Immutable Block
Hash
What occurs when historical events are studied to anticipate the outcome of current developments? Multiple choice question. Trend projection Historical analysis Computer simulation Trend monitoring
Historical analysis
What creates the illusion that a large number of potential customers are clicking the advertiser's links when in fact there is no likelihood that any of the clicks will lead to profit for the advertiser? Hitbots Competitive click fraud Affiliate program Click fraud
Hitbots
________ creates the illusion that a large number of potential customers are clicking the advertiser's links when in fact there is no likelihood that any of the clicks will lead to profit for the advertiser. Advertising fees Hitbots Competitive click fraud Value-added service fees
Hitbots
What occurs when attackers grant themselves the same access levels they already have but assume the identity of another user? Multiple choice question. Content filtering Time bomb Vertical privilege escalation Horizontal privilege escalation
Horizontal privilege escalation
Select the following that are NOT part of the four characteristics of Web 2.0. Content sharing through open sourcing Identifying limited market segments Direct-to-clients Adhering to taxation rules User-contributed content Collaboration outside the organization Collaboration inside the organization
Identifying limited market segments Direct-to-clients Adhering to taxation rules
What is the ability for a blockchain ledger to remain a permanent, indelible, and unalterable history of transactions? Hash Genesis block Immutability Ledger
Immutability
____________ is the ability for a blockchain ledger to remain a permanent, indelible, and unalterable history of transactions. Hash Proof-of-work Immutability Ledger
Immutability
What simply means unchangeable? Hash Digital trust Immutable
Immutable
__________ simply means unchangeable. Ledger Hash Immutable
Immutable
What is a representation of information in a graphic format designed to make the data easily understandable at a glance? Infographic Executive information systems Granularity
Infographic
What is a representation of information in a graphic format designed to make the data easily understandable at a glance? Infographic Granularity Executive information systems
Infographic
______ is a representation of information in a graphic format designed to make the data easily understandable at a glance. DSS EIS Infographic Managerial
Infographic
What presents the results of data analysis, displaying the patterns, relationships, and trends in a graphical format? analysis paralysis analytics data artist infographics
Infographics
___________ of everything is a concept that extends the Internet of Things (IoT) emphasis on machine-to-machine communications to describe a more complex system that also encompasses people and processes. Information Internet Adaptive Things
Information
What is the set of ideas about how all information in a given context should be organized? Information architecture Content management systems Taxonomy
Information architecture
What is the act of conforming, acquiescing, or yielding information? Multiple choice question. Information governance Information compliance Information property Information management
Information compliance
What is a concept that extends the Internet of Things (IoT) emphasis on machine-to-machine communications to describe a more complex system that also encompasses people and processes? Internet of Everything Information of Everything Internet of Things Information of Things
Information of Everything
Which epolicy contains general principles regarding information privacy? Information privacy policy Social media policy Acceptable use policy Ethical computer use policy
Information privacy policy
What is a service that enables instant or real-time communication between people? Web portal Instant messaging Real-time communications Internet service provider
Instant messaging
What occurs when a government attempts to control Internet traffic, thus preventing some material from being viewed by a country's citizens? Multiple choice question. Internet rights management Internet vandalism Digital rights management Internet censorship
Internet censorship
Match the Internet monitoring technology on the left with its correct definition on the right.
Key logger-A program that records every keystroke and mouse click. Cookie-A small file deposited on a hard drive by a website containing information about customers and their web activities. Adware-Software that generates ads that install themselves on a computer when a person downloads some other program from the Internet. Spyware-Software that comes hidden in free downloadable software and tracks online movements. Clickstream-Records information about a customer during a web surfing session such as what websites were visited.
What involves capturing, classifying, evaluating, retrieving, and sharing information assets in a way that provides context for effective decisions and actions? Taxonomy Social networking analysis Knowledge management Crowdsourcing
Knowledge management
What supports the capturing, organization, and dissemination of knowledge (i.e., know-how) throughout an organization? Knowledge management system Collaboration system Collective intelligence
Knowledge management system
What records classified and summarized transactional data? Ledger Hash Distribution Proof-of-stake
Ledger
______ learning is a type of artificial intelligence that enables computers to both understand concepts in the environment, and also to learn. Autonomous Digital Machine
Machine
What is a type of artificial intelligence that enables computers to both understand concepts in the environment, and also to learn? Internet of Things Virtual assistant Machine learning Information of Everything
Machine learning
What is a type of artificial intelligence that enables computers to both understand concepts in the environment, and also to learn? Machine learning Fuzzy logic Expert system
Machine learning
What is a type of artificial intelligence that enables computers to both understand concepts in the environment, and also to learn? Multiple choice question. Expert system Machine learning Fuzzy logic
Machine learning
Match the term on the left with its correct definition on the right. Instructions Machine learning Machine learning drop zone empty. Weak AI Weak AI drop zone empty. Strong AI Strong AI drop zone empty. Works towards providing brain like powers to AI machines; in effect, it works to make machines as intelligent as the humans. Machines can still make their own decisions based on reasoning and past sets of data. Enables computers to both understand concepts in the environment, and also to learn.
Machine learning- Enables computers to both understand concepts in the environment, and also to learn. Weak AI- Machines can still make their own decisions based on reasoning and past sets of data. Strong AI- Works towards providing brain like powers to AI machines; in effect, it works to make machines as intelligent as the humans.
What sends a massive amount of email to a specific person or system that can cause that user's server to stop functioning? Multiple choice question. Teergrubing Spam Mail bomb Cybervandalism
Mail bomb
___________ is software that is intended to damage or disable computers and computer systems. Multiple choice question. Malware Virus Hactivist
Malware
__________ decisions concern how the organization should achieve the goals and objectives set by its strategy, and they are usually the responsibility of mid-level management. Strategic Managerial Operational
Managerial
What concerns how the organization should achieve the goals and objectives set by its strategy, and they are usually the responsibility of mid-level management? Strategic decisions Operational decisions Managerial decisions
Managerial decisions
At which level are employees continuously evaluating company operations to hone the firm's abilities to identify, adapt to, and leverage change? Managerial level Operational level Strategic level
Managerial level
A(n) ___________ is a website or web application that uses content from more than one source to create a completely new product or service. mashup application interface network
Mashup
What is a website or web application that uses content from more than one source to create a completely new product or service? Network effect Mashup Microblogging Syndication
Mashup
What are WYSIWYG tools, or what You See Is What You Get tools? Network effect Application programming interface Mashup editors
Mashup editors
A social ________ policy outlines the corporate guidelines or principles governing employee online communications. Multiple choice question. monitoring media network
Media
Social ________ monitoring is the process of monitoring and responding to what is being said about a company, individual, product, or brand. Multiple choice question. media security employee
Media
What is the practice of sending brief posts (140 to 200 characters) to a personal blog, either publicly or to a private group of subscribers who can read the posts as IMs or as text messages? Microblogging Real Simple Syndication Mashup Wiki
Microblogging
___________ is the practice of sending brief posts (140 to 200 characters) to a personal blog, either publicly or to a private group of subscribers who can read the posts as IMs or as text messages. Wiki Blog Mashup Video conferencing Microblogging
Microblogging
What is a simplified representation or abstraction of reality? Consolidation Model Project Metric
Model
Which institute introduced an advanced encryption standard (AES) designed to keep government information secure? Multiple choice question. National Institute of Standards and Technology (NIST) Public Key Encryption Institute (PKEI)
National Institute of Standards and Technology (NIST)
______ advertising is an online marketing concept in which the advertiser attempts to gain attention by providing content in the context of the user's experience in terms of its content, format, style. Native Local Source Collaboration
Native
What is an online marketing concept in which the advertiser attempts to gain attention by providing content in the context of the user's experience in terms of its content, format, style?. User-contributed content Collaboration system Native advertising Content sharing
Native advertising
What gathers an organization's computer network traffic patterns to identify unusual or suspicious operations? Multiple choice question. Network behavior analysis Cyberterrorism Intrusion detection software
Network behavior analysis
_________ network is a category of AI that attempts to emulate the way the human brain works. Multiple choice question. Virtual Expert Neural Genetic
Neural
What is a category of AI that attempts to emulate the way the human brain works? Virtual reality Neural network Expert system Genetic algorithm
Neural network
What information is transmitted without encryption and includes information collected from public records, phone books, corporate directives, and websites? Multiple choice question. Sensitive PII Public key encryption Nonsensitive PII
Nonsensitive PII
Select the definition on the right that correctly identifies the term on the left.
Nonsensitive PII- Information transmitted without encryption and includes information collected from public records, phone books, corporate directives, and websites. Sensitive PII- Information transmitted with encryption and when disclosed, results in a breach of an individual's privacy and can potentially cause the individual harm.
What is the manipulation of information to create business intelligence in support of strategic decision making? Online transactional processing (OLTP) Online analytical processing (OLAP)
Online analytical processing (OLAP)
What consists of nonproprietary hardware and software based on publicly known standards that allows third parties to create add-on products to plug into or interoperate with the system? Knowledge management Reputation systems Open system Open source
Open system
______ decisions affects how the firm is run from day-to-day; they are the domain of operations managers, who are the closet to the customer. Operational Strategic Managerial
Operational
What affects how the firm is run from day-to-day; they are the domain of operations managers, who are the closest to the customer? Managerial decisions Operational decisions Strategic decisions
Operational decisions
At what level do employees develop, control, and maintain core business activities required to run the day-to-day operation? Operational level Managerial level Strategic level
Operational level
What is it called when a user choses to receive emails and allows permissions to incoming emails? Multiple choice question. Teergrubing Opt in Opt out
Opt in
_________ analysis finds the optimum value for a target variable by repeatedly changing other variables, subject to specified constraints. What-if Sensitivity Optimization Goal-Seek
Optimization
Which type of analysis finds the optimum value for a target variable by repeatedly changing other variables, subject to specified constraints? Sensitivity analysis What-if analysis Optimization analysis
Optimization analysi
____________ occurs when a machine learning model matches the training data so closely that the model fails to make correct predictions on new data. Underfitting Augmentation Intelligence Overfitting
Overfitting
_______ is a string of alphanumeric characters used to authenticate a user and provide access to a system. Multiple choice question. Password Token Smart card
Password
What is an exclusive right to make, use, and sell an invention and is granted by a government to the inventor? Multiple choice question. Counterfeit software Information ethics Copyright patent
Patent
_________ identifiable information is any data that could potentially identify a specific individual. Multiple choice question. Personally Encrypted Advanced Privilege
Personally
What is any data that could potentially identify a specific individual? Multiple choice question. Time bombs Horizontal privilege escalation Advanced encryption standard Personally identifiable information
Personally identifiable information
What reroutes requests for legitimate websites to false websites? Multiple choice question. Zombie Pharming Phishing Zombie farm
Pharming
__________ reroutes requests for legitimate websites to false websites. Multiple choice question. Pharming Phishing Zombie
Pharming
What uses a zombie farm, often by an organized crime association, to launch a massive phishing attack? Multiple choice question. Pharming attack Authentication and authorization Information secrecy Identity theft
Pharming attack
What is a masquerading attack that combines spam with spoofing? Multiple choice question. Identity theft Phishing expedition Zombie farm Information secrecy
Phishing expedition
_________ security is tangible protection such as alarms, guards, fireproof doors, fences, and vaults. Multiple choice question. Information Workplace Physical
Physical
What is tangible protection such as alarms, guards, fireproof doors, fences, and vaults? Multiple choice question. Threat Physical security Workplace MIS monitoring
Physical security
Drag and drop the definitions against the corresponding key terms. Instructions Pie chart Pie chart drop zone empty. Bar chart Bar chart drop zone empty. Histogram Histogram drop zone empty. Sparkline Time-series chart Time-series chart drop zone empty. A small embedded line graph that illustrates a single trend A graphical representation showing change of a variable over time A chart or graph that presents grouped data with rectangular bars with lengths proportional to the values they they represent A graphical display of data using bars of different heights A type of graph in which a circle is divided into sectors that each represent a proportion of the whole
Pie chart- A type of graph in which a circle is divided into sectors that each represent a proportion of the whole Bar chart- A chart or graph that presents grouped data with rectangular bars with lengths proportional to the values they they represent Histogram- A graphical display of data using bars of different heights Sparkline- A small embedded line graph that illustrates a single trend Time-series chart- A graphical representation showing change of a variable over time
_________ software is the unauthorized use, duplication, distribution, or sale of copyrighted software. Multiple choice question. Counterfeit Digital Pirated
Pirated
What is the unauthorized use, duplication, distribution, or sale of copyrighted software? Multiple choice question. Digital rights management Counterfeit software Intellectual property Pirated software
Pirated software
What converts an audio broadcast to a digital music player? Content management system Videoconferencing Podcasting Instant messaging
Podcasting
What is a way to validate transactions and achieve a distributed consensus? Immutability Proof-of-stake Proof-of-work Genesis block
Proof-of-stake
What is a way to validate transactions and achieve a distributed consensus? Proof-of-work Genesis block Proof-of-stake Immutability
Proof-of-stake
What is a requirement to define an expensive computer calculation, also called mining, that needs to be performed in order to create a new group of trustless transactions (blocks) on the distributed ledger or blockchain? Bitcoin Immutable Proof-of-stake Proof-of-work
Proof-of-work
Information _________ is an ethical issue that focuses on who owns information about individuals and how information can be sold and exchanged. Multiple choice question. property secrecy governance
Property
What is a form of malicious software that infects your computer and asks for money? Multiple choice question. Polymorphic virus Adware Ransomware Spyware
Ransomware
___________ is a form of malicious software that infects your computer and asks for money. Multiple choice question. Adware Scareware Ransomware
Ransomware
What is the network security model necessary to accommodate the emergence of multiple perimeters and moving parts on the network, and increasingly advanced threats targeting enterprises? Real-time adaptive security Virtual assistant Biological 3D printing Autonomic computing
Real-time adaptive security
What occurs when a system updates information at the same rate it receives it? Internet service provider Real-time communication Instant messaging
Real-time communication
What combines art along with science to determine how to make URLs more attractive to search engines resulting in higher search engine ranking? Search engine optimization Search engine conversion Search engine ranking Search engine analytics
Search engine optimization
What evaluates variables that search engines use to determine where a URL appears on the list of search results? Search engine optimization Search engine Search engine ranking
Search engine ranking
______-structured decisions occur in situations in which a few established processes help to evaluate potential solutions, but not enough to lead to a definite recommended decision. Middle Semi Full
Semi
What types of decisions occur in situations in which a few established processes help to evaluate potential solutions, but not enough to lead to a definite recommended decision? Unstructured decisions Structured decisions Semistructured decisions
Semistructured decisions
What is a device about the size of a credit card, containing embedded technologies that can store information and small amounts of software to perform some limited processing? Multiple choice question. Smart card Biometrics Token Fingerprint
Smart card
_________ content is content that is designed to be easy for readers to consume and to share. Folksonomy Social Snackable Hashtag
Snackable
_________ content is content that is designed to be easy for readers to consume and to share. Snackable Hashtag Folksonomy Social
Snackable
What is content that is designed to be easy for readers to consume and to share? Snackable content Folksonomy Social bookmarking Hashtag
Snackable content
What refers to websites that rely on user participation and user-contributed content, such as Facebook, YouTube, and Digg? Social knowledge Social media Social network
Social media
Which policy outlines the corporate guidelines or principles governing employee online communications? Multiple choice question. Internet use policy Acceptable use policy Social media policy Workplace monitoring policy
Social media policy
Which of the following is an application that connects people by matching profile information? Social marketing Social network Social media
Social network
What maps group contacts (personal and professional) identifying who knows each other and who works together? Social tagging Social networking analysis Asynchronous communication Folksonomy
Social networking analysis
What describes the collaborative activity of marking shared online content with keywords or tags as a way to organize it for future navigation, filtering, or search? Social tagging Social networking Social media
Social tagging
What is unsolicited email? Multiple choice question. Teergrubing Mail bomb Spam Opt-out
Spam
________ is unsolicited email. Multiple choice question. Teergrubbing Spam Mail
Spam
______ decisions involve higher level issues concerned with the overall direction of the organization and define the organization's aspirations for the future. Operational Strategic Managerial
Strategic
______ decisions involve higher level issues concerned with the overall direction of the organization and define the organization's aspirations for the future. Strategic Operational Managerial
Strategic
At what level do managers develop overall business strategies, goals, and objectives as part of the company's strategic plan? \ Operational level Strategic level Managerial level
Strategic level
Which decisions arise in situations where established processes offer potential solutions? Structured Unstructured
Structured
Machine learning matches Choice Enables computers to both understand concepts in the environment, and also to learn. Weak AI matches Choice Machines can still make their own decisions based on reasoning and past sets of data. Strong AI matches Choice Works towards providing brain like powers to AI machines; in effect, it works to make machines as intelligent as the humans.
Supervised machine learning- Training a model from input data and its corresponding labels. Unsupervised machine learning- Choice Training a model to find patterns in a dataset, typically an unlabeled dataset. Transfer machine learning- Transfers information from one machine learning task to another.
An open ________ consists of nonproprietary hardware and software based on publicly known standards that allows third parties to create add-on products to plug into or interoperate with the system. source system content
System
What are specific keywords or phrases incorporated into website content for means of classification or taxonomy? Social bookmarks Tags Social media
Tags
What is the scientific classification of organisms into groups based on similarities of structure or origin? Content management system Taxonomy Information architecture
Taxonomy
_______ is the scientific classification of organisms into groups based on similarities of structure or origin. Architecture Webinar Taxonomy
Taxonomy
What is an antispamming approach where the receiving computer launches a return attack against the spammer, sending email messages back to the computer that originated the suspected spam? Multiple choice question. Teergrubing Typosquatting Cybervandalism
Teergrubing
____________ is an antispamming approach where the receiving computer launches a return attack against the spammer, sending email messages back to the computer that originated the suspected spam. Multiple choice question. Cybervandalism Teergrubing Typosquatting
Teergrubing
What is a remote-controlled, wheeled device with a display to enable video chat and videoconferencing? Telepresence robot Podcasting Videoconference
Telepresence robot
What is an act or object that poses a danger to assets? Multiple choice question. Threat Click-fraud Epolicies Cyberbullying
Threat
__________ bombs are computer viruses that wait for a specific date before executing their instructions. Multiple choice question. Logic Cryptography Time Encryption
Time
What are computer viruses that wait for a specific date before executing their instructions? Multiple choice question. Time bombs Certificates Biometrics Encryption
Time bombs
What are small electronic devices that change user passwords automatically? Multiple choice question. Password Fingerprints Tokens Smart cards
Tokens
_______ information encompasses all raw facts contained within a single process and its purpose is to support daily operational tasks. Analytical Transactional
Transactional
What examines a trend to identify its nature, causes, speed of development, and potential impacts? Computer simulation Trend analysis Trend monitoring Trend projection
Trend analysis
What views trends that are particularly important in a specific community, industry, or sector are carefully monitored, watched, and reported to key decision makers? Trend analysis Computer simulation Trend projection Trend monitoring
Trend monitoring
What occurs when numerical data are available and a trend can be plotted to display changes through time and into the future? Trend monitoring Trend analysis Computer simulation Trend projection
Trend projection
True or false: A bring your own device (BYOD) policy allows employees to use their personal mobile devices and computers to access enterprise data and applications. True or false
True
True or false: Infographics (information graphics) present the results of data analysis, displaying the patterns, relationships, and trends in a graphical format. True or false
True
True or false: Web Real-Time Communications (WebRTC) is an open source project that seeks to embed real-time voice, text, and video communications capabilities in web browsers. True False
True
What is a problem that occurs when someone registers purposely misspelled variations of well-known domain names? Multiple choice question. Cybervandalism Cyberbullying Typosquatting
Typosquatting
__________ (one word) is a problem that occurs when someone registers purposely misspelled variations of well-known domain names. Multiple choice question. Cyberbullying Cybervandalism Typosquatting
Typosquatting
What occurs when a machine learning model has poor predictive abilities because it did not learn the complexity in the training data? Multiple choice question. Underfitting Overfitting Data augmentation
Underfitting
________ occurs when a machine learning model has poor predictive abilities because it did not learn the complexity in the training data. Underfitting Augmentation Overfitting Bias
Underfitting
What are decisions that occur in situations in which no procedures or rules exist to guide decision makers toward the correct choice? Structured Semistructured Unstructured
Unstructured
What is created and updated by many users for many users? User-contributed content Collective intelligence Knowledge management system
User-contributed content
_______ privilege escalation occurs when attackers grant themselves a higher access level such as administrator, allowing the attacker to perform illegal actions such as running unauthorized code or deleting data. Multiple choice question. Horizontal Vertical Content
Vertical
What allows people at two or more locations to interact via two-way video and audio transmissions simultaneously as well as share documents, data, computer displays, and whiteboards? Webinar Videoconference Instant messaging Podcasting
Videoconference
What is a small program stored on a PC or portable device that monitors emails, faxes, messages, and phone calls? Digital ink/Digital paper Teleliving Virtual assistant
Virtual assistant
A(n) ________ is software written with malicious intent to cause annoyance or damage. Multiple choice question. cracker script kiddie virus
Virus
What produces graphical displays of patterns and complex relationships in large amounts of data? Optimization Granularity Visualization
Visualization
______ produces graphical displays of patterns and complex relationships in large amounts of data. Multiple choice question. Visualization Optimization Sensitivity
Visualization
______ AI machines can still make their own decisions based on reasoning and past sets of data. Straight Output Strong Weak
Weak
What machines can still make their own decisions based on reasoning and past sets of data? Multiple choice question. Weak AI Strong AI
Weak AI
Select the term representing the next generation of Internet use — a distinctive communications platform characterized by new qualities, such as collaboration and sharing. Business 1.0 Business 3.0 Web 2.0 Web 3.0
Web 2.0
What is the next generation of Internet use—a more mature, distinctive communications platform characterized by new qualities such as collaboration sharing, and free? Semantic Web Web 1.0 Web 3.0 Web 2.0
Web 2.0
What is an open source project that seeks to embed real-time voice, text, and video communications capabilities in web browsers? Internet service provider Web Real-Time Communications
Web Real-Time Communications
What blends videoconferencing with document sharing and allows the user to deliver a presentation over the web to a group of geographically dispersed participants? Web conferencing Podcasting Content management system
Web conferencing
What is a locally stored URL or the address of a file or Internet page saved as a shortcut? Social bookmarking Social tagging Folksonomy Website bookmark
Website bookmark
What is the theft of a website's name that occurs when someone, posing as a site's administrator, changes the ownership of the domain name assigned to the website to another website owner? Multiple choice question. Website name stealing Typosquatting Internet censorship Cybervandalism
Website name stealing
________-if analysis checks the impact of a change in a variable or assumption on the model. Goal Sensitivity What
What
Which DDS analysis technique checks the impact of a single change in a variable or assumption on the model? Optimization analysis What-if analysis Sensitivity analysis Goal-seeking analysis
What-if analysis
A(n) _______ is a type of collaborative web page that allows users to add, remove, and change content, which can be easily organized and reorganized as required. blog microblogging mashup wiki
Wiki
What is a type of collaborative web page that allows users to add, remove, and change content, which can be easily organized and reorganized as required? Web log Network effect Mashup Wiki
Wiki
_________ MIS monitoring tracks people's activities by such measures as number of keystrokes, error rate, and number of transactions processed. Multiple choice question. Employee Adware Workplace
Workplace
What tracks people's activities by such measures as number of keystrokes, error rate, and number of transactions processed? Multiple choice question. Employee security Physical security Workplace MIS monitoring
Workplace MIS monitoring
What tracks people's activities by such measures as number of keystrokes, error rate, and number of transactions processed? Multiple choice question. Workplace MIS monitoring Physical security Employee security
Workplace MIS monitoring
A(n) ___________ use policy requires a user to agree to follow it to be provided access to corporate email, information systems, and the Internet. Multiple choice question. email information internet acceptable
acceptable
Historical __________ occurs when historical events are studied to anticipate the outcome of current developments. monitoring analysis projection
analysis
Social networking _________ maps group contacts (personal and professional) identifying who knows each other and who works together. communication analysis content
analysis
Trend __________ occurs when a trend is examined to identify its nature, causes, speed of development, and potential impacts. analysis projection monitoring
analysis
What occurs when the user goes into an emotional state of over-analysis (or over-thinking) a situation so that a decision or action is never taken, in effect paralyzing the outcome? information graphics analysis paralysis data visualization business intelligence dashboard
analysis paralysis
Online ____________ processing is the manipulation of information to create business intelligence in support of strategic decision making. informational analytical organizational transactional
analytical
A(n) ________ policy simply states that email users will not send unsolicited emails. Multiple choice question. virus information anti-spam
anti-spam
Information ___________ is the set of ideas about how all information in a given context should be organized. architecture management content
architecture
Information ___________ is the set of ideas about how all information in a given context should be organized. content architecture management
architecture
A data _________ is a business analytics specialist who uses visual tools to help people understand complex data. Multiple choice question. point intelligence artist
artist
Data __________ occurs when adding additional training examples by transforming existing examples. learning machine transfer augmentation
augmentation
A(n) __________ agent is software that carries out some set of operations on behalf of a user or another program with some degree of independence or autonomy, and employ some knowledge or representation of the user's goals or desires. machine virtual learning autonomous
autonomous
Network _____ analysis gathers an organization's computer network traffic patterns to identify unusual or suspicious operations. Multiple choice question. behavior detection vigilantes intrusion
behavior
Network _____ analysis gathers an organization's computer network traffic patterns to identify unusual or suspicious operations. Multiple choice question. intrusion behavior vigilantes detection
behavior
A(n) ____________ is a type of distribution ledger, consisting of blocks of data that maintain a permanent and tamper-proof record of transactional data. hash blockchain immutable ledger
blockchain
A blockchain is formed by linking ______, data structures containing a hash, previous hash, and data. hash immutable blocks previous
blocks
Consumer-to-_________ applies to any consumer who sells a product or service to a business on the Internet. customer government business consumer
business
What is any proprietary software licensed under exclusive legal right of the copyright holder? open source open system closed source closed system
closed source
utonomic _________ is a self-managing computing model named after, and patterned on, the human body's autonomic nervous system. information computing security
computing
Consumer-to-__________ applies to customers offering goods and services to each other on the Internet. business employee consumer government
consumer
What sources capital for a project by raising many small amounts from a large number of individuals, typically via the Internet? Multiple choice question. crowdfunding explicit knowledge crowdsourcing synchronous communication
crowdfunding
A(n) ___________ is an organized attempt by a country's military to disrupt or destroy information and communication systems for another country. Multiple choice question. firewall cyberterrorism cyberwar
cyberwar
A(n) ______ anthropologist is an individual who studies the interaction between humans and technology, observing how technology can shape humans' lives. cyborg hitbot service provider search engine
cyborg
Business intelligence ___________ track corporate metrics such as critical success factors and key performance indicators and include advanced capabilities such as interactive controls allowing users to manipulate data for analysis. anomaly detection analysis dashboards
dashboards
Digital __________ track KPIs and CSFs by compiling information from multiple sources and tailoring it to meetuser needs. Multiple choice question. analysis dashboards transactions
dashboards
To _________ information is to decode it and is the opposite of encrypt. Multiple choice question. cryptography decrypt filter
decrypt
To _________ information is to decode it and is the opposite of encrypt. Multiple choice question. cryptography filter decrypt
decrypt
Podcasting converts an audio broadcast to a __________ music player. system videoconferencing digital messaging
digital
The ambient ______ experience is a blend of the physical, virtual, and electronic environments creating a real-time ambient environment that changes as the user moves from one place to another. digital augmented virtual
digital
Processing and managing algorithms across many machines in a computing environment is known as ___. distributed computing extraction, transformation, and loading information cleansing
distributed computing
A(n) __________ privacy policy details the extent to which email messages may be read by others. Multiple choice question. email computer Internet information
Phishing ________ is a masquerading attack that combines spam with spoofing. Multiple choice question. secrecy expedition agents
expedition
A zombie _________ is a group of computers on which a hacker has planted zombie programs. Multiple choice question. expedition farm hacker
farm
Content ____________ occurs when organizations use software that filters content, such as emails, to prevent the accidental or malicious transmission of unauthorized information. Multiple choice question. time filtering encryption
filtering
A(n) ___ is a function that converts an input of letters and numbers into an encrypted output of a fixed length.. proof hash block immutable
hash
A(n) ________ is a keyword or phrase used to identify a topic and is preceded by a hash or pound sign (#). For example, #sandiegofire bookmarket website folksonomy hashtag
hashtag
What is a keyword or phrase used to identify a topic and is preceded by a hash or pound sign (#)? hashtag taxonomy social bookmarking folksonomy
hashtag
A(n) ______ privilege escalation occurs when attackers grant themselves the same access levels they already have but assume the identity of another user. Multiple choice question. vertical content horizontal
horizontal
Managers need to analyze large amounts of _________ to make quick business decisions. information ethics security
information
A(n) _________ service provider is a company that provides access to the Internet for a monthly fee. email internet podcasting instant employee
internet
A(n) _________ use policy contains general principles to guide the proper use of the Internet. Multiple choice question. email information internet
internet
A(n) _________ use policy contains general principles to guide the proper use of the Internet. Multiple choice question. information email internet
internet
A(n) _________ (one word) management system supports the capturing, organization, and dissemination of knowledge (i.e., know-how) throughout an organization. collective knowledge social native
knowledge
A(n) _______ records classified and summarized transactional data. hash distribution ledger stake
ledger
At the _________ level, employees are continuously evaluating company operations to hone the firm's abilities to identify, adapt to, and leverage change. operational strategic managerial
managerial
Proof-of-work is a requirement to define an expensive computer calculation, also called _________, that needs to be performed in order to create a new group of trustless transactions (blocks) on the distributed ledger or blockchain. proof Bitcoin stake mining
mining
A social __________ is an application that connects people by matching profile information media network marketing analysis
network
A contractual stipulation which ensures that ebusiness participants do not deny their online actions is called a __________ clause. Multiple choice question. Internet use policy acceptable use policy Internet censorship nonrepudiation
nonrepudiation
A contractual stipulation which ensures that ebusiness participants do not deny their online actions is called a __________ clause. Multiple choice question. nonrepudiation acceptable use policy Internet use policy Internet censorship
nonrepudiation
Search engine ___ combines art along with science to determine how to make URLs more attractive to search engines resulting in higher search engine ranking. ranking optimization conversion analytics
optimization
What is a string of alphanumeric characters used to authenticate a user and provide access to a system? Multiple choice question. token password biometrics
password
A(n) _______ escalation is a network intrusion attack that takes advantage of programming errors or design flaws to grant the attacker elevated access to the network and its associated data and applications. privilege cryptography authentication
privilege
What occurs when a network intrusion attacker takes advantage of programming errors or design flaws to grant the attacker elevated access to the network and its associated data and applications? Multiple choice question. identity theft pharming expedition privilege escalation zombie attack
privilege escalation
Application ______ interface is a set of routines, protocols, and tools for building software applications. editor programming effect syndication
programming
Sock _____ marketing is the use of a false identity to artificially stimulate demand for a product, brand, or service. Multiple choice question. authorization phishing puppet pharming
puppet
A telepresence _______ is a remote-controlled, wheeled device with a display to enable video chat and videoconferencing. podcast system video robot
robot
Real-time adaptive ______ is the network security model necessary to accommodate the emergence of multiple perimeters and moving parts on the network, and increasingly advanced threats targeting enterprises. digital information security
security
What is a self-photograph placed on a social media website? blog microblogging wiki selfie
selfie
A(n) _______ card is a device about the size of a credit card, containing embedded technologies that can store information and small amounts of software to perform some limited processing. Multiple choice question. information smart intelligent
smart
What is the process of monitoring and responding to what is being said about a company, individual, product, or brand? Multiple choice question. social media monitoring employee monitoring policy social media manager workplace MIS monitoring
social media monitoring
Website name ____________ is the theft of a website's name that occurs when someone, posing as a site's administrator, changes the ownership of the domain name assigned to the website to another website owner. Multiple choice question. vandalism stealing censorship squatting
stealing
At the Blank______ level, managers develop overall business strategies, goals, and objectives as part of the company's strategic plan. operational strategic managerial
strategic
Operational decisions are considered Blank______ decisions, which arise in situations where established processes offer potential solutions. structured unstructured modeled frequency
structured
Social _________ describes the collaborative activity of marking shared online content with keywords or tags as a way to organize it for future navigation, filtering, or search. bookmarking marketing analysis tagging
tagging
A(n) ________ is an act or object that poses a danger to assets. Multiple choice question. threat cyberbullying nonrepudiation
threat
Strategic decisions are highly Blank______ decisions, occurring in situations in which no procedures or rules exist to guide decision makers toward the correct choice. structured unstructured semistructured
unstructured
Strategic decisions are highly Blank______ decisions, occurring in situations in which no procedures or rules exist to guide decision makers toward the correct choice. unstructured semistructured structured
unstructured
What occurs when attackers grant themselves a higher access level such as administrator, allowing the attacker to perform illegal actions such as running unauthorized code or deleting data? Multiple choice question. vertical privilege escalation content filtering horizontal privilege escalation time bomb
vertical privilege escalation
he _________ assistant will be a small program stored on a PC or portable device that monitors emails, faxes, messages, and phone calls. autonomous digital virtual
virtual
What is a phone scam that attempts to defraud people by asking them to call a bogus telephone number to "confirm" their account information? Multiple choice question. vishing pharming authentication zombie
vishing
Data __________ tools move beyond Excel graphs and charts into sophisticated analysis techniques such as pie charts, controls, instruments, maps, time-series graphs, and more. analysis paralysis visualization intelligence
visualization
What is the assurance that messages and information remain available only to those authorized to view them? Multiple choice question. Ethics Privacy Confidentiality Information ethics
Confidentiality
Through social ____________, hackers use their social skills to trick people into revealing access credentials or other valuable information. Multiple choice question. engineering diving information
engineering
___________ phishing is a phishing expedition in which the emails are carefully designed to target a particular person or organization. Multiple choice question. Farm Zombie Spear Pharming
Spear
What is a phishing expedition in which the emails are carefully designed to target a particular person or organization? Multiple choice question. Destructive agents Zombie farm Spear phishing Pharming
Spear phishing
Information __________ is a method or system of government for information management or control. Multiple choice question. compliance management governance
Governance
_______ are experts in technology who use their knowledge to break into computers and computer networks, either for profit or just motivated by the challenge. Multiple choice question. Virus Hackers Security
Hackers
Who are legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident? Multiple choice question. Customers Insiders Outsiders Suppliers
Insiders
___________ are legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident. Multiple choice question. Insiders Customers Suppliers
Insiders
What is intangible creative work that is embodied in physical form and includes copyrights, trademarks, and patents? Multiple choice question. Digital rights management Information ethics Copyright Intellectual property
Intellectual property
What is the right to be left alone when you want to be, to have control over your personal possessions, and not to be observed without your consent? Multiple choice question. Ethics Confidentiality Privacy
Privacy
_______ is the right to be left alone when you want to be, to have control over your personal possessions, and not to be observed without your consent. Multiple choice question. Copyright Patent Privacy
Privacy
_______ is the right to be left alone when you want to be, to have control over your personal possessions, and not to be observed without your consent. Multiple choice question. Patent Copyright Privacy
Privacy
What is designed to trick victims into giving up personal information to purchase or download useless and potentially dangerous software? Multiple choice question. Script Kiddie Worm Scareware Hacker
Scareware
Information ________ is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity. Multiple choice question. management privacy secrecy
Secrecy
Information ________ is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization. Multiple choice question. security privacy ethics
Security
Which of the following relies on social skills to trick people into revealing access credentials or other valuable information? Multiple choice question. Social security policies Social engineering Hackers and viruses Sock puppet marketing
Social engineering
What is the use of a false identity to artificially stimulate demand for a product, brand, or service? Multiple choice question. Pharming Phishing expedition Sock puppet marketing Authentication and authorization
Sock puppet marketing
What is a special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission? Multiple choice question. Worm Backdoor program Adware Spyware
Spyware
_________ is a special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission. Multiple choice question. Spyware Adware Malware
Spyware
What is software that, while purporting to serve some useful function and often fulfilling that function, also allows Internet advertisers to display advertisements without the consent of the computer user? Multiple choice question. Adware Spyware Ransomware
Adware
_________ is software that, while purporting to serve some useful function and often fulfilling that function, also allows Internet advertisers to display advertisements without the consent of the computer user. Multiple choice question. Hacker Malware Adware
Adware
What is the practice of artificially stimulating online conversation and positive reviews about a product, service or brand? Multiple choice question. Astroturfing Pharming Phishing expedition Zombie farm
Astroturfing
___________ is the process of providing a user with permission including access levels and abilities such as file access, hours of access, and amount of allocated storage space. Multiple choice question. Resistance Authentication Authorization Prevention
Authorization
Match the type of virus on the left with its correct definition on the right. Instructions Backdoor program Backdoor program drop zone empty. Trojan-horse virus Trojan-horse virus drop zone empty. Polymorphic virus Polymorphic virus drop zone empty. Denial-of-service attack Denial-of-service attack drop zone empty. Viruses and worms change their form as they propagate. Hides inside other software, usually as an attachment or a downloadable file. Opens a way into the network for future attacks. Floods a website with so many requests for service that it slows down or crashes the site.
Backdoor program- Opens a way into the network for future attacks. Trojan-horse virus- Hides inside other software, usually as an attachment or a downloadable file. Polymorphic virus- Viruses and worms change their form as they propagate. Denial-of-service attack- Floods a website with so many requests for service that it slows down or crashes the site.
What is a type of malware that causes a collection of connected devices to be controlled by a hacker? Multiple choice question. worms bugs botnets governance
Botnets
______ are a type of malware that causes a collection of connected devices to be controlled by a hacker. Multiple choice question. Worms Governance Botnets Bugs
Botnets
The ________ Online Protection Act was passed to protect minors from accessing inappropriate material on the Internet. Multiple choice question. Child Patient Parent
Child
What was passed to protect minors from accessing inappropriate material on the Internet? Multiple choice question. Digital Rights Management Act Epolicies Protection Act Child Online Protection Act Online Information Protection Act
Child Online Protection Act
Information _________ is the act of conforming, acquiescing, or yielding information. Multiple choice question. secrecy compliance property
Compliance
__________ is the assurance that messages and information remain available only to those authorized to view them. Intellectual property Confidentiality Security
Confidentiality
What is the legal protection afforded an expression of an idea, such as a song, book, or video game? Multiple choice question. Copyright Intellectual property Confidentiality Pirated software
Copyright
__________ is the legal protection afforded an expression of an idea, such as a song, book, or video game. Multiple choice question. Confidentiality Copyright Ediscovery
Copyright
_________ software is software that is manufactured to look like the real thing and sold as such. Multiple choice question. Intellectual Pirated Counterfeit
Counterfeit
What is software that is manufactured to look like the real thing and sold as such? Multiple choice question. Intellectual property Pirated software Information compliance Counterfeit software
Counterfeit software
_____________ involves prevention, detection, and response to cyberattacks that can have wide-ranging effects on the individual, organizations, community, and at the national level. Multiple choice question. Compliance Downtime Cybersecurity Governance Trust
Cybersecurity
________ rights management is a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution. Multiple choice question. Digital Confidentiality Counterfeit
Digital
What is a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution? Multiple choice question. Pirated software Intellectual property Digital rights management Counterfeit software
Digital rights management
What is the measure of consumer, partner, and employee confidence in an organization's ability to protect and secure data and the privacy of individuals? Multiple choice question. Patent Digital trust Intellectual property Ediscovery
Digital trust
What is a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network? Multiple choice question. Script kiddies Cracker Adware Drive-by hacking
Drive-by hacking
What refers to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry? Multiple choice question. Ediscovery COPA Epolicies Cyberbulling
Ediscovery
An _______ hacker is a person who hacks into a computer system to find vulnerabilities to help a company test its security. Multiple choice question. unethical illegal ethical
Ethical
__________ theft is the forging of someone's identity for the purpose of fraud. Multiple choice question. Vishing Identity Phishing
Identity
What is the forging of someone's identity for the purpose of fraud? Multiple choice question. Vishing Social engineering Identity theft
Identity theft
____________ ethics govern the ethical and moral issues arising from the development and use of information technologies, as well as the creation, collection, duplication, distribution, and processing of information itself. Multiple choice question. Information Pirated Intellectual
Information
What governs the ethical and moral issues arising from the development and use of information technologies, as well as the creation, collection, duplication, distribution, and processing of information itself? Multiple choice question. Copyright Pirated software Information ethics Digital rights management
Information ethics
What is a method or system of government for information management or control? Multiple choice question. Information compliance Information governance Information property Information management
Information governance
What examines the organizational resource of information and regulates its definitions, uses, value, and distribution ensuring it has the types of data/information required to function and grow effectively? Multiple choice question. Information property Information management Information governance Information compliance
Information managemen
What is an ethical issue that focuses on who owns information about individuals and how information can be sold and exchanged? Multiple choice question. Information management Information compliance Information property Information governance
Information property
What category of computer security addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity? Multiple choice question. Information governance Information secrecy Information property Information compliance
Information secrecy
What is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity? Multiple choice question. Destructive agents Information secrecy Identity theft Information vishing
Information secrecy
What is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization? Multiple choice question. Information ethics Hackers Adware Information security
Information security
Scareware is a type of ________ designed to trick victims into giving up personal information to purchase or download useless and potentially dangerous software. Multiple choice question. malware bug bounty program dumpster diving
Malware
What is software that is intended to damage or disable computers and computer systems? Multiple choice question. Bloatware Malware Adware
Malware
Information ___________ examines the organizational resource of information and regulates its definitions, uses, value, and distribution ensuring it has the types of data/information required to function and grow effectively. Multiple choice question. property management governance
Management
What is a technique to gain personal information for the purpose of identity theft, usually by means of fraudulent emails that look as though they came from legitimate businesses? Multiple choice question. Vishing Phishing Pharming Information secrecy
Phishing
__________ is a technique to gain personal information for the purpose of identity theft, usually by means of fraudulent emails that look as though they came from legitimate businesses. Multiple choice question. Pharming Vishing Phishing
Phishing
True or false: A worm spreads itself not only from file to file but also from computer to computer. The primary difference between a virus and a worm is that a virus must attach to something, such as an executable file, to spread. True or false
True (Reason: A worm spreads itself not only from file to file but also from computer to computer. The primary difference between a virus and a worm is that a virus must attach to something, such as an executable file, to spread.)
Digital ___________ is the measure of consumer, partner, and employee confidence in an organization's ability to protect and secure data and the privacy of individuals. Multiple choice question. trust ethics information discovery
Trust
What is software written with malicious intent to cause annoyance or damage? Multiple choice question. Hacker Adware Virus Cracker
Virus
________ is a phone scam that attempts to defraud people by asking them to call a bogus telephone number to "confirm" their account information. Multiple choice question. Pharming Vishing Phishing
Vishing
Match the common type of hacker on the left with its correct definition on the right. Instructions White-hat hacker White-hat hacker drop zone empty. Script kiddies Script kiddies drop zone empty. Cyberterrorist Cyberterrorist drop zone empty. Cracker Cracker drop zone empty. Find hacking code on the Internet and click-and-point their way into systems to cause damage or spread viruses. Have criminal intent when hacking. Work at the request of the system owners to find system vulnerabilities and plug the holes. Seek to cause harm to people or to destroy critical systems or information and use the Internet as a weapon of mass destruction.
White-hat hacker- Work at the request of the system owners to find system vulnerabilities and plug the holes. Script kiddies- Find hacking code on the Internet and click-and-point their way into systems to cause damage or spread viruses.. Cyberterrorist- Seek to cause harm to people or to destroy critical systems or information and use the Internet as a weapon of mass destruction. Cracker- Have criminal intent when hacking.
What is a program that secretly takes over another computer for the purpose of launching attacks on other computers? Multiple choice question. Zombie Virus Hacker Phishing
Zombie
________ is a program that secretly takes over another computer for the purpose of launching attacks on other computers. Multiple choice question. Zombie Pharming Phishing
Zombie
What is a group of computers on which a hacker has planted zombie programs? Multiple choice question. Zombie farm Phishing Identity theft
Zombie farm
A pharming __________ uses a zombie farm, often by an organized crime association, to launch a massive phishing attack. Multiple choice question. threat theft attack
attack
Astroturfing is the practice of artificially stimulating online __________ and positive reviews about a product, service or brand. Multiple choice question. farms expedition attacks conversation
conversation
What involves prevention, detection, and response to cyberattacks that can have wide-ranging effects on the individual, organizations, community, and at the national level? Multiple choice question. information governance downtime information compliance cybersecurity digital trust
cybersecurity
Information __________ is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity. Multiple choice question. secrecy theft security
secrecy