MGT 3211 Chapter 12

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

According to an Oxford University study, what percentage of current jobs were expected to be overtaken by robots in the next two decades? A) About 50 percent. B) Only around 10 percent. C) Nearly 90 percent. D) Less than one percent.

A

One ethical concern about businesses collecting vast amounts of stakeholder data is: A) If the effort actually benefits the stakeholders. B) The terms and conditions are confusing to consumers. C) The information is too secure to be useful. D) There is often not enough detail to build a marketing campaign.

A

A CIO is the company's: A) Chief investigative officer. B) Chief information officer. C) Coordinator of international operations. D) Controller of internal overhead.

B

Downloading illegal files, spreading computer viruses, and stealing from online bank accounts is collectively referred to as: A) Hacking. B) Software piracy. C) Cybercrime. D) Internet censorship.

C

MIT researchers determined that 90 percent of shoppers' credit-card transactions could be used to: A) Uniquely identify an individual's shopping habits and preferences. B) Collect individual Social Security numbers. C) Identify an individual shopper using only four bits of secondary information. D) Both to uniquely identify an individual's shopping habits and preferences and to identify an individual shopper using only four bits of secondary information.

D

The responsibility of managing technology with its many privacy and security issues for business organizations is entrusted to the CFO.

false

The stakeholders rarely targeted by companies for personal data collection are employees and consumers.

false

In 2014, NATO ratified a change to its mission of collective defense by stating that a cyberattack on one member nation would be declared an attack on all members.

true

Robotic technology has advanced enough to generate many new business opportunities.

true

Increased cyber activity by which countries prompted NATO officials to brand them as "patriotic hackers"? A) Russia and Estonia. B) Iran and China. C) Iraq and Pakistan. D) Mexico and Canada.

B

The ability of a digital computer or computer-controlled robot to perform tasks commonly associated with intelligent beings is called: A) Robotics. B) Artificial intelligence. C) Cyborg knowledge. D) Autonomous brainpower.

B

According to McKinsey and Company, which position cannot be easily replaced with robots? A) Repetitive factory jobs. B) Clerks and bookkeepers. C) Team managers. D) Legal researchers.

C

As of 2016 what was the average cost of a data breach in the United States? A) $450 billion. B) $2.24 million. C) $7 million. D) $500 thousand.

C

Cybersecurity experts recommend including which essential elements for an incident-response plan for cyberattacks? A) Support from executive leadership. B) Involvement by all functional departments. C) Focus on how to respond to a breach. D) All of these answers are correct.

D

Intellectual property refers to: A) Protecting one's ideas, concepts, and symbolic creations. B) Special laws protecting copyrights, patents, and trademarks. C) Prohibiting the downloading of commercial software or videogames. D) All of these answers are correct.

D

The idea that every distribution channel must work together to deliver a unified and consistent customer experience is called: A) Multi-channel. B) Natural monopoly. C) Fulfillment center. D) Omnichannel.

D

In 2018 the European Union passed legislation to protect personal user data during collection, processing, and storage.

True

A 2017 IBM study predicted that the use of cognitive computing would decline rapidly over the next decade.

false

All countries have nearly identical intellectual property laws.

false

E-business refers to electronic exchanges from business to business and consumer to business.

true

E-business revenues are expected to rise primarily due to consumers in emerging markets.

true

One key role of the Chief Information Officer is to clearly define the value of information and how to protect it against threats.

true

The primary reason that hackers hack is to make money.

true

An example of a hacking job motivated by retaliation is: A) A woman hired a hacker to break into Facebook to find out if her boyfriend was cheating on her. B) A foreign government stole data from U.S. institutions and asked for ransom to return it. C) A white hatter broke into a major software firm's computer network exposing security flaws. D) A gray hatter revealed previously unreported bugs on a popular online shopping site.

A

One argument in favor of net neutrality is: A) Businesses that pay more should have faster Internet. B) Broadband providers should have free reign to block any site they object to. C) To fairly compete, small, medium, and large firms should have the same Internet bandwidth. D) Individuals don't need fast Internet, only businesses do.

C

Some experts believe that cybercrime can only be controlled through international government coordination.

true

One major advantage of conducting business online is: A) Enhanced local presence. B) Cost-effective marketing and promotions C) No need for professional customer service. D) Web security is less costly than physical security.

B

One of the biggest challenges for autonomous vehicle manufacturers, according to the case The Arrival of Autonomous Cars—Bright Future or Looming Threat? was: A) Keeping production costs low enough to make a profit. B) Ensuring the vehicles were safer than driver-controlled automobiles. C) Complying with international autonomous vehicle regulations. D) Building cars luxurious enough to attract wealthy customers.

B

This Act makes it a crime to circumvent antipiracy measures built into most commercial software agreements between the manufacturers and their users: A) Software Business Piracy Act. B) Digital Millennium Copyright Act. C) Intellectual Property Millennium Act. D) Copyright Act of 1998.

B

Hackers employed by businesses or governments to intentionally discover weaknesses in information systems are called: A) Gray hatters. B) Black hatters. C) White hatters. D) Mad hatters.

C

The EU law passed in 2018 that required companies to promptly report personal data breaches was called: A) Digital Millennial Copyright Act. B) Right to be Forgotten. C) General Data Protection Regulation. D) Global Policy Forum.

C

Over time the role of the CIO: A) Has remained about the same. B) Has decreased in level of responsibility. C) Has changed dramatically, superseding the role of the chief executive officer. D) Has become more integrated into the overall strategic direction of the firm.

D

Restrictive governments often reduce or eliminate citizen access to the Internet and social media sites in order to: A) Suppress political dissent. B) Impose religious or ideological views. C) Increase bandwidth for government usage. D) Both of these answers are correct: Increase bandwidth for government usage; and suppress political dissent.

D

The role of the CIO includes all of these tasks except: A) Acting as lead security officer. B) Educating the organization about technology initiatives. C) Marketing technology projects to stakeholders. D) Monitoring the appropriate level of employee productivity.

D

The use of robotics in the workplace has increased recently because: A) The cost of robots has decreased. B) Robots are more reliable than people. C) New collaborative machines have been invented. D) All of these answers are correct.

D

This annual international gathering on January 28 brought together leaders from the U.S. and dozens of European countries to address the global nature of cyberattacks: A) Cyberattack Awareness Day. B) Anti-cyber International. C) International Defense Against Web Attacks (IDAWA). D) Data Privacy Day.

D

Cybersecurity experts recommend that firms implement an incident-response plan for cyberattacks, which are strictly preventative in nature.

false

Net neutrality refers to the principle that the wealthier users should pay higher rates for faster Internet speeds

false

The collection of large amounts of consumer data by businesses creates ethical issues of privacy and security.

true

Buying and selling goods and services electronically is called: A) M-commerce. B) E-business. C) Telecommunications. D) Intellectual property.

B

Software piracy is a major problem in which part of the world? A) Globally. B) North America only. C) Asia only. D) Europe only.

A

The purpose of the right to be forgotten is to: A) Increase protection of privacy and personal information. B) Protect property rights. C) Protect intellectual property. D) Prevent software privacy.

A

A critical characteristic of a successful CIO is: A) Someone who relies on the chain of command. B) A leader with the ability to speak the language of the business. C) Dedicated to full-time back-office work. D) An expert on databases.

B


Set pelajaran terkait

Ionic Bonding and Ionic Compounds Study Guide

View Set

Chapter 1 : External vs. Internal Users

View Set

Chapter 7 Social Psychology : Persuasive Communication

View Set

Ch 27 fire and life safety initiative

View Set

Chapter 8: The Emergence of a Market Economy, 1815-1850 ME

View Set

Exam 3 - Climate Change. Chpt. 11 (Without Debates)

View Set