Quiz 3
Social journalism or citizen journalism ________.
may not be as reliable as mainstream media sources
Harold's city government uses data from sensors combined with artificial intelligence to improve the local infrastructure and efficiency manage traffic lights, water supplies, and energy usage. Harold____
Lives in a smart city
A ____ is a valuable tool that enables a user to find information on the web by specifying words or phases known as keywords, which are related to a topic of interest
Search engine
Dodge works for a manufacturing firm where IoT and smart building systems monitor and control the usage of electrical systems. This benefits the firm primarily through _____.
reduced costs
One important difference between B2B and B2C e-commerce systems that primarily affects the second stage of the multistage model for e-commerce is that _____
Support for price and delivery negotiation is usually not essential with B2C systems
When you are looking for a 'hotspot', you are searching for _____.
Wireless Access Point
Can hackers who gain access to an organization's IoT cause physical damage?
Yes, by tampering with critical infrastructure
Which type of IoT application performs predictive analysis and initiates preemptive action using sensor data augmented with external data?
predict and adapt
One core task of e-commerce software is product configuration, which_____
.....
Which statement regarding how businesses can implement a successful e-commerce strategy is true?
.....
Why, during the final stage of the multistage model for e-commerce, is comprehensive customer information captured in the supplier's database
.....
Why are advances in 5G technology expected to influence the IoT?
5G enables many devices to transmit data quickly to the cloud.
What happens during the purchasing stage of the multistage e-commerce model when the buyer is a corporate buyer placing a monthly order with a long-term supplier
A completed purchase order is sent electronically to the supplier
Corporate intranets_____
Allow all sorts of documents to be converted to electric form for employee access
A key ingredient to e-commerce infrastructure is ___-
A web server platform
When you successfully Connect you computer to a printer using _____, two devices will be 10 to 30 feet apart and the computer will transmit to the printer at a rate of about 2 mbps
Bluetooth
Popular tools for creating Web pages and managing Web sites
Can auto-generate code for web pages
The World Wide Web uses a networking approach wherein many end-user computing devices request and receive services from host computers on the network, which is known as____
Client/server architecture
Which statement about data security in the public cloud is true?
Clients of public cloud computing services must rely on service providers to safeguard their data.
Pharmaceutical companies can use battery-powered sensors and either 4g or 5g connectivity to monitor their products for damaging temperature changes during shipment. What type of IoT application is this?
Connect and monitor
Which type of IoT application relies on Individual device that each gather a small amount of data and enables manual monitoring using simple threshold-based exception alerting?
Connect and monitor
an approach to building customer profiles that captures user-provided information, such a information from warranties, surveys, user registration, and contest-entry forms completed online, relies on______
Explicit personalization techniques
Hannah needs to create a Web site to advertise her catering services. Which of the following statements is FALSE?
Hannah must set up a server computer before publishing her web site
The area covered by one or more interconnected wireless access point is commonly called a(n)______
Hot spot
_____ is the standard page description language for web pages
Hypertext Markup Language (HTML)
an organization using a public cloud allows the service provider to store their data in a remote location, possibly on the same storage device as other organizations' data. This results in which key concern with the public cloud?
Inadequate data security
Jocelyn uses a company-owned smartphone for her job, and has noticed that applications, data, and patches are installed on her smartphone for her by a central control group. She cannot change the system or security settings on the smartphone because the central control group handles those as well. Jocelyn's company can do this using____
Mobile device management software
Why was it necessary for companies to reengineer their e-commerce web sites for m-commerce
Mobile devices provide small user interfaces
The ____ standard spells out measures and security procedures to safeguard the card issuers, the cardholder, and the merchant
Payment card industry (pci) security
Using a customer's name is an email campaign or a greeting that appears when they visit a web page is considered the most basic form of ____
Personalization
Many organizations outsource the primary activities of which stage of the multistage e-commerce model to firms such as federal express and United parcel service?
Product and service delivery
A _____ network is one in which all network devices are connected to one another through single central device called the hub node
Star
If customer data is stolen from a business's computers,___
The customer can file a class action law suit agains the business
How can a business best increase traffic to its e-commerce site
acquire links to its site on popular, related sites
Through e-government, _____.
any government unit, business or individual can interact with the government
Compared with 4G networks, 5G networks will greatly improve the user's experience with a technology that adds a virtual layer over the real world called _____.
augmented reality
A positive development for public, private, and hybrid cloud computing environments is the emerging ability of IT systems to manage themselves and adapt to changes in the computing environment, business policies, and operating objectives. This ability is known as ____
autonomic computing
One of the first things developers of IoT applications should focus on is _____
building in security from the start
Private Cloud Computing
can rely on on-premises or virtual clouds
The software on a client computer accessing the Web must be able to _____.
display the results returned by Web servers
Rosie, an office manager, recommends that her company transition to the public cloud because the office building is located in a tornado-prone area and has experienced property damage several times in the past as a result. She reasons that this move will _____.
guarantee continuity of operations even if the office is damaged by a tornado
Conversion to an e-commerce or m-commerce system enables organizations to _________.
improve the level of customer service
Which benefit of public cloud computing results when service providers operate multiple data centers distributed geographically and save multiple copies of data on different machines?
increased redundancy
Early 5G users should be aware that their coverage may be limited compared with 4G coverage, at least initially. Why will 5G networks likely be less widespread at first?
more cell towers will need to be installed
Josie is excited to learn that a 5G network is being installed in her area. She recognizes that
this will increase mobile data transfer speeds