BA 325 Ch. 12 K

Ace your homework & exams now with Quizwiz!

A critical characteristic of a successful CIO is: Multiple Choice Someone who relies on the chain of command. A leader with the ability to speak the language of the business. Dedicated to full-time back-office work. An expert on databases.

A leader with the ability to speak the language of the business.

An example of a hacking job motivated by retaliation is: Multiple Choice A person hacks a government website to act against inaction by the government. A foreign government stole data from U.S. institutions and asked for ransom to return it. A white hatter broke into a major software firm's computer network exposing security flaws. A gray hatter revealed previously unreported bugs on a popular online shopping site.

A person hacks a government website to act against inaction by the government.

In some nondemocratic or authoritarian societies such as China, Pakistan, Iran, and North Korea, why did the governments generally intervene to restrict their citizens' access to information and various Internet and social media sites? Multiple Choice To suppress political dissent To impose religious or ideological views To increase bandwidth for government usage Both of these answers are correct: "To impose religious or ideological views" and "To suppress political dissent."

Both of these answers are correct: "To impose religious or ideological views" and "To suppress political dissent."

MIT researchers determined that 90 percent of shopper's credit-card transactions could be used to: Multiple Choice Uniquely identify an individual's shopping habits and preferences. Collect individual Social Security numbers. Identify an individual shopper using only four bits of secondary information. Both to uniquely identify an individual's shopping habits and preferences and to identify an individual shopper using only four bits of secondary information.

Both to uniquely identify an individual's shopping habits and preferences and to identify an individual shopper using only four bits of secondary information.

One of the biggest challenges for autonomous vehicle manufacturers, according to the case The Arrival of Autonomous Cars—Bright Future or Looming Threat? was: Multiple Choice Keeping production costs low enough to make a profit. Ensuring the vehicles were safer than driver-controlled automobiles. Complying with international autonomous vehicle regulations. Building cars luxurious enough to attract wealthy customers.

Ensuring the vehicles were safer than driver-controlled automobiles.

One ethical concern about businesses collecting vast amounts of stakeholder data is: Multiple Choice If the effort actually benefits the stakeholders. The terms and conditions are confusing to consumers. The information is too secure to be useful. There is often not enough detail to build a marketing campaign.

If the effort actually benefits the stakeholders.

The purpose of the right to be forgotten is to: Multiple Choice Increase protection of privacy and personal information. Protect property rights. Protect intellectual property. Prevent software privacy.

Increase protection of privacy and personal information.

The role of the CIO includes all of these tasks except: Multiple Choice Acting as lead security officer. Educating the organization about technology initiatives. Marketing technology projects to stakeholders. Monitoring the appropriate level of employee productivity.

Monitoring the appropriate level of employee productivity.

The idea that every distribution channel must work together to deliver a unified and consistent customer experience is called: Multiple Choice Multi-channel. Natural monopoly. Fulfillment center. Omnichannel.

Omnichannel.

As of 2016 what was the average cost of a data breach in the United States? Multiple Choice $450 billion. $2.24 million. $7 million. $500 thousand.

$7 million.

According to an Oxford University study, what percentage of current jobs were expected to be overtaken by robots in the next two decades? Multiple Choice About 50 percent. Only around 10 percent. Nearly 90 percent. Less than one percent.

About 50 percent.

Cybersecurity experts recommend including which essential elements for an incident-response plan for cyberattacks? Multiple Choice Support from executive leadership. Involvement by all functional departments. Focus on how to respond to a breach. All of these answers are correct.

All of these answers are correct.

The use of robotics in the workplace has increased recently because: Multiple Choice The cost of robots has decreased. Robots are more reliable than people. New collaborative machines have been invented. All of these answers are correct.

All of these answers are correct.

The ability of a digital computer or computer-controlled robot to perform tasks commonly associated with intelligent beings is called: Multiple Choice Robotics. Artificial intelligence. Cyborg knowledge. Autonomous brainpower.

Artificial intelligence.

A CIO is the company's: Multiple Choice Chief investigative officer. Chief information officer. Coordinator of international operations. Controller of internal overhead.

Chief information officer.

One major advantage of conducting business online is: Multiple Choice Enhanced local presence. Cost-effective marketing and promotions No need for professional customer service. Web security is less costly than physical security.

Cost-effective marketing and promotions

Downloading illegal files, spreading computer viruses, and stealing from online bank accounts is collectively referred to as: Multiple Choice Hacking. Software piracy. Cybercrime. Internet censorship.

Cybercrime

Buying and selling goods and services electronically is called: Multiple Choice M-commerce. E-business. Telecommunications. Intellectual property.

E-business

The EU law passed in 2018 that required companies to promptly report personal data breaches was called: Multiple Choice Digital Millennial Copyright Act. Right to be Forgotten. General Data Protection Regulation. Global Policy Forum.

General Data Protection Regulation.

Software piracy is a major problem in which part of the world? Multiple Choice Globally. North America only. Asia only. Europe only.

Globally.

Over time the role of the CIO: Multiple Choice Has remained about the same. Has decreased in level of responsibility. Has changed dramatically, superseding the role of the chief executive officer. Has become more integrated into the overall strategic direction of the firm.

Has become more integrated into the overall strategic direction of the firm.

Increased cyber activity by which countries prompted NATO officials to brand them as "patriotic hackers"? Multiple Choice Russia and Estonia. Iran and China. Iraq and Pakistan. Mexico and Canada.

Iran and China.

According to McKinsey and Company, which position cannot be easily replaced with robots? Multiple Choice Repetitive factory jobs. Clerks and bookkeepers. Team managers. Legal researchers.

Team managers.

One argument in favor of net neutrality is: Multiple Choice Businesses that pay more should have faster Internet. Broadband providers should have free reign to block any site they object to. To fairly compete, small, medium, and large firms should have the same Internet bandwidth. Individuals don't need fast Internet, only businesses do.

To fairly compete, small, medium, and large firms should have the same Internet bandwidth.

Hackers employed by businesses or governments to intentionally discover weaknesses in information systems are called: Multiple Choice Gray hatters. Black hatters. White hatters. Mad hatters.

White hatters


Related study sets

Module 4 - Macro Measures of the Economy and the Business Cycle

View Set

CompTIA IT Fundamentals Domain 3 Study Guide

View Set

Medicare and Long-Term Care Insurance

View Set

Davis Pediatric Success Chapter 6 Respiratory Disorder

View Set