BIS Quizzes - Final
In the ___ model of informed consent, personal information cannot be collected until he consumer specifically agrees that his or her data can be collected. A: opt-in B: opt-out C: opt-up D: opt-down
A: opt-in
How can you protect your online privacy? Opt-out from cookies for advertising Use privacy-centric browser like Tor Use browser add-ons to block third-party cookies Carefully check your social network settings All of them
All of them
Which of the following concepts encompass all the others? Machine learning Artificial intelligence Supervised learning Unsupervised learning
Artificial intelligence
____ cryptography uses a pair of mathematically related keys to encrypt and decrypt the messages. Symmetric Permutation Substitution Asymmetric
Asymmetric
Which of the following types of e-commerce involves businesses selling goods and services directly to individuals via the Internet? P2P e-commerce B2C e-commerce B2B e-commerce C2C e-commerce
B2C e-commerce
Which of the following descriptions about Macrotasks is not correct: A: tasks that can be done independently B: most effective when the problem is novel C: require special skill D: worker paid by task
B: most effective when the problem is novel
Which of the following has a hidden layer that processes inputs? A: Business intelligence system B: Expert system C: Neural network D: Knowledge management system E: Genetic algorithm
C: Neural network
Which of the following is not a major benefit of expert systems? A: improved decisions B: better quality and service C: ability to scale to deal with very large data sets D: reduced errors E: reduced training time
C: ability to scale to deal with very large data sets
Which of the following is NOT a feature of the General Data Protection Regulation (GDPR)? A: It applies to all firms doing business in the EU. B: Its protections of the privacy rights of EU citizens apply worldwide, regardless of where processing of the data takes places C: It imposes fines on companies for violating the regulation up to 40% of a fir's global revenue. D: It creates a single EU privacy policy D: It prevents firms from using cookies.
D: It prevents firms from using cookies.
InnoCentive is a ___ platform where companies can crowdsource a complex data-related problem. A: crowdfunding B: macrotasks C: microtasks D: crowd contests E: sharing economy
D: crowd contests
A chatbot is an example of which of the following? A: Computer vision system B: Genetic algorithm C: Augmented reality D: Virtual reality system E: Intelligent agent
E: Intelligent agent
Conversion rate doesn't depend on the user inference of e-commerce site.
False
Smartphones are NOT vulnerable to malicious software or penetration from outsiders.
False
_____ is a set of hardware and software to prevent unauthorized users from accessing private networks. Transport Layer Security (TLS) Identify management & authentication Firewalls Wi-Fi encryption standard WPA2
Firewalls
Which of the following statement is NOT part of California Consumer Privacy Act (CCPA)? Allow users to opt-out from data collection for marketing purposes Report data breaches Review and delete personal data Must ask for users consent before collecting data
Must ask for users consent before collecting data
Which of the following tools is NOT an example of user authentication? Biometric login Password Two-factor login Tokens
Tokens
A computer worm is a program that can copy itself to other computers on the network.
True
A firewall is a combination of hardware and software that controls the flow of incoming and outgoing network traffic.
True
Advertising networks such as Google, Facebook and Apple are capable of tracking personal browsing behavior across the Internet and devices.
True
The latest scandal on Facebook for it ignoring the negative impact of social networks on teenagers reveals a conflict between consumer welfare and company's profit.
True
The term 'usability' is normally used interchangeably with user experience (UX).
True
To build an online community with long-term viability, the firm should encourage diversity.
True
When preparing the system flowchart for current business processes, an important step is to list all activities in chronological order.
True
AI applications are used by search engines and social networks to target ads.
True.
Which of the following factors that affects the conversion rate is NOT related to usability? Slow page load Unclear marketing message Clumsy site navigation Ineffective presentation
Unclear marketing message
___ is an application that directly utilizes natural language processing. Loan approval decision Facebook's DeepFace Voice assistant like Siri and Alexa Google's AlphaGo
Voice assistant like Siri and Alexa
Which of the following company (or brand) is an example of 'pure' crowdsourcing business as described in the lecture? Upwork Google Wikipedia Fiverr Airbnb
Wikipedia
In digital markets: transaction costs increase search costs increase information asymmetry increases menu costs are lower network effects decline
menu costs are lower
reCAPTCHA is a brilliant example of using ____ to crowdsourcing a business problem. microtasks crowd contests gig economy macrotasks crowdfunding
microtasks
Compared to traditional goods, digital goods (or information goods) have: nearly zero marginal cost higher marketing cost. higher costs of distribution. high inventory costs.
nearly zero marginal cost
It is suggested to incorporate ___ in security & privacy trainings. positive reinforcement theoretical material You Answered standardized training material one-time practice
positive reinforcement
Advanced encryption standard (AES) specifies a(n) ____ encryption algorithm. substitution symmetric asymmetric permutation public key
symmetric
Deep learning networks: use multiple layers of neural networks to detect patterns in input data. rely on experts to tell the system what patterns to expect in the data. rely on humans to help it identify patterns. require labeled data as input.
use multiple layers of neural networks to detect patterns in input data.
Which of the following descriptions about system flowchart is NOT an advantage of using it to document business processes? Help business to identify manual processes that are susceptible to human errors. Given the business narrative, there is only one way to draw the flowchart. Easy to communicate the business process within the organization. Help business to identify processes that may increase manual workload.
Given the business narrative, there is only one way to draw the flowchart.
Which of the following best describes the effect that new information technology has on society? It has a waterfall effect in raising ever more complex ethical issues. It has a magnifying effect, creating increasing numbers of ethical issues. It has a dampening effect on the discourse of business ethics. It has a ripple effect, raising new ethical, social, and political issues.
It has a ripple effect, raising new ethical, social, and political issues.
Which of the following phenomena is NOT part of our lecture on the ethical issues of IS? Personal data & privacy Discrimination Moral dilemma in self-driving cars Piracy
Piracy
WannaCry is an example of which of the following? Worm Evil twin Phishing Ransomware SQL injection attack
Ransomware
____ means webpages can adjust to different sizes of screen (e.g., laptop vs phone) automatically while displaying the same content.
Responsive design