CIS TEST 2 Study questions

Ace your homework & exams now with Quizwiz!

What is the assurance that messages and information remain available only to those authorized to view them?

Confidentiality

__________ is the assurance that messages and information remain available only to those authorized to view them.

Confidentiality

What are the four characteristics of Web 2.0.

Content sharing through open sourcing Collaboration inside the organization Collaboration outside the organization User-contributed content

What can observe the exact pattern of a consumer's navigation through a site? Multiple choice question.

Cookie Clickstream data Banner ad Viral marketing

What is the legal protection afforded an expression of an idea, such as a song, book, or video game.

Copyright

_________ software is software that is manufactured to look like the real thing and sold as such.

Counterfeit

is software that is manufactured to look like the real thing and sold as such.

Counterfeit software

__________ occurs when a company knows enough about a customer's likes and dislikes that it can fashion offers more likely to appeal to that person, say by tailoring its website to individuals or groups based on profile information, demographics, or prior transactions. Multiple choice question.

Customization Personalization Disintermediation

What produces an improved product customers are eager to buy, such as a faster car or larger hard drive? Multiple choice question.

Digital technology Disruptive technology Sustaining technology

What business strategy lets the company shorten the order process and add value with reduced costs or a more responsive and efficient service

Disintermediation

When a business sells directly to the customer online and cuts out the intermediary this is an example of what?

Disintermediation

When people began to bypass travel agents and book their own vacations online, often at a cheaper rate?

Disintermediation occurred

This type of technology tends to open new markets and destroy old ones

Disruptive technology is

What are the principles and standards that guide our behavior toward other people?

Ethics

________ are the principles and standards that guide our behavior toward other people.

Ethics

What is software that is manufactured to look like the real thing and sold as such?

Information compliance Intellectual property Counterfeit software Pirated software

What is the right to be left alone when you want to be, to have control over your personal possessions, and not to be observed without your consent?

Privacy

_______ is the right to be left alone when you want to be, to have control over your personal possessions, and not to be observed without your consent.

Privacy

What is sustaining technology

Produces an improved product customers are eager to buy, such as a faster car or larger hard drive

The video from OSLIS on the topics of Evaluating Websites provides 4 strategies for evaluating internet websites. Which of the following is not a proposed website evaluation method.

Question 1 options: a) Review the evidence. b) Branding from a well known source. c) Assess the Timeliness. d)Investigate the Author e) Uncover the motivation and bias of the source.

Which of the following are used by computer algorithms within information portals to create a filter bubble. Question 2 options:

Question 2 options: a) Past Click Behavior b)Your purpose c)Your location d)Search History e)Type of Computer

Question 3 An "echo chamber" allows which of the following:

Question 3 options: a)Same Beliefs b)A social circle with expanding diversity c)New ideas d)Same Information. e)Same Ideas.

Question 4 Which of the following is not a tip proposed for exposing fake news.

Question 4 options: a) Look at the URL. b) Learn who is quoted. c) Read other sections of the website. d) Most recent dates are more credible.

Disruptive technology is

a new way of doing things that initially does not meet the needs of existing customers.

Web 2.0

a new way of using the internet for collaboration and sharing of data among individual users

Select the statement that accurately defines the association between information and ethics.

a) Information cares how it is used b) Information has ethics c) Information has no ethics

Information _________ is the act of conforming, acquiescing, or yielding information.

compliance property management governance

Information ________ is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity. Multiple choice question.

compliance property management secrecy

Explicit knowledge

consists of anything that can be documented, archived, and codified, often with the help of MIS.

Information ___________ is a method or system of government for information management or control. Multiple choice question.

governance management compliance property

Information ethics

governs the ethical and moral issues arising from the development and use of information technologies, as well as the creation, collection, duplication, distribution, and processing of information itself.

What are the challenges of ebusiness

identifying limited market segments, managing consumer trust, ensuring consumer protection, adhering to taxation rules

If a business tailors its website to individuals or groups based on profile information, demographics, or prior transactions this is an example of what?

personalization

Information _________ measures the number of people a firm can communicate with all over the world. Multiple choice question.

personalization reach richness customization

Information _________ refers to the depth and breadth of details contained in a piece of textual, graphic, audio, or video information. Multiple choice question.

personalization richness reach customization

What are examples of explicit knowledge

trademarks, patents, business plans, marketing research, and customer lists

What is created and updated by many users for many users?

User-contributed(generated) content

what are be 5 ebusiness advantages?

1) Expanding global reach 2) opening new markets 3) reducing costs 4) improving operations 5) improving effectiveness

What are the 5 reasons for growth of the World Wide Web?

1) the micro computer revolution made it possible for an average person to own a computer 2) advancements in networking hardware, software, and media made it possible for business computers to be connected to larger networks at a minimal cost. 3) browser software such as Microsoft Internet Explorer and Netscape navigator gave computer users an easy to use graphical interface to find, download, and display web pages 4) the speed, convenience, and low cost of email they made it an incredibly popular tool for businesses and personal communications 5) basic web pages are easy to create and extremely flexible

Intermediaries are?

Agents, software, or businesses that provide a trading infrastructure to bring buyers and sellers together

What is an open system

An open ________ consists of nonproprietary hardware and software based on publicly known standards that allows third parties to create add-on products to plug into or interoperate with the system.

Select all that apply Select three types of clickstream data metrics. Multiple select question.

Demographics of registered visitors Details how a company creates revenues Length of stay on the website Small file deposited on a hard drive Number of abandoned registrations

What is a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution?

Digital rights management

_________ knowledge consists of anything that can be documented, archived, and codified, often with the help of MIS

Explicit

What consists of anything that can be documented, archived, and codified, often with the help of MIS.

Explicit knowledge

____________ ethics govern the ethical and moral issues arising from the development and use of information technologies, as well as the creation, collection, duplication, distribution, and processing of information itself.

Information

what govern the ethical and moral issues arising from the development and use of information technologies, as well as the creation, collection, duplication, distribution, and processing of information itself.

Information ethics

What is a method or system of government for information management or control?

Information governance

What is an ethical issue that focuses on who owns information about individuals and how information can be sold and exchanged? Multiple choice question.

Information governance Information management Information compliance Information property

What examines the organizational resource of information and regulates its definitions, uses, value, and distribution ensuring it has the types of data/information required to function and grow effectively?

Information management

measures the number of people a firm can communicate with all over the world. Multiple choice question.

Information reach

________ rights management is a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution. Multiple choice question.

Intellectual Pirated Information Digital

What is intangible creative work that is embodied in physical form and includes copyrights, trademarks, and patents?

Intellectual property

is intangible creative work that is embodied in physical form and includes copyrights, trademarks, and patents.

Intellectual property

Disintermediation occurs when a business sells directly to the customer _______ and cuts out the intermediary. Multiple choice question.

Long tail cybermediation online

What occurs when a new radical form of business enters the market that reshapes the way companies and organizations behave? Multiple choice question.

Paradigm shift WWW Digital Darwinism HTML

_________ software is the unauthorized use, duplication, distribution, or sale of copyrighted software.

Pirated

What is the unauthorized use, duplication, distribution, or sale of copyrighted software?

Pirated software

is the unauthorized use, duplication, distribution, or sale of copyrighted software.

Pirated software

Question 5 More and more phenomena and information is being digitized, allowing computers to become brokers in ways not anticipated by longstanding social norms and customs. As a result which of the following are true?

Question 5 options: a) We should always trust the information provided by computers. b) Social networks (such as Facebook and Twitter), have an ethical role to separate fake news from real news. c) Facebook's efforts to screen fake news means we can again treat posts on this social media site as accurate for decision making.

Which of the following is the best definition of "Fake News".

Question 6 options: a)The intellectual isolation that occurs when information is selectively provided to a consumer based on an assumption of what they want to see. b)The practice of masking the sponsors of a message to make it appear as though it originates from and is supported by a large population of grassroots participants. c)Prejudice in favor or against one thing, person, or group compared with another. d)Misleading information designed to promote a narrative or agenda.

What refers to the creation of new kinds of intermediaries that simply could not have existed before the advent of ebusiness, including comparison-shopping sites such as Kelkoo and bank account aggregation services such as Citibank? Multiple choice question.

Reintermediation Cybermediation Disintermedation

What are agents, software, or businesses that provide a trading infrastructure to bring buyers and sellers together? Multiple choice question.

Reintermediation Cybermediation Disintermedation Intermediaries

What occurs when steps are added to the value chain as new players find ways to add value to the business process? Multiple choice question.

Reintermediation Cybermediation Disintermedation Intermediation

Recharge Question Mode Multiple Choice Question What occurs when steps are added to the value chain as new players find ways to add value to the business process? Multiple choice question.

Reintermediation Disintermedation Cybermediation Intermediation

What contains instructions written by a programmer specifying the actions to be performed by computer software.

Source code

What discusses how established companies can take advantage of disruptive technologies without hindering existing relationships with customers, partners, and stakeholders? Multiple choice question.

The Innovator's Dilemma Business 2.0 A Paradigm Shift

What occurs when a company knows enough about a customer's likes and dislikes that it can fashion offers more likely to appeal to that person, say by tailoring its website to individuals or groups based on profile information, demographics, or prior transactions? Multiple choice question.

The Long Tail Disintermediation Personalization Mass customization

what are two terms representing the next generation of Internet use — as a more mature, distinctive communications platform characterized by new qualities such as collaboration sharing, and free.

Web 2.0 Business 2.0

Content sharing through open sourcing Collaboration inside the organization Collaboration outside the organization User-contributed content are the four characteristics of what

Web 2.0. or Business 2.0

Ethics

are the principles and standards that guide our behavior toward other people.

Buyers need what kind of information and why?

buyers made information richness to make informed purchases

User-contributed/user-generated content

information posted by the masses for the masses

What is source code

instructions written by a programmer specifying the actions to be performed by computer software.

What is personalization?

it occurs when a company knows enough about a customer's likes and dislikes that it can fashion offers more likely to appeal to that person say by tailoring its website to individuals or groups based on profile information, demographics, or prior transactions

Chris Anderson, editor-in-chief of Wired magazine, describes niche-market ebusiness strategies as capturing the ______ tail, referring to the tail of a typical sales curve. Multiple choice question.

long wide circular short

refers to the tail of a typical sales curve

long tail

Information reach

measures the number of people a firm can communicate with all over the world. Multiple choice question.

An open ________ consists of nonproprietary hardware and software based on publicly known standards that allows third parties to create add-on products to plug into or interoperate with the system.

open system

What consists of nonproprietary hardware and software based on publicly known standards that allows third parties to create add-on products to plug into or interoperate with the system.

open system

Intellectual ___________ is intangible creative work that is embodied in physical form and includes copyrights, trademarks, and patents.

property

Information richness

refers to the depth and breadth of details contained in a piece of textual, graphic, audio, or video information.

What is the long tail?

refers to the tail of a typical sales curve

Information _________ refers to the depth and breadth of details contained in a piece of textual, graphic, audio, or video information. Multiple choice question

richness customization personalization reach

sellers need what kind of information and why?

sellers need information reach to properly market and differentiate themselves from competition

A(n) ___________ technology is a new way of doing things that initially does not meet the needs of existing customers. Multiple choice question.

sustaining disruptive digital

Business 2.0

the next generation of Internet use — as a more mature, distinctive communications platform characterized by new qualities such as collaboration sharing, and free.


Related study sets

Math: Skip Counting - Missing Sequence Number (2-10) - Subtraction

View Set

Chapter 69: Management of Patients With Neurologic Infections, Autoimmune Disorders, and Neuropathies 3

View Set

Master Study Guide - Anatomy Final

View Set