cob 204 2
Which of the following is a true statement about the impact of social computing on a business?
A small minority of individuals contribute the majority of feedback and can provide skewed data, both positive and negative..
LinkedIn is a _______________________ social networking site that makes money from advertising and services.
Business-oriented
_____ refers to efforts by unauthorized users to access data traveling over wireless networks.
Eavesdropping
Although rogue access points can be installed innocently, they can also be installed by an attacker trying to simulate a legitimate access point for nefarious purposes. In such cases, these devices are called an _____.
Evil Twin
What would be the best use of RFID in a business?
Inventory tracking
With regard to mobile computing, _____ means that knowing where a user is physically located is a key to offering relevant products and services.
Localization of products and services
The two major characteristics that differentiate mobile computing from other forms of computing are ______ and ________.
Mobility, broad reach
With Web 1.0 sites, users _________________, whereas with Web 2.0 sites, users _________________.
Passively receive information, participate with the site.
In _____, a person or a device intentionally or unintentionally interferes with your wireless network transmissions.
RF jamming
_____ is the wireless transmission and receipt of data gathered from remote sensors. The Find My iPhone is uses this.
Telemetry
Which of the following is an advantage of social commerce over traditional e-commerce?
The ability to predict buying habits based on real-time data
The act of locating wireless local area networks while moving around a city is called ____.
War driving
___________ foster easy collaboration and harness the collective intelligence of Internet users.
Wikis
You sign up for an RSS feed from CNN.com. Which of the following would you expect to happen?
You will be notified of updates in the content areas you selected.
B2B
both sellers and organizations are organizations
By making it easier to store and transfer personal information, e-business presents some threats to privacy. Two examples of personal information that is often stored and transferred are ______ and _____.
buyer's identity and tracking history
Smart Cards
contain a chip that can store considerable amount of data
Online websites such as http://www.pricegrabber.com/, which provide one website address for possibly thousands of vendors are known as a(n) ______________.
electronic mall
C2C
individuals sell products or services to other individuals. Estsy.com is an example
Twitter, Snapchat and Instagram are examples of ________________.
microbolgging
When you purchase a song from a website for $.99, you have made a(n) ____________.
micropayment
E-Commerce
process of buying, selling, transferring or exchanging products, services or information via computer networks, including the internet
You have been monitoring, collecting, and analyzing socially generated data and making strategic decisions based on the results.You have been using ___________.
social intelligence
Facebook is a ______________.
social networking site
Clicks-and-Mortar
some e-commerce is conducted, but primary business is carried out in the physical world
Point of Sale
time of place where a retail transaction is completed
Twitter is made up or comprised of postings called _______.
tweets
Which of the following might be an example of domain tasting?
www.utube.com
The web development technique that enables portions of web pages to reload with fresh data rather than requiring the entire Web page to reload is known as:
AJAX
Cyberbanking is an example of ______________.
B2C
PayPal is an example of making a _____________.
Person-to-Person Payment
The technology that allows manufacturers to attach tags with antennas and computer chips on goods and then track their movement through radio signals is known as __________. This technology was developed to replace bar codes.
Radio-frequency identification
"Domain tasting" is an example of cybersquatting that could be unethical but not necessarily illegal. This is a result of the five-day grace period policy established by ICANN in 2000.
True
You just started to work on a project with three other people. You realize that everyone has their own notes about each element of the project, which makes it hard for you to keep track of what has been done and what still needs to be done. Which of the following applications would you suggest the team use?
Wikis
The development of mobile commerce (or m-commerce) is driven by widespread availability of mobile devices, declining prices, and ___________.
bandwidth improvement.
You walk into a store and your mobile phone receives ads specific to sales currently available at that store. The store might use an application called iBeacon. This service is an example of _________________.
location-based service
According to the textbook, which of the following is NOT an example of internet fraud?
not paying taxes on an interet-based purchase
B2C
sellers are organizations and buys are individuals
Person-to-Person Payments
two individuals or an individual and a business can transfer funds without using a credit card