INFO Exam 2

Ace your homework & exams now with Quizwiz!

A(n) ___________ allows people at two or more locations to interact via two-way video and audio transmissions simultaneously as well as share documents, data, computer displays, and whiteboards. videoconference podcasting email messaging

videoconference

What is software that is intended to damage or disable computers and computer systems? Multiple choice question. Bloatware Malware Adware

Malware

What occurs when a machine learning model matches the training data so closely that the model fails to make correct predictions on new data? Overfitting Underfitting Data augmentation Artificial intelligence

Overfitting

Match the revenue generation term on the left with its correct definition on the right.

Pay-per-click- Generates revenue each time a user clicks on a link to a retailer's website. Pay-per-call- Generates revenue each time a user clicks on a link that takes the user directly to an online agent waiting for a call. Pay-per-conversion- Generates revenue each time a website visitor is converted to a customer.

________ occurs when a machine learning model has poor predictive abilities because it did not learn the complexity in the training data. Multiple choice question. Bias Overfitting Underfitting Augmentation

Underfitting

A mail ______ sends a massive amount of email to a specific person or system that can cause that user's server to stop functioning. Multiple choice question. spam bomb teergrubing

bomb

A website ____________ is a locally stored URL or the address of a file or Internet page saved as a shortcut. bookmark tag taxonomy manager

bookmark

A(n) ___________ model is a plan that details how a company creates, delivers, and generates revenues. employee customer data business

business

Internet _________ is government attempts to control Internet traffic, thus preventing some material from being viewed by a country's citizens. Multiple choice question. censorship vandalism governance

censorship

Source ________ contains instructions written by a programmer specifying the actions to be performed by computer software. code content system

code

Real-time _________ occurs when a system updates information at the same rate it receives it. emails podcasting communication messaging

communication

A(n) ___________ model is a plan that details how a company creates, delivers, and generates revenues on the Internet. ebusiness consumer employee data

ebusiness

A(n) ____________ monitoring policy states explicitly how, when, and where the company monitors its employees. Multiple choice question. email employee information

employee

A search ________ is website software that finds other pages based on keyword matching similar to Google. engine rank click conversion

engine

A(n) _________ computer use policy contains general principles to guide computer user behavior. Multiple choice question. ethical information privacy nonrepudiation

ethical

A(n) ________ information system is a specialized DSS that supports senior-level executives and unstructured, long-term, nonroutine decisions requiring judgment, evaluation,and insight. informational managerial operational executive

executive

the ______ block is the first block created in the blockchain. proof-of-stake genesis hash immutable

genesis

Google _____ is a wearable computer with an optical head-mounted display. Multiple choice question. reality haptic glass

glass

Social _________ refers to websites that rely on user participation and user-contributed content, such as Facebook, YouTube, and Digg. media network networking

media

Trend _________ are trends viewed as particularly important in a specific community, industry, or sector are carefully monitored, watched, and reported to key decision makers. monitoring analysis projection

monitoring

At the ___________ level, employees develop, control, and maintain core business activities required to run the day-to-day operations. managerial strategic operational

operational

A(n) _________ is an exclusive right to make, use, and sell an invention and is granted by a government to the inventor. Multiple choice question. digital rights management patent copyright

patent

An information _______ policy contains general principles regarding information privacy. Multiple choice question. publicity privacy redundancy nonrepudiation

privacy

Trend ______ occurs when numerical data are available and a trend can be plotted to display changes through time and into the future. projection monitoring analysis

projection

Intellectual ___________ is intangible creative work that is embodied in physical form and includes copyrights, trademarks, and patents. Multiple choice question. ethics copyright property patent

property

Search engine __________ evaluates variables that search engines use to cyborg ranking conversion optimization

ranking

Information __________ is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity. Multiple choice question. secrecy theft security

secrecy

A(n) ______ is a self-photograph placed on a social media website. selfie manager blog microblogging

selfie

What applies to customers offering goods and services to each other on the Internet? B2C C2B B2B C2C

C2C

What is the first block created in the blockchain? Immutable Hash Proof-of-stake Genesis block

Genesis block

__________ messaging is a service that enables instant or real-time Consumer Internet Instant Content

Instant

Select the two terms that refer to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry. Multiple select question. Ediscovery Electronic Protection Act Information discovery Electronic discovery

1. Ediscovery 2. Electronic discovery

What is a set of tools that supports the work of teams or groups by facilitating the sharing and flow of information? A collaboration system A knowledge base A collective intelligence

A collaboration system

What is a data structure containing a hash, previous hash, and data? Hash Immutable Genesis block Blocks

Blocks

What is the abuse of pay-per-click, pay-per-call, and pay-per-conversion revenue models by repeatedly clicking a link to increase charges or costs for the advertiser? Affiliate program Click fraud Competitive click fraud Hitbot

Click fraud

What is the abuse of pay-per-click, pay-per-call, and pay-per-conversion revenue models by repeatedly clicking a link to increase charges or costs for the advertiser? Competitive click fraud Click fraud Affiliate program Hitbot

Click fraud

What is the abuse of pay-per-click, pay-per-call, and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser? Multiple choice question. Competitive click-fraud Click-fraud Cyberbullying

Click-fraud

Match the ebusiness form on the left with its correct definition on the right.

Content providers

The _____ web is the portion of the Internet that is intentionally hidden from search engines, uses masked IP addresses, and is accessible only with a special web browser. deep semantic dark

Dark

What is the portion of the Internet that is intentionally hidden from search engines, uses masked IP addresses, and is accessible only with a special web browser? Semantic web Dark web Deep web

Dark web

__________ -seeking analysis finds the inputs necessary to achieve a goal such as a desired level of output. Sensitivity Optimization What Goal

Goal

What finds the inputs necessary to achieve a goal such as a desired level of output? Sensitivity analysis What-if analysis Goal-seeking analysis

Goal-seeking analysis

What finds the inputs necessary to achieve a goal such as a desired level of output? Multiple choice question. What-if analysis Sensitivity analysis Goal-seeking analysis

Goal-seeking analysis

_______ are experts in technology who use their knowledge to break into computers and computer networks, either for profit or just motivated by the challenge. Multiple choice question. Virus Hackers Security

Hackers

What is a company that provides access to the Internet for a monthly fee? Internet service provider Instant messaging Videoconference Podcasting

Internet service provider

Which policy contains general principles to guide the proper use of the Internet? Multiple choice question. Email privacy policy Internet use policy Information privacy policy Social media policy

Internet use policy

__________ management involves capturing, classifying, evaluating, retrieving, and sharing information assets in a way that provides context for effective decisions and actions. Reputation Native Collective Knowledge

Knowledge

_______ occurs when a user choses to receive emails and allows permissions to incoming emails. Multiple choice question. Teergrubing Opt out Opt in

Opt in

What is it called when you chose to not receive emails and deny permission to incoming emails? Multiple choice question. Opt out Opt In Mail bomb Spam

Opt out

________ occurs when you chose to not receive emails and deny permission to incoming emails. Multiple choice question. Opt out Mail bomb Opt In Spam

Opt out

What is designed to trick victims into giving up personal information to purchase or download useless and potentially dangerous software? Multiple choice question. Script Kiddie Worm Scareware Hacker

Scareware

What is website software that finds other pages based on keyword matching similar to Google? Search engine ranking Pay-per-click Pay-per-call Search engine

Search engine

What contains instructions written by a programmer specifying the actions to be performed by computer software? Source code Open system Open source

Source code

What are specific keywords or phrases incorporated into website content for means of classification or taxonomy? Tags Social media Social bookmarks

Tags

________ are specific keywords or phrases incorporated into website content for means of classification or taxonomy. Taxonomy Folksonomy Tags Tacit

Tags

_________ are small electronic devices that change user passwords automatically. Multiple choice question. Cards Tokens Passwords

Tokens

What spreads itself not only from file to file but also from computer to computer? Multiple choice question. worm script kiddie virus hacker

Worm

Business-to-________ applies to businesses buying from and selling to each other over the Internet. business broker customer consumer

business

A(n)__________ system is a set of tools that supports the work of teams or groups by facilitating the sharing and flow of information. collaboration networking contributed native

collaboration

Business-to-__________ applies to any business that sells its products or services directly to consumers online. government business employee consumer

consumer

A(n) ___________ is an organized attempt by a country's military to disrupt or destroy information and communication systems for another country. Multiple choice question. cyberterrorism cyberwar firewall

cyberwar

Proof-of-stake is a way to validate transactions and achieve a ____________ consensus. hash genesis immutability distributed

distributed

Mashup _______ are WYSIWYG tools, or what You See Is What You Get tools. networks programs interfaces editors

editors

A(n) ______ is a simplified representation or abstraction of reality. metric model project

model

Data ___________ describes technologies that allow users to "see" or visualize data to transform information into a business perspective. dashboard analysis paralysis visualization

visualization

Select the four characteristics of Web 2.0. Collaboration outside the organization Identifying limited market segments Adhering to taxation rules Content sharing through open sourcing Collaboration inside the organization User-contributed content

1. Collaboration outside the organization 2. Content sharing through open sourcing 3. Collaboration inside the organization 4. User-contributed content

Select the three primary decision-making challenges facing managers today. Multiple select question. Manager must make decisions quickly Managers need to make decisions based on instinct and intuition because they do not have access to large amounts of information Managers have infinite time to make decisions Managers must apply sophisticated analysis techniques, such as Porter's strategies or forecasting, to make strategic decisions Managers need to analyze large amounts of information

1. Manager must make decisions quickly 2. Managers must apply sophisticated analysis techniques, such as Porter's strategies or forecasting, to make strategic decisions 3. Managers need to analyze large amounts of information

Select three items typically found in an acceptable use policy. Multiple select question. Not performing any nonrepudiation. Describes the Internet services available to users. Defines the organization's position on the purpose of Internet access Not using the service as part of violating any law. Not attempting to break the security of any computer network or user.

1. Not performing any nonrepudiation. 2. Not using the service as part of violating any law. 3. Not attempting to break the security of any computer network or user.

Select three epolicies. Social media policy Password protection policy Ethical computer use policy COPA policy Acceptable use policy

1. Social media policy 2.Ethical computer use policy 3.Acceptable use policy

What are the three types of machine learning? What are the three types of machine learning? Multiple select question. Neural network machine learning Supervised machine learning Bias machine learning Artificial machine learning Unsupervised machine learning Transfer machine learning

1. Supervised machine learning 2. Unsupervised machine learning 3. Transfer machine learning

Select two terms for content created and updated by many users for many users. User-generated content User reputation content User-contributed content

1. User-generated content 2. User-contributed content

Select all that apply Select two terms that blends videoconferencing with document sharing and allows the user to deliver a presentation over the web to a group of geographically dispersed participants. Taxonomy Web conferencing Podcasting Webinar

1. Web conferencing 2. Webinar

Select two items typically contained in an employee monitoring policy.

1.Always enforce the policy the same for everyone. 2.State the consequences of violating the policy.

Select three items typically contained in a social media policy.

1.Employee Twitter, corporate Twitter, and personal Twitter policies. 2.Employee blog and personal blog policies. 3. Employee social network and personal social network policies.

Select three different ebusiness forms. Online marketplaces Search engine optimization Infomediaries Content providers Cyborg

1.Online marketplaces 2.Infomediaries 3.Content providers

Select the three types of revenue generation strategies websites can pursue.

1.Pay-per-call 2.Pay-per-conversion 3.Pay-per-click

Select all that apply Select four trends according to the World Future Society that have the potential to change our world, our future, and our lives. The global economy is becoming more dispersed. The world's population will double in the next 40 years. Time is becoming one of the world's most precious commodities The pace of technological innovation is increasing. The world's population will decrease over the next 40 years. The pace of technological innovation is decreasing. The global economy is becoming more integrated.

1.The world's population will double in the next 40 years. 2. Time is becoming one of the world's most precious commodities 3. The pace of technological innovation is increasing. 4. The global economy is becoming more integrated.

Who is a business analytics specialist who uses visual tools to help people understand complex data? A data governor A data artist A data scientist

A data artist

The National Institute of Standards and Technology (NIST) introduced an ________________ designed tokeep government information secure. Multiple choice question. PKE AES NIST

AES

The National Institute of Standards and Technology (NIST) introduced an ________________ designed tokeep government information secure. Multiple choice question. PKE NIST AES

AES

Which epolicy requires a user to agree to follow it to be provided access to corporate email, information systems, and the Internet? Multiple choice question. Acceptable use policy Email privacy policy Information privacy policy Internet use policy

Acceptable use policy

What is software that, while purporting to serve some useful function and often fulfilling that function, also allows Internet advertisers to display advertisements without the consent of the computer user? Multiple choice question. Adware Spyware Ransomware

Adware

_________ is software that, while purporting to serve some useful function and often fulfilling that function, also allows Internet advertisers to display advertisements without the consent of the computer user. Multiple choice question. Hacker Malware Adware

Adware

________ programs allow a business to generate commissions or referral fees when a customer visiting its website clicks a link to another merchant's website. Affirmation Advertising Affiliate Hitbots

Affiliate

What allow a business to generate commissions or referral fees when a customer visiting its website clicks a link to another merchant's website? Click fraud Value-added services fees Hitbots Affiliate program

Affiliate program

What is a blend of the physical, virtual, and electronic environments creating a real-time ambient environment that changes as the user moves from one place to another? Augmented reality Ambient digital experience Virtual reality experience Digital mesh

Ambient digital experience

What is a blend of the physical, virtual, and electronic environments creating a real-time ambient environment that changes as the user moves from one place to another? Augmented reality Digital mesh Virtual reality experience Ambient digital experience

Ambient digital experience

________ paralysis occurs when the user goes into an emotional state of over-analysis (or over-thinking) a situation so that a decision or action is never taken, in effect paralyzing the outcome. Data Analysis Anomaly

Analysis

__________ information encompasses all organizational information, and its primary purpose is to support the performance of managerial analysis or semistructured decisions. Analytical Transactional

Analytical

What encompasses all organizational information, and its primary purpose is to support the performance of managerial analysis or semistructured decisions? Analytical information Transactional information

Analytical information

Which policy simply states that email users will not send unsolicited emails? Multiple choice question. Workplace monitoring policy Anti-spam policy Information privacy policy Mail bomb policy

Anti-spam policy

What is a set of routines, protocols, and tools for building software applications? Mashup Network effect Application programming interface Real simple syndication

Application programming interface

_________ intelligence simulates human thinking and behavior, such as the ability to reason and learn. Artificial Decision Executive

Artificial

What simulates human thinking and behavior, such as the ability to reason and learn? Multiple choice question. Decision support systems Artificial intelligence Transaction processing systems

Artificial intelligence

What is the practice of artificially stimulating online conversation and positive reviews about a product, service or brand? Multiple choice question. Astroturfing Pharming Phishing expedition Zombie farm

Astroturfing

_________ communications, or communication such as email in which the message and the response do not occur at the same time. Crowdfunding Tacit Synchronous Asynchronous

Asynchronous

Which form of communication do the message and the response not occur at the same time? Synchronous communication Social communication Asynchronous communication

Asynchronous communication

What is the process of providing a user with permission including access levels and abilities such as file access, hours of access, and amount of allocated storage space? Multiple choice question. Authentication Authorization Resistance Prevention

Authorization

___________ is the process of providing a user with permission including access levels and abilities such as file access, hours of access, and amount of allocated storage space. Multiple choice question. Resistance Authentication Authorization Prevention

Authorization

What is a self-managing computing model named after, and patterned on, the human body's autonomic nervous system? Virtual assistant Autonomic computing Teleliving

Autonomic computing

What is software that carries out some set of operations on behalf of a user or another program with some degree of independence or autonomy, and employ some knowledge or representation of the user's goals or desires? Biological 3D printing Autonomous agent Virtual assistant Machine learning

Autonomous agent

Match the ebusiness term on the left with its correct definition on the right.

B2B- Applies to businesses buying from and selling to each other over the Internet. B2C- Applies to any business that sells its products or services directly to consumers online. C2C- Applies to sites primarily offering goods and services to assist consumers interacting with each other over the Internet. C2B- Applies to any consumer that sells a product or service to a business over the Internet.

What applies to any business that sells its products or services directly to consumers online? C2C C2B B2C B2B

B2C

Match the type of virus on the left with its correct definition on the right. Instructions Backdoor program Backdoor program drop zone empty. Trojan-horse virus Trojan-horse virus drop zone empty. Polymorphic virus Polymorphic virus drop zone empty. Denial-of-service attack Denial-of-service attack drop zone empty. Viruses and worms change their form as they propagate. Hides inside other software, usually as an attachment or a downloadable file. Opens a way into the network for future attacks. Floods a website with so many requests for service that it slows down or crashes the site.

Backdoor program- Opens a way into the network for future attacks. Trojan-horse virus- Hides inside other software, usually as an attachment or a downloadable file. Polymorphic virus- Viruses and worms change their form as they propagate. Denial-of-service attack- Floods a website with so many requests for service that it slows down or crashes the site.

___________ 3D printing includes the printing of skin and organs and is progressing from theory to reality, however, politicians and the public do not have a full understanding of the implications.. Biological Virtual Augmented Digital

Biological

What includes the printing of skin and organs and is progressing from theory to reality, however, politicians and the public do not have a full understanding of the implications? Internet of Things Internet of Everything Biological 3D printing Machine learning

Biological 3D printing

What is a type of digital currency in which a record of transactions is maintained and new units of currency are generated by the computational solution of mathematical problems and which operates independently of a central bank? Digital trust Bitcoin Hash Immutable

Bitcoin

___________ is a type of digital currency in which a record of transactions is maintained and new units of currency are generated by the computational solution of mathematical problems and which operates independently of a central bank. Immutable Bitcoin Hash Digital trust

Bitcoin

What is a type of distribution ledger, consisting of blocks of data that maintain a permanent and tamper-proof record of transactional data? Immutable Blockchain Hash Ledger

Blockchain

A(n) ________ is an online journal that allows users to post their own comments, graphics, and video. email mashup blog wiki

Blog

Select the term for an online journal that allows users to post their own comments, graphics, and video. Blog VPN Mashup Wiki

Blog

What is a type of malware that causes a collection of connected devices to be controlled by a hacker? Multiple choice question. worms bugs botnets governance

Botnets

______ are a type of malware that causes a collection of connected devices to be controlled by a hacker. Multiple choice question. Worms Governance Botnets Bugs

Botnets

Match the B2C on the left with its correct definition on the right.

Brick-and-Mortar- A business that operates in a physical store without an Internet presence. Click-and-Mortar- A business that operates in a physical store and on the Internet. Example: Barnes & Noble Pure-Play- A business that operates on the Internet only without a physical store. Example: Google

Which policy allows employees to use their personal mobile devices and computers to access enterprise data and applications? Multiple choice question. Ethical use policy Information privacy policy Acceptable user policy Bring your own device policy

Bring your own device policy

What tracks corporate metrics such as critical success factors and key performance indicators and include advanced capabilities such as interactive controls allowing users to manipulate data for analysis? Data visualization tools Business intelligence dashboards Data visualization

Business intelligence dashboards

What is a plan that details how a company creates, delivers, and generates revenues? Dot-com Business model Eshop Ebusiness model

Business model

Which term applies to businesses buying from and selling to each other over the Internet? Business-to-consumer Business-to-business Consumer-to-business Consumer-to-consumer

Business-to-business

The ________ Online Protection Act was passed to protect minors from accessing inappropriate material on the Internet. Multiple choice question. Child Patient Parent

Child

What was passed to protect minors from accessing inappropriate material on the Internet? Multiple choice question. Digital Rights Management Act Epolicies Protection Act Child Online Protection Act Online Information Protection Act

Child Online Protection Act

______ fraud is the abuse of pay-per-click, pay-per-call, and pay-per-conversion revenue models by repeatedly clicking a link to increase charges or costs for the advertiser. Click Affiliate Competitive Hitbot

Click

__________-fraud is the abuse of pay-per-click, pay-per-call, and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser. Multiple choice question. Click COPA Cyberbullying

Click

Match the term on the left with its correct definition on the right. Instructions

Click fraud- The abuse of pay-per-click, pay-per-call, and pay-per-conversion revenue models by repeatedly clicking a link to increase charges or costs for the advertiser. Competitive click-fraud- A computer crime in which a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking the advertiser's link. Hitbots- Create the illusion that a large number of potential customers are clicking the advertiser's links when in fact there is no likelihood that any of the clicks will lead to profit for the advertiser. Affiliate program- Allow a business to generate commissions or referral fees when a customer visiting its website clicks a link to another merchant's website.

___ source is any proprietary software licensed under exclusive legal right of the copyright holder. Closed Code Open

Closed

__________ intelligence is collaborating and tapping into the core knowledge of all employees, partners, and customers. Reputation Content Collective Knowledge

Collective

What is collaborating and tapping into the core knowledge of all employees, partners, and customers? Collective intelligence Knowledge management system Reputation system

Collective intelligence

____ click fraud is a computer crime in which a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking the advertiser's link. Client Customer Competitive Consumer

Competitive

__________ click-fraud is a computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link. Multiple choice question. Criminal Competitive Cyber

Competitive

What is a computer crime in which a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking the advertiser's link? Hitbot Competitive click fraud Affiliate programs Click fraud

Competitive click fraud

What is a computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link? Multiple choice question. Child Online Protection Act Click-fraud Competitive click-fraud

Competitive click-fraud

Information _________ is the act of conforming, acquiescing, or yielding information. Multiple choice question. secrecy compliance property

Compliance

_______ simulation occurs when a complex systems, such as the U.S. economy, can be modeled by means of mathematical equations and different scenarios can be run against the model to conduct "what if" analysis. Monitoring Computer Projection Analysis

Computer

What occurs when a complex systems, such as the U.S. economy, can be modeled by means of mathematical equations and different scenarios can be run against the model to conduct "what if" analysis? Computer simulation Trend monitoring Trend analysis Trend projection

Computer simulation

What is the assurance that messages and information remain available only to those authorized to view them? Multiple choice question. Ethics Privacy Confidentiality Information ethics

Confidentiality

__________ is the assurance that messages and information remain available only to those authorized to view them. Intellectual property Confidentiality Security

Confidentiality

What applies to any consumer who sells a product or service to a business on the Internet? Consumer-to-consumer Consumer-to-business Business-to-business Business-to-consumer

Consumer-to-business

_________ management systems help companies manage the creation, storage, editing, and publication of their website content. Internet Content Email Web

Content

What occurs when organizations use software that filters content, such as emails, to prevent the accidental or malicious transmission of unauthorized information? Multiple choice question. Cryptography Time bombs Content filtering Public key encryption

Content filtering

What helps companies manage the creation, storage, editing, and publication of their website content? Internet service providers Content management systems Web conferencing

Content management systems

What helps companies manage the creation, storage, editing, and publication of their website content? Web conferencing Content management systems Internet service providers

Content management systems

What is the legal protection afforded an expression of an idea, such as a song, book, or video game? Multiple choice question. Copyright Intellectual property Confidentiality Pirated software

Copyright

__________ is the legal protection afforded an expression of an idea, such as a song, book, or video game. Multiple choice question. Confidentiality Copyright Ediscovery

Copyright

_________ software is software that is manufactured to look like the real thing and sold as such. Multiple choice question. Intellectual Pirated Counterfeit

Counterfeit

What is software that is manufactured to look like the real thing and sold as such? Multiple choice question. Intellectual property Pirated software Information compliance Counterfeit software

Counterfeit software

_________ sources capital for a project by raising many small amounts from a large number of individuals, typically via the Internet. Tacit knowledge Crowdfunding Videoconferencing Podcasting

Crowdfunding

What refers to the wisdom of the crowd? Crowdsourcing Explicit knowledge Tacit knowledge Social media

Crowdsourcing

___________ refers to the wisdom of the crowd. Asynchronous Crowdsourcing Tacit knowledge Taxonomy

Crowdsourcing

What is the science that studies encryption, which is the hiding of messages so that only the sender and receiver can read them? Multiple choice question. Decrypt Public key encryption Certificate authority Cryptography

Cryptography

____________ is the science that studies encryption, which is the hiding of messages so that only the sender and receiver can read them. Multiple choice question. Content Certificate Cryptography

Cryptography

What are malicious attempts to access or damage a computer system? Multiple choice question. digital trust downtime cyberattacks ediscovery

Cyberattacks

___________ are malicious attempts to access or damage a computer system. Multiple choice question. Cyberattacks Downtime Viruses Hackers ediscovery

Cyberattacks

What includes threats, negative remarks, or defamatory comments transmitted via the Internet or posted on the website? Multiple choice question. Click-fraud Threat Cyberbullying Competitive click-fraud

Cyberbullying

_________ includes threats, negative remarks, or defamatory comments transmitted via the Internet or posted on the website. Multiple choice question. Cyberbullying Click-fraud Information privacy

Cyberbullying

_____________ involves prevention, detection, and response to cyberattacks that can have wide-ranging effects on the individual, organizations, community, and at the national level. Multiple choice question. Compliance Downtime Cybersecurity Governance Trust

Cybersecurity

What is the electronic defacing of an existing website? Multiple choice question. Internet censorship Typosquatting Website name stealing Cybervandalism

Cybervandalism

___________ is the electronic defacing of an existing website. Multiple choice question. Nonrepudiation Typosquatting Cybervandalism

Cybervandalism

____________ is an organized attempt by a country's military to disrupt or destroy information and communication systems for another country. Multiple choice question. Cybercriminal cyberterrorism Cyberwar

Cyberwar

What is an individual who studies the interaction between humans and technology, observing how technology can shape humans' lives? Internet service provider Cyborg anthropologist Search engine probe

Cyborg anthropologist

What occurs when adding additional training examples by transforming existing examples? Underfitting Machine learning Data augmentation Transfer machine learning

Data augmentation

What describes technologies that allow users to "see" or visualize data to transform information into a business perspective? Informing Intelligence dashboards Data visualization Infographics

Data visualization

What moves beyond Excel graphs and charts into sophisticated analysis techniques such as pie charts, controls, instruments, maps, time-series graphs, and more? Forecast Informing Data visualization tools Business intelligence dashboards

Data visualization tools

_________ support systems model information using OLAP, which provides assistance in evaluating and choosing among different courses of action. Multiple choice question. Executive Decision Digital

Decision

Select the system that models information using OLAP, which provides assistance in evaluating and choosing among different courses of action? Decision support system Executive information system Transactional processing system

Decision support system

What decodes information and is the opposite of encrypt? Multiple choice question. Certificate authority Public key encryption Digital certificate Decrypt

Decrypt

What decodes information and is the opposite of encrypt? Multiple choice question. Public key encryption Decrypt Digital certificate Certificate authority

Decrypt

___ web is the large part of the Internet that is inaccessible to conventional search engines. Deep Dark Semantic

Deep

What is the large part of the Internet that is inaccessible to conventional search engines? Dark web Internet Semantic web Deep web

Deep web

________ rights management is a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution. Multiple choice question. Digital Confidentiality Counterfeit

Digital

What tracks KPIs and CSFs by compiling information from multiple sources and tailoring it to meet user needs? Multiple choice question. Granularity Optimization Digital dashboard Sensitivity

Digital dashboard

What is a technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution? Multiple choice question. Pirated software Intellectual property Digital rights management Counterfeit software

Digital rights management

What is the measure of consumer, partner, and employee confidence in an organization's ability to protect and secure data and the privacy of individuals? Multiple choice question. Patent Digital trust Intellectual property Ediscovery

Digital trust

__________ computing processes and manages algorithms across many machines in a computing environment. Centralized Distributed Query

Distributed

What refers to a period of time when a system is unavailable? Multiple choice question. Hackers Downtime Uptime VIruses

Downtime

______ refers to a period of time when a system is unavailable. Multiple choice question. Security Uptime Downtime

Downtime

_________-by hacking is a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network. Multiple choice question. Data Hackers Drive

Drive

What is a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network? Multiple choice question. Script kiddies Cracker Adware Drive-by hacking

Drive-by hacking

What is a plan that details how a company creates, delivers, and generates revenues specifically on the Internet? Ebusiness model Customer model Business data Business model

Ebusiness model

What refers to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry? Multiple choice question. Ediscovery COPA Epolicies Cyberbulling

Ediscovery

Which privacy policy details the extent to which email messages may be read by others? Multiple choice question. Internet use policy Email privacy policy Information privacy policy Social media policy

Email privacy policy

Which policy stating explicitly how, when, and where the company monitors its employees? Multiple choice question. Information monitoring policy Employee monitoring policy Email monitoring policy

Employee monitoring policy

What scrambles information into an alternative form that requires a key or password to decrypt? Multiple choice question. Decryption Cryptography Encryption

Encryption

__________ scrambles information into an alternative form that requires a key or password to decrypt. Multiple choice question. Cryptography Decrypt Encryption

Encryption

Which of the following are policies and procedures that address information management along with the ethical use of computers and the Internet in the business environment? Multiple choice question. Information governance Epolicies Information discovery Ediscovery

Epolicies

________ are policies and procedures that address information management along with the ethical use of computers and the Internet in the business environment. Multiple choice question. Ethics Cyberbulling Clickfraud Epolicies

Epolicies

An _______ hacker is a person who hacks into a computer system to find vulnerabilities to help a company test its security. Multiple choice question. unethical illegal ethical

Ethical

Which policy contains general principles to guide computer user behavior? Information privacy policy Social media policy Ethical computer use policy Employee monitoring policy

Ethical computer use policy

Which policy contains general principles to guide computer user behavior? Multiple choice question. Employee monitoring policy Information privacy policy Social media policy Ethical computer use policy

Ethical computer use policy

Who is a person who hacks into a computer system to find vulnerabilities to help a company test its security? Multiple choice question. Unethical hacker Ethical hacker Ethical virus

Ethical hacker

What is a specialized DSS that supports senior-level executives and unstructured, long-term, nonroutine decisions requiring judgment, evaluation,and insight? Managerial support system Executive information system Transaction processing system

Executive information system

_________ knowledge consists of anything that can be documented, archived, and codified, often with the help of MIS. Explicit Social Intelligent Tacit

Explicit

What consists of anything that can be documented, archived, and codified, often with the help of MIS? Tacit knowledge Collective intelligence Crowdsourcing Explicit knowledge

Explicit knowledge

__________ information practices is a general term for a set of standards governing the collection and use of personal data and addressing issues of privacy and accuracy. Multiple choice question. Ethical Fair Illegal

Fair

What is a general term for a set of standards governing the collection and use of personal data and addressing issues of privacy and accuracy? Multiple choice question. Acceptable use policy Fair information practices Nonrepudiation Internet use policy

Fair information practices

What is similar to taxonomy except that crowdsourcing determines the tags or keyword-based classification system? Folksonomy Mashup editors Social media analysis

Folksonomy

______ is similar to taxonomy except that crowdsourcing determines the tags or keyword-based classification system. Folksonomy Social tagging Bookmarks Tags

Folksonomy

What is a wearable computer with an optical head-mounted display? Multiple choice question. Google Glass Haptic Interface Virtual Reality

Google Glass

Information __________ is a method or system of government for information management or control. Multiple choice question. compliance management governance

Governance

What refers to the level of detail in the model or the decision-making process? Optimization Granularity Visualization

Granularity

______ refers to the level of detail in the model or the decision-making process. Optimization Granularity Sensitivity

Granularity

What are experts in technology who use their knowledge to break into computers and computer networks, either for profit or just motivated by the challenge? Multiple choice question. Virus Adware Hackers Spyware

Hackers

What is a function that converts an input of letters and numbers into an encrypted output of a fixed length? Bitcoin Hash Immutable Block

Hash

What occurs when historical events are studied to anticipate the outcome of current developments? Multiple choice question. Trend projection Historical analysis Computer simulation Trend monitoring

Historical analysis

What creates the illusion that a large number of potential customers are clicking the advertiser's links when in fact there is no likelihood that any of the clicks will lead to profit for the advertiser? Hitbots Competitive click fraud Affiliate program Click fraud

Hitbots

________ creates the illusion that a large number of potential customers are clicking the advertiser's links when in fact there is no likelihood that any of the clicks will lead to profit for the advertiser. Advertising fees Hitbots Competitive click fraud Value-added service fees

Hitbots

What occurs when attackers grant themselves the same access levels they already have but assume the identity of another user? Multiple choice question. Content filtering Time bomb Vertical privilege escalation Horizontal privilege escalation

Horizontal privilege escalation

Select the following that are NOT part of the four characteristics of Web 2.0. Content sharing through open sourcing Identifying limited market segments Direct-to-clients Adhering to taxation rules User-contributed content Collaboration outside the organization Collaboration inside the organization

Identifying limited market segments Direct-to-clients Adhering to taxation rules

__________ theft is the forging of someone's identity for the purpose of fraud. Multiple choice question. Vishing Identity Phishing

Identity

What is the forging of someone's identity for the purpose of fraud? Multiple choice question. Vishing Social engineering Identity theft

Identity theft

What is the ability for a blockchain ledger to remain a permanent, indelible, and unalterable history of transactions? Hash Genesis block Immutability Ledger

Immutability

____________ is the ability for a blockchain ledger to remain a permanent, indelible, and unalterable history of transactions. Hash Proof-of-work Immutability Ledger

Immutability

What simply means unchangeable? Hash Digital trust Immutable

Immutable

__________ simply means unchangeable. Ledger Hash Immutable

Immutable

What is a representation of information in a graphic format designed to make the data easily understandable at a glance? Infographic Executive information systems Granularity

Infographic

What is a representation of information in a graphic format designed to make the data easily understandable at a glance? Infographic Granularity Executive information systems

Infographic

______ is a representation of information in a graphic format designed to make the data easily understandable at a glance. DSS EIS Infographic Managerial

Infographic

What presents the results of data analysis, displaying the patterns, relationships, and trends in a graphical format? analysis paralysis analytics data artist infographics

Infographics

___________ of everything is a concept that extends the Internet of Things (IoT) emphasis on machine-to-machine communications to describe a more complex system that also encompasses people and processes. Information Internet Adaptive Things

Information

____________ ethics govern the ethical and moral issues arising from the development and use of information technologies, as well as the creation, collection, duplication, distribution, and processing of information itself. Multiple choice question. Information Pirated Intellectual

Information

What is the set of ideas about how all information in a given context should be organized? Information architecture Content management systems Taxonomy

Information architecture

What is the act of conforming, acquiescing, or yielding information? Multiple choice question. Information governance Information compliance Information property Information management

Information compliance

What governs the ethical and moral issues arising from the development and use of information technologies, as well as the creation, collection, duplication, distribution, and processing of information itself? Multiple choice question. Copyright Pirated software Information ethics Digital rights management

Information ethics

What is a method or system of government for information management or control? Multiple choice question. Information compliance Information governance Information property Information management

Information governance

What examines the organizational resource of information and regulates its definitions, uses, value, and distribution ensuring it has the types of data/information required to function and grow effectively? Multiple choice question. Information property Information management Information governance Information compliance

Information managemen

What is a concept that extends the Internet of Things (IoT) emphasis on machine-to-machine communications to describe a more complex system that also encompasses people and processes? Internet of Everything Information of Everything Internet of Things Information of Things

Information of Everything

Which epolicy contains general principles regarding information privacy? Information privacy policy Social media policy Acceptable use policy Ethical computer use policy

Information privacy policy

What is an ethical issue that focuses on who owns information about individuals and how information can be sold and exchanged? Multiple choice question. Information management Information compliance Information property Information governance

Information property

What category of computer security addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity? Multiple choice question. Information governance Information secrecy Information property Information compliance

Information secrecy

What is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity? Multiple choice question. Destructive agents Information secrecy Identity theft Information vishing

Information secrecy

What is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization? Multiple choice question. Information ethics Hackers Adware Information security

Information security

Who are legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident? Multiple choice question. Customers Insiders Outsiders Suppliers

Insiders

___________ are legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident. Multiple choice question. Insiders Customers Suppliers

Insiders

What is a service that enables instant or real-time communication between people? Web portal Instant messaging Real-time communications Internet service provider

Instant messaging

What is intangible creative work that is embodied in physical form and includes copyrights, trademarks, and patents? Multiple choice question. Digital rights management Information ethics Copyright Intellectual property

Intellectual property

What occurs when a government attempts to control Internet traffic, thus preventing some material from being viewed by a country's citizens? Multiple choice question. Internet rights management Internet vandalism Digital rights management Internet censorship

Internet censorship

Match the Internet monitoring technology on the left with its correct definition on the right.

Key logger-A program that records every keystroke and mouse click. Cookie-A small file deposited on a hard drive by a website containing information about customers and their web activities. Adware-Software that generates ads that install themselves on a computer when a person downloads some other program from the Internet. Spyware-Software that comes hidden in free downloadable software and tracks online movements. Clickstream-Records information about a customer during a web surfing session such as what websites were visited.

What involves capturing, classifying, evaluating, retrieving, and sharing information assets in a way that provides context for effective decisions and actions? Taxonomy Social networking analysis Knowledge management Crowdsourcing

Knowledge management

What supports the capturing, organization, and dissemination of knowledge (i.e., know-how) throughout an organization? Knowledge management system Collaboration system Collective intelligence

Knowledge management system

What records classified and summarized transactional data? Ledger Hash Distribution Proof-of-stake

Ledger

______ learning is a type of artificial intelligence that enables computers to both understand concepts in the environment, and also to learn. Autonomous Digital Machine

Machine

What is a type of artificial intelligence that enables computers to both understand concepts in the environment, and also to learn? Internet of Things Virtual assistant Machine learning Information of Everything

Machine learning

What is a type of artificial intelligence that enables computers to both understand concepts in the environment, and also to learn? Machine learning Fuzzy logic Expert system

Machine learning

What is a type of artificial intelligence that enables computers to both understand concepts in the environment, and also to learn? Multiple choice question. Expert system Machine learning Fuzzy logic

Machine learning

Match the term on the left with its correct definition on the right. Instructions Machine learning Machine learning drop zone empty. Weak AI Weak AI drop zone empty. Strong AI Strong AI drop zone empty. Works towards providing brain like powers to AI machines; in effect, it works to make machines as intelligent as the humans. Machines can still make their own decisions based on reasoning and past sets of data. Enables computers to both understand concepts in the environment, and also to learn.

Machine learning- Enables computers to both understand concepts in the environment, and also to learn. Weak AI- Machines can still make their own decisions based on reasoning and past sets of data. Strong AI- Works towards providing brain like powers to AI machines; in effect, it works to make machines as intelligent as the humans.

What sends a massive amount of email to a specific person or system that can cause that user's server to stop functioning? Multiple choice question. Teergrubing Spam Mail bomb Cybervandalism

Mail bomb

Scareware is a type of ________ designed to trick victims into giving up personal information to purchase or download useless and potentially dangerous software. Multiple choice question. malware bug bounty program dumpster diving

Malware

___________ is software that is intended to damage or disable computers and computer systems. Multiple choice question. Malware Virus Hactivist

Malware

Information ___________ examines the organizational resource of information and regulates its definitions, uses, value, and distribution ensuring it has the types of data/information required to function and grow effectively. Multiple choice question. property management governance

Management

__________ decisions concern how the organization should achieve the goals and objectives set by its strategy, and they are usually the responsibility of mid-level management. Strategic Managerial Operational

Managerial

What concerns how the organization should achieve the goals and objectives set by its strategy, and they are usually the responsibility of mid-level management? Strategic decisions Operational decisions Managerial decisions

Managerial decisions

At which level are employees continuously evaluating company operations to hone the firm's abilities to identify, adapt to, and leverage change? Managerial level Operational level Strategic level

Managerial level

A(n) ___________ is a website or web application that uses content from more than one source to create a completely new product or service. mashup application interface network

Mashup

What is a website or web application that uses content from more than one source to create a completely new product or service? Network effect Mashup Microblogging Syndication

Mashup

What are WYSIWYG tools, or what You See Is What You Get tools? Network effect Application programming interface Mashup editors

Mashup editors

A social ________ policy outlines the corporate guidelines or principles governing employee online communications. Multiple choice question. monitoring media network

Media

Social ________ monitoring is the process of monitoring and responding to what is being said about a company, individual, product, or brand. Multiple choice question. media security employee

Media

What is the practice of sending brief posts (140 to 200 characters) to a personal blog, either publicly or to a private group of subscribers who can read the posts as IMs or as text messages? Microblogging Real Simple Syndication Mashup Wiki

Microblogging

___________ is the practice of sending brief posts (140 to 200 characters) to a personal blog, either publicly or to a private group of subscribers who can read the posts as IMs or as text messages. Wiki Blog Mashup Video conferencing Microblogging

Microblogging

What is a simplified representation or abstraction of reality? Consolidation Model Project Metric

Model

Which institute introduced an advanced encryption standard (AES) designed to keep government information secure? Multiple choice question. National Institute of Standards and Technology (NIST) Public Key Encryption Institute (PKEI)

National Institute of Standards and Technology (NIST)

______ advertising is an online marketing concept in which the advertiser attempts to gain attention by providing content in the context of the user's experience in terms of its content, format, style. Native Local Source Collaboration

Native

What is an online marketing concept in which the advertiser attempts to gain attention by providing content in the context of the user's experience in terms of its content, format, style?. User-contributed content Collaboration system Native advertising Content sharing

Native advertising

What gathers an organization's computer network traffic patterns to identify unusual or suspicious operations? Multiple choice question. Network behavior analysis Cyberterrorism Intrusion detection software

Network behavior analysis

_________ network is a category of AI that attempts to emulate the way the human brain works. Multiple choice question. Virtual Expert Neural Genetic

Neural

What is a category of AI that attempts to emulate the way the human brain works? Virtual reality Neural network Expert system Genetic algorithm

Neural network

What information is transmitted without encryption and includes information collected from public records, phone books, corporate directives, and websites? Multiple choice question. Sensitive PII Public key encryption Nonsensitive PII

Nonsensitive PII

Select the definition on the right that correctly identifies the term on the left.

Nonsensitive PII- Information transmitted without encryption and includes information collected from public records, phone books, corporate directives, and websites. Sensitive PII- Information transmitted with encryption and when disclosed, results in a breach of an individual's privacy and can potentially cause the individual harm.

What is the manipulation of information to create business intelligence in support of strategic decision making? Online transactional processing (OLTP) Online analytical processing (OLAP)

Online analytical processing (OLAP)

What consists of nonproprietary hardware and software based on publicly known standards that allows third parties to create add-on products to plug into or interoperate with the system? Knowledge management Reputation systems Open system Open source

Open system

______ decisions affects how the firm is run from day-to-day; they are the domain of operations managers, who are the closet to the customer. Operational Strategic Managerial

Operational

What affects how the firm is run from day-to-day; they are the domain of operations managers, who are the closest to the customer? Managerial decisions Operational decisions Strategic decisions

Operational decisions

At what level do employees develop, control, and maintain core business activities required to run the day-to-day operation? Operational level Managerial level Strategic level

Operational level

What is it called when a user choses to receive emails and allows permissions to incoming emails? Multiple choice question. Teergrubing Opt in Opt out

Opt in

_________ analysis finds the optimum value for a target variable by repeatedly changing other variables, subject to specified constraints. What-if Sensitivity Optimization Goal-Seek

Optimization

Which type of analysis finds the optimum value for a target variable by repeatedly changing other variables, subject to specified constraints? Sensitivity analysis What-if analysis Optimization analysis

Optimization analysi

____________ occurs when a machine learning model matches the training data so closely that the model fails to make correct predictions on new data. Underfitting Augmentation Intelligence Overfitting

Overfitting

_______ is a string of alphanumeric characters used to authenticate a user and provide access to a system. Multiple choice question. Password Token Smart card

Password

What is an exclusive right to make, use, and sell an invention and is granted by a government to the inventor? Multiple choice question. Counterfeit software Information ethics Copyright patent

Patent

_________ identifiable information is any data that could potentially identify a specific individual. Multiple choice question. Personally Encrypted Advanced Privilege

Personally

What is any data that could potentially identify a specific individual? Multiple choice question. Time bombs Horizontal privilege escalation Advanced encryption standard Personally identifiable information

Personally identifiable information

What reroutes requests for legitimate websites to false websites? Multiple choice question. Zombie Pharming Phishing Zombie farm

Pharming

__________ reroutes requests for legitimate websites to false websites. Multiple choice question. Pharming Phishing Zombie

Pharming

What uses a zombie farm, often by an organized crime association, to launch a massive phishing attack? Multiple choice question. Pharming attack Authentication and authorization Information secrecy Identity theft

Pharming attack

What is a technique to gain personal information for the purpose of identity theft, usually by means of fraudulent emails that look as though they came from legitimate businesses? Multiple choice question. Vishing Phishing Pharming Information secrecy

Phishing

__________ is a technique to gain personal information for the purpose of identity theft, usually by means of fraudulent emails that look as though they came from legitimate businesses. Multiple choice question. Pharming Vishing Phishing

Phishing

What is a masquerading attack that combines spam with spoofing? Multiple choice question. Identity theft Phishing expedition Zombie farm Information secrecy

Phishing expedition

_________ security is tangible protection such as alarms, guards, fireproof doors, fences, and vaults. Multiple choice question. Information Workplace Physical

Physical

What is tangible protection such as alarms, guards, fireproof doors, fences, and vaults? Multiple choice question. Threat Physical security Workplace MIS monitoring

Physical security

Drag and drop the definitions against the corresponding key terms. Instructions Pie chart Pie chart drop zone empty. Bar chart Bar chart drop zone empty. Histogram Histogram drop zone empty. Sparkline Time-series chart Time-series chart drop zone empty. A small embedded line graph that illustrates a single trend A graphical representation showing change of a variable over time A chart or graph that presents grouped data with rectangular bars with lengths proportional to the values they they represent A graphical display of data using bars of different heights A type of graph in which a circle is divided into sectors that each represent a proportion of the whole

Pie chart- A type of graph in which a circle is divided into sectors that each represent a proportion of the whole Bar chart- A chart or graph that presents grouped data with rectangular bars with lengths proportional to the values they they represent Histogram- A graphical display of data using bars of different heights Sparkline- A small embedded line graph that illustrates a single trend Time-series chart- A graphical representation showing change of a variable over time

_________ software is the unauthorized use, duplication, distribution, or sale of copyrighted software. Multiple choice question. Counterfeit Digital Pirated

Pirated

What is the unauthorized use, duplication, distribution, or sale of copyrighted software? Multiple choice question. Digital rights management Counterfeit software Intellectual property Pirated software

Pirated software

What converts an audio broadcast to a digital music player? Content management system Videoconferencing Podcasting Instant messaging

Podcasting

What is the right to be left alone when you want to be, to have control over your personal possessions, and not to be observed without your consent? Multiple choice question. Ethics Confidentiality Privacy

Privacy

_______ is the right to be left alone when you want to be, to have control over your personal possessions, and not to be observed without your consent. Multiple choice question. Copyright Patent Privacy

Privacy

_______ is the right to be left alone when you want to be, to have control over your personal possessions, and not to be observed without your consent. Multiple choice question. Patent Copyright Privacy

Privacy

What is a way to validate transactions and achieve a distributed consensus? Immutability Proof-of-stake Proof-of-work Genesis block

Proof-of-stake

What is a way to validate transactions and achieve a distributed consensus? Proof-of-work Genesis block Proof-of-stake Immutability

Proof-of-stake

What is a requirement to define an expensive computer calculation, also called mining, that needs to be performed in order to create a new group of trustless transactions (blocks) on the distributed ledger or blockchain? Bitcoin Immutable Proof-of-stake Proof-of-work

Proof-of-work

Information _________ is an ethical issue that focuses on who owns information about individuals and how information can be sold and exchanged. Multiple choice question. property secrecy governance

Property

What is a form of malicious software that infects your computer and asks for money? Multiple choice question. Polymorphic virus Adware Ransomware Spyware

Ransomware

___________ is a form of malicious software that infects your computer and asks for money. Multiple choice question. Adware Scareware Ransomware

Ransomware

What is the network security model necessary to accommodate the emergence of multiple perimeters and moving parts on the network, and increasingly advanced threats targeting enterprises? Real-time adaptive security Virtual assistant Biological 3D printing Autonomic computing

Real-time adaptive security

What occurs when a system updates information at the same rate it receives it? Internet service provider Real-time communication Instant messaging

Real-time communication

What combines art along with science to determine how to make URLs more attractive to search engines resulting in higher search engine ranking? Search engine optimization Search engine conversion Search engine ranking Search engine analytics

Search engine optimization

What evaluates variables that search engines use to determine where a URL appears on the list of search results? Search engine optimization Search engine Search engine ranking

Search engine ranking

Information ________ is the category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity. Multiple choice question. management privacy secrecy

Secrecy

Information ________ is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization. Multiple choice question. security privacy ethics

Security

______-structured decisions occur in situations in which a few established processes help to evaluate potential solutions, but not enough to lead to a definite recommended decision. Middle Semi Full

Semi

What types of decisions occur in situations in which a few established processes help to evaluate potential solutions, but not enough to lead to a definite recommended decision? Unstructured decisions Structured decisions Semistructured decisions

Semistructured decisions

What is a device about the size of a credit card, containing embedded technologies that can store information and small amounts of software to perform some limited processing? Multiple choice question. Smart card Biometrics Token Fingerprint

Smart card

_________ content is content that is designed to be easy for readers to consume and to share. Folksonomy Social Snackable Hashtag

Snackable

_________ content is content that is designed to be easy for readers to consume and to share. Snackable Hashtag Folksonomy Social

Snackable

What is content that is designed to be easy for readers to consume and to share? Snackable content Folksonomy Social bookmarking Hashtag

Snackable content

Which of the following relies on social skills to trick people into revealing access credentials or other valuable information? Multiple choice question. Social security policies Social engineering Hackers and viruses Sock puppet marketing

Social engineering

What refers to websites that rely on user participation and user-contributed content, such as Facebook, YouTube, and Digg? Social knowledge Social media Social network

Social media

Which policy outlines the corporate guidelines or principles governing employee online communications? Multiple choice question. Internet use policy Acceptable use policy Social media policy Workplace monitoring policy

Social media policy

Which of the following is an application that connects people by matching profile information? Social marketing Social network Social media

Social network

What maps group contacts (personal and professional) identifying who knows each other and who works together? Social tagging Social networking analysis Asynchronous communication Folksonomy

Social networking analysis

What describes the collaborative activity of marking shared online content with keywords or tags as a way to organize it for future navigation, filtering, or search? Social tagging Social networking Social media

Social tagging

What is the use of a false identity to artificially stimulate demand for a product, brand, or service? Multiple choice question. Pharming Phishing expedition Sock puppet marketing Authentication and authorization

Sock puppet marketing

What is unsolicited email? Multiple choice question. Teergrubing Mail bomb Spam Opt-out

Spam

________ is unsolicited email. Multiple choice question. Teergrubbing Spam Mail

Spam

___________ phishing is a phishing expedition in which the emails are carefully designed to target a particular person or organization. Multiple choice question. Farm Zombie Spear Pharming

Spear

What is a phishing expedition in which the emails are carefully designed to target a particular person or organization? Multiple choice question. Destructive agents Zombie farm Spear phishing Pharming

Spear phishing

What is a special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission? Multiple choice question. Worm Backdoor program Adware Spyware

Spyware

_________ is a special class of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission. Multiple choice question. Spyware Adware Malware

Spyware

______ decisions involve higher level issues concerned with the overall direction of the organization and define the organization's aspirations for the future. Operational Strategic Managerial

Strategic

______ decisions involve higher level issues concerned with the overall direction of the organization and define the organization's aspirations for the future. Strategic Operational Managerial

Strategic

At what level do managers develop overall business strategies, goals, and objectives as part of the company's strategic plan? \ Operational level Strategic level Managerial level

Strategic level

Which decisions arise in situations where established processes offer potential solutions? Structured Unstructured

Structured

Machine learning matches Choice Enables computers to both understand concepts in the environment, and also to learn. Weak AI matches Choice Machines can still make their own decisions based on reasoning and past sets of data. Strong AI matches Choice Works towards providing brain like powers to AI machines; in effect, it works to make machines as intelligent as the humans.

Supervised machine learning- Training a model from input data and its corresponding labels. Unsupervised machine learning- Choice Training a model to find patterns in a dataset, typically an unlabeled dataset. Transfer machine learning- Transfers information from one machine learning task to another.

An open ________ consists of nonproprietary hardware and software based on publicly known standards that allows third parties to create add-on products to plug into or interoperate with the system. source system content

System

What are specific keywords or phrases incorporated into website content for means of classification or taxonomy? Social bookmarks Tags Social media

Tags

What is the scientific classification of organisms into groups based on similarities of structure or origin? Content management system Taxonomy Information architecture

Taxonomy

_______ is the scientific classification of organisms into groups based on similarities of structure or origin. Architecture Webinar Taxonomy

Taxonomy

What is an antispamming approach where the receiving computer launches a return attack against the spammer, sending email messages back to the computer that originated the suspected spam? Multiple choice question. Teergrubing Typosquatting Cybervandalism

Teergrubing

____________ is an antispamming approach where the receiving computer launches a return attack against the spammer, sending email messages back to the computer that originated the suspected spam. Multiple choice question. Cybervandalism Teergrubing Typosquatting

Teergrubing

What is a remote-controlled, wheeled device with a display to enable video chat and videoconferencing? Telepresence robot Podcasting Videoconference

Telepresence robot

What is an act or object that poses a danger to assets? Multiple choice question. Threat Click-fraud Epolicies Cyberbullying

Threat

__________ bombs are computer viruses that wait for a specific date before executing their instructions. Multiple choice question. Logic Cryptography Time Encryption

Time

What are computer viruses that wait for a specific date before executing their instructions? Multiple choice question. Time bombs Certificates Biometrics Encryption

Time bombs

What are small electronic devices that change user passwords automatically? Multiple choice question. Password Fingerprints Tokens Smart cards

Tokens

_______ information encompasses all raw facts contained within a single process and its purpose is to support daily operational tasks. Analytical Transactional

Transactional

What examines a trend to identify its nature, causes, speed of development, and potential impacts? Computer simulation Trend analysis Trend monitoring Trend projection

Trend analysis

What views trends that are particularly important in a specific community, industry, or sector are carefully monitored, watched, and reported to key decision makers? Trend analysis Computer simulation Trend projection Trend monitoring

Trend monitoring

What occurs when numerical data are available and a trend can be plotted to display changes through time and into the future? Trend monitoring Trend analysis Computer simulation Trend projection

Trend projection

True or false: A bring your own device (BYOD) policy allows employees to use their personal mobile devices and computers to access enterprise data and applications. True or false

True

True or false: Infographics (information graphics) present the results of data analysis, displaying the patterns, relationships, and trends in a graphical format. True or false

True

True or false: Web Real-Time Communications (WebRTC) is an open source project that seeks to embed real-time voice, text, and video communications capabilities in web browsers. True False

True

True or false: A worm spreads itself not only from file to file but also from computer to computer. The primary difference between a virus and a worm is that a virus must attach to something, such as an executable file, to spread. True or false

True (Reason: A worm spreads itself not only from file to file but also from computer to computer. The primary difference between a virus and a worm is that a virus must attach to something, such as an executable file, to spread.)

Digital ___________ is the measure of consumer, partner, and employee confidence in an organization's ability to protect and secure data and the privacy of individuals. Multiple choice question. trust ethics information discovery

Trust

What is a problem that occurs when someone registers purposely misspelled variations of well-known domain names? Multiple choice question. Cybervandalism Cyberbullying Typosquatting

Typosquatting

__________ (one word) is a problem that occurs when someone registers purposely misspelled variations of well-known domain names. Multiple choice question. Cyberbullying Cybervandalism Typosquatting

Typosquatting

What occurs when a machine learning model has poor predictive abilities because it did not learn the complexity in the training data? Multiple choice question. Underfitting Overfitting Data augmentation

Underfitting

________ occurs when a machine learning model has poor predictive abilities because it did not learn the complexity in the training data. Underfitting Augmentation Overfitting Bias

Underfitting

What are decisions that occur in situations in which no procedures or rules exist to guide decision makers toward the correct choice? Structured Semistructured Unstructured

Unstructured

What is created and updated by many users for many users? User-contributed content Collective intelligence Knowledge management system

User-contributed content

_______ privilege escalation occurs when attackers grant themselves a higher access level such as administrator, allowing the attacker to perform illegal actions such as running unauthorized code or deleting data. Multiple choice question. Horizontal Vertical Content

Vertical

What allows people at two or more locations to interact via two-way video and audio transmissions simultaneously as well as share documents, data, computer displays, and whiteboards? Webinar Videoconference Instant messaging Podcasting

Videoconference

What is a small program stored on a PC or portable device that monitors emails, faxes, messages, and phone calls? Digital ink/Digital paper Teleliving Virtual assistant

Virtual assistant

A(n) ________ is software written with malicious intent to cause annoyance or damage. Multiple choice question. cracker script kiddie virus

Virus

What is software written with malicious intent to cause annoyance or damage? Multiple choice question. Hacker Adware Virus Cracker

Virus

________ is a phone scam that attempts to defraud people by asking them to call a bogus telephone number to "confirm" their account information. Multiple choice question. Pharming Vishing Phishing

Vishing

What produces graphical displays of patterns and complex relationships in large amounts of data? Optimization Granularity Visualization

Visualization

______ produces graphical displays of patterns and complex relationships in large amounts of data. Multiple choice question. Visualization Optimization Sensitivity

Visualization

______ AI machines can still make their own decisions based on reasoning and past sets of data. Straight Output Strong Weak

Weak

What machines can still make their own decisions based on reasoning and past sets of data? Multiple choice question. Weak AI Strong AI

Weak AI

Select the term representing the next generation of Internet use — a distinctive communications platform characterized by new qualities, such as collaboration and sharing. Business 1.0 Business 3.0 Web 2.0 Web 3.0

Web 2.0

What is the next generation of Internet use—a more mature, distinctive communications platform characterized by new qualities such as collaboration sharing, and free? Semantic Web Web 1.0 Web 3.0 Web 2.0

Web 2.0

What is an open source project that seeks to embed real-time voice, text, and video communications capabilities in web browsers? Internet service provider Web Real-Time Communications

Web Real-Time Communications

What blends videoconferencing with document sharing and allows the user to deliver a presentation over the web to a group of geographically dispersed participants? Web conferencing Podcasting Content management system

Web conferencing

What is a locally stored URL or the address of a file or Internet page saved as a shortcut? Social bookmarking Social tagging Folksonomy Website bookmark

Website bookmark

What is the theft of a website's name that occurs when someone, posing as a site's administrator, changes the ownership of the domain name assigned to the website to another website owner? Multiple choice question. Website name stealing Typosquatting Internet censorship Cybervandalism

Website name stealing

________-if analysis checks the impact of a change in a variable or assumption on the model. Goal Sensitivity What

What

Which DDS analysis technique checks the impact of a single change in a variable or assumption on the model? Optimization analysis What-if analysis Sensitivity analysis Goal-seeking analysis

What-if analysis

Match the common type of hacker on the left with its correct definition on the right. Instructions White-hat hacker White-hat hacker drop zone empty. Script kiddies Script kiddies drop zone empty. Cyberterrorist Cyberterrorist drop zone empty. Cracker Cracker drop zone empty. Find hacking code on the Internet and click-and-point their way into systems to cause damage or spread viruses. Have criminal intent when hacking. Work at the request of the system owners to find system vulnerabilities and plug the holes. Seek to cause harm to people or to destroy critical systems or information and use the Internet as a weapon of mass destruction.

White-hat hacker- Work at the request of the system owners to find system vulnerabilities and plug the holes. Script kiddies- Find hacking code on the Internet and click-and-point their way into systems to cause damage or spread viruses.. Cyberterrorist- Seek to cause harm to people or to destroy critical systems or information and use the Internet as a weapon of mass destruction. Cracker- Have criminal intent when hacking.

A(n) _______ is a type of collaborative web page that allows users to add, remove, and change content, which can be easily organized and reorganized as required. blog microblogging mashup wiki

Wiki

What is a type of collaborative web page that allows users to add, remove, and change content, which can be easily organized and reorganized as required? Web log Network effect Mashup Wiki

Wiki

_________ MIS monitoring tracks people's activities by such measures as number of keystrokes, error rate, and number of transactions processed. Multiple choice question. Employee Adware Workplace

Workplace

What tracks people's activities by such measures as number of keystrokes, error rate, and number of transactions processed? Multiple choice question. Employee security Physical security Workplace MIS monitoring

Workplace MIS monitoring

What tracks people's activities by such measures as number of keystrokes, error rate, and number of transactions processed? Multiple choice question. Workplace MIS monitoring Physical security Employee security

Workplace MIS monitoring

What is a program that secretly takes over another computer for the purpose of launching attacks on other computers? Multiple choice question. Zombie Virus Hacker Phishing

Zombie

________ is a program that secretly takes over another computer for the purpose of launching attacks on other computers. Multiple choice question. Zombie Pharming Phishing

Zombie

What is a group of computers on which a hacker has planted zombie programs? Multiple choice question. Zombie farm Phishing Identity theft

Zombie farm

A(n) ___________ use policy requires a user to agree to follow it to be provided access to corporate email, information systems, and the Internet. Multiple choice question. email information internet acceptable

acceptable

Historical __________ occurs when historical events are studied to anticipate the outcome of current developments. monitoring analysis projection

analysis

Social networking _________ maps group contacts (personal and professional) identifying who knows each other and who works together. communication analysis content

analysis

Trend __________ occurs when a trend is examined to identify its nature, causes, speed of development, and potential impacts. analysis projection monitoring

analysis

What occurs when the user goes into an emotional state of over-analysis (or over-thinking) a situation so that a decision or action is never taken, in effect paralyzing the outcome? information graphics analysis paralysis data visualization business intelligence dashboard

analysis paralysis

Online ____________ processing is the manipulation of information to create business intelligence in support of strategic decision making. informational analytical organizational transactional

analytical

A(n) ________ policy simply states that email users will not send unsolicited emails. Multiple choice question. virus information anti-spam

anti-spam

Information ___________ is the set of ideas about how all information in a given context should be organized. architecture management content

architecture

Information ___________ is the set of ideas about how all information in a given context should be organized. content architecture management

architecture

A data _________ is a business analytics specialist who uses visual tools to help people understand complex data. Multiple choice question. point intelligence artist

artist

A pharming __________ uses a zombie farm, often by an organized crime association, to launch a massive phishing attack. Multiple choice question. threat theft attack

attack

Data __________ occurs when adding additional training examples by transforming existing examples. learning machine transfer augmentation

augmentation

A(n) __________ agent is software that carries out some set of operations on behalf of a user or another program with some degree of independence or autonomy, and employ some knowledge or representation of the user's goals or desires. machine virtual learning autonomous

autonomous

Network _____ analysis gathers an organization's computer network traffic patterns to identify unusual or suspicious operations. Multiple choice question. behavior detection vigilantes intrusion

behavior

Network _____ analysis gathers an organization's computer network traffic patterns to identify unusual or suspicious operations. Multiple choice question. intrusion behavior vigilantes detection

behavior

A(n) ____________ is a type of distribution ledger, consisting of blocks of data that maintain a permanent and tamper-proof record of transactional data. hash blockchain immutable ledger

blockchain

A blockchain is formed by linking ______, data structures containing a hash, previous hash, and data. hash immutable blocks previous

blocks

Consumer-to-_________ applies to any consumer who sells a product or service to a business on the Internet. customer government business consumer

business

What is any proprietary software licensed under exclusive legal right of the copyright holder? open source open system closed source closed system

closed source

utonomic _________ is a self-managing computing model named after, and patterned on, the human body's autonomic nervous system. information computing security

computing

Consumer-to-__________ applies to customers offering goods and services to each other on the Internet. business employee consumer government

consumer

Astroturfing is the practice of artificially stimulating online __________ and positive reviews about a product, service or brand. Multiple choice question. farms expedition attacks conversation

conversation

What sources capital for a project by raising many small amounts from a large number of individuals, typically via the Internet? Multiple choice question. crowdfunding explicit knowledge crowdsourcing synchronous communication

crowdfunding

What involves prevention, detection, and response to cyberattacks that can have wide-ranging effects on the individual, organizations, community, and at the national level? Multiple choice question. information governance downtime information compliance cybersecurity digital trust

cybersecurity

A(n) ___________ is an organized attempt by a country's military to disrupt or destroy information and communication systems for another country. Multiple choice question. firewall cyberterrorism cyberwar

cyberwar

A(n) ______ anthropologist is an individual who studies the interaction between humans and technology, observing how technology can shape humans' lives. cyborg hitbot service provider search engine

cyborg

Business intelligence ___________ track corporate metrics such as critical success factors and key performance indicators and include advanced capabilities such as interactive controls allowing users to manipulate data for analysis. anomaly detection analysis dashboards

dashboards

Digital __________ track KPIs and CSFs by compiling information from multiple sources and tailoring it to meetuser needs. Multiple choice question. analysis dashboards transactions

dashboards

To _________ information is to decode it and is the opposite of encrypt. Multiple choice question. cryptography decrypt filter

decrypt

To _________ information is to decode it and is the opposite of encrypt. Multiple choice question. cryptography filter decrypt

decrypt

Podcasting converts an audio broadcast to a __________ music player. system videoconferencing digital messaging

digital

The ambient ______ experience is a blend of the physical, virtual, and electronic environments creating a real-time ambient environment that changes as the user moves from one place to another. digital augmented virtual

digital

Processing and managing algorithms across many machines in a computing environment is known as ___. distributed computing extraction, transformation, and loading information cleansing

distributed computing

A(n) __________ privacy policy details the extent to which email messages may be read by others. Multiple choice question. email computer Internet information

email

Through social ____________, hackers use their social skills to trick people into revealing access credentials or other valuable information. Multiple choice question. engineering diving information

engineering

Phishing ________ is a masquerading attack that combines spam with spoofing. Multiple choice question. secrecy expedition agents

expedition

A zombie _________ is a group of computers on which a hacker has planted zombie programs. Multiple choice question. expedition farm hacker

farm

Content ____________ occurs when organizations use software that filters content, such as emails, to prevent the accidental or malicious transmission of unauthorized information. Multiple choice question. time filtering encryption

filtering

A(n) ___ is a function that converts an input of letters and numbers into an encrypted output of a fixed length.. proof hash block immutable

hash

A(n) ________ is a keyword or phrase used to identify a topic and is preceded by a hash or pound sign (#). For example, #sandiegofire bookmarket website folksonomy hashtag

hashtag

What is a keyword or phrase used to identify a topic and is preceded by a hash or pound sign (#)? hashtag taxonomy social bookmarking folksonomy

hashtag

A(n) ______ privilege escalation occurs when attackers grant themselves the same access levels they already have but assume the identity of another user. Multiple choice question. vertical content horizontal

horizontal

Managers need to analyze large amounts of _________ to make quick business decisions. information ethics security

information

A(n) _________ service provider is a company that provides access to the Internet for a monthly fee. email internet podcasting instant employee

internet

A(n) _________ use policy contains general principles to guide the proper use of the Internet. Multiple choice question. email information internet

internet

A(n) _________ use policy contains general principles to guide the proper use of the Internet. Multiple choice question. information email internet

internet

A(n) _________ (one word) management system supports the capturing, organization, and dissemination of knowledge (i.e., know-how) throughout an organization. collective knowledge social native

knowledge

A(n) _______ records classified and summarized transactional data. hash distribution ledger stake

ledger

At the _________ level, employees are continuously evaluating company operations to hone the firm's abilities to identify, adapt to, and leverage change. operational strategic managerial

managerial

Proof-of-work is a requirement to define an expensive computer calculation, also called _________, that needs to be performed in order to create a new group of trustless transactions (blocks) on the distributed ledger or blockchain. proof Bitcoin stake mining

mining

A social __________ is an application that connects people by matching profile information media network marketing analysis

network

A contractual stipulation which ensures that ebusiness participants do not deny their online actions is called a __________ clause. Multiple choice question. Internet use policy acceptable use policy Internet censorship nonrepudiation

nonrepudiation

A contractual stipulation which ensures that ebusiness participants do not deny their online actions is called a __________ clause. Multiple choice question. nonrepudiation acceptable use policy Internet use policy Internet censorship

nonrepudiation

Search engine ___ combines art along with science to determine how to make URLs more attractive to search engines resulting in higher search engine ranking. ranking optimization conversion analytics

optimization

What is a string of alphanumeric characters used to authenticate a user and provide access to a system? Multiple choice question. token password biometrics

password

A(n) _______ escalation is a network intrusion attack that takes advantage of programming errors or design flaws to grant the attacker elevated access to the network and its associated data and applications. privilege cryptography authentication

privilege

What occurs when a network intrusion attacker takes advantage of programming errors or design flaws to grant the attacker elevated access to the network and its associated data and applications? Multiple choice question. identity theft pharming expedition privilege escalation zombie attack

privilege escalation

Application ______ interface is a set of routines, protocols, and tools for building software applications. editor programming effect syndication

programming

Sock _____ marketing is the use of a false identity to artificially stimulate demand for a product, brand, or service. Multiple choice question. authorization phishing puppet pharming

puppet

A telepresence _______ is a remote-controlled, wheeled device with a display to enable video chat and videoconferencing. podcast system video robot

robot

Real-time adaptive ______ is the network security model necessary to accommodate the emergence of multiple perimeters and moving parts on the network, and increasingly advanced threats targeting enterprises. digital information security

security

What is a self-photograph placed on a social media website? blog microblogging wiki selfie

selfie

A(n) _______ card is a device about the size of a credit card, containing embedded technologies that can store information and small amounts of software to perform some limited processing. Multiple choice question. information smart intelligent

smart

What is the process of monitoring and responding to what is being said about a company, individual, product, or brand? Multiple choice question. social media monitoring employee monitoring policy social media manager workplace MIS monitoring

social media monitoring

Website name ____________ is the theft of a website's name that occurs when someone, posing as a site's administrator, changes the ownership of the domain name assigned to the website to another website owner. Multiple choice question. vandalism stealing censorship squatting

stealing

At the Blank______ level, managers develop overall business strategies, goals, and objectives as part of the company's strategic plan. operational strategic managerial

strategic

Operational decisions are considered Blank______ decisions, which arise in situations where established processes offer potential solutions. structured unstructured modeled frequency

structured

Social _________ describes the collaborative activity of marking shared online content with keywords or tags as a way to organize it for future navigation, filtering, or search. bookmarking marketing analysis tagging

tagging

A(n) ________ is an act or object that poses a danger to assets. Multiple choice question. threat cyberbullying nonrepudiation

threat

Strategic decisions are highly Blank______ decisions, occurring in situations in which no procedures or rules exist to guide decision makers toward the correct choice. structured unstructured semistructured

unstructured

Strategic decisions are highly Blank______ decisions, occurring in situations in which no procedures or rules exist to guide decision makers toward the correct choice. unstructured semistructured structured

unstructured

What occurs when attackers grant themselves a higher access level such as administrator, allowing the attacker to perform illegal actions such as running unauthorized code or deleting data? Multiple choice question. vertical privilege escalation content filtering horizontal privilege escalation time bomb

vertical privilege escalation

he _________ assistant will be a small program stored on a PC or portable device that monitors emails, faxes, messages, and phone calls. autonomous digital virtual

virtual

What is a phone scam that attempts to defraud people by asking them to call a bogus telephone number to "confirm" their account information? Multiple choice question. vishing pharming authentication zombie

vishing

Data __________ tools move beyond Excel graphs and charts into sophisticated analysis techniques such as pie charts, controls, instruments, maps, time-series graphs, and more. analysis paralysis visualization intelligence

visualization


Related study sets

Chapter 27-The Reproductive System

View Set

Health-unit 1: mental and emotional Health

View Set

Chapter 24: Performing Chest Physiotherapy

View Set

Marketing Ch. 1, Marketing Chapter 2, Marketing Chapter 3, Marketing Chapter 4, CH 5 QUIZ, CH 6 QUIZ, Chapter 16 quiz

View Set

Biliary/Pancrea/Hepatic/Neuro EAQ Questions

View Set