IT Final

Ace your homework & exams now with Quizwiz!

True or False: A disruptive technology tends to provide us with better, faster, and cheaper products in established markets.

False

True or False: B2B stands for Business to Buyer

False

True or False: World Wide Web and the Internet are synonymous.

False

True or False? Disruptive technology produces an improved product customers are eager to buy.

False

Violation of copyright and plagiarism is not a big deal. True False

False

Web. 2.0 allows people to describe information such that computers can understand the relationships among concepts and topics. T/F

False

World Wide Web(www) is a massive network that connects computers all over the world and allows them to communicate with one another. T/F

False

According the Ebusiness Revenue Model, which of the following is not a benefit of subscription fees? A. Prices can be differentiated. B. Creates incentives to do transactions. C. Fixed fees allow unlimited entry for participants. D. Possibility to build additional revenue from new user groups.

Fixed fees allow unlimited entry for participants.

When does a paradigm shift occur? when a new radical form of business enters the market When clients shift their loyalties to new, bigger busninesses. When the market changes to accommodate inflation

when a new radical form of business enters the market

A type of collaborative web page that allows users to add, remove, and change content; based on open collaboration with any- and every-body.

wiki

The Privacy Act was inacted in: a. 1974 b. 1966 c. 1989 d. 1978

1974

Which of the following is considered "counterfeit software"? A. Illegally downloading movies onto a PC. B. A false bank website looking like the Fifth-Third Bank website. C. Illegaly downloading music onto an iTunes account D. None of the above

A false bank website looking like the Fifth-Third Bank website.

What is the definition of a disruptive technology?

A new way of doing something that initially does not meet the needs of existing customers. It opens new markets and destroys old ones. Produces an improved product customers are eager to buy. Tends to provide us with better, faster, and cheaper products in established markets.

Definitely, MIS infrastructures can bring a lot of benefits to a company. Give at least 4 examples in how a solid MIS infrastructure can help companies to make business.

A solid MIS infrastructure can help to reduce costs, improve productivity, optimize business operations, and generate growth.

Mary is a secretary for a travel agency. She was caught illegally downloading music while signed into the company's network. Which policy has Mary violated? A. Information Privacy Policy B. Acceptable Use Policy C. Email Privacy Policy D. Social Media Policy

Acceptable Use Policy

Which is not an advantage of e-business? Opening new markets Reducing costs Adhering to taxation rules Improving operations

Adhering to taxation rules

One benefit of subscription fees is A.) Creates incentives to do transactions B.) Price can be differentiated C.) Possibilty to build additional revenue from new user groups D.) All of the above

All of the above

Which policy states that email users will not send unsolicited emails? A. Social Media Policy B. Information Ethics Policy C. Workplace Monitoring Policy D. Anti-Spam Policy

Anti-Spam Policy

True or False: A disruptive technology produces an improved product customers are eager to buy, such as a faster car or larger hard drive.

False

What is the difference between asynchronous and synchronous communication? a. Asynchronous communication happens in real-time whereas Synchronous communication has a lapse in time. b. Asynchronous communication has lapse in time whereas Synchronous communication happens in real-time. c. Asynchronous communication is when the two communicators are using the same platform for communication whereas Synchronous communication is when they are using different platforms. d. There is no difference in Asynchronous and Synchronous communication.

Asynchronous communication has lapse in time whereas Synchronous communication happens in real-time.

Which Business model deals with businesses buying and selling to each other? B2C B2B C2B C2C

B2B

Which of the following is a Tool for Collaboration in Business 2.0? Blogs Social Media Texting Email

Blogs

Which of the following terms are ways insiders obtain private information? a. Dumpster Diving b. Content Filtering c. Phishing d. All of the above e. Both a. and c.

Both a. and c.

What is Business-to-Consumer? a-) Business to consumer apply to any business that sells its products or services directly to consumers or services. b-) It is a Ebusiness that has had some its biggest impacts on customer service. c-) Business to consumer applies to any consumer who sells a product to a business. d-) It is a software that helps companies to manage the creation, storage, editing, and publication of their website content.

Business to consumer apply to any business that sells its products or services directly to consumers or services.

What type of monitoring technique is used to record a customers web browsing session? a) Web log b) Hardware Key Logger c) Clickstream d) Adware

Clickstream

A computer designed to request information from a server is called a a. Server b. Network c. Client d. Data Center

Client

All of the following are advantages to Business 2.0 except: A. Technology dependence B. User-Contributed Content C. Collaboration inside the organization D. Content sharing through open sourcing

Content sharing through open sourcing

Customers, Suppliers, Financial Markets, Banks, and Business Partners are all factors in what negative aspect of downtime: a. Financial Performance b. Revenue c. Damaged Reputation d. Other Expenses

Damaged Reputation

Which of the following hackers would be considered a cracker? A. Jane wants to look through her ex-boyfriend's trash to gain personal information. B. Daniel, wants to hack into a bank's database to steal money out of people's accounts. C. Josh, wants to break into the electronic voting system of his hometown and destroy it. D. All of the above are crackers

Daniel, wants to hack into a bank's database to steal money out of people's accounts.

The following are all disadvantages of cloud computing EXCEPT a. Limited features b. Internet connection required c. Security can be questionable d. Decreased storage capacity

Decreased storage capacity

What is the difference between sustaining and disruptive technology?

Disruptive technologies tend to open new markets and destroy old ones, and sustaining technologies tend to provide us with better, faster, and cheaper products in established markets.

What is the relationshp between Ecommerce and Ebusiness?

Ebusiness includes ecommerce along with all activities related to internal and external business operations.

An anti-spam policy simply states _____________. A. Email users will not send unsolicited emails. B. Employees will not send out personal information through company emails. C. Websites viewed by employees will not contain any content that goes against a company's mission statement. D. The owner of a company is not liable in the event of a system failure that shuts down company email.

Email users will not send unsolicited emails.

If a company faces a security breach where certain important information was stolen then encrypted, what type of preventative and resistant technology would best stop the thief by scrambling information into alternative forms? a. Content Filtering b. Antivirus software c. Firewall d. Encryption

Encryption

Which of the following prevention and resistance technologies scrambles information into an alternative form that requires a password to decrypt? a. Content Filtering b. Encryption c. Certificate Authority d. Firewall

Encryption

What is an advantage of eBusiness? A. Expanding Global Research B. Increasing Costs C.Increased employees D, Less human errors E. All of the Above

Expanding global research

A Agile MIS infrastructure identifies where and how important information, such as customer records, is maintained and secured. Select one: a-)True b-)False

False

Antivirus Software guards a private network by analyzing incoming and outgoing information for the correct markings? True of False?

False

Both information and people have ethics. True False

False

Ediscovery is a company's ability to identify, search, gather, seize, or export physical information in responding to a litigation, audit, investigation, or information inquiry. True False

False

Failover occurs when the primary machine recovers and resumes operations, taking over from the secondary server. True or False?

False

Pirated software is software that is manufactured to look like the real thing and is sold as such. True or False?

False

T or F. Epolicies are policies that govern the ability ofa company to control and export digital information about it's employees.

False

T/F A disruptive technology produces an improved product customers are eager to buy such as a faster car or larger hard drive.

False

T/F Counterfeit software is software that is unauthorized to use, duplicated, distributed, or sold as copyrighted.

False

T/F Privacy is the assurance that messages and information remain available only to those authorized to view them.

False

T/F Web 1.0 consits of open sourcing?

False

Is it detrimental to one's helath to be technology dependent?

I believe yes it is because with constant use of technology we lose hman contact which can make us lose feelings , we also will lose the ability to communicate effectivitely with real humans. Our conversations will become less thought-provoking and more or less dull.

All of these are advantages of Ebusiness except: a. Opening new markets b. Increasing costs c. Improving operations d. Expanding global reach

Increasing costs

Which of the following is NOT an advantage of E-Business? Expanding global reach Reducing Costs Increasing face to face communication Improving effectiveness

Increasing face to face communication

________ measures advertising effectiveness by counting visitor interactions with the target ad, including time spent viewing the ad, number of pages viewed, and number of repeat visits to the advertisement.

Interactivity

Give 2 ways that interactivity measures advertising effectiveness.

Interactivity counts visitor interactions with the target ad by tracking (1) time spent viewing the ad, (2) the number of pages viewed, (3) and the number of repeat visits for the advertisement.

What is the correct definition of hardware? a-) It is a communications system created by linking two or more devices and establishing a standard methodology in which they can communicate. b-) It is the set of instructions the hardware executes to carry out specific tasks. c-) It is a computer designed to request information from a server. d-) It is a computer dedicated to providing information in response to request. e-) It consists of the physical devices associated with a computer system.

It consists of the physical devices associated with a computer system.

Which sentence best describes web 1.0? a-) It is the depth and breadth of details contained in a piece of textual graphic, audio or video information. b-) It is a term to refer to the World Wide Web during its first few years of operation between 1991 and 2003. c-) It is the next generation of Internet use. d-) Web 1.0 consists of nonproprietary hardware and software based on publicly know standards that allow third parties to create add-on products to plug into or interoperate with the system.

It is a term to refer to the World Wide Web during its first few years of operation between 1991 and 2003.

When downtime occurs to a system due to a number of possible sources, (ex. hackers, theft, and natural disasters), it is important for a business to keep this downtime to a minimum to avoid possible consequences. However, many unplanned costs will still occur regardless. The least likely cost of unexpected downtown would be: Temporary Employees Lost Productivity Layoff of employees Legal Obligations

Layoff of employees

A typical ematil privacy policy will NOT a. Leave legitimate email users undefined b. Explain the backup procedure c. Discourage sending junk email or spam d. Inform users that the organization has no control over email once it has been transmitted outside the organization

Leave legitimate email users undefined

Which one is not a challenge faced by Business 2.0? Information Vandalism Lower profits Violation of copyright and plagiarism Technology dependency

Lower profits

When a massive amout of mail is sent to someone in order to stop the functioning of a server is called a ____? a) Mail Bomb b) Spam c) Junk Mail d) Mail Exploitation

Mail Bomb

(Blank) is the practice of sending brief posts (140 to 200 characters) to a personal blog.

Microblogging

Which is not a tool of e-business for connecting and communicating? Podcasting Instant Messaging Web Conferencing Email None of the above

None of the above

Which of the following is NOT an Epolicy? a. Ethical computer use policy b. Acceptable use policy c. Social media policy d. Email privacy policy e. None of the above

None of the above

John is trying to access his Chase Bank account online. He types in the web address when a false website is displayed to him instead of a real one. What is the name of this security attack method? A. Pharming B. Phishing C.Backdoor Programs D. Denial-of-service attack (DoS)

Pharming

Which MIS characteristic is most crucial for a company expecting to grow faster than they originally anticipated? a. Availability b. Scalability c. Accessability d. Usability

Scalability

Ethics and ____________ are two fundamental building blocks for all organizations. a. Privacy b. Information c. Security d. Support

Security

Sally Mae was fired from her job because she was sharing company information on her blog. She was violating which of the following policies: a. Email Privacy Policy b. Acceptable Use Policy c. Internet Use Policy d. Social Media Policy

Social Media Policy

(Blank) refers to websites that rely on user participation and user contributed content.

Social media

__________ is a special type of adware that collects data about the user and transmits it over the Internet without the user's knowledge or permission. A. Digital Download Software B. Spyware C. Trojanware D. Tupperware.

Spyware

What is one challenge of Business 2.0?

Technology Dependence, Information Vandalism, or Violations of Copyright and Plagiarism

Explain the "network effect."

The network effect describes how products in a network increase in value to users as the number of users increases. The more users and content managers on a wiki, the greater the network effect because more users attract more contributors, whose work attracts more users, and so on.

What is the correct definition of cloud computing? a-) A collection of computers, often geographically dispersed, that are coordinated to solve a common problem. b-) The practice of using a network of remote servers hosted on the Internet to store, manage, and process data, rather than a local server or a personal computer. c-)It is the degree to which a system is easy to learn and efficient and satisfying to use. d-) Cloud computing ensures a system is functioning correctly and providing accurate information. e-) Cloud computing is the use or operations of computers.

The practice of using a network of remote servers hosted on the Internet to store, manage, and process data, rather than a local server or a personal computer.

3-What is an enterprise architect and why do companies hire this kind of professional? a-) They design buildings and are hired to supervise constructions. b-) An enterprise architect combine the fields of science and math to solve real world problems and are hired to apply scientific knowledge, mathematics, and ingenuity to develop solutions for the company. c-) They are people grounded in technology and fluent in business who are hired to help manage change and dynamically update MIS infrastructure. d-) They are specialized in math and are hired to take care of the human resources are of a company. e-) None of the above

They are people grounded in technology and fluent in business who are hired to help manage change and dynamically update MIS infrastructure

Alex is a hacker that wants to send his ex-manager a virus by hiding it inside an e-mail as an attatchment. What type of virus is Alex sending? A. Worm B. Backdoor program C. Trojan-horse virus D. Distributed denial-of-service attack (DDoS)

Trojan-horse virus

A wiki is a type of collaborative web page that allows users to add, remove, and change content, which can be easily organized and reorganized as required. T/F

True

An example of crowd sourcing is our professor using students to formulate exam questions

True

Ebusiness expands global research, opens new markets, reduces cost, and improve operations. True False

True

Ensuring customer safety and security is a challenge of e-business. T/F

True

T or F. Biometrics refers to the identification of a person based on a physical characteristic, such as their face or voice?

True

T/F Authorization is the process of providing a user with permission to files and other storage spaces.

True

T/F If a grocery store tracks the transactions and other activities on company computers, it is called Information technology monitoring?

True

T/F Pharmin reroutes requests for legitimate websites to false websites.

True

T/F Web 3.0 will learn your habits and preferences?

True

True or False: Content management systems help companies manage the creation, storage, editing, and publication of their websit content.

True

True or False: Google has an email feature called "Mail Goggles".

True

True or False: Treating sensitive corporate information as a valuable resource is good management.

True

True/False- Disruptive technologies open new markets and destroy old ones.

True

True/False: Crowdsourcing is the most common form of collective intelligence found outside an organization.

True

Virtualization allows multiple computers to exist on a single machine, which allows it to share its resources to run different applications and operating systems. True of False?

True

Which version of the web are we currently in ? A. Web 2.0 B.Web 3.0 C. Web 4.0 D Web 1.0

Web 2.0

State what a Web 2.0 website is and give 3 examples.

Web 2.0 is a website in which the user can interact with other users or the business of the website. Ex. Facebook, e-Harmony, and AutoTrader.com

Which of the following could potentially cause a paradigm shift? A. Target starts selling Mr. Pibb soda for the first time. B. A paleontologist finally discovers why dinosaurs became extinct. He donates his research to a prestigious museum. C. Apple creates the iPhone 6 and begins selling it next week. D. Web 3.0 is capable of mind-reading in order to more efficiently sell target the needs of consumers.

Web 3.0 is capable of mind-reading in order to more efficiently sell target the needs of consumers.

A blog, or web blog is a Website were users post funny pictures Website were users can find weather updates Website similar to an online journal that allows users to post their own comments, graphics, and video. None of the above.

Website similar to an online journal that allows users to post their own comments, graphics, and video.

Which of the following are fundamental building blocks for all organizations: a. Ethics b. Good management c. Security d. a and c e. All of the above

a and c

A Real Simple Syndication (RSS) is: A. a collaborative web page that allows users to add, remove, and change content B. a web format used to publish frequently updated works C. a website or web application that uses content from more than one source to create a completely new product or service D. the practice of sending brief posts to a personal blog

a web format used to publish frequently updated works

Which of the following are considered disruptive technologies? A. iPod B. 3.5-inch disks C. personal computers D. all of the above

all of the above

Business to business: A.) applies to any business that sells its products or services to consumers over the Internet B.) applies to any consumer that sells a product or service to a business over the Internet C.) applies to sites primarily offering goods and services to assist consumers interacting with each other over the Internet D.) applies to businesses buying from and selling to each other over the Internet

applies to businesses buying from and selling to each other over the Internet

Each of these make up the primary information security areas except: a. blocks and screens b. authentication and authorization c. prevention and resistance d. detection and response

blocks and screens

In the consumer-to-consumer ebusiness model A. businesses buy and sell to each other over the Internet B. customers offer goods and services to each other on the Internet C. is any business thaqt sells its products or services directly to consumers online D. applies to any consumer who sells a product or service to a business on the Internet

customers offer goods and services to each other on the Internet

This component of of Web 3.0 describes things in a way that computers can understand

semantic web

Tokens are ___________________? A. devices about the size of a credit card that contain crucial medical information about the owner. B. small electronic devices that change user passwords automatically. C. currency earned when taking surveys at www.hp.com/surveys. D. collections of records based upon the recent websites that have been visited within the previous 15 days

small electronic devices that change user passwords automatically.

Communications occurring at the same time are referred to as (blank)

synchronous communication


Related study sets

Tully's Server Certification Test Amherst

View Set

Statistical Quantitative Analysis

View Set

UNFAIR TRADE, MARKETING & CLAIM SETTLEMENT PRACTICES

View Set

EMT Chapter 3- lifting and moving patients

View Set

MRKT 239 Exam 2 - Practice Quiz Questions

View Set

examples of monosaccharides, disaccharides, and polysaccharides

View Set

The Federal Reserve and Monetary Policy

View Set