Accounting
Anthropology
Archaeology
Art History
Banking
Biology & Life Science
Business
Business Communication
Business Development
Business Ethics
Business Law
Chemistry
Communication
Computer Science
Counseling
Criminal Law
Curriculum & Instruction
Design
Earth Science
Economic
Education
Engineering
Finance
History & Theory
Humanities
Human Resource
International Business
Investments & Securities
Journalism
Law
Management
Marketing
Medicine
Medicine & Health Science
Nursing
Philosophy
Physic
Psychology
Real Estate
Science
Social Science
Sociology
Special Education
Speech
Visual Arts
Business Development
Q:
Piracy was most severe in this country where the illegal software market was worth nearly $9 billion in 2011:
A. China.
B. India.
C. South Africa.
D. Japan.
Q:
Loss of annual sales due to software piracy by software companies was estimated to be:
A. $120.3 million.
B. $25.8 billion.
C. $63.5 billion.
D. Impossible to calculate.
Q:
Intellectual property refers to:A. Protecting ones ideas, concepts, and symbolic creations.B. Special laws protecting copyrights, patents, and trademarksC. Prohibiting the downloading of commercial software or videogames.D. All of the above.
Q:
Over time the role of the CIO:
A. Has remained the same.
B. Has decreased in level of responsibility.
C. Has changed dramatically, superseding the role of the chief executive officer.
D. Has changed dramatically, becoming more integrated into the overall strategic direction of the firm.
Q:
In a study of CIOs from around the world, McKinsey & Company found that most CIOs reported to their:
A. Chief executive officer.
B. Chief financial officer.
C. Chief operating officer.
D. Managing supervisor.
Q:
A CIO is the companys:
A. Chief intelligence oracle.
B. Chief information officer.
C. Coordinator of international operations.
D. Controller of internal overhead.
Q:
The number of Americans who actively use mobile-banking services in 2009 and thus were increasingly vulnerable to hacking was:
A. 12 million.
B. 25 million.
C. 71 million.
D. Impossible to count.
Q:
The Perfect Citizen program, monitored by the National Security Agency, is designed to protect against cyber assaults focused on ?
A. Websites for children.
B. University and hospital records.
C. Electricity grids and nuclear power plants.
D. Personal home computers of U.S. citizens.
Q:
The Childrens Online Privacy Protection Act of 1998 requires:
A. Commercial Web sites to collect a verifiable form of consent from the parent or guardian of any user below the age of 13.
B. Web site operators to post user privacy laws.
C. Web site operators to adhere to federal restrictions, even if the Web site is operated from outside the United States.
D. All of the above.
Q:
This international gathering brought together leaders from the United States and 27 European countries to address the global nature of cyberattacks:
A. Cyberattack Awareness Day.
B. Anti-cyber International.
C. International Defense Against Web Attacks.
D. Data Privacy Day.
Q:
These individuals hack into government or corporate computer networks and then release information to try to embarrass those organizations or gain leverage against these organizations:
A. Zombies.
B. Comodohackers.
C. Hacktivists.
D. Cyberattackers.
Q:
In 2005, this school announced that it would admit some of the 17 business applicants who had hacked into its computerized database:
A. Harvard.
B. Dartmouth.
C. Princeton.
D. Notre Dame.
Q:
The corporate nemesis responsible for creating and spreading computer attacks is called a:
A. Google.
B. Zombie.
C. Computer hacker.
D. Platform.
Q:
A hijacked computer that can be remote-controlled by the attacker to respond to the attackers commands is called a:
A. Hacker.
B. Zombie.
C. Worm.
D. Ghost.
Q:
This term describes sensors and actuators that are embedded in physical objects from roadways to pacemakers and are linked through wired and wireless networks.
A. Internet of Things.
B. Information Super Highway
.
C. Mapping Network.
D. Smartgrid.
Q:
In a survey of 583 U.S. companies, how many were breached at least once by hackers over the past year?
A. 15 percent.
B. 40 percent.
C. 68 percent.
D. 90 percent.
Q:
Most genetically modified corn grown in the United States is made into animal feed or ethanol.
Q:
Cloning of humans was beyond the focus of the United Nations 2005 declaration on cloning.
Q:
The human genome is the application of engineering to create materials on a molecular or atomic scale.
Q:
Streaming is illegal and in violation of The Digital Millennium Copyright Act of 1998.
Q:
Software piracy is a spreading and global problem.
Q:
The responsibility of managing technology with its many privacy and security issues for business organizations is entrusted to the CEO.
Q:
Honeypots are systems used by security professionals to lure hackers to a fabricated Web site where the hackers every move can be tracked.
Q:
The U.S. government launched a program to detect cyber assaults on private U.S. companies called Hold-off the Hacktivists.
Q:
A Trojan Horse is a hijacked computer that can be remote-controlled by the attacker to respond to the attackers commands.
Q:
Cell phone technology has sometimes aided law enforcement in capturing criminals who were caught breaking into an automobile or store.
Q:
Many experts have raised ethical questions about the ways RFID technology enables businesses, governments, and criminals to gather information about presale, sales, and post-sale activities.
Q:
Human error by employees is a major factor of security breaches in the healthcare industry.
Q:
Recent technological advances have decreased the number of way that privacy violations may occur.
Q:
Most Americans mistakenly believe that if a website has a privacy policy that those sites are not collecting or selling their personal information and online activities to others.
Q:
Thanks to advancement in technology the number of instances of identity theft has been decreasing since 2006.
Q:
M-Commerce is facilitated primarily by:A. Lap-tops.B. Personal computers.C. Mobile or cell phones.D. The government.
Q:
40, According to an investigation published in the Archives of Internal Medicine, since the digitalization of medical records: A. The rate of malpractice claims has increased dramatically. B. The rate of malpractice claims has decreased dramatically. C. The rate of malpractice claims has remained unchanged. D. It is too early to know.
Q:
Discuss the issue of digital divide. Is it lessening or widening with more technological innovation? How have businesses, government bodies, and nonprofit organizations met the digital divide challenge?
Q:
Since surfing the Internet for medical information is widespread, how can the quality of information provided online be verified as accurate or reliable?
Q:
What is social networking? What are the ethical challenges faced by some of the more popular social networking sites?
Q:
Should all businesses venture into e-commerce, or is it better for only certain types of businesses?
Q:
Discuss what factors have fueled technological growth and development?
Q:
Describe the activities and primary skills used in each of the six periods of technology development.
Q:
Define technology and describe its three primary features.
Q:
The unmistakable economic and social force of technology is evident in
A. Every part of the world.
B. Every industry.
C. Every aspect of our lives.
D. All of the above.
Q:
According to the text, despite the world becoming more hyper-connected, this region still suffers from an important lag in adopting information and communication technology.
A. Eastern Europe.
B. Asia.
C. Latin America.
D. West Africa.
Q:
This program intends to bring lower-income Americans online by making broadband Internet access affordable for households with at least one child and an annual income below $29,000.
A. Computers without Borders.
B. One Laptop per Child.
C. Connect to Compete.
D. Broadband for All.
Q:
A 2012 study found that Internet access in African-American homes was how much less than Caucasian homes?
A. 10 percent.
B. 25 percent.
C. 42 percent.
D. 60 percent.
Q:
The digital divide describes the gap between those:
A. Individuals who have technology and those who do not.
B. Businesses who use e-business and those who do not.
C. Hospitals who use online information and those who do not.
D. Individuals who have broadband technology and those who do not.
Q:
In 2009 the U.S. government announced plans to spend how much to spur the use of digital or electronic patient records, as part of a national effort to reduce medical costs? A. 19 million. B. 19 billion. C. 119 billion. D. 1 trillion.
Q:
A group of people who leap to the most dreadful conclusions while researching health matters online are called:
A. Hypochondriac.
B. Cyberchondriacs.
C. Hyperchondriac.
D. Internetchondriac.
Q:
All of the below are options for companies when government censorship occurs except:
A. Accept all demands and comply with all governments request.
B. Negotiate with government officials as to what is and is not permissible to be on the site.
C. Offer monetary compensation to government officials to allow certain web content.
D. Withdraw all service provided in countries in protest of the government censorship activities.
Q:
Government efforts at controlling the Internet are found in which country?
A. China.
B. Saudi Arabia.
C. Pakistan.
D. All of the above.
Q:
In 2012, the Anti-Phishing Working Group (APWG) reported that how many of the worlds computers were infected with some type of malware?
A. 15 percent.
B. 39 percent.
C. 57 percent.
D. 80 percent.
Q:
The practice of using fake business emails in order to trick users into divulging personal data, such as usernames and passwords, is called:
A. Phishing.
B. Pharming.
C. Tweeting.
D. Censorship.
Q:
Anti-spam legislation was passed by which country making it a crime to send unsolicited e-mail messages to peoples private e-mail addresses or cell phones:
A. United States.
B. Japan.
C. United Kingdom.
D. Germany.
Q:
Another name for unsolicited commercial emails is:
A. Spam.
B. Junk e-mail.
C. UCE.
D. All of the above.
Q:
The difference between a blog and a vlog is:
A. Vlogs are always paid for by companies; blogs are subsidized by the government.
B. Vlogs are video web logs while blogs are web-based journals.
C. Blogs have no ethical dilemma attached to them while vlogs have a blurred ethical line.
D. People who vlog are required to disclose to the Federal Trade Commission any connection with the companies they vlog about, but bloggers are not.
Q:
In 2011, 1.2 billion people worldwide used social networking sites:
A. Once per hour.
B. Once per day.
C. Once per week.
D. Once per month.
Q:
A pain or numbness in your thumbs caused by constant e-mailing, messaging, or Internet surfing on hand-held devices is called:
A. BlackBerry thumb.
B. Cell phone thumb.
C. PDA thumb.
D. None of the above.
Q:
The buying and selling of goods and services electronically is called:A. M-commerce.B. E-business.C. Telecommunications.D. Software piracy.
Q:
Which of the following countries is not one of the top 15 Internet users?
A. Singapore.
B. United Kingdom.
C. China.
D. United States.
Q:
A technological application that uses biological systems or living organisms to make or modify products or processes for specific use is called:
A. Biosphere outcome.
B. Metatechnology.
C. Biology.
D. Biotechnology.
Q:
We are currently in which phase in the development of technology?
A. Industrial.
B. Service.
C. Information.
D. Semantic.
Q:
The place where information is stored, ideas are described, and communication takes place in and through an electronic network of linked systems is called:
A. The personal computer.
B. Cyberspace.
C. Cloud computing.
D. Communication.
Q:
The information phase of technology primarily requires:
A. Providing services.
B. Intellectual and electronic skills.
C. Manual and machine skills.
D. The same skills as needed in previous phases.
Q:
Which of the following is not true about the service phase of technology?
A. It was the fourth phase in the development of technology.
B. It emphasized providing services.
C. It required manual and intellectual skills.
D. It dominated from 1900 to 1960.
Q:
The phase of technology that focuses on building material goods and manual labor is:
A. Agrarian.
B. Service.
C. Industrial.
D. Information.
Q:
In the nomadic-agrarian phase of technology in society, people:
A. Hunted wild animals for meat.
B. Gathered wild plants for food.
C. Provided services.
D. Both A and B, but not C.
Q:
The self-reinforcing feature of technology means that:
A. Civilization develops at an uncontrollable pace.
B. Developing economies demand newer and larger innovations.
C. Technology acts as a multiplier to encourage is own faster development.
D. An invention in one place is localized only.
Q:
The use of publicly accessed servers to store users text photos, videos and other data at remote sites, rather than on their own computers is called:
A. Business-to-business commerce.
B. Technology ripples.
C. Future shock.
D. Cloud computing.
Q:
This term refers to the practical applications of science and knowledge to commercial and organizational activities.
A. Technology.
B. E-commerce.
C. Agarian.
D. Semantic.
Q:
Booz & Company found a countrys level of digitization is negatively correlated to its GDP.
Q:
High-technology businesses, governments, and community groups acting together appear to be winning the battle of making technology more accessible to all people regardless of their race, income, education, age, or residence.
Q:
In the United States the government has tried to help narrow the digital divide by subsidizing Internet upgrades for schools and providing free cell phones to citizens in need.
Q:
The gap between those who have access to technology and those who do not is called the digital divide.
Q:
QR codes were developed by businesses in order to reach out to the increased numbers of smartphone customers.
Q:
Businesses generally discovered that the adoption of technology was a money-saver rather than an expense in the short run.
Q:
During the past few years, e-business revenue has increased at a faster pace than that of traditional, or non-electronic, business.
Q:
Electronic business exchanges between businesses and businesses and between businesses and their customers emerged during the service phase of technological development.
Q:
The United States has the most Internet users than any other country.
Q:
According to Bill Joy, Sun Microsystems chief scientist, by 2030, we are likely to build machines a million times as powerful as the personal computer of today.
Q:
The current phase of technology is the service society.
Q:
Nations have tended to move sequentially through each phase of technology, beginning with the lowest technology and moving higher with each step.