Accounting
Anthropology
Archaeology
Art History
Banking
Biology & Life Science
Business
Business Communication
Business Development
Business Ethics
Business Law
Chemistry
Communication
Computer Science
Counseling
Criminal Law
Curriculum & Instruction
Design
Earth Science
Economic
Education
Engineering
Finance
History & Theory
Humanities
Human Resource
International Business
Investments & Securities
Journalism
Law
Management
Marketing
Medicine
Medicine & Health Science
Nursing
Philosophy
Physic
Psychology
Real Estate
Science
Social Science
Sociology
Special Education
Speech
Visual Arts
Management
Q:
Which of the following represents the biggest problem of information security breaches?
A. people misusing organizational information
B. technology failures
C. customers misusing organizational systems
D. company departments missing sales goals
Q:
Privacy is the legal protection afforded an expression of an idea, such as a song, book, or video game.
Q:
What are the first two lines of defense a company should take when addressing security risks?
A. technology first, customers second
B. technology first, people second
C. innovation first, technology second
D. people first, technology second
Q:
Ethics and security are two fundamental building blocks for all organizations.
Q:
Which of the following are all common forms of viruses?
A. packet tampering, worms, cakes, and trojan viruses
B. polymorphic, sniffer, splogs, and denial-of-service viruses
C. backdoor program, worm, Trojan-horse viruses
D. All of these are correct.
Q:
What is a process by which a user misleads a system into granting unauthorized rights, usually for the purpose of compromising or destroying the system?
A. elevation of privilege
B. packet tampering
C. spoofing
D. spyware
Q:
What is simplelocker?
A. a form of malicious software that infects your computer and asks for money
B. a new ransomware program that encrypts your personal files and demands payment for the files' decryption keys
C. software that allows Internet advertisers to display advertisements without the consent of the computer user
D. a special class of adware that collects data about the user and transmits it over the Internet without the users knowledge or permission
Q:
What is a new ransomware program that encrypts your personal files and demands payment for the files decryption keys?
A. sniffer
B. spyware
C. spoofware
D. simplelocker
Q:
What is the forging of the return address on an email so that the email message appears to come from someone other than the actual sender?
A. malicious code
B. hoaxes
C. spoofing
D. sniffer
Q:
Which of the choices below defines information security?
A. a broad term encompassing the protection of information
B. protects information from accidental misuse
C. protects information from intentional misuse
D. All of these are correct.
Q:
What includes a variety of threats such as viruses, worms, and Trojan horses?
A. malicious code
B. hoaxes
C. spoofing
D. sniffer
Q:
Which of the following changes its form as it propagates?
A. backdoor programs
B. strikers
C. polymorphic viruses and worms
D. splogs
Q:
What is one of the most common forms of computer vulnerabilities that can cause massive computer damage?
A. virus
B. white-hat hackers
C. dumpster diving
D. All of these are correct.
Q:
Which of the following types of viruses spread themselves, not just from file to file, but also from computer to computer?
A. polymorphic virus
B. worm
C. Trojan-horse virus
D. backdoor programs
Q:
Compare disruptive and sustaining technologies, and explain how the Internet and WWW caused business disruption.
Q:
Social media maps group contacts (personal and professional) identifying who knows each other and who works together. In a company it can provide a vision of how employees work together.
Q:
How would you categorize mobile entertainment, mobile sales, mobile ticketing, and mobile banking?
A. mobile business
B. mbusiness
C. mcommerce
D. All of these are correct.
Q:
Social networking is the practice of expanding your business and/or social contacts by constructing a personal network.
Q:
What is the ability to purchase goods and services through a wireless Internet-enabled device?
A. ecommerce
B. mobile business
C. meconomics
D. ebusiness model
Q:
A social network is an application that connects people by matching profile information. Providing individuals with the ability to network is by far one of the greatest advantages of Business 2.0.
Q:
Which of the following is the example of consumer-to-government (C2G) highlighted in the figure extended ebusiness models?
A. eGov.com
B. conisint.com
C. Google.org
D. export.gov
Q:
Social tagging is similar to taxonomy except that crowdsourcing determines the tags or keyword-based classification system.
Q:
Which of the following is the website that was the primary catalyst for growing electronic government and is the official U.S. gateway to all government information?
A. Government.gov
B. TheUnitedStatesofAmerica.org
C. TheWhiteHouse.com
D. FirstGov.gov
Q:
Social media refers to websites that rely on user participation and user-contributed content, such as Facebook, YouTube, and Digg.
Q:
Many industries have taken an active role in online business, including the government. Which of the following is the term that describes the use of strategies and technologies to transform government by improving the delivery of services and enhancing the quality of interaction between the citizen-consumer within all the branches of government.
A. ecommerce
B. information richness
C. egovernment
D. tacit knowledge
Q:
Explicit knowledge is the knowledge contained in peoples heads. The challenge inherent in explicit knowledge is figuring out how to recognize, generate, share, and manage knowledge that resides in peoples heads.
Q:
Which of the following statements describes Web 3.0s feature that ensures the "integration of legacy devices"?
A. the ability to use current devices such as iPhone and laptops as credit cards or tickets
B. the design of websites and other software so they can be easily integrated and work together
C. the ability for software to be distributed and accessed from anywhere
D. the design of software to be easily integrated and work together
Q:
Tacit knowledge consists of anything that can be documented, archived, and codified, often with the help of MIS. Examples of tacit knowledge are assets such as patents, trademarks, business plans, marketing research, and customer lists.
Q:
Which of the following is not a topic or feature that is included in Web 3.0?
A. a worldwide database
B. intelligent applications
C. social networking
D. integration of legacy devices
Q:
A knowledge management system (KMS) supports the capturing, organization, and dissemination of knowledge (i.e., know-how) throughout an organization. KMS can distribute an organizations knowledge base by interconnecting people and digitally gathering their expertise.
Q:
Which of the following statements is incorrect?
A. The semantic web captures, organizes, and disseminates knowledge (i.e., know-how) throughout an organization.
B. The semantic web describes the relationships between things.
C. The semantic web describes the properties of things.
D. The semantic web is not about links between web pages.
Q:
The primary objective of knowledge management is to be sure that a companys knowledge of facts, sources of information, and solutions are readily available to all employees whenever it is needed.
Q:
What is a component of Web 3.0 that describes things in a way that computers can understand?
A. social tagging
B. sustaining web
C. social web
D. semantic web
Q:
Crowdfunding sources capital for a project by raising many small amounts from a large number of individuals, typically via the Internet.
Q:
Which of the following statements is inaccurate?
A. Web 2.0 is a simple static website without any interaction with its users.
B. Web 2.0 brings people closer together with information using machines.
C. Web 3.0 brings machines closer together using information.
D. Web 3.0 is a rich "intelligent" understanding and relationships among concept and topics.
Q:
The most common form of collective intelligence found outside the organization is crowdsourcing, or the wisdom of the crowd.
Q:
Which of the following best describes Web 3.0?
A. user-generated online business
B. based on the "intelligent" web where applications use natural language processing
C. collaboration and social media
D. All of these are correct.
Q:
Knowledge can be a real competitive advantage for an organization. The most common form of collective intelligence found inside the organization is knowledge management (KM), which involves capturing, classifying, evaluating, retrieving, and sharing information assets in a way that provides context for effective decisions and actions.
Q:
Which of the following best describes Web 2.0?
A. static websites
B. intelligent websites
C. social media and user-generated web content
D. hypertext markup language
Q:
Closed source is an online marketing concept in which the advertiser attempts to gain attention by providing content in the context of the users experience in terms of its content, format, style, or placement.
Q:
Which of the following best describes Web 1.0?
A. static text-based information websites
B. static electricity and connectivity
C. social media
D. technology intelligence
Q:
Native advertising sources capital for a project by raising many small amounts from a large number of individuals, typically via the Internet.
Q:
One of the most famous examples of wiki vandalism occurred when a false biography entry read that ________.
A. Michael Jackson and Madonna were siblings
B. JFK and Robert Kennedy were the same person
C. John Seigenthaler Sr., assistant to Attorney General Robert F. Kennedy in the early 1960s, was involved in the assassinations of both Kennedy and his brother, JFK
D. Madonna and Britney Spears are sisters
Q:
Which of the following demonstrates potential issues with Business 2.0 and information vandalism? A. open source allows anyone to be able to edit, damage, or destroy content C. decreases in employee productivity D. decreases in process productivity
Q:
Native advertising is an online marketing concept in which the advertiser attempts to gain attention by providing content in the context of the users experience in terms of its content, format, style, or placement.
Q:
What is a potential problem or impact of technology dependence?
A. outages hold potentially great havoc for people, business, and educational institutions that rely heavily on technology
B. many have a need to be continuously connected for every activity that potentially eliminates crucial in-person social skills and could stunt psychological growth
C. people or businesses cannot function if the connection is down
D. All of these are correct.
Q:
Which of the following are challenges of Business 2.0? A. information vandalism B. technology dependence C. violations of copyright and plagiarism D. All of these are correct.
Q:
Open systems tap into the core knowledge of all employees, partners, and customers.
Q:
What is an ezine?
A. a self-photograph placed on a social media website
B. the practice of sending brief posts to a personal blog
C. a web format used to publish frequently updated works
D. a magazine published only in electronic form on a computer network
Q:
User-contributed content is a set of tools that supports the work of teams or groups by facilitating the sharing and flow of information.
Q:
What is a magazine published only in electronic form on a computer network?
A. selfie
B. selfzine
C. wiki
D. ezine
Q:
User-contributed content (or user-generated content) is created and updated by many users for many users.
Q:
What is the role of a mashup editor?
A. WYSIWYGs
B. often allows the user to drag and drop data points into a web application
C. to provide a visual interface to build up a mashup
D. All of these are correct.
Q:
Open source refers to any software whose source code is made available free (not on a fee or licensing basis as in ebusiness) for any third party to review and modify.
Q:
What does API stand for?
A. Asynchronous Programming Information
B. Application Programming Interface
C. Application Provider for the Internet
D. Asynchronous Protocol Interaction
Q:
An open system contains instructions written by a programmer specifying the actions to be performed by computer software.
Q:
An API is a set of routines, protocols, and tools for ________.
A. building software applications
B. providing a visual interface for a web mashup
C. describing how products in a network work
D. writing and editing HTML
Q:
An open system consists of nonproprietary hardware and software based on publicly known standards that allows third parties to create add-on products to plug into or interoperate with the system.
Q:
What is a website or web application that uses content from more than one source to create a completely new product or service?
A. social tagging
B. mashup blog
C. social media
D. mashup
Q:
Web 2.0 is the next generation of Internet that uses a more mature, distinctive communications platform characterized by new qualities such as collaboration, sharing, and free.
Q:
Some of the benefits for a company to operate an internal wiki are that they are great tools for all of the following except ________.
A. collecting and disseminating knowledge
B. building software applications
C. sharing information between functional business areas
D. distributing to employees or partners across geographical distances
Q:
Source code is software made available free for any third party to review and modify.
Q:
Which of the following is one of the largest wikis on the web and one of the ten most popular web destinations?
A. Google
B. eBay
C. Wikipedia
D. Yahoo
Q:
The Internet marketplace is free of most forms of traditional sales tax.
Q:
What describes how products in a network increase in value to users as the number of users increase?
A. network effect
B. RSS
C. mashup editor
D. mcommerce
Q:
The Internet uses such strong security technologies that ensuring consumer protection is not a challenge for ebusinesses.
Q:
What is Real Simple Syndication?
A. a self-photograph placed on a social media website
B. the practice of sending brief posts to a personal blog
C. a web format used to publish frequently updated works
D. a magazine published only in electronic form on a computer network
Q:
Managing consumer trust is not a challenge for ebusinesses participants as the Internet has numerous security technologies in place to completely protect consumers and their online transactions.
Q:
What is microblogging?
A. a self-photograph placed on a social media website
B. the practice of sending brief posts to a personal blog
C. a web format used to publish frequently updated works
D. a magazine published only in electronic form on a computer network
Q:
A videoconference allows people at two or more locations to interact via two-way video and audio transmissions simultaneously as well as share documents, data, computer displays, and whiteboards. Point-to-point videoconferences connect two people, and multipoint conferences connect more than two people at multiple locations.
Q:
What is content from more than one source to create a new product or service?
A. selfie
B. blog
C. wiki
D. mashup
Q:
Instant messaging converts an audio broadcast to a digital music player.
Q:
What is a collaborative website that allows users to add, remove, and change content?
A. selfie
B. blog
C. wiki
D. mashup
Q:
Instant messaging (IMing) is a service that enables instant or real-time communication between people.
Q:
Large wikis, such as Wikipedia, can protect the quality and accuracy of their information by assigning users roles such as ________.
A. reader
B. subject matter expert
C. editor
D. All of these are correct.
Q:
Real-time communication occurs when a system updates information at the same rate it receives it.
Q:
Many websites use ________ to constantly feed news to consumers instead of having the consumer search for the news.
A. mashup
B. source code
C. RSS
D. SNA
Q:
Many businesses are using instant messaging as a way to answer and resolve questions or problems quickly.
Q:
What does RSS stand for?
A. Reorganized Site Syndicator
B. Really Simple Sites
C. Rented Site Syndication
D. Real Simple Syndication
Q:
A webinar is a form of web conferencing, which blends videoconferencing with document sharing and allows the user to deliver a presentation over the Web to a group of geographically dispersed participants.