Accounting
Anthropology
Archaeology
Art History
Banking
Biology & Life Science
Business
Business Communication
Business Development
Business Ethics
Business Law
Chemistry
Communication
Computer Science
Counseling
Criminal Law
Curriculum & Instruction
Design
Earth Science
Economic
Education
Engineering
Finance
History & Theory
Humanities
Human Resource
International Business
Investments & Securities
Journalism
Law
Management
Marketing
Medicine
Medicine & Health Science
Nursing
Philosophy
Physic
Psychology
Real Estate
Science
Social Science
Sociology
Special Education
Speech
Visual Arts
Mathematic
Q:
Due to the massive amounts of information gathered about customers, what type of software is one of the fastest growing?
A.CRM
B.ARM
C.Adware, Sneakware, and Cookie management
D.Anonymous Web browsing
Q:
Which of the following is a small file that contains information about you and your Web activities?
A.Software logger
B.Cookies
C.Web log
D.Web threads
Q:
How can you block a business' attempt to store information about your Web activities?
A.Avoid the Internet and purchasing products and services on it
B.Block cookies
C.Install and use SpamWare
D.Install and use SpyWare and SpamWare
Q:
What is unsolicited email from businesses that advertise goods and services?
A.Computer viruses
B.Spam
C.Cookies
D.Sneakware
Q:
What is the difference between spam and phishing?
A.Spam is sent via email; phishing is not
B.Phishing is about pornography; spam is not
C.Phishing attempts to get your personal information; spam does not
D.There is virtually no difference between spam and phishing
Q:
What is the banner ads that sit on Web pages called?
A.Adware
B.Spam
C.Phishes
D.Virus
Q:
What type of software is adware?
A.Trojan horse
B.Cookie
C.Sneakware
D.Stealthware
Q:
What is Trojan horse software?
A.A software program that comes bundled with some other program; you can access it with one click
B.Copy protection technology; to use the software your must first click on a copy protection agreement
C.Downloading and installation utilities
D.Hidden software that is placed on your computer because you agreed to something buried in a disclaimer or agreement
Q:
What is malicious software that secretly collects information about you and your computer and then sends it back to some someone?
A.Adware
B.Spyware
C.Trojan horse
D.Worm
Q:
What is one of the best know spyware detection programs?
A.AdAware
B.The Anonymizer
C.Clickstream
D.The Snifter
Q:
Which of the following is the unauthorized use, duplication, distribution, or sale of copyrighted software?
A.Pirated software
B.Spam
C.Phishing
D.Sneakware
Q:
If you were to download a computer game from the Internet and then sell this game to your friends, what would you be doing to the person who developed the game?
A.Spamming them
B.Phishing their software
C.Pirating their software
D.Stealing their profits
Q:
What county experiences the greatest revenue losses from pirated software?
A.China
B.United Kingdom
C.Japan
D.United States
Q:
What is the right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent?
A.Ethics
B.Personal safety laws
C.Identity theft laws
D.Privacy
Q:
What privacy rights should you possess?
A.The right to be left alone
B.The right to have control over your own personal possessions
C.The right not to be observed without your consent
D.You should have all these listed rights
Q:
What program records every keystroke and mouse click executed on a computer?
A.Keyboard recorder
B.Trojan horse
C.Virus
D.Key logger
Q:
What is identity theft?
A.When a person losses that sense of self because of their heightened activities on the Web
B.When a person, or group of people, take on another person's identify and then send email and other online communications under the fraudulent name
C.When one person changes their features and dress to resemble another person
D.When a person, or group of people, forge someone's identity for the purpose of fraud
Q:
What computer feature was requested by the Secret Service of hardware manufacturers to be implemented in modern computer equipment to help the Secret Service fight crime?
A.The printing of serial numbers and date information on all printouts
B.The installation of microchips that analyzes your communications and sends anonymous warnings to the Secret Service
C.Systems software that sends ownership information and your computer's serial numbers to Secrete Service
D.Unique serial numbers for all hardware devices that can be traced back to you
Q:
What happens to a CD when you burn images, videos, and music to it?
A.Information about the software and hardware that you used are stored on the CD
B.Personal and identifying information about you is stored on the CD
C.Cookies that are stored on your computer are also transferred to your CD
D.A distinct signature from the CD drive is left on your CD
Q:
What type of device can be installed on a vehicle that collects information about a person's reckless driving?
A.Event data recorder (EDR)
B.Traffic Safety Monitor (TSM)
C.Mom's Offsite Monitor for Automobiles (MOMA)
D.Parents Against Reckless Driving (PARD)
Q:
If an auto insurance company wanted to determine actions of the driver during an accident, what device could they examine during their investigation?
A.The car's black box
B.The odometer, speedometer, RPMs and other measuring devices
C.The car's online computer systems
D.The EDR
Q:
Which of the following protects expressions of ideas, literary and dramatic works, musical and theatrical compositions, and works of art?
A.Intellectual property
B.Pirating laws
C.Fair Use Doctrine
D.Copyright
Q:
If you received repeated bills for a credit card that you didn't own, what would you probably be a victim of?
A.Phishing
B.Wrongful actions
C.Service fraud
D.Identity theft
Q:
If you were to create a computer game for a homework assignment in programming, what type of law provides you with some protection against people selling your game without your consent?
A.Intellectual property
B.Copyright
C.Fair Use Doctrine
D.Pirating laws
Q:
What is a common Web activity that is geared towards stealing your identity?
A.Phishing
B.Trojan horse
C.Denial of service attack
D.Phishing, Trojan horses, and denial of service attacks are all geared stealing your identity
Q:
Which type of law allows people to use copyrighted material in teaching environments without obtaining the consent of the owner of this material?
A.Copyright
B.Patent
C.Fair Use Doctrine
D.Intellectual property
Q:
What is phishing?
A.An investigative Web service
B.A type of Internet game that allows subscribers to find out information about you and others living in its "virtual city"
C.Information bots that surf the Web for you searching for specific information that you need
D.Email and other online techniques that attempt to gain personal information from you
Q:
Is copyright infringement illegal?
A.Yes
B.Yes, outside of a fair use situation
C.No, not unless the material is patented
D.If the material is not patented and on the Internet it is not illegal, otherwise it is
Q:
What techniques do "phishers" use?
A.Search online database, financial institutions, and archives from MySpace, Facebook, and other social networking websites
B.Social networking services
C.Pretend to be legitimate businesses
D.Artificial intelligence
Q:
Can you make a copy of software that you buy?
A.No
B.You can make one copy
C.Yes
D.Only if the software vendor grants you the right to copy it
Q:
Which of the following is not a phising technique?
A.Installing cookies on your computer
B.Sending fraudulent emails
C.Creating fraudulent Web sites
D.Hijacking and rerouting Web traffic
Q:
_____ is the blueprint for translating a business strategy into a plan.
Q:
Hardware, _____, _____ and information need to be addressed when building an IT infrastructure.
Q:
A _____ infrastructure makes it difficult to compare information between applications.
Q:
If a company is still using a mainframe for business processing, they most likely have a _____ infrastructure.
Q:
A _____ infrastructure involves sharing the information and application of all locations via a network.
Q:
The primary advantage of the _____ infrastructure is it "off-loads" applications and information from the server.
Q:
A(n) _____ is a separate and fully equipped facility where the company can move immediately after the disaster and resume business.
Q:
The purpose of building a(n) _____ is to enable sharing of information and expensive resources.
Q:
_____ is the process of reinstalling the backup information in the event the information was lost.
Q:
Are ethical dilemmas easy to understand?
A.Yes, if you have a strong sense of self
B.Yes, if you are well educated
C.Yes, if you have a strong sense of self and are well educated
D.No, they usually arise from a clash between competing goals, responsibilities, and loyalties
Q:
The disaster recovery cost curve charts (1) the _____ to your organization of the unavailability of information and technology and (2) the _____ to your organization of recovering from a disaster over time.
Q:
Your decisions regarding ethics are influenced by a number of factors. Which is not one of these factors?
A.Magnitude of the outcome
B.Your estimate of the importance of the situation
C.Your age, gender, education, and socio-economic status
D.Your perceptions of conflicting "right reactions"
Q:
A(n) _____ is a network in which one or more computers are servers and provide services to the other computers which are called clients.
Q:
Which of the following protects the intangible creative work that is embodied in physical form?
A.Copyright
B.Intellectual property
C.Fair Use Doctrine
D.Pirating laws
Q:
A(n) _____ is a set of conditions used to measure how well a product or system functions.
Q:
If you were to create a self portrait and you place this portrait on your Web site, what type of law protects your work from anyone downloading and using it?
A.Copyright
B.Patent law
C.Fair Use Doctrine
D.Pirating laws
Q:
_____ measures how quickly an IT system performs a certain process.
Q:
The _____ infrastructure is basically client/server.
Q:
A(n) _____ simply means that a company rents space and telecommunications equipment from another company, or a collocation vendor.
Q:
Whether an employee can look at information and even make changes refers to _____.
Q:
Supporting global customers with 24/7 operation deals with _____ of information.
Q:
A distributed infrastructure involves little or no sharing of information systems.
Q:
The current generation of ERP often includes CRM and SCM.
Q:
A(n) _____ includes the hardware, software, and telecommunications equipment that, when combined, provide the underlying foundation to support the organization's goals.
Q:
The necessity for a common database was the main difference between ERP and MRP systems.
Q:
A(n) _____ specifies a process for recovering information or an IT system following a disaster.
Q:
Backup is the process of reinstalling emergency copies of information.
Q:
A(n) _____ is a separate facility that does not include computer equipment but can be occupied by knowledge workers following a disaster.
Q:
Backing up is not necessary.
Q:
_____ refers to how well your IT system can adapt to increased demands.
Q:
Disaster recovery plans specify how an IT system or information can be recovered in the event of a catastrophe.
Q:
_____ is a process of continuously measuring results and comparing those results to optimal performance so that actual performance may be improved.
Q:
A disaster recovery plan should consider the location of the backup information.
Q:
Hot sites and cold sites should be located as close to the main facility as possible for convenience and cost.
Q:
The IT architecture is the blueprint for translating a business strategy into a plan.
Q:
The IT architecture is the implementation of the IT infrastructure.
Q:
The IT infrastructure deals with details of hardware and software requirements.
Q:
Since the IT infrastructure rarely changes it only needs to be reviewed about every 5 years.
Q:
A 3-tier infrastructure is the most common approach for Web applications.
Q:
An n-tier infrastructure starts with the 2-tier basic model adding applications as needed.
Q:
In a tiered infrastructure each layer duplicates another layer for backup and recovery.
Q:
Benchmarking is used to improve an IT system performance.
Q:
Can you test a disaster recovery solution before it is implemented?
A.No, you can never test a solution before it is executed
B.You can test the pierce that belongs to the information systems solution
C.You can test the information systems solution and drills established for employees
D.Yes, you should test the solution and evaluate the IT system
Q:
The early stages of ERP goes back to the 1970s with Mainframe Requirements Planning.
Q:
How often should you test your disaster recovery plan?
A.Annually
B.At least once a year; several times a year would be better
C.Each time the plan is adjusted you should test it
D.The organization should rotate between pieces of the plan on a semi-annual basis with a full-blown test occurring every other year
Q:
What is the last phase of the business continuity planning process?A.ImplementationB.MaintenanceC.Monitor and surveillanceD.Implementation and testing
Q:
An IT infrastructure includes the hardware, software, and telecommunications equipment that, when combined, provide the underlying foundation to support the organization's goals.
Q:
IT infrastructure is an easy term to define because it means the same thing to all organizations.
Q:
The disaster recovery cost curve charts (1) the cost to your organization of the unavailability of information and technology and (2) the cost to your organization of recovering from a disaster over time.