Final test – Flashcards
Unlock all answers in this set
Unlock answersquestion
            A charge card, such as American Express, carries no preset spending limit, and each month the user can pay all or part of the amount owed.
answer
        false
question
            The length of the sales process for typical B2B sale is much faster than for the typical C2C sale.
answer
        false
question
            A key sector of wholesale e-commerce is spending on MRO goods and services
answer
        true
question
            Mobile coupon aggregators provide several promotions from a single retailer to lots of mobile phone users
answer
        False
question
            Although conversion to an e-commerce or m-commerce system enables organizations to reduce the cost of business, it seldom results in increased accuracy of order processing and order fulfillment
answer
        False
question
            The handheld devices used for m-commerce have few, if any, limitations that complicate their use
answer
        False
question
            Digital certificates verify both purchaser and supplier identities in an e-commerce transaction
answer
        True
question
            Amazon had the most 2008 Web sales by dollar volume of all U.S. companies.
answer
        True
question
            Many manufacturers and retailers have outsourced the physical logistics of delivering merchandise to cybershoppers
answer
        true
question
            The three basic components of a successful e-commerce model include content, commerce, and commodity
answer
        False
question
            It is estimated that the number of mobile devices accessing the Internet will exceed 1 billion by 2013.
answer
        True
question
            An electronic exchange enables a firm's suppliers and competitors to interact.
answer
        true
question
            Application developers as well as mobile Web sites and mobile operators are considered mobile ad publishers.
answer
        true
question
            Blind networks and premium blind networks are two forms of mobile advertising networks.
answer
        false
question
            The brokerage business adapted to the Internet faster than any other arm of finance
answer
        true
question
            It is estimated that e-commerce contributes about ______ percent to the total U.S. gross domestic product. (Circle the correct answer.) a. 0.2% b. 1.2% c. 2.1% d. 3.2%
answer
        c. 2.1%
question
            The elimination of intermediate organizations between the producer and the consumer is called ______. (Circle the correct answer.) a. disintermediation b. social networking c. market segmentation d. none of the above
answer
        a. disintermediation
question
            ______ is a subset of e-commerce that involves electronic transactions between consumers and a third party to facilitate the process. (Circle the correct answer.) a. B2B b. B2C c. C2C d. G2C
answer
        c. C2C
question
            U.S. m-commerce sales for 2010 are expected to be in the neighborhood of ______. (Circle the correct answer.) a. $1.2 billion b. $2.4 billion c. $3.6 billion d. $4.8 billion
answer
        b. $2.4 billion
question
            A(n) ______ is a single Web site that offers many products and services at one Internet location. (Circle the correct answer.) a. Web portal b. cybermall c. e-boutique d. none of the above
answer
        b. cybermall
question
            Mobile coupons ______. (Circle the correct answer.) a. have a much higher redemption rate than paper coupons b. can be sent to mobile shoppers by numerous mobile coupon aggregators c. can be redeemed by scanning the barcode displayed on a Web-enabled cell phone d. all of the above
answer
        d. all of the above
question
            Conversion to an e-commerce or m-commerce system enables an organization to ______. (Circle the correct answer.) a. more easily implement ERP systems b. increase the accuracy of order processing and order fulfillment c. increase the prices of its goods and services d. all of the above
answer
        b. increase the accuracy of order processing and order fulfillment
question
            Poor Web site performance frequently leads to ______. (Circle the correct answer.) a. inadequate customer service b. lost orders c. abandonment of e-commerce Web sites d. all of the above
answer
        c. abandonment of e-commerce Web sites
question
            Authentication technologies are used by many organizations to ______. (Circle the correct answer.) a. verify the accuracy of their product descriptions and prices b. verify the ship to address of their online customers c. confirm the URL of their suppliers' Web sites d. confirm the identity of the user requesting access to information or assets
answer
        d. confirm the identity of the user requesting access to information or assets
question
            Amazon ______. (Circle the correct answer.) a. was immediately profitable since the year it was founded b. never has become fully profitable c. was not profitable until more than seven years after its start-up d. none of the above
answer
        c. was not profitable until more than seven years after its start-up
question
            The number of U.S. mobile Web sites over the next few years is expected to ______. (Circle the correct answer.) a. stay about the same b. grow slightly c. shrink slightly d. grow rapidly
answer
        d. grow rapidly
question
            ______ refers to the use of any of several technologies to enforce policies for controlling access to digital media. (Circle the correct answer.) a. Copyright protection b. Patent Protection c. Digital rights management d. Intellectual property protection
answer
        c. Digital rights management
question
            Based on the Supreme Court ruling in Quill Corp vs. North Dakota, Internet-based merchants need to apply sales tax only when ______. (Circle the correct answer.) a. the sale price exceeds $100.00 b. items are purchased through a C2C Web site c. buyers purchase certain enumerated items d. buyers live in a state where the merchant has physical facilities
answer
        d. buyers live in a state where the merchant has physical facilities
question
            A(n) ______ is a business that serves as an intermediary between your Web site and online merchants who have the actual products and retail expertise. (Circle the correct answer.) a. cybermall b. storefront broker c. electronic exchange d. none of the above
answer
        b. storefront broker
question
            The Wireless Application Protocol ______. (Circle the correct answer.) a. provides secure, encrypted, wireless communications b. serves as a Web browser on handheld, wireless devices c. is an alternative to PCI d. none of the above
answer
        b. serves as a Web browser on handheld, wireless devices
question
            ________________________ is the conducting of business activities electronically over computer networks.
answer
        E-Commerce
question
            ____________________________________________ (acronym OK!) is a subset of e-commerce where all the participants are organizations.
answer
        B2B
question
            ICANN created a __________________ domain to help attract mobile users to the Web
answer
        mobi
question
            Mobile ad impressions are generally bought at a cost per thousand, cost per click, or cost per ____________________.
answer
        action
question
            The amount of storage capacity and computing power required of the e-commerce Web server depends on two things: the software that must run on the server and the _______________________ of transactions that must be processed
answer
        Volume
question
            ________________________ certificates are used to ensure that e-commerce transactions are made between the intended parties.
answer
        Digital
question
            Both purchaser and supplier identities are guaranteed by a third party organization called a(n)
answer
        CA
question
            With the Secure Sockets Layer (SSL) communication protocol, the data is always ________________________ ensuring that your transactions are not subject to interception.
answer
        encrypted
question
            All credit card customers are protected from paying more than ____________________  ____________________ for fraudulent transactions
answer
        $50
question
            When paying by cell phone, the payments can be linked to your bank account or added to your ____________________ ____________________.
answer
        Credit Card
question
            The five stages of B2B and B2C e-commerce include: 1) search and identify, 2) select and negotiate, 3) purchase, 4) ________________________ _____________________ ________________________ ________________________, and 5) after-sales service.
answer
        Product and Service Delivery
question
            ________________________ ______________________ occurs when someone uses your personal identifying information to commit fraud or other crimes
answer
        Identity Theft
question
            MRO purchases can often approach ________________________ percent of a manufacturing company's total revenue.
answer
        40
question
            The main measures of mobile advertising are the number of users reached, the click through rate, and the number of ________________________ users take.
answer
        actions
question
            Through m-commerce, companies can reach individual consumers to establish  ____________________________________ marketing relationships and communicate whenever it is convenient
answer
        One to One
question
            Transaction processing systems support the capture and processing of detailed data necessary to update the fundamental business operations of the organization.
answer
        True
question
            With an OLTP system, each transaction is accumulated over a period of time and prepared for processing in a large batch of similar transactions.
answer
        True
question
            For an organization implementing an ERP system, there is a major amount of effort required to load existing data from various sources into the new ERP database
answer
        True
question
            Data mapping is the examination of each data item required for a new ERP system and determining the number of bytes required for data storage.
answer
        False
question
            Financial accounting consists of capturing and recording all the transactions that affect a company's financial state and then using these documented transactions to prepare financial statements to external decision makers.
answer
        True
question
            Customer relationship management software helps plan, execute, and control all the activities involved in raw material sourcing and procurement, conversion of raw materials to finished products, and the warehousing and delivery of finished product to customers
answer
        False
question
            Fortunately, disparities in IS infrastructure is not one of the international issues associated with the use of enterprise systems.
answer
        False
question
            TPS often perform activities related to customer contacts and thus play a critical role in providing value to the customer.
answer
        True
question
            An important step in processing transaction data is to check data for validity and completeness, a task called data correction.
answer
        False
question
            Two key benefits gained from successful implementation of an ERP system include gaining improved access to data for operational decision making and improved work processes.
answer
        True
question
            The individual application modules of an ERP system are designed to support best practices, the most efficient ways to complete a business process.
answer
        True
question
            SMEs are too small to achieve substantial business benefits from the implementation of an ERP system.
answer
        False
question
            The "bill of materials" (BOM) is a sort of roadmap that shows each step in the manufacturing process.
answer
        False
question
            Sales ordering is the set of activities associated with all purchasing needed to support the sales functions including promotions, advertising, and marketing
answer
        False
question
            Customer support, sales management, and contact management are key features of a supply chain management system
answer
        False
question
            With ______, business transactions are accumulated over a period of time for processing in a single unit. (Circle the correct answer.) a. online transaction processing b. real-time transaction processing c. batch processing d. enterprise resource processing
answer
        c. batch processing
question
            The process used by leading companies to complete a business process in the most efficient and effective manner are called ______. (Circle the correct answer.) a. best practices b. streamlined processes c. current best approach d. none of the above
answer
        a. best practices
question
            In an order processing system, a(n) ______ is printed at the warehouse from which the order is to filled so that workers can correctly fill the order. (Circle the correct answer.) a. pick list b. customer order c. invoice d. receiving report
answer
        a. pick list
question
            A key feature on an enterprise resource planning system is that ______. (Circle the correct answer.) a. all transactions are processed in online transaction processing mode b. it employs a database of key operational and planning information that can be shared by all c. it is fully integrated with all of the organization's e-commerce systems d. all of the above
answer
        b. it employs a database of key operational and planning information that can be shared by all
question
            The number and types of data items that must be loaded into a new ERP system depend on the ______ of the ERP implementation. (Circle the correct answer. a. scope b. schedule c. cost d. none of the above
answer
        a. scope
question
            Many SMEs elect to implement ______ ERP systems. (Circle the correct answer.) a. proprietary b. in-house developed c. custom coded d. open source
answer
        d. open source
question
            Purchasing uses the information from the ______ to place purchase orders for raw materials. (Circle the correct answer.) a. sales and operations plan b. detailed scheduling plan c. materials requirement plan d. none of the above
answer
        c. materials requirement plan
question
            One of the functional units likely to benefit from use of a customer relationship management system is ______. (Circle the correct answer.) a. Market research b. Product development c. Quality control d. All of the above
answer
        a. Market research
question
            Organizations expect their ______ to ensure that data is processed accurately and completely, avoid processing fraudulent transactions, and reduce clerical and other labor requirements. (Circle the correct answer.) a. batch processing systems b. transaction processing systems c. online processing systems d. purchasing processing systems
answer
        b. transaction processing systems
question
            Integrated information transaction processing system solutions for SMEs ______. (Circle the correct answer.) a. are difficult to install and operate b. have a high cost of total ownership c. typically cost a few hundred to a few thousand dollars d. none of the above
answer
        c. typically cost a few hundred to a few thousand dollars
question
            During the implementation of an ERP system, it is a good idea to _____. (Circle the correct answer.) a. keep the scope of the implementation fluid so changes can be easily incorporated b. minimize the time and dollars spent on training end users c. not require the full-time involvement of a business executive d. define metrics to assess the progress of the project
answer
        d. define metrics to assess the progress of the project
question
            ______ includes the planning, execution, and control of all activities involved in raw material sourcing and procurement, conversions of raw materials to finished products, and the warehousing and delivery of finished product to customers. (Circle the correct answer.) a. Enterprise resource planning b. Supply chain management c. Customer relationship management d. Materials requirement planning
answer
        b. Supply chain management
question
            Retailers as well as manufacturers use ______ to match production to consumer demand and to allocate products to stores. (Circle the correct answer.) a. production planning b. demand forecasting c. inventory control d. sales forecasting
answer
        b. demand forecasting
question
            Many business application software vendors are pushing the use of the ______ for SME to help them acquire, use, and benefit from new technology while avoiding much of the associated complexity and high start-up costs. (Circle the correct answer.) a. open source code b. ERP systems c. hosted software model d. CRM
answer
        c. hosted software model
question
            ______ are among the challenges that must be met by an enterprise system of a multinational company. (Circle the correct answer.) a. Different languages and cultures b. Disparities in IS infrastructure c. Varying laws and customs rules d. All of the above
answer
        d. All of the above
question
            The systematic process for developing a production plan for a manufacturing organization starts with ____________________ ____________________________ to develop an estimate of future customer demand.
answer
        Sales Forecasting
question
            The recording of a sale and the creation of an accounts receivable entry indicating that a customer owes money for goods received is an example of _______________________ accounting.
answer
        Financial
question
            The objective of a CRM system is to capture data about every ____________________ a company has with a customer through every channel and store it
answer
        Contact
question
            Transaction processing systems typically involve the processing of _________________ input and output than MIS systems
answer
        more
question
            Many organizations have limited ________________________ among its TPS systems which requires that data into to one TPS must be printed out and manually reentered into other systems. (Fill-in-the-blank.)
answer
        Integration
question
            Data ________________________ ensures the validity and completeness of input data.  (Fill-in-the-blank.)
answer
        editing
question
            Trade ____________________ rules are international laws that set practices for two or more nations' commercial transactions. (Fill-in-the-blank.)
answer
        custom
question
            Some countries have passed laws limiting the __________________________ flow of data linked to individuals.
answer
        transborder
question
            There are many software vendors who offer ________________________ versions of their ERP or CRM software at a low monthly rental rate.
answer
        hosted
question
            Moving from a culture of simply selling products to one of placing the _______________ first is essential to a successful CRM deployment.
answer
        Customer
question
            Transaction processing systems use a large amount of input and output data to update the official ____________________ of the company about orders, sales, customers, and so on.
answer
        records
question
            At any time, the data in an online system reflects the ______________________ status
answer
        current
question
            The transaction processing cycle includes data collection, data editing, data correction, data storage, and ________________________ ________________________.
answer
        document production
question
            A(n) ______________________ ______________________ is a set of coordinated and related activities that takes one or more types of input and creates an output of value to the customer of that process.
answer
        business process
question
            When loading data into a new ERP system, ________________ __________________ is required because legacy systems are likely to contain data that is inaccurate, incomplete, or inconsistent. (Fill-in-the-blank.)
answer
        Data Cleanup
question
            The ultimate goal of management information and decision support systems is to help managers at the highest level in the organization make automated decisions with little or no effort.  (Circle the correct answer.)
answer
        False
question
            Heuristics, also known as "rules of thumb," are commonly accepted guidelines or procedures that usually find a good solution. (Circle the correct answer.)
answer
        True
question
            An MIS provides managers and decision makers with information to help achieve organizational goals. (Circle the correct answer.)
answer
        True
question
            A key indicator report summarizes the previous day's critical activities and is typically available at the beginning of each workday. (Circle the correct answer.)
answer
        True
question
            Demand reports are produced on a regular schedule, the same time each day, week, or month. (Circle the correct answer
answer
        False
question
            An MIS can be divided along functional lines to produce reports tailored to individual functions.
answer
        True
question
            Cost centers are units within the company that do not directly generate income. (Circle the correct answer.)
answer
        True
question
            The use of computerized systems is emphasized at all levels of manufacturing-from the shop floor to the executive suite. (Circle the correct answer.)
answer
        True
question
            CAD is used in the development and design of complex structures and products. (Circle the correct answer.)
answer
        True
question
            The economic order quantity is calculated to minimize the number of times an inventory item must be reordered. (Circle the correct answer.)
answer
        false
question
            A marketing MIS supports managerial activities in product development, distribution, pricing, promotions, and sales. (Circle the correct answer.)
answer
        True
question
            Traditionally, executives simply added a profit margin to total costs to set prices and guarantee a decent profit. (Circle the correct answer.)
answer
        True
question
            Computerized sales analysis is important to identify products, sales personnel, and customers that contribute to profits and those that do not.
answer
        True
question
            A decision support system includes people, procedures, software, databases, and devices to help assemble, store, manipulate, and display geographic information
answer
        False
question
            The Delphi approach is a group decision making approach that encourages diversity among group members and fosters creativity and original thinking in decision making. (Circle the correct answer.)
answer
        True
question
            A typical DSS includes many components including the ______ which allows decision makers to easily access and manipulate the DSS and to use common business terms and phrases. (Circle the correct answer.) a. model base b. dialogue manager c. database d. external database access
answer
        b. dialogue manager
question
            The ______ is not a component of the typical DSS? (Circle the correct answer.) a. inference engine b. user interface c. model base d. database
answer
        a. inference engine
question
            ______ is a common characteristic of an executive support system. (Circle the correct answer.) a. Tailored for use by individual executives b. Provide drill-down capabilities c. Can be used in situations with a high degree of uncertainty d. All of the above
answer
        d. All of the above
question
            The first stage in the problem solving process during which one identifies and defines potential problems or opportunities is the ______ stage. (Circle the correct answer.) a. design b. choice c. intelligence d. monitoring
answer
        c. intelligence
question
            During the ______ stage of the problem solving process, you develop alternative solutions to the problem and evaluate their feasibility. (Circle the correct answer.) a. intelligence b. implementation c. choice d. design
answer
        d. design
question
            The most significant internal data sources for an MIS are the organization's ______.  (Circle the correct answer.) a. various DSS and GSS systems and users b. Internet Web sites c. various TPS and ERP systems and related databases d. data from customers, suppliers, competitors, and stockholders
answer
        c. various TPS and ERP systems and related databases
question
            The ______ report summarizes the previous day's critical activities and is typically available at the start of each workday. (Circle the correct answer.) a. demand b. drill-down c. exception d. key-indicator
answer
        d. key-indicator
question
            The ability to ______ is a characteristic of a financial MIS. (Circle the correct answer.) a. integrate financial and operational information from multiple sources, including the Internet b. provide easy access to financial data through use of a corporate intranet to access corporate Web pages c. enable analysis of financial data along multiple dimensions d. all of the above
answer
        d. all of the above
question
            The ______ MIS subsystems and outputs are used to monitor and control the flow of materials, products, and services through the organization. (Circle the correct answer.) a. financial b. manufacturing c. human resources d. marketing
answer
        b. manufacturing
question
            A(n) ______ is an approach that allows manufacturing facilities to rapidly and efficiently change from making one product to another. (Circle the correct answer.) a. just in time b. Computer Integrated Manufacturing c. flexible manufacturing system d. all of the above
answer
        c. flexible manufacturing system
question
            Subsystems for the marketing MIS include ______. (Circle the correct answer.) a. product development b. inventory control c. use and management of funds d. all of the above
answer
        a. product development
question
            The focus of a DSS is on decision-making ______ when faced with unstructured or semistructured business problems. (Circle the correct answer.) a. accuracy b. efficiency c. effectiveness d. timeliness
answer
        c. effectiveness
question
            One characteristic of a structured problem is that ______. (Circle the correct answer.) a. it is straightforward, requiring known facts and relationships b. the relationships among the pieces of data are not always clear c. the data might be difficult to manipulate or obtain d. the decision maker might not know the information requirements of the decision in advance
answer
        a. it is straightforward, requiring known facts and relationships
question
            A(n) ______ normally is used with structured problems and usually emphasizes information only. (Circle the correct answer.) a. DSS b. GSS c. MIS d. GIS
answer
        c. MIS
question
            The ____ system provides for the gathering of anonymous input, allows for the exchange of information and expertise among people without direct face-to-face interaction, and support many difference decision-making approaches. (Circle the correct answer.) a. DSS b. GSS c. GIS d. MIS
answer
        b. GSS
question
            A(n) ______________________ ______________________ _____________________ is a computer system capable of assembling, storing, manipulating, and displaying data identified according to its location. (Fill-in-the-blank.)
answer
        Geographic information system
question
            ______________________________ decisions deal with unusual or exceptional situations. (Fill-in-the-blank.)
answer
        Nonprogrammed
question
            The final stage of the problem-solving process during which decision makers evaluate the implementation is called the ________________________ stage.
answer
        monitoring
question
            In general, computerized decision support systems can either optimize or ________________________. (Fill-in-the-blank.)
answer
        satisfice
question
            A limit on the number of available work hours in a manufacturing facility is an example of a problem ________________________.
answer
        constraint
question
            The output of most MIS systems is a collection of ________________________ that are distributed to managers.
answer
        reports
question
            ____________________________ reports are produced periodically, such as daily, weekly, or monthly. (Fill-in-the-blank.)
answer
        Scheduled
question
            ____________________________ reports are reports that are automatically produced when a situation is unusual or requires management action
answer
        Exception
question
            A(n) ________________________ ________________________ is any organizational unit that focuses on generating a profit for the firm. (Fill-in-the-blank.)
answer
        Profit center
question
            A manufacturing or architectural firm uses __________________________________ ________________________ software to develop a digital blueprint of its products prior to building them. (Fill-in-the-blank.)
answer
        CAD
question
            Corporate marketing departments use ________________ _______________________ sites such as Second Life to advertise their products and perform market research.
answer
        Social Networking
question
            ______________________________ ratings show how ads convert to sales. (Fill-in-the-blank.)
answer
        Engagement
question
            A(n) _____________________________ MIS performs a number of important activities, providing aggregate information on accounts payable, accounts receivable, payroll, and many other applications. (Fill-in-the-blank.)
answer
        accounting
question
            A(n) ____________________________ DSS handles situations or decisions that occur more than once, usually several times per year or more. (Fill-in-the-blank.)
answer
        institutional
question
            In the ________________________________ decision making approach, members of a group offer suggestions "off the top of their heads."
answer
        Brainstorming
question
            Many organizations actively attempt to convert tacit knowledge to explicit knowledge. (Circle the correct answer.)
answer
        True
question
            Secretaries, administrative assistants, bookkeepers, and similar data-entry people are often called data workers. (Circle the correct answer.)
answer
        True
question
            Data mining and business intelligence are seldom used to capture the knowledge stored in a knowledge management system.  (Circle the correct answer.)
answer
        False
question
            Although computers excel at numerical calculations, they are even better at dealing with symbols and three-dimensional objects.  (Circle the correct answer.)
answer
        False
question
            A perceptive system allows a machine to approximate the way a person sees, hears, and feels objects. (Circle the correct answer.)
answer
        True
question
            Research is ongoing to directly connect the human brain and have human thought control computer activities. (Circle the correct answer.)
answer
        True
question
            Expert systems, robotics, vision systems, natural language processing, learning systems, and neural networks are all part of the broad field of artificial intelligence. (Circle the correct answer.
answer
        True
question
            Research is ongoing to develop a robotic suit to help paraplegics and stroke victims move so they can perform basic functions.  (Circle the correct answer.)
answer
        True
question
            Neugents are neural intelligence agents that "learn" patterns and behaviors and predict what will happen next. (Circle the correct answer.)
answer
        True
question
            Reinforcement learning is a learning system involving sequential decisions with learning taking place in between each decision. (Circle the correct answer.)
answer
        True
question
            A genetic algorithm can be used to search the vast resources of the Internet to find information on any topic. (Circle the correct answer.)
answer
        False
question
            An expert system, using the knowledge acquisition facility, can indicate all the facts and rules that were used in reaching the conclusion. (Circle the correct answer.)
answer
        False
question
            The user interface makes an expert system easier to both develop and use. (Circle the correct answer.)
answer
        True
question
            Analog and older digital formats need not be converted into a newer digital format before they can be edited and processed by today's multimedia software. (Circle the correct answer.)
answer
        false
question
            One limitation of virtual reality systems is that they enable just one user at a time to move and react in a computer simulated environment.
answer
        False
question
            ______ knowledge is hard to measure and document and typically is not objective or formalized. (Circle the correct answer.) a. Tacit b. Explicit c. Implicit d. Shared
answer
        a. Tacit
question
            After knowledge is created, it is typically stored in a ______. (Circle the correct answer.) a. data warehouse b. knowledge repository c. traditional data database d. All of the above
answer
        b. knowledge repository
question
            For many businesses, robots are used to do the three Ds, dull, dirty, and ______.  (Circle the correct answer.) a. dingy b. dynamic c. dangerous d. devastating
answer
        c. dangerous
question
            ______ can process many pieces of data at the same time and learn to recognize patterns. (Circle the correct answer.) a. Voice recognition systems b. Neural networks c. Learning systems d. Natural language processing systems
answer
        b. Neural networks
question
            The ______ is NOT a key component of an expert system. (Circle the correct answer.) a. explanation facility b. user interface c. knowledge base acquisition facility d. data warehouse
answer
        d. data warehouse
question
            The ______ stores all relevant information, data, rules, cases, and relationships that the expert system uses. (Circle the correct answer.) a. data warehouse b. inference engine c. inference engine d. knowledge base
answer
        d. knowledge base
question
            In an expert system, the ______ is the component that delivers the expert advice.  (Circle the correct answer.) a. explanation facility b. knowledge acquisition facility c. user interface d. inference engine
answer
        d. inference engine
question
            The expert system knowledge acquisition facility serves as an interface between ______. (Circle the correct answer.) a. the end users and inference engine b. the system developers and explanation facility c. the decision makers and the knowledge base d. experts and knowledge base
answer
        d. experts and knowledge base
question
            The ______ is the person or group with the expertise or knowledge the expert is trying to capture. (Circle the correct answer.) a. knowledge engineer b. knowledge user c. domain expert d. system developer
answer
        c. domain expert
question
            ______ were early programming languages developed for and used in artificial intelligence applications. (Circle the correct answer.) a. FORTRAN and Pascal b. LISP and PROLOG c. Pascal and PROLOG d. COBOL and FORTRAN
answer
        b. LISP and PROLOG
question
            Graphic images can be stored in a variety of formats including ______. (Circle the correct answer.) a. MP3 and MPEG b. JPEG and GIF c. ISDB and DVB d. None of the above
answer
        b. JPEG and GIF
question
            ______ is a file conversion program that can be used to compress multimedia files to make them easier to download from the Internet or send as an e-mail attachment.  (Circle the correct answer.) a. Apple Quick Time b. CorelDraw c. Grass Valley d. WinZip
answer
        d. WinZip
question
            ______ has the potential to superimpose digital data over real photos so that GPS maps can be combined with real pictures of stores and streets to help you locate your position.  (Circle the correct answer.) a. Immersive virtual reality b. Augmented reality c. Telepresence d. Location reality
answer
        b. Augmented reality
question
            Special purpose systems that help overcome disabilities or improve health are called ______. (Circle the correct answer.) a. health systems b. assistive technology c. forensics software d. none of the above
answer
        b. assistive technology
question
            ______ involves the use of information systems to develop competitive strategies for people, organizations, or even countries. (Circle the correct answer.) a. Informatics b. Game theory c. Assistive technology d. All of the above
answer
        b. Game theory
question
            ___________________ knowledge is objective and can be measured and documented.  (Fill-in-the-blank.)
answer
        Explicit
question
            Some organizations and professions use _____________________________ of _______________________ to create, store, and share knowledge.
answer
        Communities of Practice
question
            Using a knowledge management system begins with locating the organization's knowledge often using a _______________________ ___________________ that points the knowledge worker to the needed knowledge.
answer
        Knowledge Map
question
            John McCarthy proposed the use of the term ___________________________ _____________________________ to describe computers with the ability to mimic or duplicate the functions of the human brain
answer
        artificial intelligence
question
            The ability to learn from experiences and apply knowledge acquired from those experiences, handle complex situations, solve problems when important information is missing, be creative and imaginative is considered to be _______________________ _______________________. (Fill-in-the-blank.)
answer
        intelligent behavior
question
            For some decisions, people use _______________________ which are rules of thumb arising from experience. (Fill-in-the-blank.)
answer
        heuristics
question
            A(n) ___________________ system consists of hardware and software that stores knowledge and makes inferences, similar to those of a human expert.
answer
        expert
question
            _______________________ programming is a process where the computer makes a decision, analyzes the results, and then makes a better decision based on the analysis
answer
        dynamic
question
            ___________________ are conditional statements that link conditions to actions or outcomes; in many instances, they are stored as IF-THEN statements.
answer
        Rules
question
            An expert system ___________________ is a collection of software packages and tools used to design, develop, implement, and maintain expert systems.
answer
        shell
question
            ___________________________ is text, graphics, video, animation, audio, and other media that can be used to help an organization efficiently and effectively achieve its goals. (Fill-in-the-blank.)
answer
        Multimedia
question
            When audio files are being played while being downloaded from the Internet, it is called _______________________ audio.
answer
        streaming
question
            With _______________________ virtual reality, the user becomes fully immersed in an artificial, 3D world that is completely generated by the computer. (Fill-in-the-blank.)
answer
        immersive
question
            _______________________________ systems immerse a user in a real world that is captured by video cameras at a distant locations and allow for remote manipulation of real objects by robot arms and manipulators
answer
        Telepresence
question
            CGI or ___________________________________ ____________________ technology is used to bring realism to the movie screen. (Fill-in-the-blank.)
answer
        Virtual Reality
question
            The systems development team accepts a given set of information system objectives and delivers a system that meets those objectives
answer
        false
question
            An individual systems developer is a person that performs all of the system development roles, including systems analyst, programmer, and technical specialist
answer
        true
question
            Information systems planning transforms organizational goals outlined in the strategic plan into specific system development activities.
answer
        true
question
            In general, smaller projects have a higher probability of success than larger projects.
answer
        true
question
            Proper planning can guarantee that projects will not fall behind schedule, go over budget, or not meet expectations.
answer
        false
question
            The capability maturity model is a measure of the maturity of the software development process in an organization.
answer
        true
question
            Computer-aided software engineering (CASE) tools are used to plan and schedule a software project.
answer
        false
question
            Technical feasibility is an assessment of the technical, economic, legal, operational, and schedule feasibility of a project.
answer
        fasle
question
            The primary outcome of systems investigation is a systems investigation report, also called a feasibility report.
answer
        true
question
            Data about the problems or needs for the new system can come from both sources internal and external to the organization.
answer
        true
question
            The overall purpose of requirements analysis is to determine user, stakeholder, and organizational needs.
answer
        true
question
            Once the new system development process has begun, management cannot call a stop to the effort.
answer
        false
question
            Because information systems support other business activities, IS staff and people in other departments need to understand each other's responsibilities and tasks.
answer
        true
question
            The sooner an error is detected in the systems development life cycle, the more expensive it is to correct.
answer
        false
question
            Continuous improvement projects do not require a lot of changes or retraining of people; thus, they have a higher degree of success than reengineering projects.
answer
        true
question
            A professional who specializes in analyzing and designing business systems is called a(n) ______. (Circle the correct answer.) a. programmer b. stakeholder c. end user d. systems analyst
answer
        d. systems analyst
question
            During the ______ phase of the system development process, potential problems and opportunities are identified and considered in light of the goals of the business. (Circle the correct answer.) a. systems design b. systems analysis c. systems investigation d. systems implementation
answer
        c. systems investigation
question
            During the ______ phase of the systems development life cycle, people attempt to answer the questions "What must the information system do to solve the problem?"  (Circle the correct answer.) a. systems investigation b. systems implementation c. systems design d. systems analysis
answer
        d. systems analysis
question
            The training of end users is an important task in the ______ phase of a systems development project. (Circle the correct answer.) a. systems design b. systems maintenance and review c. systems implementation d. None of the above
answer
        c. systems implementation
question
            The ______ system development approach requires cooperation and frequent face-to-face meetings with all project participants as they modify, refine, and test how the system meets users' needs and what its capabilities are. (Circle the correct answer.) a. prototyping b. agile development c. extreme programming d. None of the above
answer
        b. agile development
question
            ______ is likely to affect the quality of the systems development effort. (Circle the correct answer.) a. the degree of change associated with the project b. whether the project is a continuous change effort or a reengineering effort c. the ability to manage change associated with the project d. All of the above
answer
        d. All of the above
question
            The second level in the capability maturity model is ______. (Circle the correct answer.) a. repeatable b. optimized c. defined d. managed
answer
        a. repeatable
question
            Activities on the critical path of a project have ______ slack time. (Circle the correct answer.) a. infinite b. maximum c. minimum d. zero
answer
        d. zero
question
            ______ is an assessment of whether the hardware, software, and other system components can be acquired or developed to solve the problem. (Circle the correct answer.) a. Systems investigation b. Feasibility analysis c. Technical feasibility d. None of the above
answer
        c. Technical feasibility
question
            ______ determines whether the project can be completed in a reasonable amount of time. (Circle the correct answer.) a. Economic feasibility b. Legal feasibility c. Operational feasibility d. Schedule feasibility
answer
        d. Schedule feasibility
question
            Entity-relationship diagrams are used to perform ______. (Circle the correct answer.) a. data modeling b. process modeling c. problem analysis d. activity analysis
answer
        a. data modeling
question
            Data flow diagrams ______. (Circle the correct answer.) a. are used to model data entities and their relationships b. are quite complicated and seldom used or understood by nontechnical people c. describe the activities that accomplish a business task d. All of the above
answer
        c. describe the activities that accomplish a business task
question
            The system analysis concludes with a formal system analysis report that includes ______. (Circle the correct answer.) a. identification of the strengths and weaknesses of the existing system b. functional requirements for the new system c. organizational requirements for the new system d. All of the above
answer
        d. All of the above
question
            ______ requires unbiased and careful questioning of whether system elements are related in the most effective ways. (Circle the correct answer.) a. Critical analysis b. Creative analysis c. Causal analysis d. Data flow analysis
answer
        a. Critical analysis
question
            ______ is an effective way to reduce risk and protect an organization's critical data resources. (Circle the correct answer.) a. Secure any off-site IS facilities b. Control access to critical data c. Encrypt data and files d. All of the above
answer
        a. Secure any off-site IS facilities
question
            Like an architect developing blueprints for a new building, a(n) ___________________ ___________________ develops detailed plans for the new or modified system.
answer
        system analyst
question
            Like a contractor constructing a new building or renovating an existing one, the _______________________ takes the plans developed by others and builds or modifies the necessary software.
answer
        programmer
question
            ___________________ on _______________________________ is a key metric for technology initiatives, and the business case needs to include both initial development costs and subsequent maintenance costs
answer
        Return Investment
question
            The highest level of the capability maturity level is _______________________.
answer
        optimized
question
            The project _______________________ is the date the entire project is to be complete and operational.
answer
        deadline
question
            ___________________ ___________________ is the amount of time a project activity can be delayed without delaying the entire project.
answer
        slack time
question
            The ___________________ ___________________ consists of all activities that, if delayed, would delay the entire project
answer
        critical path
question
            A formalized approach called _____________________ _____________________ and ___________________ ___________________ creates three time estimates for each project activity.
answer
        program evaluation review technique PERT
question
            A(n) ___________________ ___________________ is a grid that lists activities and deadlines.
answer
        Gantt chart
question
            Object-oriented programming languages are designed to allow the programmer to create ___________________ of objects in the computer system that correspond to the objects in the actual business process.
answer
        classes
question
            ________________________ ________________________ determines whether the project makes financial sense and whether predicted benefits offset the cost and time needed to obtain them.
answer
        economic feasibility
question
            ___________________ ___________________ involves an analysis of existing and future laws to determine the likelihood of legal action against the systems development project and possible consequences.
answer
        legal feasibility
question
            The use case diagram is part of the ____________________ ____________________ language that is used in object-oriented development.
answer
        unified modeling
question
            Interviews, direct observation, and questionnaires are tools and techniques used in data _______________________.
answer
        collection
question
            _______________________ analysis involves investigating new approaches to existing problems.
answer
        creative
question
            Developing new systems in an environmentally sensitive way is becoming less and less an important consideration.
answer
        false
question
            Vendor proposals are typically evaluated in a two-phase process that includes a preliminary evaluation and a final evaluation
answer
        true
question
            The system specifications are documented in a design report, which is the primary result of systems investigation.
answer
        false
question
            Programming and software acquisition, user preparation, and site and data preparation are all part of the system design process.
answer
        false
question
            A parallel start-up involves running the new system for one group of users while the rest of the users still run the old system.
answer
        false
question
            Two advantages of cloud computing are improved security and increased availability of critical applications.
answer
        true
question
            Security is not an important consideration of logical design but comes later in the systems development process
answer
        False
question
            During physical design, the characteristics of the hardware, software, database, telecommunications, personnel, and procedure and control specifications must be detailed.
answer
        true
question
            When a database fails, failover automatically switches applications and other programs that use the database to a redundant or replicated database so these is no interruption of service.
answer
        true
question
            Leasing of computer hardware has the advantage over purchasing in that there is no initial investment of funds and no risk of equipment obsolescence.
answer
        true
question
            Most application software for organizations is developed using internal resources instead of being purchased.
answer
        False
question
            The Windows Server operating system provides virtualization tools that allow multiple operating systems to run on a single server.
answer
        true
question
            Data preparation may involve the conversion of old data files into a format that can be used by the new system.
answer
        true
question
            During the testing phase, if the system testing is completed successfully, no further testing is needed.
answer
        false
question
            During unit testing, each program is tested with abnormal data to determine how it will handle problems
answer
        true
question
            The purpose of system design is to answer the question ______. (Circle the correct answer.) a. "How will the information system solve a problem?" b. "What must the information system do to solve the problem? c. "When can the new system be operational?" d. None of the above.
answer
        a. "How will the information system solve a problem?"
question
            The first of the systems implementation tasks is ______. (Circle the correct answer.) a. user acceptance b. site preparation c. testing d. hardware acquisition
answer
        d. hardware acquisition
question
            The process of physically placing the computer equipment on the site and making it operational is called ______. (Circle the correct answer.) a. site preparation b. user acceptance c. installation d. start-up
answer
        c. installation
question
            ______ is an evaluation approach that compares systems operating under the same conditions. (Circle the correct answer.) a. Cost/benefit analysis b. Benchmark test c. Point evaluation system d. Group consensus
answer
        b. Benchmark test
question
            A good contract for new computer equipment should include ______. (Circle the correct answer.) a. a dispute resolution process if something goes wrong b. ownership and property rights of the new or modified system c. contingency provisions in case something does not work as expected d. All of the above.
answer
        d. All of the above.
question
            From the purchaser's perspective, a vendor's standard contract for purchase of new computer hardware or software _______. (Circle the correct answer.) a. is preferred over developing a custom contract b. should not include any vendor penalty clauses c. should include details from the RFP specifying what is expected from the vendor d. All of the above.
answer
        c. should include details from the RFP specifying what is expected from the vendor
question
            Virtualization ______. (Circle the correct answer.) a. introduces important implementation considerations including security and backup procedures b. lead to increases in power consumption c. increases hardware space requirements d. All of the above.
answer
        a. introduces important implementation considerations including security and backup procedures
question
            Called "on demand" computing, this approach requires an organization to ______.  (Circle the correct answer.) a. pay the service provider periodically as requested by the provider b. pay only for the computer power it uses c. request the service provider for services well in advance of needing them d. None of the above.
answer
        b. pay only for the computer power it uses
question
            Site preparation can include ______. (Circle the correct answer.) a. the hiring and training of IS personnel b. readying users for the new system c. installing special wiring and air conditioning d. physically placing the computer system on the site and making it operational
answer
        c. installing special wiring and air conditioning
question
            The testing of all related systems together is called ______. (Circle the correct answer.) a. system testing b. acceptance testing c. volume testing d. integration testing
answer
        d. integration testing
question
            ______ testing involves testing an incomplete or early version of the system. (Circle the correct answer.) a. Beta b. Unit c. Volume d. Alpha
answer
        d. Alpha
question
            The ______ approach is a form of system start-up that involves running the new system for one group of users, rather than all users. (Circle the correct answer.) a. phase-in b. pilot start-up c. parallel start-up d. direct conversion
answer
        b. pilot start-up
question
            A legacy system ______. (Circle the correct answer.) a. is an old system that may have been patched or modified repeatedly over time b. is usually easy to modify to add new features c. requires minimal cost to maintain d. closely matches the current needs of the organization
answer
        a. is an old system that may have been patched or modified repeatedly over time
question
            A slipstream upgrade to a system ______. (Circle the correct answer.) a. requires notifying end users well in advance b. represents a fairly significant change in how the system operates c. can create entirely new bugs d. All of the above
answer
        c. can create entirely new bugs
question
            A combination of tools needed for programming with a programming language in one integrated package is called ______. (Circle the correct answer.) a. computer-assisted software engineering (CASE) b. cross-platform development package c. an integrated development environment (IDE) d. an object oriented (OO) approach
answer
        c. an integrated development environment (IDE)
question
            The design of a new system is broken into two phases, ____________________ design and physical design. (Fill-in-the-blank.)
answer
        Logical
question
            When following the object-oriented design approach, you might want to design the sequence of events for performing some process. The event sequence is also called a(n) ________________________. (Fill-in-the-blank.)
answer
        scenario
question
            The ____________________ ______________ ____________________ is a document used to communicate an organization's needs for hardware, software, or database systems to one or more vendors. (Fill-in-the-blank.)
answer
        Request for Proposal
question
            When start-up is finished, the system is fully ____________________________.
answer
        operational
question
            One system start-up approach, known as ________________________ ____________________________ involves stopping the old system and starting the new system on a given data.
answer
        Direct conversion
question
            The process of anticipating and planning for disasters is called disaster ________________________.
answer
        planning
question
            A duplicate, operational hardware system that is ready for use is an example of a ________________ ________________.
answer
        hot site
question
            Whenever an application is run, an _________________ ________________ is created that contains all changes to all files. (Fill-in-the-blank.)
answer
        image log
question
            System ________________________ are rules and procedures to maintain data security. (Fill-in-the-blank.)
answer
        controls
question
            A(n) ______________________________ ______________________ is an evaluation approach that involves expressing all the costs and benefits of a new system in monetary terms. (Fill-in-the-blank.)
answer
        cost/benefit Analysis
question
            Near the end of the design stage, some organizations prohibit further changes in the design of the system in an approach called __________________________ design specifications. (Fill-in-the-blank.)
answer
        Freezing
question
            A(n) ____________________ _______________________ ______________________ combines the tools needed for programming with a programming language into one integrated package. (Fill-in-the-blank.)
answer
        Integrated Development Environment
question
            Acceptance testing involves conducting any additional testing required by the ____________________. (Fill-in-the-blank.)
answer
        User
question
            The ________________ ________________________ document is a formal agreement the user signs stating that a phase of the installation or the complete system is approved. (Fill-in-the-blank.)
answer
        User Acceptance
question
            The _________________ software development technique allows programmers to develop programs that can run on computer systems that have different hardware and operating systems. (Fill-in-the-blank.)
answer
        cross-platform
question
            The CAN-SPAM Act allows the sending of most e-mail spam as long as it adheres to two basic forms of compliance related to how receivers can unsubscribe and the content of the e-mail. (Circle the correct answer.)
answer
        false
question
            Over one-fourth of office workers spend in excess of 90 minutes per week at work viewing adult pornographic Web sites. (Circle the correct answer.)
answer
        true
question
            According to the 2009 FBI Internet Crime Report, from 2008 to 2009, there was a decrease in the number of complaints of Internet crime filed with law enforcement officers and a decrease in the total dollar loss from these cases. (Circle the correct answer.)
answer
        false
question
            The vast majority of computer-related crimes are reported to authorities. (Circle the correct answer.)
answer
        false
question
            Cyberterrorists are believed to have invaded the U.S. power grid and planted software that could interrupt the system during a time of crises or war. (Circle the correct answer.)
answer
        true
question
            While a virus can completely halt the operation of a computer system, it is incapable of destroying programs or data. (Circle the correct answer.)
answer
        false
question
            Deleting the contents of the Recycle Bin makes it impossible for individuals to view the deleted data. (Circle the correct answer.)
answer
        false
question
            Copyright laws protect processes, machines, and compositions of matter. (Circle the correct answer.)
answer
        false
question
            It is estimated that the global software piracy exceeded 40% and amounted to more than $50 billion in lost sales. (Circle the correct answer.)
answer
        true
question
            Fingerprint authentication devices to provide security in the PC environment are sometimes employed rather than passwords.  (Circle the correct answer.)
answer
        true
question
            Unfortunately, many Intrusion Detection Systems frequently provide false alarms that result in wasted effort. (Circle the correct answer.)
answer
        true
question
            The Identity Theft and Assumption Deterrence Act of 1998 assigns responsibility to the Department of Homeland Security for helping identity theft victims to restore their credit and ease the impact of the imposter.
answer
        false
question
            To protect your PC and prevent it from spreading malware to your co-workers, some antivirus software scans and cleans both incoming and outgoing e-mail messages.
answer
        true
question
            Federal law prohibits private employers from monitoring e-mail sent or received by their employees
answer
        false
question
            Posting information to the Internet using anonymous e-mail accounts or screen names makes it impossible to identify the poster.
answer
        false
question
            Most companies have implemented stringent policies on the acquisition of computer systems and equipment requiring ______. (Circle the correct answer.) a. a formal justification statement before computer equipment is purchased b. definition of standard computing platforms c. use of preferred vendors for all acquisitions d. All of the above.
answer
        d. All of the above.
question
            The Leads Online Web-based service system is used by law enforcement to ______.  (Circle the correct answer.) a. monitor sex offenders b. provide a quick overview of crime risk at a given address c. recover stolen property d. None of the above.
answer
        c. recover stolen property
question
            Originally a(n) ______ was a person who enjoyed computer technology and spent time learning and using computer systems. (Circle the correct answer.) a. cracker b. insider c. hacker d. script bunny
answer
        c. hacker
question
            ______ have extra knowledge that make them especially dangerous -- they know logon ids, passwords, and company procedures that help them evade detection. (Circle the correct answer.) a. Crackers b. Hackers c. Insiders d. Script bunnies
answer
        c. Insiders
question
            A ______ is a set of programs that enables its user to gain administrator level access to a computer or network. (Circle the correct answer.) a. virus b. Trojan horse c. rootkit d. worm
answer
        c. rootkit
question
            If a court determines that a patent infringement is intentional, it can award up to ______ to the patent holder. (Circle the correct answer.) a. $10 million b. $250,000 per infringement c. three times the amount of damages claimed by the patent holder d. $150,000
answer
        c. three times the amount of damages claimed by the patent holder
question
            The practice of disguising illegally gained funds so that they seem legal is called ______. (Circle the correct answer.) a. identity theft b. vishing c. spoofing d. money laundering
answer
        d. money laundering
question
            A useful guideline to protect corporate computers from criminal hackers is to ______.  (Circle the correct answer.) a. Install antivirus software on all computers b. Avoid creating frequent backups of critical data c. Remove any firewall that may have been installed between your corporate network and the Internet d. Enable several guest accounts
answer
        a. Install antivirus software on all computers
question
            The European Union has a data protection directive that requires firms transporting data ______ to have certain privacy procedures in place. (Circle the correct answer.) a. across a network b. between servers c. across national boundaries d. to anyone outside the company
answer
        c. across national boundaries
question
            . ______ is a screening technology that shields users from sites that do not provide the level of privacy protection they desire. (Circle the correct answer.) a. filtering software b. Platform for Privacy Preferences c. IRCA d. Child Online Protection Act
answer
        b. Platform for Privacy Preferences
question
            ______ involves publishing an intentionally false written statement that is damaging to a person's or an organization's reputation. (Circle the correct answer.) a. Blogging b. Libel c. Slander d. Unfriending
answer
        b. Libel
question
            The Privacy Act of 1974 ______. (Circle the correct answer.) a. applies only to certain federal agencies b. deals with the protection of communications while in transit from sender to receiver c. requires all financial institutions to protect and secure customers' nonpublic data from unauthorized use or access d. All of the above.
answer
        a. applies only to certain federal agencies
question
            The ______ prohibits the government from intercepting electronic messages unless it obtains a court order based on probable cause. (Circle the correct answer.) a. Electronic Communications Privacy Act b. Gramm-Leach-Bliley Act c. Freedom of Information Act d. None of the above.
answer
        a. Electronic Communications Privacy Act
question
            The ______ required all financial service institutions to communicate their data privacy rules and honor customer preferences on sharing of data. (Circle the correct answer.) a. USA Patriot Act b. Freedom of Information Act c. Gramm-Leach-Bliley Act d. None of the above.
answer
        c. Gramm-Leach-Bliley Act
question
            ______ is an aggravation of the pathway for the nerves that travel through the wrist.  (Circle the correct answer.) a. Chronic idiopathic mylofibrosis b. Seated immobility thromboembolism c. Carpal tunnel syndrome d. None of the above
answer
        c. Carpal tunnel syndrome
question
            Spam messages often carry attached files with embedded _______________________ that can cause networks and computers to crash or allow hackers to gain unauthorized access to systems and files.
answer
        Viruses
question
            Most organizations implement internal ________________________ to measure actual results against established goals, such as percentage of end-user reports produced on time. (Fill-in-the-blank.)
answer
        audits
question
            When computer criminals talk a critical password out of a person, the practice is called ________________________ ______________________________. (Fill-in-the-blank.)
answer
        social engineering
question
            A(n) _________________________________ is someone who intimidates or coerces a government or organization to advance his political or social objectives by launching a computer-based attacks. (Fill-in-the-blank.)
answer
        cyberterrorist
question
            ______________________ ____________________ is a crime in which an imposter obtains key pieces of personal identification information to impersonate someone else.  (Fill-in-the-blank.)
answer
        identity theft
question
            A(n) ________________________ is a modified version of a virus. (Fill-in-the-blank.)
answer
        variant
question
            Software is considered intellectual property and may be protected by copyright or ________________________ law. (Fill-in-the-blank.)
answer
        patent
question
            ________________________ is the operation of a fake Web site by someone trying to gain access to customer's private information. (Fill-in-the-blank.)
answer
        phising
question
            Specialized hardware and software, such as __________________________ devices, can be used to encode data and information to help prevent unauthorized use.  (Fill-in-the-blank.)
answer
        encryption
question
            A(n) ____________________ is a person paid by a company about how much they've earned and how easy the get-rich-quick plan was to operate. (Fill-in-the-blank.)
answer
        shill
question
            A libeled party can file what is known as a __________________ __________________ lawsuit to force the ISP to provide whatever information they have about an anonymous poster. (Fill-in-the-blank.)
answer
        John Doe
question
            Organizations implement ____________________ software to prevent employees from visiting Web sites not related to work. (Fill-in-the-blank.)
answer
        Filtering
question
            The hazardous activities associated with unfavorable working conditions are collectively referred to as work ________________________. (Fill-in-the-blank.)
answer
        stressors
question
            The science of designing machines, products, and systems to maximize the safety, comfort, and efficiency of the people who use them is called _____________________. (Fill-in-the-blank.)
answer
        ergonomics
question
            ______________________ issues deal with what is generally considered right or wrong.  (Fill-in-the-blank.)
answer
        Ethical