MIS Chapters 1-4 – Flashcards
Unlock all answers in this set
Unlock answersquestion
Who is responsible for ensuring the security of IT systems and developing strategies and IT safeguards against attacks from hackers and viruses?
answer
CSO
question
What is the ease with which people perform transactions and/or find information?
answer
Usability
question
What is a competitive advantage?
answer
A product or service that an organization's customers value more highly than similar offerings from a competitor
question
Which of the following is a broad function of a CIO?
answer
Building and maintaining strong executive relationships Ensuring that the strategic vision of IT is in line with the strategic vision of the organization Ensuring the delivery of all IT projects, on time and within budget ALL
question
Which of the following represents the order of priority for the three primary organizational key resources?
answer
People, information, information technology
question
According to Peter Drucker, what are managers who do the right things addressing?
answer
Effectiveness
question
Which of the following forces is commonly reduced through the use of a loyalty program?
answer
Buyer Power
question
Which of the following is an example of the way that information technology can reduce supplier power for an organization and create a competitive advantage?
answer
Reverse auction
question
Which information culture allows employees to use information as a means of exercising influence or power over others?
answer
Information-functional culture
question
Which part of the value chain acquires raw materials and manufactures, delivers, markets, sells, and provides after-sales services?
answer
Primary Value activities
question
What is a general name for the business function and academic discipline covering the application of people, technologies, and procedures to solve business problems?
answer
Management information systems
question
Which of the following represents the relationship between functional areas in a business?
answer
Interdependent
question
Who is responsible for ensuring the throughput, transaction speed, accuracy, system availability, and reliability of an organization's information technology?
answer
CTO
question
What did Thomas Friedman believe happened to the world because of the unplanned cascade of technological and social shifts?
answer
the world became flat
question
T/F? Effectiveness IT metrics include throughput, transaction speed, and system availability.
answer
False
question
Which magazine can you please a marker (such as a Post-It Note) to demonstrate information technology's role in business?
answer
business Week Fortune and Fast Company
question
Which of the following is not a primary information technology project goal?
answer
marketing plan
question
An entry barrier is typically used to influence the rivalry among existing competitors
answer
false
question
What is the acquisition and analysis of events and trends in the environment external to an organization?
answer
environmental scanning
question
Benchmarks are baseline values the system seeks to attain
answer
true
question
Which of the following is Hyundai using as its generic strategy?
answer
Broad cost leadership
question
Almost all organizations today have an internal IT department, often called Information Technology (IT), Information Systems (IS), or Management Information Systems (MIS).
answer
true
question
A competitive advantage is typically temporary, unless it is a first-mover advantage
answer
true
question
Which of the following do customer effectiveness metrics typically focus on?
answer
Market share Customer acquisition Customer profitability ALL
question
Which of the following is considered information?
answer
Best selling item by month
question
Measuring the amount of website traffic is the best way to determine a websites success.
answer
false
question
Which of the following is considered data?
answer
quantity sold
question
Which of the following statements is true?
answer
IT enables business success and innovation
question
Switching costs are typically used to influence the threat of substitute products or services.
answer
true
question
What type of metrics measure throughput, transaction speed, and system availability?
answer
Efficiency IT metrics
question
What is a field concerned with the use of technology in managing and processing information?
answer
Information technology
question
Which company, in the text, uses environmental scanning to determine everything from how well competing products are selling to the strategic placement of its own products?
answer
Frito Lay
question
Why do students need to study information technology?
answer
Information technology is everywhere in business
question
When considering the graph depicting the interrelationships between efficiency and effectiveness, where does an organization ideally want to operate?
answer
Upper-right hand corner
question
What is an entry barrier?
answer
A product or service feature that customers have come to expect from organizations in a particular industry and must be offered by an entering organization to compete and survive
question
Which approach views an organization as a series of process, each of which adds value to the product or service for each customer?
answer
Value chain
question
Which type of model represents the current state of the operation that has been mapped, without any specific improvements or changes to existing processes?
answer
As-Is process model
question
What is a business facing process?
answer
Invisible to the external customer but essential to the effective management of the business and include goal setting, day-to-day planning, performance feedback, rewards, and resource allocation
question
Which of the following is an example of analytical information?
answer
All choices Product statistics Trend projection Sales projection
question
What is a special-purpose knowledge-based information system that accomplishes specific tasks on behalf of its users?
answer
Intelligent agent
question
What is consolidation?
answer
Involves the aggregation of information and features simple roll-ups to complex groupings of interrelated information
question
What integrates information from multiple components and presents it in a unified display?
answer
Digital dashboards
question
What is the study of the impact that changes in one (or more) parts of the model have on other parts of the model?
answer
Sensitivity analysis
question
Which of the following are types of management information system business processes?
answer
Disaster recovery procedures Backup/recovery procedures Service agreements All of the above
question
Which of the following is a not a type of organizational information system?
answer
Analysis processing system
question
What does BPR assume about the current process in the extreme?
answer
Current process is irrelevant Current process is broken Current process must be overhauled from scratch All of the above
question
What integrates all of an organization's business process to make individual processes more efficient?
answer
Business process management
question
Which of the following is the most commonly used form of AI in the business arena?
answer
Expert system
question
What can AI scientists learn by observing parts of the ecosystem, like ant or bee colonies, and using hardware and software models that incorporate insect characteristics and behavior?
answer
Learn how people-based systems behave Predict how they will behave under a given set of circumstances Improve human systems to make them more efficient and effective All of the above
question
The ultimate goal of AI is the ability to build a system that can mimic human intelligence.
answer
true
question
Which type of AI system assigns values of 0 and 1 to vague or ambiguous information?
answer
fuzzy logic
question
What is a category of AI that attempts to emulate the way the human brain works?
answer
Neural network
question
What is business process reengineering?
answer
The analysis and redesign of workflow within and between enterprises
question
What factor significantly contributed to people's needs to use information systems to make decisions?
answer
The amount of information people must understand to make good decisions is increasing exponentially
question
Which company has "The Wall of Shaygan", which is a digital dashboard that tracks 100-plus IT systems on a single screen?
answer
Verizon Communications
question
What are various commercial applications of artificial intelligence?
answer
Intelligent system
question
How do decision-making information systems work?
answer
By building models out of organizational information to lend insight into important business issues and opportunities
question
Which of the following represents the top-down (executives to analysts) organizational levels of information technology systems?
answer
EIS, DSS, TPS
question
Strategic planning is a customer facing business process.
answer
False
question
Which of the following is not a criterion to determine the importance of a process for reengineering practitioners?
answer
Does the process rate above best in class?
question
What can a model accomplish?
answer
Calculate risks Understand uncertainty Manipulate time All of the above
question
Which of the following is a customer facing process?
answer
Sales planning Order processing Billing processing All of the above
question
Business process management integrates all of an organization's business process to make individual processes more efficient. BPM can be used to solve a single glitch or to create one unifying system to consolidate a myriad of processes.
answer
true
question
Which of the following is not a reason for the growth of decision-making information systems?
answer
People no longer have to worry about protecting the corporate asset of organizational information
question
Who is responsible for ensuring the security of IT systems and developing strategies and IT safeguards against attacks from hackers and viruses?
answer
CSO
question
Which part of the value chain includes firm infrastructure, human resources management, technology development, and procurement?
answer
support value activities
question
What do most companies measure to determine the success of their websites?
answer
traffic
question
Understanding information technology begins with gaining an understanding of how businesses function and IT's role in creating efficiencies and effectiveness across the organization. How do typical businesses operate?
answer
By functional areas By silos By functional silos Correct answer= All of the above
question
t/f? IT enables business success and innovation
answer
true
question
What integrates all of an organization's business process to make individual processes more efficient?
answer
Business process management
question
Which of the following is an example of transactional information?
answer
Withdrawing cash from an ATM Making an airline reservation Purchasing stock
question
What is the study of the impact that changes in one (or more) parts of the model have on other parts of the model?
answer
sensitivity analysis
question
What is the analysis and redesign of workflow within and between enterprises?
answer
Business process reengineering
question
What is drill-down capability?
answer
Enables users to get details, and details of details, of information.
question
t/f?Business process management integrates all of an organization's business process to make individual processes more efficient. BPM can be used to solve a single glitch or to create one unifying system to consolidate a myriad of processes.
answer
true
question
How do decision-making information systems work?
answer
By building models out of organizational information to lend insight into important business issues and opportunities
question
Which company offers a strategic business information service using artificial intelligence that enables organizations to track the product offering, pricing policies, and promotions of online competitors?
answer
RivalWatch
question
What does BPR assume about the current process in the extreme?
answer
Current process is irrelevant Current process is broken Current process must be overhauled from scratch Correct answer = All of the above
question
Which of the following can an AI system perform?
answer
Learn or understand from experience Make sense of ambiguous or contradictory information Use reasoning to solve problems and make decisions effectively Correct answer = All of the above
question
t/f? Business process reengineering is the analysis and redesign of workflow within and between enterprises.
answer
true
question
What are the most sought after traits in up-and-coming executives?
answer
Decision-making and problem-solving
question
Which of the following is a key step involved in the business process improvement model?
answer
Document As-Is process Measure performance Establish measures
question
What can a model accomplish?
answer
Calculate risks Understand uncertainty Manipulate time
question
What is the ultimate goal of AI?
answer
Mimic human intelligence
question
t/f?A business process is the analysis and redesign of workflow within and between enterprises.
answer
false
question
Examining business processes can help an organization achieve all of the following, except:
answer
Separate related activities
question
What is a customer facing process?
answer
Result in a product or service that is received by an organization's external customer
question
t/f? Purchasing stocks is an example of analytical information.
answer
false
question
Which type of AI system assigns values of 0 and 1 to vague or ambiguous information?
answer
Fuzzy logic
question
t/f? Product development is a customer facing business process.
answer
true
question
Business process modeling (or mapping) is the activity of creating a detailed flow chart or process map of a work process showing:
answer
Inputs, tasks, and activities in a structured sequence
question
Which of the following represents a mathematical method of handling imprecise or subjective information?
answer
Fuzzy logic
question
What is the process called when waiting in line at the grocery store?
answer
checkout
question
Which of the following is an incorrect enterprise view of information technology?
answer
Processing is OLTP for executives and OLAP for analysts
question
Which company in the text uses an extranet for its suppliers so they can view detailed product information?
answer
walmart
question
What involves the use of strategies and technologies to transform government by improving the delivery of services and enhancing the quality of interaction between the citizen-consumer within all branches of government?
answer
Egovernment
question
Electronic data interchange (EDI) is a standard format for exchanging business data. t/f?
answer
true
question
What refers to using the Internet to reassemble buyers, sellers, and other partners in a traditional supply chain in new ways?
answer
Reintermediation
question
What is a website or web application that uses content form more than one source to create a completely new service?
answer
web mashup
question
What measures the visitor interactions with the target ad?
answer
interactivity
question
What is a company that offers an organization access over the Internet to systems and related services that would otherwise have to be located in personal or organizational computers?
answer
Application service provider (ASP)
question
Which of the following is not a valid type of emarketplace revenue model?
answer
loyalty fee
question
Which business type describes Barnes and Noble?
answer
Click-and-mortar business
question
Which of the following is an example of a disruptive technology?
answer
Oracle's database software Sony's transistor-based consumer electronics (transistor radio) Intel's low-end microprocessor
question
Which of the following are the primary challenges to ebusiness models?
answer
Providing security Adhering to taxation rules Protecting customers
question
What is the distribution of audio or video files over the Internet to play on mobile devices and personal computers?
answer
Podcasting
question
What is a business that operates in a physical store and on the Internet?
answer
Click-and-mortar business
question
What type of egovernment ebusiness model does Lockheed Martin use?
answer
B2G
question
What is an emall?
answer
Serves as a gateway through which a visitor can access other eshops
question
What is an approach to conducting electronic business on the Internet?
answer
Ebusiness model
question
Which of the following is not an online business payment method?
answer
Financial cybermediary
question
What is a device that is around the same size as a credit card, containing embedded technologies that can store information and small amounts of software to perform some limited processing?
answer
SMART CARD
question
Which act protects investors by improving the accuracy and reliability of corporate disclosures?
answer
Sarbanes-Oxley Act
question
What is the ideal type of decisions for people in an organization to make?
answer
Legal and ethical
question
Which of the following is included in the four quadrants of ethical and legal behavior?
answer
Legal behavior and ethical behavior Illegal behavior and ethical behavior Legal behavior and unethical behavior Correct answer = All of the above
question
What is a small file deposited on a hard drive by a website containing information about customers and their Web activities?
answer
COOKIE
question
What is it called when you may use copyrighted material in certain situations — for example, in the creation of new work or, within certain limits, for teaching purposes?
answer
Fair Use Doctrine
question
Which is a virus that opens a way into the network for future attacks?
answer
Backdoor programs
question
What is a type of virus that spreads itself, not just from file to file, but also from computer to computer?
answer
WORM
question
What is social engineering?
answer
Using one's social skills to trick people into revealing access credentials or other information valuable to the attacker
question
What are the policies and procedures that address the ethical use of computers and Internet usage in the business environment?
answer
Epolicies
question
T/FInformation security is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization.
answer
TRUE
question
Which of the following does a firewall perform?
answer
Examines each message that wants entrance to the network Blocks messages without the correct markings from entering the network Detects computers communicating with the Internet without approval
question
Which of the following is an example of acting ethically?
answer
Individuals copy, use, and distribute software. Employees search organizational databases for sensitive corporate and personal information. Individuals hack into computer systems to steal proprietary information. Correct answer = None of the above
question
What is the identification of a user based on a physical characteristic, such as a fingerprint, iris, face, voice, or handwriting?
answer
Biometrics
question
What is the legal protection afforded an expression of an idea, such as a song, video game, and some types of proprietary documents?
answer
Copyright
question
Which of the following is a program or device that can monitor data traveling over a network?
answer
SNIFFER
question
What are the technologies available to help prevent and build resistance to attacks?
answer
Content filtering, encryption, firewalls
question
What is the unauthorized use, duplication, distribution, or sale of copyrighted software?
answer
Pirated software
question
Which of the following is not considered an epolicy?
answer
Anti-hacker use policy
question
T/F?Information technology monitoring tracks people's activities by such measures as number of keystrokes, error rate, and number of transactions processed.
answer
TRUE
question
Which policy ensures that the users know how to behave at work and that the organization has a published standard through which to deal with user infractions?
answer
Ethical computer use policy
question
What is one of the major problems with email?
answer
User's expectation of privacy
question
What is the ability to purchase goods and services through a wireless Internet-enabled device?
answer
Mobile commerce
question
What is a business that operates on the Internet only without a physical store?
answer
PURE PLAY
question
What is information reach?
answer
Refers to the number of people a business can communicate with, on a global basis
question
Which of the following is not an ebusiness security technology?
answer
SEO
question
What is the reason why Polaroid went bankrupt?
answer
One-hour film processing and digital cameras stole its market share
question
Which of the following is not a common tool for accessing Internet information?
answer
WISP
question
Which of the following offers an extensive array of unique services such as its own version of a web browser?
answer
Online service provider (OSP)
question
What is a community of fantasy?
answer
People participate in imaginary environments, such as fantasy football teams and playing one-on-one with Michael Jordan
question
t/f? Benchmarks are baseline values the system seeks to attain.
answer
true
question
Which country is ranked first in terms of egovernment effectiveness?
answer
canada
question
Which of the following is a type of effectiveness IT metric?
answer
usability
question
t/f? Job titles, roles, and responsibilities do not differ from organization to organization.
answer
false
question
What refers to applications and technologies that are used to gather, provide access to, and analyze data and information to support decision-making efforts?
answer
Business intelligence
question
What must an individual anticipating a successful career in business, whether it is in accounting, finance, human resources, or operations management, understand?
answer
Information technology basics Roles and responsibilities in information technology Measuring information technology's success
question
Which information culture encourages employees across departments to be open to new insights about crisis and radical changes and seek ways to create competitive advantages?
answer
Information-discovery culture
question
Which of the following is considered data?
answer
quantity sold
question
An entry barrier is typically used to influence the rivalry among existing competitors.
answer
false
question
What is high when competition is fierce in a market and low when competition is more complacent?
answer
rivalry among existing competitors
question
What is the buying and selling of goods and services over the Internet?
answer
Ecommerce
question
Which of the following is not a C2C community?
answer
Communities of business
question
What applies to any business that sells its products or services to consumers over the Internet?
answer
B2C
question
What are companies that use the Internet to distribute copyrighted content, including news, music, games, books, movies, and many other types of information?
answer
Content providers
question
Which of the following are the primary challenges to the ebusiness models?
answer
All choices Protecting customers Providing security Adhering to taxation rules
question
Which company is expecting to gain the majority of its returns on existing investments?
answer
Phillips Petroleum
question
What is a set of methods aimed at improving the ranking of a website in search engine listings?
answer
SEO
question
Which of the following represents any business that sells its products or services to consumers over the Internet?
answer
B2C
question
What is the exact pattern of a consumer's navigation through a website?
answer
Clickstream data
question
Dell computers ranks highest on the list for expecting returns from new investments.
answer
true
question
What is a pop-up ad?
answer
A small web page containing an advertisement that appears on the web page outside of the current website loaded in the web browser
question
What are agents, software, or businesses that bring buyers and sellers together that provide a trading infrastructure to enhance ebusiness?
answer
Intermediaries
question
What is an evolving extension of the World Wide Web in which web content can be expressed not only in natural language, but also in a format that can be read and used by software agents, thus permitting them to find, share, and integrate information more easily?
answer
Semantic Web
question
Which ebusiness model is Carfax using?
answer
B2C
question
Which of the following represents businesses buying from and selling to each other over the Internet?
answer
B2B
question
What are intermediaries that aggregate three services for market participants (1) a place to trade, (2) rules to govern trading, and (3) an infrastructure to support trading?
answer
Market Makers
question
What type of online auction occurs when sellers and buyers solicit consecutive bids from each other and prices are determined dynamically?
answer
Electronic auction
question
What is mass customization?
answer
The ability of an organization to give its customers the opportunity to tailor products or services to customer's specifications
question
Which of the following is an example of a sustaining technology?
answer
Porsche's faster car
question
Which company in the text used a kiosk to secure a sale?
answer
Mazda
question
Which of the following is not a term associated with web 3.0?
answer
Evolution toward web 4.0
question
Which of the following is not one of the three primary information security areas?
answer
Prevention and response
question
Which of the following is considered an ePolicy?
answer
Acceptable use policy All choices provided Ethical computer use policy Internet use policy
question
Which act allows any person to examine government records unless it would cause an invasion of privacy?
answer
Freedom of Information Act
question
What occurs when an organization uses software that filters content to prevent the transmission of unauthorized information?
answer
Content filtering
question
What is software that is manufactured to look like the real thing and sold as such?
answer
Counterfeit software
question
What attacks computer systems by transmitting a virus hoax, with a real virus attached?
answer
Hoaxes
question
Information security is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization.
answer
true
question
Information security policies detail how an organization will implement the information security plan
answer
false
question
What is the most common type of defense within detection and response technologies
answer
Antivirus software
question
What is encryption?
answer
Scrambles information into an alternative form that requires a key or password to decrypt the information
question
Where do organizations typically place firewalls?
answer
Between the server and the Internet
question
What is a program, when installed on a computer, records every keystroke and mouse click?
answer
Key logger software
question
Which policy details the extent to which email messages may be read by others?
answer
Email privacy policy
question
Which policy is it common practice for many businesses and educational facilities to require employees or students to sign before being granted a network ID?
answer
Acceptable use policy
question
Which of the following can be completed by encryption?
answer
Switch the order of characters Replace characters with other characters Use a mathematical formula to convert the information into some sort of code All of the above
question
Which of the following is part of the acceptable use policy stipulations?
answer
Not using the service as part of violating any law Not attempting to break the security of any computer network or user Not posting commercial messages to groups without prior permission All of the above
question
Which of the following is an example of the way information technology can reduce supplier power for an organization and create a competitive advantage?
answer
Reverse auction
question
which of the following represents the order of priority for the three primary organizational key resources?
answer
People, information, information technology
question
which part of the value chain acquires raw materials and manufactures, delivers, markets, sells, and provides after-sales services?
answer
Primary value activities
question
Who is responsible for ensuring the security of IT systems and developing strategies and IT safeguards against attacks from hackers and viruses?
answer
CSO
question
which of the following is a broad function of a CIO?
answer
all choices listed
question
which information culture allows employees to use information as a means of exercising influence or power over others?
answer
Information-functional culture
question
Which of the following are the primary requirements management wants to satisfy by building new IT systems?
answer
All of the above (faster, better, minimum cost)
question
What are raw facts that describe the characteristics of an event?
answer
data
question
What is data that has been converted into meaningful and useful context?
answer
information
question
Which of the following is not one of the business functions receiving the greatest benefits from IT?
answer
customer
question
Which of the following is not one of Porter's Five Forces?
answer
Threat of substitute buyers
question
Effectiveness IT metrics include throughput, transaction speed, and system availability.
answer
False
question
What is measured by such benchmarks as satisfaction surveys, percentage of existing customers retained, and increases in revenue dollars per customer?
answer
customer satisfaction
question
It is the responsibility of the CIO to ensure effective communications between business and IT personnel.
answer
true
question
Which country is ranked first in terms of egovernment efficiency?
answer
United States
question
What is a business-to-business marketplace?
answer
an internet-based service that brings together many buyers and sellers
question
Which term is used to describe the ease with which people perform transactions and/or find information?
answer
usability
question
What is the name of a company's internal IT department?
answer
All of the above (MIS, IS, IT)
question
Which of the following is Hummer using as its generic strategy?
answer
focused differentiation
question
Which of the following represents the relationship between functional areas in a business?
answer
interdependent
question
All of the following are part of Porter's Three Generic Strategies, except:
answer
business process strategy
question
Job titles, roles, and responsibilities do not differ from organization to organization.
answer
false
question
What do cargo transport systems, book distribution centers, the video game market, a flu epidemic, and an ant colony have in common?
answer
they are all complex adaptive systems and thus share some characteristics
question
A shopping bot is one of the simplest examples of an intelligent agent.
answer
true
question
A business process is the analysis and redesign of workflow within and between enterprises.
answer
false
question
Business process reengineering is the analysis and redesign of workflow within and between enterprises.
answer
true
question
Which industry has been relying on neural network technology for over two decades?
answer
finance
question
Which company used BPR to change its industry by implementing a mobile claims process?
answer
progressive insurance
question
Which system differentiates an executive information system from a decision support system and a transaction processing system?
answer
stock market information system
question
What is the activity of creating a detailed flow chart or process map of a work process showing its inputs, tasks, and activities, in a structured sequence?
answer
business process modeling
question
What is the purpose of business process reengineering?
answer
to make all business processes best in class
question
Product development is a customer facing business process.
answer
true
question
What type of AI system is best for making decisions including identifying patterns or image recognition?
answer
neural network
question
What encompasses all of the information contained within a single business process or unit of work and its primary purpose is to support the performing of daily operational tasks?
answer
transactional information
question
Which type of model shows the results of applying change improvement opportunities to the current process model?
answer
to-be process model
question
Sensitivity analysis, what-if analysis, and market basket analysis are the three quantitative models typically used by a DSS.
answer
false
question
Which of the following is a quantitative model typically used by a DSS?
answer
all of the above
question
Purchasing stocks is an example of analytical information.
answer
false
question
Which of the following should a business follow for success?
answer
business processes should drive technology choices
question
Which of the following is an example of a business process?
answer
all of the above
question
What is an Internet retailer that has no physical store?
answer
none of the choices listed
question
What is a standard format for exchanging business data?
answer
electronic data interchange
question
Which of the following is not a method marketing and sales departments use to generate revenue on the Internet?
answer
ISP
question
Which of the following is not one of the three services provided by market makers for market participants?
answer
rules to govern business
question
Which of the following is not a common ISP service?
answer
real simple syndication
question
What is a community of interest?
answer
people interact with each other on specific topics, such as golfing and stamp collecting
question
Which of the following is not a common form of service provider?
answer
RSS
question
What was the initial name of the Internet?
answer
ARPANET
question
What is the digital divide?
answer
occurs when those with access to technology have great advantages over those without access to technology
question
What is a financial cybermediary?
answer
an internet-based company that facilitates payments over the internet
question
What defines the specific responsibilities of the service provider and sets the customer expectations?
answer
service level agreement
question
What is an online ad?
answer
a box running across a web page that is often used to contain ads
question
What is a family of web feed formats used for web syndication of programs and content?
answer
RSS
question
What is a global public network of computer networks that pass information from one to another using common computer protocols?
answer
internet
question
Which company is expecting to gain the majority of its returns on new investments?
answer
dell computer
question
What is an electronic marketplace?
answer
Interactive business communities providing a central market space where multiple buyers and sellers can engage in ebusiness activities
question
What is a standard electronic process for B2B market purchase payments?
answer
financial EDI
question
What is a contractual stipulation that ensures that ebusiness participants do not deny their online actions?
answer
nonrepudiation
question
What is spam?
answer
a form of unsolicited email
question
Which policy ensures that the users know how to behave at work and that the organization has a published standard through which to deal with user infractions?
answer
ethical computer use policy
question
Which policy contains general principles regarding information privacy?
answer
information privacy policy
question
Which act prohibits the use of video rental information on customers for any purpose other than that of marketing goods and services directly to the consumer?
answer
bork bill
question
What identifies the rules required to maintain information security?
answer
information security policies
question
If there is a security breech on your organizational information systems, which information security area is best suited to handle the breech?
answer
detection and response
question
Information technology monitoring tracks people's activities by such measures as number of keystrokes, error rate, and number of transactions processed.
answer
true
question
What is the forging of the return address on an email so that the email message appears to come from someone other than the actual sender?
answer
spoofing
question
Which act strengthened criminal laws against identity theft?
answer
none of the above
question
Opt-in implies that the customers will only be contacted if they agreed to receive promotions and marketing material.
answer
true
question
What was the primary problem Saab encountered with one of its marketing companies?
answer
Contacted customers regardless of their opt-out or opt-in decision
question
What is the most costly and intrusive form of authentication?
answer
Something that is part of the user such as a fingerprint or voice signature