MIS test 2 – Flashcards

Unlock all answers in this set

Unlock answers
question
eBay buyers voluntarily comment to other users and sellers on the quality of service, promptness of shipping, and their general satisfaction with the product. This is one of the most popular examples of user-generated content and is called ____________. Explicit system Knowledge system Reputation system User-generated sales cycle
answer
Reputation system
question
Which of the following represents the primary ebusiness revenue models? B2B, B2C, C2C, C2B Content providers, infomediaries, online marketplaces, portals, service providers, transaction brokers Advertising fees, license fees, subscription fees, transaction fees, value-added services fees Email, instant messaging, podcasting, content management systems, videoconferencing, web conferencing
answer
Advertising fees, license fees, subscription fees, transaction fees, value-added services fees
question
What is the best way to measure a company's ebusiness success? Effective MIS metrics Clickstream data All of these Interactivity
answer
All of these
question
Which of the following represents the primary forms of ebusiness? B2B, B2C, C2C, C2B Content providers, infomediaries, online marketplaces, portals, service providers, transaction brokers Email, instant messaging, podcasting, content management systems, videoconferencing, web conferencing Advertising fees, license fees, subscription fees, transaction fees, value-added services fees
answer
Content providers, infomediaries, online marketplaces, portals, service providers, transaction brokers
question
Which of the following demonstrates potential issues with Business 2.0 and information vandalism? Open source allows anyone to be able to edit, damage, or destroy content Decreases in employee productivity Copyright protection Decreases in process productivity
answer
Open source allows anyone to be able to edit, damage, or destroy content
question
Which of the following identifies Business 2.0 communication and collaboration tools? API, RSS, tacit knowledge Microblogs, tweets, RSS Blogs, wikis, mashup Tags, web logs, RSS
answer
Blogs, wikis, mashup
question
What is the difference between a B2C and a C2B? B2C focuses on consumers as customers, and C2B focuses on companies as customers. B2C focuses on business to consumers, and C2B focuses on consumers to business. B2C focuses on collaboration, and C2B focuses on consumers. B2C focuses on companies as customers, and C2B focuses on consumers as customers.
answer
B2C focuses on business to consumers, and C2B focuses on consumers to business.
question
What are the four challenges facing ebusinesses outlined in the text? Differs depending on the industry where the business operates Identifying limited market segments, managing consumer trust, ensuring consumer protection, and improving information content Decreased costs, increased convenience, identifying limited market segments, and adhering to taxation rules Identifying limited market segments, managing consumer trust, ensuring consumer protection, and adhering to taxation rules
answer
Identifying limited market segments, managing consumer trust, ensuring consumer protection, and adhering to taxation rules
question
Which of the following is not a characteristic of Business 2.0? Eliminates entry barriers to publishing on the web Technical skills are required Encourages user participation Provides an exciting and vibrant virtual environment
answer
Technical skills are required
question
Which type of ebusiness model best describes Apple? Click-and-mortar Brick-and-mortar Pure play Virtual
answer
Click-and-mortar
question
The Innovator's Dilemma suggests that established companies can take advantage of ___________ without hindering existing relationships with customers, partners, and stakeholders. Sustaining technology Disruptive technology Collective intelligence Existing investments
answer
Disruptive technology
question
Which of the following are challenges of Business 2.0? All of these Information vandalism Technology dependence Violations of copyright and plagiarism
answer
All of these
question
Social tagging describes the collaborative activity of marking shared online content with keywords or tags as a way to ______________. Organize it for future search Organize it for future navigation All of these Organize it for future filtering
answer
All of these
question
Amazon creates a unique recommendation listing for each customer that revisits its website. How would you classify Amazon's ebusiness strategy? Personalization Mass customization Interactivity Information richness
answer
Personalization
question
What do Netflix and Amazon use to drive their recommendation tools? Open source content Virtual content Web 1.0 content User-generated content
answer
User-generated content
question
Which ebusiness tool increases the speed of business by allowing the transfer of documents with the same speed as the telephone? Podcasting Ebusiness Email Knowledge management system
answer
Email
question
What is the difference between a wiki and a blog? A wiki is original content; a blog is used sources. A wiki is free; a blog has a subscription fee. All of these A wiki user can alter the original content of an article; a blog user can only add information as a comment.
answer
A wiki user can alter the original content of an article; a blog user can only add information as a comment.
question
What is a potential problem or impact of technology dependence? How do people or businesses function if the connection is down? Outages hold potentially great havoc for people, businesses, and educational institutions that rely heavily on technology. Many have a need to be continuously connected for every activity that potentially eliminates crucial in-person social skills and could stunt psychological growth. All of these
answer
All of these
question
What is the difference between ecommerce and ebusiness? Ecommerce includes ecommerce and all activities related to internal and external business operations; ebusiness includes all of the of knowledge management systems. Ecommerce is buying and selling of goods or services online; ebusiness includes ecommerce and all activities related to internal and external business operations. Ebusiness is buying and selling of goods or services online; ecommerce includes ecommerce and all activities related to internal and external business operations. Ecommerce includes Internet network effects; ebusiness includes ecommerce and all activities related to internal and external business operations.
answer
Ecommerce is buying and selling of goods or services online; ebusiness includes ecommerce and all activities related to internal and external business operations.
question
Which of the following statements describes Web 3.0's feature that ensures the "integration of legacy devices"? The ability to use current devices such as iPhone and laptops as credit cards or tickets The design of software to be easily integrated and work together The ability for software to be distributed and accessed from anywhere The design of websites and other software so they can be easily integrated and work together
answer
The ability to use current devices such as iPhone and laptops as credit cards or tickets
question
What is roughly 1 million bytes? Kilobyte Megabyte Terabyte Gigabyte
answer
Megabyte
question
What is the arithmetic logic unit? Equipment that interprets software instructions and literally tells the other hardware devices what to do, based on the software instructions Equipment that performs all arithmetic operations (e.g., addition and subtraction) and all logic operations (such as sorting and comparing numbers) The actual hardware that interprets and executes the program (software) instructions and coordinates how all the other hardware devices work together A type of CPU that can recognize as many as 100 or more instructions, enough to carry out most computations directly
answer
Equipment that performs all arithmetic operations (e.g., addition and subtraction) and all logic operations (such as sorting and comparing numbers)
question
What is application software? Is used for specific information processing needs, including payroll, customer relationship management, project management, training, and many others Provides additional functionality to the operating system Controls how the various technology tools work together along with the application software Controls the application software and manages how the hardware devices work together
answer
Is used for specific information processing needs, including payroll, customer relationship management, project management, training, and many others
question
What is a complex instruction set computer chip? Equipment that performs all arithmetic operations (e.g., addition and subtraction) and all logic operations (such as sorting and comparing numbers) The actual hardware that interprets and executes the program (software) instructions and coordinates how all the other hardware devices work together Equipment that interprets software instructions and literally tells the other hardware devices what to do, based on the software instructions A type of CPU that can recognize as many as 100 or more instructions, enough to carry out most computations directly
answer
A type of CPU that can recognize as many as 100 or more instructions, enough to carry out most computations directly
question
What is hardware? An electronic device operating under the control of instructions stored in its own memory that can accept, manipulate, and store data Any computer-based tool that people use to work with information and support the information and information-processing needs of an organization The set of instructions that the hardware executes to carry out specific tasks The physical devices associated with a computer system
answer
The physical devices associated with a computer system
question
Which of the following represents megahertz? A type of CPU that can recognize as many as 100 or more instructions, enough to carry out most computations directly A limit on the number of instructions the CPU can execute to increase processing speed The number of millions of CPU cycles per second The number of billions of CPU cycles per second
answer
The number of millions of CPU cycles per second
question
What is a CPU? The actual hardware that interprets and executes the program (software) instructions and coordinates how all the other hardware devices work together The computer's main memory, which consists of the random access memory (RAM), cache memory, and the read-only memory (ROM) that is directly accessible to the central processing unit (CPU) Equipment designed to store large volumes of data for long-term storage Equipment used to capture information and commands
answer
The actual hardware that interprets and executes the program (software) instructions and coordinates how all the other hardware devices work together
question
What is system software? Controls how the various technology tools work together along with the application software Provides additional functionality to the operating system Is used for specific information processing needs, including payroll, customer relationship management, project management, training, and many others Controls the application software and manages how the hardware devices work together
answer
Controls how the various technology tools work together along with the application software
question
What provides the tools for data retrieval, modification, deletion, and insertion? Desktop publishing Data management Email Groupware
answer
Data management
question
What is an older secondary storage medium that uses a strip of thin plastic coated with a magnetically sensitive recording medium? Magnetic tape RAM Magnetic medium Hard drive
answer
Magnetic tape
question
What organizes information on a hard disk in the most efficient way? File recovery Cash proof Text protect Disk optimization
answer
Disk optimization
question
What is an input device? The computer's main memory, which consists of the random access memory (RAM), cache memory, and the read-only memory (ROM) that is directly accessible to the central processing unit (CPU) Equipment designed to store large volumes of data for long-term storage Equipment used to capture information and commands The actual hardware that interprets and executes the program (software) instructions and coordinates how all the other hardware devices work together
answer
Equipment used to capture information and commands
question
What is software? The set of instructions that the hardware executes to carry out specific tasks The physical devices associated with a computer system An electronic device operating under the control of instructions stored in its own memory that can accept, manipulate, and store data Any computer-based tool that people use to work with information and support the information and information-processing needs of an organization
answer
The set of instructions that the hardware executes to carry out specific tasks
question
What is similar to a desktop but has more powerful mathematical and graphics processing capabilities and can perform more complicated tasks in less time? PDA Tablet Minicomputer Workstation
answer
Workstation
question
What is information technology? The physical devices associated with a computer system The set of instructions that the hardware executes to carry out specific tasks Any computer-based tool that people use to work with information and support the information and information-processing needs of an organization An electronic device operating under the control of instructions stored in its own memory that can accept, manipulate, and store data
answer
Any computer-based tool that people use to work with information and support the information and information-processing needs of an organization
question
Applications allowed to be placed on the corporate network, like IM software, and corporate computer equipment used for personal reason on personal networks are two areas that should be addressed by managers in which of the following company policies? Information technology plan Information security policies Information ethics policy All of these
answer
Information security policies
question
The most secure procedures combine which of the following authentication and authorization techniques? All of these Something that is part of the user, such as a fingerprint or voice signature Something the user knows, such as a user ID and password Something the user has, such as a smart card or token
answer
All of these
question
Employees need to understand that email privacy exists to an extent and that corporate email is solely owned by _________. The company The human resources department The individual user The individual user's department
answer
The company
question
What is the primary difference between a worm and a virus? A virus is copied and spread by a person, whereas a worm takes a string of tag words and deletes websites. All of these A virus must attach to something to spread, whereas a worm does not need to attach to anything to spread and can tunnel itself into the computer. A worm must attach to something to spread, whereas a virus does not need to attach to anything to spread and can tunnel itself into the computer.
answer
A virus must attach to something to spread, whereas a worm does not need to attach to anything to spread and can tunnel itself into the computer.
question
Social media can be a very valuable tool for a company if used properly. Which of the following represents social media uses for a company? All of these Protecting the company reputation through counter-damage control Engaging directly with customers and prospective customers Building a strong brand identity
answer
All of these
question
What is an Internet monitoring technique that captures keystrokes on their journey from the keyboard to the motherboard? Hardware key logger Web log Adware Spyware
answer
Hardware key logger
question
Trust among companies, customers, partners, and suppliers is the support structure of which of the following? Ebusiness Epolicies Esoftware Eharmony
answer
Ebusiness
question
What includes a variety of threats such as viruses, worms, and Trojan horses? Malicious code Spoofing Sniffer Hoaxes
answer
Malicious code
question
Which of the following is a cost of downtime in addition to lost revenue? Loss in financial performance Legal expenses All of these Damage to reputation
answer
All of these
question
In the information technology world, which of the following are examples of ethical issues that a company may have to manage? Employees intentionally creating or spreading viruses to confuse IT Employees copying and distributing company-owned software Employees searching other employees' private information without consent All of the following
answer
All of the following
question
Which of the following would you find in a typical Internet use policy? User responsibility for properly handling offensive material User responsibility for protecting the company's good name User ramifications if the policy is violated All of these
answer
All of these
question
All of the following are types of information security breaches except: Insiders Ediscovery E-espionage Dumpster diving
answer
Ediscovery
question
Which of the following is served as key evidence in many legal cases today and also provides a faster, easier way to search and organize paper documents? Privacy policies Digital information Information ethics Confidentiality
answer
Digital information
question
Jensen is a senior developer for HackersRUs, a company that helps secure management information systems. Jensen's new task is to break into the computer system of one of HackersRUs's top clients to identify system vulnerabilities and plug the holes. What type of hacker is Jensen? White-hat hacker Black-hat hacker Cracker Script bunnies
answer
White-hat hacker
question
What area of information security focuses on preventing identity theft, phishing, and pharming scams? Detection and authorizing Authentication and authorization Prevention and resistance Detection and response
answer
Authentication and authorization
question
What can encryption technology perform? Switch the order of characters Replace characters with other characters All of these Insert or remove characters
answer
All of these
question
A smart card is a device, the size of a credit card, that contains embedded technology that stores information and small amounts of software and can act as __________________. Identification instruments All of these A data storage device A form of digital cash
answer
All of these
question
Which of the following is an example of a way to maintain information security that a company should include in its information security policies? Never sharing user or password information with anyone Changing passwords every 30 to 60 days All of these Requiring computer users to log off before leaving for lunch
answer
All of these
question
According to the ethical computer use policy, users should be ______________ of the rules and, by agreeing to use the system on that basis, _______________ to abide by the rules. Consent, informed Consent, information Informed, collaborate Informed, consent
answer
Informed, consent
question
Determining what is ethical can sometimes be difficult because certain actions can be justified or condemned, depending on how you view the relationship between ________ and ________. Legal and ethical Confidential and open Legal and confidential Legal and technical
answer
Legal and ethical
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New