Sie sind auf Seite 1von 40

Question 1

Not yet answered


Marked out of 2.00

Flag question
Question text
Data mining refers to the process of searching valuable business
information in a large database, data warehouse or data mart.
Select one:
a. False
b. True
Question 2
Not yet answered
Marked out of 1.00

Flag question
Question text
_____ auctions are the most common auction model for large
purchases.
Select one:
a. None of the above
b. Static
c. Forward
d. Reverse
Question 3
Not yet answered
Marked out of 1.00

Flag question
Question text
IT security is the responsibility of everyone in the organization.
Select one:
a. True
b. False
Question 4
Not yet answered
Marked out of 1.00

Flag question
Question text
E-commerce affects only businesses that sell products online.
Select one:
a. True
b. False
Question 5
Not yet answered
Marked out of 1.00

Flag question
Question text
Unintentional threats to information systems include all of the following
except:
Select one:
a. malicious software
b. tornados
c. power outage
d. lack of user experience
Question 6
Not yet answered
Marked out of 1.00

Flag question
Question text
The ratio between organizational inputs and outputs is an indication of
the organization's productivity.
Select one:
True
False
Question 7
Not yet answered
Marked out of 1.00

Flag question
Question text
You can always trust the content of Web 2.0 sites.
Select one:
a. False
b. True
Question 8
Not yet answered
Marked out of 1.00

Flag question
Question text
____________ restrict unauthorized individuals from using information
resources and are concerned with user identification.
Select one:
a. Physical controls
b. Administrative controls
c. Access controls
d. Communication controls
Question 9
Not yet answered
Marked out of 1.00

Flag question
Question text
In this type of e-commerce, the sellers and buyers are organizations.
Select one:
a. business to business
b. consumer to consumer
c. consumer to business
d. business to consumer
Question 10
Not yet answered
Marked out of 1.00

Flag question
Question text
In _________ , the organization purchases insurance as a means to
compensate for any loss.
Select one:
a. risk management
b. risk transference
c. risk acceptance
d. risk analysis
Question 11
Not yet answered
Marked out of 2.00

Flag question
Question text
Has a way of fouling up people's lives, especially when the party with
the inaccurate information has an advantage in power and authority.

Answer:
- Misinformation
Question 12
Not yet answered
Marked out of 1.00

Flag question
Question text
True or False: Information is the means through which the minds
expands and increases its capacity to achieve its goals, often as the
result of an input from another mind.

Answer:
- Information Definition
Question 13
Not yet answered
Marked out of 1.00

Flag question
Question text
True or False: The growth of information technology, with its
enhanced capacity for surveillance, communication, computation,
storage, and retrieval.

Answer:
- True
Question 14
Not yet answered
Marked out of 2.00

Flag question
Question text
Biometrics are an example of:
Select one:
a. something the user does.
b. something the user wants.
c. something the user has.
d. something the user knows.
Question 15
Not yet answered
Marked out of 1.00

Flag question
Question text
This information is closely related to property right.

Answer:
- Property
Question 16
Not yet answered
Marked out of 1.00

Flag question
Question text
Having one backup of your business data is sufficient for security
purposes.
Select one:
a. True
b. False
Question 17
Not yet answered
Marked out of 1.00

Flag question
Question text
At the end of a semester, a student knows that she must achieve a
grade of 81 or higher on her final exam to get an A in the course. She
has just performed what kind of analysis
Select one:
a. Simulation
b. Goal-seeking
c. What-if
d. Qualitative
e. Sensitivity
Question 18
Not yet answered
Marked out of 2.00

Flag question
Question text
Decision support systems support only lower and middle level
managers.
Select one:
True
False
Question 19
Not yet answered
Marked out of 1.00

Flag question
Question text
In a process called _________, a company allows nothing to run
unless it is approved, whereas in a process called _________, the
company allows everything to run unless it is not approved.
Select one:
a. blacklisting, whitelisting
b. encryption, blacklisting
c. whitelisting, blacklisting
d. whitelisting, encryption
e. encryption, whitelisting
Question 20
Not yet answered
Marked out of 1.00

Flag question
Question text
Being a figurehead and leader is part of the ________ managerial
role.
Select one:
a. informational
b. entrepreneurial
c. confrontational
d. interpersonal
e. decisional
Question 21
Not yet answered
Marked out of 2.00

Flag question
Question text
True or False: Liability means that individuals have the right to recover
the damages done to them by other individuals, organizations, or
systems.

Answer:
- True
Question 22
Not yet answered
Marked out of 1.00

Flag question
Question text
Electronic commerce provides opportunities for companies to do all of
the following except:
Select one:
a. put rich information on their Web sites
b. increase market share
c. expand at relatively high cost
d. expand their reach
Question 23
Not yet answered
Marked out of 1.00

Flag question
Question text
_____ refers to the practice of registering or using domain names for
the purpose of profiting from the goodwill or trademark belonging to
someone else.
Select one:
a. Domain fraud
b. None of the above
c. Cybersquatting
d. Domain spoofing
Question 24
Not yet answered
Marked out of 1.00

Flag question
Question text
________ is the process whereby a fully automated electronic
commerce transaction eliminates middlemen.
Select one:
a. Disintermediation
b. Disintegration
c. Supply chain integration
d. Value-added services
e. Direct sales
Question 25
Not yet answered
Marked out of 2.00

Flag question
Question text
Can be defined as an individual condition of life characterized by
exclusion from publicity.

Answer:
- Privacy
Question 26
Not yet answered
Marked out of 1.00

Flag question
Question text
A wiki is a collection of blogs.
Select one:
a. True
b. False
Question 27
Not yet answered
Marked out of 1.00

Flag question
Question text
Which of the following statements concerning Web 2.0 sites is false?
Select one:
a. They encourage user participation.
b. They harness collective intelligence.
c. They feature remixable applications and data.
d. They cannot be used to start a business.
e. They deliver functionality as services.
Question 28
Not yet answered
Marked out of 1.00

Flag question
Question text
Searching for valuable business information in a database, data
warehouse, or data mart is referred to as ________.
Select one:
a. data mining
b. structured queries
c. expert system queries
d. query by example
e. database queries
Question 29
Not yet answered
Marked out of 2.00

Flag question
Question text
Channel conflict occurs when click-and-mortar companies have
problems with their regular distributors when they sell directly to
customers online.
Select one:
a. False
b. True
Question 30
Not yet answered
Marked out of 1.00

Flag question
Question text
Is the increased value of information in decision-making.

Answer:
- Privacy
Question 31
Not yet answered
Marked out of 1.00

Flag question
Question text
Which of the following is NOT a reason that managers need IT
support?
Select one:
a. number of alternatives is decreasing
b. the need to access remote information sources
c. the need to access remote information sources
d. decisions must typically be made under time pressure
e. decisions are becoming more complex
Question 32
Not yet answered
Marked out of 2.00

Flag question
Question text
This category of privacy concerns all forms of personal communication
which a person wishes to keep private.

Answer:
- Private communications
Question 33
Not yet answered
Marked out of 1.00

Flag question
Question text
True or False: Responsibility is accepting any consequences of
decisions and/or actions.
True
Answer:
- True
Question 34
Not yet answered
Marked out of 1.00

Flag question
Question text
_________ involves building an inappropriate trust relationship with
employees for the purpose of gaining sensitive information or
unauthorized access privileges.
Select one:
a. Phishing
b. Social engineering
c. Tailgating
d. Hacking
e. Spamming
Question 35
Not yet answered
Marked out of 1.00

Flag question
Question text
Which of the following is not a strategy for mitigating the risk of threats
against information?
Select one:
a. Implement controls that minimize the impact of the threat
b. Install controls that block the risk
c. Continue operating with no controls and absorb any damages that
occur
d. All of the above are strategies for mitigating risk
e. Transfer the risk by purchasing insurance
Question 36
Not yet answered
Marked out of 1.00

Flag question
Question text
LinkedIn is a _____________social networking site that makes money
from advertising and services.
Select one:
a. Business-oriented
b. Video-upload
c. College
d. Blogging
e. Training
Question 37
Not yet answered
Marked out of 1.00

Flag question
Question text
True or False: Information forms the intellectual capital from which
human beings craft their lives and secure dignity.

Answer:
- True
Question 38
Not yet answered
Marked out of 2.00

Flag question
Question text
A ___________ refers to a choice among two or more alternatives
that individuals and groups make. Decisions are diverse and are made
continuously.
Select one:
a. What if analysis
b. none of the above
c. Management
d. Decision
e. productivity
Question 39
Not yet answered
Marked out of 2.00

Flag question
Question text
Which of the following is not an example of Web 2.0 applications?
Select one:
a. Wikis
b. Social Networks
c. Crowd sourcing
d. Blogs
Question 40
Not yet answered
Marked out of 1.00

Flag question
Question text
In the _____ marketplace model, EC technology is used to streamline
the purchasing process in order to reduce the cost of items
purchased, the administrative cost of procurement, and the
purchasing cycle time.
Select one:
a. electronic exchange
b. group purchasing
c. auctions
d. buy-side
e. sell-side

Das könnte Ihnen auch gefallen