logo image

MIS test 2

eBay buyers voluntarily comment to other users and sellers on the quality of service, promptness of shipping, and their general satisfaction with the product. This is one of the most popular examples of user-generated content and is called ____________.
Explicit system
Knowledge system
Reputation system
User-generated sales cycle
Reputation system
Which of the following represents the primary ebusiness revenue models?
B2B, B2C, C2C, C2B
Content providers, infomediaries, online marketplaces, portals, service providers, transaction brokers
Advertising fees, license fees, subscription fees, transaction fees, value-added services fees
Email, instant messaging, podcasting, content management systems, videoconferencing, web conferencing
Advertising fees, license fees, subscription fees, transaction fees, value-added services fees
What is the best way to measure a company’s ebusiness success?
Effective MIS metrics
Clickstream data
All of these
Interactivity
All of these
Which of the following represents the primary forms of ebusiness?
B2B, B2C, C2C, C2B
Content providers, infomediaries, online marketplaces, portals, service providers, transaction brokers
Email, instant messaging, podcasting, content management systems, videoconferencing, web conferencing
Advertising fees, license fees, subscription fees, transaction fees, value-added services fees
Content providers, infomediaries, online marketplaces, portals, service providers, transaction brokers
Which of the following demonstrates potential issues with Business 2.0 and information vandalism?
Open source allows anyone to be able to edit, damage, or destroy content
Decreases in employee productivity
Copyright protection
Decreases in process productivity
Open source allows anyone to be able to edit, damage, or destroy content
Which of the following identifies Business 2.0 communication and collaboration tools?
API, RSS, tacit knowledge
Microblogs, tweets, RSS
Blogs, wikis, mashup
Tags, web logs, RSS
Blogs, wikis, mashup
What is the difference between a B2C and a C2B?
B2C focuses on consumers as customers, and C2B focuses on companies as customers.
B2C focuses on business to consumers, and C2B focuses on consumers to business.
B2C focuses on collaboration, and C2B focuses on consumers.
B2C focuses on companies as customers, and C2B focuses on consumers as customers.
B2C focuses on business to consumers, and C2B focuses on consumers to business.
What are the four challenges facing ebusinesses outlined in the text?
Differs depending on the industry where the business operates
Identifying limited market segments, managing consumer trust, ensuring consumer protection, and improving information content
Decreased costs, increased convenience, identifying limited market segments, and adhering to taxation rules
Identifying limited market segments, managing consumer trust, ensuring consumer protection, and adhering to taxation rules
Identifying limited market segments, managing consumer trust, ensuring consumer protection, and adhering to taxation rules
Which of the following is not a characteristic of Business 2.0?
Eliminates entry barriers to publishing on the web
Technical skills are required
Encourages user participation
Provides an exciting and vibrant virtual environment
Technical skills are required
Which type of ebusiness model best describes Apple?
Click-and-mortar
Brick-and-mortar
Pure play
Virtual
Click-and-mortar
The Innovator’s Dilemma suggests that established companies can take advantage of ___________ without hindering existing relationships with customers, partners, and stakeholders.
Sustaining technology
Disruptive technology
Collective intelligence
Existing investments
Disruptive technology
Which of the following are challenges of Business 2.0?
All of these
Information vandalism
Technology dependence
Violations of copyright and plagiarism
All of these
Social tagging describes the collaborative activity of marking shared online content with keywords or tags as a way to ______________.
Organize it for future search
Organize it for future navigation
All of these
Organize it for future filtering
All of these
Amazon creates a unique recommendation listing for each customer that revisits its website. How would you classify Amazon’s ebusiness strategy?
Personalization
Mass customization
Interactivity
Information richness
Personalization
What do Netflix and Amazon use to drive their recommendation tools?
Open source content
Virtual content
Web 1.0 content
User-generated content
User-generated content
Which ebusiness tool increases the speed of business by allowing the transfer of documents with the same speed as the telephone?
Podcasting
Ebusiness
Email
Knowledge management system
Email
What is the difference between a wiki and a blog?
A wiki is original content; a blog is used sources.
A wiki is free; a blog has a subscription fee.
All of these
A wiki user can alter the original content of an article; a blog user can only add information as a comment.
A wiki user can alter the original content of an article; a blog user can only add information as a comment.
What is a potential problem or impact of technology dependence?
How do people or businesses function if the connection is down?
Outages hold potentially great havoc for people, businesses, and educational institutions that rely heavily on technology.
Many have a need to be continuously connected for every activity that potentially eliminates crucial in-person social skills and could stunt psychological growth.
All of these
All of these
What is the difference between ecommerce and ebusiness?
Ecommerce includes ecommerce and all activities related to internal and external business operations; ebusiness includes all of the of knowledge management systems.
Ecommerce is buying and selling of goods or services online; ebusiness includes ecommerce and all activities related to internal and external business operations.
Ebusiness is buying and selling of goods or services online; ecommerce includes ecommerce and all activities related to internal and external business operations.
Ecommerce includes Internet network effects; ebusiness includes ecommerce and all activities related to internal and external business operations.
Ecommerce is buying and selling of goods or services online; ebusiness includes ecommerce and all activities related to internal and external business operations.
Which of the following statements describes Web 3.0’s feature that ensures the “integration of legacy devices”?
The ability to use current devices such as iPhone and laptops as credit cards or tickets
The design of software to be easily integrated and work together
The ability for software to be distributed and accessed from anywhere
The design of websites and other software so they can be easily integrated and work together
The ability to use current devices such as iPhone and laptops as credit cards or tickets
What is roughly 1 million bytes?
Kilobyte
Megabyte
Terabyte
Gigabyte
Megabyte
What is the arithmetic logic unit?
Equipment that interprets software instructions and literally tells the other hardware devices what to do, based on the software instructions
Equipment that performs all arithmetic operations (e.g., addition and subtraction) and all logic operations (such as sorting and comparing numbers)
The actual hardware that interprets and executes the program (software) instructions and coordinates how all the other hardware devices work together
A type of CPU that can recognize as many as 100 or more instructions, enough to carry out most computations directly
Equipment that performs all arithmetic operations (e.g., addition and subtraction) and all logic operations (such as sorting and comparing numbers)
What is application software?
Is used for specific information processing needs, including payroll, customer relationship management, project management, training, and many others
Provides additional functionality to the operating system
Controls how the various technology tools work together along with the application software
Controls the application software and manages how the hardware devices work together
Is used for specific information processing needs, including payroll, customer relationship management, project management, training, and many others
What is a complex instruction set computer chip?
Equipment that performs all arithmetic operations (e.g., addition and subtraction) and all logic operations (such as sorting and comparing numbers)
The actual hardware that interprets and executes the program (software) instructions and coordinates how all the other hardware devices work together
Equipment that interprets software instructions and literally tells the other hardware devices what to do, based on the software instructions
A type of CPU that can recognize as many as 100 or more instructions, enough to carry out most computations directly
A type of CPU that can recognize as many as 100 or more instructions, enough to carry out most computations directly
What is hardware?
An electronic device operating under the control of instructions stored in its own memory that can accept, manipulate, and store data
Any computer-based tool that people use to work with information and support the information and information-processing needs of an organization
The set of instructions that the hardware executes to carry out specific tasks
The physical devices associated with a computer system
The physical devices associated with a computer system
Which of the following represents megahertz?
A type of CPU that can recognize as many as 100 or more instructions, enough to carry out most computations directly
A limit on the number of instructions the CPU can execute to increase processing speed
The number of millions of CPU cycles per second
The number of billions of CPU cycles per second
The number of millions of CPU cycles per second
What is a CPU?
The actual hardware that interprets and executes the program (software) instructions and coordinates how all the other hardware devices work together
The computer’s main memory, which consists of the random access memory (RAM), cache memory, and the read-only memory (ROM) that is directly accessible to the central processing unit (CPU)
Equipment designed to store large volumes of data for long-term storage
Equipment used to capture information and commands
The actual hardware that interprets and executes the program (software) instructions and coordinates how all the other hardware devices work together
What is system software?
Controls how the various technology tools work together along with the application software
Provides additional functionality to the operating system
Is used for specific information processing needs, including payroll, customer relationship management, project management, training, and many others
Controls the application software and manages how the hardware devices work together
Controls how the various technology tools work together along with the application software
What provides the tools for data retrieval, modification, deletion, and insertion?
Desktop publishing
Data management
Email
Groupware
Data management
What is an older secondary storage medium that uses a strip of thin plastic coated with a magnetically sensitive recording medium?
Magnetic tape
RAM
Magnetic medium
Hard drive
Magnetic tape
What organizes information on a hard disk in the most efficient way?
File recovery
Cash proof
Text protect
Disk optimization
Disk optimization
What is an input device?
The computer’s main memory, which consists of the random access memory (RAM), cache memory, and the read-only memory (ROM) that is directly accessible to the central processing unit (CPU)
Equipment designed to store large volumes of data for long-term storage
Equipment used to capture information and commands
The actual hardware that interprets and executes the program (software) instructions and coordinates how all the other hardware devices work together
Equipment used to capture information and commands
What is software?
The set of instructions that the hardware executes to carry out specific tasks
The physical devices associated with a computer system
An electronic device operating under the control of instructions stored in its own memory that can accept, manipulate, and store data
Any computer-based tool that people use to work with information and support the information and information-processing needs of an organization
The set of instructions that the hardware executes to carry out specific tasks
What is similar to a desktop but has more powerful mathematical and graphics processing capabilities and can perform more complicated tasks in less time?
PDA
Tablet
Minicomputer
Workstation
Workstation
What is information technology?
The physical devices associated with a computer system
The set of instructions that the hardware executes to carry out specific tasks
Any computer-based tool that people use to work with information and support the information and information-processing needs of an organization
An electronic device operating under the control of instructions stored in its own memory that can accept, manipulate, and store data
Any computer-based tool that people use to work with information and support the information and information-processing needs of an organization
Applications allowed to be placed on the corporate network, like IM software, and corporate computer equipment used for personal reason on personal networks are two areas that should be addressed by managers in which of the following company policies?
Information technology plan
Information security policies
Information ethics policy
All of these
Information security policies
The most secure procedures combine which of the following authentication and authorization techniques?
All of these
Something that is part of the user, such as a fingerprint or voice signature
Something the user knows, such as a user ID and password
Something the user has, such as a smart card or token
All of these
Employees need to understand that email privacy exists to an extent and that corporate email is solely owned by _________.
The company
The human resources department
The individual user
The individual user’s department
The company
What is the primary difference between a worm and a virus?
A virus is copied and spread by a person, whereas a worm takes a string of tag words and deletes websites.
All of these
A virus must attach to something to spread, whereas a worm does not need to attach to anything to spread and can tunnel itself into the computer.
A worm must attach to something to spread, whereas a virus does not need to attach to anything to spread and can tunnel itself into the computer.
A virus must attach to something to spread, whereas a worm does not need to attach to anything to spread and can tunnel itself into the computer.
Social media can be a very valuable tool for a company if used properly. Which of the following represents social media uses for a company?
All of these
Protecting the company reputation through counter-damage control
Engaging directly with customers and prospective customers
Building a strong brand identity
All of these
What is an Internet monitoring technique that captures keystrokes on their journey from the keyboard to the motherboard?
Hardware key logger
Web log
Adware
Spyware
Hardware key logger
Trust among companies, customers, partners, and suppliers is the support structure of which of the following?
Ebusiness
Epolicies
Esoftware
Eharmony
Ebusiness
What includes a variety of threats such as viruses, worms, and Trojan horses?
Malicious code
Spoofing
Sniffer
Hoaxes
Malicious code
Which of the following is a cost of downtime in addition to lost revenue?
Loss in financial performance
Legal expenses
All of these
Damage to reputation
All of these
In the information technology world, which of the following are examples of ethical issues that a company may have to manage?
Employees intentionally creating or spreading viruses to confuse IT
Employees copying and distributing company-owned software
Employees searching other employees’ private information without consent
All of the following
All of the following
Which of the following would you find in a typical Internet use policy?
User responsibility for properly handling offensive material
User responsibility for protecting the company’s good name
User ramifications if the policy is violated
All of these
All of these
All of the following are types of information security breaches except:
Insiders
Ediscovery
E-espionage
Dumpster diving
Ediscovery
Which of the following is served as key evidence in many legal cases today and also provides a faster, easier way to search and organize paper documents?
Privacy policies
Digital information
Information ethics
Confidentiality
Digital information
Jensen is a senior developer for HackersRUs, a company that helps secure management information systems. Jensen’s new task is to break into the computer system of one of HackersRUs’s top clients to identify system vulnerabilities and plug the holes. What type of hacker is Jensen?
White-hat hacker
Black-hat hacker
Cracker
Script bunnies
White-hat hacker
What area of information security focuses on preventing identity theft, phishing, and pharming scams?
Detection and authorizing
Authentication and authorization
Prevention and resistance
Detection and response
Authentication and authorization
What can encryption technology perform?
Switch the order of characters
Replace characters with other characters
All of these
Insert or remove characters
All of these
A smart card is a device, the size of a credit card, that contains embedded technology that stores information and small amounts of software and can act as __________________.
Identification instruments
All of these
A data storage device
A form of digital cash
All of these
Which of the following is an example of a way to maintain information security that a company should include in its information security policies?
Never sharing user or password information with anyone
Changing passwords every 30 to 60 days
All of these
Requiring computer users to log off before leaving for lunch
All of these
According to the ethical computer use policy, users should be ______________ of the rules and, by agreeing to use the system on that basis, _______________ to abide by the rules.
Consent, informed
Consent, information
Informed, collaborate
Informed, consent
Informed, consent
Determining what is ethical can sometimes be difficult because certain actions can be justified or condemned, depending on how you view the relationship between ________ and ________.
Legal and ethical
Confidential and open
Legal and confidential
Legal and technical
Legal and ethical

Need essay sample on "MIS test 2"? We will write a custom essay sample specifically for you for only $ 13.90/page

Can’t wait to take that assignment burden offyour shoulders?

Let us know what it is and we will show you how it can be done!
×
Sorry, but copying text is forbidden on this website. If you need this or any other sample, please register

Already on Businessays? Login here

No, thanks. I prefer suffering on my own
Sorry, but copying text is forbidden on this website. If you need this or any other sample register now and get a free access to all papers, carefully proofread and edited by our experts.
Sign in / Sign up
No, thanks. I prefer suffering on my own
Not quite the topic you need?
We would be happy to write it
Join and witness the magic
Service Open At All Times
|
Complete Buyer Protection
|
Plagiarism-Free Writing

Emily from Businessays

Hi there, would you like to get such a paper? How about receiving a customized one? Check it out https://goo.gl/chNgQy

We use cookies to give you the best experience possible. By continuing we’ll assume you’re on board with our cookie policy