Which of the following revenue models is most likely followed by companies providing Web 2.0 services


Question 1

Which of the following revenue models is most likely followed by companies providing Web 2.0 services?

Question 1 options:

Traditional marketing

User participation


Venture capital

Question 2

________ is the dynamic social media process of employing users to participate in product design or product redesign.

Question 2 options:





Question 3

If the content posted on a social networking site represents reasonable criticism of the organization’s products or services, the best response would most likely be to:

Question 3 options:

report it.

delete it.

leave it.

edit it.

Question 4

The primary risk of peer-to-peer support in the context of social media and customer service is:

Question 4 options:

loss of control.

loss of credibility.

lack of privacy.

increase in expenses.

Question 5

According to Gossieaux and Moran, a(n) ________ is an organization that uses social media to transform its interactions with customers, employees, and partners into mutually satisfying relationships with them and their communities.

Question 5 options:

nonprofit organization

SM application provider

Enterprise 2.0

hyper-social organization

Question 6

According to Gossieaux and Moran, which of the following statements is true of defenders-of-belief communities?

Question 6 options:

They are very effective for activities that involve innovation or problem solving.

They seek conformity and want to convince others of the wisdom of their beliefs.

They are open to changing their beliefs when confronted with contrary evidence.

They make ineffective sales and marketing professionals.

Question 7

Which of the following is true of Web 2.0?

Question 7 options:

Users usually cannot respond directly to Web ads.

One of the principal means that is used to attract viewers is providing low-cost content.

Advertisers can find out who responds to ads but not how strongly.

Most ads on social media generate revenue only when customers click on them.

Question 8

Enterprise 2.0 workers want applications to enable them to rate tagged content and to use the tags to predict content that will be of interest to them, a process McAfee refers to as:

Question 8 options:





Question 9

A ________ is an information system that supports the sharing of content among networks of users.

Question 9 options:

database management system (DBMS)

transaction processing system (TPS)

human resource information system (HRIS)

social media information system (SMIS)

Question 10

________ measures the frequency that someone who clicks on an ad makes a purchase, “Likes” a site, or takes some other action desired by the advertiser.

Question 10 options:

Enterprise 2.0


Conversion rate


Question 11

Which of the following is an SM application provider?

Question 11 options:





Question 12

Which of the following is one of the principal means that companies implementing Web 2.0 are most likely to use to attract viewers?

Question 12 options:

Free content

Controlled releases

Fixed product value

Fixed interface

Question 13

A characteristic of Web 2.0 is that the value of a Web site increases as the number of users:

Question 13 options:

increases over time.

remains constant over time.

decreases over time.

fluctuates over time.

Question 14

Most SM applications earn their revenue through:

Question 14 options:



a franchising model.

a licensing model.

Question 15

According to McAfee, pushing enterprise content to users based on subscriptions and alerts is a characteristic of the ________ component of Enterprise 2.0.

Question 15 options:






Question 16

The SDLC process follows a linear sequence from requirements to design to implementation. Therefore, the SDLC process is also known as the:

Question 16 options:

swim-lane method.

waterfall method.

scrum process.

agile development method.

Question 17

The traditional process for developing information systems is:

Question 17 options:

the systems development life cycle.

the spiral approach.

the V-model.

rapid application development cycle.

Question 18

Which of the following are the steps in the business process management (BPM) cycle?

Question 18 options:

Implement processes; create components; model processes; assess results

Create components; model processes; implement processes; assess results

Model processes; create components; implement processes; assess results

Model processes; implement processes; assess results; create components

Question 19

According to Brooks’ Law, adding more people to a late project will:

Question 19 options:

reduce the need for coordination.

create diseconomies of scale.

guarantee efficiencies.

speed up the project.

Question 20

In the system implementation phase of the SDLC, with ________ installation, the new system runs alongside the old one until it has been tested and is fully operational.

Question 20 options:





Question 21

In a Business Process Modeling Notation (BPMN) diagram, ________ depict the flow or sequence of activities in a process.

Question 21 options:


solid arrows

dotted arrows


Question 22

The final phase of the systems development life cycle (SDLC) is:

Question 22 options:

maintaining the system.

designing system components.

determining the requirements.

implementing the system.

Question 23

In a Business Process Modeling Notation (BPMN) diagram, dotted arrows depict the flow of ________ in the process.

Question 23 options:


messages and data

tasks and activities


Question 24

A ________ is a network of activities, repositories, roles, resources, and flows that interact to accomplish a business function.

Question 24 options:

business stature

business process

business policy

business analysis

Question 25

In a business process, ________ are defined as collections of related tasks that receive inputs and produce outputs.

Question 25 options:





Question 26

In a Business Process Modeling Notation (BPMN) diagram, a ________ symbol represents an activity.

Question 26 options:

dotted arrow


solid arrow


Question 27

Which of the following statements is true of the swim-lane layout used for modeling the business processes?

Question 27 options:

It complicates the process diagrams.

Each role in the business process has to share the swim lane with other roles.

All activities for a given role are repeated in all the swim lanes.

It draws attention to the interactions among components of the diagram.

Question 28

Project teams create a ________, which is a hierarchy of the tasks required to complete a project.

Question 28 options:

control chart

scatter plot

critical path

work breakdown structure

Question 29

In the context of system implementation phase of the SDLC, a ________ installation is the riskiest, because the old system is shut down and the new system is introduced.

Question 29 options:





Question 30

In the system definition phase of the SDLC, the first major task for an assembled project team is to:

Question 30 options:

define system goals and scope.

assess the project’s feasibility.

plan the project.

design system components.

Question 31

The process of hardening a Web site is a ________ safeguard.

Question 31 options:





Question 32

Which of the following is likely to be accepted by a poorly designed application, leading to improper disclosure of data?

Question 32 options:

Asymmetric encryption

Public key

SQL injection

Key escrow

Question 33

A ________ is a number used to encrypt data.

Question 33 options:





Question 34

A(n) ________ is a computer program that senses when another computer is attempting to scan the disk or otherwise access a computer.

Question 34 options:

intrusion detection system



access control system

Question 35

Which of the following statements is true of the Secure Socket Layer (SSL)?

Question 35 options:

It is a stronger version of HTTPS.

It is used to send sensitive data such as credit card numbers.

It uses asymmetric encryption exclusively.

It uses one set of encryption keys for multiple sessions.

Question 36

________ refers to an organization-wide function that is in charge of developing data policies and enforcing data standards.

Question 36 options:

Data encryption


Data administration


Question 37

In information security, which of the following is true of managing risk?

Question 37 options:

Organizations should implement safeguards that balance the trade-off between risk and cost.

Passwords are classified under the technical safeguards category.

Physical security is classified under the human safeguards category.

All organizations except financial institutions should invest heavily in security safeguards.

Question 38

Email spoofing is a synonym for:

Question 38 options:





Question 39

Packet-filtering firewalls:

Question 39 options:

are the most complex type of firewall.

seldom examine the data or the addresses of the message.

can filter both inbound and outbound traffic.

examine the destination address but not the source address.

Question 40

When referring to security threats, pretexting, sniffing, spoofing, and phishing are all examples of:

Question 40 options:

loss of infrastructure.

faulty services.

unauthorized data disclosure.

incorrect data modification.

Previous PageNext Page

Question 41

Which of the following statements is true about human safeguards for employees?

Question 41 options:

System administrators should retain user accounts after an employee has been terminated.

Companies should provide user accounts and passwords to employees prior to their security training.

User accounts should be defined to give users the least possible privilege necessary to perform their jobs.

Security screening in an organization is a one-time process and applies only to new employees.

Question 42

A ________ is a person or an organization that seeks to obtain or alter data or other IS assets illegally, without the owner’s permission and often without the owner’s knowledge.

Question 42 options:




key escrow

Question 43

Which of the following usually happens in a malicious denial-of-service attack?

Question 43 options:

A hacker monitors and intercepts wireless traffic at will

An intruder uses another site’s IP address to masquerade as that other site

A hacker floods a Web server with millions of bogus service requests

A phisher pretends to be a legitimate company and requests confidential data

Question 44

Which of the following is an example of a sniffing technique?

Question 44 options:

IP spoofing


Denial of service


Question 45

________ is the type of security loss that involves computer criminals invading a computer system and replacing legitimate programs with their own unauthorized ones that shut down legitimate applications and substitute their own processing to spy, steal, and manipulate data.

Question 45 options:





Question 46

Which of the following statements is true of global databases?

Question 46 options:

A single database makes it possible to have an integrated view of the operations of an organization.

A single database increases data integrity problems.

The processing of a single database that resides in a single location is referred to as distributed database processing.

When using a single database to process data, data transmission speeds are extremely high.

Question 47

Which of the following best describes the bullwhip effect?

Question 47 options:

Improvements in technology lead to new applications, which result in new markets and industries.

The value of a telecommunications network is proportional to the square of the number of users connected to the system.

The performance improvement to be gained from using some faster mode of execution is limited by the fraction of the time the faster mode can be used.

The variability in the size and timing of orders increases at each stage up the supply chain, from customer to supplier.

Question 48

Which of the following statements is true of international IS project management?

Question 48 options:

The scope and requirements definition for international IS is very easy.

Effective communication among team members is expensive.

Quality standards are identical across cultures.

The rate of development is uniform across countries.

Question 49

The bullwhip effect:

Question 49 options:

is not related to erratic consumer demand.

can be eliminated by restricting access to consumer-demand information to only a few participants in the supply chain.

forces distributors, manufacturers, and suppliers to carry smaller inventories that do not have the capacity to meet requirements.

increases the overall profitability of the supply chain.

Question 50

Enterprise systems, such as ERP, solve the problems of data isolation by integrating data into a database that provides a comprehensive and organization-wide view. This would require:

Question 50 options:

all processes to be located in the same geographical place.

the company to customize its product offerings.

the company to standardize on a single language.

backshoring processes to the home country.

Thanks for installing the Bottom of every post plugin by Corey Salzano. Contact me if you need custom WordPress plugins or website design.