Which of the following revenue models is most likely followed by companies providing Web 2.0 services?
Question 1 options:
________ is the dynamic social media process of employing users to participate in product design or product redesign.
Question 2 options:
If the content posted on a social networking site represents reasonable criticism of the organization’s products or services, the best response would most likely be to:
Question 3 options:
The primary risk of peer-to-peer support in the context of social media and customer service is:
Question 4 options:
loss of control.
loss of credibility.
lack of privacy.
increase in expenses.
According to Gossieaux and Moran, a(n) ________ is an organization that uses social media to transform its interactions with customers, employees, and partners into mutually satisfying relationships with them and their communities.
Question 5 options:
SM application provider
According to Gossieaux and Moran, which of the following statements is true of defenders-of-belief communities?
Question 6 options:
They are very effective for activities that involve innovation or problem solving.
They seek conformity and want to convince others of the wisdom of their beliefs.
They are open to changing their beliefs when confronted with contrary evidence.
They make ineffective sales and marketing professionals.
Which of the following is true of Web 2.0?
Question 7 options:
Users usually cannot respond directly to Web ads.
One of the principal means that is used to attract viewers is providing low-cost content.
Advertisers can find out who responds to ads but not how strongly.
Most ads on social media generate revenue only when customers click on them.
Enterprise 2.0 workers want applications to enable them to rate tagged content and to use the tags to predict content that will be of interest to them, a process McAfee refers to as:
Question 8 options:
A ________ is an information system that supports the sharing of content among networks of users.
Question 9 options:
database management system (DBMS)
transaction processing system (TPS)
human resource information system (HRIS)
social media information system (SMIS)
________ measures the frequency that someone who clicks on an ad makes a purchase, “Likes” a site, or takes some other action desired by the advertiser.
Question 10 options:
Which of the following is an SM application provider?
Question 11 options:
Which of the following is one of the principal means that companies implementing Web 2.0 are most likely to use to attract viewers?
Question 12 options:
Fixed product value
A characteristic of Web 2.0 is that the value of a Web site increases as the number of users:
Question 13 options:
increases over time.
remains constant over time.
decreases over time.
fluctuates over time.
Most SM applications earn their revenue through:
Question 14 options:
a franchising model.
a licensing model.
Question 15 options:
The SDLC process follows a linear sequence from requirements to design to implementation. Therefore, the SDLC process is also known as the:
Question 16 options:
agile development method.
The traditional process for developing information systems is:
Question 17 options:
the systems development life cycle.
the spiral approach.
rapid application development cycle.
Which of the following are the steps in the business process management (BPM) cycle?
Question 18 options:
Implement processes; create components; model processes; assess results
Create components; model processes; implement processes; assess results
Model processes; create components; implement processes; assess results
Model processes; implement processes; assess results; create components
According to Brooks’ Law, adding more people to a late project will:
Question 19 options:
reduce the need for coordination.
create diseconomies of scale.
speed up the project.
In the system implementation phase of the SDLC, with ________ installation, the new system runs alongside the old one until it has been tested and is fully operational.
Question 20 options:
In a Business Process Modeling Notation (BPMN) diagram, ________ depict the flow or sequence of activities in a process.
Question 21 options:
The final phase of the systems development life cycle (SDLC) is:
Question 22 options:
maintaining the system.
designing system components.
determining the requirements.
implementing the system.
In a Business Process Modeling Notation (BPMN) diagram, dotted arrows depict the flow of ________ in the process.
Question 23 options:
messages and data
tasks and activities
A ________ is a network of activities, repositories, roles, resources, and flows that interact to accomplish a business function.
Question 24 options:
In a business process, ________ are defined as collections of related tasks that receive inputs and produce outputs.
Question 25 options:
In a Business Process Modeling Notation (BPMN) diagram, a ________ symbol represents an activity.
Question 26 options:
Which of the following statements is true of the swim-lane layout used for modeling the business processes?
Question 27 options:
It complicates the process diagrams.
Each role in the business process has to share the swim lane with other roles.
All activities for a given role are repeated in all the swim lanes.
It draws attention to the interactions among components of the diagram.
Project teams create a ________, which is a hierarchy of the tasks required to complete a project.
Question 28 options:
work breakdown structure
In the context of system implementation phase of the SDLC, a ________ installation is the riskiest, because the old system is shut down and the new system is introduced.
Question 29 options:
In the system definition phase of the SDLC, the first major task for an assembled project team is to:
Question 30 options:
define system goals and scope.
assess the project’s feasibility.
plan the project.
design system components.
The process of hardening a Web site is a ________ safeguard.
Question 31 options:
Which of the following is likely to be accepted by a poorly designed application, leading to improper disclosure of data?
Question 32 options:
A ________ is a number used to encrypt data.
Question 33 options:
A(n) ________ is a computer program that senses when another computer is attempting to scan the disk or otherwise access a computer.
Question 34 options:
intrusion detection system
access control system
Which of the following statements is true of the Secure Socket Layer (SSL)?
Question 35 options:
It is a stronger version of HTTPS.
It is used to send sensitive data such as credit card numbers.
It uses asymmetric encryption exclusively.
It uses one set of encryption keys for multiple sessions.
________ refers to an organization-wide function that is in charge of developing data policies and enforcing data standards.
Question 36 options:
In information security, which of the following is true of managing risk?
Question 37 options:
Organizations should implement safeguards that balance the trade-off between risk and cost.
Passwords are classified under the technical safeguards category.
Physical security is classified under the human safeguards category.
All organizations except financial institutions should invest heavily in security safeguards.
Email spoofing is a synonym for:
Question 38 options:
Question 39 options:
are the most complex type of firewall.
seldom examine the data or the addresses of the message.
can filter both inbound and outbound traffic.
examine the destination address but not the source address.
When referring to security threats, pretexting, sniffing, spoofing, and phishing are all examples of:
Question 40 options:
loss of infrastructure.
unauthorized data disclosure.
incorrect data modification.
Previous PageNext Page
Which of the following statements is true about human safeguards for employees?
Question 41 options:
System administrators should retain user accounts after an employee has been terminated.
Companies should provide user accounts and passwords to employees prior to their security training.
User accounts should be defined to give users the least possible privilege necessary to perform their jobs.
Security screening in an organization is a one-time process and applies only to new employees.
A ________ is a person or an organization that seeks to obtain or alter data or other IS assets illegally, without the owner’s permission and often without the owner’s knowledge.
Question 42 options:
Which of the following usually happens in a malicious denial-of-service attack?
Question 43 options:
A hacker monitors and intercepts wireless traffic at will
An intruder uses another site’s IP address to masquerade as that other site
A hacker floods a Web server with millions of bogus service requests
A phisher pretends to be a legitimate company and requests confidential data
Which of the following is an example of a sniffing technique?
Question 44 options:
Denial of service
________ is the type of security loss that involves computer criminals invading a computer system and replacing legitimate programs with their own unauthorized ones that shut down legitimate applications and substitute their own processing to spy, steal, and manipulate data.
Question 45 options:
Which of the following statements is true of global databases?
Question 46 options:
A single database makes it possible to have an integrated view of the operations of an organization.
A single database increases data integrity problems.
The processing of a single database that resides in a single location is referred to as distributed database processing.
When using a single database to process data, data transmission speeds are extremely high.
Which of the following best describes the bullwhip effect?
Question 47 options:
Improvements in technology lead to new applications, which result in new markets and industries.
The value of a telecommunications network is proportional to the square of the number of users connected to the system.
The performance improvement to be gained from using some faster mode of execution is limited by the fraction of the time the faster mode can be used.
The variability in the size and timing of orders increases at each stage up the supply chain, from customer to supplier.
Which of the following statements is true of international IS project management?
Question 48 options:
The scope and requirements definition for international IS is very easy.
Effective communication among team members is expensive.
Quality standards are identical across cultures.
The rate of development is uniform across countries.
The bullwhip effect:
Question 49 options:
is not related to erratic consumer demand.
can be eliminated by restricting access to consumer-demand information to only a few participants in the supply chain.
forces distributors, manufacturers, and suppliers to carry smaller inventories that do not have the capacity to meet requirements.
increases the overall profitability of the supply chain.
Enterprise systems, such as ERP, solve the problems of data isolation by integrating data into a database that provides a comprehensive and organization-wide view. This would require:
Question 50 options:
all processes to be located in the same geographical place.
the company to customize its product offerings.
the company to standardize on a single language.
backshoring processes to the home country.