Which of the following revenue models is most likely followed by companies providing Web 2.0 services
Question
Question 1
Which of the following revenue models is most likely followed by companies providing Web 2.0 services?
Question 1 options:
Traditional marketing
User participation
Pay-per-click
Venture capital
Question 2
________ is the dynamic social media process of employing users to participate in product design or product redesign.
Question 2 options:
Outsourcing
Homesourcing
Crowdsourcing
Farmshoring
Question 3
If the content posted on a social networking site represents reasonable criticism of the organization’s products or services, the best response would most likely be to:
Question 3 options:
report it.
delete it.
leave it.
edit it.
Question 4
The primary risk of peer-to-peer support in the context of social media and customer service is:
Question 4 options:
loss of control.
loss of credibility.
lack of privacy.
increase in expenses.
Question 5
According to Gossieaux and Moran, a(n) ________ is an organization that uses social media to transform its interactions with customers, employees, and partners into mutually satisfying relationships with them and their communities.
Question 5 options:
nonprofit organization
SM application provider
Enterprise 2.0
hyper-social organization
Question 6
According to Gossieaux and Moran, which of the following statements is true of defenders-of-belief communities?
Question 6 options:
They are very effective for activities that involve innovation or problem solving.
They seek conformity and want to convince others of the wisdom of their beliefs.
They are open to changing their beliefs when confronted with contrary evidence.
They make ineffective sales and marketing professionals.
Question 7
Which of the following is true of Web 2.0?
Question 7 options:
Users usually cannot respond directly to Web ads.
One of the principal means that is used to attract viewers is providing low-cost content.
Advertisers can find out who responds to ads but not how strongly.
Most ads on social media generate revenue only when customers click on them.
Question 8
Enterprise 2.0 workers want applications to enable them to rate tagged content and to use the tags to predict content that will be of interest to them, a process McAfee refers to as:
Question 8 options:
signals.
extensions.
authoring.
links.
Question 9
A ________ is an information system that supports the sharing of content among networks of users.
Question 9 options:
database management system (DBMS)
transaction processing system (TPS)
human resource information system (HRIS)
social media information system (SMIS)
Question 10
________ measures the frequency that someone who clicks on an ad makes a purchase, “Likes” a site, or takes some other action desired by the advertiser.
Question 10 options:
Enterprise 2.0
Pay-per-click
Conversion rate
Folksonomy
Question 11
Which of the following is an SM application provider?
Question 11 options:
Oracle
McAfee
SAP
Question 12
Which of the following is one of the principal means that companies implementing Web 2.0 are most likely to use to attract viewers?
Question 12 options:
Free content
Controlled releases
Fixed product value
Fixed interface
Question 13
A characteristic of Web 2.0 is that the value of a Web site increases as the number of users:
Question 13 options:
increases over time.
remains constant over time.
decreases over time.
fluctuates over time.
Question 14
Most SM applications earn their revenue through:
Question 14 options:
advertisements.
merchandising.
a franchising model.
a licensing model.
Question 15
According to McAfee, pushing enterprise content to users based on subscriptions and alerts is a characteristic of the ________ component of Enterprise 2.0.
Question 15 options:
signals
links
search
authoring
________________________________________
Question 16
The SDLC process follows a linear sequence from requirements to design to implementation. Therefore, the SDLC process is also known as the:
Question 16 options:
swim-lane method.
waterfall method.
scrum process.
agile development method.
Question 17
The traditional process for developing information systems is:
Question 17 options:
the systems development life cycle.
the spiral approach.
the V-model.
rapid application development cycle.
Question 18
Which of the following are the steps in the business process management (BPM) cycle?
Question 18 options:
Implement processes; create components; model processes; assess results
Create components; model processes; implement processes; assess results
Model processes; create components; implement processes; assess results
Model processes; implement processes; assess results; create components
Question 19
According to Brooks’ Law, adding more people to a late project will:
Question 19 options:
reduce the need for coordination.
create diseconomies of scale.
guarantee efficiencies.
speed up the project.
Question 20
In the system implementation phase of the SDLC, with ________ installation, the new system runs alongside the old one until it has been tested and is fully operational.
Question 20 options:
phased
pilot
plunge
parallel
Question 21
In a Business Process Modeling Notation (BPMN) diagram, ________ depict the flow or sequence of activities in a process.
Question 21 options:
circles
solid arrows
dotted arrows
diamonds
Question 22
The final phase of the systems development life cycle (SDLC) is:
Question 22 options:
maintaining the system.
designing system components.
determining the requirements.
implementing the system.
Question 23
In a Business Process Modeling Notation (BPMN) diagram, dotted arrows depict the flow of ________ in the process.
Question 23 options:
control
messages and data
tasks and activities
resources
Question 24
A ________ is a network of activities, repositories, roles, resources, and flows that interact to accomplish a business function.
Question 24 options:
business stature
business process
business policy
business analysis
Question 25
In a business process, ________ are defined as collections of related tasks that receive inputs and produce outputs.
Question 25 options:
presentations
resources
databases
activities
Question 26
In a Business Process Modeling Notation (BPMN) diagram, a ________ symbol represents an activity.
Question 26 options:
dotted arrow
rectangle
solid arrow
diamond
Question 27
Which of the following statements is true of the swim-lane layout used for modeling the business processes?
Question 27 options:
It complicates the process diagrams.
Each role in the business process has to share the swim lane with other roles.
All activities for a given role are repeated in all the swim lanes.
It draws attention to the interactions among components of the diagram.
Question 28
Project teams create a ________, which is a hierarchy of the tasks required to complete a project.
Question 28 options:
control chart
scatter plot
critical path
work breakdown structure
Question 29
In the context of system implementation phase of the SDLC, a ________ installation is the riskiest, because the old system is shut down and the new system is introduced.
Question 29 options:
plunge
phased
pilot
parallel
Question 30
In the system definition phase of the SDLC, the first major task for an assembled project team is to:
Question 30 options:
define system goals and scope.
assess the project’s feasibility.
plan the project.
design system components.
Question 31
The process of hardening a Web site is a ________ safeguard.
Question 31 options:
technical
physical
political
financial
Question 32
Which of the following is likely to be accepted by a poorly designed application, leading to improper disclosure of data?
Question 32 options:
Asymmetric encryption
Public key
SQL injection
Key escrow
Question 33
A ________ is a number used to encrypt data.
Question 33 options:
cookie
cache
honeypot
key
Question 34
A(n) ________ is a computer program that senses when another computer is attempting to scan the disk or otherwise access a computer.
Question 34 options:
intrusion detection system
botnet
keylogger
access control system
Question 35
Which of the following statements is true of the Secure Socket Layer (SSL)?
Question 35 options:
It is a stronger version of HTTPS.
It is used to send sensitive data such as credit card numbers.
It uses asymmetric encryption exclusively.
It uses one set of encryption keys for multiple sessions.
Question 36
________ refers to an organization-wide function that is in charge of developing data policies and enforcing data standards.
Question 36 options:
Data encryption
Authentication
Data administration
Usurpation
Question 37
In information security, which of the following is true of managing risk?
Question 37 options:
Organizations should implement safeguards that balance the trade-off between risk and cost.
Passwords are classified under the technical safeguards category.
Physical security is classified under the human safeguards category.
All organizations except financial institutions should invest heavily in security safeguards.
Question 38
Email spoofing is a synonym for:
Question 38 options:
hacking.
usurping.
sniffing.
phishing.
Question 39
Packet-filtering firewalls:
Question 39 options:
are the most complex type of firewall.
seldom examine the data or the addresses of the message.
can filter both inbound and outbound traffic.
examine the destination address but not the source address.
Question 40
When referring to security threats, pretexting, sniffing, spoofing, and phishing are all examples of:
Question 40 options:
loss of infrastructure.
faulty services.
unauthorized data disclosure.
incorrect data modification.
Previous PageNext Page
Question 41
Which of the following statements is true about human safeguards for employees?
Question 41 options:
System administrators should retain user accounts after an employee has been terminated.
Companies should provide user accounts and passwords to employees prior to their security training.
User accounts should be defined to give users the least possible privilege necessary to perform their jobs.
Security screening in an organization is a one-time process and applies only to new employees.
Question 42
A ________ is a person or an organization that seeks to obtain or alter data or other IS assets illegally, without the owner’s permission and often without the owner’s knowledge.
Question 42 options:
target
threat
vulnerability
key escrow
Question 43
Which of the following usually happens in a malicious denial-of-service attack?
Question 43 options:
A hacker monitors and intercepts wireless traffic at will
An intruder uses another site’s IP address to masquerade as that other site
A hacker floods a Web server with millions of bogus service requests
A phisher pretends to be a legitimate company and requests confidential data
Question 44
Which of the following is an example of a sniffing technique?
Question 44 options:
IP spoofing
Caches
Denial of service
Adware
Question 45
________ is the type of security loss that involves computer criminals invading a computer system and replacing legitimate programs with their own unauthorized ones that shut down legitimate applications and substitute their own processing to spy, steal, and manipulate data.
Question 45 options:
Spoofing
Usurpation
Encryption
Phishing
Question 46
Which of the following statements is true of global databases?
Question 46 options:
A single database makes it possible to have an integrated view of the operations of an organization.
A single database increases data integrity problems.
The processing of a single database that resides in a single location is referred to as distributed database processing.
When using a single database to process data, data transmission speeds are extremely high.
Question 47
Which of the following best describes the bullwhip effect?
Question 47 options:
Improvements in technology lead to new applications, which result in new markets and industries.
The value of a telecommunications network is proportional to the square of the number of users connected to the system.
The performance improvement to be gained from using some faster mode of execution is limited by the fraction of the time the faster mode can be used.
The variability in the size and timing of orders increases at each stage up the supply chain, from customer to supplier.
Question 48
Which of the following statements is true of international IS project management?
Question 48 options:
The scope and requirements definition for international IS is very easy.
Effective communication among team members is expensive.
Quality standards are identical across cultures.
The rate of development is uniform across countries.
Question 49
The bullwhip effect:
Question 49 options:
is not related to erratic consumer demand.
can be eliminated by restricting access to consumer-demand information to only a few participants in the supply chain.
forces distributors, manufacturers, and suppliers to carry smaller inventories that do not have the capacity to meet requirements.
increases the overall profitability of the supply chain.
Question 50
Enterprise systems, such as ERP, solve the problems of data isolation by integrating data into a database that provides a comprehensive and organization-wide view. This would require:
Question 50 options:
all processes to be located in the same geographical place.
the company to customize its product offerings.
the company to standardize on a single language.
backshoring processes to the home country.