Acronyms
Technology
User Id & Passwords
Storming The Castle
Policies & Standards
100
Fiber optics uses cables consisting of one or more hair-thin filaments of __________ fiber wrapped in a protective jacket. A. glass B. plastic C. ceramic D. nylon
What is A. glass
100
E-commerce _______________. A. is the same as e-business B. is broader in scope than e-business C. involves the buying, selling, marketing, and servicing of products, services, and information over the Internet and other networks D. All of the choices are correct
What is C. involves the buying, selling, marketing, and servicing of products, services, and information over the Internet and other networks
100
Which of the following applications focuses on acquiring and retaining profitable customers via marketing, sales, and service processes? A. Customer relationship management B. Enterprise resource planning C. Knowledge management D. Supply chain management
What is A. Customer relationship management
100
When customers can select products from website catalog displays and put them into a virtual holding bin for later checkout and processing, they are using a _______________. A. shopping cart B. configuration queue C. PayPal register D. shopping queue
What is A. shopping cart
100
_______________ refers to sifting through a company's garbage to find information to help break into their computers. A. Dumpster Diving B. Password cracker C. Back door D. Sniffer
What is A. Dumpster Diving
200
A network that covers a large geographic distance, such as a state or a country, is considered a _______________ network. A. client/server B. local area C. small area D. wide area
What is D. wide area
200
Which of the following is not one of the three basic categories of electronic commerce? A. Government-to-business B. Business-to-consumer C. Business-to-business D. Consumer-to-consumer
What is A. Government-to-business
200
Authenticating users, authorizing access, and enforcing security features is a component of the e-commerce process called: A. Event notification B. Profiling and personalization C. Search management D. Access control and security
What is D. Access control and security
200
The acronym RFP stands for: A. Request for pricing B. Request for proposal C. Request for flat pricing D. Request for fixed pricing
What is B. Request for proposal
200
_______________ is/are the most commonly used security technology at large companies. A. Intrusion-detection systems B. Smart cards C. Biometrics D. Antivirus software
What is D. Antivirus software
300
Programming that serves to "glue together" or mediate between two separate, and usually already existing, programs is known as _______________. A. front-line software B. software handshaking C. middleware D. back-line software
What is C. middleware
300
In an OSI model, the _______________ layer does the routing and forwarding. A. physical B. data link C. network D. application
What is C. network
300
The e-commerce component that deals with gathering data on customers and their website behavior and choices is: A. Event notification B. Profiling and personalizing C. Search management D. Access control and security
What is B. Profiling and personalizing
300
Decisions made at the strategic management level tend to be more: A. Structured B. Semi-structured C. Unstructured D. All the choices are correct.
What is C. Unstructured
300
The conversion strategy where a system is installed one component at a time is the _______. A. Parallel conversion B. Pilot conversion C. Phased conversion D. Direct conversion
What is C. Phased conversion
400
The text defines ________________ as the obsessive use of computers, or the unauthorized access and use of networked computer systems. A. hacking B. cyber-slacking C. cracking D. resource theft
What is A. hacking
400
A(n) _______________ is a standard set of rules and procedures for the control of communication in a network. A. amplification B. algorithm C. protocols D. transponders
What is C. protocols
400
IPv4, the current Internet addressing protocol, can accommodate about _______________ addresses. A. 4 trillion B. 4 billion C. 4 million D. None of the above
What is B. 4 billion
400
Many companies use the SSL security method developed by Netscape Communication that automatically encrypts data passing between a Web browser and a merchant's server. SSL stands for: A. Secure Socket Level B. Secure Socket Layer C. Security Safety Latching D. Safe Server Listing
What is B. Secure Socket Layer
400
Recording and communicating detailed system specifications, including procedures for end users and IS personnel and examples of input screens, output displays, and reports, is a(n) _______________ activity. A. acquisition B. software development C. documentation D. conversion
What is C. documentation
500
The overall process by which information systems are designed and implemented within organizations is referred to as systems _______________. A. design B. analysis C. analysis and design D. implementation
What is C. analysis and design
500
Which of the following correctly reflects the stages of the system development life cycle? A. Investigation, analysis, implementation, and maintenance B. Analysis, design, and implementation C. Investigation, analysis, design, implementation, and maintenance D. Investigation, prototyping, design, conversion, and change management
What is C. Investigation, analysis, design, implementation, and maintenance
500
One way hackers gain access to an individual's information is by faking an e-mail address or Web page to trick users into passing along critical information like credit card numbers. This is known as ________________. A. sniffing B. hacking C. phishing D. spoofing
What is D. spoofing
500
All the following statements are true about encryption, except: A. The most widely used encryption method uses a pair of public and private keys unique to each individual. B. Encryption programs are sold as separate products or built into other software used for the encryption process. C. An e-mail could be scrambled and encoded using a unique private key, then unscrambled using the recipient's secret public key. D. There are several competing software encryption standards, but the top two are RSA and PGP.
What is C. An e-mail could be scrambled and encoded using a unique private key, then unscrambled using the recipient's secret public key
500
Firewall software has become an essential computer system component for individuals connecting to the Internet with DSL or cable modems because: A. Their "always-on" connection status makes them particularly vulnerable. B. Crackers dislike DSL connections for using too much band-width on the Internet. C. DSL will not operate without a firewall. D. Firewalls are the only security that works with cable modems.
What is A. Their "always-on" connection status makes them particularly vulnerable.