A salesperson clicks repeatedly on the online ads of a competitor in order to drive the competitor’s advertising costs up. This is an example of:
Question options:
  

phishing.
 

pharming.
 

spoofing.
 

click fraud.
 
Question 2
The total amount of digital information that can be transmitted through any telecommunications medium is measured in:
Question options:
  

bps.
 

Hertz.
 

baud.
 

gigaflops.
 
Question 3
Which of the following specifications replaces WEP with a stronger security standard that features changing encryption keys?
Question options:
  

TLS
 

AUP
 

VPN
 

WPA2
 
Question 4
T1 lines:
Question options:
  

operate over existing telephone   lines to carry voice, data, and video.
 

operate over coaxial lines to   deliver Internet access.
 

do not provide guaranteed service   levels, but simply "best effort."
 

are high-speed, leased data lines   providing guaranteed service levels.
 
Question 5
Which type of network would be most appropriate for a business that comprised three employees and a manager located in the same office space, whose primary need is to share documents?
Question options:
  

MAN
 

Domain-based LAN
 

Peer-to-peer network
 

WAN
 
Question 6
What are the four layers of the TCP/IP reference model?
Question options:
  

Physical, application, transport,   and network interface
 

Physical, application, Internet,   and network interface
 

Application, transport, Internet,   and network interface
 

Application, hardware, Internet,   and network interface
 
Question 7
Which of the following is a type of ambient data?
Question options:
  

Computer log containing recent   system errors
 

A file deleted from a hard disk
 

A file that contains an   application’s user settings
 

A set of raw data from an   environmental sensor
 
Question 8
Which of the following is NOT a characteristic of packet switching?
Question options:
  

Packets travel independently of   each other.
 

Packets are routed through many   different paths.
 

Packet switching requires   point-to-point circuits.
 

Packets are reassembled into the original   message when they reach their destinations.
 
Question 9
The Internet is based on which three key technologies?
Question options:
  

TCP/IP, HTML, and HTTP
 

TCP/IP, HTTP, and packet switching
 

Client/server computing, packet   switching, and the development of communications standards for linking   networks and computers
 

Client/server computing, packet switching,   and HTTP
 
Question 10
Which signal types are represented by a continuous waveform?
Question options:
  

Laser
 

Optical
 

Digital
 

Analog
 
Question 11
Analysis of an information system that rates the likelihood of a security incident occurring and its cost is included in a(n):
Question options:
  

security policy.
 

AUP.
 

risk assessment.
 

business impact analysis.
 
Question 12
“Predictive search” in Google’s search engine:
Question options:
  

predicts what you are looking for   as you enter words into the query box.
 

uses a tracking service and   cookies on your browser to predict search results.
 

uses a knowledge graph of what   similar people searched on to predict your search interests.
 

uses a semantic approach to   predict what you are looking for.
 
Question 13
The telephone system is an example of a __________ network.
Question options:
  

peer-to-peer
 

wireless
 

packet-switched
 

circuit-switched
 
Question 14
A(n) __________ is a box consisting of a radio receiver/transmitter and antennas that links to a wired network, router, or hub.
Question options:
  

RFID receiver
 

WiMax receiver
 

access point
 

hub
 
Question 15
The concept of a future Web in which it is commonplace for everyday objects to be connected, controlled, or monitored over the Internet is called:
Question options:
  

the Internet of Things.
 

the Semantic Web.
 

Internet2.
 

a 3-D Web.
 
Question 16
Biometric authentication:
Question options:
  

is inexpensive.
 

is used widely in Europe for   security applications.
 

can use a person’s voice as a   unique, measurable trait.
 

only uses physical measurements   for identification.
 
Question 17
In which method of encryption is a single encryption key sent to the receiver so both sender and receiver share the same key?
Question options:
  

SSL/TLS
 

Symmetric key encryption
 

Public key encryption
 

Private key encryption
 
Question 18
A foreign country attempting to access government networks in order to disable a national power grid would be an example of:
Question options:
  

phishing.
 

denial-of-service attacks.
 

cyberwarfare.
 

cyberterrorism.
 
Question 19
The child domain of the root is the:
Question options:
  

top-level domain.
 

second-level domain.
 

host name.
 

domain extension.
 
Question 20
Which type of network treats all processors equally and allows peripheral devices to be shared without going to a separate server?
Question options:
  

MAN
 

Wireless
 

LAN
 

Peer-to-peer
 
Online Exam 5
   
Question 21
Customer relationship management systems typically provide software and online tools for sales, customer service, and:
Question options:
  

marketing.
 

account management.
 

advertising.
 

public relations.
 
Question 22
Netflix’s public announcement of a reward for a technology solution to its movie recommendation system is an example of:
Question options:
  

prediction markets.
 

behavioral targeting.
 

crowdsourcing.
 

social shopping.
 
Question 23
Which of the following best describes the digital social graph?
Question options:
  

A person’s direct and indirect   relationships
 

All of a person’s closest digital   relationships
 

A mapping of all online social   relationships
 

All of the online and offline   relationships a person has
 
Question 24
Operational CRM applications include tools for:
Question options:
  

identifying buying patterns.
 

calculating CLTV.
 

sales force automation.
 

pinpointing unprofitable   customers.
 
Question 25
__________ CRM includes customer-facing applications such as tools for sales force automation, call center and customer service support, and marketing automation.
Question options:
  

Analytical
 

Employee
 

Operational
 

Partner
 
Question 26
What is the difference between personalization and customization, as applied to e-commerce technologies?
Question options:
  

Customization is any type of   adjustment made to a product by the user;   personalization refers to a business changing a product or service   for the user.
 

Personalization is any type of   adjustment made to a product by the user; customization   refers to a business changing a product or service for   the user.
 

Customization refers to adjusting   marketing messages for a consumer; personalization refers to adjusting a   product or service based on a user’s preferences.
 

Personalization refers to   adjusting marketing messages for a consumer; customization refers to   adjusting a product or service based on a user’s preferences.
 
Question 27
Which of the following best illustrates the sales revenue model?
Question options:
  

eBay receives a small fee from a   seller if a seller is successful in selling an item.
 

Epinions receives a fee after   steering a customer to a participating Web site where he or she makes a   purchase.
 

Flickr provides basic services for   free, but charges a premium for advanced services.
 

Apple accepts micropayments for   single music track downloads.
 
Question 28
The business value of an effective supply chain management system includes all of the following EXCEPT:
Question options:
  

faster time to market.
 

cost reduction.
 

supply matched to demand.
 

improved delivery service.
 
Question 29
Compared to digital markets, traditional markets have:
Question options:
  

lower search costs.
 

stronger network effects.
 

higher delayed gratification   effects.
 

higher transaction costs.
 
Question 30
Enterprise software is built around thousands of predefined business processes that reflect:
Question options:
  

the firm’s organization.
 

industry goals.
 

best practices.
 

cutting edge workflow analyses.
 
Question 31
Which of the following is NOT one of four types of presence to be considered when building an E-commerce presence?
Question options:
  

Offline media
 

Websites
 

Social media
 

Corporate
 
Question 32
In order to achieve maximum benefit from an enterprise software package, a business:
Question options:
  

customizes the software to match   all of its business processes.
 

uses only the processes in the   software that match its own processes.
 

changes the way it works to match   the software’s business processes.
 

selects only the software that   best matches its existing business processes.
 
Question 33
Supply chain software can be classified as either supply chain __________ systems or supply chain __________ systems.
Question options:
  

planning; execution
 

demand; continual
 

upstream; downstream
 

push; pull
 
Question 34
Content providers use __________ systems to process large amounts of very small monetary transactions cost-effectively.
Question options:
  

subscription
 

mobile payment
 

transaction fee
 

micropayment
 
Question 35
Walmart’s continuous replenishment system is an example of a __________ model.
Question options:
  

push-based
 

pull-based
 

enterprise-based
 

supply chain optimization
 
Question 36
A third-party Net marketplace that connects many buyers and suppliers for spot purchasing is called a(n):
Question options:
  

exchange.
 

vertical market.
 

private exchange.
 

e-hub.
 
Question 37
A suite of integrated software modules for finance and accounting, human resources, manufacturing and production, and sales and marketing that allows data to be used by multiple functions and business processes best describes:
Question options:
  

process management software.
 

ERP systems.
 

groupware.
 

application software.
 
Question 38
Net marketplaces:
Question options:
  

focus on continuous business   process coordination between companies for supply chain management.
 

are industry owned or operate as   independent intermediaries between buyers and sellers.
 

are geared towards short-term spot   purchasing.
 

are more relationship oriented   than private industrial networks.
 
Question 39
Which of the following is NOT an example of next-generation enterprise applications?
Question options:
  

Open-source solutions
 

Social CRM
 

Solutions incorporating SCM
 

Solutions incorporating SOA
 
Question 40
Information density refers to the:
Question options:
  

richness—complexity and content—of   a message.
 

total amount and quantity of   information delivered to consumers by merchants.
 

total amount and quantity of   information available to all market participants.
 

amount of information available to   reduce price transparency.