Exam 2 - Visualizing information is a good technique because the humans
Points Awarded 29.00
Points Missed 1.00
Percentage 96.7%
... [Show More]
1.
Visualizing information is a good technique because the humans are best at processing information visually.
A) True
B) False
Table for Individual Question Feedback
Points Earned: 1.0/1.0
Correct Answer(s): True
2.
_1_ is/are present when the value of a product or service increases as its number of users increases.
A) positive network externality
B) complementary benefits
C) scalability
D) congestion effects
Table for Individual Question Feedback
Points Earned: 1.0/1.0
Correct Answer(s): A
3.
Which of the following is not a way companies can have competitive advantage through Web 2.0?
A) Boost active participation
B) Have the right incentives
C) Control the firm messaging more tightly
D) Loosen the hierarchical structure
Table for Individual Question Feedback
Points Earned: 1.0/1.0
Correct Answer(s): C
4.
Like other strategic assets, data is most valuable when it is rare, hard to duplicate, and hard to substitute for.
A) True
B) False
Table for Individual Question Feedback
Points Earned: 1.0/1.0
Correct Answer(s): True
5.
Public and private keys are the same in a public key encryption scheme.
A) True
B) False
Table for Individual Question Feedback
Points Earned: 1.0/1.0
Correct Answer(s): False
6.
Which of the following is a language used to create and manipulate databases?
A) SQL
B) Excel
C) Oracle
D) Java
Table for Individual Question Feedback
Points Earned: 1.0/1.0
Correct Answer(s): A
7.
The most commonly used databases today are called relational databases.
A) True
B) False
Table for Individual Question Feedback
Points Earned: 1.0/1.0
Correct Answer(s): True
8.
For a website to be discovered by a search engine then it must be the first page on a public server or linked to from another publicly available website.
A) True
B) False
Feedback: The method used to crawl the Web also means that if a Web site isn’t the first page on a public server, or isn’t linked to from another public page, then it’ll never be found.
Table for Individual Question Feedback
Points Earned: 0.0/1.0
Correct Answer(s): True
9.
Companies often contract a(n) ___________ for hardware and software to run their websites.
A) web hosting service
B) cloud services provider
C) internet service provider
D) domain name registrar
Table for Individual Question Feedback
Points Earned: 1.0/1.0
Correct Answer(s): A
10.
Complementary benefits are ______________.
A) products or services that add additional value to the primary product or service that makes up a network.
B) extra services that a firm receives for free when purchasing new technology.
C) what you get when you stay at a hotel.
D) none of the above.
Table for Individual Question Feedback
Points Earned: 1.0/1.0
Correct Answer(s): A
11.
Which of the following is an example of microblogging?
A) Twitter
B) Skype
C) Wikis
D) LinkedIn
Table for Individual Question Feedback
Points Earned: 1.0/1.0
Correct Answer(s): A
12.
Subscribing to third-party software that is delivered online is called _________________.
A) Utility computing
B) Platform services
C) Software as a service (SaaS)
D) Web services
Table for Individual Question Feedback
Points Earned: 1.0/1.0
Correct Answer(s): C
13.
The unstructured nature of wikis is both an advantage and disadvantage to their use.
A) True
B) False
Table for Individual Question Feedback
Points Earned: 1.0/1.0
Correct Answer(s): True
14.
Better security features are one of the reasons why __________________.
A) firms choose proprietary software from known vendors.
B) firms develop their own vendors.
C) firms use cloud computing.
D) firms choose OSS software.
Table for Individual Question Feedback
Points Earned: 1.0/1.0
Correct Answer(s): D
15.
Which of the following are strategies for combating network effects.
A) Be first to market.
B) Incentivize adoption.
C) Leverage distribution channels
D) All of the above.
Table for Individual Question Feedback
Points Earned: 1.0/1.0
Correct Answer(s): D
16.
The value of data increases when pieces of data are connected to produce information.
A) True
B) False
Table for Individual Question Feedback
Points Earned: 1.0/1.0
Correct Answer(s): True
17.
Web sites and Internet services that foster social media or other sorts of peer production are often referred to as ______________.
A) switching costs
B) viral promotion
C) Web 2.0
D) social networking
Table for Individual Question Feedback
Points Earned: 1.0/1.0
Correct Answer(s): C
18.
The process of modifying a website to improve its ranking in the search results is called ________________________.
A) search engine optimization
B) metadata design
C) PageRank optimization
D) website optimization
Table for Individual Question Feedback
Points Earned: 1.0/1.0
Correct Answer(s): A
19.
The cost of producing an additional unit of something is called _1_.
A) cost per click.
B) augmented cost.
C) cost per action.
D) marginal cost.
Table for Individual Question Feedback
Points Earned: 1.0/1.0
Correct Answer(s): D
20.
Data governance is a key issue organizations must address.
A) True
B) False
Table for Individual Question Feedback
Points Earned: 1.0/1.0
Correct Answer(s): True
21.
_____________ is a form of attack where the attacker defrauds a specific target into revealing sensitive information.
A) Spearphishing
B) Hacking
C) Fishing
D) Social con
Table for Individual Question Feedback
Points Earned: 1.0/1.0
Correct Answer(s): A
22.
The law that states a network's speed is determined by its slowest component is called _1_ Law.
A) The Last Mile
B) Metcalf’s
C) Amdahl’s
D) Moore’s
Table for Individual Question Feedback
Points Earned: 1.0/1.0
Correct Answer(s): C
23.
Security technologies that measure our physical attributes are called biometrics.
A) True
B) False
Table for Individual Question Feedback
Points Earned: 1.0/1.0
Correct Answer(s): True
24.
Click-through rate is _________________.
A) the number of links in a website
B) the percentage of people who clicked on an ad to arrive at the advertiser's site.
C) the number of unique visitors to a website
D) the rank order of search results
Table for Individual Question Feedback
Points Earned: 1.0/1.0
Correct Answer(s): B
25.
Historically, software firms have treated their software code as a trade secret and not made it available to outsiders.
A) True
B) False
Table for Individual Question Feedback
Points Earned: 1.0/1.0
Correct Answer(s): True
26.
When a company uses its customers to promote a product via word-of mouth, they are engaging in ______________.
A) logic bombing
B) viral promotion
C) astroturfing
D) networked marketing
Table for Individual Question Feedback
Points Earned: 1.0/1.0
Correct Answer(s): B
27.
A Distributed Denial of Service (DDoS) attack does which of the following:
A) Gets users to reveal their secure information
B) Overload a network device by sending it more traffic than it can handle.
C) Uses a machine to attack a third party
D) Compromise a machine through corrupted code
Table for Individual Question Feedback
Points Earned: 1.0/1.0
Correct Answer(s): B
28.
Suppose you entered the following formula in cell A1 in EXCEL:
=IF(A2=2,4,0)
What value will be displayed in cell A1 if cell A2 = 2?
A) 2
B) 0
C) 3
D) 4
Table for Individual Question Feedback
Points Earned: 1.0/1.0
Correct Answer(s): D
29.
Working in EXCEL, you want to calculate the amount of a loan payment that goes to principal. Which function should you use?
A) IMPT()
B) PMT()
C) PPMT()
D) PAY()
Table for Individual Question Feedback
Points Earned: 1.0/1.0
Correct Answer(s): C
30.
Assume tha that you have the following table in an EXCEL spreadsheet:
What tool in EXCEL would you use if you wanted to determine what price you would have to sell gizmos at to have a profit margin of 10%?
A) Goal-Seek
B) Scenario manager
C) Logical function
D) Pivot table
Table for Individual Question Feedback
Points Earned: 1.0/1.0
Correct Answer(s): A [Show Less]