What is the use of physical characteristics — such as your fingerprint, the blood vessels in the retina of your eye, the sound of your voice, or perhaps even your breath — to provide identification?
What is the use of physical characteristics — such as your fingerprint, the blood vessels in the retina of your eye, the sound of your voice, or perhaps even your breath — to provide identification?
Which is not a function of ERP?
Which is not a function of ERP?
What is software that comes hidden in free downloadable software and tracks your online movements, mines the information stored on your computer, or uses your computer's CPU and storage for some task you know nothing about?
What is software that comes hidden in free downloadable software and tracks your online movements, mines the information stored on your computer, or uses your computer's CPU and storage for some task you know nothing about?
The most popular type of media in terms of total hours of consumption per year is _____.
The most popular type of media in terms of total hours of consumption per year is _____.
What scrambles the contents of a file so you can't read it without having the right decryption key?
What scrambles the contents of a file so you can't read it without having the right decryption key?
Which process is used to reinstall data from a copy when the original data has been lost?
Which process is used to reinstall data from a copy when the original data has been lost?
All of the following are metrics for e-mail campaigns except _________.
All of the following are metrics for e-mail campaigns except _________.
All of the following are considered biometrics, except:
All of the following are considered biometrics, except:
Which will notarmomputer resources?
Which will notarmomputer resources?
E-business can be defined as_______.
E-business can be defined as_______.
When a transaction is processed online, how can the merchant verify the customer's identity?
When a transaction is processed online, how can the merchant verify the customer's identity?
Which factor determines when your IT system will be available for knowledge workers to access?
Which factor determines when your IT system will be available for knowledge workers to access?
ERP stands for.
ERP stands for.
A patent grants the owner an exclusive monopoly on the ideas behind the invention for ______ years.
A patent grants the owner an exclusive monopoly on the ideas behind the invention for ______ years.
What sends work assignments through an e‐mail system?
What sends work assignments through an e‐mail system?
The number of business methods patents granted is ___________ compared to the number of patents applied for.
The number of business methods patents granted is ___________ compared to the number of patents applied for.
What floods a Web site with so many requests for service that it slows down or crashes?
What floods a Web site with so many requests for service that it slows down or crashes?
A security plan begins with a(n) is ______.
A security plan begins with a(n) is ______.
A combination of software and information designed to provide security and information for payment is called a what?
A combination of software and information designed to provide security and information for payment is called a what?
Which is not a function of ERP?
Which is not a function of ERP?
Which of the following is the primary characteristic of an intranet?
Which of the following is the primary characteristic of an intranet?
All of the following are acts Congress has passed or attempted to pass to protect children online except __________.
All of the following are acts Congress has passed or attempted to pass to protect children online except __________.
All of the following are types of social marketing except ______.
All of the following are types of social marketing except ______.
Which of the following describes paid content's relation to free user-generated content?
Which of the following describes paid content's relation to free user-generated content?
Who protects system from external threats?
Who protects system from external threats?
Creating multiple versions of information goods and selling essentially the same product to different market segments at different prices is called__________.
Creating multiple versions of information goods and selling essentially the same product to different market segments at different prices is called__________.
What is the process of evaluating IT assets, their importance to the organization, and their susceptibility to threats, to measure the risk exposure of these assets?
What is the process of evaluating IT assets, their importance to the organization, and their susceptibility to threats, to measure the risk exposure of these assets?
What is a detailed process for recovering information or an IT system in the event of a catastrophic disaster such as a fire or flood?
What is a detailed process for recovering information or an IT system in the event of a catastrophic disaster such as a fire or flood?
During which period of Internet governance was Network Solutions given a monopoly to assign and track high-level domains?
During which period of Internet governance was Network Solutions given a monopoly to assign and track high-level domains?
The fastest growing form of online advertising is _________.
The fastest growing form of online advertising is _________.
Complete price transparency in a perfect information marketplace is necessary for ____________ to take effect.
Complete price transparency in a perfect information marketplace is necessary for ____________ to take effect.
The most prevalent online payment method is ______.
The most prevalent online payment method is ______.
What automates business processes?
What automates business processes?
What is a separate facility that does not have any computer equipment but is a place where the knowledge workers can move after the disaster?
What is a separate facility that does not have any computer equipment but is a place where the knowledge workers can move after the disaster?
The __________ is the first major effort to adjust the copyright laws to the Internet age.
The __________ is the first major effort to adjust the copyright laws to the Internet age.
All of the following are challenges to online retail except ______.
All of the following are challenges to online retail except ______.
The majority of job seekers rely on which of the following?
The majority of job seekers rely on which of the following?
Which concept suggests that different applications and computer systems should be able to communicate with one another?
Which concept suggests that different applications and computer systems should be able to communicate with one another?
All of the following are types of data mining except ______.
All of the following are types of data mining except ______.
What is the name of the division of the U.S. Department of Homeland Security that coordinates cyber incident warnings and responses across government and private sectors?
What is the name of the division of the U.S. Department of Homeland Security that coordinates cyber incident warnings and responses across government and private sectors?
What is a model of a proposed product, service, or system?
What is a model of a proposed product, service, or system?
The ethical principle which states that if an action is not right for all situations, then it is not right for any situation is known as __________.
The ethical principle which states that if an action is not right for all situations, then it is not right for any situation is known as __________.
What determines the future IT infrastructure requirements for new equipment and additional network capacity?
What determines the future IT infrastructure requirements for new equipment and additional network capacity?
The top U.S online video site is ______.
The top U.S online video site is ______.
What harnesses far‐flung computers together by way of the Internet or a virtual private network to share CPU power, databases, and database storage?
What harnesses far‐flung computers together by way of the Internet or a virtual private network to share CPU power, databases, and database storage?
__________ influence the behavior of others through their personality, skills, or other factors.
__________ influence the behavior of others through their personality, skills, or other factors.
A(n) _________ represents data as two-dimensional tables with records organized in rows and attributes in columns.
A(n) _________ represents data as two-dimensional tables with records organized in rows and attributes in columns.
Which of the following market entry strategies are the most common for existing firms?
Which of the following market entry strategies are the most common for existing firms?
What charts (1) the cost to your organization of the unavailability of information and technology and (2) the cost to your organization of recovering from a disaster over time?
What charts (1) the cost to your organization of the unavailability of information and technology and (2) the cost to your organization of recovering from a disaster over time?
What is the name for direct computer‐to‐computer transfer of transaction information contained in standard business documents?
What is the name for direct computer‐to‐computer transfer of transaction information contained in standard business documents?
Which factor ensures your IT systems are functioning correctly and providing accurate information?
Which factor ensures your IT systems are functioning correctly and providing accurate information?
What describes a process of continuously measuring results and comparing those results to optimal performance so that actual performance may be improved?
What describes a process of continuously measuring results and comparing those results to optimal performance so that actual performance may be improved?
After sending e-mail, which of the following activities is most common among Internet users?
After sending e-mail, which of the following activities is most common among Internet users?
Which is a function of ERP?
Which is a function of ERP?
A good or service for which there are many dealers supplying the same product, and all products in the segment are essentially identical is known as _______.
A good or service for which there are many dealers supplying the same product, and all products in the segment are essentially identical is known as _______.
The set of applications and technologies that allow users to create, edit, and distribute content online is known as______.
The set of applications and technologies that allow users to create, edit, and distribute content online is known as______.
As consumers become more accustomed to new online advertising formats, click-through rates tend to _______.
As consumers become more accustomed to new online advertising formats, click-through rates tend to _______.
Which of the following is not one of the top three online career service providers?
Which of the following is not one of the top three online career service providers?
Which of the following represents a limiting factor for the growth of e-commerce?
Which of the following represents a limiting factor for the growth of e-commerce?
What is hardware and/or software that protects computers from intruders?
What is hardware and/or software that protects computers from intruders?
Which of the following statements about privacy is true?
Which of the following statements about privacy is true?
What consists of the identification of risks or threats, the implementation of security measures, and the monitoring of those measures for effectiveness?
What consists of the identification of risks or threats, the implementation of security measures, and the monitoring of those measures for effectiveness?
What is the process of making a copy of the information stored on a computer?
What is the process of making a copy of the information stored on a computer?
All of the following are examples of intelligent agent technology except ________.
All of the following are examples of intelligent agent technology except ________.
Which of the following is a measure of the percentage of purchasers who return to a Web site within a year?
Which of the following is a measure of the percentage of purchasers who return to a Web site within a year?
What defines all of the steps or business rules, from beginning to end, required for a process to run correctly?
What defines all of the steps or business rules, from beginning to end, required for a process to run correctly?
Public key encryption uses multiple keys.ne key is used to encrypt data, while another is used to decrypt data.he key used to encrypt data is called the _______ key, while the key used to decrypt data is called the ________ key.
Public key encryption uses multiple keys.ne key is used to encrypt data, while another is used to decrypt data.he key used to encrypt data is called the _______ key, while the key used to decrypt data is called the ________ key.
What is the first step in a P3P-enabled transaction?
What is the first step in a P3P-enabled transaction?
The ability of consumers to review and contest the accuracy and completeness of data collected about them involves which of the following FTC fair information practice principles?
The ability of consumers to review and contest the accuracy and completeness of data collected about them involves which of the following FTC fair information practice principles?
Which of the following is used in B2B to pay for purchases?
Which of the following is used in B2B to pay for purchases?
All of the following are among the most common categories of spam except ______.
All of the following are among the most common categories of spam except ______.
The practice of forging a return address on an e‐mail so that the recipient is fooled into revealing private information is termed?
The practice of forging a return address on an e‐mail so that the recipient is fooled into revealing private information is termed?
Products are made to prior to orders received based on estimated demand under a _________.
Products are made to prior to orders received based on estimated demand under a _________.
Which of the following is an industry strategic factor that relates to whether new entrants face a disadvantage when attempting to enter an industry?
Which of the following is an industry strategic factor that relates to whether new entrants face a disadvantage when attempting to enter an industry?
What is an intranet that is restricted to an organization and certain outsiders, such as customers and suppliers?
What is an intranet that is restricted to an organization and certain outsiders, such as customers and suppliers?
The most common form of securing channels is through ________.
The most common form of securing channels is through ________.
Which factor represents how well your system can adapt to increased demands?
Which factor represents how well your system can adapt to increased demands?
Firewalls perform all of the following functions except _________.
Firewalls perform all of the following functions except _________.
Who breaks into other people's computer systems and steals and destroys information?
Who breaks into other people's computer systems and steals and destroys information?
Which of the following is a privacy advocacy group that is a foundation- and business-supported group with a legislative focus?
Which of the following is a privacy advocacy group that is a foundation- and business-supported group with a legislative focus?
The major impact of Internet real estate sites is in ______.
The major impact of Internet real estate sites is in ______.
Which is not a component of ERP?
Which is not a component of ERP?
What is a set of conditions used to measure how well a product or system functions?
What is a set of conditions used to measure how well a product or system functions?
The per-product price consumers are willing to pay for a bundle ____________ as the number of goods in the bundle increases.
The per-product price consumers are willing to pay for a bundle ____________ as the number of goods in the bundle increases.
What is a type of virus that spreads itself, not just from file to file, but from computer to computer via e‐mail and other Internet traffic?
What is a type of virus that spreads itself, not just from file to file, but from computer to computer via e‐mail and other Internet traffic?
Secure Sockets Layers does which of the following?
Secure Sockets Layers does which of the following?
The largest segment in the recruitment business is________.
The largest segment in the recruitment business is________.
The process of getting customers to pass along a company's marketing message to friends, family, and colleagues is known as _______.
The process of getting customers to pass along a company's marketing message to friends, family, and colleagues is known as _______.
Which of the following measures the percentage of people exposed to an online advertisement who actually click on the banner?
Which of the following measures the percentage of people exposed to an online advertisement who actually click on the banner?
Which of the following is the largest online travel service?
Which of the following is the largest online travel service?
Which process can preventata from lose due to computer problems or human errors?
Which process can preventata from lose due to computer problems or human errors?
Which service encompasses all technologies used to transmit and process information on an across a network?
Which service encompasses all technologies used to transmit and process information on an across a network?
What software detects and removes or quarantines computer viruses?
What software detects and removes or quarantines computer viruses?
What is a separate and fully equipped facility where the company can move immediately after the disaster and resume business?
What is a separate and fully equipped facility where the company can move immediately after the disaster and resume business?
The redirection of traffic from a legitimate site to an infringing site is called _______.
The redirection of traffic from a legitimate site to an infringing site is called _______.
Which factor represents a system's ability to change quickly?
Which factor represents a system's ability to change quickly?
What is an internal organizational Internet that is guarded against outside access by a special security feature called a firewall (which can be software, hardware, or a combination of the two)?
What is an internal organizational Internet that is guarded against outside access by a special security feature called a firewall (which can be software, hardware, or a combination of the two)?
Which factor determines who has the right to access different types of IT systems and information?
Which factor determines who has the right to access different types of IT systems and information?
All of the following are types of intellectual property protection except_______.
All of the following are types of intellectual property protection except_______.
The only payment system that is instantly convertible without intermediation is _______.
The only payment system that is instantly convertible without intermediation is _______.