The ethical principle which states that if an action is not right for all situations, then it is not right for any situation is known as __________.
The ethical principle which states that if an action is not right for all situations, then it is not right for any situation is known as __________.
What sends work assignments through an e‐mail system?
What sends work assignments through an e‐mail system?
What floods a Web site with so many requests for service that it slows down or crashes?
What floods a Web site with so many requests for service that it slows down or crashes?
Products are made to prior to orders received based on estimated demand under a _________.
Products are made to prior to orders received based on estimated demand under a _________.
What is the first step in a P3P-enabled transaction?
What is the first step in a P3P-enabled transaction?
The fastest growing form of online advertising is _________.
The fastest growing form of online advertising is _________.
What automates business processes?
What automates business processes?
Which will notarmomputer resources?
Which will notarmomputer resources?
ERP stands for.
ERP stands for.
Which of the following describes paid content's relation to free user-generated content?
Which of the following describes paid content's relation to free user-generated content?
The per-product price consumers are willing to pay for a bundle ____________ as the number of goods in the bundle increases.
The per-product price consumers are willing to pay for a bundle ____________ as the number of goods in the bundle increases.
What is the process of evaluating IT assets, their importance to the organization, and their susceptibility to threats, to measure the risk exposure of these assets?
What is the process of evaluating IT assets, their importance to the organization, and their susceptibility to threats, to measure the risk exposure of these assets?
Which of the following is a measure of the percentage of purchasers who return to a Web site within a year?
Which of the following is a measure of the percentage of purchasers who return to a Web site within a year?
Which is not a component of ERP?
Which is not a component of ERP?
The largest segment in the recruitment business is________.
The largest segment in the recruitment business is________.
All of the following are among the most common categories of spam except ______.
All of the following are among the most common categories of spam except ______.
A combination of software and information designed to provide security and information for payment is called a what?
A combination of software and information designed to provide security and information for payment is called a what?
A(n) _________ represents data as two-dimensional tables with records organized in rows and attributes in columns.
A(n) _________ represents data as two-dimensional tables with records organized in rows and attributes in columns.
All of the following are acts Congress has passed or attempted to pass to protect children online except __________.
All of the following are acts Congress has passed or attempted to pass to protect children online except __________.
Which of the following statements about privacy is true?
Which of the following statements about privacy is true?
During which period of Internet governance was Network Solutions given a monopoly to assign and track high-level domains?
During which period of Internet governance was Network Solutions given a monopoly to assign and track high-level domains?
What is a type of virus that spreads itself, not just from file to file, but from computer to computer via e‐mail and other Internet traffic?
What is a type of virus that spreads itself, not just from file to file, but from computer to computer via e‐mail and other Internet traffic?
What is an internal organizational Internet that is guarded against outside access by a special security feature called a firewall (which can be software, hardware, or a combination of the two)?
What is an internal organizational Internet that is guarded against outside access by a special security feature called a firewall (which can be software, hardware, or a combination of the two)?
What software detects and removes or quarantines computer viruses?
What software detects and removes or quarantines computer viruses?
The top U.S online video site is ______.
The top U.S online video site is ______.
The set of applications and technologies that allow users to create, edit, and distribute content online is known as______.
The set of applications and technologies that allow users to create, edit, and distribute content online is known as______.
A good or service for which there are many dealers supplying the same product, and all products in the segment are essentially identical is known as _______.
A good or service for which there are many dealers supplying the same product, and all products in the segment are essentially identical is known as _______.
After sending e-mail, which of the following activities is most common among Internet users?
After sending e-mail, which of the following activities is most common among Internet users?
Which is a function of ERP?
Which is a function of ERP?
Which factor determines when your IT system will be available for knowledge workers to access?
Which factor determines when your IT system will be available for knowledge workers to access?
Which of the following represents a limiting factor for the growth of e-commerce?
Which of the following represents a limiting factor for the growth of e-commerce?
__________ influence the behavior of others through their personality, skills, or other factors.
__________ influence the behavior of others through their personality, skills, or other factors.
Which of the following is an industry strategic factor that relates to whether new entrants face a disadvantage when attempting to enter an industry?
Which of the following is an industry strategic factor that relates to whether new entrants face a disadvantage when attempting to enter an industry?
All of the following are types of intellectual property protection except_______.
All of the following are types of intellectual property protection except_______.
Which factor represents a system's ability to change quickly?
Which factor represents a system's ability to change quickly?
The redirection of traffic from a legitimate site to an infringing site is called _______.
The redirection of traffic from a legitimate site to an infringing site is called _______.
What is a detailed process for recovering information or an IT system in the event of a catastrophic disaster such as a fire or flood?
What is a detailed process for recovering information or an IT system in the event of a catastrophic disaster such as a fire or flood?
Which factor ensures your IT systems are functioning correctly and providing accurate information?
Which factor ensures your IT systems are functioning correctly and providing accurate information?
Creating multiple versions of information goods and selling essentially the same product to different market segments at different prices is called__________.
Creating multiple versions of information goods and selling essentially the same product to different market segments at different prices is called__________.
Which is not a function of ERP?
Which is not a function of ERP?
Which of the following measures the percentage of people exposed to an online advertisement who actually click on the banner?
Which of the following measures the percentage of people exposed to an online advertisement who actually click on the banner?
Which service encompasses all technologies used to transmit and process information on an across a network?
Which service encompasses all technologies used to transmit and process information on an across a network?
What determines the future IT infrastructure requirements for new equipment and additional network capacity?
What determines the future IT infrastructure requirements for new equipment and additional network capacity?
Who protects system from external threats?
Who protects system from external threats?
What is the use of physical characteristics — such as your fingerprint, the blood vessels in the retina of your eye, the sound of your voice, or perhaps even your breath — to provide identification?
What is the use of physical characteristics — such as your fingerprint, the blood vessels in the retina of your eye, the sound of your voice, or perhaps even your breath — to provide identification?
Which of the following is not one of the top three online career service providers?
Which of the following is not one of the top three online career service providers?
What is a set of conditions used to measure how well a product or system functions?
What is a set of conditions used to measure how well a product or system functions?
Which of the following market entry strategies are the most common for existing firms?
Which of the following market entry strategies are the most common for existing firms?
Firewalls perform all of the following functions except _________.
Firewalls perform all of the following functions except _________.
As consumers become more accustomed to new online advertising formats, click-through rates tend to _______.
As consumers become more accustomed to new online advertising formats, click-through rates tend to _______.
E-business can be defined as_______.
E-business can be defined as_______.
Which factor determines who has the right to access different types of IT systems and information?
Which factor determines who has the right to access different types of IT systems and information?
Which process is used to reinstall data from a copy when the original data has been lost?
Which process is used to reinstall data from a copy when the original data has been lost?
A security plan begins with a(n) is ______.
A security plan begins with a(n) is ______.
All of the following are types of social marketing except ______.
All of the following are types of social marketing except ______.
The practice of forging a return address on an e‐mail so that the recipient is fooled into revealing private information is termed?
The practice of forging a return address on an e‐mail so that the recipient is fooled into revealing private information is termed?
The number of business methods patents granted is ___________ compared to the number of patents applied for.
The number of business methods patents granted is ___________ compared to the number of patents applied for.
Which of the following is the largest online travel service?
Which of the following is the largest online travel service?
The ability of consumers to review and contest the accuracy and completeness of data collected about them involves which of the following FTC fair information practice principles?
The ability of consumers to review and contest the accuracy and completeness of data collected about them involves which of the following FTC fair information practice principles?
What defines all of the steps or business rules, from beginning to end, required for a process to run correctly?
What defines all of the steps or business rules, from beginning to end, required for a process to run correctly?
Which of the following is used in B2B to pay for purchases?
Which of the following is used in B2B to pay for purchases?
The most common form of securing channels is through ________.
The most common form of securing channels is through ________.
What is the process of making a copy of the information stored on a computer?
What is the process of making a copy of the information stored on a computer?
What is a separate facility that does not have any computer equipment but is a place where the knowledge workers can move after the disaster?
What is a separate facility that does not have any computer equipment but is a place where the knowledge workers can move after the disaster?
Who breaks into other people's computer systems and steals and destroys information?
Who breaks into other people's computer systems and steals and destroys information?
What charts (1) the cost to your organization of the unavailability of information and technology and (2) the cost to your organization of recovering from a disaster over time?
What charts (1) the cost to your organization of the unavailability of information and technology and (2) the cost to your organization of recovering from a disaster over time?
The major impact of Internet real estate sites is in ______.
The major impact of Internet real estate sites is in ______.
What is the name for direct computer‐to‐computer transfer of transaction information contained in standard business documents?
What is the name for direct computer‐to‐computer transfer of transaction information contained in standard business documents?
What scrambles the contents of a file so you can't read it without having the right decryption key?
What scrambles the contents of a file so you can't read it without having the right decryption key?
All of the following are metrics for e-mail campaigns except _________.
All of the following are metrics for e-mail campaigns except _________.
Which of the following is the primary characteristic of an intranet?
Which of the following is the primary characteristic of an intranet?
Which process can preventata from lose due to computer problems or human errors?
Which process can preventata from lose due to computer problems or human errors?
What consists of the identification of risks or threats, the implementation of security measures, and the monitoring of those measures for effectiveness?
What consists of the identification of risks or threats, the implementation of security measures, and the monitoring of those measures for effectiveness?
Which factor represents how well your system can adapt to increased demands?
Which factor represents how well your system can adapt to increased demands?
What is an intranet that is restricted to an organization and certain outsiders, such as customers and suppliers?
What is an intranet that is restricted to an organization and certain outsiders, such as customers and suppliers?
All of the following are types of data mining except ______.
All of the following are types of data mining except ______.
The majority of job seekers rely on which of the following?
The majority of job seekers rely on which of the following?
All of the following are examples of intelligent agent technology except ________.
All of the following are examples of intelligent agent technology except ________.
Which concept suggests that different applications and computer systems should be able to communicate with one another?
Which concept suggests that different applications and computer systems should be able to communicate with one another?
What is hardware and/or software that protects computers from intruders?
What is hardware and/or software that protects computers from intruders?
What harnesses far‐flung computers together by way of the Internet or a virtual private network to share CPU power, databases, and database storage?
What harnesses far‐flung computers together by way of the Internet or a virtual private network to share CPU power, databases, and database storage?
The most popular type of media in terms of total hours of consumption per year is _____.
The most popular type of media in terms of total hours of consumption per year is _____.
What describes a process of continuously measuring results and comparing those results to optimal performance so that actual performance may be improved?
What describes a process of continuously measuring results and comparing those results to optimal performance so that actual performance may be improved?
What is a model of a proposed product, service, or system?
What is a model of a proposed product, service, or system?
Which of the following is a privacy advocacy group that is a foundation- and business-supported group with a legislative focus?
Which of the following is a privacy advocacy group that is a foundation- and business-supported group with a legislative focus?
The process of getting customers to pass along a company's marketing message to friends, family, and colleagues is known as _______.
The process of getting customers to pass along a company's marketing message to friends, family, and colleagues is known as _______.
What is the name of the division of the U.S. Department of Homeland Security that coordinates cyber incident warnings and responses across government and private sectors?
What is the name of the division of the U.S. Department of Homeland Security that coordinates cyber incident warnings and responses across government and private sectors?
A patent grants the owner an exclusive monopoly on the ideas behind the invention for ______ years.
A patent grants the owner an exclusive monopoly on the ideas behind the invention for ______ years.
Which is not a function of ERP?
Which is not a function of ERP?
Public key encryption uses multiple keys.ne key is used to encrypt data, while another is used to decrypt data.he key used to encrypt data is called the _______ key, while the key used to decrypt data is called the ________ key.
Public key encryption uses multiple keys.ne key is used to encrypt data, while another is used to decrypt data.he key used to encrypt data is called the _______ key, while the key used to decrypt data is called the ________ key.
All of the following are considered biometrics, except:
All of the following are considered biometrics, except:
All of the following are challenges to online retail except ______.
All of the following are challenges to online retail except ______.
The only payment system that is instantly convertible without intermediation is _______.
The only payment system that is instantly convertible without intermediation is _______.
Complete price transparency in a perfect information marketplace is necessary for ____________ to take effect.
Complete price transparency in a perfect information marketplace is necessary for ____________ to take effect.
What is software that comes hidden in free downloadable software and tracks your online movements, mines the information stored on your computer, or uses your computer's CPU and storage for some task you know nothing about?
What is software that comes hidden in free downloadable software and tracks your online movements, mines the information stored on your computer, or uses your computer's CPU and storage for some task you know nothing about?
When a transaction is processed online, how can the merchant verify the customer's identity?
When a transaction is processed online, how can the merchant verify the customer's identity?
Secure Sockets Layers does which of the following?
Secure Sockets Layers does which of the following?
The __________ is the first major effort to adjust the copyright laws to the Internet age.
The __________ is the first major effort to adjust the copyright laws to the Internet age.
The most prevalent online payment method is ______.
The most prevalent online payment method is ______.
What is a separate and fully equipped facility where the company can move immediately after the disaster and resume business?
What is a separate and fully equipped facility where the company can move immediately after the disaster and resume business?