CHAPTER 5.An assembly language can contribute to organizational success by providing managers and decision makers with timely, accurate, and relevant information based on data.
True
False
Question 20 / 1
pointA database provides an essential foundation for an organization's information and decision support system.
True
False
Question 30 / 1
pointA database, a DBMS, and the application programs that use the data make up the database environment.
True
False
Question 40 / 1
pointAttributes are usually selected to reflect the relevant characteristics of entities such as employees or customers.
True
False
Question 50 / 1
pointA standardized, uniform approach to database access means that all application programs use the same overall procedures to retrieve data and information.
True
False
Question 60 / 1
pointData modeling usually involves understanding a specific business problem and analyzing the data and information needed to deliver a solution.
True
False
Question 70 / 1
pointER diagrams help ensure that the relationships among the data entities in a database are correctly structured.
True
False
Question 80 / 1
pointThe tables in relational databases organize data in rows and columns, simplifying data access and manipulation.
True
False
Question 90 / 1
pointDatabases based on the network model include IBM DB2, Oracle, Sybase, Microsoft SQL Server, Microsoft Access, and MySQL.
True
False
Question 100 / 1
pointOne of the primary disadvantages of a relational database is that it does not allow tables to be linked.
True
False
Question 110 / 1
pointValuable data is accurate, complete, economical, flexible, reliable, relevant, simple, timely, verifiable, accessible, and secure.
True
False
Question 120 / 1
pointData anomalies often result in incorrect information, causing database users to be misinformed about actual conditions.
True
False
Question 130 / 1
pointA database installed on a personal computer is typically meant for a single user.
True
False
Question 140 / 1
pointLarge mainframe computer systems can do without multiuser DBMSs.
True
False
Question 150 / 1
pointAll DBMSs share some common functions, such as providing a user view, physically storing and retrieving data in a database, allowing for database modification, manipulating data, and generating reports.
True
False
Question 160 / 1
pointA DDL allows the database's creator to describe the data and relationships that are to be contained in the schema.
True
False
Question 170 / 1
pointA data dictionary should not include a description of data flows, the way records are organized, and the data-processing requirements.
True
False
Question 180 / 1
pointSQL statements can be embedded into many programming languages, such as the widely used C++ and COBOL languages.
True
False
Question 190 / 1
pointA DBMS can produce a wide variety of documents, reports, and other outputs that can help organizations achieve their goals.
True
False
Question 200 / 1
pointDatabase systems require a skilled project manager.
True
False
Question 210 / 1
point
A network administrator is expected to have a clear understanding of the fundamental business of the organization, be proficient in the use of selected database management systems, and stay abreast of emerging technologies and new design approaches.
True
False
Question 220 / 1
pointData warehouses allow managers to drill down to get more detail or roll up to take detailed data and generate aggregate or summary reports.
True
False
Question 230 / 1
pointA data model stores historical data that has been extracted from operational systems and external data sources.
True
False
Question 240 / 1
pointData marts bring the data warehouse concept (online analysis of sales, inventory, and other vital business data that has been gathered from transaction processing systems) to small and medium-sized businesses and to departments within larger companies.
True
False
Question 250 / 1
pointBecause data marts typically contain tens of gigabytes of data, as opposed to the hundreds of gigabytes in data warehouses, they can be deployed on less powerful hardware with smaller secondary storage devices, delivering significant savings to an organization.
True
False
Question 260 / 1
pointData marts are most useful for large groups who want to access general data.
True
False
Question 270 / 1
pointA data warehouse contains detailed information that can be used by an entire company.
True
False
Question 280 / 1
pointDistributed databases give corporations and other organizations more flexibility in how databases are organized and used.
True
False
Question 290 / 1
pointBecause distributed databases rely on telecommunications lines to transport data, access to data can be slow.
True
False
Question 300 / 1
pointSpatial data technology is used by ICANN to store data from satellites and Earth stations.
True
False
Question 310 / 1
pointA ____ consists of a group of programs that manipulate the database and provide an interface between the database and its users and other application programs.
flat file
database management system
front-end application
data dictionary
Question 320 / 1
pointA ____ is a skilled and trained IS professional who directs all activities related to an organization's database, including providing security from intruders.
network administrator
software engineer
database administrator
system administrator
Question 330 / 1
pointA byte is typically ____ bits.
2
4
6
8
Question 340 / 1
pointA ____ is typically a name, number, or combination of characters that describes an aspect of a business object.
field
character
record
file
Question 350 / 1
pointA collection of related data fields is a(n) ____.
record
database
entity
character
Question 360 / 1
pointA collection of related records is a(n) ____.
entity
attribute
file
schema
Question 370 / 1
pointA(n) ____ is a generalized class of people, places, or things (objects) for which data is collected, stored, and maintained.
data model
entity
relational model
attribute
Question 380 / 1
pointA(n) ____ is a field or set of fields in a record that identifies the record.
file
attribute
record
key
Question 390 / 1
pointThe ____ approach to data management is an approach whereby separate data files are created and stored for each application program.
traditional
systems
object-oriented
database
Question 400 / 1
pointThe ____ approach to data management is an approach whereby a Test of related data is shared by multiple application programs.
traditional
systems
object oriented
database
Question 410 / 1
point____ is a way of organizing data in which the logical database design is altered so that certain data entities are combined, summary totals are carried in the data records rather than calculated from elemental data, and some data attributes are repeated in more than one data entity to improve database performance.
Data modeling
Planned data redundancy
Concurrency control
Data mining
Question 420 / 1
point____ diagrams use basic graphical symbols to show the organization of and relationships between data.
Entity relationship
SQL
System
Domain
Question 430 / 1
pointThe ____ is a database model that describes data in which all data elements are placed in two-dimensional tables, called relations.
domain model
query model
entity model
relational model
Question 440 / 1
point____ involves the manipulation of data to eliminate rows according to certain criteria.
Data mining
Selecting
Projecting
Joining
Question 450 / 1
point____ involves eliminating columns in a table.
Joining
Selecting
Projecting
Data mining
Question 460 / 1
point____ involves combining two or more tables.
Data mining
Selecting
Projecting
Joining
Question 470 / 1
pointA(n) ____ is a simple database program whose records have no relationship to one another.
flat file
data dictionary
data mart
attribute
Question 480 / 1
pointBecause the DBMS is responsible for access to a database, one of the first steps in installing and using a large database involves telling the DBMS the logical and physical structure of the data and relationships among the data in the database for each user. This description is called a(n) ____.
record
relation
schema
data model
Question 490 / 1
pointA(n) ____ is a collection of instructions and commands used to define and describe data and relationships in a specific database.
machine language
procedural language
assembly language
data definition language
Question 500 / 1
pointA(n) ____ is a detailed description of all data used in the database.
data mart
data dictionary
attribute
data warehouse
Question 510 / 1
point____ is a method of dealing with a situation in which two or more people need to access the same record in a database at the same time.
Data modeling
Concurrency control
Predictive analysis
Query by Example
Question 520 / 1
point____ is a visual approach to developing database queries or requests.
Query-by-Example
Enterprise data modeling
Data mining
Concurrency control
Question 530 / 1
pointThe ____ is responsible for defining and implementing consistent principles for a variety of data issues, including setting data standards and data definitions that apply across all the databases in an organization.
systems administrator
network administrator
data administrator
project manager
Question 540 / 1
pointA ____ is one that directly interacts with people or users.
database application
front-end application
proprietary application
back-end application
Question 550 / 1
pointA ____ interacts with other programs or applications; it only indirectly interacts with people or users.
database application
front-end application
proprietary application
back-end application
Question 560 / 1
pointA ____ is a database that holds business information from many sources in the enterprise, covering all aspects of the company's processes, products, and customers.
data warehouse
data mart
relation
data dictionary
Question 570 / 1
pointA(n) ____ is a subset of a data warehouse.
data model
data mart
object
schema
Question 580 / 1
point____ is an information-analysis tool that involves the automated discovery of patterns and relationships in a data warehouse.
Spatial technology
Query by example
Data mining
OLAP
Question 590 / 1
point____ is a form of data mining that combines historical data with assumptions about future conditions to predict outcomes of events, such as future product sales or the probability that a customer will default on a loan.
Query by example
OLAP
Data modeling
Predictive analysis
Question 600 / 1
pointRetailers use ____ to upgrade occasional customers into frequent purchasers by predicting what products they will buy if offered an appropriate incentive.
databases
predictive analysis
bots
systems analysis
Question 610 / 1
point____ involves gathering enough of the right information in a timely manner and usable form and analyzing it so that it can have a positive effect on business strategy, tactics, or operations.
Data synchronization
Business intelligence
CRM
Paging
Question 620 / 1
point____ is one aspect of business intelligence and is limited to information about competitors and the ways that knowledge affects strategy, tactics, and operations.
Competitive intelligence
Data synchronization
Counterintelligence
Paging
Question 63 0 / 1
pointThe term ____ describes the steps an organization takes to protect information sought by "hostile" intelligence gatherers.
predictive analysis
data synchronization
data cleanup
counterintelligence
Question 640 / 1
pointA ____ holds a duplicate set of frequently used data.
data mart
relational database
replicated database
procedural database
Question 650 / 1
point____ is used to make sure that replicated databases are accurate, up to date, and consistent with each other.
Business intelligence
Data synchronization
OLAP
Spatial technology
Question 660 / 1
point____ allows users to explore data from a number of perspectives.
SQL
Data mining
OLAP
Predictive analysis
Question 670 / 1
pointAn object-oriented database uses a(n) ____ to provide a user interface and connections to other programs.
object-oriented database management system
Java
Visual Basic
object-relational database management system
Question 68 0 / 1 point
A(n) ____ provides a complete set of relational database capabilities plus the ability for third parties to add new data types and operations to the database.
object-oriented database management system
Java
Visual Basic
object-relational database management system
Question 69 0 / 1 pointThe ____ is a design standard created by the Object Database Management Group for developing object-oriented database systems.
Database Standard
Object Data Standard
Programming Standard
Object-Oriented Standard
Question 700 / 1
point____ involves the use of a database to store and access data according to the locations it describes and to permit spatial queries and analysis.
Spatial data technology
SQL
Predictive analysis
Data mining
CHAPTER 6
Question 1 1 / 1 pointTelecommunications devices relay signals between computer systems and transmission media.
True
FalseQuestion 2
0 / 1 point
Voice and phone communications are examples of asynchronous communications.
True
FalseQuestion 3
0 / 1 point
Narrowband communications can exchange data very quickly.True
FalseQuestion 4
0 / 1 point
A broadband communications system supports a very low rate of data exchange.
True
FalseQuestion 5
0 / 1 point
Twisted-pair wire offers cleaner and crisper data transmission (less noise) than coaxial cable.
True
FalseQuestion 6
0 / 1 point
Radio transmission operates in the 15 KHz–30 MHz frequency range.True
FalseQuestion 7
0 / 1 point
A potential issue with broadband over power lines is that transmitting data over unshielded power lines can interfere with both ham radio broadcasts and police and fire radios.
True
FalseQuestion 8
0 / 1 point
Infrared transmission requires line-of-sight transmission and short distances - such as a few yards.
True
FalseQuestion 9
0 / 1 point
Infrared transmission allows handheld computers to transmit data and information to larger computers within the same room and to connect a display screen, a printer, and a mouse to a computer.
True
FalseQuestion 10
0 / 1 point
Microwave signals can carry thousands of channels at the same time.
True
FalseQuestion 11
0 / 1 point
A communications satellite can operate in the microwave frequency range.True
FalseQuestion 12
0 / 1 point
A WAN might be privately owned or rented and includes public networks.True
FalseQuestion 13
0 / 1 point
Many countries, including those in the European Union, have strict laws limiting the use of telecommunications and databases, making normal business transactions such as payroll costly, slow, or even impossible.
True
FalseQuestion 14
0 / 1 point
WANs usually consist of computer equipment owned by the user, together with data communications equipment and telecommunications links provided by various carriers and service providers.
True
FalseQuestion 15
0 / 1 point
A cable modem can deliver network and Internet access at up to 10Mbps.True
FalseQuestion 16
0 / 1 point
MySpace, the popular social networking Web site that offers an interactive, user submitted network of friends, personal profiles, blogs, photos, music, and videos internationally, was one of the first very busy Web sites to adopt the use of Windows Server 2008.
True
FalseQuestion 17
0 / 1 point
With network management software, a manager on a networked personal computer can monitor the use of individual computers and shared hardware (such as printers), scan for viruses, and ensure compliance with software licenses.
True
FalseQuestion 18
0 / 1 point
Encryption of data is one approach taken to protect the security of communications over both wired and wireless networks.
True
FalseQuestion 19
0 / 1 point
Most home and small business DSL users are connected to an asymmetric DSL (ADSL) line designed to provide a connection speed from the Internet to the user (download speed) that is three to four times faster than the connection from the user back to the Internet.
True
FalseQuestion 20
0 / 1 point
SDSL does not require an additional phone line and yet provides "always-on" Internet access.
True
FalseQuestion 21
0 / 1 point
Cable modems provide a dedicated connection from each user to the cable company's local office, so the performance does not decrease as new users are added.
True
FalseQuestion 22
0 / 1 point
ADSL does not allow you to use the phone at the same time.True
FalseQuestion 23
0 / 1 point
A network center is a physical location where an organization handles customer and other telephone calls, usually with some amount of computer automation.
True
FalseQuestion 24
0 / 1 point
Electronic document distribution lets you send and receive documents in a digital form without printing them.
True
FalseQuestion 25
0 / 1 point
Videoconferencing enables people to hold a conference by combining voice, video, and audio transmission.
True
FalseQuestion 26
0 / 1 point
Videoconferencing reduces travel expenses and time, and increases managerial effectiveness through faster response to problems, access to more people, and less duplication of effort by geographically dispersed sites.
True
FalseQuestion 27
0 / 1 point
Public network services give personal computer users access to vast databases, the Internet, and other services, usually for an initial fee plus usage fees.
True
FalseQuestion 28
0 / 1 point
Wire transfers are cleared immediately and cannot be canceled.True
FalseQuestion 29
0 / 1 point
A shared workspace is a common work area where authorized project members and colleagues can share documents, issues, models, schedules, spreadsheets, photos, and all forms of information to keep each other current on the status of projects or topics of common interest.
True
FalseQuestion 30
0 / 1 point
Distance learning can extend the classroom through the use of telecommunications.True
FalseQuestion 31
0 / 1 point
A ____ is any material substance that carries an electronic signal to support communications between a sending and receiving device.
slingbox
telecommunications medium
podcast
gatewayQuestion 32 0 / 1 point
The ____ is a specialized agency of the United Nations with headquarters in Geneva, Switzerland.
Institute of Electrical and Electronics Engineers
Near Field Communication
International Telecommunication Union
Infrared Transmission AgencyQuestion 33 0 / 1 point
____ communications occurs when the receiver gets the message instantaneously, when it is sent.
Asynchronous
Sequential
Synchronous
IndirectQuestion 34 0 / 1 point
____ communications occur when the receiver gets the message after some delay - sometimes hours or days after the message is sent.
Synchronous
Indirect
Sequential
Asynchronous
Question 35 0 / 1 point
The term telecommunications ____ refers to the rate at which data is exchanged.channel bandwidth
channel router
channel access
channel gatewayQuestion 36 0 / 1 point
10 Gigabit Ethernet is a standard for transmitting data in full-duplex mode at the speed of 10 billion bits per second for limited distances over category 5 or 6 ____.
broadband over power lines
fiber-optic cable
coaxial cable
twisted-pair wireQuestion 37 0 / 1 point
An advantage of ____ is that it can provide Internet service to rural areas where cable and phone service may be nonexistent.
broadband over power lines
fiber-optic cable
coaxial cable
twisted-pair wireQuestion 38 0 / 1 point
____ transmission is a wireless communications technology that operates at a frequency of 300 GHz and above.
Infrared
Analog
Multiplexer
RadioQuestion 39 0 / 1 point
____ has the potential to replace Bluetooth's 2 Mbps transmission speed with 400 Mbps rates for wirelessly connecting printers and other devices to desktop computers or enabling completely wireless home multimedia networks.
Zigbee
Ultra wideband
Infrared transmission
Near Field Communication
Question 40 0 / 1 point____ is a form of wireless communications frequently used in security systems and heating and cooling control systems.
Zigbee
Ultra wideband
Infrared transmission
Near Field Communication
Question 41 0 / 1 pointA ____ consists of a transmitter with an antenna.
frame relay
wireless access point
T-carrier system
routerQuestion 42 0 / 1 point
____ are transmitted by line-of-sight devices, so that the line of sight between the transmitter and receiver must be unobstructed.
Wireless meshes
Bluetooth signals
Ultra widebands
Terrestrial microwaves
Question 43 0 / 1 pointA ____ orbits the Earth directly over the equator, approximately 22,000 miles above the Earth so that it appears stationary.
geostationary satellite
very small aperture terminal
small mobile satellite station
low earth orbit satelliteQuestion 44 0 / 1 point
A ____ system employs many satellites, each in a circular orbit at an altitude of less than 1,000 miles.
geostationary satellite
very small aperture terminal
small mobile satellite
low earth orbit satelliteQuestion 45 0 / 1 point
A ____ is a two-way satellite ground station with a dish antenna smaller than 3 meters in diameter.
geostationary satellite
very small aperture terminal
radio transmission system
low earth orbit satelliteQuestion 46 0 / 1 point
____ is a way to route communications among network nodes (computers or other devices) by allowing for continuous connections and reconfiguration around blocked paths by "hopping" from node to node until a connection can be established.
Instant messaging
ActiveX
Wireless mesh
Content StreamingQuestion 47 0 / 1 point
A(n) ____ is a variable signal that is continuous in both time and amplitude so that any small fluctuations in the signal are meaningful.
digital signal
frame relay
analog signal
microwaveQuestion 48 0 / 1 point
A(n) ____ represents bits.digital signal
analog signal
microwave
frame relayQuestion 49 0 / 1 point
A(n) ____ is a wireless network that connects information technology devices within a range of 33 feet or so.
extranet
intranet
virtual private network
personal area networkQuestion 50 0 / 1 point
A network that connects computer systems and devices within a small area, such as an office, home, or several floors in a building is a(n) ____.
local area network
wide area network
ISP
URLQuestion 51 0 / 1 point
A(n) ____ is a telecommunications network that connects users and their computers in a geographical area that spans a campus or city.
URL
metropolitan area network
ISP
local area networkQuestion 52 0 / 1 point
A(n) ____ is a telecommunications network that connects large geographic regions.
ISP
local area network
URL
wide area networkQuestion 53 0 / 1 point
With ____, all processing occurs in a single location or facility.centralized processing
direct processing
sequential processing
decentralized processing
Question 54 0 / 1 pointWith ____, processing devices are placed at various remote locations.
centralized processing
decentralized processing
sequential processing
direct processingQuestion 55 0 / 1 point
With ____, computers are placed at remote locations but connected to each other via telecommunications devices.
sequential processing
decentralized processing
distributed processing
centralized processingQuestion 56 0 / 1 point
One benefit of ____ is that managers can allocate data to the locations that can process it most efficiently.
sequential processing
decentralized processing
distributed processing
centralized processingQuestion 57 0 / 1 point
____ can dial telephone numbers, originate message sending, and answer incoming calls and messages.
Modems
Routers
Frame relays
GatewaysQuestion 58 0 / 1 point
A ____ is a telecommunications hardware device that converts communications signals so they can be transmitted over the communication media.
router
multiplexer
bridge
modemQuestion 59 0 / 1 point
A ____ is a device that encodes data from two or more data sources onto a single communications channel, thus reducing the number of communications channels needed and therefore, lowering telecommunications costs.
modem
multiplexer
satellite
switchQuestion 60 0 / 1 point
____ are special-purpose computers that manage communications to and from a computer system serving hundreds or even thousands of users.
Front-end processorsQuestion 61 0 / 1 point
A ____ is a telecommunications device that connects one LAN to another LAN that uses the same telecommunications protocol.
bridge
switch
router
podcastQuestion 62
0 / 1 point
A ____ forwards data packets across two or more distinct networks toward their destinations through a process known as routing.
bridge
switch
router
gateway
Question 63
0 / 1 point
A ____ is a network device that serves as an entrance to another network.bridge
switch
router
gateway
Question 64
0 / 1 point
____ simplifies the process of updating files and programs on computers on the network - a manager can make changes through a communications server instead of having to visit each individual computer.
Frame relay
IEEE
Channel bandwidth
Network management
softwareQuestion 65 0 / 1 point
____ is the process of converting an original message into a form that can only be understood by the intended receiver.
Content streaming
Demodulation
Encryption
Centralized processing
Question 66 0 / 1 pointA ____ is a variable value that is applied (using an algorithm) to a set of unencrypted text to produce encrypted text or to decrypt encrypted text.
router
key
switch
protocolQuestion 67
0 / 1 point
A(n) ____ is a telecommunications service that delivers high-speed Internet access to homes and small businesses over the existing phone lines of the local telephone network.
ISP
switch
DSL
SlingboxQuestion 68 0 / 1 point
With ____, users can send, receive, and store verbal messages for and from other people around the world.
content streaming
voice mail
channel bandwidth
slingboxQuestion 69 0 / 1 point
____ is a way to communicate data from one company to another and from one application to another in a standard format.
Electronic data interchange
Content streaming
Mesh networking
Centralized processingQuestion 70 0 / 1 point
____ is a system of transferring money from one bank account directly to another without any paper money changing hands.
Demodulation
Modulation
Electronic funds transfer
Telecommunications
Question 1 1 / 1 pointThe ARPANET was both an experiment in reliable networking and a means to link DoD and military research contractors, including many universities doing military-funded research.
True
False
Question 2 0 / 1 pointIn 1989, TCP/IP became the protocol for ARPANET.
True
False
Question 3 1 / 1 pointThe set of conventions used to pass packets from one host to another is known as the wireless application protocol.
True
False
Question 4 0 / 1 pointThe ICANN has the authority to resolve domain-name disputes.
True
False
Question 5 0 / 1 pointThe Serial Line Internet Protocol is used to connect cell phones and other devices to the Internet.
True
False
Question 6 0 / 1 pointThe World Wide Web was developed by Linus Torvalds at CERN, the European Organization for Nuclear Research in Geneva.
True
False
Question 7 0 / 1 pointThe Web is a menu-based system that uses the peer-to-peer network model.
True
False
Question 8 0 / 1 pointWeb plug-ins can help provide additional features to standard Web sites.
True
False
Question 9 0 / 1 pointHTML tags let the browser know how to format text as a heading, as a list, or as body text.
True
False
Question 10 0 / 1 pointXML has a predefined tag set.
True
False
Question 11 0 / 1 pointPHP code or instructions can be embedded directly into HTML code.
True
False
Question 12 0 / 1 pointPopular tools for creating Web pages and managing Web sites include Adobe Dreamweaver, Microsoft Expression Web, and Nvu.
True
False
Question 13 0 / 1 pointThe .NET platform allows developers to use different programming languages to create and run programs, including those for the Web.
True
False
Question 14 0 / 1 pointThe key to Web services is XML.
True
False
Question 15 0 / 1 pointSearch engines make money from companies that place advertisements with the search results.
True
False
Question 16 0 / 1 pointVideo content can be placed on the Internet using the same approach as a blog.
True
False
Question 17 0 / 1 pointPeople and corporations can use podcasts to listen to audio material, increase revenues, or advertise products and services.
True
False
Question 18 0 / 1 pointRSS is a collection of Web technologies that allow users to subscribe to Web content that is frequently updated.
True
False
Question 19 0 / 1 pointUsing voice-over-IP (VoIP) technology, network managers can route phone calls and fax transmissions over the same network they use for data.
True
False
Question 20 0 / 1 pointOne way to put TV programming on the Internet is to use the wireless application protocol.
True
False
Question 21 0 / 1 pointThe ____ is a communication standard that enables traffic to be routed from one network to another as needed.
SLIP Internet Protocol
PPP HTTP
Question 22 0 / 1 pointThe ____ gives those who provide information over the Internet a standard way to designate where Internet resources such as servers and documents are located.
WWW
ARPANET
URL intranet
Question 23 0 / 1 pointThe ____ is a widely used Transport-layer protocol that most Internet applications use with IP.
SLIP HTTP TCP PPP
Question 24 0 / 1 pointThe term ____ is used to describe one of the Internet's high-speed, long-distance communications links.
backbone
podcasting
applet .NET
Question 25 0 / 1 pointThe ____ is a communications protocol that transmits packets over telephone lines.
IP HTTP TCP Serial Line Internet Protocol
Question 26 0 / 1 pointA(n) ____ is any company that provides people and organizations with access to the Internet.
Internet Service Provider host
personal information manager
application service providerQuestion 27 0 / 1 point
The ____ is a collection of tens of millions of server computers that work together as one in an Internet service using hyperlink technology to provide information to billions of users.
Web Services Description Language
Uniform Resource Locator Simple Object Access Protocol WWW
Question 28 0 / 1 pointA(n) ____ is an entry point or doorway to the Internet.
kernel
Web portal
applet bot
Question 29 0 / 1 point____ is the standard page description language for Web pages.
HTML
XML PHP Java
Question 30 0 / 1 pointA(n) ____ is software that has the functionality and complexity of traditional application software, but runs in a Web browser and does not require local installation.
podcast SLIP rich Internet application applet
Question 31 0 / 1 pointA(n) ____ is a small program embedded in Web pages.
intranet
extranet
packet applet
Question 32 0 / 1 point____ is an object-oriented programming language from Sun Microsystems based on the C++ programming language.
ActiveX VBScript Java
PHPQuestion 33 0 / 1 point____ allows small programs to be embedded within an HTML document.
ActiveX VBScript Java PHP
Question 34 0 / 1 point____ is an open-source programming language.
ActiveX VBScript Java PHP
Question 35 0 / 1 point____ consist of standards and tools that streamline and simplify communication among Web sites, promising to revolutionize the way we develop and use the Web for business and personal purposes.
Web services VPNs
Web services description languages
Chat roomsQuestion 36 0 / 1 point____ is a specification that defines the XML format for messages.
UDDI SOAP WSDL PHP
Question 37 0 / 1 point____ provides a way for a Web service application to describe its interfaces in enough detail to allow a user to build a client application to talk to it.
Universal Discovery Description and Integration Web Services Description Language Simple Object Access Protocol PHP
Question 38 0 / 1 point____ is used to register Web service applications with an Internet directory so that potential users can easily find them and carry out transactions over the Web.
Universal Discovery Description and Integration Web Services Description Language Simple Object Access Protocol PHP
Question 39 0 / 1 point
Business users that access e-mail from smartphones such as the BlackBerry take advantage of a technology called ____.
Java
Spatial technology
OLAP Push e-mail
Question 40 0 / 1 point____ is a protocol that describes a file transfer process between a host and a remote computer.
Telnet FTP Podcasting Instant messaging
Question 41 0 / 1 point____ is a technology that uses e-mail to provide a centralized news service.
Telnet FTP Usenet Instant messaging
Question 42 0 / 1 pointWith ____, network managers can route phone calls and fax transmissions over the same network they use for data.
VPN VoIP TCP/IP HTTP
Question 43 0 / 1 point____ is a method for transferring multimedia files, radio broadcasts, and other content over the Internet so that the data stream of voice and pictures plays more or less continuously, without a break, or with very few breaks.
Content streaming
Tunneling Podcasting Instant messaging
Question 44 0 / 1 point____ enables users to browse large files in real time.
Content streaming
Tunneling Podcasting Instant messaging
Question 45 0 / 1 pointA ____ is a software tool that searches the Web for information, products, or prices.
packet bot
podcast
clientQuestion 46 0 / 1 pointA(n) ____ is a way to connect buyers and sellers.
intranet extranet LAN
Web auction
Question 47 0 / 1 pointA(n) ____ is an internal corporate network built using Internet and World Wide Web standards and technologies.
extranet
applet intranet bot
Question 48 0 / 1 pointA(n) ____ is a network that links selected resources of a company's intranet with its customers, suppliers, or other business partners.
extranet
applet intranet bot
Question 49 0 / 1 pointA(n) ____ is a secure connection between two points on the Internet.
virtual private network intranet extranet tunnel
Question 50 0 / 1 pointVPNs transfer information by encapsulating traffic in IP packets and sending the packets over the Internet, a practice called ____.TUNNELING
CHAPTER 8:
B2C e-commerce is a useful tool for connecting business partners in a virtual supply chain to cut resupply times and reduce costs.
True
FalseQuestion 2
0 / 1 point
By using B2C e-commerce to sell directly to consumers, producers or providers of consumer products can eliminate the middlemen, or intermediaries, between them and the consumer.
True
FalseQuestion 3
0 / 1 point
G2B applications support the purchase of materials and services from private industry by government procurement offices, enable firms to bid on government contracts, and help businesses receive current government regulations related to their operations.
True
FalseQuestion 4
0 / 1 point
B2B applications are designed to improve communications among the various levels of government.
True
FalseQuestion 5
0 / 1 point
At the heart of any e-commerce system is the user's ability to search for and identify items for sale; select those items and negotiate prices, terms of payment, and delivery date; send an order to the vendor to purchase the items; pay for the product or service; obtain product delivery; and receive after-sales support.
True
FalseQuestion 6
0 / 1 point
B2C e-commerce systems must support negotiation between buyer and the selected seller over the final price, delivery date, delivery costs, and any extra charges.
True
FalseQuestion 7
0 / 1 point
Message boards and chat rooms can be used to build a loyal community of people who are interested in and enthusiastic about a company and its products and services.
True
FalseQuestion 8
0 / 1 point
B2C commerce relies on the use of wireless devices, such as personal digital assistants, cell phones, and smartphones, to place orders and conduct business.
True
FalseQuestion 9
0 / 1 point
The Internet Corporation for Assigned Names and Numbers (ICANN) created a .mobi domain to help attract mobile users to the Web.
True
FalseQuestion 10
0 / 1 point
Copyright law protects authored works such as books, film, images, music, and software from unauthorized copying.
True
FalseQuestion 11
0 / 1 point
Patents can protect software as well as business processes, formulae, compounds, and inventions.True
FalseQuestion 12
0 / 1 point
The digital divide exists not only between more and less developed countries but within countries between economic classes, the educated and uneducated, and those who live in cities and those who live in rural areas.
True
FalseQuestion 13
0 / 1 point
Today many e-commerce sites use an electronic shopping cart to track the items selected for purchase, allowing shoppers to view what is in their cart, add new items to it, or remove items from it.
True
FalseQuestion 14
0 / 1 point
Web services can combine software and services from different companies to provide an integrated way to communicate.
True
FalseQuestion 15
0 / 1 point
ICANN is responsible for guaranteeing that the people or organizations granted digital certificates are, in fact, who they claim to be.
True
FalseQuestion 16
0 / 1 point
The SSL communications protocol includes a handshake stage, which authenticates the server (and the client, if needed), determines the encryption and hashing algorithms to be used, and exchanges encryption keys.
True
FalseQuestion 17
0 / 1 point
Although SSL handles the encryption part of a secure e-commerce transaction, a digital certificate is necessary to provide server identification.
True
FalseQuestion 18
0 / 1 point
Credit cards can be used for a variety of purposes, including storing a user's financial facts, health insurance data, credit card numbers, and network identification codes and passwords.
True
FalseQuestion 19
0 / 1 point
Credit cards are better protected from misuse than conventional debit cards because the credit-card information is encrypted.
True
FalseQuestion 20
0 / 1 point
A smart card makes credit theft practically impossible because a key to unlock the encrypted information is required, and there is no external number that a thief can identify and no physical signature a thief can forge.
True
FalseQuestion 21
0 / 1 point
____ is the conducting of business activities electronically over computer networks such as the Internet, extranets, and corporate networks.
Split-case distribution
Electronic bill presentment
Electronic commerce
MultiprogrammingQuestion 22 0 / 1 point
____ e-commerce is a subset of e-commerce where all the participants are organizations.B2B
G2G
C2C
B2CQuestion 23
0 / 1 point
____ e-commerce is a form of e-commerce in which customers deal directly with an organization and avoid intermediaries.
B2B
G2G
C2C
B2CQuestion 24
0 / 1 point
____ is a subset of e-commerce that involves consumers selling directly to other consumers.
B2B
G2G
C2C
B2CQuestion 25
0 / 1 point
____ is highly popular among college students because they represent a large community of low-income people in the same geographical region who watch for values.
B2B
G2G
C2C
B2CQuestion 26
0 / 1 point
____ is the direct sale of products or services by businesses to consumers through electronic storefronts, which are typically designed around the familiar electronic catalog and shopping cart model.
Electronic retailing
Electronic bill presentment
Personalization
Source data automationQuestion 27 0 / 1 point
A(n) ____ is a single Web site that offers many products and services at one Internet location.
online exchange
cybermall
cyber outlet
public exchange
Question 28 0 / 1 pointAutomated ____ are typically based on industry best practices, which can streamline processes.
exchanges
markets
patents
workflowsQuestion 29 0 / 1 point
____ is the identification of specific markets to target them with advertising messages.
Explicit personalization
Source data automation
Market segmentation
Implicit personalizationQuestion 30 0 / 1 point
Because ____ devices usually have a single user, they are ideal for accessing personal information and receiving targeted messages for a particular consumer.
G2G commerce
m-commerce
G2C
smart cardQuestion 31 0 / 1 point
____ includes works of the mind such as books, films, music, processes, and software, which are distinct somehow and are owned or created by a single entity.
Electronic bill presentment
Personalization
E-commerce
Intellectual propertyQuestion 32 0 / 1 point
The term ____ refers to the use of any of several technologies to enforce policies for controlling access to digital media such as movies, music, and software.
digital rights management
patent
intellectual property
copyrightQuestion 33 0 / 1 point
Information that has siginificant value for a firm and for which strong measures are taken to protect it are ____.
trade practices
online profiles
trade secrets
Web servicesQuestion 34 0 / 1 point
In ____ advertising, the advertiser pays when a user clicks its ad to visit its Web site.
banner
video
pay-per-clickQuestion 35 0 / 1 point
____ entails sending bogus messages purportedly from a legitimate institution to pry personal information from customers by convincing them to go to a "spoofed" Web site.
Click fraud
Pay-per-click
Phishing
HackingQuestion 36 0 / 1 point
The term ____ is used to describe the practice of Web advertisers recording online behavior for the purpose of producing targeted advertising.
explicit personalization
online profiling
disintermediation
implicit personalization
Question 37 0 / 1 pointA(n) ____ is a company that act as an intermediary between your Web site and online merchants who have the products and retail expertise.
e-commerce broker
research broker
cybermall broker
storefront brokerQuestion 38 0 / 1 point
____ techniques capture user-provided information, such as information from warranties, surveys, user registrations, and contest entry forms completed online.
Explicit personalization
Online profiling
Disintermediation
Implicit personalizationQuestion 39 0 / 1 point
____ techniques capture data from actual customer Web sessions — primarily based on which pages were viewed and which were not.
Explicit personalization
Online profiling
Disintermediation
Implicit personalizationQuestion 40 0 / 1 point
A(n) ____ hardware platform complete with the appropriate software is a key e-commerce infrastructure ingredient.
Web server
XML
WML
WAPQuestion 41 0 / 1 point
____ software must support five core tasks: catalog management, product configuration, shopping cart facilities, e-commerce transaction processing, and Web traffic data analysis.
WML
WAP
E-commerce
HTTPQuestion 42 0 / 1 point
____ transactions do not include sales tax calculations if they involve items purchased for resale.
M-commerce
B2B
G2C
B2CQuestion 43 0 / 1 point
____ Web pages contain variable information and are built to respond to a specific Web site visitor 's request.
Dynamic
Cache friendly
Static
HTMLQuestion 44 0 / 1 point
____ software combines different product data formats into a standard format for uniform viewing, aggregating, and integrating catalog data.
Web service
Product configuration
Catalog management
Web page construction
Question 45 0 / 1 point____ software tools were originally developed in the 1980s to assist B2B salespeople to match their company's products to customer needs.
Web service
Product configuration
Catalog management
Web page construction
Question 46 0 / 1 point____ are software modules supporting specific business processes that users can interact with over a network (such as the Internet) as necessary.
Web services
Workflows
Smart cards
Meta tagsQuestion 47 0 / 1 point
A(n) ____ is an attachment to an e-mail message or data embedded in a Web site that verifies the identity of a sender or Web site.
certificate authority
intelligent agent
Secure Sockets Layer
digital certificateQuestion 48 0 / 1 point
A ____ is a trusted third-party organization or company that issues digital certificates.certificate authority
storefront broker
Secure Sockets Layer
digital content publisher
Question 49 0 / 1 point____ is a key underlying technology of m-commerce that is supported by an entire industry association of over 200 vendors of wireless devices, services, and tools.
SSL
WAP
DRM
HTMLQuestion 50
0 / 1 point
The ____ communications protocol is used to secure sensitive data during e-commerce.
HTTP
FTP
Secure Sockets Layer
TCP/IP