MIS 311 Test 3 Binghamton

76 Questions | Attempts: 50
Share

SettingsSettingsSettings
Management Quizzes & Trivia

Questions and Answers
  • 1. 

    What is the difference between Web 2.0 and Web 1.0

    • A.

      Web 2.0 allows users to collaborate on the websites

    • B.

      Web 1.0 does not allow users to modify info in websites

    • C.

      Visitors can make contributions

    • D.

      All of the above

    Correct Answer
    D. All of the above
  • 2. 

    What does social media presence rely on?

    • A.

      Respect

    • B.

      Responsibility

    • C.

      Representation

    • D.

      Reference

    • E.

      1,2, 3

    • F.

      1,2

    • G.

      All of the above

    Correct Answer
    E. 1,2, 3
  • 3. 

    What is web 2.0's most valuable feature?

    • A.

      Peer production

    • B.

      Prediction marketing

    • C.

      Net nuetrality

    • D.

      Option 4

    Correct Answer
    A. Peer production
  • 4. 

    Peer production leveraged open source software

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
  • 5. 

    When users collab work to create content, products, and services

    • A.

      Web 2.0

    • B.

      Web 1.0

    • C.

      Crowdsourcing

    • D.

      Peer production

    Correct Answer
    D. Peer production
  • 6. 

    What are some issues with B2C

    • A.

      Long tail of products (prod. w low demand can exceed mrkt share of high demand)

    • B.

      Disintermediation (conflict with channel partners)

    • C.

      Cannibalization (conflict w/in own distribution channels)

    • D.

      Strategy of selling less for more

    • E.

      All of the above

    • F.

      1 and 2

    • G.

      3 and 4

    Correct Answer
    E. All of the above
  • 7. 

    All of the top ten most-used apps worldwide are social.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
  • 8. 

    The phrase ______________ refers to efforts where participants share access to products and services rather than having ownership

    • A.

      Collabroative consumption

    • B.

      Peer production

    • C.

      Social media

    • D.

      Web 2.0

    Correct Answer
    A. Collabroative consumption
  • 9. 

    Online journal entries, usually made in a reverse chronological order, are known as _____.

    • A.

      Wikis

    • B.

      Blogs

    • C.

      Social media

    • D.

      Owned media

    Correct Answer
    B. Blogs
  • 10. 

    Electric Data Intercharge(EDI) transfers data from one system to another. Although, it increases handling costs, error and cycle time. 

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    it decreases handling costs, error and cycle time
    (Disadv. costly, inflexible, many standards, restructuring, and timely start up)

    Rate this question:

  • 11. 

    B2B E-Commerce is electronic transactions between companies and is the most complex form.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
  • 12. 

    Corporates use of social networks includes everything but

    • A.

      Organizational and productivity tools

    • B.

      Many employees work from home which helps social media

    • C.

      Sets up customer engagement

    • D.

      Supplanted employee directory

    • E.

      Use to allow all consumers to report faulties in product/services

    Correct Answer
    E. Use to allow all consumers to report faulties in product/services
  • 13. 

    Info or applications that spread rapidly between users

    • A.

      Crowdsourcing

    • B.

      Microblogging

    • C.

      Viral

    • D.

      Social media

    Correct Answer
    C. Viral
  • 14. 

    Facebook allows for assymetrical following

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    twitter does

    Rate this question:

  • 15. 

    If u tweet about the flu it will travel faster than google

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
  • 16. 

    _____ are links in a blog post that refer readers back to cited sources.

    • A.

      Trackbacks

    • B.

      Redirectors

    • C.

      Uniform resource collectors

    • D.

      Blog rolls

    Correct Answer
    A. Trackbacks
  • 17. 

    What are guidelines published that tell other programs hot to preform a task such as sending or recieving data

    • A.

      EDI's

    • B.

      SDK's

    • C.

      API's (application program interface)

    • D.

      SPE's

    Correct Answer
    C. API's (application program interface)
  • 18. 

    Small group of untrained amateurs will have more insight than a single or small group of professionals

    • A.

      Geeks

    • B.

      Bloggers

    • C.

      Hackers

    • D.

      Wisdom of corwds

    Correct Answer
    D. Wisdom of corwds
  • 19. 

    Prediction marketing is the polling of a diverse crowd to forecast an eventual outcome. 

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
  • 20. 

    Which of the following does not meet the criteria for crowdsourcing?

    • A.

      Offer a collective decision

    • B.

      Diverse

    • C.

      Centralized

    • D.

      Independent

    Correct Answer
    C. Centralized
  • 21. 

    The 3 pillars of driving growth are customer experience, high prices and selection. 

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    low prices

    Rate this question:

  • 22. 

    Which of the following is a technical limitation of E-commerce?

    • A.

      Lack of universally accepted security standards

    • B.

      Sufficient telecommunications bandwidth

    • C.

      Expensive accessibility

    • D.

      Both a and b

    • E.

      Both a and c

    • F.

      All of the above

    Correct Answer
    E. Both a and c
  • 23. 

    1. Perception that EC is secure2. Unresolved legal issues3. Lacks critical mass of sellers and buyers in many areas4. Many goods can be purchased onlineWhich of the following describes the non-technical limitations of E-commerce?

    • A.

      1 only

    • B.

      2 only

    • C.

      2 and 3

    • D.

      3 and 4

    • E.

      None of the above

    Correct Answer
    C. 2 and 3
  • 24. 

    What website is an example of sharing economy?

    • A.

      Facebook

    • B.

      Ebay

    • C.

      Amazon

    • D.

      Yelp

    Correct Answer
    B. Ebay
  • 25. 

    Which companies were famously infiltrated by hackers, causing them to lose money in lawsuits and lose customers as a result?

    • A.

      TJX

    • B.

      Target

    • C.

      Both a and b

    • D.

      Neither a or b

    Correct Answer
    C. Both a and b
  • 26. 

    Lower costs, technology powered, efficiency, supplier and consumer pooling, and greater reach are characteristics of sharing economies. 

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
  • 27. 

    What is not a role of corporate social media precense

    • A.

      Magnet (inbound from customers)

    • B.

      Megaphone (outbound to consumer)

    • C.

      Monitor (outbound like listening to customers)

    • D.

      Mediate (customer and community dialog)

    • E.

      All are roles

    • F.

      None are roles

    Correct Answer
    E. All are roles
  • 28. 

    Why did sharing economy rise?

    • A.

      Ripe economic conditions

    • B.

      Underutilized inventory

    • C.

      Peer to peer supply without need for inventory

    • D.

      All of the above

    Correct Answer
    D. All of the above
  • 29. 

    What is a main difference between ecommerce and traditional commerce

    • A.

      E commerce products are marketed over the internet

    • B.

      E commerce is done over the internet

    • C.

      Traditional has human to human contact

    • D.

      1 and 2

    • E.

      All of the above

    Correct Answer
    E. All of the above
  • 30. 

    What factors must be amplified for security purposes?

    • A.

      Technology problems

    • B.

      Personal issues

    • C.

      Operational issues

    • D.

      Procedural issues

    • E.

      All the above

    Correct Answer
    E. All the above
  • 31. 

     A(n) _____ to social media refers to an established online presence where customers can reach and interact with a firm.

    Correct Answer
    embassy approach
  • 32. 

    Businesses need information security to avoid computer sabotage and computer aided fraud and scams.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
  • 33. 

    Engineering the posting of positive comments and reviews of a firm's product and services on feedback forums is known as astroturfing

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
  • 34. 

    Any danger to what your system may be exposed to is known as

    • A.

      Risk

    • B.

      Vulnerbility

    • C.

      Extortion

    • D.

      Threat

    Correct Answer
    D. Threat
  • 35. 

    Instead of buying products outright, new business models are enabling individuals takes possession of an item for a period of time, then return it for use by others. This category of businesses is often referred to as collab consumption

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
  • 36. 

    Pure vs partial Ecommerce is based on:

    • A.

      Degree of digitalization involved in the nature of production process

    • B.

      Degree of digitalization involved in the nature of production & delivery process

    • C.

      Degree of data involved in the nature production & delivery process

    • D.

      None of the above

    Correct Answer
    B. Degree of digitalization involved in the nature of production & delivery process
  • 37. 

    Business model:

    • A.

      Method which a company files taxes, reports, accounts for revenues and pays everything on time

    • B.

      Method for which a company generates revenues and sustains itself

    • C.

      The method which a company reports to its investors

    • D.

      All of the aboce

    Correct Answer
    B. Method for which a company generates revenues and sustains itself
  • 38. 

    Data harvesters are

    • A.

      People who purchase assets to buy goods using stolen cards

    • B.

      People who quietly infiltrate computer

    • C.

      People who shut down websites with legitimate requests

    • D.

      Cyber criminals who infiltrate systems and collect data for resale

    Correct Answer
    D. Cyber criminals who infiltrate systems and collect data for resale
  • 39. 

    There are more

    • A.

      Bad hackers

    • B.

      Good hackers

    • C.

      Neither...there's an equal amount of both good and bad hackers

    • D.

      Neither....hackers don't exist

    Correct Answer
    A. Bad hackers
  • 40. 

    Extortion is...

    • A.

      Stealing copyright material

    • B.

      Slowing down a website

    • C.

      Stealing trade secrets

    • D.

      The demand payment in return for not attacking

    Correct Answer
    D. The demand payment in return for not attacking
  • 41. 

    What are physical threats of technology?

    • A.

      Dumpster diving

    • B.

      Shoulder surfing

    • C.

      Eavesdropping

    • D.

      All of the above

    Correct Answer
    D. All of the above
  • 42. 

    Which of the following is the role of a firewall?

    • A.

      To monitor network use for hacking attempts

    • B.

      To deny entry or exit of specific IP addresses or other entries

    • C.

      To control network traffic, block unauthorized attempts

    • D.

      Permit communication only with approved entities or in a approved method

    Correct Answer
    C. To control network traffic, block unauthorized attempts
  • 43. 

    Which are examples of lock down networks?

    • A.

      Firewalls

    • B.

      Intrusion detection systems

    • C.

      Blacklists

    • D.

      Whitelists

    • E.

      All of the avove

    Correct Answer
    E. All of the avove
  • 44. 

    Lock down systems ensure ways hackers cannot access systems so easily

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    lock down systems audit sql injection have failure and recovery plans

    Rate this question:

  • 45. 

    A deliberate act of hacking is espionage sabotage theft

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
  • 46. 

    Which are methods of infection? 

    • A.

      Virus

    • B.

      Trojans

    • C.

      Trick into downloading

    • D.

      All of the above

    Correct Answer
    D. All of the above
  • 47. 

    What are bad apples?

    • A.

      The art of manipulating people in acting or giving info

    • B.

      Cons executed through technology

    • C.

      Attacks on specific targets

    • D.

      Rogue employees that steal secrets and install malware

    Correct Answer
    D. Rogue employees that steal secrets and install malware
  • 48. 

    1. increased user time online2. targeting3. improved measurement and accountabilityWhich of the following is the driving online growth trend?

    • A.

      1 and 2

    • B.

      2 only

    • C.

      3 only

    • D.

      1,2, and 3

    • E.

      2 and 3

    • F.

      1 and 3

    Correct Answer
    D. 1,2, and 3
  • 49. 

    What allows hackers to enter code to delete all data in the users table?

    • A.

      Viral marketing

    • B.

      The fraud triangle

    • C.

      Online advertising

    • D.

      SQL injection

    Correct Answer
    D. SQL injection
  • 50. 

    What is b2c based off

    • A.

      Level transactions

    • B.

      Related feaures

    • C.

      Transactions between companies

    • D.

      Has a web store front

    • E.

      1 &2

    • F.

      1,2,&4

    • G.

      All of the above

    Correct Answer
    F. 1,2,&4

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2022
    Quiz Edited by
    ProProfs Editorial Team
  • May 16, 2016
    Quiz Created by
    Somscore
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.