FINAL Flashcards

(608 cards)

1
Q

Roughly one in every three people on the planet has a Facebook account. T OR F?

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Firms that grow quickly may seem less risky/more likely to succeed; therefore, fast growth may help
an entrepreneur extract better ownership terms from potential investors. T OR F?

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Facebook founder and CEO Mark Zuckerberg maintains a majority of voting rights in the public
company, virtually guaranteeing that his control of the firm continues, regardless of what investors
say. T OR F?

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Meta owns four of the Internet’s most widely used apps: Facebook, TikTok, WhatsApp, and Google
Voice. T OR F?

A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

When a firm has an IPO, it is said to have

A

gone public, selling shares on a public stock exchange for
the first time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A stockbroker trades shares she does not own with an obligation of later repayment, and in the hope
that the price of traded shares will fall. She then repays share debt with shares purchased at a lower
price and pockets the spread between initial share price and repayment price. This attempt to profit
from a falling stock price is known as

A

SHORT SELLING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Studying Facebook provides a context for understanding which of the following:
network effects
platform partnerships
privacy
business value of social media
All of the above are true.

A

All of the above are true.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Investor groups that provide funding in exchange for an ownership stake in the firm are called

A

VENTURE CAPITALIST

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Mark Zuckerberg, the founder of Facebook, ensured that he remained in control of the firm even after
it went public by

A

RETAINING A MAJORITY OF VOTING RIGHTS IN THE PUBLIC COMPANY.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Facebook’s key resources for competitive advantage are the sophisticated technological tools it
provides its users. T OR F?

A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Facebook (and other apps the firm owns) collectively represent the most prominent photo-sharing
service on the Web, ahead of Picasa, Flickr, and Photobucket, even though all of these other efforts
started before Facebook. T OR F?

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Facebook can be wholly indexed by search engines, like Google and Bing, being able to index all of
Facebook content. T OR F?

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A significant portion of Facebook’s underlying technical infrastructure consists of open-source
software. T OR F?

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Facebook’s phenomenal growth implies that it requires minimal infrastructure investment. T OR F?

A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Facebook was one of the first social networking sites where users actually identified themselves
using their real names. T OR F?

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Facebook purchased Oculus VR because, like Zuckerberg, the firm’s youthful founder had already
built a platform with massive customer base. T OR F?

A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Facebook is especially appealing to organizations looking to share messages with fans since
anyone who has “liked” an organization on Facebook will see all of that organization’s posts in their
news feed. T OR F?

A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Facebook will reduce the rank of posts that request reshares.

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Facebook’s acquisition of WhatsApp was a way for Zuckerberg’s firm to gain leadership in the
fast-growing mobile messaging market. T OR F?

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

_____ is the biggest photo-sharing site on the Web, taking in around three billion photos each
month.

A

FACEBOOK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

The deep web refers to

A

SITES THAT CANNOT BE INDEXED BY GOOGLE AND OTHER SEARCH
ENGINES.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Software that is free and whose code can be accessed and potentially modified by anyone is
referred to as

A

OPEN SOURCE SOFTWARE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Systems distributed throughout the Internet that help improve the delivery speeds of Web pages and
other media, typically by spreading access across multiple sites located closer to users are known
as

A

CONTENT DELIVERY NETWORKS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

The term “social graph” refers to

A

THE GLOBAL MAPPING OF USERS AND ORGANIZATIONS AND
HOW THEY ARE RELATED.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Which of the following factors has helped Facebook build up among its users?
MUTUAL AND RECIPROCAL APPROVAL OF FRIENDS REQUESTS.
26
What does the term “cloud” refer to?
IT REFERS TO A COLLECTION OF COMPUTING RESOURCES AVAILABLE FOR ACCESS OVER THE INTERNET.
27
What are network effects?
IT REFERS TO A SITUATION WHEN THE VALUE OF PRODUCTS OR SERVICE INCREASES AS THE NUMBER OF ITS USERS EXPANDS.
28
How are news feeds a source of value for users on Facebook?
IT FOSTERS THE VIRALITY OF INFORMATION SHARING VITAL TO DELIVERING VALUE FROM THE SOCIAL GRAPH.
29
Mark Zuckerberg acquired the firms Oculus because
IT WOULD ENSURE FACEBOOK’S PLACE IN BEING INVOLVED ON THE FOREFRONT OF COMPUTING’S EVOLUTION.
30
One of Facebook’s key resources for competitive advantage is
NETWORK INTERNALITIES.
31
In the context of Facebook’s business strategy, the walled garden refers to the connections between individuals and organizations. T OR F?
FALSE
32
Most Facebook applications are focused on businesses and educational services. T OR F?
FALSE
33
The asking price for Facebook acquisition, WhatsApp, was 2 billion dollars. T OR F?
FALSE
34
Meta attempted to counter the TikTok threat by creating a clone, an app called Lasso. T OR F?
TRUE
35
TikTok has more daily usage hours than any of Facebook’s platforms. T OR F?
TRUE
36
Facebook’s growing dominance has given rise to the fear that if increasingly large parts of the Web reside inside a single service, innovation, competition, and exchange may suffer. T OR F?
TRUE
37
"Reels, a feature integrated into Instagram and Facebook, has displaced TikTok as the dominant short-video platform." T OR F?
FALSE
38
"Meta’s Reels feature offers enhanced AI tools to surface content that users are likely to be most interested in." T OR F?
TRUE
39
"Since the launch of Reels, users have been spending less time on Meta platforms." T OR F?
FALSE
40
"Cross-posting between Meta platforms allows users to access TikTok features without leaving Instagram or Facebook." T OR F?
TRUE
41
_____ is a term that refers to a closed network of single set of services controlled by one dominant firm.
WALLED GARDEN
42
Facebook has offered a system where website operators can choose to accept a user’s Facebook credentials for logging in. Website operators appreciate this feature because
USERS CAN ACCESS WEBSITES WITHOUT CREATING AN ACCOUNT, REDUCING A POTENTIAL BARRIER TO CUSTOMER ACQUISITION.
43
Metaverse is a concept where users experience an immersive, computer-generated environment where they can interact with others. T OR F?
TRUE
44
Oculus founder Palmer Luckey launched a Kickstarter campaign to generate interest in his product but failed to meet his initial goal of $250,000, which caused the product to fail before it made it to production. T OR F?
FALSE
45
Facebook Phone and Meta Portal are examples of Meta’s unsuccessful consumer electronics efforts. T OR F?
TRUE
46
Meta has introduced its second iteration of its smart glasses in a continued partnership with Ray-Ban, which features a smart screen incorporated into the lenses, allowing them to be used for AR and VR. T OR F?
FALSE
47
The term “metaverse” was first coined by Neal Stephenson in his 1992 novel Snow Crash. T OR F?
TRUE
48
The term “metaverse” refers to a specific infrastructure or service provided by several firms. T OR F?
FALSE
49
The metaverse is most commonly associated with environments created using augmented reality headsets. T OR F?
FALSE
50
Predictions suggest that the metaverse could generate between $2.5 and $15 trillion in revenue annually. T OR F?
TRUE
51
Meta’s Reality Labs, responsible for building the metaverse future, has accumulated $40 billion in losses so far. T OR F?
TRUE
52
Microsoft’s largest acquisition in history, justified in part by their hopes to gain “building blocks for the metaverse,” was which firm?
ACTIVISION BLIZZARD
53
Which of the following is an inconvenience of AR/VR headsets? They are heavy and uncomfortable to wear for long periods. They are expensive. They require a lot of computing power. They are inconvenient to have on hand. All of the above.
All of the above.
54
DALL-E is a term taken from the military where trained team, unaffliated with development staff, play the role of adversaries and try to deliberately compromise systems. T OR F?
FALSE
55
IDEs are tools used to write software and usually include an editor, debugging tools, a compiler that turns written code into something that a computer can execute and more. T OR F?
TRUE
56
Meta intends to have Llama AI-powered chatbots available across their messaging platforms including virtual avatars of celebrities who are ready to engage you in all sorts of domain-specific conversations. T OR F?
TRUE
57
Meta’s lag in AI was in part blamed on the firm’s rushed adoption of GPUs. T ORF?
FALSE
58
Developers who make applications create ______ that have the potential to add value to Meta beyond what the firm itself provides to its users.
COMPLEMENTARY BENEFITS
59
Which of the following is a tactic that Meta used to make Llama 2 a safer AI? They had third-party users perform Red Team exercises. They had internal employees perform Red Team exercises. They developed Purple Llama tools to make it harder for bad actors to generate harmful code. All of the above None of the above
All of the above
60
Meta’s custom ASIC chip helps to: Improve user experience Get videos to user devices more quickly Use less data overall Improve livestream performance for users All of the above
All of the above
61
Facebook’s revenue share with app vendors for some services involved taking more than half of virtual goods sales. T OR F?
FALSE
62
Mark Zuckerberg successfully recruited the CEO of PayPal, David Marcus, to run Messenger, which has now become one of the largest messaging platforms. T OR F?
TRUE
63
Facebook’s attempt to launch a gaming app platform within its iOS app was readily accepted by Apple. T OR F?
FALSE
64
What are APIs?
APPLICATION PROGRAMMING INTERFACES
65
What was the primary purpose of Facebook’s publication of APIs at the F8 developers conference?
TO ALLOW DEVELOPERS TO CREATE APPLICATIONS THAT INTERACT WITH FACEBOOK.
66
Every eighteen months, Meta employees are required to leave their teams and work on something different for at least a month. T OR F?
TRUE
67
Facebook’s “no-beta” culture seldom tolerates mistakes on the road to progress. T OR F?
FALSE
68
Facebook’s Beacon effort was a failure largely because it was “opt-out” instead of “opt-in.” T OR F?
TRUE
69
_______ is considered to be the most persuasive and valuable method of promoting products and services.
WORD OF MOUTH
70
Meta’s algorithms for liking like-minded users and finding what they may be interested in has: Surfaced conspiracy theories and hate Allowed for the spread of misinformation around COVID-19 Given way to fast-spreading conspiracy theories around elections All of the above are true
All of the above are true
71
Figures released by Meta showed its AI had a difficult time detecting ____
HATE SPEECH
72
Near field communication refers to a short-range, wireless communication standard. T OR F?
TRUE
73
The EU has fined Google over $13.4 billion since 2017, including $4.13 billion for using its Android mobile operating system to the detriment of any rivals. T OR F?
TRUE
74
Generative AI is the biggest existential threat to Google’s search business that it has ever faced. T OR F?
TRUE
75
The ‘T’ in ChatGPT stads for _________
TRANSFORMER
76
Ad networks enforce exclusivity. Once a content provider selects one ad network it cannot implement other forms of advertising on its website. T OR F?
FALSE
77
The base service of Google Analytics is offered free to websites of all sizes, with premium offerings and support available for a fee. T OR F?
TRUE
78
The _______ refers to a situation where ads appear alongside text the advertiser would like to avoid.
CONTENT ADJACENCY PROBLEM
79
Dynamic search ads: Are generated automatically Are based on the content of the website Are useful for firms with rapidly changing inventory All of the above are true
All of the above are true
80
Which of the statements holds true for the term click-through rate?
IT REFERS TO THE NUMBER OF USERS WHO CLICKED AN AD DIVIDED BY THE NUMBER OF TIMES THE AD WAS DELIVERED.
81
Which of the following is true for the cost-per-click?
IT REFERS TO THE MAXIMUM AMOUNT OF MONEY AN ADVERTISER IS WILLING TO PAY FOR EACH CLICK ON THEIR AD.
82
Law firms are consistently the lowest cost-per-click rate bidders for keyword ads, but they run the most ads, making them significant contributors by volume. T OR F?
FALSE
83
JCPenney was one of Google’s largest advertisers, spending millions a month in ads, yet Google punished the firm in search rankings when it detected that Penney violated Google’s policies on gaming search engines. T OR F?
TRUE
84
PageRank is an algorithm developed by Google co-founder Larry Page to rank websites. T OR F?
TRUE
85
Google, who has a best-in-class AI team, was not prepared to compete with the capabilities of OpanAI’s ChatGPT. T OR F?
TRUE
86
Google profits from advertising allow it to: Experiment and innovate Tolerate failure Acquire aggressively Patiently build new markets All of the above are true
All of the above are true
87
Almost all security breaches can be tracked back to technology lapses; personnel or procedural factors rarely factor in. T OR F?
FALSE
88
The malware used to breach Target was described by one security expert as “absolutely unsophisticated and uninteresting.” T OR F?
TRUE
89
The Equifax hack mainly impacted people from: The US Canada The UK All of the above are true None of the above are true
All of the above are true
90
Hackers might infiltrate computer systems to enlist hardware for subsequent illegal acts. T OR F?
TRUE
91
The term ISO 27000 refers to a series of standards representing the set of best practices for implementing, maintaining, and improving organizational security. T OR F?
TRUE
92
Data harvesters are cybercriminals who infiltrate systems and collect data for illegal resale. T OR F?
TRUE
93
The MOVEit exploit is considered one of the costliest hacks of all time. T OR F?
TRUE
94
A team working on organizational security should include representatives from general counsel, audit, public relations, and human resources, in addition to those from specialized security and broader technology and infrastructure functions. T OR F?
TRUE
95
Online backup services are considered a poor choice for end-users since this only increases the likelihood that an individual’s data will be hacked. T OR F?
FALSE
96
The Hydra dark web market, which at its peak did over $1 billion in annual business, is still active despite law enforcement efforts since 2022. T OR F?
FALSE
97
Cybercriminals who infiltrate systems and collect data for illegal resale are called ____
DATA HARVESTERS
98
A firm’s suppliers, buyers, or partners may also require a degree of certification. T OR F?
TRUE
99
Hordes of surreptitiously infiltrated computers, linked and controlled remotely, are known as zombie networks or _________
BOTNETS
100
System and Organization Controls (SOC) can involve certification by a third-party organization. T OR F?
TRUE
101
Dumpster diving refers to physically trawling through trash to mine any valuable data or insights that can be stolen or used in a security attack. T OR F?
TRUE
102
One of the reasons organizations delay patches to plug holes in their security applications is ________.
THE FEAR THAT HE NEW TECHNOLOGY CONTAINS A CHANGE THAT WILL CAUSE PROBLEMS DOWN THE ROAD.
103
Because of Moore’s Law, widely used encryption programs currency employed by banks and e-commerce sites are now easily penetrated by brute-force attacks that can be employed by hackers using just a handful of simple desktop computers. T OR F?
FALSE
104
It’s bad when a firm’s e-mail and password files are stolen; however, the impact is minimized because user passwords set up for one system cannot be used in others. T OR F?
FALSE
105
Systems that deny the entry or exit of specific IP addresses, products, Internet domains, and other communication restrictions are said to employ a(n) _____
BLACKLIST
106
What type of tool enforces access privileges and helps verify that systems are not being accessed by unauthorized or suspicious ways?
ACCESS CONTROL TOOLS
107
The term deepfake refers to sophisticated media created by AI that tempts to look or sound like a real person or event. T OR F?
TRUE
108
Cybersecurity experts have just recently started using artificial intelligence, and they are unsure of its promise. T OR F?
FALSE
109
Computer criminals, state-sponsored infiltrators, corporate spies, and other malfeasants are often motivated by: Account theft and illegal funds transfer Terrorism Surreptitiously hijacking hacked hardware for cryptocurrency mining Cyberwarfare Any of the above are true.
Any of the above are true.
110
Which of the following is an example of Russia’s use of cyberwarfare? Taking out Ukaine’s Viasat satellite Interrupting internet service across Europe Causing outages in German wind turbine power grid All of the above are true.
All of the above are true.
111
Which of the following types of infiltration techniques does one open up to by posting sensitive personal information and details about one’s workplace on social networking sites?
SOCIAL ENGINEERING
112
Which of the following are considered sources of information that can potentially be used by social engineers? LinkedIn Corporate directories Social media posts Contests or surveys All of the above are true
All of the above are true
113
Some of the most common guidelines issued by websites when designing a secure password include which of the following?
THE PASSWORD SHOULD BE AT LEAST EIGHT CHARACTERS LONG AND INCLUDE AT LEAST ONE NUMBER AND OTHER NON ALPHABET CHARACTER
114
Technologies that measure and analyze human body characteristics for identification or authentication are known as _____.
BIOMETRICS
115
The e-mail password of a senior employee in an organization was compromised by someone observing this user as the employee accessed his account. This is most likely a case of ________.
SHOULDER SURFING
116
Which of the following statements holds true for the term spoof?
IT REFERS TO E-MAIL TRANSMISSIONS AND PACKETS THAT HAVE BEEN ALTERED TO SEEM AS IF THEY CAME FROM ANOTHER SOURCE.
117
One of the major problems with the Heartbleed bug in OpenSSL software is that _______.
THE SOFTWARE WAS EMBEDDED IN MANY HARDWARE PRODUCTS THAT COULD NOT BE EASILY PATCHED WITH AUTOMATIC SOFTWARE UPDATES.
118
A common example of 2FA is _________ .
A PASSWORD, PLUS THE USE OF SEPARATE VERIFICATION CODE.
119
Which of the following is a potential drawback of using passkeys? Passkey libraries are tied to your device or a specific vendor Passkeys do not allow you to share passwords with others Passkeys are not yet being implemented by all websites All of the above are true.
All of the above are true.
120
An alternative to terrestrial networks is Starlink. T OR F?
TRUE
121
China has complained to the United Nations that SpaceX’s Starlink is unfairly crowding other efforts in space. T OR F?
TRUE
122
The routing protocol that is in charge of forwarding packets on the Internet is known as voice over Internet protocol. T OR F?
FALSE
123
Wall Street traders often choose a colocation facility with the goal of providing high-latency connectivity to their partners. T OR F?
FALSE
124
Starlink does not use equipment in a fixed position above a spot. The satellites zoom in and out of range, passing signals to each other using _______.
LASERS
125
ISPs and IXPs that carry out peering are required by the FCC to charge each other fees based on their traffic contribution. T OR F?
FALSE
126
The internet has no center, and no one owns it. T OR F?
TRUE
127
Computer programs making decisions without any human intervention conduct most US stock trading. T OR F?
TRUE
128
Circuit-switched networks provide a connection between two parties that ______.
IS DEDICATED FOR USE BY THE PARTIES FOR THE DURATION OF A CONNECTION.
129
A device gets its IP address from whichever organization is currently connecting it to the Internet. T OR F?
TRUE
130
______ repeatedly sends a cluster of three packets starting at the first router connected to a computer, then the next, and so on, building out the path that packets take to their destination.
TRACEROUTE
131
The US Federal Aviation Administration sought to delay some 5G C-band use near airports over aviation safety concerns and has proposed additional upgrades for aircraft to prevent possible interference. T OR F?
TRUE
132
“Cyber hygiene” refers to fairly straightforward precautions that should be taken for site safety. T OR F?
TRUE
133
A(n) _______ is a temporary storage space used to speed computing tasks.
CACHE
134
The fault-tolerant nature of the DNS ensures that _________.
THE SERVICE CONTINUES FUNCTIONING EVEN IF ONE NAMESERVER GOES DOWN.
135
The exploit referred to as _________ allowed hackers to leverage vulnerability in DNS software to redirect users to sites they did not request.
CACHE POISONING
136
A firm that provides hardware and services to run websites of others is known as a(n) ________.
WEB HOSTING SERVICE.
137
Popular sites like Google and Yahoo! Have several computers assigned to their host names because _________ .
IT ENSURES THAT THE LOAD OF REQUESTS TO THEIR SITES DOES NOT OVERWHELM A SINGLE COMPUTER.
138
A __________ enables communication by defining the format of data and rules for exchange.
PROTOCOL
139
The most dominant standard for 4G technology worldwide is _____.
LTE
140
GeoTLDs are associated with geographical, geopolitical, ethnic, linguistic, or cultural community. T OR F?
TRUE
141
___________ technology is broadband technology that can use the wires of a local telephone network.
DIGITAL SUBSCRIBER LINE (DSL)
142
Under IPv6, IP addresses are expressed as a string of four numbers between 0 and 255, separated by a period. T OR F?
FALSE
143
The acronym HFT refers to __________.
HIGH FREQUENCY TRADING.
144
Unfortunately, IPv6 isn’t backward compatible with IPv4. T OR F?
TRUE
145
Peering refers to ________.
A SITUATION WHEN SEPARATE ISPS CONNECT THEIR NETWORKING EQUIPMENT TOGETHER TO SHARE TRAFFIC.
146
Which of the following applications is most likely to use UDP instead if TCP?
WEB-BASED PHONE CALLS
147
One of the function of the IP is to ________.
ROUTE MESSAGE PACKETS TO THE FINAL DESTINATION.
148
Apple has imposed what it calls “Data Authorization Labels” on app developers, requiring them to have easy-to-read, consistent, and clear notices on what data is collected and how it is used. T OR F?
FALSE
149
Meta has been fined $400 million for collecting Facebook and Instagram data without explicit consent. T OR F?
TRUE
150
SKAdNetwork shares conversion data with advertisers without revealing any user-level or device-level data and is much easier to implement than old cookie schemes. T OR F?
FALSE
151
Apple is now automatically removing link trackers from URLs sent via its email client and its text messaging platform. T OR F?
TRUE
152
Due to the complexities of consumer data privacy policy, organizations should ___________ .
ASSEMBLE AN INTERNAL TEAM THAT WILL MONITOR RELEVANT AND COMPLEX ISSUES RELATED TO INFORMATION SYSTEMS.
153
The five components of information systems needed to fully understand organizational privacy policies include _________.
DATA, SOFTWARE, HARDWARE, PROCEDURES, PEOPLE.
154
How will Apple’s IDFA identifier impact advertising sales in the gaming industry?
IF GAMERS DONT OPT-IN WHEN USING APPS, ADVERTISING NETWORKS WILL NOT HAVE DETAILED PROFILES FOR GAME ADVERTISERS.
155
A VPN is a service that creates a public connection across the private Internet, encrypting transmission and making your Internet communication appear as if it is connected to the organizations that provides VPN software. T OR F?
FALSE
156
Identifying a user’s physical location for the purpose of delivering tailored ads or other content is known as ________.
GEOTARGETING
157
Advertisers use ____________ to deliver targeted ads to your television based on your profile.
DYNAMIC AD INSERTION
158
All devices that connect to the internet are identified by an assigned numeric value. The numeric value is known as the _____
IP address
159
As an advertiser, you have acquired the services of Google to display your ads. You have set a budget for the campaign, and Google will charge you when users click on your ad. This form of online advertising is known as ______.
CPC
160
An ad that runs before a user arrives at his intended destination on a website or in an app is known as _________.
AN INTERSTITIAL
161
Data that is collected by one form and shared with a partner organization is known as _______ .
SECOND PARTY DATA
162
If Rent the Runway receives an invoice for 450,000 impressions, their sales quote was for ____ CPMs.
450
163
Suppose you have a popular blog, and you want to leverage it to make extra money. Because your web traffic is high, you have decided to add links to direct users to online storefronts. If the user makes a purchase at the storefront, the seller has agreed to share a percentage of revenue with you. This form of marketing is known as ____________ .
AFFLIATE PROGRAMS.
164
Second-party data is data that is collected by one firm and shared with a partner organization. T OR F?
TRUE
165
Enhancing productivity, improving efficiency, and automating mundane tasks are benefits of AI. T OR F?
TRUE
166
Change management seeks to identify how workflows and processes are to be altered and how to manage the worker and organizational transition from one system to another. T OF F?
TRUE
167
Potential risks and ethical implications of AI issues concerning job displacement, algorithmic bias, and misuse for malicious purposes. T OR F?
TRUE
168
AI-related job displacement may create new employment opportunities and career pathways in areas like AI development and data analysis. T OR F?
TRUE
169
What example of AI benefits is not mentioned in the text?
AI-ASSISTED VEHICLES MAINTAINING HEALTHY BODY TEMPERATURE FOR PASSENGERS.
170
Generative AI is predicted to have a significant impact on various job sectors, including knowledge-based professions like analysis, accounting, legal, medical, software development, and education. T OR F?
TRUE
171
Which of the following is not a potential issue related to AI’s risks and unknowns?
OVERRELIANCE ON AI FOR DECISION-MAKING
172
Which of the following is not mentioned as a potential challenge associated with leveraging AI and machine learning?
OVERABUNDANCE OF AVAILABLE TRAINING DATA
173
How does the text characterize the future of AI?
TRANSFORMATION OF INDUSTRIES AND CREATION OF NEW OPPORTUNITIES.
174
Despite the transformative abilities of GenAI, why is it still crucial for individuals to always fact check results given by GenAI? Generative AI tends to seemingly make things up, a process often referred to as hallucination. Since AI systems “learn” based on data, then any biases in data can become part of the model, which can result in sexist and racist results. Results may contain copyrighted material which could open firms up to legal penalties. Sometimes results can give dangerous information, such as reported cases of generating recipes that would be poisonous if eaten. All of the above are correct
All of the above are correct
175
Some concerns about GenAI include its tendency to provide incorrect answers and sometime produce biased or harmful results. T RO F?
TRUE
176
The foundation model used to train LLMs like ChatGPT-3 is the same model used for end-user interaction. T OR F?
FALSE
177
Auditing technology and training data is unnecessary, especially if a firm trust its developers and suppliers. T OR F?
FALSE
178
In which scenario might machine learning be legally prohibited?
USING DEMOGRAPHIC DATA FOR RISK PREDICTION
179
Why could banks using AI in their loan process potentially create unintended consequences?
SUCH SYSTEMS CAN INCREASE DISPARITIES BASED ON SOCIOECONOMIC BACKGROUND, ETHNIC CATEGORY, OR EDUCATIONAL LEVEL
180
Organizations should incorporate new tools and best practices as they are developed, rather than sticking to established methods. T OR F?
TRUE
181
Meta made its GenAI model, Llama, open source, stirring controversy in the tech industry. T OR F?
TRUE
182
Which statement about generative AI (GenAI) is not true?
GenAI ALWAYS PROVIDES FACTUALLY ACCURATE ANSWERS.
183
COBIT is an IT infrastructure library, which covers best practices for delivering IT service. T OR F?
FALSE
184
Since 2018, technologists are required to have had significant training in technology ethics. T OR F?
FALSE
185
Which of these is a challenge associated with training AI models?
INABILITY TO INTEGRATE DATA SOURCES
186
How are parameters described in the text?
RELATIONSHIPS BETWEEN TEXT ELEMENTS
187
A large language model (LLM) is a type of __________ .
AI USED FOR GENERAL-PURPOSE LANGUAGE UNDERSTANDING AND GENERATION.
188
What is the foundation model used to train ChatGPT-3?
GPT-3
189
Which step is not suggested for developing more ethical, less risk-prone systems?
IGNORING EMPLOYEE FEEDBACK
190
What is the purpose of a “Red Team” in the context of AI development?
TESTING THE SECURITY OF SYSTEMS
191
Logistics is the term that describes the extensive use of data, statistical, and quantitative analysis, explanatory and predictive models, and fact-based management to drive decisions and actions. T OR F?
FALSE
192
Data obtained from outside sources, when combined with a firm’s proprietary internal data assets, can give the firm a competitive edge. T OR F?
TRUE
193
Firms that base decisions on hunches are said to be gambling, not managing. T OR F?
TRUE
194
Random occurrences in data mining results can be detected by dividing the data and building a model with one portion and using another portion to verify the results. T OR F?
TRUE
195
A ____________ is a system that provides rewards and usage incentives, typically in exchange for a method that provides a more detailed tracking and recording of consumer activity.
LOYALTY PROGRAM
196
___________ refer to older information systems that are often incompatible with other systems, technologies, and ways of conducting business.
LEGACY SYSTEMS
197
__________ refer to databases focused on addressing the concerns of a specific problem or business unit.
DATA MARTS
198
___________ is a class of computer software that seeks to reproduce or mimic human thought, decision-making, or brain functions.
ARTIFICIAL INTELLIGENCE
199
Which of the following is not considered an advantage of Hadoop?
RELATIONAL STRUCTURE
200
Data are raw facts that must be turned into information in order to be useful and valuable. T OR F?
TRUE
201
_____________ refers to the process of combining aspects of reporting, data exploration and ad hoc queries, and sophisticated data modeling and analysis.
BUSINESS INTELLIGENCE
202
A data cube refers to a ______.
SPECIAL DATABASE USED TO STORE DATA IN OLAP REPORTING.
203
___________ is the process of using computers to identify hidden patterns in and to build models from large data sets.
DATA MINING
204
Computer-driven investment models can be very effective when the market behaves as it has in the past. However, in terms of historical consistency, they are vulnerable to failure in the face of:
BLACK SWANS
205
_________ refers to software for creating, maintaining, and manipulating data.
DBMS
206
The graphical representation of data and information is known as:
DATA VISUALIZATION
207
In database systems, a ______ refers to a list of data.
FILE
208
In database systems, a row is also known as a:
RECORD
209
In database systems, a ______ defines the data that a table can hold.
FIELD
210
Which of the following describes serverless computing? a type of cloud computing a third-party vendor manages servers, replication, and fault-tolerance a third-party vendor manages computing scalability a third-party vendor manages certain aspects of security ALL OF THE ABOVE ARE CORRECT
ALL OF THE ABOVE ARE CORRECT
211
Most organizations do not opt for IT configurations that are purely in-house, packaged, or SaaS models. T OR F?
TRUE
212
Linux is one of the most used operating systems in desktop computers, but it can be found only in a tiny fraction of mobile phones, and consumer electronics. T OR F?
FALSE
213
Linux is one of the most used operating systems in desktop computers, but it can be found only in a tiny fraction of mobile phones, and consumer electronics. T OR F?
FALSE
214
Many SaaS vendors have improved system customization options and integration with standard software packages. T OR F?
TRUE
215
The marginal cost to produce an additional copy of a software product is effectively zero. T OR F?
TRUE
216
Some of the largest technology companies now support open source software initiatives. T OR F?
TRUE
217
With SaaS, firms get the most basic offerings but can also do the most customization, putting their own tools (operating systems, databases, programming languages) on top. T OR F?
FALSE
218
With the advent of cloud computing and SaaS, smaller firms no longer have access to the kinds of sophisticated computing power they had access to in the past. T OR F?
FALSE
219
Virtualization is unsuitable for use on desktop applications. T OR F?
FALSE
220
Which of the following is not true about apps and the app economy? App stores are “always open.” Apps have been vital to the rise of several high-valued efforts, including Uber, Instagram, and WhatsApp. Apps developed for one platform typically cannot be used on another platform. Apps have been criticized as creating consumer switching costs vs. browser-based alternatives. APP STORE ACCESS IS LIMITED TO INDUSTRIALIZED NATIONS WITH LARGE SMARTPHONE USER POPULATIONS.
APP STORE ACCESS IS LIMITED TO INDUSTRIALIZED NATIONS WITH LARGE SMARTPHONE USER POPULATIONS.
221
A slang derogatory term for an uninformed or unskilled person is “greenie.” T OR F?
FALSE
222
Oracle, a firm that sells commercial ERP and database products, provides Linux for free, selling high-margin Linux support contracts for as much as five hundred thousand dollars. Oracle’s motivation for this lies in ________________________ .
USING OPEN SOURCE SOFTWARE TO WEAN CUTOMERS AWAY FROM COMPETITORS.
223
Which of the following refers to a variant of utility computing where vendors provide the operating system and supporting software like database management systems but where client firms write their own code?
PLATFORM AS A SERVICE
224
Consumerization of corporate technology stifles employee creativity. T OR F?
FALSE
225
Which of the following is one of the sources of revenue for open source vendors?
SELLING SUPPORT AND CONSULTING SERVICES.
226
One important thing that managers should understand about SaaS is that _________________________.
MANY OF THESE VENDORS WILL NOT LAST IN THE MARKET.
227
A server running ________________ can create smaller compartments in memory that each behave as a separate computer with its own operating system and resources.
VIRTUALIZATION SOFTWARE
228
Which of the following is true of software as a service (SaaS)?
IT REFERS TO SOFTWARE THAT IS MADE AVAILABLE BY THIRD PARTY ONLINE.
229
______________ allow(s) a server to run what amounts to a copy of a PC—OS, applications, and all—and simply deliver an image of what’s executing to a PC or other connected device.
VIRTUAL DESKTOPS
230
Vendors frequently sign _________________ with their customers to ensure a guaranteed uptime and define their ability to meet demand spikes.
SERVICE LEVEL AGREEMENTS
231
Which of the following statements relating to open-source software is true?
THE FLAGSHIP OSS PRODUCT IS THE LINUX OPERATING SYSTEM, NOW AVAILABLE ON ALL SCALES OF COMPUTING DEVICES.
232
Cloud vendors that are hosting hardware, operating system, database, and other software, which clients can then use to build their own applications, are said to be providing _________________________.
SOFTWARE AS A SERVICE.
233
The LAMP stack of open-source products is used ________________________.
TO POWER MANY OF THE INTERNET’s MOST POPULAR WEBSITES.
234
chnology products with particularly strong security features are said to be ______________________.
HARDENEND.
235
The scalability of a software product is defined as the ____________________________.
ABILITY TO BE EASILY EXPANDED TO MANAGE WORKLOAD INCREASES.
236
___________ is a term used to describe unpredictable but highly impactful events.
BLACK SWANS
237
Vendors who use open source as part of their product offerings can expect to bring new products to the market faster because __________________.
THEY CAN SKIP WHOLE SEGMENTS OF THE SOFTWARE DEVELOPMENT PROCESS.
238
Which of the following was considered a contributor to vulnerabilities in the OpenSSL security product, known as the Heartbleed bug?
FEW DEVELOPERS WERE WORKING ON THE PROJECT, SO THE IDEAL THAT “GIVEN ENOUGH EYEBALLS, ALL BUGSARE SHALLOW” WASN’T MET WITH OPENSSL.
239
Which of the following is not one of the three major cloud-computing service models?
CAAS
240
Scrum defines functions or roles (for management and development, meetings, or ceremonies), and how the process is documented and tracked or artifacts. T OR F?
TRUE
241
A scrum master represents the “voice of the customer,” advocates for the needs of the organization helps in setting requirements, and is ultimately held accountable for deliverables. T OR F?
FALSE
242
What are software development methodologies?
THODS TO DIVIDE TASKS RELATED TO SOFTWARE CREATION AND DEPLOYMENT INTO TASKS TARGETED AT BUILDING BETTER PRODUCTS WITH STRONGER PRODUCT MANAGEMENT GUIDELINES AND TECHNIQUES.
243
Operating systems are computer programs that have a set of precise instructions that tell computer hardware what to do. T OR F?
FALSE
244
As an IT leader in a fast-growing technology start-up, which software development methodology would you implement to ensure your firm can make adjustments when necessary?
AGILE
245
Which of the following is an example of computer hardware?
A VIDEO GAME CONSOLE
246
Expedia used APIs to increase the distribution of travel products that it sells, relying on partners to plug into its technology and inventory. T OR F?
TRUE
247
VW's first large-scale foray into the EV market was the ______.
iD3
248
Android is a software product developed by Google that allows cell phone manufacturers to control hardware and establishes standards for developing and executing applications on its platform. Android is thus an example of a(n):
OPERATING SYSTEM
249
A PC, laptop, or any other small computer can be set up to run server software. T OR F?
TRUE
250
EVs software requires at least ten times as much ____ as cars with regular combustion engines.
CODE
251
Firmware refers to ___________.
CONTROL SOFTWARE STORED ON NONVOLATILE MEMORY CHIPS.
252
Which of the following is an operating system?
LINUX
253
In recent years, there has been a noticeable decline in LCNC environments. T RO F?
FALSE
254
ERP systems and enterprise software programs should be ideally configured to use different database systems to avoid the possibility of data redundancy. T OR F?
FALSE
255
Standardizing business processes in software that others can buy means that those functions are difficult for competitors to match. T OR F?
FALSE
256
A(n) _________________ is an application that includes an editor, a debugger, and a compiler, among other tools.
INTEGRATED DEVELOPMENT ENVIRONMENT
257
Enterprise resource planning software has proven popular in part because the standardization these products impose makes them exceptionally easy to deploy. T OR F?
FALSE
258
____ is a set of standards for exchanging messages containing formatted data between computer applications.
EDI
259
What is the most common function performed by electronic data interchanges?
SENDING ELECTRONIC EQUIVALENTS OF STRUCTURED DOCUMENTS BETWEEN DIFFERENT ORGANIZATIONS.
260
Which of the following is true of scripting languages?
THEY ARE OFTEN DESIGNED TO BE INTERPRETED WITHIN THEIR APPLICATIONS.
261
Java is not optimized to take advantage of interface elements specific to the Mac or Windows operating systems. As a result _____________.
JAVA IS UNSUITABLE FOR DESKTOP APPLICATIONS.
262
____________ refers to a software package that integrates the many functions of a business, such as accounting, finance, inventory management, and human resources.
ENTERPRISE RESOURCE PLANNING
263
Rent the Runway rentals are often only 25 percent of dress’s retail price. T OR F?
FALSE
264
Project Entrepreneur, created by Facebook, aims to help female entrepreneurs build high-growth, high-impact businesses. T OR F?
FALSE
265
Rent the Runway’s mobile app provides over 40 percent of firm traffic. T OR F?
TRUE
266
Customers who are on the fence about a choice can choose a second style as a backup for an additional fee. T OR F?
TRUE
267
Vague terms that mean something to humans but not conventional search will not be able to be used by custom Rent the Runway AI models built on the firm’s massive, proprietary data. T OR F?
FALSE
268
Which of the following is not true about mobile app development?
MOBILE APPS ARE CONSIDERED FAR EASIER TO DEVELOP THAN WEBSITES. MOST MANAGERS CAN CREATE ROBUST APPS USING DRAG-AND-DROP TOOLS.
269
At Rent the Runway, customers arriving at the site via ________media have a much higher conversion rate than customers arriving via ____ media.
EARNED; PAID
270
Time magazine has called Rent the Runway one of the country’s 25 Best Websites. T OR F?
FALSE
271
Nuuly still far exceeds Rent the Runway in social media followers and other metrics, indicating brand reach, awareness and exposure. T OR F?
FALSE
272
Rent the Runway has embedded RFID tags in 1.5 million items, tracking garments throughout the distribution center journey. T OR F?
TRUE
273
Rent the Runway is suing Urban Outfitters, claiming the firm stole RTR trade secrets when developing the Nuuly service. T OR F?
FALSE
274
While some fast-growing startup companies experience crises as they negotiate large-scale logistics, Rent the Runway’s business model has thus far allowed it to avoid mistakes. T OR F?
FALSE
275
AI is hindering customer service by depersonalizing interactions through chatbots and virtual assistants.T OR F?
FALSE
276
Firms need to be aware of when an AI’s “knowledge” might end. T OR F?
TRUE
277
What are “naked algorithms” in the context of AI?
STARTING POINT ALGORITHMS IN THE PUBLIC DOMAIN OR ACCESSIBLE FROM CLOUD PROVIDER SERVICES.
278
Tesco is the planet’s largest retailer. T OR F?
FALSE
279
Data warehouses are composed entirely of proprietary corporate data, while data marts take advantage of data purchased from third-party firms. T OR F?
FALSE
280
Turning data into usable information is hindered by transactional databases set up to be simultaneously accessed for reporting and analysis. T OR F?
FALSE
281
Legacy systems are popular among large firms because they have a large storage capacity and are designed to share data. T OR F?
FALSE
282
Dynamic pricing is considered especially tricky in situations where consumers make repeated purchases and are more likely to remember past prices, and when they have alternative choices. T OR F?
TRUE
283
Most transactional databases are not set up to be simultaneously accessed for reporting and analysis. As a consequence __________________.
DATA IS NOT EFFICIENTLY TRANSFORMED INTO INFORMATION.
284
__________ put(s) users in control so that they can create custom reports on an as-needed basis by selecting fields, ranges, summary conditions, and other parameters.
AD HOC REPORTING TOOLS
285
Which of the following conditions is essential for data mining to work?
THE EVENTS IN THE DATA SHOULD REFLECT CURRENT AND FUTURE TRENDS.
286
_______ is the term used to describe raw facts and figures.
DATA
287
Firms adopting OSS may be at risk if they distribute code and aren’t aware of the licensing implications. T OR F?
TRUE
288
App developers often lament the ____________ created within apps where data is more tightly controlled by a service provider and where firms must comply to the usage policies of the platform provided.
WALLED GARDEN
289
Many firms manage Docker and other container environments within an existing software layer, with Kubernetes being the largest player in this space. T OR F?
TRUE
290
Cloud computing refers to _________________________.
REPLACING COMPUTING RESOURCES WITH SERVICES PROVIDED OVER THE INTERNET.
291
Ensuring that organizations follow requirements for data protection and security is known as ____________.
DATA COMPLIANCE.
292
European regulators have become much more aggressive in fining organizations that ignore the region’s privacy protections but failed to fine Meta for collecting Facebook and Instagram data without explicit consent. T OR F?
FALSE
293
Apple’s IDFA identifier is a unique snippet of random text used by developers to _____________.
TRACK CONSUMER BEHAVIORS ON IOS DEVICES.
294
Grouping together additional data collected from traditional browsing history in order to identify users is known as which of the following?
FINGERPRINTING
295
The use of installed viruses, malware, or other vulnerabilities to copy the behaviors of humans by visiting websites associated with specific ads is known as ____________.
CLICK FRAUD.
296
Routers don’t have perfect, end-to-end information on all points in the Internet. T OR F?
TRUE
297
How many people world-wide are not yet online?
3 BILLION
298
TCP and IP operate above http and the other application transfer protocols. T OR F?
FALSE
299
Circuit-switched networks are advantageous because they offer an inexhaustible supply of bandwidth for telecommunications. T OR F?
FALSE
300
In the URL, the host name is the name of the network a user tries to connect to. T OR F?
FALSE
301
Internet networks are ________.
PACKET-SWITCHED NETWORKS.
302
Changing the letter case when typing in host and domain names does not affect the user’s ability to reach the destination. T OR F?
TRUE
303
_____________ involves allowing voice packets to gain delivery importance over packets for applications like e-mail.
PACKET PRIORITIZATION
304
Many fear that innovation might suffer as a result of the transition of internet services from flat-rate pricing to metered usage. T OR F?
TRUE
305
One of the factors that accelerated the development of the Internet during the 1990s was _______________.
THE INVENTION OF GRAPHICAL WEB BROWSING.
306
Which of the following statements is true of the term “FTTH”?
IT REFERS TO BROADBAND SERVICE PROVIDED VIA LIGHT-TRANSMITTING FIBER-OPTIC CABLES.
307
The frequencies licensed by telecommunication firms to provide wireless service is known as _____________.
WIRELESS SPECTRUM
308
The fastest last-mile technology is:
FTTH
309
What is an example of cybersquatting?
ACQUIRING A DOMAIN NAME TO EXTORT A FIRM, INDIVIDUAL, PRODUCT, OR TRADEMARK HOLDER.
310
Supporters of net neutrality believe that It will improve innovation It will keep costs low It will level the playing field among competitive services offered over the Internet. ALL OF THE ABOVE ARE TRUE None of the above are true
ALL OF THE ABOVE ARE TRUE
311
Which of the following is the domain name for the website http://www.nytimes.com/tech/index.html?
NYTIMES
312
Regularly updated software lowers a system’s vulnerable attack surface. T OR F?
TRUE
313
A black hat hacker looks for weaknesses in security mechanisms, with a view to help plug the holes that might be exploited by cyber-criminals. T OR F?
FALSE
314
Multiple administrators jointly controlling key systems are an unnecessary burden that adds to the complexity of managing security in an organization. T OR F?
FALSE
315
The information systems of several firms have been compromised by insiders that can include contract employees, cleaning staff, and temporary staffers. T OR F?
TRUE
316
Defensive security professionals responsible for maintaining internal network defenses against all cyberattacks and threats are known as the blue team. T OR F?
TRUE
317
Which of the followings aspects of international law would enable a cyber-criminal operating across borders to evade prosecution?
NON-EXISTENT EXTRADITION AGREEMENTS BETWEEN TWO COUNTRIES.
318
A research scientist with a major pharmaceutical firm in New Jersey is caught passing on sensitive information, worth millions of dollars, regarding the composition and test results of his firm’s latest drug to a rival company. What crime is he being held responsible for?
CORPORATE ESPIONAGE
319
Information security policies would be ineffective without ______ and ___________.
AUDIT; ENFORCEMENT
320
In public-key encryption systems, the functions of the public and private keys are interchangeable. T OR F?
FALSE
321
In security circles the phrase “compliance” refers to ____________.
LEGAL OR PROFESSIONALLY BINDING STEPS THAT AN ORGANIZATION MUST TAKE.
322
A system that monitors network use for potential hacking attempts and takes preventative action to block, isolate, or identify attempted infiltration, and raise further alarms to warn security personnel is known as a(n):
INTRUSION DETECTION SYSTEM.
323
Which of these would be an example of a DDoS attack?
OVERLOADING A POPULAR SOCIAL NETWORKING SITE WITH INBOUND MESSAGES TO SHUT DOWN ACCESS TO THE SITE.
324
While many unsophisticated phishing scams can be easily identified by poor grammar and other suspiciously worded text, scammers are now using generative AI to craft more sophisticated phishing emails. T OR F?
TRUE
325
_________ can be either software-based or deployed via hardware, such as a recording “dongle” that is plugged in between a keyboard and a PC.
KEYLOGGERS
326
Google matched ChatGPT, launching its own chat-like generative AI tool named Bard. T OR F?
TRUE
327
After stalling for several years, Microsoft’s market cap has steadily marched higher, passing Alphabet’s value along the way. T OR F?
TRUE
328
Google's Search Generative Experience (SGE) is the firm's first experiment in blending AI chat with:
TRADITIONAL SEARCH RESULTS.
329
Which of the following represents the market capitalization of a firm?
SHARE PRICE X NUMBER OF SHARES
330
Google mainly only runs ads in search but limits them across their host of Google-owned sites. T OR F?
FALSE
331
The bulk of Google’s revenue comes from:
ADVERTISING
332
Google ads can be targeted based on keywords automatically detected inside the content of a website. T OR F?
TRUE
333
Which of the following efforts by Google is aimed at encouraging increased smartphone access worldwide?
GIVING THE ANDROID OS TO MOBILE PHONE MANUFACTURERS FOR FREE.
334
Which of the following measures can advertisers take to prevent embarrassment through content adjacency issues?
USING NEGATIVE KEYWORDS
335
What a person sees when they encounter an ad is known as the:
AD CREATIVE.
336
Which of the following parameters significantly influences the rank of a Web page in Google’s search results?
THE NUMBER OF OTHER PAGES LINKING TO GIVEN PAGE
337
A(n) _______ is a search performed on Google or any other search engine.
QUERY
338
If a firm’s pages are not near the top of query results, customers may never discover its website. This has led to _______________ becoming a critical function for many marketing organizations.
SEARCH ENGINE OPTIMIZATION
339
Which of the following statements holds true for the term deep Web?
IT REFERS TO INTERNET CONTENT THAT CAN’T BE INDEXED BY GOOGLE AND OTHER SEARCH ENGINES.
340
What is a “black hat SEO”?
USING UNAUTHORIZED (AND GOOGLE-PROHIBITED) TECHNIQUES TO IMPROVE A PAGE’S SEARCH RESULTS.
341
Third-party data is collected by a company that has had the customer explicitly enter a relationship with them. T OR F?
FALSE
342
Each time an ad is shown to a user is known as a(n):
IMPRESSION
343
Suppose you regularly leave your phone in the car when you arrive at work. You need to have you phone because it serves as the authentication device for your desktop’s multi-factor login. To avoid going back to the car daily, you set an alert that reminds you to put the phone in your bag when you are within one mile of your office. Setting this perimeter is known as:
GEOFENCING
344
A Privacy Sandbox that could accurately separate a user from a user-impersonating bot could significantly decrease online ad fraud. T OR F?
TRUE
345
App stores are exclusively focused on smart-phone markets.T OR F?
FALSE
346
While large groups of individuals work on key OSS projects, such as the Linux operating system, some widely used efforts have had fewer developers, creating concerns over quality and security. T OR F?
TRUE
347
Which of the following sets of software represents the constituents of the LAMP stack?
LINUX, APACHE, MYSQL, PERL
348
Installing a complex set of an organization’s legacy systems on someone else’s hardware can be a brutal challenge. For that reason, we can expect most cloud computing efforts to focus on ____________________.
NEW SOFTWARE DEVELPMENT PROJECTS.
349
Products and services designed to target a specific industry are known as:
VERTICAL NICHES
350
The term "software" is used to refer to:
the set of instructions that tells hardware what to do.
351
_____ is the term used to represent the physical components of information technology.
Computer hardware
352
A(n) _____ is software that controls computer hardware and establishes standards for developing and executing applications.
operating system
353
Even specialty devices like video game consoles, television set-top boxes, Kindles and smart appliances run some form of OS. T OR F?
TRUE
354
User interface refers to:
the mechanism through which users interact with a computing device.
355
Operating systems are designed to give programmers a common set of commands to consistently interact with the hardware. These commands make a programmer's job easier by:
making it faster to write software while minimizing the possibility of errors in code.
356
Firmware is used to refer to:
a device's control programs stored on nonvolatile memory chips.
357
The Nest thermostat or app-controlled lighting and door locks are products referred to as _______________.
the Internet of Things
358
Embedded systems are special purpose software designed and included inside physical products. T OR F?
TRUE
359
Products and services that allow for the development and integration of software products and other complementary goods are known as _____.
platforms
360
_____ refer(s) to applications that address the needs of multiple, simultaneous users in an organization or work group.
Enterprise software
361
Many firms with similar procedures for accounting, finance, and human resource functions might buy a software package rather than develop their own code. This is usually considered fine since these functions are often not strategic. T OR F?
TRUE
362
_____ systems help a firm manage aspects of its value chain, from the flow of raw materials into the firm through delivery of finished products, and services at the point-of-consumption.
Supply chain management
363
Which of the following statements is true regarding enterprise systems?
For many firms, installing and deploying enterprise systems have been difficult, with some firms experiencing loss or even bankruptcy from botched efforts.
364
Most enterprise software works in conjunction with a _______________, which stores and retrieves the data that an application creates and uses.
database management system (DBMS)
365
Packaged enterprise systems can: ease the linking of systems with software make data more usable streamline processes all of the above
all of the above
366
_____ is a form of computing where systems in different locations communicate and collaborate to complete a task.
Distributed computing
367
A(n) _____ is software that houses and serves business logic for use by distributed systems.
application server
368
The terms web services and APIs are often used interchangeably, and refer to code and request/response standards used by this code so that other programs can call these services to perform a task. T OR F?
TRUE
369
Firms that invite other organizations to integrate with their systems via web services and APIs are often thought of as turning their products into ____________.
PLATFORMS
370
Organizations that have created a robust set of Web services around their processes and procedures are said to have a(n) _____.
service-oriented architecture
371
Which of the following is not true about potential benefits to firms that create platforms? They can widen the reach of firms and products The potential to make their products and services more useful All of the above are true They can create switching costs They can enhance network effects
All of the above are true
372
_____ is a set of standards for exchanging messages containing formatted data between computer applications.
Electronic data interchange
373
EDI is a very old standard. The two main technologies replacing EDI are extensible markup language (XML), and JavaScript Object Notation (JSON). T OR F?
TRUE
374
Most of the time, server hardware resides on server-class software. T OR F?
FALSE
375
Rails, Django, AngularJS, and ASP.NET are examples of ____________.
programming frameworks
376
A(n) _____ is an application for programmers, which includes a text editor, a debugger for sleuthing out errors, and other useful programming tools.
integrated development environment
377
Java code that runs through the JVM interpreter is slower than the code compiled for the native operating system and processor that make up a platform. T OR F?
TRUE
378
True platform independence can be defined as:
the ability for developers to write code that can be run everywhere.
379
Programs written using _____ can be interpreted within their applications, rather than compiled to run directly by a microprocessor.
scripting languages
380
An open source extension for Python programming language that can run on over 300 devices, _____ was developed by the hardware company Adafruit.
CircuitPython
381
_______________ are methods to divide tasks related to software creation and deployment up into tasks targeted at building better products.
Software development methodologies
382
Which of the following has become a dominant software development methodology?
Agile development
383
Feature creep can be defined as:
an expansion of the scope of a project.
384
You will often hear scrum described as having roles, artifacts, and blueprints. T OR F?
FALSE
385
A task board is an example of a(n) ________, while a daily scrum is an example of a(n) _________.
artifact; ceremony
386
An organization is said to be _____ if its systems operate within required legal constraints, and industry and organizational obligations.
compliant
387
The costs associated with the design, development, testing, implementation, documentation, training and maintenance of a software system are collectively referred to as:
total cost of ownership.
388
A process-improvement approach that can assist in assessing the maturity, quality, and development of certain organizational business processes, and suggest steps for their improvement is known as:
capability maturity model integration.
389
While the Health.gov failure was large and public, it was by no means an anomaly. Research firm the Standish Group estimates that in the past ten years, some ____ percent of large federal information technology projects were unsuccessful.
94
390
The largest car manufacturer in the world, _____, saw “beating Tesla” as their goal in the electric vehicle (EV) market.
Volkswagen
391
Manufacturing (an) electric vehicle/s requires ____ compared to (a) vehicle/s with a standard combustion engine.
10 times as much code
392
Volkswagen iD3 received the following criticism when it appeared on the market:
inconsistent charging software
393
The fixed cost to produce a software product is effectively zero. T OR F?
FALSE
394
_____ refers to replacing computing resources, which could include hardware or software, with services provided over the Internet.
Cloud computing
395
Which software allows a single computer to function as if it were several different computers?
Virtualization software
396
______________ offerings—free alternatives where anyone can look at and potentially modify a program’s code.
Open source software
397
Which of the following is considered to be the flagship open source software product? SAP ERP Google Docs Linux Adobe Flash Windows Media Player
Linux
398
What are the open source software stacks used to build Web applications?
LAMP, MEAN
399
In the context of open source software, the term "hardened" is used to describe:
technology products with particularly strong security features.
400
_____ is the ability to either handle increasing workloads or to be easily expanded to manage workload increases.
Scalability
401
In contrast to other major platforms, there has never been a major open source software security vulnerability. T OR F?
FALSE
402
Those looking to share open source projects, contribute to these projects, or examine the code of projects (a great way to learn) should visit the site ___________.
GitHub
403
Which of the following is an open source customer relationship management software? Cassandra Zimbra OpenSolaris SugarCRM HBase
SugarCRM
404
Which of the following is an open source e-mail software that competes with Outlook server? Gimp MongoDB Magento Zimbra Alfresco
Zimbra
405
Oracle, a firm that sells commercial ERP and database products, provides Linux for free, selling high-margin Linux support contracts for as much as $500,000. This is an example of:
firms using OSS to wean customers away from competitors.
406
Total cost of ownership is all the cost associated with the design, development, testing, implementation documentation, training and maintenance of a software system. T OR F?
TRUE
407
_____ is a form of cloud computing where a firm subscribes to a third-party software-replacing service that is delivered online.
Software as a service
408
With _______, firms get the most basic offerings but can also do the most customization, putting their own tools (operating systems, databases, programming languages) on top.
IaaS
409
With platform as a service (PaaS), the vendor supplies the support software and operating system, but the client ____________.
writes their own code.
410
Which of the following is true about SaaS?
Its associated costs are treated as variable operating expenses rather than fixed capital expenses.
411
The ____ between the customer and the vendor usually specify the levels of availability, serviceability, performance, operation, or other commitment requirements.
service level agreements
412
Products and services designed to target a specific industry are known as horizontal niches. T OR F?
FALSE
413
The major concern regarding software as a service involves:
the high dependence a firm develops with its SaaS vendor.
414
Which of the following observations regarding software as a service is true?
Radical changes in a SaaS system's functionality might result in unforeseen training costs.
415
SaaS means a greater consumerization of technology, which is rarely, if ever, works out well for firms. T OR F?
FALSE
416
_____ is a scalability solution that is usually provided as an overflow service, kicking in as needed.
Cloudbursting
417
_____ are unpredicted but highly impactful/spiking events.
Black swans
418
When complex legacy systems have to be ported,
companies may find it difficult or impossible to move to cloud computing
419
_____ are massive networks of computer installations running software to coordinate their collective use.
Server farms
420
The high customer costs of cloud computing raise the barriers to entry for startup technology firms seeking cloud services. T OR F?
FALSE
421
The competition among cloud providers saw _____ a big winner when its product sales exploded, and _____ a big loser when its capital spending on server farms drastically increased.
Nvidia, Microsoft
422
A server running _____ software can create smaller compartments in memory that each behave as a separate computer with its own operating system and resources.
virtualization
423
Virtualization offers firms many advantages, but one disadvantage is that it requires firms to buy more server computers than if organizations had not deployed virtualization. T OR F?
FALSE
424
________________ are a type of virtualization that allows for shared operating systems, more resource savings and faster execution.
Containers
425
When a firm runs an instance of a PC's software on another machine and simply delivers the image of what's executing to the remote device, it is said to be operating on a(n) _____.
virtual desktop
426
iBeacon is:
a technology that apps can use to determine a user's location.
427
Which of the following is not considered advantages of apps over packaged software and browser-based alternatives?
Most app stores provide localization efforts, translating content uploaded by developers into language systems offered in local app stores throughout the world.
428
App platforms lower the switching costs of software developers when compared to costs associated with developing browser-based alternatives. T OR F?
FALSE
429
Most firms will opt for an IT configuration that is 100 percent in-house, packaged, or SaaS. T OR F?
FALSE
430
Which of the following is usually not an option for firms relying on unique processes, procedures, or technologies that create vital, differentiating competitive advantage?
Purchasing package software from a vendor to automate such efforts
431
Changing pricing based on demand conditions is known as:
DYNAMIC PRICING
432
Disney rolled out dynamic pricing with great success for:
The Lion King
433
RFID technology is often used to ______________.
identify products as they move through an organization's value chain
434
_____ is a term describing the extensive use of data, statistical and quantitative analysis, explanatory and predictive models, and fact-based management to drive decisions and actions.
Analytics
435
___________________ refers to a type of artificial intelligence that leverages massive amounts of data so that computers can improve the accuracy of actions and predictions on their own without additional programming.
Machine learning
436
_____ is a catchall term combining aspects of reporting, data exploration, and ad hoc queries, and sophisticated data modeling and analysis.
Business intelligence
437
Beacons technology works by using ___________ technology.
Bluetooth low-energy
438
Dynamic pricing is considered especially appropriate for retailers, such as grocery stores or department stores. T OR F?
FALSE
439
____ is insight gained from experience and expertise.
Knowledge
440
A _____ is either a single table or a collection of related tables.
database
441
The phrases table, column, and row are also referred to by the names ___________ respectively.
file, field, record
442
Which of the following is by far the most common standard for expressing databases?
Relational databases
443
NoSQL technologies are often used with massive, disparately structured data. T OR F?
TRUE
444
A system that records business-related exchanges, such as a cash register sale, ATM withdrawal, or product return is known as a(n) _____.
transaction processing system
445
_____ are systems that provide rewards and usage incentives, typically in exchange for a method that provides a more detailed tracking and recording of customer activity.
Loyalty programs
446
_____ systems are often used to empower employees to track and record data at nearly every point of customer contact.
Customer relationship management
447
Firms may turn to third parties and outside services to acquire data for predictive models. T OR F?
TRUE
448
_____ are firms that collect and resell data.
Data aggregators
449
Which of the following is a true statement regarding the Starbucks Rewards program?
The app allows customers to scan purchases made outside the store.
450
The problem of incompatible legacy systems limiting firms' ability to turn data into information is compounded by:
mergers and acquisitions.
451
Which of the following can be a major roadblock to turning data into information, and inhibits firm agility, holding back operational and strategic initiatives?
Legacy systems
452
A problem limiting the turning of data into information is that most transactional databases are not set up to be:
simultaneously accessed for reporting and analysis.
453
A set of databases designed to support decision making in an organization is known as a(n):
data warehouse
454
A(n) _____ is a database or databases focused on addressing the concerns of a specific problem.
data mart
455
Data quantity answers the question: How much data do we need? T OR F?
TRUE
456
Setting up new collection efforts, surveys, or systems to obtain the data is called ________.
data sourcing
457
Roughly 80 percent of corporate data is messy and unstructured, and stored in conventional, relational formats.T OR F?
FALSE
458
The three “Vs” of Big Data refer to the names of the three leading commercial and open source technologies used in most of these efforts. T OR F?
FALSE
459
______ is a set of mostly open source tools to manage massive amounts of unstructured data for storage, extraction, and computation.
Hadoop
460
The _______ breed of cloud-based data tools is specifically designed to gather data from disparate sources and turn them into standard formats that can be interrogated by managers.
Snowflake
461
Systems that can absorb any type of data, structured or not, from any type of source are often referred to as:
schema-less.
462
_____ refers to identifying and retrieving relevant electronic information to support litigation efforts.
E-discovery
463
Data used in online analytical processing (OLAP) reporting are stored in _____.
data cubes
464
_____ refers to a method of querying and reporting that takes data from standard relational databases, calculates and summarizes the data, and then stores the data in a special database.
Online analytical processing
465
The process of taking data from a variety of data sources, not uniformly organized, and transforming the data to a common format is known as:
extract, transform, load
466
L.L. Bean’s rollout of Big Data efforts for improved customer service involved all of the following except: None of the above are incorrect—the effort leveraged all of the above. Training technical staff Training marketing staff On-premises technology was moved to Google’s Data Cloud Reporting tools were made available to nontechnical staff
None of the above are incorrect—the effort leveraged all of the above.
467
An integrated shopping experience and unified customer view across channels is sometimes referred to as _______________.
omnichannel
468
Collaborative filtering is determining which customers are likely to leave, and what tactics can help the firm avoid unwanted defections. T OR F?
FALSE
469
For ____________ to work, the organization must have clean, consistent data; and the events in that data should reflect current and future trends.
data mining
470
One federal study showed Black and Asian people were about three times more likely than white people to be misidentified by facial recognition. T OR F?
FALSE
471
The Walmart efficiency dance starts with a proprietary system called _________, a system originally developed in 1991 and continually refined ever since.
Retail Link
472
Walmart uses Hadoop to sift through social media posts about the firm. T OR F?
TRUE
473
Walmart stopped sharing its data assets with information brokers like ACNielsen and Information Resources because:
due to Walmart's huge scale, the agencies offered no extra value with their additional data.
474
Walmart is focused on expansion in _____, where it has invested over $19.5 billion in “Flipkart.”
INDIA
475
Which of these are identified in the text as a positive, and a negative, of AI?
automation of mundane tasks; job displacement
476
Using prompts, ______ learns the data, and generates output (typically some type of media) based on the information gathered from the prompts.
generative AI
477
What is the difference between GPT and ChatGPT?
ChatGPT is the chatbot; GPT generates the results.
478
Artificial intelligence doesn’t use ______ but uses computer software to improve products and functions.
human intelligence
479
LLM stands for _____ model.
large language
480
The first step of creating an LLM is:
build a foundation model
481
The data used to train the model in AI before it’s used is:
corpus
482
Anthropic uses constitutional AI to build what it considers:
a more ethical AI
483
Google researchers invented ______ which allows AI to produce faster results, processing large amounts of data in parallel.
the Transformer
484
Goldman Sachs, a financial firm, has predicted that AI could replace up to 44% percent of work done in the _____ field.
legal
485
Which of these is not one of the fields that will be impacted in a major way by AI?
Construction
486
Since AI is developing so rapidly, one concern is _____, where the AI engine is deliberately fed incorrect data so incorrect results are generated.
data poisoning
487
Many AI companies are facing _____ over how they are training their AI engines.
copyright lawsuits
488
The very beginnings of AI, the foundation models that have to be trained, are the:
naked algorithms
489
Many AI implementations force radical change to the way a firm conducts business, and the way teams operate; how the organization handles this is:
change management
490
Due to the complexities of human nature, it’s understandable that AI systems might show _____ that their development teams don’t even realize they have.
biases
491
Firms can take a number of steps to set their AI engines up for success, including hiring diversely, adding ethicists to the team, and creating
a system review board.
492
The Echo Nest, an automated music geek, was purchased in 2014 by _____ to help the company create a playlist geared to your taste.
Spotify
493
Spotify uses AI to create a custom station for a user, called _____, by examining listening habits and playlists.
Discover Weekly
494
Which of the following allows a firm to serve ads to specific categories of Internet users, so that it can send ads to groups it is most interested in reaching, and those that are most likely to respond to such an effort?
targeting
495
____ is a nonprofit industry trade group for the interactive advertising industry.
Internet Advertising Bureau
496
Banner ads are part of a category of online advertising referred to as _______.
display advertising
497
____ are cost-per-action, where program sponsors pay referring websites a percentage of revenue earned from the referral.
Affiliate programs
498
One of the largest impacts on the advertising industry is the _____ the creation process.
use of generative artificial intelligence in
499
Professionals in most industries today rely on _____ to provide connectivity for products and services as well as information about new markets and opportunities.
the Internet
500
___________ connect to one another, exchanging traffic, and ensuring your messages can get to any other computer that’s online and willing to communicate.
Internet service providers
501
URL, the address one types into a Web browser, stands for:
Uniform Resource Locator.
502
The _____ defines the rules for communication between Web browsers and Web servers.
hypertext transfer protocol
503
You can think of the host as the name of the network you’re trying to connect to, and think of the domain name as the computer you’re looking for on that network. T OR F?
FALSE
504
Host and domain names are not case sensitive, but path names in URLs are. T OR F?
TRUE
505
Mistyping path or filenames in a Web address may result in a 404 error, which means:
document not found.
506
Fault tolerance is the ability for a system to continue operation even if a component fails. T OR F?
TRUE
507
We need a new standard for Internet addresses since the IPv6 format is nearly at its max. T OR F?
FALSE
508
One of the problems with the IPv6 rollout is that it is not backward compatible with the existing IPv4 standard. T OR F?
TRUE
509
The _____ is a distributed database that looks up the host and domain names that a user enters, and returns the actual IP address for the computer that the user wants to communicate with.
domain name service
510
The temporary storage space used to speed up computing tasks like accessing websites is called a:
CACHE
511
Exploiting a hole in DNS software in order to redirect users to sites they didn’t request, often to harvest passwords and credit card data is ___________.
cache poisoning.
512
A(n)_____ refers to a unit of data forwarded by a network.
packet
513
The _____ protocol works at both the start and endpoint of an Internet communication between two computers to ensure perfect copies of messages are sent and received.
transmission control
514
The relaying of data packets between the two ends of a communication over the Internet is carried out through special computers called:
routers
515
UDP (user datagram protocol) works as a TCP stand-in when you’ve got the need for speed, and are willing to sacrifice quality. T OR F?
TRUE
516
Circuit switching networks are more efficient than packet switching networks. T OR F?
FALSE
517
When different ISPs connect their networking equipment together to share traffic, it is called:
peering.
518
The phrase latency refers to:
DELAY
519
Amdahl's law states that a system's speed is:
determined by its slowest component
520
The dominance of the U.S. Internet industry worldwide is a direct result of United States consistent appearance at the top of speed and cost rankings for consumer last-mile broadband access. T OR F?
FALSE
521
One criticism of FTTH (Fiber to the home) is that this capacity has to be shared, so if your neighbors are high-bandwidth users, they may reduce your Internet transmission speeds. T OR F?
FALSE
522
_____ refers to a broadband service provided via light-transmitting fiber-optic cables.
Fiber to the home technology
523
The term _____________ refers to frequencies used for wireless communication.
spectrum
524
Wireless systems provided by earth-bound base stations like cell phone towers are referred to as:
terrestrial wireless.
525
Telecom firms seeking to provide mobile phone and mobile data service ________
must license the right to use wireless spectrum
526
All of the following are complications associated with implementing 5G services except:
5G transmission points are much larger than even the massive towers used to support 4G.
527
LTE refers to:
the dominant worldwide 4G wireless transmission technology
528
Geosynchronous earth orbit (GEO) systems
have a higher latency than LEO systems
529
Net neutrality is the principle that:
all Internet traffic should be treated equally.
530
The Achilles heel of DSL lies in the fact that it uses standard copper telephone wiring. T OR F?
TRUE
531
The advantage of low earth orbit (LEO) over geosynchronous Earth orbit is
the latency is smaller and transmission speeds are faster.
532
A virtual perimeter around a physical location is
a geofence.
533
The Kessler Effect is
a feared cascading effect that objects in space will collide and create additional debris.
534
Which of the following factors is thought to have been at work during the Target security breach? None of the above Target's security software could have automatically deleted detected malware, but this function was turned off. Malicious code was disguised by using the name of a legitimate software product. The database for credit card transactions wasn't sufficiently isolated from other parts of the system. All of the above.
All of the above.
535
Although the attack on Target was one of the largest credit card breaches in U.S. business history, the software that executed the attack was not considered to be especially sophisticated. T OR F?
TRUE
536
Which of the following is a valid observation regarding information security?
Information security isn't just a technology problem.
537
_____ are groups of surreptitiously infiltrated computers linked together and controlled remotely, often also known as zombie networks.
Botnets
538
An attack in which a firm's computer systems are flooded with thousands of seemingly legitimate requests, the sheer volume of which will slow or shut down the site, is known as:
distributed denial of service.
539
_____ refer to protesters seeking to make a political point by leveraging technology tools, often through system infiltration, defacement, or damage.
Hacktivists
540
Stuxnet showed that with computers at the heart of so many systems, it’s now possible to destroy critical infrastructure without firing a shot. T OR F?
TRUE
541
Edward Snowden is:
a U.S. government contractor thought whistle-blower by many, who released (in violation of U.S. law) secret documents exposing state-run surveillance networks.
542
A white hat hacker looks for weaknesses in security mechanisms, with a view to help plug the holes that might be exploited by cyber-criminals. T OR F?
TRUE
543
Russia’s invasion of Ukraine used _____ in a cyberassault that wiped out Ukraine’s satellite communications network.
ACID RAIN
544
A data harvester is someone who
collect data for illegal resale after infiltrating systems.
545
The phrase __________________ refers to security schemes that automatically send one-time use representations of a credit card which can be received and processed by banking and transaction firms at the time of payment. They are used in Apple Pay and Android Pay.
tokenization
546
Exploits that attempt to infiltrate a computer system by masquerading as something that they are not are called:
TROJAN
547
The key difference between viruses and worms is that:
worms do not need an executable to spread, unlike viruses.
548
Keyloggers spyware can be either software-based or hardware-based. T OR F?
TRUE
549
_____________ is an example of an exploit in which hackers target security vulnerabilities caused by software developers not validating user input.
SQL injection technique
550
One way to enhance security against malware on smartphones is to modify the phone to work off network. T OR F?
FALSE
551
VPN software should only be used on an organization’s internal network. Never use VPN software on a public wireless network, as this could give hackers an entryway from your computer into your organization’s secure network. T OR F?
FALSE
552
One of the physical threats hackers use, sifting through trash searching for valuable data, is called__________________.
dumpster diving
553
Public key encryption is considered far weaker than private key encryption, so most websites avoid using public key systems. T OR F?
FALSE
554
____ are attacks that are so new that they haven’t been clearly identified, and so they haven’t made it into security screening systems.
Zero-day exploits
555
Using a password, with the use of a separate verification code, is an example of
2FA – two-factor authentication.
556
Con games that trick employees into revealing information or performing other tasks that compromise a firm are known as _____ in security circles.
social engineering
557
Cons executed through technology and that often try to leverage the reputation of a trusted firm or friend to trick the victim into performing an action or revealing information constitute:
phishing.
558
The term _____________ refers to forging or disguising the origin or identity.
SPOOF
559
Two-factor or multi-factor authentication systems can slow consumers down, leading to consumer annoyance and dissatisfaction. T OR F?
TRUE
560
Which of the following is a precaution a user can take against hacking? All of the above Stay Updated Stay Vigilant Stay armed Surf smart
All of the above
561
Students are discouraged from using over-the-Internet backup services since these are known sources for security vulnerability. T OR F?
FALSE
562
The ______________ framework represents a series of standards for best practices in implementing, maintaining and improving organizational security.
ISO 27000
563
A best practice for information security is to stay with mandated security regulations requirements. T OR F?
FALSE
564
A security tool that is deployed by firms as a phony target to lure or distract attackers and gain information about them is known as a:
HONEYPOT
565
Programs that use _____ are highly restrictive, permitting communication only with pre-approved entities.
whitelists
566
Malware _____ are a sort of electronic fingerprint often used to recognize malicious code.
signatures
567
PCI standards may be used by a merchant to ________.
apply to credit card payments and information.
568
Over the past several years, online advertising has represented the only advertising category that is consistently trending with positive share growth. T OR F?
TRUE
569
In fall 2020, Google was stunned by the launch of an AI that surpassed its own:
ChatGPT
570
Google sells more advertising than any other media company in the world, including Disney, News Corp, Time Warner, and the New York Times corporation. T OR F?
TRUE
571
____ is the value of a firm calculated by multiplying its share price by the number of shares.
MARKET CAP
572
____ dominates Internet search and online advertising, with more advertising revenue than any online or offline firm.
GOOGLE
573
Search engine results returned and ranked according to relevance are known as a(n):
NATURAL OR ORGANIC SEARCH
574
A(n) _____ is software that traverses available Web links in an attempt to perform a given task.
SPIDER
575
The term _____ refers to Internet content that cannot be indexed by Google and other search engines.
DEEP WEB
576
Google technology has been engineered so that no single point of failure should interrupt the firm's operations. Systems that have such safeguards against interruption are said to be:
fault tolerant.
577
The term for techniques used to improve a page's rank in search results is:
SEO
578
Users don't really search the Internet using Google; they search a copy of Internet content stored on Google's servers. T OR F?
TRUE
579
Google gets creative about how its servers are cooled—stormwater runoff is used in the southeastern United States. T OR F?
TRUE
580
____ is the process of creating a series of bogus websites, all linking back to the pages one is trying to promote.
LINK FRAUD
581
The practice of designing, running and optimizing search-engine ad campaigns is known as:
search engine marketing.
582
Advertisements that are targeted based on a user's query are referred to as _____.
KEYWORD ADVERTISING
583
Text ads appearing on Google search pages are billed on a(n) _____ basis.
PAY PER CLICK
584
Ad rank on Google is calculated using the equation: Ad Rank = f (bid value a.k.a. __________ an advertiser is willing to pay, Quality Score, expected impact of extensions and formats).
maximum CPC
585
The factors that can determine a given ad's quality score in Google includes the:
click-through rate.
586
As users spend more time in apps, this presents a challenge to Google’s dominance in search. T OR F?
TRUE
587
A link that takes a user to a specific webpage (rather than the home page) or which launches an app and brings up a unique location rather than just launching the app is referred to as _____________.
DEEP LINKING
588
Google’s moves to allow hotel bookings directly from search pages have been well received by its large advertisers, Priceline and Expedia. T OR F?
FALSE
589
Efforts that link advertisers to content providers willing to host advertisers in exchange for payment, are referred to as _______________.
AD NETWORKS
590
Advertisers can use _______, which tell networks to avoid showing ads when specific words appear.
NEGATIVE KEYWORDS
591
Advertising based on a website's content is known as:
CONTEXTUAL ADVERTISING
592
Google’s ad network gives it:
DISTRIBUTION
593
When ChatGPT was released, Alphabet shares
DECREASED IN VALUE 12%
594
Google is experimenting with blending AI chat with traditional search results, called
Search Generative Experience.
595
Bard is the AI offering from
GOOGLE
596
To have a higher quality chatbot, consumer feedback shows that the most they’d be willing to pay is
$10 A MONTH
597
Google has incorporated generative AI into its _____ , allowing editing and object removal, to remain competitive.
PHOTOS
598
Although Microsoft has been tremendously profitable over the past decade, its stock price has been relatively flat over those years. T OR F?
FALSE
599
Google assets include brand, scale, network effects, and data. T OR F?
TRUE
600
YouTube is actually the Internet’s second biggest search engine.T OR F?
TRUE
601
Google's size has caused it to be investigated for antitrust violations in Europe. T OR F?
TRUE
602
Global anti-trust laws are synchronized by world trade bodies, so a ruling in one nation will apply to most other industrialized nations. T OR F?
FALSE
603
_____ allows users to use their phones pay for goods, store gift cards, collect and redeem coupons and special offers, and manage loyalty programs.
GOOGLE PAY
604
The technology used to enable the wireless payment scheme in Google Pay is known as
NFC
605
Android holds over _____ percent of the smartphone OS market.
70
606
Google Cloud isn’t backing down, and currently is in _____ place in the market.
3RD
607
Verily was developed by Alphabet’s _____ division.
X
608
Google’s _____ are responsible for nearly 60 percent of sales to K-12 education.
Chromebooks