Q1: What output shows design stage
a. Document that clearly outlines the scope of the project, the budget, the personnel involved, the likely milestones and the key success indicators.
b. Detailed requirement document that specifies the objective of the system and what is needed to be done to realize these objectives.
c. Document that specifies the system in great details but does not necessarily contain coded programs.
d. None of the above
Answer
c. Document that specifies the system in great details but does not necessarily contain coded programs.
Q2: Which are the key elements of IOT
a. Containers and sensors
b. Actuators and containers
c. Sensors and actuators
d. None of these
Answer
c. Sensors and actuators
Q3. Advertising can build —–, but brands are built through —–.
a. product value; pricing strategies
b. recognition; viral campaigns
c. awareness; customer experience
d. customer loyalty; funding
d. image; television promotion
Answer
awareness; customer experience
Q4: CRM systems are used widely to maintain details about customers like their
a. interactions with the organization
b. purchasing and payment details
c. service needs and other similar details
d. all of the above
Answer
all of the above
Q5: What is followed by the formal steps of testing and implementation.
a. Analysis
b. Maintenance
c. Coding
d. Implementation
Answer
c. Coding
Q6. The phenomenon whereby firms can make money by selling a near-limitless selection of less popular products is known as —–.
a. economies of scale
b. the long tail
c. the grey market
d. economies of scope
d. the product lifecycle
Answer
the long tail
Q7. Firms enjoy —– when they are able to leverage the cost of an investment across increasing units of production.
a. economies of scope
b. absolute advantage
c. complementary benefits
d. scale economies
d. high stock market valuations
Answer
scale economies
Q8. Which term refers to a classification of software that monitors trends among customers and uses this data to personalize an individual customer’s experience?
a. Cloud computing
b. Data warehousing
c. The long tail
d. Collaborative filtering
d. Crowdsourcing
Answer
Collaborative filtering
Q9. When firms find themselves in situations where they are both competitors and partners, the situation is called —–.
a. collaborative filtering
b. strategic balancing
c. crowdsourcing
d. coopetition
d. straddling
Answer
coopetition
Q10. An industry practice whereby content is available to a given distribution channel for a specified time period, usually under a different revenue model is known as —–.
a. hoarding
b. pre-empting
c. stalling
d. scheduling
d. windowing
Answer
windowing
Q11. Removing an organization from a firm’s distribution channel thereby collapsing the path between supplier and customer is known as —–.
a. digital distribution
b. disintermediation
c. outsourcing
d. privatization
d. expulsion
Answer
disintermediation
Q12. —– refer(s) to a limit imposed by the Internet service provider on the total amount of traffic that a given subscriber can consume.
a. spectrum
b. long tail
c. bandwidth caps
d. price ceilings
d. cloudbursting
Answer
bandwidth caps
Q13. —– has allowed Amazon to radically drop the price of Kindle offerings, while increasing device functionality.
a. Network Effects
b. Moore’s Law
c. Publisher subsidies
d. Metcalfe’s Law
d. Robotics-driven inventory turns
Answer
Moore’s Law
Q14. Storing digital goods in the cloud via a firm-controlled standard means a company will create the competitive asset of —–.
a. low-cost
b. switching costs
c. brand
d. scale
d. marginal cost
Answer
switching costs
Q15. The —– defines the rules for communication between Web browsers and Web servers.
a. internet message access protocol
b. session initiation protocol
c. hypertext transfer protocol
d. simple mail transfer protocol
d. file transfer protocol
Answer
hypertext transfer protocol
Q16. Mistyping path or filenames in a Web address may result in a 404 error, which means:
a. incorrect case.
b. document not found.
c. unrecognized command.
d. access denied.
d. bad command or filename.
Answer
document not found
Q17. The —– is a distributed database that looks up the host and domain names that a user enters, and returns the actual IP address for the computer that the user wants to communicate with.
a. Web hosting service
b. cache
c. domain name service
d. uniform resource locator
d. network address translation
Answer
domain name service
Q18. The temporary storage space used to speed up computing tasks like accessing Web sites is called a:
a. recall.
b. buffer.
c. cache.
d. backup.
d. reserve.
Answer
cache
Q19. The —– protocol works at both the start and endpoint of an Internet communication between two computers to ensure perfect copies of messages are sent and received.
a. -transmission control
b. internet message access
c. simple mail transfer
d. internet message control
d. file transfer
Answer
transmission control
Q20. A(n)—– refers to a unit of data forwarded by a network.
a. cache
b. protocol
c. router
d. clip
d. packet
Answer
packet
Q21. The relaying of data packets between the two ends of a communication over the Internet is carried out through special computers called:
a. messengers.
b. servers.
c. exchanges.
d. routers.
d. relays.
Answer
routers
Q22. When different ISPs connect their networking equipment together to share traffic, it is called:
a. load balancing.
b. caching.
c. peering.
d. traffic diffusion.
d. optimizing.
Answer
peering
Q23. High-speed last-mile technologies are usually referred to as:
a. high fidelity.
b. supraband.
c. broadband.
d. hyper-speed.
d. hyper-band.
Answer
broadband
Q24. Wireless systems provided by earth-bound base stations like cell phone towers are referred to as:
a. middle earth wireless.
b. high-fidelity wireless.
c. satellite wireless.
d. terrestrial wireless.
d. geostationary wireless.
Answer
terrestrial wireless.
Q25. One possible solution that can provide improved wireless performance when a home otherwise suffers from poor cellular connectivity is:
a. FTTH
b. femtocell technology
c. DSL (but only in dense urban areas)
d. cable-fiber hybrids, but with one connection to each home.
d. HFT
Answer
femtocell technology
Q26. GitHub and StackOverflow are websites that are especially useful for students and professionals focusing on the —– industries
a. Airline
b. Software development
c. Political science
d. Journalism and publishing
d. Photography
Answer
Software development
Q27. ____ includes social media sites and open source software and involves the participation of users to provide the infrastructure and computational resources that enable a service.
a. Coopetition
b. Collaborative filtering
c. Disintermediation
d. Peer production
d. User aggregation
Answer
peer production
Q28. The phrase —– refers to efforts where participants share access to products and services rather than having ownership.
a. Collaborative consumption
b. Journalism and publishing
c. Political science
d. Software development
d. Photography
Answer
Collaborative consumption
Q29. A Web site anyone can edit directly within a Web browser is known as a —–.
a. cloud site
b. microblog
c. blog
d. torrent
d. wiki
Answer
wiki
Q30. Which of the following is an example of a web service that enables crowdsourcing.
a. All of the above
b. Amazon’s Mechanical Turk
c. None of the above
d. Innocentive
d. TopCoder
Answer
Innocentive
Q31. —– refers to a false online persona created to promote a particular point of view often in praise of a firm, product, or individual.
a. Mirage
b. Image illusion
c. Astroturfing
d. Sock puppet
d. Deceit post
Answer
sock puppet
Q32. Engineering the posting of positive comments and reviews of a firm’s product and services on feedback forums is known as —–.
a. sensationalism
b. lobbying
c. framing
d. censoring
d. astroturfing
Answer
astroturfing
Q33. —– refer to protesters seeking to make a political point by leveraging technology tools, often through system infiltration, defacement, or damage.
a. Script kiddies
b. Trolls
c. Fraudsters
d. Hacktivists
d. Phishers
Answer
Hacktivists
Q34. Exploits that attempt to infiltrate a computer system by masquerading as something that they are not are called:
a. Trojans.
b. viruses.
c. adware.
d. worms.
d. botnets.
Answer
trojans
Q35. The —– framework represents a series of standards for best practices in implementing, maintaining and improving organizational security.
a. Snowden
b. UN Encryption Mandate
c. ISO 27000
d. Carbonite
d. OpenSSL
Answer
ISO 27000
Q36. A security tool that is deployed by firms as a phony target to lure or distract attackers and gain information about them is known as a:
a. firewall.
b. honeypot.
c. blacklist.
d. security bait.
d. red herring.
Answer
honeypot
Q37. Programs that use —– are highly restrictive, permitting communication only with pre-approved entities.
a. Certificate authorities
b. Blacklists
c. Whitelists
d. Firewalls
d. Safelists
Answer
Whitelists
Q38. Malware —– are a sort of electronic fingerprint often used to recognize malicious code.
a. code patterns
b. code trails
c. impressions
d. signatures
d. digital tags
Answer
signatures
Q39. —– is the process of creating a series of bogus Web sites, all linking back to the pages one is trying to promote.
a. Phishing
b. Click scam
c. Link fraud
d. SQL injection
d. DNS cache poisoning
Answer
Link fraud
Q40. The term —– refers to Internet content that cannot be indexed by Google and other search engines.
a. lock-in
b. spam
c. dark Web
d. link fraud
d. walled garden
Answer
dark Web
Q41. Ads that run before a user arrives at a Web site’s contents are called —–.
a. third-party cookies
b. landing pages
c. banner ads
d. intermediary ads
d. interstitials
Answer
interstitials
Q42. —– is a nonprofit industry trade group for the interactive advertising industry.
a. Internet Revenue Service
b. Internet Advertising Bureau
c. Interactive Advertising Council
d. Board of Advertising Standards
d. Advertising Bureau of Circulations
Answer
Internet Advertising Bureau
Q43. A Sheetfed scanner is held and dragged over a document to scan it.
a. True
b. False
Answer
b. False