FINAL Flashcards

1
Q

Roughly one in every three people on the planet has a Facebook account. T OR F?

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Firms that grow quickly may seem less risky/more likely to succeed; therefore, fast growth may help
an entrepreneur extract better ownership terms from potential investors. T OR F?

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Facebook founder and CEO Mark Zuckerberg maintains a majority of voting rights in the public
company, virtually guaranteeing that his control of the firm continues, regardless of what investors
say. T OR F?

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Meta owns four of the Internet’s most widely used apps: Facebook, TikTok, WhatsApp, and Google
Voice. T OR F?

A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

When a firm has an IPO, it is said to have

A

gone public, selling shares on a public stock exchange for
the first time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A stockbroker trades shares she does not own with an obligation of later repayment, and in the hope
that the price of traded shares will fall. She then repays share debt with shares purchased at a lower
price and pockets the spread between initial share price and repayment price. This attempt to profit
from a falling stock price is known as

A

SHORT SELLING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Studying Facebook provides a context for understanding which of the following:
network effects
platform partnerships
privacy
business value of social media
All of the above are true.

A

All of the above are true.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Investor groups that provide funding in exchange for an ownership stake in the firm are called

A

VENTURE CAPITALIST

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Mark Zuckerberg, the founder of Facebook, ensured that he remained in control of the firm even after
it went public by

A

RETAINING A MAJORITY OF VOTING RIGHTS IN THE PUBLIC COMPANY.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Facebook’s key resources for competitive advantage are the sophisticated technological tools it
provides its users. T OR F?

A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Facebook (and other apps the firm owns) collectively represent the most prominent photo-sharing
service on the Web, ahead of Picasa, Flickr, and Photobucket, even though all of these other efforts
started before Facebook. T OR F?

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Facebook can be wholly indexed by search engines, like Google and Bing, being able to index all of
Facebook content. T OR F?

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A significant portion of Facebook’s underlying technical infrastructure consists of open-source
software. T OR F?

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Facebook’s phenomenal growth implies that it requires minimal infrastructure investment. T OR F?

A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Facebook was one of the first social networking sites where users actually identified themselves
using their real names. T OR F?

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Facebook purchased Oculus VR because, like Zuckerberg, the firm’s youthful founder had already
built a platform with massive customer base. T OR F?

A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Facebook is especially appealing to organizations looking to share messages with fans since
anyone who has “liked” an organization on Facebook will see all of that organization’s posts in their
news feed. T OR F?

A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Facebook will reduce the rank of posts that request reshares.

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Facebook’s acquisition of WhatsApp was a way for Zuckerberg’s firm to gain leadership in the
fast-growing mobile messaging market. T OR F?

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

_____ is the biggest photo-sharing site on the Web, taking in around three billion photos each
month.

A

FACEBOOK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

The deep web refers to

A

SITES THAT CANNOT BE INDEXED BY GOOGLE AND OTHER SEARCH
ENGINES.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Software that is free and whose code can be accessed and potentially modified by anyone is
referred to as

A

OPEN SOURCE SOFTWARE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Systems distributed throughout the Internet that help improve the delivery speeds of Web pages and
other media, typically by spreading access across multiple sites located closer to users are known
as

A

CONTENT DELIVERY NETWORKS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

The term “social graph” refers to

A

THE GLOBAL MAPPING OF USERS AND ORGANIZATIONS AND
HOW THEY ARE RELATED.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Which of the following factors has helped Facebook build up among its users?

A

MUTUAL AND
RECIPROCAL APPROVAL OF FRIENDS REQUESTS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What does the term “cloud” refer to?

A

IT REFERS TO A COLLECTION OF
COMPUTING RESOURCES AVAILABLE FOR ACCESS OVER THE INTERNET.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What are network effects?

A

IT REFERS TO A SITUATION WHEN
THE VALUE OF PRODUCTS OR SERVICE INCREASES AS THE NUMBER OF ITS USERS EXPANDS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

How are news feeds a source of value for users on Facebook?

A

IT FOSTERS THE VIRALITY OF
INFORMATION SHARING VITAL TO DELIVERING VALUE FROM THE SOCIAL GRAPH.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Mark Zuckerberg acquired the firms Oculus because

A

IT WOULD ENSURE FACEBOOK’S PLACE IN
BEING INVOLVED ON THE FOREFRONT OF COMPUTING’S EVOLUTION.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

One of Facebook’s key resources for competitive advantage is

A

NETWORK INTERNALITIES.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

In the context of Facebook’s business strategy, the walled garden refers to the connections between
individuals and organizations. T OR F?

A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Most Facebook applications are focused on businesses and educational services. T OR F?

A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

The asking price for Facebook acquisition, WhatsApp, was 2 billion dollars. T OR F?

A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Meta attempted to counter the TikTok threat by creating a clone, an app called Lasso. T OR F?

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

TikTok has more daily usage hours than any of Facebook’s platforms. T OR F?

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Facebook’s growing dominance has given rise to the fear that if increasingly large parts of the Web reside inside a single service, innovation, competition, and exchange may suffer. T OR F?

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

“Reels, a feature integrated into Instagram and Facebook, has displaced TikTok as the dominant short-video platform.” T OR F?

A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

“Meta’s Reels feature offers enhanced AI tools to surface content that users are likely to be most interested in.” T OR F?

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

“Since the launch of Reels, users have been spending less time on Meta platforms.” T OR F?

A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

“Cross-posting between Meta platforms allows users to access TikTok features without leaving Instagram or Facebook.” T OR F?

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

_____ is a term that refers to a closed network of single set of services controlled by one
dominant firm.

A

WALLED GARDEN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Facebook has offered a system where website operators can choose to accept a user’s Facebook
credentials for logging in. Website operators appreciate this feature because

A

USERS CAN ACCESS WEBSITES WITHOUT CREATING AN ACCOUNT, REDUCING A POTENTIAL BARRIER TO CUSTOMER ACQUISITION.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Metaverse is a concept where users experience an immersive, computer-generated environment where they can interact with others. T OR F?

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Oculus founder Palmer Luckey launched a Kickstarter campaign to generate interest in his product but failed to meet his initial goal of $250,000, which caused the product to fail before it made it to production. T OR F?

A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Facebook Phone and Meta Portal are examples of Meta’s unsuccessful consumer electronics efforts. T OR F?

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Meta has introduced its second iteration of its smart glasses in a continued partnership with Ray-Ban, which features a smart screen incorporated into the lenses, allowing them to be used for AR and VR. T OR F?

A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

The term “metaverse” was first coined by Neal Stephenson in his 1992 novel Snow Crash. T OR F?

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

The term “metaverse” refers to a specific infrastructure or service provided by several firms. T OR F?

A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

The metaverse is most commonly associated with environments created using augmented reality headsets. T OR F?

A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Predictions suggest that the metaverse could generate between $2.5 and $15 trillion in revenue annually. T OR F?

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Meta’s Reality Labs, responsible for building the metaverse future, has accumulated $40 billion in losses so far. T OR F?

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Microsoft’s largest acquisition in history, justified in part by their hopes to gain “building blocks for the metaverse,” was which firm?

A

ACTIVISION BLIZZARD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Which of the following is an inconvenience of AR/VR headsets?
They are heavy and uncomfortable to wear for long periods.
They are expensive.
They require a lot of computing power.
They are inconvenient to have on hand.
All of the above.

A

All of the above.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

DALL-E is a term taken from the military where trained team, unaffliated with development staff, play the role of adversaries and try to deliberately compromise systems. T OR F?

A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

IDEs are tools used to write software and usually include an editor, debugging tools, a compiler that turns written code into something that a computer can execute and more. T OR F?

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Meta intends to have Llama AI-powered chatbots available across their messaging platforms including virtual avatars of celebrities who are ready to engage you in all sorts of domain-specific conversations. T OR F?

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Meta’s lag in AI was in part blamed on the firm’s rushed adoption of GPUs. T ORF?

A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Developers who make applications create ______ that have the potential to add value to Meta beyond what the firm itself provides to its users.

A

COMPLEMENTARY BENEFITS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

Which of the following is a tactic that Meta used to make Llama 2 a safer AI?
They had third-party users perform Red Team exercises.
They had internal employees perform Red Team exercises.
They developed Purple Llama tools to make it harder for bad actors to generate harmful code.
All of the above
None of the above

A

All of the above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

Meta’s custom ASIC chip helps to:

Improve user experience
Get videos to user devices more quickly
Use less data overall
Improve livestream performance for users
All of the above
A

All of the above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

Facebook’s revenue share with app vendors for some services involved taking more than half of virtual goods sales. T OR F?

A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

Mark Zuckerberg successfully recruited the CEO of PayPal, David Marcus, to run Messenger, which has now become one of the largest messaging platforms. T OR F?

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

Facebook’s attempt to launch a gaming app platform within its iOS app was readily accepted by Apple. T OR F?

A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

What are APIs?

A

APPLICATION PROGRAMMING INTERFACES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

What was the primary purpose of Facebook’s publication of APIs at the F8 developers conference?

A

TO ALLOW DEVELOPERS TO CREATE APPLICATIONS THAT INTERACT WITH FACEBOOK.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

Every eighteen months, Meta employees are required to leave their teams and work on something different for at least a month. T OR F?

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

Facebook’s “no-beta” culture seldom tolerates mistakes on the road to progress. T OR F?

A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

Facebook’s Beacon effort was a failure largely because it was “opt-out” instead of “opt-in.” T OR F?

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

_______ is considered to be the most persuasive and valuable method of promoting products and services.

A

WORD OF MOUTH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

Meta’s algorithms for liking like-minded users and finding what they may be interested in has:
Surfaced conspiracy theories and hate
Allowed for the spread of misinformation around COVID-19
Given way to fast-spreading conspiracy theories around elections
All of the above are true

A

All of the above are true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

Figures released by Meta showed its AI had a difficult time detecting ____

A

HATE SPEECH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

Near field communication refers to a short-range, wireless communication standard. T OR F?

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

The EU has fined Google over $13.4 billion since 2017, including $4.13 billion for using its Android mobile operating system to the detriment of any rivals. T OR F?

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

Generative AI is the biggest existential threat to Google’s search business that it has ever faced. T OR F?

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

The ‘T’ in ChatGPT stads for _________

A

TRANSFORMER

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

Ad networks enforce exclusivity. Once a content provider selects one ad network it cannot implement other forms of advertising on its website. T OR F?

A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

The base service of Google Analytics is offered free to websites of all sizes, with premium offerings and support available for a fee. T OR F?

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

The _______ refers to a situation where ads appear alongside text the advertiser would like to avoid.

A

CONTENT ADJACENCY PROBLEM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

Dynamic search ads:
Are generated automatically
Are based on the content of the website
Are useful for firms with rapidly changing inventory
All of the above are true

A

All of the above are true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

Which of the statements holds true for the term click-through rate?

A

IT REFERS TO THE NUMBER OF USERS WHO CLICKED AN AD DIVIDED BY THE NUMBER OF TIMES THE AD WAS DELIVERED.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

Which of the following is true for the cost-per-click?

A

IT REFERS TO THE MAXIMUM AMOUNT OF MONEY AN ADVERTISER IS WILLING TO PAY FOR EACH CLICK ON THEIR AD.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

Law firms are consistently the lowest cost-per-click rate bidders for keyword ads, but they run the most ads, making them significant contributors by volume. T OR F?

A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

JCPenney was one of Google’s largest advertisers, spending millions a month in ads, yet Google punished the firm in search rankings when it detected that Penney violated Google’s policies on gaming search engines. T OR F?

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

PageRank is an algorithm developed by Google co-founder Larry Page to rank websites. T OR F?

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

Google, who has a best-in-class AI team, was not prepared to compete with the capabilities of OpanAI’s ChatGPT. T OR F?

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

Google profits from advertising allow it to:

Experiment and innovate
Tolerate failure
Acquire aggressively  Patiently build new markets All of the above are true
A

All of the above are true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

Almost all security breaches can be tracked back to technology lapses; personnel or procedural factors rarely factor in. T OR F?

A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

The malware used to breach Target was described by one security expert as “absolutely unsophisticated and uninteresting.” T OR F?

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

The Equifax hack mainly impacted people from:

The US
Canada
The UK
All of the above are true
None of the above are true
A

All of the above are true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

Hackers might infiltrate computer systems to enlist hardware for subsequent illegal acts. T OR F?

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

The term ISO 27000 refers to a series of standards representing the set of best practices for implementing, maintaining, and improving organizational security. T OR F?

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

Data harvesters are cybercriminals who infiltrate systems and collect data for illegal resale. T OR F?

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

The MOVEit exploit is considered one of the costliest hacks of all time. T OR F?

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

A team working on organizational security should include representatives from general counsel, audit, public relations, and human resources, in addition to those from specialized security and broader technology and infrastructure functions. T OR F?

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

Online backup services are considered a poor choice for end-users since this only increases the likelihood that an individual’s data will be hacked. T OR F?

A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q

The Hydra dark web market, which at its peak did over $1 billion in annual business, is still active despite law enforcement efforts since 2022. T OR F?

A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

Cybercriminals who infiltrate systems and collect data for illegal resale are called ____

A

DATA HARVESTERS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
98
Q

A firm’s suppliers, buyers, or partners may also require a degree of certification. T OR F?

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
99
Q

Hordes of surreptitiously infiltrated computers, linked and controlled remotely, are known as zombie networks or _________

A

BOTNETS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
100
Q

System and Organization Controls (SOC) can involve certification by a third-party organization. T OR F?

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
101
Q

Dumpster diving refers to physically trawling through trash to mine any valuable data or insights that can be stolen or used in a security attack. T OR F?

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
102
Q

One of the reasons organizations delay patches to plug holes in their security applications is ________.

A

THE FEAR THAT HE NEW TECHNOLOGY CONTAINS A CHANGE THAT WILL CAUSE PROBLEMS DOWN THE ROAD.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
103
Q

Because of Moore’s Law, widely used encryption programs currency employed by banks and e-commerce sites are now easily penetrated by brute-force attacks that can be employed by hackers using just a handful of simple desktop computers. T OR F?

A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
104
Q

It’s bad when a firm’s e-mail and password files are stolen; however, the impact is minimized because user passwords set up for one system cannot be used in others. T OR F?

A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
105
Q

Systems that deny the entry or exit of specific IP addresses, products, Internet domains, and other communication restrictions are said to employ a(n) _____

A

BLACKLIST

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
106
Q

What type of tool enforces access privileges and helps verify that systems are not being accessed by unauthorized or suspicious ways?

A

ACCESS CONTROL TOOLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
107
Q

The term deepfake refers to sophisticated media created by AI that tempts to look or sound like a real person or event. T OR F?

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
108
Q

Cybersecurity experts have just recently started using artificial intelligence, and they are unsure of its promise. T OR F?

A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
109
Q

Computer criminals, state-sponsored infiltrators, corporate spies, and other malfeasants are often motivated by:
Account theft and illegal funds transfer
Terrorism
Surreptitiously hijacking hacked hardware for cryptocurrency mining
Cyberwarfare
Any of the above are true.

A

Any of the above are true.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
110
Q

Which of the following is an example of Russia’s use of cyberwarfare?

Taking out Ukaine’s Viasat satellite
Interrupting internet service across Europe
Causing outages in German wind turbine power grid  All of the above are true.
A

All of the above are true.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
111
Q

Which of the following types of infiltration techniques does one open up to by posting sensitive personal information and details about one’s workplace on social networking sites?

A

SOCIAL ENGINEERING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
112
Q

Which of the following are considered sources of information that can potentially be used by social engineers?

LinkedIn
Corporate directories
Social media posts
Contests or surveys
All of the above are true
A

All of the above are true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
113
Q

Some of the most common guidelines issued by websites when designing a secure password include which of the following?

A

THE PASSWORD SHOULD BE AT LEAST EIGHT CHARACTERS LONG AND INCLUDE AT LEAST ONE NUMBER AND OTHER NON ALPHABET CHARACTER

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
114
Q

Technologies that measure and analyze human body characteristics for identification or authentication are known as _____.

A

BIOMETRICS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
115
Q

The e-mail password of a senior employee in an organization was compromised by someone observing this user as the employee accessed his account. This is most likely a case of ________.

A

SHOULDER SURFING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
116
Q

Which of the following statements holds true for the term spoof?

A

IT REFERS TO E-MAIL TRANSMISSIONS AND PACKETS THAT HAVE BEEN ALTERED TO SEEM AS IF THEY CAME FROM ANOTHER SOURCE.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
117
Q

One of the major problems with the Heartbleed bug in OpenSSL software is that _______.

A

THE SOFTWARE WAS EMBEDDED IN MANY HARDWARE PRODUCTS THAT COULD NOT BE EASILY PATCHED WITH AUTOMATIC SOFTWARE UPDATES.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
118
Q

A common example of 2FA is _________ .

A

A PASSWORD, PLUS THE USE OF SEPARATE VERIFICATION CODE.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
119
Q

Which of the following is a potential drawback of using passkeys?

Passkey libraries are tied to your device or a specific vendor
Passkeys do not allow you to share passwords with others
Passkeys are not yet being implemented by all websites 
All of the above are true.
A

All of the above are true.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
120
Q

An alternative to terrestrial networks is Starlink. T OR F?

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
121
Q

China has complained to the United Nations that SpaceX’s Starlink is unfairly crowding other efforts in space. T OR F?

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
122
Q

The routing protocol that is in charge of forwarding packets on the Internet is known as voice over Internet protocol. T OR F?

A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
123
Q

Wall Street traders often choose a colocation facility with the goal of providing high-latency connectivity to their partners. T OR F?

A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
124
Q

Starlink does not use equipment in a fixed position above a spot. The satellites zoom in and out of range, passing signals to each other using _______.

A

LASERS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
125
Q

ISPs and IXPs that carry out peering are required by the FCC to charge each other fees based on their traffic contribution. T OR F?

A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
126
Q

The internet has no center, and no one owns it. T OR F?

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
127
Q

Computer programs making decisions without any human intervention conduct most US stock trading. T OR F?

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
128
Q

Circuit-switched networks provide a connection between two parties that ______.

A

IS DEDICATED FOR USE BY THE PARTIES FOR THE DURATION OF A CONNECTION.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
129
Q

A device gets its IP address from whichever organization is currently connecting it to the Internet. T OR F?

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
130
Q

______ repeatedly sends a cluster of three packets starting at the first router connected to a computer, then the next, and so on, building out the path that packets take to their destination.

A

TRACEROUTE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
131
Q

The US Federal Aviation Administration sought to delay some 5G C-band use near airports over aviation safety concerns and has proposed additional upgrades for aircraft to prevent possible interference. T OR F?

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
132
Q

“Cyber hygiene” refers to fairly straightforward precautions that should be taken for site safety. T OR F?

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
133
Q

A(n) _______ is a temporary storage space used to speed computing tasks.

A

CACHE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
134
Q

The fault-tolerant nature of the DNS ensures that _________.

A

THE SERVICE CONTINUES FUNCTIONING EVEN IF ONE NAMESERVER GOES DOWN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
135
Q

The exploit referred to as _________ allowed hackers to leverage vulnerability in DNS software to redirect users to sites they did not request.

A

CACHE POISONING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
136
Q

A firm that provides hardware and services to run websites of others is known as a(n) ________.

A

WEB HOSTING SERVICE.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
137
Q

Popular sites like Google and Yahoo! Have several computers assigned to their host names because _________ .

A

IT ENSURES THAT THE LOAD OF REQUESTS TO THEIR SITES DOES NOT OVERWHELM A SINGLE COMPUTER.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
138
Q

A __________ enables communication by defining the format of data and rules for exchange.

A

PROTOCOL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
139
Q

The most dominant standard for 4G technology worldwide is _____.

A

LTE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
140
Q

GeoTLDs are associated with geographical, geopolitical, ethnic, linguistic, or cultural community. T OR F?

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
141
Q

___________ technology is broadband technology that can use the wires of a local telephone network.

A

DIGITAL SUBSCRIBER LINE (DSL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
142
Q

Under IPv6, IP addresses are expressed as a string of four numbers between 0 and 255, separated by a period. T OR F?

A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
143
Q

The acronym HFT refers to __________.

A

HIGH FREQUENCY TRADING.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
144
Q

Unfortunately, IPv6 isn’t backward compatible with IPv4. T OR F?

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
145
Q

Peering refers to ________.

A

A SITUATION WHEN SEPARATE ISPS CONNECT THEIR NETWORKING EQUIPMENT TOGETHER TO SHARE TRAFFIC.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
146
Q

Which of the following applications is most likely to use UDP instead if TCP?

A

WEB-BASED PHONE CALLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
147
Q

One of the function of the IP is to ________.

A

ROUTE MESSAGE PACKETS TO THE FINAL DESTINATION.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
148
Q

Apple has imposed what it calls “Data Authorization Labels” on app developers, requiring them
to have easy-to-read, consistent, and clear notices on what data is collected and how it is used. T OR F?

A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
149
Q

Meta has been fined $400 million for collecting Facebook and Instagram data without explicit
consent. T OR F?

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
150
Q

SKAdNetwork shares conversion data with advertisers without revealing any user-level or
device-level data and is much easier to implement than old cookie schemes. T OR F?

A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
151
Q

Apple is now automatically removing link trackers from URLs sent via its email client and its text
messaging platform. T OR F?

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
152
Q

Due to the complexities of consumer data privacy policy, organizations should ___________ .

A

ASSEMBLE AN
INTERNAL TEAM THAT WILL MONITOR RELEVANT AND COMPLEX ISSUES RELATED TO
INFORMATION SYSTEMS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
153
Q

The five components of information systems needed to fully understand organizational privacy
policies include _________.

A

DATA, SOFTWARE, HARDWARE, PROCEDURES, PEOPLE.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
154
Q

How will Apple’s IDFA identifier impact advertising sales in the gaming industry?

A

IF GAMERS
DONT OPT-IN WHEN USING APPS, ADVERTISING NETWORKS WILL NOT HAVE
DETAILED PROFILES FOR GAME ADVERTISERS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
155
Q

A VPN is a service that creates a public connection across the private Internet, encrypting
transmission and making your Internet communication appear as if it is connected to the
organizations that provides VPN software. T OR F?

A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
156
Q

Identifying a user’s physical location for the purpose of delivering tailored ads or other content is
known as ________.

A

GEOTARGETING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
157
Q

Advertisers use ____________ to deliver targeted ads to your television based on
your profile.

A

DYNAMIC AD INSERTION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
158
Q

All devices that connect to the internet are identified by an assigned numeric value. The numeric
value is known as the _____

A

IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
159
Q

As an advertiser, you have acquired the services of Google to display your ads. You have set a
budget for the campaign, and Google will charge you when users click on your ad. This form of
online advertising is known as ______.

A

CPC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
160
Q

An ad that runs before a user arrives at his intended destination on a website or in an app is
known as _________.

A

AN INTERSTITIAL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
161
Q

Data that is collected by one form and shared with a partner organization is known as _______ .

A

SECOND
PARTY DATA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
162
Q

If Rent the Runway receives an invoice for 450,000 impressions, their sales quote was for ____
CPMs.

A

450

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
163
Q

Suppose you have a popular blog, and you want to leverage it to make extra money. Because
your web traffic is high, you have decided to add links to direct users to online storefronts. If the
user makes a purchase at the storefront, the seller has agreed to share a percentage of
revenue with you. This form of marketing is known as ____________ .

A

AFFLIATE PROGRAMS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
164
Q

Second-party data is data that is collected by one firm and shared with a partner organization. T OR F?

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
165
Q

Enhancing productivity, improving efficiency, and automating mundane tasks are benefits of AI. T OR F?

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
166
Q

Change management seeks to identify how workflows and processes are to be altered and how
to manage the worker and organizational transition from one system to another. T OF F?

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
167
Q

Potential risks and ethical implications of AI issues concerning job displacement, algorithmic
bias, and misuse for malicious purposes. T OR F?

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
168
Q

AI-related job displacement may create new employment opportunities and career pathways in
areas like AI development and data analysis. T OR F?

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
169
Q

What example of AI benefits is not mentioned in the text?

A

AI-ASSISTED VEHICLES
MAINTAINING HEALTHY BODY TEMPERATURE FOR PASSENGERS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
170
Q

Generative AI is predicted to have a significant impact on various job sectors, including
knowledge-based professions like analysis, accounting, legal, medical, software development,
and education. T OR F?

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
171
Q

Which of the following is not a potential issue related to AI’s risks and unknowns?

A

OVERRELIANCE ON AI FOR DECISION-MAKING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
172
Q

Which of the following is not mentioned as a potential challenge associated with leveraging AI
and machine learning?

A

OVERABUNDANCE OF AVAILABLE TRAINING DATA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
173
Q

How does the text characterize the future of AI?

A

TRANSFORMATION OF INDUSTRIES AND
CREATION OF NEW OPPORTUNITIES.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
174
Q

Despite the transformative abilities of GenAI, why is it still crucial for individuals to always fact
check results given by GenAI?
Generative AI tends to seemingly make things up, a process often referred to as
hallucination.
Since AI systems “learn” based on data, then any biases in data can become part of the
model, which can result in sexist and racist results.
Results may contain copyrighted material which could open firms up to legal penalties.
Sometimes results can give dangerous information, such as reported cases of
generating recipes that would be poisonous if eaten.
All of the above are correct

A

All of the above are correct

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
175
Q

Some concerns about GenAI include its tendency to provide incorrect answers and sometime
produce biased or harmful results. T RO F?

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
176
Q

The foundation model used to train LLMs like ChatGPT-3 is the same model used for end-user
interaction. T OR F?

A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
177
Q

Auditing technology and training data is unnecessary, especially if a firm trust its developers and
suppliers. T OR F?

A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
178
Q

In which scenario might machine learning be legally prohibited?

A

USING DEMOGRAPHIC DATA
FOR RISK PREDICTION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
179
Q

Why could banks using AI in their loan process potentially create unintended consequences?

A

SUCH SYSTEMS CAN INCREASE DISPARITIES BASED ON SOCIOECONOMIC
BACKGROUND, ETHNIC CATEGORY, OR EDUCATIONAL LEVEL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
180
Q

Organizations should incorporate new tools and best practices as they are developed, rather
than sticking to established methods. T OR F?

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
181
Q

Meta made its GenAI model, Llama, open source, stirring controversy in the tech industry. T OR F?

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
182
Q

Which statement about generative AI (GenAI) is not true?

A

GenAI ALWAYS PROVIDES
FACTUALLY ACCURATE ANSWERS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
183
Q

COBIT is an IT infrastructure library, which covers best practices for delivering IT service. T OR F?

A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
184
Q

Since 2018, technologists are required to have had significant training in technology ethics. T OR F?

A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
185
Q

Which of these is a challenge associated with training AI models?

A

INABILITY TO INTEGRATE
DATA SOURCES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
186
Q

How are parameters described in the text?

A

RELATIONSHIPS BETWEEN TEXT ELEMENTS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
187
Q

A large language model (LLM) is a type of __________ .

A

AI USED FOR GENERAL-PURPOSE LANGUAGE
UNDERSTANDING AND GENERATION.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
188
Q

What is the foundation model used to train ChatGPT-3?

A

GPT-3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
189
Q

Which step is not suggested for developing more ethical, less risk-prone systems?

A

IGNORING
EMPLOYEE FEEDBACK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
190
Q

What is the purpose of a “Red Team” in the context of AI development?

A

TESTING THE
SECURITY OF SYSTEMS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
191
Q

Logistics is the term that describes the extensive use of data, statistical, and quantitative
analysis, explanatory and predictive models, and fact-based management to drive decisions
and actions. T OR F?

A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
192
Q

Data obtained from outside sources, when combined with a firm’s proprietary internal data
assets, can give the firm a competitive edge. T OR F?

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
193
Q

Firms that base decisions on hunches are said to be gambling, not managing. T OR F?

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
194
Q

Random occurrences in data mining results can be detected by dividing the data and building a
model with one portion and using another portion to verify the results. T OR F?

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
195
Q

A ____________ is a system that provides rewards and usage incentives, typically in
exchange for a method that provides a more detailed tracking and recording of consumer
activity.

A

LOYALTY PROGRAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
196
Q

___________ refer to older information systems that are often incompatible with other
systems, technologies, and ways of conducting business.

A

LEGACY SYSTEMS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
197
Q

__________ refer to databases focused on addressing the concerns of a specific problem or
business unit.

A

DATA MARTS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
198
Q

___________ is a class of computer software that seeks to reproduce or mimic
human thought, decision-making, or brain functions.

A

ARTIFICIAL INTELLIGENCE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
199
Q

Which of the following is not considered an advantage of Hadoop?

A

RELATIONAL STRUCTURE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
200
Q

Data are raw facts that must be turned into information in order to be useful and valuable. T OR F?

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
201
Q

_____________ refers to the process of combining aspects of reporting, data
exploration and ad hoc queries, and sophisticated data modeling and analysis.

A

BUSINESS INTELLIGENCE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
202
Q

A data cube refers to a ______.

A

SPECIAL DATABASE USED TO STORE DATA IN OLAP REPORTING.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
203
Q

___________ is the process of using computers to identify hidden patterns in and to build
models from large data sets.

A

DATA MINING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
204
Q

Computer-driven investment models can be very effective when the market behaves as it has in
the past. However, in terms of historical consistency, they are vulnerable to failure in the face of:

A

BLACK SWANS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
205
Q

_________ refers to software for creating, maintaining, and manipulating data.

A

DBMS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
206
Q

The graphical representation of data and information is known as:

A

DATA VISUALIZATION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
207
Q

In database systems, a ______ refers to a list of data.

A

FILE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
208
Q

In database systems, a row is also known as a:

A

RECORD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
209
Q

In database systems, a ______ defines the data that a table can hold.

A

FIELD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
210
Q

Which of the following describes serverless computing?
a type of cloud computing
a third-party vendor manages servers, replication, and fault-tolerance
a third-party vendor manages computing scalability
a third-party vendor manages certain aspects of security
ALL OF THE ABOVE ARE CORRECT

A

ALL OF THE ABOVE ARE CORRECT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
211
Q

Most organizations do not opt for IT configurations that are purely in-house, packaged, or SaaS
models. T OR F?

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
212
Q

Linux is one of the most used operating systems in desktop computers, but it can be found only in a
tiny fraction of mobile phones, and consumer electronics. T OR F?

A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
213
Q

Linux is one of the most used operating systems in desktop computers, but it can be found only in a
tiny fraction of mobile phones, and consumer electronics. T OR F?

A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
214
Q

Many SaaS vendors have improved system customization options and integration with standard
software packages. T OR F?

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
215
Q

The marginal cost to produce an additional copy of a software product is effectively zero. T OR F?

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
216
Q

Some of the largest technology companies now support open source software initiatives. T OR F?

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
217
Q

With SaaS, firms get the most basic offerings but can also do the most customization, putting their
own tools (operating systems, databases, programming languages) on top. T OR F?

A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
218
Q

With the advent of cloud computing and SaaS, smaller firms no longer have access to the kinds of
sophisticated computing power they had access to in the past. T OR F?

A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
219
Q

Virtualization is unsuitable for use on desktop applications. T OR F?

A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
220
Q

Which of the following is not true about apps and the app economy?
App stores are “always open.”
Apps have been vital to the rise of several high-valued efforts, including Uber, Instagram, and
WhatsApp.
Apps developed for one platform typically cannot be used on another platform.
Apps have been criticized as creating consumer switching costs vs. browser-based
alternatives.
APP STORE ACCESS IS LIMITED TO INDUSTRIALIZED NATIONS WITH LARGE
SMARTPHONE USER POPULATIONS.

A

APP STORE ACCESS IS LIMITED TO INDUSTRIALIZED NATIONS WITH LARGE
SMARTPHONE USER POPULATIONS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
221
Q

A slang derogatory term for an uninformed or unskilled person is “greenie.” T OR F?

A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
222
Q

Oracle, a firm that sells commercial ERP and database products, provides Linux for free, selling
high-margin Linux support contracts for as much as five hundred thousand dollars. Oracle’s
motivation for this lies in ________________________ .

A

USING OPEN SOURCE SOFTWARE TO WEAN CUTOMERS AWAY FROM
COMPETITORS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
223
Q

Which of the following refers to a variant of utility computing where vendors provide the operating
system and supporting software like database management systems but where client firms write
their own code?

A

PLATFORM AS A SERVICE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
224
Q

Consumerization of corporate technology stifles employee creativity. T OR F?

A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
225
Q

Which of the following is one of the sources of revenue for open source vendors?

A

SELLING
SUPPORT AND CONSULTING SERVICES.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
226
Q

One important thing that managers should understand about SaaS is that _________________________.

A

MANY OF THESE
VENDORS WILL NOT LAST IN THE MARKET.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
227
Q

A server running ________________ can create smaller compartments in memory that
each behave as a separate computer with its own operating system and resources.

A

VIRTUALIZATION SOFTWARE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
228
Q

Which of the following is true of software as a service (SaaS)?

A

IT REFERS TO SOFTWARE THAT IS
MADE AVAILABLE BY THIRD PARTY ONLINE.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
229
Q

______________ allow(s) a server to run what amounts to a copy of a PC—OS, applications, and
all—and simply deliver an image of what’s executing to a PC or other connected device.

A

VIRTUAL DESKTOPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
230
Q

Vendors frequently sign _________________ with their customers to ensure a guaranteed
uptime and define their ability to meet demand spikes.

A

SERVICE LEVEL AGREEMENTS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
231
Q

Which of the following statements relating to open-source software is true?

A

THE FLAGSHIP OSS
PRODUCT IS THE LINUX OPERATING SYSTEM, NOW AVAILABLE ON ALL SCALES OF COMPUTING
DEVICES.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
232
Q

Cloud vendors that are hosting hardware, operating system, database, and other software, which
clients can then use to build their own applications, are said to be providing _________________________.

A

SOFTWARE AS A
SERVICE.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
233
Q

The LAMP stack of open-source products is used ________________________.

A

TO POWER MANY OF THE INTERNET’s MOST
POPULAR WEBSITES.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
234
Q

chnology products with particularly strong security features are said to be ______________________.

A

HARDENEND.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
235
Q

The scalability of a software product is defined as the ____________________________.

A

ABILITY TO BE EASILY EXPANDED TO
MANAGE WORKLOAD INCREASES.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
236
Q

___________ is a term used to describe unpredictable but highly impactful events.

A

BLACK SWANS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
237
Q

Vendors who use open source as part of their product offerings can expect to bring new products to
the market faster because __________________.

A

THEY CAN SKIP WHOLE SEGMENTS OF THE SOFTWARE DEVELOPMENT
PROCESS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
238
Q

Which of the following was considered a contributor to vulnerabilities in the OpenSSL security
product, known as the Heartbleed bug?

A

FEW DEVELOPERS WERE WORKING ON THE PROJECT, SO
THE IDEAL THAT “GIVEN ENOUGH EYEBALLS, ALL BUGSARE SHALLOW” WASN’T MET WITH
OPENSSL.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
239
Q

Which of the following is not one of the three major cloud-computing service models?

A

CAAS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
240
Q

Scrum defines functions or roles (for management and development, meetings, or ceremonies), and
how the process is documented and tracked or artifacts. T OR F?

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
241
Q

A scrum master represents the “voice of the customer,” advocates for the needs of the organization
helps in setting requirements, and is ultimately held accountable for deliverables. T OR F?

A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
242
Q

What are software development methodologies?

A

THODS TO DIVIDE TASKS RELATED TO
SOFTWARE CREATION AND DEPLOYMENT INTO TASKS TARGETED AT BUILDING BETTER
PRODUCTS WITH STRONGER PRODUCT MANAGEMENT GUIDELINES AND TECHNIQUES.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
243
Q

Operating systems are computer programs that have a set of precise instructions that tell computer
hardware what to do. T OR F?

A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
244
Q

As an IT leader in a fast-growing technology start-up, which software development methodology
would you implement to ensure your firm can make adjustments when necessary?

A

AGILE

245
Q

Which of the following is an example of computer hardware?

A

A VIDEO GAME CONSOLE

246
Q

Expedia used APIs to increase the distribution of travel products that it sells, relying on partners to
plug into its technology and inventory. T OR F?

A

TRUE

247
Q

VW’s first large-scale foray into the EV market was the ______.

A

iD3

248
Q

Android is a software product developed by Google that allows cell phone manufacturers to control
hardware and establishes standards for developing and executing applications on its platform.
Android is thus an example of a(n):

A

OPERATING SYSTEM

249
Q

A PC, laptop, or any other small computer can be set up to run server software. T OR F?

A

TRUE

250
Q

EVs software requires at least ten times as much ____ as cars with regular combustion engines.

A

CODE

251
Q

Firmware refers to ___________.

A

CONTROL SOFTWARE STORED ON NONVOLATILE MEMORY CHIPS.

252
Q

Which of the following is an operating system?

A

LINUX

253
Q

In recent years, there has been a noticeable decline in LCNC environments. T RO F?

A

FALSE

254
Q

ERP systems and enterprise software programs should be ideally configured to use different
database systems to avoid the possibility of data redundancy. T OR F?

A

FALSE

255
Q

Standardizing business processes in software that others can buy means that those functions are
difficult for competitors to match. T OR F?

A

FALSE

256
Q

A(n) _________________ is an application that includes an editor, a
debugger, and a compiler, among other tools.

A

INTEGRATED DEVELOPMENT ENVIRONMENT

257
Q

Enterprise resource planning software has proven popular in part because the standardization these
products impose makes them exceptionally easy to deploy. T OR F?

A

FALSE

258
Q

____ is a set of standards for exchanging messages containing formatted data between computer
applications.

A

EDI

259
Q

What is the most common function performed by electronic data interchanges?

A

SENDING
ELECTRONIC EQUIVALENTS OF STRUCTURED DOCUMENTS BETWEEN DIFFERENT
ORGANIZATIONS.

260
Q

Which of the following is true of scripting languages?

A

THEY ARE OFTEN DESIGNED TO BE
INTERPRETED WITHIN THEIR APPLICATIONS.

261
Q

Java is not optimized to take advantage of interface elements specific to the Mac or Windows
operating systems. As a result _____________.

A

JAVA IS UNSUITABLE FOR DESKTOP APPLICATIONS.

262
Q

____________ refers to a software package that integrates the many
functions of a business, such as accounting, finance, inventory management, and human resources.

A

ENTERPRISE RESOURCE PLANNING

263
Q

Rent the Runway rentals are often only 25 percent of dress’s retail price. T OR F?

A

FALSE

264
Q

Project Entrepreneur, created by Facebook, aims to help female entrepreneurs build high-growth,
high-impact businesses. T OR F?

A

FALSE

265
Q

Rent the Runway’s mobile app provides over 40 percent of firm traffic. T OR F?

A

TRUE

266
Q

Customers who are on the fence about a choice can choose a second style as a backup for an
additional fee. T OR F?

A

TRUE

267
Q

Vague terms that mean something to humans but not conventional search will not be able to be
used by custom Rent the Runway AI models built on the firm’s massive, proprietary data. T OR F?

A

FALSE

268
Q

Which of the following is not true about mobile app development?

A

MOBILE APPS ARE CONSIDERED
FAR EASIER TO DEVELOP THAN WEBSITES. MOST MANAGERS CAN CREATE ROBUST APPS
USING DRAG-AND-DROP TOOLS.

269
Q

At Rent the Runway, customers arriving at the site via ________media have a much higher conversion
rate than customers arriving via ____ media.

A

EARNED; PAID

270
Q

Time magazine has called Rent the Runway one of the country’s 25 Best Websites. T OR F?

A

FALSE

271
Q

Nuuly still far exceeds Rent the Runway in social media followers and other metrics, indicating brand
reach, awareness and exposure. T OR F?

A

FALSE

272
Q

Rent the Runway has embedded RFID tags in 1.5 million items, tracking garments throughout the
distribution center journey. T OR F?

A

TRUE

273
Q

Rent the Runway is suing Urban Outfitters, claiming the firm stole RTR trade secrets when developing
the Nuuly service. T OR F?

A

FALSE

274
Q

While some fast-growing startup companies experience crises as they negotiate large-scale
logistics, Rent the Runway’s business model has thus far allowed it to avoid mistakes. T OR F?

A

FALSE

275
Q

AI is hindering customer service by depersonalizing interactions through chatbots and virtual
assistants.T OR F?

A

FALSE

276
Q

Firms need to be aware of when an AI’s “knowledge” might end. T OR F?

A

TRUE

277
Q

What are “naked algorithms” in the context of AI?

A

STARTING POINT ALGORITHMS IN THE PUBLIC
DOMAIN OR ACCESSIBLE FROM CLOUD PROVIDER SERVICES.

278
Q

Tesco is the planet’s largest retailer. T OR F?

A

FALSE

279
Q

Data warehouses are composed entirely of proprietary corporate data, while data marts take
advantage of data purchased from third-party firms. T OR F?

A

FALSE

280
Q

Turning data into usable information is hindered by transactional databases set up to be
simultaneously accessed for reporting and analysis. T OR F?

A

FALSE

281
Q

Legacy systems are popular among large firms because they have a large storage capacity and are
designed to share data. T OR F?

A

FALSE

282
Q

Dynamic pricing is considered especially tricky in situations where consumers make repeated
purchases and are more likely to remember past prices, and when they have alternative choices. T OR F?

A

TRUE

283
Q

Most transactional databases are not set up to be simultaneously accessed for reporting and
analysis. As a consequence __________________.

A

DATA IS NOT EFFICIENTLY TRANSFORMED INTO INFORMATION.

284
Q

__________ put(s) users in control so that they can create custom reports on an
as-needed basis by selecting fields, ranges, summary conditions, and other parameters.

A

AD HOC REPORTING TOOLS

285
Q

Which of the following conditions is essential for data mining to work?

A

THE EVENTS IN THE DATA
SHOULD REFLECT CURRENT AND FUTURE TRENDS.

286
Q

_______ is the term used to describe raw facts and figures.

A

DATA

287
Q

Firms adopting OSS may be at risk if they distribute code and aren’t aware of the licensing
implications. T OR F?

A

TRUE

288
Q

App developers often lament the ____________ created within apps where data is more tightly
controlled by a service provider and where firms must comply to the usage policies of the platform
provided.

A

WALLED GARDEN

289
Q

Many firms manage Docker and other container environments within an existing software layer, with
Kubernetes being the largest player in this space. T OR F?

A

TRUE

290
Q

Cloud computing refers to _________________________.

A

REPLACING COMPUTING RESOURCES WITH SERVICES PROVIDED OVER
THE INTERNET.

291
Q

Ensuring that organizations follow requirements for data protection and security is known as ____________.

A

DATA
COMPLIANCE.

292
Q

European regulators have become much more aggressive in fining organizations that ignore the
region’s privacy protections but failed to fine Meta for collecting Facebook and Instagram data
without explicit consent. T OR F?

A

FALSE

293
Q

Apple’s IDFA identifier is a unique snippet of random text used by developers to _____________.

A

TRACK CONSUMER
BEHAVIORS ON IOS DEVICES.

294
Q

Grouping together additional data collected from traditional browsing history in order to identify
users is known as which of the following?

A

FINGERPRINTING

295
Q

The use of installed viruses, malware, or other vulnerabilities to copy the behaviors of humans by
visiting websites associated with specific ads is known as ____________.

A

CLICK FRAUD.

296
Q

Routers don’t have perfect, end-to-end information on all points in the Internet. T OR F?

A

TRUE

297
Q

How many people world-wide are not yet online?

A

3 BILLION

298
Q

TCP and IP operate above http and the other application transfer protocols. T OR F?

A

FALSE

299
Q

Circuit-switched networks are advantageous because they offer an inexhaustible supply of
bandwidth for telecommunications. T OR F?

A

FALSE

300
Q

In the URL, the host name is the name of the network a user tries to connect to. T OR F?

A

FALSE

301
Q

Internet networks are ________.

A

PACKET-SWITCHED NETWORKS.

302
Q

Changing the letter case when typing in host and domain names does not affect the user’s ability to
reach the destination. T OR F?

A

TRUE

303
Q

_____________ involves allowing voice packets to gain delivery importance over packets
for applications like e-mail.

A

PACKET PRIORITIZATION

304
Q

Many fear that innovation might suffer as a result of the transition of internet services from flat-rate
pricing to metered usage. T OR F?

A

TRUE

305
Q

One of the factors that accelerated the development of the Internet during the 1990s was _______________.

A

THE INVENTION OF GRAPHICAL WEB BROWSING.

306
Q

Which of the following statements is true of the term “FTTH”?

A

IT REFERS TO BROADBAND SERVICE
PROVIDED VIA LIGHT-TRANSMITTING FIBER-OPTIC CABLES.

307
Q

The frequencies licensed by telecommunication firms to provide wireless service is known as
_____________.

A

WIRELESS SPECTRUM

308
Q

The fastest last-mile technology is:

A

FTTH

309
Q

What is an example of cybersquatting?

A

ACQUIRING A DOMAIN NAME TO EXTORT A FIRM,
INDIVIDUAL, PRODUCT, OR TRADEMARK HOLDER.

310
Q

Supporters of net neutrality believe that
It will improve innovation
It will keep costs low
It will level the playing field among competitive services offered over the Internet.
ALL OF THE ABOVE ARE TRUE
None of the above are true

A

ALL OF THE ABOVE ARE TRUE

311
Q

Which of the following is the domain name for the website
http://www.nytimes.com/tech/index.html?

A

NYTIMES

312
Q

Regularly updated software lowers a system’s vulnerable attack surface. T OR F?

A

TRUE

313
Q

A black hat hacker looks for weaknesses in security mechanisms, with a view to help plug the holes
that might be exploited by cyber-criminals. T OR F?

A

FALSE

314
Q

Multiple administrators jointly controlling key systems are an unnecessary burden that adds to the
complexity of managing security in an organization. T OR F?

A

FALSE

315
Q

The information systems of several firms have been compromised by insiders that can include
contract employees, cleaning staff, and temporary staffers. T OR F?

A

TRUE

316
Q

Defensive security professionals responsible for maintaining internal network defenses against all
cyberattacks and threats are known as the blue team. T OR F?

A

TRUE

317
Q

Which of the followings aspects of international law would enable a cyber-criminal operating across
borders to evade prosecution?

A

NON-EXISTENT EXTRADITION AGREEMENTS BETWEEN TWO
COUNTRIES.

318
Q

A research scientist with a major pharmaceutical firm in New Jersey is caught passing on sensitive
information, worth millions of dollars, regarding the composition and test results of his firm’s latest
drug to a rival company. What crime is he being held responsible for?

A

CORPORATE ESPIONAGE

319
Q

Information security policies would be ineffective without ______ and ___________.

A

AUDIT; ENFORCEMENT

320
Q

In public-key encryption systems, the functions of the public and private keys are interchangeable. T OR F?

A

FALSE

321
Q

In security circles the phrase “compliance” refers to ____________.

A

LEGAL OR PROFESSIONALLY BINDING STEPS
THAT AN ORGANIZATION MUST TAKE.

322
Q

A system that monitors network use for potential hacking attempts and takes preventative action to
block, isolate, or identify attempted infiltration, and raise further alarms to warn security personnel is
known as a(n):

A

INTRUSION DETECTION SYSTEM.

323
Q

Which of these would be an example of a DDoS attack?

A

OVERLOADING A POPULAR SOCIAL
NETWORKING SITE WITH INBOUND MESSAGES TO SHUT DOWN ACCESS TO THE SITE.

324
Q

While many unsophisticated phishing scams can be easily identified by poor grammar and other
suspiciously worded text, scammers are now using generative AI to craft more sophisticated
phishing emails. T OR F?

A

TRUE

325
Q

_________ can be either software-based or deployed via hardware, such as a recording “dongle”
that is plugged in between a keyboard and a PC.

A

KEYLOGGERS

326
Q

Google matched ChatGPT, launching its own chat-like generative AI tool named Bard. T OR F?

A

TRUE

327
Q

After stalling for several years, Microsoft’s market cap has steadily marched higher, passing
Alphabet’s value along the way. T OR F?

A

TRUE

328
Q

Google’s Search Generative Experience (SGE) is the firm’s first experiment in blending AI chat with:

A

TRADITIONAL SEARCH RESULTS.

329
Q

Which of the following represents the market capitalization of a firm?

A

SHARE PRICE X NUMBER OF
SHARES

330
Q

Google mainly only runs ads in search but limits them across their host of Google-owned sites. T OR F?

A

FALSE

331
Q

The bulk of Google’s revenue comes from:

A

ADVERTISING

332
Q

Google ads can be targeted based on keywords automatically detected inside the content of a
website. T OR F?

A

TRUE

333
Q

Which of the following efforts by Google is aimed at encouraging increased smartphone access
worldwide?

A

GIVING THE ANDROID OS TO MOBILE PHONE MANUFACTURERS FOR FREE.

334
Q

Which of the following measures can advertisers take to prevent embarrassment through content
adjacency issues?

A

USING NEGATIVE KEYWORDS

335
Q

What a person sees when they encounter an ad is known as the:

A

AD CREATIVE.

336
Q

Which of the following parameters significantly influences the rank of a Web page in Google’s search
results?

A

THE NUMBER OF OTHER PAGES LINKING TO GIVEN PAGE

337
Q

A(n) _______ is a search performed on Google or any other search engine.

A

QUERY

338
Q

If a firm’s pages are not near the top of query results, customers may never discover its website. This
has led to _______________ becoming a critical function for many marketing
organizations.

A

SEARCH ENGINE OPTIMIZATION

339
Q

Which of the following statements holds true for the term deep Web?

A

IT REFERS TO INTERNET
CONTENT THAT CAN’T BE INDEXED BY GOOGLE AND OTHER SEARCH ENGINES.

340
Q

What is a “black hat SEO”?

A

USING UNAUTHORIZED (AND GOOGLE-PROHIBITED) TECHNIQUES TO
IMPROVE A PAGE’S SEARCH RESULTS.

341
Q

Third-party data is collected by a company that has had the customer explicitly enter a relationship
with them. T OR F?

A

FALSE

342
Q

Each time an ad is shown to a user is known as a(n):

A

IMPRESSION

343
Q

Suppose you regularly leave your phone in the car when you arrive at work. You need to have you
phone because it serves as the authentication device for your desktop’s multi-factor login. To avoid
going back to the car daily, you set an alert that reminds you to put the phone in your bag when you
are within one mile of your office. Setting this perimeter is known as:

A

GEOFENCING

344
Q

A Privacy Sandbox that could accurately separate a user from a user-impersonating bot could
significantly decrease online ad fraud. T OR F?

A

TRUE

345
Q

App stores are exclusively focused on smart-phone markets.T OR F?

A

FALSE

346
Q

While large groups of individuals work on key OSS projects, such as the Linux operating system,
some widely used efforts have had fewer developers, creating concerns over quality and security. T OR F?

A

TRUE

347
Q

Which of the following sets of software represents the constituents of the LAMP stack?

A

LINUX,
APACHE, MYSQL, PERL

348
Q

Installing a complex set of an organization’s legacy systems on someone else’s hardware can be a
brutal challenge. For that reason, we can expect most cloud computing efforts to focus on ____________________.

A

NEW
SOFTWARE DEVELPMENT PROJECTS.

349
Q

Products and services designed to target a specific industry are known as:

A

VERTICAL NICHES

350
Q

The term “software” is used to refer to:

A

the set of instructions that tells hardware what to do.

351
Q

_____ is the term used to represent the physical components of information technology.

A

Computer hardware

352
Q

A(n) _____ is software that controls computer hardware and establishes standards for developing and executing applications.

A

operating system

353
Q

Even specialty devices like video game consoles, television set-top boxes, Kindles and smart appliances run some form of OS. T OR F?

A

TRUE

354
Q

User interface refers to:

A

the mechanism through which users interact with a computing device.

355
Q

Operating systems are designed to give programmers a common set of commands to consistently interact with the hardware. These commands make a programmer’s job easier by:

A

making it faster to write software while minimizing the possibility of errors in code.

356
Q

Firmware is used to refer to:

A

a device’s control programs stored on nonvolatile memory chips.

357
Q

The Nest thermostat or app-controlled lighting and door locks are products referred to as _______________.

A

the Internet of Things

358
Q

Embedded systems are special purpose software designed and included inside physical products. T OR F?

A

TRUE

359
Q

Products and services that allow for the development and integration of software products and other complementary goods are known as _____.

A

platforms

360
Q

_____ refer(s) to applications that address the needs of multiple, simultaneous users in an organization or work group.

A

Enterprise software

361
Q

Many firms with similar procedures for accounting, finance, and human resource functions might buy a software package rather than develop their own code. This is usually considered fine since these functions are often not strategic. T OR F?

A

TRUE

362
Q

_____ systems help a firm manage aspects of its value chain, from the flow of raw materials into the firm through delivery of finished products, and services at the point-of-consumption.

A

Supply chain management

363
Q

Which of the following statements is true regarding enterprise systems?

A

For many firms, installing and deploying enterprise systems have been difficult, with some firms experiencing loss or even bankruptcy from botched efforts.

364
Q

Most enterprise software works in conjunction with a _______________, which stores and retrieves the data that an application creates and uses.

A

database management system (DBMS)

365
Q

Packaged enterprise systems can:

ease the linking of systems with software
make data more usable
streamline processes
all of the above

A

all of the above

366
Q

_____ is a form of computing where systems in different locations communicate and collaborate to complete a task.

A

Distributed computing

367
Q

A(n) _____ is software that houses and serves business logic for use by distributed systems.

A

application server

368
Q

The terms web services and APIs are often used interchangeably, and refer to code and request/response standards used by this code so that other programs can call these services to perform a task. T OR F?

A

TRUE

369
Q

Firms that invite other organizations to integrate with their systems via web services and APIs are often thought of as turning their products into ____________.

A

PLATFORMS

370
Q

Organizations that have created a robust set of Web services around their processes and procedures are said to have a(n) _____.

A

service-oriented architecture

371
Q

Which of the following is not true about potential benefits to firms that create platforms?

They can widen the reach of firms and products
The potential to make their products and services more useful
All of the above are true
They can create switching costs
They can enhance network effects

A

All of the above are true

372
Q

_____ is a set of standards for exchanging messages containing formatted data between computer applications.

A

Electronic data interchange

373
Q

EDI is a very old standard. The two main technologies replacing EDI are extensible markup language (XML), and JavaScript Object Notation (JSON). T OR F?

A

TRUE

374
Q

Most of the time, server hardware resides on server-class software. T OR F?

A

FALSE

375
Q

Rails, Django, AngularJS, and ASP.NET are examples of ____________.

A

programming frameworks

376
Q

A(n) _____ is an application for programmers, which includes a text editor, a debugger for sleuthing out errors, and other useful programming tools.

A

integrated development environment

377
Q

Java code that runs through the JVM interpreter is slower than the code compiled for the native operating system and processor that make up a platform. T OR F?

A

TRUE

378
Q

True platform independence can be defined as:

A

the ability for developers to write code that can be run everywhere.

379
Q

Programs written using _____ can be interpreted within their applications, rather than compiled to run directly by a microprocessor.

A

scripting languages

380
Q

An open source extension for Python programming language that can run on over 300 devices, _____ was developed by the hardware company Adafruit.

A

CircuitPython

381
Q

_______________ are methods to divide tasks related to software creation and deployment up into tasks targeted at building better products.

A

Software development methodologies

382
Q

Which of the following has become a dominant software development methodology?

A

Agile development

383
Q

Feature creep can be defined as:

A

an expansion of the scope of a project.

384
Q

You will often hear scrum described as having roles, artifacts, and blueprints. T OR F?

A

FALSE

385
Q

A task board is an example of a(n) ________, while a daily scrum is an example of a(n) _________.

A

artifact; ceremony

386
Q

An organization is said to be _____ if its systems operate within required legal constraints, and industry and organizational obligations.

A

compliant

387
Q

The costs associated with the design, development, testing, implementation, documentation, training and maintenance of a software system are collectively referred to as:

A

total cost of ownership.

388
Q

A process-improvement approach that can assist in assessing the maturity, quality, and development of certain organizational business processes, and suggest steps for their improvement is known as:

A

capability maturity model integration.

389
Q

While the Health.gov failure was large and public, it was by no means an anomaly. Research firm the Standish Group estimates that in the past ten years, some ____ percent of large federal information technology projects were unsuccessful.

A

94

390
Q

The largest car manufacturer in the world, _____, saw “beating Tesla” as their goal in the electric vehicle (EV) market.

A

Volkswagen

391
Q

Manufacturing (an) electric vehicle/s requires ____ compared to (a) vehicle/s with a standard combustion engine.

A

10 times as much code

392
Q

Volkswagen iD3 received the following criticism when it appeared on the market:

A

inconsistent charging software

393
Q

The fixed cost to produce a software product is effectively zero. T OR F?

A

FALSE

394
Q

_____ refers to replacing computing resources, which could include hardware or software, with services provided over the Internet.

A

Cloud computing

395
Q

Which software allows a single computer to function as if it were several different computers?

A

Virtualization software

396
Q

______________ offerings—free alternatives where anyone can look at and potentially modify a program’s code.

A

Open source software

397
Q

Which of the following is considered to be the flagship open source software product?

SAP ERP
Google Docs
Linux
Adobe Flash
Windows Media Player

A

Linux

398
Q

What are the open source software stacks used to build Web applications?

A

LAMP, MEAN

399
Q

In the context of open source software, the term “hardened” is used to describe:

A

technology products with particularly strong security features.

400
Q

_____ is the ability to either handle increasing workloads or to be easily expanded to manage workload increases.

A

Scalability

401
Q

In contrast to other major platforms, there has never been a major open source software security vulnerability. T OR F?

A

FALSE

402
Q

Those looking to share open source projects, contribute to these projects, or examine the code of projects (a great way to learn) should visit the site ___________.

A

GitHub

403
Q

Which of the following is an open source customer relationship management software?

Cassandra
Zimbra
OpenSolaris
SugarCRM
HBase

A

SugarCRM

404
Q

Which of the following is an open source e-mail software that competes with Outlook server?

Gimp
MongoDB
Magento
Zimbra
Alfresco

A

Zimbra

405
Q

Oracle, a firm that sells commercial ERP and database products, provides Linux for free, selling high-margin Linux support contracts for as much as $500,000. This is an example of:

A

firms using OSS to wean customers away from competitors.

406
Q

Total cost of ownership is all the cost associated with the design, development, testing, implementation documentation, training and maintenance of a software system. T OR F?

A

TRUE

407
Q

_____ is a form of cloud computing where a firm subscribes to a third-party software-replacing service that is delivered online.

A

Software as a service

408
Q

With _______, firms get the most basic offerings but can also do the most customization, putting their own tools (operating systems, databases, programming languages) on top.

A

IaaS

409
Q

With platform as a service (PaaS), the vendor supplies the support software and operating system, but the client ____________.

A

writes their own code.

410
Q

Which of the following is true about SaaS?

A

Its associated costs are treated as variable operating expenses rather than fixed capital expenses.

411
Q

The ____ between the customer and the vendor usually specify the levels of availability, serviceability, performance, operation, or other commitment requirements.

A

service level agreements

412
Q

Products and services designed to target a specific industry are known as horizontal niches. T OR F?

A

FALSE

413
Q

The major concern regarding software as a service involves:

A

the high dependence a firm develops with its SaaS vendor.

414
Q

Which of the following observations regarding software as a service is true?

A

Radical changes in a SaaS system’s functionality might result in unforeseen training costs.

415
Q

SaaS means a greater consumerization of technology, which is rarely, if ever, works out well for firms. T OR F?

A

FALSE

416
Q

_____ is a scalability solution that is usually provided as an overflow service, kicking in as needed.

A

Cloudbursting

417
Q

_____ are unpredicted but highly impactful/spiking events.

A

Black swans

418
Q

When complex legacy systems have to be ported,

A

companies may find it difficult or impossible to move to cloud computing

419
Q

_____ are massive networks of computer installations running software to coordinate their collective use.

A

Server farms

420
Q

The high customer costs of cloud computing raise the barriers to entry for startup technology firms seeking cloud services. T OR F?

A

FALSE

421
Q

The competition among cloud providers saw _____ a big winner when its product sales exploded, and _____ a big loser when its capital spending on server farms drastically increased.

A

Nvidia, Microsoft

422
Q

A server running _____ software can create smaller compartments in memory that each behave as a separate computer with its own operating system and resources.

A

virtualization

423
Q

Virtualization offers firms many advantages, but one disadvantage is that it requires firms to buy more server computers than if organizations had not deployed virtualization. T OR F?

A

FALSE

424
Q

________________ are a type of virtualization that allows for shared operating systems, more resource savings and faster execution.

A

Containers

425
Q

When a firm runs an instance of a PC’s software on another machine and simply delivers the image of what’s executing to the remote device, it is said to be operating on a(n) _____.

A

virtual desktop

426
Q

iBeacon is:

A

a technology that apps can use to determine a user’s location.

427
Q

Which of the following is not considered advantages of apps over packaged software and browser-based alternatives?

A

Most app stores provide localization efforts, translating content uploaded by developers into language systems offered in local app stores throughout the world.

428
Q

App platforms lower the switching costs of software developers when compared to costs associated with developing browser-based alternatives. T OR F?

A

FALSE

429
Q

Most firms will opt for an IT configuration that is 100 percent in-house, packaged, or SaaS. T OR F?

A

FALSE

430
Q

Which of the following is usually not an option for firms relying on unique processes, procedures, or technologies that create vital, differentiating competitive advantage?

A

Purchasing package software from a vendor to automate such efforts

431
Q

Changing pricing based on demand conditions is known as:

A

DYNAMIC PRICING

432
Q

Disney rolled out dynamic pricing with great success for:

A

The Lion King

433
Q

RFID technology is often used to ______________.

A

identify products as they move through an organization’s value chain

434
Q

_____ is a term describing the extensive use of data, statistical and quantitative analysis, explanatory and predictive models, and fact-based management to drive decisions and actions.

A

Analytics

435
Q

___________________ refers to a type of artificial intelligence that leverages massive amounts of data so that computers can improve the accuracy of actions and predictions on their own without additional programming.

A

Machine learning

436
Q

_____ is a catchall term combining aspects of reporting, data exploration, and ad hoc queries, and sophisticated data modeling and analysis.

A

Business intelligence

437
Q

Beacons technology works by using ___________ technology.

A

Bluetooth low-energy

438
Q

Dynamic pricing is considered especially appropriate for retailers, such as grocery stores or department stores. T OR F?

A

FALSE

439
Q

____ is insight gained from experience and expertise.

A

Knowledge

440
Q

A _____ is either a single table or a collection of related tables.

A

database

441
Q

The phrases table, column, and row are also referred to by the names ___________ respectively.

A

file, field, record

442
Q

Which of the following is by far the most common standard for expressing databases?

A

Relational databases

443
Q

NoSQL technologies are often used with massive, disparately structured data. T OR F?

A

TRUE

444
Q

A system that records business-related exchanges, such as a cash register sale, ATM withdrawal, or product return is known as a(n) _____.

A

transaction processing system

445
Q

_____ are systems that provide rewards and usage incentives, typically in exchange for a method that provides a more detailed tracking and recording of customer activity.

A

Loyalty programs

446
Q

_____ systems are often used to empower employees to track and record data at nearly every point of customer contact.

A

Customer relationship management

447
Q

Firms may turn to third parties and outside services to acquire data for predictive models. T OR F?

A

TRUE

448
Q

_____ are firms that collect and resell data.

A

Data aggregators

449
Q

Which of the following is a true statement regarding the Starbucks Rewards program?

A

The app allows customers to scan purchases made outside the store.

450
Q

The problem of incompatible legacy systems limiting firms’ ability to turn data into information is compounded by:

A

mergers and acquisitions.

451
Q

Which of the following can be a major roadblock to turning data into information, and inhibits firm agility, holding back operational and strategic initiatives?

A

Legacy systems

452
Q

A problem limiting the turning of data into information is that most transactional databases are not set up to be:

A

simultaneously accessed for reporting and analysis.

453
Q

A set of databases designed to support decision making in an organization is known as a(n):

A

data warehouse

454
Q

A(n) _____ is a database or databases focused on addressing the concerns of a specific problem.

A

data mart

455
Q

Data quantity answers the question: How much data do we need? T OR F?

A

TRUE

456
Q

Setting up new collection efforts, surveys, or systems to obtain the data is called ________.

A

data sourcing

457
Q

Roughly 80 percent of corporate data is messy and unstructured, and stored in conventional, relational formats.T OR F?

A

FALSE

458
Q

The three “Vs” of Big Data refer to the names of the three leading commercial and open source technologies used in most of these efforts. T OR F?

A

FALSE

459
Q

______ is a set of mostly open source tools to manage massive amounts of unstructured data for storage, extraction, and computation.

A

Hadoop

460
Q

The _______ breed of cloud-based data tools is specifically designed to gather data from disparate sources and turn them into standard formats that can be interrogated by managers.

A

Snowflake

461
Q

Systems that can absorb any type of data, structured or not, from any type of source are often referred to as:

A

schema-less.

462
Q

_____ refers to identifying and retrieving relevant electronic information to support litigation efforts.

A

E-discovery

463
Q

Data used in online analytical processing (OLAP) reporting are stored in _____.

A

data cubes

464
Q

_____ refers to a method of querying and reporting that takes data from standard relational databases, calculates and summarizes the data, and then stores the data in a special database.

A

Online analytical processing

465
Q

The process of taking data from a variety of data sources, not uniformly organized, and transforming the data to a common format is known as:

A

extract, transform, load

466
Q

L.L. Bean’s rollout of Big Data efforts for improved customer service involved all of the following except:

None of the above are incorrect—the effort leveraged all of the above.
Training technical staff
Training marketing staff
On-premises technology was moved to Google’s Data Cloud
Reporting tools were made available to nontechnical staff

A

None of the above are incorrect—the effort leveraged all of the above.

467
Q

An integrated shopping experience and unified customer view across channels is sometimes referred to as _______________.

A

omnichannel

468
Q

Collaborative filtering is determining which customers are likely to leave, and what tactics can help the firm avoid unwanted defections. T OR F?

A

FALSE

469
Q

For ____________ to work, the organization must have clean, consistent data; and the events in that data should reflect current and future trends.

A

data mining

470
Q

One federal study showed Black and Asian people were about three times more likely than white people to be misidentified by facial recognition. T OR F?

A

FALSE

471
Q

The Walmart efficiency dance starts with a proprietary system called _________, a system originally developed in 1991 and continually refined ever since.

A

Retail Link

472
Q

Walmart uses Hadoop to sift through social media posts about the firm. T OR F?

A

TRUE

473
Q

Walmart stopped sharing its data assets with information brokers like ACNielsen and Information Resources because:

A

due to Walmart’s huge scale, the agencies offered no extra value with their additional data.

474
Q

Walmart is focused on expansion in _____, where it has invested over $19.5 billion in “Flipkart.”

A

INDIA

475
Q

Which of these are identified in the text as a positive, and a negative, of AI?

A

automation of mundane tasks; job displacement

476
Q

Using prompts, ______ learns the data, and generates output (typically some type of media) based on the information gathered from the prompts.

A

generative AI

477
Q

What is the difference between GPT and ChatGPT?

A

ChatGPT is the chatbot; GPT generates the results.

478
Q

Artificial intelligence doesn’t use ______ but uses computer software to improve products and functions.

A

human intelligence

479
Q

LLM stands for _____ model.

A

large language

480
Q

The first step of creating an LLM is:

A

build a foundation model

481
Q

The data used to train the model in AI before it’s used is:

A

corpus

482
Q

Anthropic uses constitutional AI to build what it considers:

A

a more ethical AI

483
Q

Google researchers invented ______ which allows AI to produce faster results, processing large amounts of data in parallel.

A

the Transformer

484
Q

Goldman Sachs, a financial firm, has predicted that AI could replace up to 44% percent of work done in the _____ field.

A

legal

485
Q

Which of these is not one of the fields that will be impacted in a major way by AI?

A

Construction

486
Q

Since AI is developing so rapidly, one concern is _____, where the AI engine is deliberately fed incorrect data so incorrect results are generated.

A

data poisoning

487
Q

Many AI companies are facing _____ over how they are training their AI engines.

A

copyright lawsuits

488
Q

The very beginnings of AI, the foundation models that have to be trained, are the:

A

naked algorithms

489
Q

Many AI implementations force radical change to the way a firm conducts business, and the way teams operate; how the organization handles this is:

A

change management

490
Q

Due to the complexities of human nature, it’s understandable that AI systems might show _____ that their development teams don’t even realize they have.

A

biases

491
Q

Firms can take a number of steps to set their AI engines up for success, including hiring diversely, adding ethicists to the team, and creating

A

a system review board.

492
Q

The Echo Nest, an automated music geek, was purchased in 2014 by _____ to help the company create a playlist geared to your taste.

A

Spotify

493
Q

Spotify uses AI to create a custom station for a user, called _____, by examining listening habits and playlists.

A

Discover Weekly

494
Q

Which of the following allows a firm to serve ads to specific categories of Internet users, so that it can send ads to groups it is most interested in reaching, and those that are most likely to respond to such an effort?

A

targeting

495
Q

____ is a nonprofit industry trade group for the interactive advertising industry.

A

Internet Advertising Bureau

496
Q

Banner ads are part of a category of online advertising referred to as _______.

A

display advertising

497
Q

____ are cost-per-action, where program sponsors pay referring websites a percentage of revenue earned from the referral.

A

Affiliate programs

498
Q

One of the largest impacts on the advertising industry is the _____ the creation process.

A

use of generative artificial intelligence in

499
Q

Professionals in most industries today rely on _____ to provide connectivity for products and services as well as information about new markets and opportunities.

A

the Internet

500
Q

___________ connect to one another, exchanging traffic, and ensuring your messages can get to any other computer that’s online and willing to communicate.

A

Internet service providers

501
Q

URL, the address one types into a Web browser, stands for:

A

Uniform Resource Locator.

502
Q

The _____ defines the rules for communication between Web browsers and Web servers.

A

hypertext transfer protocol

503
Q

You can think of the host as the name of the network you’re trying to connect to, and think of the domain name as the computer you’re looking for on that network. T OR F?

A

FALSE

504
Q

Host and domain names are not case sensitive, but path names in URLs are. T OR F?

A

TRUE

505
Q

Mistyping path or filenames in a Web address may result in a 404 error, which means:

A

document not found.

506
Q

Fault tolerance is the ability for a system to continue operation even if a component fails. T OR F?

A

TRUE

507
Q

We need a new standard for Internet addresses since the IPv6 format is nearly at its max. T OR F?

A

FALSE

508
Q

One of the problems with the IPv6 rollout is that it is not backward compatible with the existing IPv4 standard. T OR F?

A

TRUE

509
Q

The _____ is a distributed database that looks up the host and domain names that a user enters, and returns the actual IP address for the computer that the user wants to communicate with.

A

domain name service

510
Q

The temporary storage space used to speed up computing tasks like accessing websites is called a:

A

CACHE

511
Q

Exploiting a hole in DNS software in order to redirect users to sites they didn’t request, often to harvest passwords and credit card data is ___________.

A

cache poisoning.

512
Q

A(n)_____ refers to a unit of data forwarded by a network.

A

packet

513
Q

The _____ protocol works at both the start and endpoint of an Internet communication between two computers to ensure perfect copies of messages are sent and received.

A

transmission control

514
Q

The relaying of data packets between the two ends of a communication over the Internet is carried out through special computers called:

A

routers

515
Q

UDP (user datagram protocol) works as a TCP stand-in when you’ve got the need for speed, and are willing to sacrifice quality. T OR F?

A

TRUE

516
Q

Circuit switching networks are more efficient than packet switching networks. T OR F?

A

FALSE

517
Q

When different ISPs connect their networking equipment together to share traffic, it is called:

A

peering.

518
Q

The phrase latency refers to:

A

DELAY

519
Q

Amdahl’s law states that a system’s speed is:

A

determined by its slowest component

520
Q

The dominance of the U.S. Internet industry worldwide is a direct result of United States consistent appearance at the top of speed and cost rankings for consumer last-mile broadband access. T OR F?

A

FALSE

521
Q

One criticism of FTTH (Fiber to the home) is that this capacity has to be shared, so if your neighbors are high-bandwidth users, they may reduce your Internet transmission speeds. T OR F?

A

FALSE

522
Q

_____ refers to a broadband service provided via light-transmitting fiber-optic cables.

A

Fiber to the home technology

523
Q

The term _____________ refers to frequencies used for wireless communication.

A

spectrum

524
Q

Wireless systems provided by earth-bound base stations like cell phone towers are referred to as:

A

terrestrial wireless.

525
Q

Telecom firms seeking to provide mobile phone and mobile data service ________

A

must license the right to use wireless spectrum

526
Q

All of the following are complications associated with implementing 5G services except:

A

5G transmission points are much larger than even the massive towers used to support 4G.

527
Q

LTE refers to:

A

the dominant worldwide 4G wireless transmission technology

528
Q

Geosynchronous earth orbit (GEO) systems

A

have a higher latency than LEO systems

529
Q

Net neutrality is the principle that:

A

all Internet traffic should be treated equally.

530
Q

The Achilles heel of DSL lies in the fact that it uses standard copper telephone wiring. T OR F?

A

TRUE

531
Q

The advantage of low earth orbit (LEO) over geosynchronous Earth orbit is

A

the latency is smaller and transmission speeds are faster.

532
Q

A virtual perimeter around a physical location is

A

a geofence.

533
Q

The Kessler Effect is

A

a feared cascading effect that objects in space will collide and create additional debris.

534
Q

Which of the following factors is thought to have been at work during the Target security breach?

None of the above
Target’s security software could have automatically deleted detected malware, but this function was turned off.
Malicious code was disguised by using the name of a legitimate software product.
The database for credit card transactions wasn’t sufficiently isolated from other parts of the system.
All of the above.

A

All of the above.

535
Q

Although the attack on Target was one of the largest credit card breaches in U.S. business history, the software that executed the attack was not considered to be especially sophisticated.
T OR F?

A

TRUE

536
Q

Which of the following is a valid observation regarding information security?

A

Information security isn’t just a technology problem.

537
Q

_____ are groups of surreptitiously infiltrated computers linked together and controlled remotely, often also known as zombie networks.

A

Botnets

538
Q

An attack in which a firm’s computer systems are flooded with thousands of seemingly legitimate requests, the sheer volume of which will slow or shut down the site, is known as:

A

distributed denial of service.

539
Q

_____ refer to protesters seeking to make a political point by leveraging technology tools, often through system infiltration, defacement, or damage.

A

Hacktivists

540
Q

Stuxnet showed that with computers at the heart of so many systems, it’s now possible to destroy critical infrastructure without firing a shot. T OR F?

A

TRUE

541
Q

Edward Snowden is:

A

a U.S. government contractor thought whistle-blower by many, who released (in violation of U.S. law) secret documents exposing state-run surveillance networks.

542
Q

A white hat hacker looks for weaknesses in security mechanisms, with a view to help plug the holes that might be exploited by cyber-criminals. T OR F?

A

TRUE

543
Q

Russia’s invasion of Ukraine used _____ in a cyberassault that wiped out Ukraine’s satellite communications network.

A

ACID RAIN

544
Q

A data harvester is someone who

A

collect data for illegal resale after infiltrating systems.

545
Q

The phrase __________________ refers to security schemes that automatically send one-time use representations of a credit card which can be received and processed by banking and transaction firms at the time of payment. They are used in Apple Pay and Android Pay.

A

tokenization

546
Q

Exploits that attempt to infiltrate a computer system by masquerading as something that they are not are called:

A

TROJAN

547
Q

The key difference between viruses and worms is that:

A

worms do not need an executable to spread, unlike viruses.

548
Q

Keyloggers spyware can be either software-based or hardware-based. T OR F?

A

TRUE

549
Q

_____________ is an example of an exploit in which hackers target security vulnerabilities caused by software developers not validating user input.

A

SQL injection technique

550
Q

One way to enhance security against malware on smartphones is to modify the phone to work off network. T OR F?

A

FALSE

551
Q

VPN software should only be used on an organization’s internal network. Never use VPN software on a public wireless network, as this could give hackers an entryway from your computer into your organization’s secure network. T OR F?

A

FALSE

552
Q

One of the physical threats hackers use, sifting through trash searching for valuable data, is called__________________.

A

dumpster diving

553
Q

Public key encryption is considered far weaker than private key encryption, so most websites avoid using public key systems. T OR F?

A

FALSE

554
Q

____ are attacks that are so new that they haven’t been clearly identified, and so they haven’t made it into security screening systems.

A

Zero-day exploits

555
Q

Using a password, with the use of a separate verification code, is an example of

A

2FA – two-factor authentication.

556
Q

Con games that trick employees into revealing information or performing other tasks that compromise a firm are known as _____ in security circles.

A

social engineering

557
Q

Cons executed through technology and that often try to leverage the reputation of a trusted firm or friend to trick the victim into performing an action or revealing information constitute:

A

phishing.

558
Q

The term _____________ refers to forging or disguising the origin or identity.

A

SPOOF

559
Q

Two-factor or multi-factor authentication systems can slow consumers down, leading to consumer annoyance and dissatisfaction. T OR F?

A

TRUE

560
Q

Which of the following is a precaution a user can take against hacking?

All of the above
Stay Updated
Stay Vigilant
Stay armed
Surf smart

A

All of the above

561
Q

Students are discouraged from using over-the-Internet backup services since these are known sources for security vulnerability. T OR F?

A

FALSE

562
Q

The ______________ framework represents a series of standards for best practices in implementing, maintaining and improving organizational security.

A

ISO 27000

563
Q

A best practice for information security is to stay with mandated security regulations requirements. T OR F?

A

FALSE

564
Q

A security tool that is deployed by firms as a phony target to lure or distract attackers and gain information about them is known as a:

A

HONEYPOT

565
Q

Programs that use _____ are highly restrictive, permitting communication only with pre-approved entities.

A

whitelists

566
Q

Malware _____ are a sort of electronic fingerprint often used to recognize malicious code.

A

signatures

567
Q

PCI standards may be used by a merchant to ________.

A

apply to credit card payments and information.

568
Q

Over the past several years, online advertising has represented the only advertising category that is consistently trending with positive share growth. T OR F?

A

TRUE

569
Q

In fall 2020, Google was stunned by the launch of an AI that surpassed its own:

A

ChatGPT

570
Q

Google sells more advertising than any other media company in the world, including Disney, News Corp, Time Warner, and the New York Times corporation. T OR F?

A

TRUE

571
Q

____ is the value of a firm calculated by multiplying its share price by the number of shares.

A

MARKET CAP

572
Q

____ dominates Internet search and online advertising, with more advertising revenue than any online or offline firm.

A

GOOGLE

573
Q

Search engine results returned and ranked according to relevance are known as a(n):

A

NATURAL OR ORGANIC SEARCH

574
Q

A(n) _____ is software that traverses available Web links in an attempt to perform a given task.

A

SPIDER

575
Q

The term _____ refers to Internet content that cannot be indexed by Google and other search engines.

A

DEEP WEB

576
Q

Google technology has been engineered so that no single point of failure should interrupt the firm’s operations. Systems that have such safeguards against interruption are said to be:

A

fault tolerant.

577
Q

The term for techniques used to improve a page’s rank in search results is:

A

SEO

578
Q

Users don’t really search the Internet using Google; they search a copy of Internet content stored on Google’s servers. T OR F?

A

TRUE

579
Q

Google gets creative about how its servers are cooled—stormwater runoff is used in the southeastern United States. T OR F?

A

TRUE

580
Q

____ is the process of creating a series of bogus websites, all linking back to the pages one is trying to promote.

A

LINK FRAUD

581
Q

The practice of designing, running and optimizing search-engine ad campaigns is known as:

A

search engine marketing.

582
Q

Advertisements that are targeted based on a user’s query are referred to as _____.

A

KEYWORD ADVERTISING

583
Q

Text ads appearing on Google search pages are billed on a(n) _____ basis.

A

PAY PER CLICK

584
Q

Ad rank on Google is calculated using the equation: Ad Rank = f (bid value a.k.a. __________ an advertiser is willing to pay, Quality Score, expected impact of extensions and formats).

A

maximum CPC

585
Q

The factors that can determine a given ad’s quality score in Google includes the:

A

click-through rate.

586
Q

As users spend more time in apps, this presents a challenge to Google’s dominance in search. T OR F?

A

TRUE

587
Q

A link that takes a user to a specific webpage (rather than the home page) or which launches an app and brings up a unique location rather than just launching the app is referred to as _____________.

A

DEEP LINKING

588
Q

Google’s moves to allow hotel bookings directly from search pages have been well received by its large advertisers, Priceline and Expedia. T OR F?

A

FALSE

589
Q

Efforts that link advertisers to content providers willing to host advertisers in exchange for payment, are referred to as _______________.

A

AD NETWORKS

590
Q

Advertisers can use _______, which tell networks to avoid showing ads when specific words appear.

A

NEGATIVE KEYWORDS

591
Q

Advertising based on a website’s content is known as:

A

CONTEXTUAL ADVERTISING

592
Q

Google’s ad network gives it:

A

DISTRIBUTION

593
Q

When ChatGPT was released, Alphabet shares

A

DECREASED IN VALUE 12%

594
Q

Google is experimenting with blending AI chat with traditional search results, called

A

Search Generative Experience.

595
Q

Bard is the AI offering from

A

GOOGLE

596
Q

To have a higher quality chatbot, consumer feedback shows that the most they’d be willing to pay is

A

$10 A MONTH

597
Q

Google has incorporated generative AI into its _____ , allowing editing and object removal, to remain competitive.

A

PHOTOS

598
Q

Although Microsoft has been tremendously profitable over the past decade, its stock price has been relatively flat over those years. T OR F?

A

FALSE

599
Q

Google assets include brand, scale, network effects, and data. T OR F?

A

TRUE

600
Q

YouTube is actually the Internet’s second biggest search engine.T OR F?

A

TRUE

601
Q

Google’s size has caused it to be investigated for antitrust violations in Europe. T OR F?

A

TRUE

602
Q

Global anti-trust laws are synchronized by world trade bodies, so a ruling in one nation will apply to most other industrialized nations. T OR F?

A

FALSE

603
Q

_____ allows users to use their phones pay for goods, store gift cards, collect and redeem coupons and special offers, and manage loyalty programs.

A

GOOGLE PAY

604
Q

The technology used to enable the wireless payment scheme in Google Pay is known as

A

NFC

605
Q

Android holds over _____ percent of the smartphone OS market.

A

70

606
Q

Google Cloud isn’t backing down, and currently is in _____ place in the market.

A

3RD

607
Q

Verily was developed by Alphabet’s _____ division.

A

X

608
Q

Google’s _____ are responsible for nearly 60 percent of sales to K-12 education.

A

Chromebooks