FINAL Flashcards
Roughly one in every three people on the planet has a Facebook account. T OR F?
TRUE
Firms that grow quickly may seem less risky/more likely to succeed; therefore, fast growth may help
an entrepreneur extract better ownership terms from potential investors. T OR F?
TRUE
Facebook founder and CEO Mark Zuckerberg maintains a majority of voting rights in the public
company, virtually guaranteeing that his control of the firm continues, regardless of what investors
say. T OR F?
TRUE
Meta owns four of the Internet’s most widely used apps: Facebook, TikTok, WhatsApp, and Google
Voice. T OR F?
FALSE
When a firm has an IPO, it is said to have
gone public, selling shares on a public stock exchange for
the first time.
A stockbroker trades shares she does not own with an obligation of later repayment, and in the hope
that the price of traded shares will fall. She then repays share debt with shares purchased at a lower
price and pockets the spread between initial share price and repayment price. This attempt to profit
from a falling stock price is known as
SHORT SELLING
Studying Facebook provides a context for understanding which of the following:
network effects
platform partnerships
privacy
business value of social media
All of the above are true.
All of the above are true.
Investor groups that provide funding in exchange for an ownership stake in the firm are called
VENTURE CAPITALIST
Mark Zuckerberg, the founder of Facebook, ensured that he remained in control of the firm even after
it went public by
RETAINING A MAJORITY OF VOTING RIGHTS IN THE PUBLIC COMPANY.
Facebook’s key resources for competitive advantage are the sophisticated technological tools it
provides its users. T OR F?
FALSE
Facebook (and other apps the firm owns) collectively represent the most prominent photo-sharing
service on the Web, ahead of Picasa, Flickr, and Photobucket, even though all of these other efforts
started before Facebook. T OR F?
TRUE
Facebook can be wholly indexed by search engines, like Google and Bing, being able to index all of
Facebook content. T OR F?
TRUE
A significant portion of Facebook’s underlying technical infrastructure consists of open-source
software. T OR F?
TRUE
Facebook’s phenomenal growth implies that it requires minimal infrastructure investment. T OR F?
FALSE
Facebook was one of the first social networking sites where users actually identified themselves
using their real names. T OR F?
TRUE
Facebook purchased Oculus VR because, like Zuckerberg, the firm’s youthful founder had already
built a platform with massive customer base. T OR F?
FALSE
Facebook is especially appealing to organizations looking to share messages with fans since
anyone who has “liked” an organization on Facebook will see all of that organization’s posts in their
news feed. T OR F?
FALSE
Facebook will reduce the rank of posts that request reshares.
TRUE
Facebook’s acquisition of WhatsApp was a way for Zuckerberg’s firm to gain leadership in the
fast-growing mobile messaging market. T OR F?
TRUE
_____ is the biggest photo-sharing site on the Web, taking in around three billion photos each
month.
The deep web refers to
SITES THAT CANNOT BE INDEXED BY GOOGLE AND OTHER SEARCH
ENGINES.
Software that is free and whose code can be accessed and potentially modified by anyone is
referred to as
OPEN SOURCE SOFTWARE
Systems distributed throughout the Internet that help improve the delivery speeds of Web pages and
other media, typically by spreading access across multiple sites located closer to users are known
as
CONTENT DELIVERY NETWORKS
The term “social graph” refers to
THE GLOBAL MAPPING OF USERS AND ORGANIZATIONS AND
HOW THEY ARE RELATED.
Which of the following factors has helped Facebook build up among its users?
MUTUAL AND
RECIPROCAL APPROVAL OF FRIENDS REQUESTS.
What does the term “cloud” refer to?
IT REFERS TO A COLLECTION OF
COMPUTING RESOURCES AVAILABLE FOR ACCESS OVER THE INTERNET.
What are network effects?
IT REFERS TO A SITUATION WHEN
THE VALUE OF PRODUCTS OR SERVICE INCREASES AS THE NUMBER OF ITS USERS EXPANDS.
How are news feeds a source of value for users on Facebook?
IT FOSTERS THE VIRALITY OF
INFORMATION SHARING VITAL TO DELIVERING VALUE FROM THE SOCIAL GRAPH.
Mark Zuckerberg acquired the firms Oculus because
IT WOULD ENSURE FACEBOOK’S PLACE IN
BEING INVOLVED ON THE FOREFRONT OF COMPUTING’S EVOLUTION.
One of Facebook’s key resources for competitive advantage is
NETWORK INTERNALITIES.
In the context of Facebook’s business strategy, the walled garden refers to the connections between
individuals and organizations. T OR F?
FALSE
Most Facebook applications are focused on businesses and educational services. T OR F?
FALSE
The asking price for Facebook acquisition, WhatsApp, was 2 billion dollars. T OR F?
FALSE
Meta attempted to counter the TikTok threat by creating a clone, an app called Lasso. T OR F?
TRUE
TikTok has more daily usage hours than any of Facebook’s platforms. T OR F?
TRUE
Facebook’s growing dominance has given rise to the fear that if increasingly large parts of the Web reside inside a single service, innovation, competition, and exchange may suffer. T OR F?
TRUE
“Reels, a feature integrated into Instagram and Facebook, has displaced TikTok as the dominant short-video platform.” T OR F?
FALSE
“Meta’s Reels feature offers enhanced AI tools to surface content that users are likely to be most interested in.” T OR F?
TRUE
“Since the launch of Reels, users have been spending less time on Meta platforms.” T OR F?
FALSE
“Cross-posting between Meta platforms allows users to access TikTok features without leaving Instagram or Facebook.” T OR F?
TRUE
_____ is a term that refers to a closed network of single set of services controlled by one
dominant firm.
WALLED GARDEN
Facebook has offered a system where website operators can choose to accept a user’s Facebook
credentials for logging in. Website operators appreciate this feature because
USERS CAN ACCESS WEBSITES WITHOUT CREATING AN ACCOUNT, REDUCING A POTENTIAL BARRIER TO CUSTOMER ACQUISITION.
Metaverse is a concept where users experience an immersive, computer-generated environment where they can interact with others. T OR F?
TRUE
Oculus founder Palmer Luckey launched a Kickstarter campaign to generate interest in his product but failed to meet his initial goal of $250,000, which caused the product to fail before it made it to production. T OR F?
FALSE
Facebook Phone and Meta Portal are examples of Meta’s unsuccessful consumer electronics efforts. T OR F?
TRUE
Meta has introduced its second iteration of its smart glasses in a continued partnership with Ray-Ban, which features a smart screen incorporated into the lenses, allowing them to be used for AR and VR. T OR F?
FALSE
The term “metaverse” was first coined by Neal Stephenson in his 1992 novel Snow Crash. T OR F?
TRUE
The term “metaverse” refers to a specific infrastructure or service provided by several firms. T OR F?
FALSE
The metaverse is most commonly associated with environments created using augmented reality headsets. T OR F?
FALSE
Predictions suggest that the metaverse could generate between $2.5 and $15 trillion in revenue annually. T OR F?
TRUE
Meta’s Reality Labs, responsible for building the metaverse future, has accumulated $40 billion in losses so far. T OR F?
TRUE
Microsoft’s largest acquisition in history, justified in part by their hopes to gain “building blocks for the metaverse,” was which firm?
ACTIVISION BLIZZARD
Which of the following is an inconvenience of AR/VR headsets?
They are heavy and uncomfortable to wear for long periods.
They are expensive.
They require a lot of computing power.
They are inconvenient to have on hand.
All of the above.
All of the above.
DALL-E is a term taken from the military where trained team, unaffliated with development staff, play the role of adversaries and try to deliberately compromise systems. T OR F?
FALSE
IDEs are tools used to write software and usually include an editor, debugging tools, a compiler that turns written code into something that a computer can execute and more. T OR F?
TRUE
Meta intends to have Llama AI-powered chatbots available across their messaging platforms including virtual avatars of celebrities who are ready to engage you in all sorts of domain-specific conversations. T OR F?
TRUE
Meta’s lag in AI was in part blamed on the firm’s rushed adoption of GPUs. T ORF?
FALSE
Developers who make applications create ______ that have the potential to add value to Meta beyond what the firm itself provides to its users.
COMPLEMENTARY BENEFITS
Which of the following is a tactic that Meta used to make Llama 2 a safer AI?
They had third-party users perform Red Team exercises.
They had internal employees perform Red Team exercises.
They developed Purple Llama tools to make it harder for bad actors to generate harmful code.
All of the above
None of the above
All of the above
Meta’s custom ASIC chip helps to:
Improve user experience Get videos to user devices more quickly Use less data overall Improve livestream performance for users All of the above
All of the above
Facebook’s revenue share with app vendors for some services involved taking more than half of virtual goods sales. T OR F?
FALSE
Mark Zuckerberg successfully recruited the CEO of PayPal, David Marcus, to run Messenger, which has now become one of the largest messaging platforms. T OR F?
TRUE
Facebook’s attempt to launch a gaming app platform within its iOS app was readily accepted by Apple. T OR F?
FALSE
What are APIs?
APPLICATION PROGRAMMING INTERFACES
What was the primary purpose of Facebook’s publication of APIs at the F8 developers conference?
TO ALLOW DEVELOPERS TO CREATE APPLICATIONS THAT INTERACT WITH FACEBOOK.
Every eighteen months, Meta employees are required to leave their teams and work on something different for at least a month. T OR F?
TRUE
Facebook’s “no-beta” culture seldom tolerates mistakes on the road to progress. T OR F?
FALSE
Facebook’s Beacon effort was a failure largely because it was “opt-out” instead of “opt-in.” T OR F?
TRUE
_______ is considered to be the most persuasive and valuable method of promoting products and services.
WORD OF MOUTH
Meta’s algorithms for liking like-minded users and finding what they may be interested in has:
Surfaced conspiracy theories and hate
Allowed for the spread of misinformation around COVID-19
Given way to fast-spreading conspiracy theories around elections
All of the above are true
All of the above are true
Figures released by Meta showed its AI had a difficult time detecting ____
HATE SPEECH
Near field communication refers to a short-range, wireless communication standard. T OR F?
TRUE
The EU has fined Google over $13.4 billion since 2017, including $4.13 billion for using its Android mobile operating system to the detriment of any rivals. T OR F?
TRUE
Generative AI is the biggest existential threat to Google’s search business that it has ever faced. T OR F?
TRUE
The ‘T’ in ChatGPT stads for _________
TRANSFORMER
Ad networks enforce exclusivity. Once a content provider selects one ad network it cannot implement other forms of advertising on its website. T OR F?
FALSE
The base service of Google Analytics is offered free to websites of all sizes, with premium offerings and support available for a fee. T OR F?
TRUE
The _______ refers to a situation where ads appear alongside text the advertiser would like to avoid.
CONTENT ADJACENCY PROBLEM
Dynamic search ads:
Are generated automatically
Are based on the content of the website
Are useful for firms with rapidly changing inventory
All of the above are true
All of the above are true
Which of the statements holds true for the term click-through rate?
IT REFERS TO THE NUMBER OF USERS WHO CLICKED AN AD DIVIDED BY THE NUMBER OF TIMES THE AD WAS DELIVERED.
Which of the following is true for the cost-per-click?
IT REFERS TO THE MAXIMUM AMOUNT OF MONEY AN ADVERTISER IS WILLING TO PAY FOR EACH CLICK ON THEIR AD.
Law firms are consistently the lowest cost-per-click rate bidders for keyword ads, but they run the most ads, making them significant contributors by volume. T OR F?
FALSE
JCPenney was one of Google’s largest advertisers, spending millions a month in ads, yet Google punished the firm in search rankings when it detected that Penney violated Google’s policies on gaming search engines. T OR F?
TRUE
PageRank is an algorithm developed by Google co-founder Larry Page to rank websites. T OR F?
TRUE
Google, who has a best-in-class AI team, was not prepared to compete with the capabilities of OpanAI’s ChatGPT. T OR F?
TRUE
Google profits from advertising allow it to:
Experiment and innovate Tolerate failure Acquire aggressively Patiently build new markets All of the above are true
All of the above are true
Almost all security breaches can be tracked back to technology lapses; personnel or procedural factors rarely factor in. T OR F?
FALSE
The malware used to breach Target was described by one security expert as “absolutely unsophisticated and uninteresting.” T OR F?
TRUE
The Equifax hack mainly impacted people from:
The US Canada The UK All of the above are true None of the above are true
All of the above are true
Hackers might infiltrate computer systems to enlist hardware for subsequent illegal acts. T OR F?
TRUE
The term ISO 27000 refers to a series of standards representing the set of best practices for implementing, maintaining, and improving organizational security. T OR F?
TRUE
Data harvesters are cybercriminals who infiltrate systems and collect data for illegal resale. T OR F?
TRUE
The MOVEit exploit is considered one of the costliest hacks of all time. T OR F?
TRUE
A team working on organizational security should include representatives from general counsel, audit, public relations, and human resources, in addition to those from specialized security and broader technology and infrastructure functions. T OR F?
TRUE
Online backup services are considered a poor choice for end-users since this only increases the likelihood that an individual’s data will be hacked. T OR F?
FALSE
The Hydra dark web market, which at its peak did over $1 billion in annual business, is still active despite law enforcement efforts since 2022. T OR F?
FALSE
Cybercriminals who infiltrate systems and collect data for illegal resale are called ____
DATA HARVESTERS
A firm’s suppliers, buyers, or partners may also require a degree of certification. T OR F?
TRUE
Hordes of surreptitiously infiltrated computers, linked and controlled remotely, are known as zombie networks or _________
BOTNETS
System and Organization Controls (SOC) can involve certification by a third-party organization. T OR F?
TRUE
Dumpster diving refers to physically trawling through trash to mine any valuable data or insights that can be stolen or used in a security attack. T OR F?
TRUE
One of the reasons organizations delay patches to plug holes in their security applications is ________.
THE FEAR THAT HE NEW TECHNOLOGY CONTAINS A CHANGE THAT WILL CAUSE PROBLEMS DOWN THE ROAD.
Because of Moore’s Law, widely used encryption programs currency employed by banks and e-commerce sites are now easily penetrated by brute-force attacks that can be employed by hackers using just a handful of simple desktop computers. T OR F?
FALSE
It’s bad when a firm’s e-mail and password files are stolen; however, the impact is minimized because user passwords set up for one system cannot be used in others. T OR F?
FALSE
Systems that deny the entry or exit of specific IP addresses, products, Internet domains, and other communication restrictions are said to employ a(n) _____
BLACKLIST
What type of tool enforces access privileges and helps verify that systems are not being accessed by unauthorized or suspicious ways?
ACCESS CONTROL TOOLS
The term deepfake refers to sophisticated media created by AI that tempts to look or sound like a real person or event. T OR F?
TRUE
Cybersecurity experts have just recently started using artificial intelligence, and they are unsure of its promise. T OR F?
FALSE
Computer criminals, state-sponsored infiltrators, corporate spies, and other malfeasants are often motivated by:
Account theft and illegal funds transfer
Terrorism
Surreptitiously hijacking hacked hardware for cryptocurrency mining
Cyberwarfare
Any of the above are true.
Any of the above are true.
Which of the following is an example of Russia’s use of cyberwarfare?
Taking out Ukaine’s Viasat satellite Interrupting internet service across Europe Causing outages in German wind turbine power grid All of the above are true.
All of the above are true.
Which of the following types of infiltration techniques does one open up to by posting sensitive personal information and details about one’s workplace on social networking sites?
SOCIAL ENGINEERING
Which of the following are considered sources of information that can potentially be used by social engineers?
LinkedIn Corporate directories Social media posts Contests or surveys All of the above are true
All of the above are true
Some of the most common guidelines issued by websites when designing a secure password include which of the following?
THE PASSWORD SHOULD BE AT LEAST EIGHT CHARACTERS LONG AND INCLUDE AT LEAST ONE NUMBER AND OTHER NON ALPHABET CHARACTER
Technologies that measure and analyze human body characteristics for identification or authentication are known as _____.
BIOMETRICS
The e-mail password of a senior employee in an organization was compromised by someone observing this user as the employee accessed his account. This is most likely a case of ________.
SHOULDER SURFING
Which of the following statements holds true for the term spoof?
IT REFERS TO E-MAIL TRANSMISSIONS AND PACKETS THAT HAVE BEEN ALTERED TO SEEM AS IF THEY CAME FROM ANOTHER SOURCE.
One of the major problems with the Heartbleed bug in OpenSSL software is that _______.
THE SOFTWARE WAS EMBEDDED IN MANY HARDWARE PRODUCTS THAT COULD NOT BE EASILY PATCHED WITH AUTOMATIC SOFTWARE UPDATES.
A common example of 2FA is _________ .
A PASSWORD, PLUS THE USE OF SEPARATE VERIFICATION CODE.
Which of the following is a potential drawback of using passkeys?
Passkey libraries are tied to your device or a specific vendor Passkeys do not allow you to share passwords with others Passkeys are not yet being implemented by all websites All of the above are true.
All of the above are true.
An alternative to terrestrial networks is Starlink. T OR F?
TRUE
China has complained to the United Nations that SpaceX’s Starlink is unfairly crowding other efforts in space. T OR F?
TRUE
The routing protocol that is in charge of forwarding packets on the Internet is known as voice over Internet protocol. T OR F?
FALSE
Wall Street traders often choose a colocation facility with the goal of providing high-latency connectivity to their partners. T OR F?
FALSE
Starlink does not use equipment in a fixed position above a spot. The satellites zoom in and out of range, passing signals to each other using _______.
LASERS
ISPs and IXPs that carry out peering are required by the FCC to charge each other fees based on their traffic contribution. T OR F?
FALSE
The internet has no center, and no one owns it. T OR F?
TRUE
Computer programs making decisions without any human intervention conduct most US stock trading. T OR F?
TRUE
Circuit-switched networks provide a connection between two parties that ______.
IS DEDICATED FOR USE BY THE PARTIES FOR THE DURATION OF A CONNECTION.
A device gets its IP address from whichever organization is currently connecting it to the Internet. T OR F?
TRUE
______ repeatedly sends a cluster of three packets starting at the first router connected to a computer, then the next, and so on, building out the path that packets take to their destination.
TRACEROUTE
The US Federal Aviation Administration sought to delay some 5G C-band use near airports over aviation safety concerns and has proposed additional upgrades for aircraft to prevent possible interference. T OR F?
TRUE
“Cyber hygiene” refers to fairly straightforward precautions that should be taken for site safety. T OR F?
TRUE
A(n) _______ is a temporary storage space used to speed computing tasks.
CACHE
The fault-tolerant nature of the DNS ensures that _________.
THE SERVICE CONTINUES FUNCTIONING EVEN IF ONE NAMESERVER GOES DOWN.
The exploit referred to as _________ allowed hackers to leverage vulnerability in DNS software to redirect users to sites they did not request.
CACHE POISONING
A firm that provides hardware and services to run websites of others is known as a(n) ________.
WEB HOSTING SERVICE.
Popular sites like Google and Yahoo! Have several computers assigned to their host names because _________ .
IT ENSURES THAT THE LOAD OF REQUESTS TO THEIR SITES DOES NOT OVERWHELM A SINGLE COMPUTER.
A __________ enables communication by defining the format of data and rules for exchange.
PROTOCOL
The most dominant standard for 4G technology worldwide is _____.
LTE
GeoTLDs are associated with geographical, geopolitical, ethnic, linguistic, or cultural community. T OR F?
TRUE
___________ technology is broadband technology that can use the wires of a local telephone network.
DIGITAL SUBSCRIBER LINE (DSL)
Under IPv6, IP addresses are expressed as a string of four numbers between 0 and 255, separated by a period. T OR F?
FALSE
The acronym HFT refers to __________.
HIGH FREQUENCY TRADING.
Unfortunately, IPv6 isn’t backward compatible with IPv4. T OR F?
TRUE
Peering refers to ________.
A SITUATION WHEN SEPARATE ISPS CONNECT THEIR NETWORKING EQUIPMENT TOGETHER TO SHARE TRAFFIC.
Which of the following applications is most likely to use UDP instead if TCP?
WEB-BASED PHONE CALLS
One of the function of the IP is to ________.
ROUTE MESSAGE PACKETS TO THE FINAL DESTINATION.
Apple has imposed what it calls “Data Authorization Labels” on app developers, requiring them
to have easy-to-read, consistent, and clear notices on what data is collected and how it is used. T OR F?
FALSE
Meta has been fined $400 million for collecting Facebook and Instagram data without explicit
consent. T OR F?
TRUE
SKAdNetwork shares conversion data with advertisers without revealing any user-level or
device-level data and is much easier to implement than old cookie schemes. T OR F?
FALSE
Apple is now automatically removing link trackers from URLs sent via its email client and its text
messaging platform. T OR F?
TRUE
Due to the complexities of consumer data privacy policy, organizations should ___________ .
ASSEMBLE AN
INTERNAL TEAM THAT WILL MONITOR RELEVANT AND COMPLEX ISSUES RELATED TO
INFORMATION SYSTEMS.
The five components of information systems needed to fully understand organizational privacy
policies include _________.
DATA, SOFTWARE, HARDWARE, PROCEDURES, PEOPLE.
How will Apple’s IDFA identifier impact advertising sales in the gaming industry?
IF GAMERS
DONT OPT-IN WHEN USING APPS, ADVERTISING NETWORKS WILL NOT HAVE
DETAILED PROFILES FOR GAME ADVERTISERS.
A VPN is a service that creates a public connection across the private Internet, encrypting
transmission and making your Internet communication appear as if it is connected to the
organizations that provides VPN software. T OR F?
FALSE
Identifying a user’s physical location for the purpose of delivering tailored ads or other content is
known as ________.
GEOTARGETING
Advertisers use ____________ to deliver targeted ads to your television based on
your profile.
DYNAMIC AD INSERTION
All devices that connect to the internet are identified by an assigned numeric value. The numeric
value is known as the _____
IP address
As an advertiser, you have acquired the services of Google to display your ads. You have set a
budget for the campaign, and Google will charge you when users click on your ad. This form of
online advertising is known as ______.
CPC
An ad that runs before a user arrives at his intended destination on a website or in an app is
known as _________.
AN INTERSTITIAL
Data that is collected by one form and shared with a partner organization is known as _______ .
SECOND
PARTY DATA
If Rent the Runway receives an invoice for 450,000 impressions, their sales quote was for ____
CPMs.
450
Suppose you have a popular blog, and you want to leverage it to make extra money. Because
your web traffic is high, you have decided to add links to direct users to online storefronts. If the
user makes a purchase at the storefront, the seller has agreed to share a percentage of
revenue with you. This form of marketing is known as ____________ .
AFFLIATE PROGRAMS.
Second-party data is data that is collected by one firm and shared with a partner organization. T OR F?
TRUE
Enhancing productivity, improving efficiency, and automating mundane tasks are benefits of AI. T OR F?
TRUE
Change management seeks to identify how workflows and processes are to be altered and how
to manage the worker and organizational transition from one system to another. T OF F?
TRUE
Potential risks and ethical implications of AI issues concerning job displacement, algorithmic
bias, and misuse for malicious purposes. T OR F?
TRUE
AI-related job displacement may create new employment opportunities and career pathways in
areas like AI development and data analysis. T OR F?
TRUE
What example of AI benefits is not mentioned in the text?
AI-ASSISTED VEHICLES
MAINTAINING HEALTHY BODY TEMPERATURE FOR PASSENGERS.
Generative AI is predicted to have a significant impact on various job sectors, including
knowledge-based professions like analysis, accounting, legal, medical, software development,
and education. T OR F?
TRUE
Which of the following is not a potential issue related to AI’s risks and unknowns?
OVERRELIANCE ON AI FOR DECISION-MAKING
Which of the following is not mentioned as a potential challenge associated with leveraging AI
and machine learning?
OVERABUNDANCE OF AVAILABLE TRAINING DATA
How does the text characterize the future of AI?
TRANSFORMATION OF INDUSTRIES AND
CREATION OF NEW OPPORTUNITIES.
Despite the transformative abilities of GenAI, why is it still crucial for individuals to always fact
check results given by GenAI?
Generative AI tends to seemingly make things up, a process often referred to as
hallucination.
Since AI systems “learn” based on data, then any biases in data can become part of the
model, which can result in sexist and racist results.
Results may contain copyrighted material which could open firms up to legal penalties.
Sometimes results can give dangerous information, such as reported cases of
generating recipes that would be poisonous if eaten.
All of the above are correct
All of the above are correct
Some concerns about GenAI include its tendency to provide incorrect answers and sometime
produce biased or harmful results. T RO F?
TRUE
The foundation model used to train LLMs like ChatGPT-3 is the same model used for end-user
interaction. T OR F?
FALSE
Auditing technology and training data is unnecessary, especially if a firm trust its developers and
suppliers. T OR F?
FALSE
In which scenario might machine learning be legally prohibited?
USING DEMOGRAPHIC DATA
FOR RISK PREDICTION
Why could banks using AI in their loan process potentially create unintended consequences?
SUCH SYSTEMS CAN INCREASE DISPARITIES BASED ON SOCIOECONOMIC
BACKGROUND, ETHNIC CATEGORY, OR EDUCATIONAL LEVEL
Organizations should incorporate new tools and best practices as they are developed, rather
than sticking to established methods. T OR F?
TRUE
Meta made its GenAI model, Llama, open source, stirring controversy in the tech industry. T OR F?
TRUE
Which statement about generative AI (GenAI) is not true?
GenAI ALWAYS PROVIDES
FACTUALLY ACCURATE ANSWERS.
COBIT is an IT infrastructure library, which covers best practices for delivering IT service. T OR F?
FALSE
Since 2018, technologists are required to have had significant training in technology ethics. T OR F?
FALSE
Which of these is a challenge associated with training AI models?
INABILITY TO INTEGRATE
DATA SOURCES
How are parameters described in the text?
RELATIONSHIPS BETWEEN TEXT ELEMENTS
A large language model (LLM) is a type of __________ .
AI USED FOR GENERAL-PURPOSE LANGUAGE
UNDERSTANDING AND GENERATION.
What is the foundation model used to train ChatGPT-3?
GPT-3
Which step is not suggested for developing more ethical, less risk-prone systems?
IGNORING
EMPLOYEE FEEDBACK
What is the purpose of a “Red Team” in the context of AI development?
TESTING THE
SECURITY OF SYSTEMS
Logistics is the term that describes the extensive use of data, statistical, and quantitative
analysis, explanatory and predictive models, and fact-based management to drive decisions
and actions. T OR F?
FALSE
Data obtained from outside sources, when combined with a firm’s proprietary internal data
assets, can give the firm a competitive edge. T OR F?
TRUE
Firms that base decisions on hunches are said to be gambling, not managing. T OR F?
TRUE
Random occurrences in data mining results can be detected by dividing the data and building a
model with one portion and using another portion to verify the results. T OR F?
TRUE
A ____________ is a system that provides rewards and usage incentives, typically in
exchange for a method that provides a more detailed tracking and recording of consumer
activity.
LOYALTY PROGRAM
___________ refer to older information systems that are often incompatible with other
systems, technologies, and ways of conducting business.
LEGACY SYSTEMS
__________ refer to databases focused on addressing the concerns of a specific problem or
business unit.
DATA MARTS
___________ is a class of computer software that seeks to reproduce or mimic
human thought, decision-making, or brain functions.
ARTIFICIAL INTELLIGENCE
Which of the following is not considered an advantage of Hadoop?
RELATIONAL STRUCTURE
Data are raw facts that must be turned into information in order to be useful and valuable. T OR F?
TRUE
_____________ refers to the process of combining aspects of reporting, data
exploration and ad hoc queries, and sophisticated data modeling and analysis.
BUSINESS INTELLIGENCE
A data cube refers to a ______.
SPECIAL DATABASE USED TO STORE DATA IN OLAP REPORTING.
___________ is the process of using computers to identify hidden patterns in and to build
models from large data sets.
DATA MINING
Computer-driven investment models can be very effective when the market behaves as it has in
the past. However, in terms of historical consistency, they are vulnerable to failure in the face of:
BLACK SWANS
_________ refers to software for creating, maintaining, and manipulating data.
DBMS
The graphical representation of data and information is known as:
DATA VISUALIZATION
In database systems, a ______ refers to a list of data.
FILE
In database systems, a row is also known as a:
RECORD
In database systems, a ______ defines the data that a table can hold.
FIELD
Which of the following describes serverless computing?
a type of cloud computing
a third-party vendor manages servers, replication, and fault-tolerance
a third-party vendor manages computing scalability
a third-party vendor manages certain aspects of security
ALL OF THE ABOVE ARE CORRECT
ALL OF THE ABOVE ARE CORRECT
Most organizations do not opt for IT configurations that are purely in-house, packaged, or SaaS
models. T OR F?
TRUE
Linux is one of the most used operating systems in desktop computers, but it can be found only in a
tiny fraction of mobile phones, and consumer electronics. T OR F?
FALSE
Linux is one of the most used operating systems in desktop computers, but it can be found only in a
tiny fraction of mobile phones, and consumer electronics. T OR F?
FALSE
Many SaaS vendors have improved system customization options and integration with standard
software packages. T OR F?
TRUE
The marginal cost to produce an additional copy of a software product is effectively zero. T OR F?
TRUE
Some of the largest technology companies now support open source software initiatives. T OR F?
TRUE
With SaaS, firms get the most basic offerings but can also do the most customization, putting their
own tools (operating systems, databases, programming languages) on top. T OR F?
FALSE
With the advent of cloud computing and SaaS, smaller firms no longer have access to the kinds of
sophisticated computing power they had access to in the past. T OR F?
FALSE
Virtualization is unsuitable for use on desktop applications. T OR F?
FALSE
Which of the following is not true about apps and the app economy?
App stores are “always open.”
Apps have been vital to the rise of several high-valued efforts, including Uber, Instagram, and
WhatsApp.
Apps developed for one platform typically cannot be used on another platform.
Apps have been criticized as creating consumer switching costs vs. browser-based
alternatives.
APP STORE ACCESS IS LIMITED TO INDUSTRIALIZED NATIONS WITH LARGE
SMARTPHONE USER POPULATIONS.
APP STORE ACCESS IS LIMITED TO INDUSTRIALIZED NATIONS WITH LARGE
SMARTPHONE USER POPULATIONS.
A slang derogatory term for an uninformed or unskilled person is “greenie.” T OR F?
FALSE
Oracle, a firm that sells commercial ERP and database products, provides Linux for free, selling
high-margin Linux support contracts for as much as five hundred thousand dollars. Oracle’s
motivation for this lies in ________________________ .
USING OPEN SOURCE SOFTWARE TO WEAN CUTOMERS AWAY FROM
COMPETITORS.
Which of the following refers to a variant of utility computing where vendors provide the operating
system and supporting software like database management systems but where client firms write
their own code?
PLATFORM AS A SERVICE
Consumerization of corporate technology stifles employee creativity. T OR F?
FALSE
Which of the following is one of the sources of revenue for open source vendors?
SELLING
SUPPORT AND CONSULTING SERVICES.
One important thing that managers should understand about SaaS is that _________________________.
MANY OF THESE
VENDORS WILL NOT LAST IN THE MARKET.
A server running ________________ can create smaller compartments in memory that
each behave as a separate computer with its own operating system and resources.
VIRTUALIZATION SOFTWARE
Which of the following is true of software as a service (SaaS)?
IT REFERS TO SOFTWARE THAT IS
MADE AVAILABLE BY THIRD PARTY ONLINE.
______________ allow(s) a server to run what amounts to a copy of a PC—OS, applications, and
all—and simply deliver an image of what’s executing to a PC or other connected device.
VIRTUAL DESKTOPS
Vendors frequently sign _________________ with their customers to ensure a guaranteed
uptime and define their ability to meet demand spikes.
SERVICE LEVEL AGREEMENTS
Which of the following statements relating to open-source software is true?
THE FLAGSHIP OSS
PRODUCT IS THE LINUX OPERATING SYSTEM, NOW AVAILABLE ON ALL SCALES OF COMPUTING
DEVICES.
Cloud vendors that are hosting hardware, operating system, database, and other software, which
clients can then use to build their own applications, are said to be providing _________________________.
SOFTWARE AS A
SERVICE.
The LAMP stack of open-source products is used ________________________.
TO POWER MANY OF THE INTERNET’s MOST
POPULAR WEBSITES.
chnology products with particularly strong security features are said to be ______________________.
HARDENEND.
The scalability of a software product is defined as the ____________________________.
ABILITY TO BE EASILY EXPANDED TO
MANAGE WORKLOAD INCREASES.
___________ is a term used to describe unpredictable but highly impactful events.
BLACK SWANS
Vendors who use open source as part of their product offerings can expect to bring new products to
the market faster because __________________.
THEY CAN SKIP WHOLE SEGMENTS OF THE SOFTWARE DEVELOPMENT
PROCESS.
Which of the following was considered a contributor to vulnerabilities in the OpenSSL security
product, known as the Heartbleed bug?
FEW DEVELOPERS WERE WORKING ON THE PROJECT, SO
THE IDEAL THAT “GIVEN ENOUGH EYEBALLS, ALL BUGSARE SHALLOW” WASN’T MET WITH
OPENSSL.
Which of the following is not one of the three major cloud-computing service models?
CAAS
Scrum defines functions or roles (for management and development, meetings, or ceremonies), and
how the process is documented and tracked or artifacts. T OR F?
TRUE
A scrum master represents the “voice of the customer,” advocates for the needs of the organization
helps in setting requirements, and is ultimately held accountable for deliverables. T OR F?
FALSE
What are software development methodologies?
THODS TO DIVIDE TASKS RELATED TO
SOFTWARE CREATION AND DEPLOYMENT INTO TASKS TARGETED AT BUILDING BETTER
PRODUCTS WITH STRONGER PRODUCT MANAGEMENT GUIDELINES AND TECHNIQUES.
Operating systems are computer programs that have a set of precise instructions that tell computer
hardware what to do. T OR F?
FALSE
As an IT leader in a fast-growing technology start-up, which software development methodology
would you implement to ensure your firm can make adjustments when necessary?
AGILE
Which of the following is an example of computer hardware?
A VIDEO GAME CONSOLE
Expedia used APIs to increase the distribution of travel products that it sells, relying on partners to
plug into its technology and inventory. T OR F?
TRUE
VW’s first large-scale foray into the EV market was the ______.
iD3
Android is a software product developed by Google that allows cell phone manufacturers to control
hardware and establishes standards for developing and executing applications on its platform.
Android is thus an example of a(n):
OPERATING SYSTEM
A PC, laptop, or any other small computer can be set up to run server software. T OR F?
TRUE
EVs software requires at least ten times as much ____ as cars with regular combustion engines.
CODE
Firmware refers to ___________.
CONTROL SOFTWARE STORED ON NONVOLATILE MEMORY CHIPS.
Which of the following is an operating system?
LINUX
In recent years, there has been a noticeable decline in LCNC environments. T RO F?
FALSE
ERP systems and enterprise software programs should be ideally configured to use different
database systems to avoid the possibility of data redundancy. T OR F?
FALSE
Standardizing business processes in software that others can buy means that those functions are
difficult for competitors to match. T OR F?
FALSE
A(n) _________________ is an application that includes an editor, a
debugger, and a compiler, among other tools.
INTEGRATED DEVELOPMENT ENVIRONMENT
Enterprise resource planning software has proven popular in part because the standardization these
products impose makes them exceptionally easy to deploy. T OR F?
FALSE
____ is a set of standards for exchanging messages containing formatted data between computer
applications.
EDI
What is the most common function performed by electronic data interchanges?
SENDING
ELECTRONIC EQUIVALENTS OF STRUCTURED DOCUMENTS BETWEEN DIFFERENT
ORGANIZATIONS.
Which of the following is true of scripting languages?
THEY ARE OFTEN DESIGNED TO BE
INTERPRETED WITHIN THEIR APPLICATIONS.
Java is not optimized to take advantage of interface elements specific to the Mac or Windows
operating systems. As a result _____________.
JAVA IS UNSUITABLE FOR DESKTOP APPLICATIONS.
____________ refers to a software package that integrates the many
functions of a business, such as accounting, finance, inventory management, and human resources.
ENTERPRISE RESOURCE PLANNING
Rent the Runway rentals are often only 25 percent of dress’s retail price. T OR F?
FALSE
Project Entrepreneur, created by Facebook, aims to help female entrepreneurs build high-growth,
high-impact businesses. T OR F?
FALSE
Rent the Runway’s mobile app provides over 40 percent of firm traffic. T OR F?
TRUE
Customers who are on the fence about a choice can choose a second style as a backup for an
additional fee. T OR F?
TRUE
Vague terms that mean something to humans but not conventional search will not be able to be
used by custom Rent the Runway AI models built on the firm’s massive, proprietary data. T OR F?
FALSE
Which of the following is not true about mobile app development?
MOBILE APPS ARE CONSIDERED
FAR EASIER TO DEVELOP THAN WEBSITES. MOST MANAGERS CAN CREATE ROBUST APPS
USING DRAG-AND-DROP TOOLS.
At Rent the Runway, customers arriving at the site via ________media have a much higher conversion
rate than customers arriving via ____ media.
EARNED; PAID
Time magazine has called Rent the Runway one of the country’s 25 Best Websites. T OR F?
FALSE
Nuuly still far exceeds Rent the Runway in social media followers and other metrics, indicating brand
reach, awareness and exposure. T OR F?
FALSE
Rent the Runway has embedded RFID tags in 1.5 million items, tracking garments throughout the
distribution center journey. T OR F?
TRUE
Rent the Runway is suing Urban Outfitters, claiming the firm stole RTR trade secrets when developing
the Nuuly service. T OR F?
FALSE
While some fast-growing startup companies experience crises as they negotiate large-scale
logistics, Rent the Runway’s business model has thus far allowed it to avoid mistakes. T OR F?
FALSE
AI is hindering customer service by depersonalizing interactions through chatbots and virtual
assistants.T OR F?
FALSE
Firms need to be aware of when an AI’s “knowledge” might end. T OR F?
TRUE
What are “naked algorithms” in the context of AI?
STARTING POINT ALGORITHMS IN THE PUBLIC
DOMAIN OR ACCESSIBLE FROM CLOUD PROVIDER SERVICES.
Tesco is the planet’s largest retailer. T OR F?
FALSE
Data warehouses are composed entirely of proprietary corporate data, while data marts take
advantage of data purchased from third-party firms. T OR F?
FALSE
Turning data into usable information is hindered by transactional databases set up to be
simultaneously accessed for reporting and analysis. T OR F?
FALSE
Legacy systems are popular among large firms because they have a large storage capacity and are
designed to share data. T OR F?
FALSE
Dynamic pricing is considered especially tricky in situations where consumers make repeated
purchases and are more likely to remember past prices, and when they have alternative choices. T OR F?
TRUE
Most transactional databases are not set up to be simultaneously accessed for reporting and
analysis. As a consequence __________________.
DATA IS NOT EFFICIENTLY TRANSFORMED INTO INFORMATION.
__________ put(s) users in control so that they can create custom reports on an
as-needed basis by selecting fields, ranges, summary conditions, and other parameters.
AD HOC REPORTING TOOLS
Which of the following conditions is essential for data mining to work?
THE EVENTS IN THE DATA
SHOULD REFLECT CURRENT AND FUTURE TRENDS.
_______ is the term used to describe raw facts and figures.
DATA
Firms adopting OSS may be at risk if they distribute code and aren’t aware of the licensing
implications. T OR F?
TRUE
App developers often lament the ____________ created within apps where data is more tightly
controlled by a service provider and where firms must comply to the usage policies of the platform
provided.
WALLED GARDEN
Many firms manage Docker and other container environments within an existing software layer, with
Kubernetes being the largest player in this space. T OR F?
TRUE
Cloud computing refers to _________________________.
REPLACING COMPUTING RESOURCES WITH SERVICES PROVIDED OVER
THE INTERNET.
Ensuring that organizations follow requirements for data protection and security is known as ____________.
DATA
COMPLIANCE.
European regulators have become much more aggressive in fining organizations that ignore the
region’s privacy protections but failed to fine Meta for collecting Facebook and Instagram data
without explicit consent. T OR F?
FALSE
Apple’s IDFA identifier is a unique snippet of random text used by developers to _____________.
TRACK CONSUMER
BEHAVIORS ON IOS DEVICES.
Grouping together additional data collected from traditional browsing history in order to identify
users is known as which of the following?
FINGERPRINTING
The use of installed viruses, malware, or other vulnerabilities to copy the behaviors of humans by
visiting websites associated with specific ads is known as ____________.
CLICK FRAUD.
Routers don’t have perfect, end-to-end information on all points in the Internet. T OR F?
TRUE
How many people world-wide are not yet online?
3 BILLION
TCP and IP operate above http and the other application transfer protocols. T OR F?
FALSE
Circuit-switched networks are advantageous because they offer an inexhaustible supply of
bandwidth for telecommunications. T OR F?
FALSE
In the URL, the host name is the name of the network a user tries to connect to. T OR F?
FALSE
Internet networks are ________.
PACKET-SWITCHED NETWORKS.
Changing the letter case when typing in host and domain names does not affect the user’s ability to
reach the destination. T OR F?
TRUE
_____________ involves allowing voice packets to gain delivery importance over packets
for applications like e-mail.
PACKET PRIORITIZATION
Many fear that innovation might suffer as a result of the transition of internet services from flat-rate
pricing to metered usage. T OR F?
TRUE
One of the factors that accelerated the development of the Internet during the 1990s was _______________.
THE INVENTION OF GRAPHICAL WEB BROWSING.
Which of the following statements is true of the term “FTTH”?
IT REFERS TO BROADBAND SERVICE
PROVIDED VIA LIGHT-TRANSMITTING FIBER-OPTIC CABLES.
The frequencies licensed by telecommunication firms to provide wireless service is known as
_____________.
WIRELESS SPECTRUM
The fastest last-mile technology is:
FTTH
What is an example of cybersquatting?
ACQUIRING A DOMAIN NAME TO EXTORT A FIRM,
INDIVIDUAL, PRODUCT, OR TRADEMARK HOLDER.
Supporters of net neutrality believe that
It will improve innovation
It will keep costs low
It will level the playing field among competitive services offered over the Internet.
ALL OF THE ABOVE ARE TRUE
None of the above are true
ALL OF THE ABOVE ARE TRUE
Which of the following is the domain name for the website
http://www.nytimes.com/tech/index.html?
NYTIMES
Regularly updated software lowers a system’s vulnerable attack surface. T OR F?
TRUE
A black hat hacker looks for weaknesses in security mechanisms, with a view to help plug the holes
that might be exploited by cyber-criminals. T OR F?
FALSE
Multiple administrators jointly controlling key systems are an unnecessary burden that adds to the
complexity of managing security in an organization. T OR F?
FALSE
The information systems of several firms have been compromised by insiders that can include
contract employees, cleaning staff, and temporary staffers. T OR F?
TRUE
Defensive security professionals responsible for maintaining internal network defenses against all
cyberattacks and threats are known as the blue team. T OR F?
TRUE
Which of the followings aspects of international law would enable a cyber-criminal operating across
borders to evade prosecution?
NON-EXISTENT EXTRADITION AGREEMENTS BETWEEN TWO
COUNTRIES.
A research scientist with a major pharmaceutical firm in New Jersey is caught passing on sensitive
information, worth millions of dollars, regarding the composition and test results of his firm’s latest
drug to a rival company. What crime is he being held responsible for?
CORPORATE ESPIONAGE
Information security policies would be ineffective without ______ and ___________.
AUDIT; ENFORCEMENT
In public-key encryption systems, the functions of the public and private keys are interchangeable. T OR F?
FALSE
In security circles the phrase “compliance” refers to ____________.
LEGAL OR PROFESSIONALLY BINDING STEPS
THAT AN ORGANIZATION MUST TAKE.
A system that monitors network use for potential hacking attempts and takes preventative action to
block, isolate, or identify attempted infiltration, and raise further alarms to warn security personnel is
known as a(n):
INTRUSION DETECTION SYSTEM.
Which of these would be an example of a DDoS attack?
OVERLOADING A POPULAR SOCIAL
NETWORKING SITE WITH INBOUND MESSAGES TO SHUT DOWN ACCESS TO THE SITE.
While many unsophisticated phishing scams can be easily identified by poor grammar and other
suspiciously worded text, scammers are now using generative AI to craft more sophisticated
phishing emails. T OR F?
TRUE
_________ can be either software-based or deployed via hardware, such as a recording “dongle”
that is plugged in between a keyboard and a PC.
KEYLOGGERS
Google matched ChatGPT, launching its own chat-like generative AI tool named Bard. T OR F?
TRUE
After stalling for several years, Microsoft’s market cap has steadily marched higher, passing
Alphabet’s value along the way. T OR F?
TRUE
Google’s Search Generative Experience (SGE) is the firm’s first experiment in blending AI chat with:
TRADITIONAL SEARCH RESULTS.
Which of the following represents the market capitalization of a firm?
SHARE PRICE X NUMBER OF
SHARES
Google mainly only runs ads in search but limits them across their host of Google-owned sites. T OR F?
FALSE
The bulk of Google’s revenue comes from:
ADVERTISING
Google ads can be targeted based on keywords automatically detected inside the content of a
website. T OR F?
TRUE
Which of the following efforts by Google is aimed at encouraging increased smartphone access
worldwide?
GIVING THE ANDROID OS TO MOBILE PHONE MANUFACTURERS FOR FREE.
Which of the following measures can advertisers take to prevent embarrassment through content
adjacency issues?
USING NEGATIVE KEYWORDS
What a person sees when they encounter an ad is known as the:
AD CREATIVE.
Which of the following parameters significantly influences the rank of a Web page in Google’s search
results?
THE NUMBER OF OTHER PAGES LINKING TO GIVEN PAGE
A(n) _______ is a search performed on Google or any other search engine.
QUERY
If a firm’s pages are not near the top of query results, customers may never discover its website. This
has led to _______________ becoming a critical function for many marketing
organizations.
SEARCH ENGINE OPTIMIZATION
Which of the following statements holds true for the term deep Web?
IT REFERS TO INTERNET
CONTENT THAT CAN’T BE INDEXED BY GOOGLE AND OTHER SEARCH ENGINES.
What is a “black hat SEO”?
USING UNAUTHORIZED (AND GOOGLE-PROHIBITED) TECHNIQUES TO
IMPROVE A PAGE’S SEARCH RESULTS.
Third-party data is collected by a company that has had the customer explicitly enter a relationship
with them. T OR F?
FALSE
Each time an ad is shown to a user is known as a(n):
IMPRESSION
Suppose you regularly leave your phone in the car when you arrive at work. You need to have you
phone because it serves as the authentication device for your desktop’s multi-factor login. To avoid
going back to the car daily, you set an alert that reminds you to put the phone in your bag when you
are within one mile of your office. Setting this perimeter is known as:
GEOFENCING
A Privacy Sandbox that could accurately separate a user from a user-impersonating bot could
significantly decrease online ad fraud. T OR F?
TRUE
App stores are exclusively focused on smart-phone markets.T OR F?
FALSE
While large groups of individuals work on key OSS projects, such as the Linux operating system,
some widely used efforts have had fewer developers, creating concerns over quality and security. T OR F?
TRUE
Which of the following sets of software represents the constituents of the LAMP stack?
LINUX,
APACHE, MYSQL, PERL
Installing a complex set of an organization’s legacy systems on someone else’s hardware can be a
brutal challenge. For that reason, we can expect most cloud computing efforts to focus on ____________________.
NEW
SOFTWARE DEVELPMENT PROJECTS.
Products and services designed to target a specific industry are known as:
VERTICAL NICHES
The term “software” is used to refer to:
the set of instructions that tells hardware what to do.
_____ is the term used to represent the physical components of information technology.
Computer hardware
A(n) _____ is software that controls computer hardware and establishes standards for developing and executing applications.
operating system
Even specialty devices like video game consoles, television set-top boxes, Kindles and smart appliances run some form of OS. T OR F?
TRUE
User interface refers to:
the mechanism through which users interact with a computing device.
Operating systems are designed to give programmers a common set of commands to consistently interact with the hardware. These commands make a programmer’s job easier by:
making it faster to write software while minimizing the possibility of errors in code.
Firmware is used to refer to:
a device’s control programs stored on nonvolatile memory chips.
The Nest thermostat or app-controlled lighting and door locks are products referred to as _______________.
the Internet of Things
Embedded systems are special purpose software designed and included inside physical products. T OR F?
TRUE
Products and services that allow for the development and integration of software products and other complementary goods are known as _____.
platforms
_____ refer(s) to applications that address the needs of multiple, simultaneous users in an organization or work group.
Enterprise software
Many firms with similar procedures for accounting, finance, and human resource functions might buy a software package rather than develop their own code. This is usually considered fine since these functions are often not strategic. T OR F?
TRUE
_____ systems help a firm manage aspects of its value chain, from the flow of raw materials into the firm through delivery of finished products, and services at the point-of-consumption.
Supply chain management
Which of the following statements is true regarding enterprise systems?
For many firms, installing and deploying enterprise systems have been difficult, with some firms experiencing loss or even bankruptcy from botched efforts.
Most enterprise software works in conjunction with a _______________, which stores and retrieves the data that an application creates and uses.
database management system (DBMS)
Packaged enterprise systems can:
ease the linking of systems with software
make data more usable
streamline processes
all of the above
all of the above
_____ is a form of computing where systems in different locations communicate and collaborate to complete a task.
Distributed computing
A(n) _____ is software that houses and serves business logic for use by distributed systems.
application server
The terms web services and APIs are often used interchangeably, and refer to code and request/response standards used by this code so that other programs can call these services to perform a task. T OR F?
TRUE
Firms that invite other organizations to integrate with their systems via web services and APIs are often thought of as turning their products into ____________.
PLATFORMS
Organizations that have created a robust set of Web services around their processes and procedures are said to have a(n) _____.
service-oriented architecture
Which of the following is not true about potential benefits to firms that create platforms?
They can widen the reach of firms and products
The potential to make their products and services more useful
All of the above are true
They can create switching costs
They can enhance network effects
All of the above are true
_____ is a set of standards for exchanging messages containing formatted data between computer applications.
Electronic data interchange
EDI is a very old standard. The two main technologies replacing EDI are extensible markup language (XML), and JavaScript Object Notation (JSON). T OR F?
TRUE
Most of the time, server hardware resides on server-class software. T OR F?
FALSE
Rails, Django, AngularJS, and ASP.NET are examples of ____________.
programming frameworks
A(n) _____ is an application for programmers, which includes a text editor, a debugger for sleuthing out errors, and other useful programming tools.
integrated development environment
Java code that runs through the JVM interpreter is slower than the code compiled for the native operating system and processor that make up a platform. T OR F?
TRUE
True platform independence can be defined as:
the ability for developers to write code that can be run everywhere.
Programs written using _____ can be interpreted within their applications, rather than compiled to run directly by a microprocessor.
scripting languages
An open source extension for Python programming language that can run on over 300 devices, _____ was developed by the hardware company Adafruit.
CircuitPython
_______________ are methods to divide tasks related to software creation and deployment up into tasks targeted at building better products.
Software development methodologies
Which of the following has become a dominant software development methodology?
Agile development
Feature creep can be defined as:
an expansion of the scope of a project.
You will often hear scrum described as having roles, artifacts, and blueprints. T OR F?
FALSE
A task board is an example of a(n) ________, while a daily scrum is an example of a(n) _________.
artifact; ceremony
An organization is said to be _____ if its systems operate within required legal constraints, and industry and organizational obligations.
compliant
The costs associated with the design, development, testing, implementation, documentation, training and maintenance of a software system are collectively referred to as:
total cost of ownership.
A process-improvement approach that can assist in assessing the maturity, quality, and development of certain organizational business processes, and suggest steps for their improvement is known as:
capability maturity model integration.
While the Health.gov failure was large and public, it was by no means an anomaly. Research firm the Standish Group estimates that in the past ten years, some ____ percent of large federal information technology projects were unsuccessful.
94
The largest car manufacturer in the world, _____, saw “beating Tesla” as their goal in the electric vehicle (EV) market.
Volkswagen
Manufacturing (an) electric vehicle/s requires ____ compared to (a) vehicle/s with a standard combustion engine.
10 times as much code
Volkswagen iD3 received the following criticism when it appeared on the market:
inconsistent charging software
The fixed cost to produce a software product is effectively zero. T OR F?
FALSE
_____ refers to replacing computing resources, which could include hardware or software, with services provided over the Internet.
Cloud computing
Which software allows a single computer to function as if it were several different computers?
Virtualization software
______________ offerings—free alternatives where anyone can look at and potentially modify a program’s code.
Open source software
Which of the following is considered to be the flagship open source software product?
SAP ERP
Google Docs
Linux
Adobe Flash
Windows Media Player
Linux
What are the open source software stacks used to build Web applications?
LAMP, MEAN
In the context of open source software, the term “hardened” is used to describe:
technology products with particularly strong security features.
_____ is the ability to either handle increasing workloads or to be easily expanded to manage workload increases.
Scalability
In contrast to other major platforms, there has never been a major open source software security vulnerability. T OR F?
FALSE
Those looking to share open source projects, contribute to these projects, or examine the code of projects (a great way to learn) should visit the site ___________.
GitHub
Which of the following is an open source customer relationship management software?
Cassandra
Zimbra
OpenSolaris
SugarCRM
HBase
SugarCRM
Which of the following is an open source e-mail software that competes with Outlook server?
Gimp
MongoDB
Magento
Zimbra
Alfresco
Zimbra
Oracle, a firm that sells commercial ERP and database products, provides Linux for free, selling high-margin Linux support contracts for as much as $500,000. This is an example of:
firms using OSS to wean customers away from competitors.
Total cost of ownership is all the cost associated with the design, development, testing, implementation documentation, training and maintenance of a software system. T OR F?
TRUE
_____ is a form of cloud computing where a firm subscribes to a third-party software-replacing service that is delivered online.
Software as a service
With _______, firms get the most basic offerings but can also do the most customization, putting their own tools (operating systems, databases, programming languages) on top.
IaaS
With platform as a service (PaaS), the vendor supplies the support software and operating system, but the client ____________.
writes their own code.
Which of the following is true about SaaS?
Its associated costs are treated as variable operating expenses rather than fixed capital expenses.
The ____ between the customer and the vendor usually specify the levels of availability, serviceability, performance, operation, or other commitment requirements.
service level agreements
Products and services designed to target a specific industry are known as horizontal niches. T OR F?
FALSE
The major concern regarding software as a service involves:
the high dependence a firm develops with its SaaS vendor.
Which of the following observations regarding software as a service is true?
Radical changes in a SaaS system’s functionality might result in unforeseen training costs.
SaaS means a greater consumerization of technology, which is rarely, if ever, works out well for firms. T OR F?
FALSE
_____ is a scalability solution that is usually provided as an overflow service, kicking in as needed.
Cloudbursting
_____ are unpredicted but highly impactful/spiking events.
Black swans
When complex legacy systems have to be ported,
companies may find it difficult or impossible to move to cloud computing
_____ are massive networks of computer installations running software to coordinate their collective use.
Server farms
The high customer costs of cloud computing raise the barriers to entry for startup technology firms seeking cloud services. T OR F?
FALSE
The competition among cloud providers saw _____ a big winner when its product sales exploded, and _____ a big loser when its capital spending on server farms drastically increased.
Nvidia, Microsoft
A server running _____ software can create smaller compartments in memory that each behave as a separate computer with its own operating system and resources.
virtualization
Virtualization offers firms many advantages, but one disadvantage is that it requires firms to buy more server computers than if organizations had not deployed virtualization. T OR F?
FALSE
________________ are a type of virtualization that allows for shared operating systems, more resource savings and faster execution.
Containers
When a firm runs an instance of a PC’s software on another machine and simply delivers the image of what’s executing to the remote device, it is said to be operating on a(n) _____.
virtual desktop
iBeacon is:
a technology that apps can use to determine a user’s location.
Which of the following is not considered advantages of apps over packaged software and browser-based alternatives?
Most app stores provide localization efforts, translating content uploaded by developers into language systems offered in local app stores throughout the world.
App platforms lower the switching costs of software developers when compared to costs associated with developing browser-based alternatives. T OR F?
FALSE
Most firms will opt for an IT configuration that is 100 percent in-house, packaged, or SaaS. T OR F?
FALSE
Which of the following is usually not an option for firms relying on unique processes, procedures, or technologies that create vital, differentiating competitive advantage?
Purchasing package software from a vendor to automate such efforts
Changing pricing based on demand conditions is known as:
DYNAMIC PRICING
Disney rolled out dynamic pricing with great success for:
The Lion King
RFID technology is often used to ______________.
identify products as they move through an organization’s value chain
_____ is a term describing the extensive use of data, statistical and quantitative analysis, explanatory and predictive models, and fact-based management to drive decisions and actions.
Analytics
___________________ refers to a type of artificial intelligence that leverages massive amounts of data so that computers can improve the accuracy of actions and predictions on their own without additional programming.
Machine learning
_____ is a catchall term combining aspects of reporting, data exploration, and ad hoc queries, and sophisticated data modeling and analysis.
Business intelligence
Beacons technology works by using ___________ technology.
Bluetooth low-energy
Dynamic pricing is considered especially appropriate for retailers, such as grocery stores or department stores. T OR F?
FALSE
____ is insight gained from experience and expertise.
Knowledge
A _____ is either a single table or a collection of related tables.
database
The phrases table, column, and row are also referred to by the names ___________ respectively.
file, field, record
Which of the following is by far the most common standard for expressing databases?
Relational databases
NoSQL technologies are often used with massive, disparately structured data. T OR F?
TRUE
A system that records business-related exchanges, such as a cash register sale, ATM withdrawal, or product return is known as a(n) _____.
transaction processing system
_____ are systems that provide rewards and usage incentives, typically in exchange for a method that provides a more detailed tracking and recording of customer activity.
Loyalty programs
_____ systems are often used to empower employees to track and record data at nearly every point of customer contact.
Customer relationship management
Firms may turn to third parties and outside services to acquire data for predictive models. T OR F?
TRUE
_____ are firms that collect and resell data.
Data aggregators
Which of the following is a true statement regarding the Starbucks Rewards program?
The app allows customers to scan purchases made outside the store.
The problem of incompatible legacy systems limiting firms’ ability to turn data into information is compounded by:
mergers and acquisitions.
Which of the following can be a major roadblock to turning data into information, and inhibits firm agility, holding back operational and strategic initiatives?
Legacy systems
A problem limiting the turning of data into information is that most transactional databases are not set up to be:
simultaneously accessed for reporting and analysis.
A set of databases designed to support decision making in an organization is known as a(n):
data warehouse
A(n) _____ is a database or databases focused on addressing the concerns of a specific problem.
data mart
Data quantity answers the question: How much data do we need? T OR F?
TRUE
Setting up new collection efforts, surveys, or systems to obtain the data is called ________.
data sourcing
Roughly 80 percent of corporate data is messy and unstructured, and stored in conventional, relational formats.T OR F?
FALSE
The three “Vs” of Big Data refer to the names of the three leading commercial and open source technologies used in most of these efforts. T OR F?
FALSE
______ is a set of mostly open source tools to manage massive amounts of unstructured data for storage, extraction, and computation.
Hadoop
The _______ breed of cloud-based data tools is specifically designed to gather data from disparate sources and turn them into standard formats that can be interrogated by managers.
Snowflake
Systems that can absorb any type of data, structured or not, from any type of source are often referred to as:
schema-less.
_____ refers to identifying and retrieving relevant electronic information to support litigation efforts.
E-discovery
Data used in online analytical processing (OLAP) reporting are stored in _____.
data cubes
_____ refers to a method of querying and reporting that takes data from standard relational databases, calculates and summarizes the data, and then stores the data in a special database.
Online analytical processing
The process of taking data from a variety of data sources, not uniformly organized, and transforming the data to a common format is known as:
extract, transform, load
L.L. Bean’s rollout of Big Data efforts for improved customer service involved all of the following except:
None of the above are incorrect—the effort leveraged all of the above.
Training technical staff
Training marketing staff
On-premises technology was moved to Google’s Data Cloud
Reporting tools were made available to nontechnical staff
None of the above are incorrect—the effort leveraged all of the above.
An integrated shopping experience and unified customer view across channels is sometimes referred to as _______________.
omnichannel
Collaborative filtering is determining which customers are likely to leave, and what tactics can help the firm avoid unwanted defections. T OR F?
FALSE
For ____________ to work, the organization must have clean, consistent data; and the events in that data should reflect current and future trends.
data mining
One federal study showed Black and Asian people were about three times more likely than white people to be misidentified by facial recognition. T OR F?
FALSE
The Walmart efficiency dance starts with a proprietary system called _________, a system originally developed in 1991 and continually refined ever since.
Retail Link
Walmart uses Hadoop to sift through social media posts about the firm. T OR F?
TRUE
Walmart stopped sharing its data assets with information brokers like ACNielsen and Information Resources because:
due to Walmart’s huge scale, the agencies offered no extra value with their additional data.
Walmart is focused on expansion in _____, where it has invested over $19.5 billion in “Flipkart.”
INDIA
Which of these are identified in the text as a positive, and a negative, of AI?
automation of mundane tasks; job displacement
Using prompts, ______ learns the data, and generates output (typically some type of media) based on the information gathered from the prompts.
generative AI
What is the difference between GPT and ChatGPT?
ChatGPT is the chatbot; GPT generates the results.
Artificial intelligence doesn’t use ______ but uses computer software to improve products and functions.
human intelligence
LLM stands for _____ model.
large language
The first step of creating an LLM is:
build a foundation model
The data used to train the model in AI before it’s used is:
corpus
Anthropic uses constitutional AI to build what it considers:
a more ethical AI
Google researchers invented ______ which allows AI to produce faster results, processing large amounts of data in parallel.
the Transformer
Goldman Sachs, a financial firm, has predicted that AI could replace up to 44% percent of work done in the _____ field.
legal
Which of these is not one of the fields that will be impacted in a major way by AI?
Construction
Since AI is developing so rapidly, one concern is _____, where the AI engine is deliberately fed incorrect data so incorrect results are generated.
data poisoning
Many AI companies are facing _____ over how they are training their AI engines.
copyright lawsuits
The very beginnings of AI, the foundation models that have to be trained, are the:
naked algorithms
Many AI implementations force radical change to the way a firm conducts business, and the way teams operate; how the organization handles this is:
change management
Due to the complexities of human nature, it’s understandable that AI systems might show _____ that their development teams don’t even realize they have.
biases
Firms can take a number of steps to set their AI engines up for success, including hiring diversely, adding ethicists to the team, and creating
a system review board.
The Echo Nest, an automated music geek, was purchased in 2014 by _____ to help the company create a playlist geared to your taste.
Spotify
Spotify uses AI to create a custom station for a user, called _____, by examining listening habits and playlists.
Discover Weekly
Which of the following allows a firm to serve ads to specific categories of Internet users, so that it can send ads to groups it is most interested in reaching, and those that are most likely to respond to such an effort?
targeting
____ is a nonprofit industry trade group for the interactive advertising industry.
Internet Advertising Bureau
Banner ads are part of a category of online advertising referred to as _______.
display advertising
____ are cost-per-action, where program sponsors pay referring websites a percentage of revenue earned from the referral.
Affiliate programs
One of the largest impacts on the advertising industry is the _____ the creation process.
use of generative artificial intelligence in
Professionals in most industries today rely on _____ to provide connectivity for products and services as well as information about new markets and opportunities.
the Internet
___________ connect to one another, exchanging traffic, and ensuring your messages can get to any other computer that’s online and willing to communicate.
Internet service providers
URL, the address one types into a Web browser, stands for:
Uniform Resource Locator.
The _____ defines the rules for communication between Web browsers and Web servers.
hypertext transfer protocol
You can think of the host as the name of the network you’re trying to connect to, and think of the domain name as the computer you’re looking for on that network. T OR F?
FALSE
Host and domain names are not case sensitive, but path names in URLs are. T OR F?
TRUE
Mistyping path or filenames in a Web address may result in a 404 error, which means:
document not found.
Fault tolerance is the ability for a system to continue operation even if a component fails. T OR F?
TRUE
We need a new standard for Internet addresses since the IPv6 format is nearly at its max. T OR F?
FALSE
One of the problems with the IPv6 rollout is that it is not backward compatible with the existing IPv4 standard. T OR F?
TRUE
The _____ is a distributed database that looks up the host and domain names that a user enters, and returns the actual IP address for the computer that the user wants to communicate with.
domain name service
The temporary storage space used to speed up computing tasks like accessing websites is called a:
CACHE
Exploiting a hole in DNS software in order to redirect users to sites they didn’t request, often to harvest passwords and credit card data is ___________.
cache poisoning.
A(n)_____ refers to a unit of data forwarded by a network.
packet
The _____ protocol works at both the start and endpoint of an Internet communication between two computers to ensure perfect copies of messages are sent and received.
transmission control
The relaying of data packets between the two ends of a communication over the Internet is carried out through special computers called:
routers
UDP (user datagram protocol) works as a TCP stand-in when you’ve got the need for speed, and are willing to sacrifice quality. T OR F?
TRUE
Circuit switching networks are more efficient than packet switching networks. T OR F?
FALSE
When different ISPs connect their networking equipment together to share traffic, it is called:
peering.
The phrase latency refers to:
DELAY
Amdahl’s law states that a system’s speed is:
determined by its slowest component
The dominance of the U.S. Internet industry worldwide is a direct result of United States consistent appearance at the top of speed and cost rankings for consumer last-mile broadband access. T OR F?
FALSE
One criticism of FTTH (Fiber to the home) is that this capacity has to be shared, so if your neighbors are high-bandwidth users, they may reduce your Internet transmission speeds. T OR F?
FALSE
_____ refers to a broadband service provided via light-transmitting fiber-optic cables.
Fiber to the home technology
The term _____________ refers to frequencies used for wireless communication.
spectrum
Wireless systems provided by earth-bound base stations like cell phone towers are referred to as:
terrestrial wireless.
Telecom firms seeking to provide mobile phone and mobile data service ________
must license the right to use wireless spectrum
All of the following are complications associated with implementing 5G services except:
5G transmission points are much larger than even the massive towers used to support 4G.
LTE refers to:
the dominant worldwide 4G wireless transmission technology
Geosynchronous earth orbit (GEO) systems
have a higher latency than LEO systems
Net neutrality is the principle that:
all Internet traffic should be treated equally.
The Achilles heel of DSL lies in the fact that it uses standard copper telephone wiring. T OR F?
TRUE
The advantage of low earth orbit (LEO) over geosynchronous Earth orbit is
the latency is smaller and transmission speeds are faster.
A virtual perimeter around a physical location is
a geofence.
The Kessler Effect is
a feared cascading effect that objects in space will collide and create additional debris.
Which of the following factors is thought to have been at work during the Target security breach?
None of the above
Target’s security software could have automatically deleted detected malware, but this function was turned off.
Malicious code was disguised by using the name of a legitimate software product.
The database for credit card transactions wasn’t sufficiently isolated from other parts of the system.
All of the above.
All of the above.
Although the attack on Target was one of the largest credit card breaches in U.S. business history, the software that executed the attack was not considered to be especially sophisticated.
T OR F?
TRUE
Which of the following is a valid observation regarding information security?
Information security isn’t just a technology problem.
_____ are groups of surreptitiously infiltrated computers linked together and controlled remotely, often also known as zombie networks.
Botnets
An attack in which a firm’s computer systems are flooded with thousands of seemingly legitimate requests, the sheer volume of which will slow or shut down the site, is known as:
distributed denial of service.
_____ refer to protesters seeking to make a political point by leveraging technology tools, often through system infiltration, defacement, or damage.
Hacktivists
Stuxnet showed that with computers at the heart of so many systems, it’s now possible to destroy critical infrastructure without firing a shot. T OR F?
TRUE
Edward Snowden is:
a U.S. government contractor thought whistle-blower by many, who released (in violation of U.S. law) secret documents exposing state-run surveillance networks.
A white hat hacker looks for weaknesses in security mechanisms, with a view to help plug the holes that might be exploited by cyber-criminals. T OR F?
TRUE
Russia’s invasion of Ukraine used _____ in a cyberassault that wiped out Ukraine’s satellite communications network.
ACID RAIN
A data harvester is someone who
collect data for illegal resale after infiltrating systems.
The phrase __________________ refers to security schemes that automatically send one-time use representations of a credit card which can be received and processed by banking and transaction firms at the time of payment. They are used in Apple Pay and Android Pay.
tokenization
Exploits that attempt to infiltrate a computer system by masquerading as something that they are not are called:
TROJAN
The key difference between viruses and worms is that:
worms do not need an executable to spread, unlike viruses.
Keyloggers spyware can be either software-based or hardware-based. T OR F?
TRUE
_____________ is an example of an exploit in which hackers target security vulnerabilities caused by software developers not validating user input.
SQL injection technique
One way to enhance security against malware on smartphones is to modify the phone to work off network. T OR F?
FALSE
VPN software should only be used on an organization’s internal network. Never use VPN software on a public wireless network, as this could give hackers an entryway from your computer into your organization’s secure network. T OR F?
FALSE
One of the physical threats hackers use, sifting through trash searching for valuable data, is called__________________.
dumpster diving
Public key encryption is considered far weaker than private key encryption, so most websites avoid using public key systems. T OR F?
FALSE
____ are attacks that are so new that they haven’t been clearly identified, and so they haven’t made it into security screening systems.
Zero-day exploits
Using a password, with the use of a separate verification code, is an example of
2FA – two-factor authentication.
Con games that trick employees into revealing information or performing other tasks that compromise a firm are known as _____ in security circles.
social engineering
Cons executed through technology and that often try to leverage the reputation of a trusted firm or friend to trick the victim into performing an action or revealing information constitute:
phishing.
The term _____________ refers to forging or disguising the origin or identity.
SPOOF
Two-factor or multi-factor authentication systems can slow consumers down, leading to consumer annoyance and dissatisfaction. T OR F?
TRUE
Which of the following is a precaution a user can take against hacking?
All of the above
Stay Updated
Stay Vigilant
Stay armed
Surf smart
All of the above
Students are discouraged from using over-the-Internet backup services since these are known sources for security vulnerability. T OR F?
FALSE
The ______________ framework represents a series of standards for best practices in implementing, maintaining and improving organizational security.
ISO 27000
A best practice for information security is to stay with mandated security regulations requirements. T OR F?
FALSE
A security tool that is deployed by firms as a phony target to lure or distract attackers and gain information about them is known as a:
HONEYPOT
Programs that use _____ are highly restrictive, permitting communication only with pre-approved entities.
whitelists
Malware _____ are a sort of electronic fingerprint often used to recognize malicious code.
signatures
PCI standards may be used by a merchant to ________.
apply to credit card payments and information.
Over the past several years, online advertising has represented the only advertising category that is consistently trending with positive share growth. T OR F?
TRUE
In fall 2020, Google was stunned by the launch of an AI that surpassed its own:
ChatGPT
Google sells more advertising than any other media company in the world, including Disney, News Corp, Time Warner, and the New York Times corporation. T OR F?
TRUE
____ is the value of a firm calculated by multiplying its share price by the number of shares.
MARKET CAP
____ dominates Internet search and online advertising, with more advertising revenue than any online or offline firm.
Search engine results returned and ranked according to relevance are known as a(n):
NATURAL OR ORGANIC SEARCH
A(n) _____ is software that traverses available Web links in an attempt to perform a given task.
SPIDER
The term _____ refers to Internet content that cannot be indexed by Google and other search engines.
DEEP WEB
Google technology has been engineered so that no single point of failure should interrupt the firm’s operations. Systems that have such safeguards against interruption are said to be:
fault tolerant.
The term for techniques used to improve a page’s rank in search results is:
SEO
Users don’t really search the Internet using Google; they search a copy of Internet content stored on Google’s servers. T OR F?
TRUE
Google gets creative about how its servers are cooled—stormwater runoff is used in the southeastern United States. T OR F?
TRUE
____ is the process of creating a series of bogus websites, all linking back to the pages one is trying to promote.
LINK FRAUD
The practice of designing, running and optimizing search-engine ad campaigns is known as:
search engine marketing.
Advertisements that are targeted based on a user’s query are referred to as _____.
KEYWORD ADVERTISING
Text ads appearing on Google search pages are billed on a(n) _____ basis.
PAY PER CLICK
Ad rank on Google is calculated using the equation: Ad Rank = f (bid value a.k.a. __________ an advertiser is willing to pay, Quality Score, expected impact of extensions and formats).
maximum CPC
The factors that can determine a given ad’s quality score in Google includes the:
click-through rate.
As users spend more time in apps, this presents a challenge to Google’s dominance in search. T OR F?
TRUE
A link that takes a user to a specific webpage (rather than the home page) or which launches an app and brings up a unique location rather than just launching the app is referred to as _____________.
DEEP LINKING
Google’s moves to allow hotel bookings directly from search pages have been well received by its large advertisers, Priceline and Expedia. T OR F?
FALSE
Efforts that link advertisers to content providers willing to host advertisers in exchange for payment, are referred to as _______________.
AD NETWORKS
Advertisers can use _______, which tell networks to avoid showing ads when specific words appear.
NEGATIVE KEYWORDS
Advertising based on a website’s content is known as:
CONTEXTUAL ADVERTISING
Google’s ad network gives it:
DISTRIBUTION
When ChatGPT was released, Alphabet shares
DECREASED IN VALUE 12%
Google is experimenting with blending AI chat with traditional search results, called
Search Generative Experience.
Bard is the AI offering from
To have a higher quality chatbot, consumer feedback shows that the most they’d be willing to pay is
$10 A MONTH
Google has incorporated generative AI into its _____ , allowing editing and object removal, to remain competitive.
PHOTOS
Although Microsoft has been tremendously profitable over the past decade, its stock price has been relatively flat over those years. T OR F?
FALSE
Google assets include brand, scale, network effects, and data. T OR F?
TRUE
YouTube is actually the Internet’s second biggest search engine.T OR F?
TRUE
Google’s size has caused it to be investigated for antitrust violations in Europe. T OR F?
TRUE
Global anti-trust laws are synchronized by world trade bodies, so a ruling in one nation will apply to most other industrialized nations. T OR F?
FALSE
_____ allows users to use their phones pay for goods, store gift cards, collect and redeem coupons and special offers, and manage loyalty programs.
GOOGLE PAY
The technology used to enable the wireless payment scheme in Google Pay is known as
NFC
Android holds over _____ percent of the smartphone OS market.
70
Google Cloud isn’t backing down, and currently is in _____ place in the market.
3RD
Verily was developed by Alphabet’s _____ division.
X
Google’s _____ are responsible for nearly 60 percent of sales to K-12 education.
Chromebooks