BUS 475 QUIZ 7
BUS 475 Quiz 7
This quiz consist of 30 multiple choice questions. The first 15
questions cover the material in Chapter 12. The second 15 questions
cover the material in Chapter 13.
1.
The phase of
technology that focuses on building material goods and manual labor is:
2.
A group of
people who leap to the most dreadful conclusions while researching health
matters online are called:
3.
The practice of
using fake business emails in order to trick users into divulging personal
data, such as usernames and passwords, is called:
4.
In 2011, 1.2
billion people worldwide used social networking sites:
5.
A 2012 study
found that Internet access in African-American homes was how much less than
Caucasian homes?
6.
The use of
publicly accessed servers to store users’ text photos, videos and other data at
remote sites, rather than on their own computers is called:
7.
The place where
information is stored, ideas are described, and communication takes place in
and through an electronic network of linked systems is called:
8.
Anti-spam
legislation was passed by which country making it a crime to send unsolicited
e-mail messages to people’s private e-mail addresses or cell phones:
9.
This term refers
to the practical applications of science and knowledge to commercial and
organizational activities.
10.
A pain or
numbness in your thumbs caused by constant e-mailing, messaging, or Internet
surfing on hand-held devices is called:
11.
According to an
investigation published in the Archives of Internal Medicine, since the
digitalization of medical records:
12.
According to the
text, despite the world becoming more hyper-connected, this region still
suffers from an important lag in adopting information and communication
technology.
13.
We are currently
in which phase in the development of technology?
14.
This program
intends to bring lower-income Americans online by making broadband Internet
access affordable for households with at least one child and an annual income
below $29,000.
15.
M-Commerce is
facilitated primarily by:
16.
In a survey of
583 U.S. companies, how many were breached at least once by hackers over the
past year?
17.
The application
of engineering to create materials on a molecular or atomic scale is:
18.
The number of
Americans who actively use mobile-banking services in 2009 and thus were
increasingly vulnerable to hacking was:
19.
These individuals
hack into government or corporate computer networks and then release
information to try to embarrass those organizations or gain leverage against
these organizations:
20.
In the United
Kingdom offenders of software piracy and those who breach intellectual property
rights face:
21.
In 2011 this
region contained the highest commercial value of unlicensed (pirated) software:
22.
The “Perfect
Citizen” program, monitored by the National Security Agency, is designed to
protect against cyber assaults focused on:
23.
This term
describes sensors and actuators that are embedded in physical objects – from
roadways to pacemakers – and are linked through wired and wireless networks.
24.
According to the
Center for Responsible Nanotechnology how many separate and severe risks are
associated with nanotechnology.
25.
This
international gathering brought together leaders from the United States and 27
European countries to address the global nature of cyberattacks:
26.
The practice of
downloading copyrighted songs was challenged because it:
27.
Over time the
role of the CIO:
28.
In a study of
CIOs from around the world, McKinsey & Company found that most CIOs
reported to their:
29.
In 2005, the
United Nations approved a declaration that:
30.
The corporate
nemesis responsible for creating and spreading computer attacks is called a:
No comments:
Post a Comment