- When a transaction is processed online, how can the merchant verify the customer’s identity?
a. use secure sockets layers
b. use secure electronic transactions
c. use electronic data interchange
d. use financial electronic data interchange
Answer: (b) use secure electronic transactions
2. The practice of forging a return address on an e‐mail so that the recipient is fooled into revealing private information is termed?
a. hacking
b. cracking
c. dumpster diving
d. spoofing
Answer: (d) spoofing
3. What is a model of a proposed product, service, or system?
a. Prototyping
b. Prototype
c. Proof‐of‐concept prototype
d. Selling prototype
Answer: (b) Prototype
4. What is an internal organizational Internet that is guarded against outside access by a special security feature called a firewall (which can be software, hardware, or a combination of the two)?
a. Client/server network
b. Intranet
c. Extranet
d. Thin client
Answer: (b) Intranet
5. What is an intranet that is restricted to an organization and certain outsiders, such as customers and suppliers?
a. Client/server network
b. Intranet
c. Extranet
d. Thin client
Answer: (c) Extranet
6. What is a detailed process for recovering information or an IT system in the event of a catastrophic disaster such as a fire or flood?
a. Disaster recovery plan
b. Hot site
c. Cold site
d. Disaster recovery cost curve
Answer: (a) Disaster recovery plan
7. What is a separate facility that does not have any computer equipment but is a place where the knowledge workers can move after the disaster?
a. Disaster recovery plan
b. Hot site
c. Cold site
d. Disaster recovery cost curve
Answer: (c) Cold site
8. What is a separate and fully equipped facility where the company can move immediately after the disaster and resume business?
a. Disaster recovery plan
b. Hot site
c. Cold site
d. Disaster recovery cost curve
Answer: (b) Hot site
9. What charts (1) the cost to your organization of the unavailability of information and technology and (2) the cost to your organization of recovering from a disaster over time?
a. Disaster recovery plan
b. Hot site
c. Cold site
d. Disaster recovery cost curve
Answer: (d) Disaster recovery cost curve
10. Which factor determines when your IT system will be available for knowledge workers to access?
a. Availability
b. Accessibility
c. Reliability
d. None of the above
Answer: (a) Availability
11. Which factor determines who has the right to access different types of IT systems and information?
a. Availability
b. Accessibility
c. Reliability
d. Scalability
Answer: (b) Accessibility
12. Which factor ensures your IT systems are functioning correctly and providing accurate information?
a. Availability
b. Accessibility
c. Reliability
d. Scalability
Answer: (c) Reliability
13. Which factor represents how well your system can adapt to increased demands?
a. Availability
b. Accessibility
c. Reliability
d. Scalability
Answer: (d) Scalability
14. Which factor represents a system’s ability to change quickly?
a. Flexibility
b. Performance
c. Capacity planning
d. Benchmark
Answer: (a) Flexibility
15. What is a set of conditions used to measure how well a product or system functions?
a. Flexibility
b. Performance
c. Capacity planning
d. Benchmark
Answer: (d) Benchmark
16. What determines the future IT infrastructure requirements for new equipment and additional network capacity?
a. Flexibility
b. Performance
c. Capacity planning
d. Benchmark
Answer: (c) Capacity planning
17. What automates business processes?
a. Workflow
b. ASP
c. Workflow system
d. EIP
Answer: (c) Workflow system
18. What defines all of the steps or business rules, from beginning to end, required for a process to run correctly?
a. Workflow
b. EIP
c. Workflow system
d. SLA
Answer: (a) Workflow
19. What sends work assignments through an e‐mail system?
a. Database‐based enterprise information portal
b. Messaging‐based enterprise information portal
c. Database‐based workflow system
d. Messaging‐based workflow system
Answer: (d) Messaging‐based workflow system
20. Which will not harm computer resources
a. firewall
b. Virus
c. Trojan horse
d. None of the above
Answer: (a) firewall
21. Which is not a function of ERP?
a. Warehousing
b. sales
c. scheduling
d. None of the above
Answer: (d) None of the above
22. Which is a function of ERP?
a. Warehousing
b. sales
c. scheduling
d. all of the above
Answer: (d) all of the above
23. Which of the following is the primary characteristic of an intranet?
a. People outside the organization can access it
b. People inside the organization can’t access it
c. People outside the organization can’t access it
d. None of the above
Answer: (c) People outside the organization can’t access it
24. Which concept suggests that different applications and computer systems should be able to communicate with one another?
a. Integration
b. Web services
c. Scalability
d. Interoperability
Answer: (d) Interoperability
25. Which service encompasses all technologies used to transmit and process information on an across a network?
a. Interoperability
b. Scalability
c. Benchmarking
d. Web services
Answer: (d) Web services
26. Which process can prevent data from lose due to computer problems or human errors?
a. backup
b. recovery
c. benchmarking
d. data cleansing
Answer: (a) backup
27. Which process is used to reinstall data from a copy when the original data has been lost?
a. backup
b. recovery
c. benchmarking
d. data cleansing
Answer: (b) recovery
28. What describes a process of continuously measuring results and comparing those results to optimal performance so that actual performance may be improved?
a. Performance
b. Capacity planning
c. Benchmarking
d. Data cleansing
Answer: (c) Benchmarking
29. Who protects system from external threats?
a. firewall
b. EDI
c. ERP
d. Script kiddies
Answer: (a) firewall
30. Who breaks into other people’s computer systems and steals and destroys information?
a. Hackers
b. software’s
c. Hacktivists
d. Script kiddies
Answer: (a) Hackers