A) cybermediary
B) protocol
C) query
D) cache
Correct Answer
verified
Multiple Choice
A) Unlike phishing, pharming uses fake websites to trick people into divulging personal information.
B) Unlike pharming, phishing uses techniques to redirect Internet traffic to fake sites.
C) Unlike phishing, pharming does not require the intended victim to click on a bogus email link.
D) Unlike pharming, phishing is highly sophisticated and difficult to detect.
Correct Answer
verified
Multiple Choice
A) cybermediaries
B) expert systems
C) firewalls
D) extranets
Correct Answer
verified
Multiple Choice
A) A firewall
B) Spyware
C) Adware
D) A rootkit
Correct Answer
verified
Multiple Choice
A) A customer usually does careful multiple research and compares vendors before making a purchase.
B) A customer usually buys a standard product and pays the listed price.
C) Buyers and sellers often develop close and long-lasting relationships.
D) The size of a typical individual transaction is potentially very large.
Correct Answer
verified
Multiple Choice
A) Expert systems
B) Firewalls
C) Cybermediaries
D) Intranet
Correct Answer
verified
Multiple Choice
A) A metropolitan area network
B) An extranet
C) An intranet
D) A peer-to-peer network
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) It is flexible in its problem-solving abilities and can be easily programmed with few decision rules.
B) It will not be able to find a solution to a problem that deviates in any significant way from the specific type of problem it was programmed to solve.
C) It finds it difficult to mimic the rules and guidelines followed by a human expert to solve a particular problem.
D) It will not be able to solve problems in areas such as medical diagnoses, fraud detection, and consumer credit evaluation.
Correct Answer
verified
Multiple Choice
A) Combating Online Infringement and Counterfeits Act
B) Junk Fax Prevention Act
C) Anticybersquatting Consumer Protection Act
D) Controlling the Assault of Non-Solicited Pornography and Marketing Act
Correct Answer
verified
Multiple Choice
A) expert system
B) data warehouse
C) cybermediary
D) business intelligence system
Correct Answer
verified
Multiple Choice
A) Web 2.0
B) Internet2
C) Broadband
D) Cloud computing
Correct Answer
verified
Multiple Choice
A) a firewall
B) spyware
C) malware
D) a spam filter
Correct Answer
verified
Multiple Choice
A) Spyware
B) A cookie
C) Spam
D) A spoof
Correct Answer
verified
Multiple Choice
A) vendor-managed inventory
B) supply chain
C) organizational trail
D) business triage
Correct Answer
verified
Multiple Choice
A) lateral system software.
B) vertical applications software.
C) utility software.
D) office productivity software.
Correct Answer
verified
Multiple Choice
A) extensive negotiation over specifications, delivery, installation, support, and other issues.
B) very large typical individual transactions.
C) customers who do little research and often base their purchases on impulse.
D) firms that seldom develop a close working relationship with individual customers.
Correct Answer
verified
Multiple Choice
A) They are unsolicited commercial emails.
B) They are messages that a receiver has explicitly chosen to receive.
C) They are spam that facilitate pharming.
D) They are used by hackers to break into a computer system.
Correct Answer
verified
Multiple Choice
A) Enterprise 2.0
B) a cybermediary
C) InterNIC
D) Internet2
Correct Answer
verified
Multiple Choice
A) most purchases are based on impulse
B) the negotiations include a large number of business customers
C) the size of a typical individual transaction is relatively small
D) buyers and sellers often develop close and long-lasting relationships
Correct Answer
verified
Showing 81 - 100 of 150
Related Exams