Mid Term 220

Only available on StudyMode
  • Download(s) : 33
  • Published : November 11, 2012
Open Document
Text Preview
Take Assessment: Midterm Exam

Page 1 of 9

MGT220. INFORMATION TECHNOLOGY (MGT220) > TAKE ASSESSMENT: MIDTERM EXAM

Take Assessment: Midterm Exam
Name

Midterm Exam

Instructions

Always pick the single best answer. Blank answers will be scored as incorrect.

Multiple Attempts This Test allows 2 attempts. This is attempt number 1. Force Completion This Test can be saved and resumed later.

Question Completion Status:
Question 1

2 points
Sellers generally benefit from e-auctions due to the opportunity to bargain for lower prices.

Save

True
False

Question 2

2 points
Nokia has entered the mobile gaming world. It markets near-distance multiplayer gaming over __________ and wide-area gaming over __________ networks.

Save

A. cellular; local area
B. Bluetooth; cellular
C. GPS; wide area
D. WiMax; analog
E.

Question 3

2 points
Using wireless technologies, one can create applications that are not available with wireline systems.

Save

True
False

Question 4

2 points

Save

2 points
In general, which of the following is true about the transmission of confidential and personal information between an RFID reader and a back-end database protect?

Save

Blogs, mashups, instant messaging, and wikis are examples of A. avatars
B. social computing
C. virtual worlds
D. wireless communications

Question 5

http://coursesite.umtweb.edu/webapps/assessment/take/launch.jsp?course_assessment_id=...

9/25/2012

Take Assessment: Midterm Exam

Page 2 of 9

A. Those transmissions are sent over secure networks to keep the information secure. B. Information sent via those transmissions is protected using encryption. C. RFID tags do not yet contain confidential or personal information. D. Firewalls are used to protect information in transit.

Question 6

2 points
Remote administration Trojans (RATs) are a class of backdoors that are extremely dangerous because they enable remote control over the infected machine.

Save

True
False

Question 7

2 points

Save

2 points
A(n) __________ is an analysis of the benefits of using a specific business model.

Save

Productivity in an enterprise can be measured in terms of:
A. the amount of input per amount of time
B. the ratio of the amount of output to the amount of input
C. the number of units produced
D. market share

Question 8

A. core competency
B. exchange
C. RFQ
D. value proposition

Question 9

2 points
A valuable property of e-tailing is the ability to offer customized products and services to individual customers at a reasonable price and quickly.

Save

True
False

Question 10

2 points
With two-factor authentication, two types of information are used to verify the user's identity, such as passwords and botnets.

Save

True
False

Question 11

2 points
One of the worst and most prevalent crimes is identity theft, which has been made worse by widespread electronic sharing and databases.

http://coursesite.umtweb.edu/webapps/assessment/take/launch.jsp?course_assessment_id=...

Save

9/25/2012

Take Assessment: Midterm Exam

Page 3 of 9

True
False

Question 12

2 points
Directories and hyperlinks from other Web sites and intelligent search agents help buyers find the best stores and products to match their needs

Save

True
False

Question 13

2 points
_________ percent of companies that suffer a significant data loss die within five years, according to Freeman Mendel, the chair of the FBI's 2006 Infragard National Conference.

Save

A. 7
B. 23
C. 57
D. 93

Question 14

2 points
A risk associated with tools that are meant to improve the productivity and quality of life in general is that they can lead to abuses such as intruding on an employee's or manager's personal time.

Save

True
False

Question 15

2 points
Responsibility for internal control and compliance with information security policies rests...
tracking img