Description : What is a fully‐equipped computer that you wear as a piece of clothing or attached to a piece of clothing similar to the way you would carry your cell phone on your belt? a. Wearable computer b. GPS c. Implant chip d. None of the above
Last Answer : a. Wearable computer
Description : Which of the following can be used to help identify people in a crowd? a. Biochip b. Implant chip c. Facial recognition software d. Vision chip
Last Answer : c. Facial recognition software
Description : Which type of technology will increase portability and mobility? a. Implant chips b. Micro‐payments c. Internet phone calls d. All of the above
Last Answer : d. All of the above
Description : The presence of ‐‐‐‐‐‐‐‐‐‐‐ make the smart card smart. a. Memory b. Microchip c. E‐cash d. None of the above
Last Answer : b. Microchip
Description : How do I change the information on my pet's microchip Since it was implanted, our address, phone number, and even his name have changed.I see no instructions on the AVID web site.?
Last Answer : Call the place that issued the microchip (in your case AVID) and change the information there. The chip contains a bar code to get to the correct information, not the information itself.
Description : What are plastic cards the size of a credit card that contains an embedded chip on which digital information can be stored? a. Customer relationship management systems cards b. E‐government identity cards c. FEDI cards d. Smart cards
Last Answer : d. Smart cards
Description : Which process can prevent data from lose due to computer problems or human errors? a. backup b. recovery c. benchmarking d. data cleansing
Last Answer : a. backup
Description : Would you consider implanting a GPS chip [or similar technology] in your child's body?
Last Answer : I don’t have children, but no fucking way. That scares the shit out of me. Dogs and cats is one thing, but people…
Description : Which is the most important component of IT? a. Information b. People c. Information technology d. Computers
Last Answer : b. People
Description : What charts (1) the cost to your organization of the unavailability of information and technology and (2) the cost to your organization of recovering from a disaster over time? a. Disaster recovery plan b. Hot site c. Cold site d. Disaster recovery cost curve
Last Answer : d. Disaster recovery cost curve
Description : Which of the following statements accurately reflect the impact of technology? a. Technology has caused buyer power to increase b. Technology has lessened the entry barriers for many industries c. Technology has increased the threat of substitute products and services d. all of the above
Last Answer : d. all of the above
Description : Who breaks into other people's computer systems and steals and destroys information? a. Hackers b. softwares c. Hacktivists d. Script kiddies
Last Answer : a. Hackers
Description : Which is not a function of ERP? a. Human resource management b. financial c. warehousing d. None of the above
Last Answer : d. None of the above
Description : Cost considerations aside, would you want your loved ones to have a GPS locator implant?
Last Answer : If, IF there could be a way so that nobody outside the family could use a device to track someone like if someone in our family held the sole, singular tracker thingamajig, then sure, I don't see ... with it. Except someone would find a way to Big Brother the whole thing it's a slippery slope.
Description : Who said that the roots of unavoidable authoritarianism are deeply implanted in the human involvementwith science and technology? a. Karl Marx. b. Friedrich Engels. c. Immanuel Kant. d. John Locke.
Last Answer : b. Friedrich Engels.
Description : Which will harm computer resources a. Worm b. Virus c. Trojan horse d. All the above
Last Answer : d. All the above
Description : ‐‐‐‐‐‐‐‐‐‐‐‐‐‐ is an act that poses danger to computer assets. a. Threat b. Danger c. Error d. None of the above
Last Answer : a. Threat
Description : What is a program, when installed on a computer, records every keystroke and mouse click? a. Key logger software b. Hardware key logger c. Cookie d. Adware
Last Answer : a. Key logger software
Description : E‐mail messages may be stored on which of the following computers? a. Sender's computer b. Sender's server c. Recipient's server d. All of the above
Description : What checks out your computer or network for potential weaknesses? a. Encryption b. Public key encryption c. Security‐auditing software d. None of the above
Last Answer : c. Security‐auditing software
Description : What software detects and removes or quarantines computer viruses? a. Backup b. Anti‐virus c. Firewall d. Biometrics
Last Answer : b. Anti‐virus
Description : What is the process of making a copy of the information stored on a computer? a. Backup b. Anti‐virus c. Firewall d. Biometrics
Last Answer : a. Backup
Description : What harnesses far‐flung computers together by way of the Internet or a virtual private network to share CPU power, databases, and database storage? a. Computer virus b. Worm c. Denial‐of‐service attack d. None of the above
Description : What floods a Web site with so many requests for service that it slows down or crashes? a. Computer virus b. Worm c. Denial‐of‐service attack d. None of the above
Last Answer : c. Denial‐of‐service attack
Description : What is a type of virus that spreads itself, not just from file to file, but from computer to computer via e‐mail and other Internet traffic? a. Computer virus b. Worm c. Denial‐of‐service attack d. None of the above
Last Answer : b. Worm
Description : What is software that comes hidden in free downloadable software and tracks your online movements, mines the information stored on your computer, or uses your computer's CPU and storage for some task you know ... about? a. Web log b. Clickstream c. Anonymous Web browsing service d. None of the above
Description : Which concept suggests that different applications and computer systems should be able to communicate with one another? a. Integration b. Web services c. Scalability d. Interoperability
Last Answer : d. Interoperability
Description : Which will not harm computer resources a. firewall b. Virus c. Trojan horse d. None of the above
Last Answer : a. firewall
Description : What is a separate facility that does not have any computer equipment but is a place where the knowledge workers can move after the disaster? a. Disaster recovery plan b. Hot site c. Cold site d. Disaster recovery cost curve
Last Answer : c. Cold site
Description : What is the name for direct computer‐to‐computer transfer of transaction information contained in standard business documents? a. internet commerce b. e‐commerce c. transaction information transfer d. electronic data interchange
Last Answer : d. electronic data interchange
Description : Do you have a GPS-enabled digital camera?
Last Answer : Since you will be using the camera in NYC, a heavily populated wi-fi area, have you considered buying a geotagging SD card instead? Then you could put it into a camera that you want based on the cameras ... from your camera to your computer, without taking the SD card out. That's always a plus. :)
Description : help i need to find me lg420g phone it has gps enabled, please help?
Last Answer : help i need to find me lg420g phone it has gps enabled, please help
Description : The practice of forging a return address on an e‐mail so that the recipient is fooled into revealing private information is termed? a. hacking b. cracking c. dumpster diving d. spoofing
Last Answer : d. spoofing
Description : In human female, the blastocyst (a) forms placenta even before implantation (b) gets implanted into uterus 3 days after ovulation (c) gets nutrition from uterine endometrial secretion only after implantation (d) gets implanted in endometrium by the trophoblast cells.
Last Answer : (d) gets implanted in endometrium by the trophoblast cells.
Description : What price should I charge someone to design an e-commerce website?
Last Answer : answer:Heh, If I was using Joomla I'd be charging a lot, since I don't like Joomla ;^P In seriousness, it's hard to know how much to charge. I have run into this problem ... charged is for that specific set of requirements and that any additions not covered by the requirements will cost extra.
Description : The viruses spreads through‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Mails b. Pen drives and cds c. Websites d. All the above
Description : The virus that are attached with vb and java files are called a. Macro b. Trojan horse c. Script virus d. None of the above
Last Answer : c. Script virus
Description : The virus that are commonly found in word documents are called‐‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Macro b. Trojan horse c. Script virus d. None of the above
Last Answer : a. Macro
Description : During E‐commerce transaction we should ensure‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Integrity b. Security c. Confidentiality d. All the above
Description : The study of encryption is called‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Decryption b. Cryptography c. Firewall d. All the above
Last Answer : b. Cryptography
Description : Which one is not a layer of E‐commerce infrastructure a. Physical layer b. Product layer c. Service layer d. None
Last Answer : d. None
Description : Which type deals with auction? a. B2B b. B2C c. C2B d. C2C
Last Answer : d. C2C
Description : What is an arrangement made between e‐commerce sites that direct users from one site to the other? a. Spam b. Viral marketing c. Affiliate programs d. None of the above
Last Answer : c. Affiliate programs
Description : Cyber slacking consists of what activities? a. Visiting “inappropriate” web sites b. Visiting news sites c. Chatting online with others about non‐work topics d. All of the above
Description : What is the legal protection afforded an expression of an idea, such as a song, video game, and some types of proprietary documents? a. Ethics b. Intellectual property c. Copyright d. Fair Use Doctrine
Last Answer : c. Copyright
Description : Public key cryptography is also known as ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐cryptography. a. Private key b. Symmetric c. Asymmetric d. None
Last Answer : c. Asymmetric
Description : Private Key cryptography is also known as ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐cryptography. a. Public key b. Symmetric c. Asymmetric d. None
Last Answer : b. Symmetric
Description : Which one is not a threat for E‐commerce a. Trojan horse b. Viruses c. Worm d. None
Description : OTP stands for a. On Time Password b. On Time processing c. One time processor d. None
Last Answer : a. On Time Password