Q.1
All of the following are types of intellectual property protection except_______.
Q.2
What is a type of virus that spreads itself, not just from file to file, but from computer to computer via e‐mail and other Internet traffic?
Q.3
What describes a process of continuously measuring results and comparing those results to optimal performance so that actual performance may be improved?
Q.4
All of the following are acts Congress has passed or attempted to pass to protect children online except __________.
Q.5
ERP stands for.
Q.6
The ability of consumers to review and contest the accuracy and completeness of data collected about them involves which of the following FTC fair information practice principles?
Q.7
Which process can preventata from lose due to computer problems or human errors?
Q.8
Which of the following is the primary characteristic of an intranet?
Q.9
The ethical principle which states that if an action is not right for all situations, then it is not right for any situation is known as __________.
Q.10
The number of business methods patents granted is ___________ compared to the number of patents applied for.
Q.11
Who protects system from external threats?
Q.12
The redirection of traffic from a legitimate site to an infringing site is called _______.
Q.13
Which of the following is a privacy advocacy group that is a foundation- and business-supported group with a legislative focus?
Q.14
The __________ is the first major effort to adjust the copyright laws to the Internet age.
Q.15
Which process is used to reinstall data from a copy when the original data has been lost?
Q.16
Which concept suggests that different applications and computer systems should be able to communicate with one another?
Q.17
Which of the following statements about privacy is true?
Q.18
Which of the following is a measure of the percentage of purchasers who return to a Web site within a year?
Q.19
Which is not a function of ERP?
Q.20
What defines all of the steps or business rules, from beginning to end, required for a process to run correctly?
Q.21
Who breaks into other people's computer systems and steals and destroys information?
Q.22
A patent grants the owner an exclusive monopoly on the ideas behind the invention for ______ years.
Q.23
Which service encompasses all technologies used to transmit and process information on an across a network?
Q.24
All of the following are metrics for e-mail campaigns except _________.
Q.25
Which is a function of ERP?
Q.26
As consumers become more accustomed to new online advertising formats, click-through rates tend to _______.
Q.27
Which of the following represents a limiting factor for the growth of e-commerce?
Q.28
What determines the future IT infrastructure requirements for new equipment and additional network capacity?
Q.29
All of the following are types of social marketing except ______.
Q.30
What sends work assignments through an e‐mail system?
0 h : 0 m : 1 s