Mcs

A visually engaging image representing e-commerce, information systems, and technology trends, possibly including symbols like gears, databases, shopping carts, and digital icons in a vibrant, modern design.

E-Commerce and Information Systems Quiz

Test your knowledge on e-commerce, information systems, and technology trends with our comprehensive quiz. With a total of 24 thought-provoking questions, you can assess your understanding of vital concepts and their practical implications.

Topics include:

  • Emerging technologies
  • Ethical considerations
  • Database management
  • Information security
  • Customer relationship management
24 Questions6 MinutesCreated by NavigatingData413
The quality of ubiquity, as it relates to e-commerce, is illustrated by:
The availability of the Internet everywhere and anytime
The spread of plentiful, cheap information
The enabling of commerce worldwide
The same set of standards being used across the globe
Which of the following is not one of the current trends in technology that raise ethical considerations, as discussed in class?
Employers monitoring employees at work
Data storage costs increasing
Data analysis advances
Computing power doubles every 18 months
In RFID technology, there are two types of RFID commonly used. When the data can be re-written or modified on the RFID tag, it is considered a(n) ____________ RFID system
Large
Active
Passive
Inventory
The popularity and efficacy of search engines like Google have created a source of:
Entertainment
Inadvertent information disclosure
Phishing
Sniffing
Pretexting
With per click advertising the advertiser only has to pay the host site when:
The customer lands on the host site page
The customer asks a question
The customer reads the advertisement
The customer clicks on the link
The customer buys something
Advertisers can actually purchase search words from Google by using:
SEO optimization
Social networks
Crowdsourcing
Adwords
Mashups
It has been said "information wants to be free" because of factors such as its global distribution/dissemination, ease of creation, and rate of growth. These are factors that indicate ______________.
High marginal cost of production.
Increasing agency costs.
Near-zero marginal cost of production.
Lowering profit margins.
None of the above
As a firm expands, it generally incurs greater managerial costs in monitoring employees. These costs are considered _____________.
Agency costs
Lowering profit margin
Near-zero marginal cost of production
High marginal cost of production
Complementary assets
In its broadest sense, information overload adds to our mental stress because of 2 possible reasons. The first is having too much information to make a quality decision, what is the second possible condition?
Receiving too much information from people we do not know.
Receiving too much information to stay informed about a topic.
Having too much historical information in our archives.
Relying too much on technology to deliver information (e.g. Cell phones, Internet, etc.)
Having too many people in our social networks.
Managing intellectual property, prototyping, product testing, reverse engineering, etc. Are all ways that a ___________________ department would use an information system.
Operations Management
Sales and Marketing
Finance and Accounting
Research and Development
Converting raw data into a more meaningful form is called:
Processing
Taxonomy
Capturing
Feedback
You are in charge of information security at a major consulting firm, and you are asked to integrate new software into the system that stores all of the information for the company. In order to make the decision of which software to use, you first read customer reviews and determine the trends of the two major companies that make the software you need. You discover that they work similarly except that one is slightly cheaper, but has a security issue that hasn't been fixed yet. You know that your boss is looking to spend the least amount possible, but you also know that the risk of having the company's private information stores hacked would yield serious consequences. To make the final decision, you must use your judgement to evaluate whether the cost or security risk is more important. In using your judgement, you are moving from _____________ in the knowledge hierarchy.
Information to knowledge
Knowledge to wisdom
Wisdom to knowledge
Knowledge to information
Knowledge to judgement
Ben's Ice Cream parlour uses an information system to generate internal summaries of seasonal data of customer purchases from last year to this summer, in order to determine how much staff to hire for the upcoming summer. Such a system would fall under which category of information systems?
Management Information System (MIS)
Operational Management System (OMS)
Decision Support Systems (DSS)
Transaction Processing Systems (TPS)
Geographic Information System (GIS)
A database consists of:
Rows, tables, instructions
Metadata, keyboard, relationships
Tables, instructions, relationships
Relationships, rows, tables
CPU, tables, rows
Which of the following is an international standard language for processing a database?
VBA
C++
Visual Basic
Standard Query Language
Structured Query Language
The ________ is a network of networks.
Internet
Intranet
WAN
LAN
Transmission network
PIPEDA stands for:
Personal Information Protection and Electronic Disclosure Act.
Personal Information Protection and Effective Disclosures Act.
Personal Information Protection and Electronic Disclosures Act.
Personal Information Protection and Electronic Documents Act.
Personal Information Protection and Electronic Disclosure Actions.
A classic ethical dilemma is the hypothetical case of a man stealing from a grocery store in order to feed his starving family. If you used the Utilitarian Principle to evaluate this situation, you might argue that stealing the food is:
wrong, because the man would not want the grocery to steal from him.
Wrong, because if everyone were to do this, the concept of personal property is defeated.
Acceptable, because the grocer suffers the least harm.
Acceptable, because the higher value is the survival of the family.
Hackers that break into computers to test for software vulnerability and help fix it are considered to be wearing the ____________ hat, according to traditional hacker ethic:
Black
White
Karma
Top
Which of the following is not a protection strategy for information security?
Authentication and authorization
Frequent updates to software
Detection and response
Maintaining the same password for a long time
Information systems can help firms reduce costs in which of the following ways?
By lowering costs of transactions
Through improved agency in supervising/monitoring
All of the above
Through outsourcing
What kind of strategic business objective(s) would be driving the investment in a Customer Relationship Management (CRM) system?
Competitive advantage
Survival
Regulation
Improved customer experience/relationships
The old filing cabinet, just like a database system used to store customer files in an car sales office would be considered which component of the business process?
Information
Facility
Activity
Resource
A system that generates information summaries to support managerial level decision making is known as a:
Transaction Processing System
Management Information System
Executive Information System
Supply Chain Management System
{"name":"Mcs", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"Test your knowledge on e-commerce, information systems, and technology trends with our comprehensive quiz. With a total of 24 thought-provoking questions, you can assess your understanding of vital concepts and their practical implications. Topics include: Emerging technologies Ethical considerations Database management Information security Customer relationship management","img":"https:/images/course4.png"}
Powered by: Quiz Maker