Business 104: Information Systems and Computer Applications  /  Business Courses

Test Prep Plan - Take a practice test

Take this practice test to check your existing knowledge of the course material. We'll review your answers and create a Test Prep Plan for you based on your results.
How Test Prep Plans work
1
Answer 50 questions
Test your existing knowledge.
2
View your test results
Based on your results, we'll create a customized Test Prep Plan just for you!
3
Study smarter
Study more effectively: skip concepts you already know and focus on what you still need to learn.

Business, Social, and Ethical Implications and Issues Chapter Exam

Exam Instructions:

Choose your answers to the questions and click 'Next' to see the next set of questions. You can skip questions if you would like and come back to them later with the "Go To First Skipped Question" button. When you have completed the practice exam, a green submit button will appear. Click it to see your results. Good luck!

Page 1

Question 1 1. Creating a desk that helps an employee be more efficient at work is an example of what branch of science?

Answers:

Question 2 2. Your U.S. based business expands to Mexico. This is an example of which of the following?

Answers:

Question 3 3. After the merger of two companies, there are two Chief Financial Officers. Laying off one of them is an example of _____.

Answers:

Question 4 4. Which of the following is NOT a form of protection for intellectual properties

Answers:

Question 5 5. What form of software would you want to avoid in order to protect from hackers?

Answers:

Page 2

Question 6 6. You buy a signed copy of Moby Dick. Can you use the content of the book for your advertising?

Answers:

Question 7 7. Third-party cookies are used for which of the following purposes?

Answers:

Question 8 8. A person who steals your credit card information by breaking into your computer is called a _____.

Answers:

Question 9 9. Free software with code that can be modified is called _____.

Answers:

Question 10 10. A scientist enters false information to make his research seem valid. The scientist is _____.

Answers:

Page 3

Question 11 11. Evil saboteurs want to destroy a company's hardware. What technique might they use to do this?

Answers:

Question 12 12. Spyware does which of the following?

Answers:

Question 13 13. EIM software is used for which of the following purposes?

Answers:

Question 14 14. Which of the following is NOT part of the job design process?

Answers:

Question 15 15. Which of the following is a barrier for e-commerce?

Answers:

Page 4

Question 16 16. Businesses use targeted marketing for all of the following reasons EXCEPT?

Answers:

Question 17 17. What is the basic difference between outsourcing and insourcing?

Answers:

Question 18 18. Which of the following is a disadvantage of outsourcing?

Answers:

Question 19 19. Which of the following is the main purpose of job design?

Answers:

Question 20 20. Yvette's work space includes a contoured chair that prevents stress on her body and a keyboard curved to fit her natural wrist alignment. This functional design is referred to as _____.

Answers:

Page 5

Question 21 21. The best way a business can protect its customers from fraud is to _____.

Answers:

Question 22 22. Jonas spends his time intentionally breaching security to break into personal or e-commerce retailers computers for malicious purposes. Jonas is _____.

Answers:

Question 23 23. Which of the following is an example of an intellectual property?

Answers:

Question 24 24. Which term refers to software that is distributed for free with accessible source code that can be modified and improved by anyone?

Answers:

Question 25 25. Which of the following BEST describes the monitoring of people with technology, often without their knowledge?

Answers:

Page 6

Question 26 26. A small computer program gets stored on a user's hard drive. The program then collects the user's habits and transmits that information to a third party, all without the user's consent. From this description, the small program is _____.

Answers:

Question 27 27. Bill is the new Chief Technology Officer at Z Corp. He plans to use _____ to prevent theft and protect the integrity of Z Corps. data.

Answers:

Question 28 28. When Angela buys a new smartphone that uses retina scanning instead of a password, the phone is using _____ security.

Answers:

Question 29 29. All of the following are ways information technology has changed and reshaped job design EXCEPT:

Answers:

Question 30 30. Companies move jobs to other countries _____.

Answers:

Business, Social, and Ethical Implications and Issues Chapter Exam Instructions

Choose your answers to the questions and click 'Next' to see the next set of questions. You can skip questions if you would like and come back to them later with the "Go To First Skipped Question" button. When you have completed the practice exam, a green submit button will appear. Click it to see your results. Good luck!

Support