FREE! Click here to Join FunTrivia. Thousands of games, quizzes, and lots more!
Quiz about EBusiness and Decision Making 1
Quiz about EBusiness and Decision Making 1

E-Business and Decision Making [1] Quiz


Welcome to the first e-Biz/IT trivia challenge, where you will test your knowledge of e-business and information technology while having fun and competing for points!

A multiple-choice quiz by wrodrigz. Estimated time: 4 mins.
  1. Home
  2. »
  3. Quizzes
  4. »
  5. World Trivia
  6. »
  7. Business World

Author
wrodrigz
Time
4 mins
Type
Multiple Choice
Quiz #
341,480
Updated
Nov 03 22
# Qns
10
Difficulty
Average
Avg Score
7 / 10
Plays
343
Last 3 plays: daver852 (5/10), bradez (8/10), Guest 69 (1/10).
- -
Question 1 of 10
1. What name is given to a computer-savvy person who illegally invades your computer? Hint


Question 2 of 10
2. This individual has a hidden, political or philosophical reason for breaking into your organization systems and will deface your website as a protest. Hint


Question 3 of 10
3. What name is given to a separate and fully-equipped facility to which an organization can move immediately after a disaster and resume business? Hint


Question 4 of 10
4. What secondary storage medium uses rigid disks coated with a magnetically sensitive material and is normally housed together with the recording? Hint


Question 5 of 10
5. In business, what term is used for data that is converted into a meaningful and useful context? Hint


Question 6 of 10
6. What does the acronym WiMAX stand for? Hint


Question 7 of 10
7. What name is given to a means of linking computers using infrared or radio signals, of the kind you will often find in your favorite coffee shop? Hint


Question 8 of 10
8. Which part of the value chain includes firm infrastructure, human resources management, technology development, and procurement? Hint


Question 9 of 10
9. In an organization, who is responsible for overseeing IT usage as well as ensuring the strategic alignment of IT with the business objectives?

Hint


Question 10 of 10
10. According to most business models, which business function receives the greatest benefits from IT? Hint



(Optional) Create a Free FunTrivia ID to save the points you are about to earn:

arrow Select a User ID:
arrow Choose a Password:
arrow Your Email:




Most Recent Scores
Oct 17 2024 : daver852: 5/10
Oct 02 2024 : bradez: 8/10
Sep 24 2024 : Guest 69: 1/10
Sep 23 2024 : ZWOZZE: 2/10

Score Distribution

quiz
Quiz Answer Key and Fun Facts
1. What name is given to a computer-savvy person who illegally invades your computer?

Answer: Hacker

Hackers are instigators of malicious threats. Hackers range from pranksters to organized criminals and even terrorists. Many security experts indicate that securing information systems against malicious threats is like an arms race. Fortunately, some former hackers are being employed by companies to test their systems' vulnerability to cyber attacks.

It's certainly a high-stakes contest requiring continuous update of defenses against an arsenal of weaponry.
2. This individual has a hidden, political or philosophical reason for breaking into your organization systems and will deface your website as a protest.

Answer: Hactivist

The term hactivist derives from the words hacker and activist. The earliest known case of hacktivism has been documented by many, including Mr. Julian Paul Assange, the Australian journalist, hactivist and editor-in-chief of WikiLeaks, a self-proclaimed whistleblower website and channel for government leaks. Assange claims that his organization has released more classified documents than the rest of the world press.

The literature indicates that hacktivism is at least as old as October 1989 when DOE, HEPNET and SPAN (NASA) connected VMS machines were penetrated by the anti-nuclear WANK worm.

In this case, machines had their login screens altered and defaced.
3. What name is given to a separate and fully-equipped facility to which an organization can move immediately after a disaster and resume business?

Answer: hot site

A hot site, also known as backup site, is a must for businesses and organizations located in hurricane-prone areas like Florida, USA. The hot site backup process is possible via real-time synchronization between the original and the backup site. Essentially, the hot or backup site completely mirrors the data of the original site via network links and software.

After a major disruption in the original site, the hot site allows a business to relocate operations with minimal impact to normal operations.
4. What secondary storage medium uses rigid disks coated with a magnetically sensitive material and is normally housed together with the recording?

Answer: Hard drive

Hard drive, also known as Hard Disk Drive, HDD, or simply hard disk, are hardware devises used in personal computers to record data by magnetizing ferromagnetic material. Interestingly, the sequential changes in the direction of the hard drive magnetization represent patterns of binary data bits.
5. In business, what term is used for data that is converted into a meaningful and useful context?

Answer: Information

As an accepted business concept, data is converted into information and information into knowledge. In business, hopefully, knowledge leads to wisdom. Business use data, information and knowledge to generate business intelligence (BI) and to facilitate decision-making.
6. What does the acronym WiMAX stand for?

Answer: Worldwide Interoperability for Microwave Access

Formally, WiMax stands for Worldwide Interoperability for Microwave access, but Wireless Mobile Access is more common. There are several interesting factoids about WiMax and I would like to encourage you to check it out. For instance, in the mid 1990s, several telecommunication companies developed the notion of using fixed broadband wireless networks for potential last mile solutions and to provide an alternate way to deliver Internet connectivity to businesses and individuals.

Their objective was to produce a network with the speed, capacity, and reliability of a hardwired network, while maintaining with the flexibility, simplicity, and low costs of a wireless network.
7. What name is given to a means of linking computers using infrared or radio signals, of the kind you will often find in your favorite coffee shop?

Answer: wi-fi

This awesome term is drawn from the historic "Wide Fidelity' terminology. Simply put, Wi-Fi is a mechanism for wirelessly connecting electronic devices. Essentially, it is the wireless version of Ethernet. Wi-Fi is the wireless equivalent of the wired internal local area networks (LANs) used in companies worldwide.

A Wi-Fi logo from the Wi-Fi Alliance certifies that network devices comply with the IEEE 802.11 wireless Ethernet standards.
8. Which part of the value chain includes firm infrastructure, human resources management, technology development, and procurement?

Answer: Support value activities

Primary Value Chain activities (consisting of in bound logistics, operations, outbound logistics, marketing and sales, and service) are essential to creating value in a way that exceeds the cost of producing a product or service. Business professionals have also identified other categories of activities that provide the necessary support functions (for instance, purchasing the raw materials, IT research & development, recruiting and compensation as well as finance, legal and quality-control development).
9. In an organization, who is responsible for overseeing IT usage as well as ensuring the strategic alignment of IT with the business objectives?

Answer: CIO

In modern organization, the CIO or Chief Information Officer reports directly to the Chief Executive Officer. The CIO must possess an understanding of every aspect of the business coupled as well as broad knowledge of information technologies.
10. According to most business models, which business function receives the greatest benefits from IT?

Answer: Customer Service

Business Information Systems researchers have found that the Customer Service function benefits the greatest from IT, although the financial function follows closely.
Source: Author wrodrigz

This quiz was reviewed by FunTrivia editor stedman before going online.
Any errors found in FunTrivia content are routinely corrected through our feedback system.
11/21/2024, Copyright 2024 FunTrivia, Inc. - Report an Error / Contact Us