- This topic has 0 replies, 1 voice, and was last updated 7 years, 11 months ago by sheikh100.
-
AuthorPosts
-
October 31, 2016 at 6:28 am #1507sheikh100Participant
7 program source code made available for use or modification as seen
A reverse engineering
B open source code
C competitive intelligence
D cybersquatting
8 technique used to evaluate reliabihty and delesmunited the effect of system equipment is a called
A ISO 9001 family of standards
B failure mode and effects analysis
C safety critical system
D risk analysis
9 the hatassment torent humuilsthoo or theecating of are minar by authiser enrolad group minors via the internet or cell phone is called
A cyberstalking
B virtual marketing
C cyberbullying
D cybersquatting
10 stealing someone’s ideas or words and passing them off as are own is called
A reverse engineering
B open source code
C competitive intelligence
D cybersquatting
E plagiarism
11 —— defines, measures, and refines the quality of the development process and developed
A safety- critical system
B failure mode and effects analysis
C reverse engineering
D quality management
12 ——- is the technique used to evaluate reliability and determine the system and equipment failures
A safety critical system
B failure mode and effects analysis
C reverse engineering
D quality management
13 the gulf between those who do/don’t have access to cell phones, personal compound
Internet is called
A gross domestic product
B electronics records
C digital divide
D telework productivity
14 —— provides medical care people when live fee away from health care
A mobile and wireless technology
B electronics helth records
C telemedicine
D telecommuting
15 the threatening behavior or unwanted advances using the internet or online and electronics
Communications is called
A Cyberstalking
B virtual marketing
C cyberbullying
D cybersquatting
16 the process by the which users pass along marketing massage to others , creating the potential for
Exponential growth is referred to as
A direct advertising
B social shopping
C virtual marketing
D indirect advertising
17 ——is the approach to meet staffing needs and fulfill long term business arrangement
A green computing
B whistleblowing
C outsourcing
D social marketing
18 whistleblowers are prepared to take full responsibility for their actions and risk losing person and financial security counter accusation and isolation
A true
B false
19 a personal website or web page on which an individual records opinions, link to other sit
An a regular basis is called
A electronics commerce
B blog
C information management system
D social network
20 standard of living aims to provides level of material comfort measured by the goods secret
And luxuries available
A true
B false
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 -
AuthorPosts
- You must be logged in to reply to this topic.