CORRECT ANSWERS
government-to-business (G2B) - CORRECT ANSWER✔✔E-government category that includes
interactions between governments and businesses (government selling to businesses and
providing them with services and businesses selling products and services to the government).
government-to-citizens (G2C) - CORRECT ANSWER✔✔E-government category that includes all
the interactions between a government and its citizens.
government-to-employees (G2E) - CORRECT ANSWER✔✔E-government category that includes
activities and services between government units and their employees.
government-to-government (G2G) - CORRECT ANSWER✔✔E-government category that includes
activities within government units and those between governments.
green computing - CORRECT ANSWER✔✔The study and practice of ecofriendly computing
resources; is now a key concern of businesses in all industriesnot just environmental
organizations.
green IT - CORRECT ANSWER✔✔Green IT begins with manufacturers producing environmentally
friendly products and encouraging IT departments to consider more friendly options like
virtualization, power management, and proper recycling habits.
group purchasing - CORRECT ANSWER✔✔The aggregation of orders from several buyers into
volume purchases so that better prices can be negotiated.
hacker - CORRECT ANSWER✔✔Someone who gains unauthorized access to a computer system.
,hash - CORRECT ANSWER✔✔A mathematical computation that is applied to a message, using a
private key, to encrypt the message.
hit - CORRECT ANSWER✔✔A request for data from a Web page or file.
honeynet - CORRECT ANSWER✔✔A network of honeypots.
honeypot - CORRECT ANSWER✔✔Production system (e.g., firewalls, routers, Web servers,
database servers) that looks like it does real work, but that acts as a decoy and is watched to
study how network intrusions occur.
horizontal marketplaces - CORRECT ANSWER✔✔Markets that concentrate on a service,
material, or a product that is used in all types of industries (e.g., office supplies, PCs).
identity theft - CORRECT ANSWER✔✔Fraud that involves stealing an identity of a person and
then the use of that identity by someone pretending to be someone else in order to steal
money or get other benefits.
incubator - CORRECT ANSWER✔✔A company, university, or nonprofit organization that
supports businesses in their initial stages of development.
indirect materials - CORRECT ANSWER✔✔Materials used to support production (e.g., office
supplies or lightbulbs).
infomediaries - CORRECT ANSWER✔✔Electronic intermediaries that provide and/or control
information flow in cyberspace, often aggregating information and selling it to others.
,information architecture - CORRECT ANSWER✔✔How the site and its Web pages are organized,
labeled, and navigated to support browsing and searching throughout the Web site.
information assurance (IA) - CORRECT ANSWER✔✔The protection of information systems
against unauthorized access to or modification of information whether in storage, processing, or
transit, and against the denial of service to authorized users, including those measures
necessary to detect, document, and counter such threats.
information visibility - CORRECT ANSWER✔✔The process of sharing critical data required to
manage the flow of products, services, and information in real time between suppliers and
customers along the supply chain.
informational Web site - CORRECT ANSWER✔✔A Web site that does little more than provide
information about the business and its products and services.
infringement - CORRECT ANSWER✔✔Use of the work without permission or contracting for
payment of a royalty.
insourcing - CORRECT ANSWER✔✔In-house development of applications.
integration testing - CORRECT ANSWER✔✔Testing the combination of application modules
acting in concert.
integrity - CORRECT ANSWER✔✔Assurance that stored data has not been modified without
authorization; a message that was sent is the same message as that which was received.
intellectual property - CORRECT ANSWER✔✔Creations of the mind, such as inventions, literary
and artistic works, and symbols, names, images, and designs, used in commerce.
, intelligent agents - CORRECT ANSWER✔✔Software applications that have some degree of
reactivity, autonomy, and adaptabilityas is needed in unpredictable attack situations. An agent is
able to adapt itself based on changes occurring in its environment.
interactive marketing - CORRECT ANSWER✔✔Online marketing, facilitated by the Internet, by
which marketers and advertisers can interact directly with customers, and consumers can
interact with advertisers/vendors.
interactive voice response (IVR) - CORRECT ANSWER✔✔A voice system that enables users to
request and receive information and to enter and change data through a telephone to a
computerized system.
interactive Web site - CORRECT ANSWER✔✔A Web site that provides opportunities for the
customers and the business to communicate and share information.
intermediary - CORRECT ANSWER✔✔A third party that operates between sellers and buyers.
internal control environment - CORRECT ANSWER✔✔The work atmosphere that a company sets
for its employees.
internal procurement marketplace - CORRECT ANSWER✔✔The aggregated catalogs of all
approved suppliers combined into a single internal electronic catalog.
Internet radio - CORRECT ANSWER✔✔A Web site that provides music, talk, and other
entertainment, both live and stored, from a variety of radio stations.
Internet underground economy - CORRECT ANSWER✔✔E-markets for stolen information made
up of thousands of Web sites that sell credit card numbers, social security numbers, other data
such as numbers of bank accounts, social network IDs, passwords, and much more.