Exam 14: Information Technology (IT)for Business

arrow
  • Select Tags
search iconSearch Question
  • Select Tags

Flexible production and speedy delivery found in mass customization are dependent on which of the following?

Free
(Multiple Choice)
4.9/5
(36)
Correct Answer:
Verified

E

Which of the following BEST describes enterprise resource planning?

Free
(Multiple Choice)
4.7/5
(38)
Correct Answer:
Verified

B

How do spies attract users to spyware?

Free
(Multiple Choice)
4.9/5
(39)
Correct Answer:
Verified

A

Mass-customization tends to reduce the volume in which companies produce.

(True/False)
4.8/5
(37)

Through data mining, a manager can access demographic information on customers, for example, in order to decide which advertising media may be best to use.

(True/False)
4.8/5
(37)

What is the most common type of network used in businesses?

(Multiple Choice)
4.9/5
(29)

Phishing or pharming involve which of the following?

(Multiple Choice)
4.9/5
(36)

What is the process of sending an e-mail that appears to have come from a trusted source, but is really spam?

(Multiple Choice)
4.8/5
(31)

What is a particularly sinister quality of spyware?

(Multiple Choice)
4.8/5
(40)

Which of the following supports an organization's managers by providing daily reports, schedules, plans, and budgets?

(Multiple Choice)
4.8/5
(30)

Which of the following strengthens identity-theft protection by specifying how documents with personal information must be disposed of?

(Multiple Choice)
4.9/5
(42)

What feature allows people in remote locations to work simultaneously on one document?

(Multiple Choice)
4.8/5
(39)

What advantage does a communication system using VSAT satellite have?

(Multiple Choice)
4.9/5
(39)

Which of the following allow(s)businesses to save time and travel expenses by enabling employees and suppliers to communicate from any location?

(Multiple Choice)
4.7/5
(27)

Which term refers to the unauthorized stealing of personal information from a computer system?

(Multiple Choice)
4.9/5
(38)

Why do firms want to prevent hackers from stealing intellectual property?

(Multiple Choice)
4.9/5
(26)

Where are firewalls typically located?

(Multiple Choice)
4.8/5
(31)

Hardware consists of programs that tell a computer how to function.

(True/False)
4.7/5
(26)

Explain the principle of mass-customization.

(Essay)
4.8/5
(31)

The application of electronic technologies for searching, sifting, and reorganizing pools of data to uncover useful information is called data warehousing.

(True/False)
4.8/5
(33)
Showing 1 - 20 of 108
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)