Exam 14: Information Technology (IT)for Business

arrow
  • Select Tags
search iconSearch Question
  • Select Tags

Spyware authors can use stolen information to create their own intellectual property.

(True/False)
4.9/5
(33)

Which of the following BEST describes an extranet?

(Multiple Choice)
4.8/5
(39)

The SPAM Act of 2003 is designed to strengthen identity-theft protection.

(True/False)
4.9/5
(46)

What do firms use to avoid privacy invasion and improve productivity?

(Multiple Choice)
4.9/5
(37)

What type of system allows customers electronic access to a supplier's delivery times, increasing sales, profits, customer service, and loyalty?

(Multiple Choice)
4.7/5
(36)

Which type of software searches incoming e-mail and data for indications of a known virus?

(Multiple Choice)
4.9/5
(46)

What is the electronic collection, storage, and retrieval of data referred to as?

(Multiple Choice)
4.7/5
(38)

What is the major limitation of Wi-Fi?

(Multiple Choice)
4.9/5
(39)
Showing 101 - 108 of 108
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)