Exam 16: Managing Information Technology: Finding New Ways to Learn and Link
Exam 1: Business Now: Change Is the Only Constant155 Questions
Exam 2: Economics: The Framework of Business159 Questions
Exam 3: The World Marketplace: Business Without Borders159 Questions
Exam 4: Business Ethics Social Responsibility: Doing Well by Doing Good150 Questions
Exam 5: Business Communication: Creating Delivering Messages That Matter150 Questions
Exam 6: Business Formation: Choosing the Form That Fits150 Questions
Exam 7: Small Business Entrepreneurship: Economic Rocket Fuel150 Questions
Exam 8: Accounting: Decision Making by the Numbers150 Questions
Exam 9: Finance: Acquiring Using Funds to Maximize Value174 Questions
Exam 10: Securities Markets: Trading Financial Resources151 Questions
Exam 11: Marketing: Building Profitable Customer Connections164 Questions
Exam 12: Product and Promotion: Creating and Communicating Value160 Questions
Exam 13: Distribution and Pricing: Right Product, Right Person, Right Place, Right Price149 Questions
Exam 14: Management, Motivation, and Leadership: Bringing Business to Life153 Questions
Exam 15: Human Resource Management: Building a Top Quality Workforce151 Questions
Exam 16: Managing Information Technology: Finding New Ways to Learn and Link150 Questions
Exam 17: Operations Management: Putting It All Together150 Questions
Exam 18: Appendix :personal-Finance-Appendix154 Questions
Select questions type
Zahra buys a product from a high-end store, and the sales representative asks her to fill out a customer registration form so that she can avail discount offers and receive notifications about new products in the future. Although providing one's mailing details is optional, Zahra provides her details as she wants to be updated about any new products that the store has to offer. In this context, which of the following statements is true?
(Multiple Choice)
4.8/5
(21)
Which of the following statements is true of copyright law?
(Multiple Choice)
4.8/5
(29)
In the context of using information technology in the business-to-consumer market, which of the following statements is true of opt-in emails?
(Multiple Choice)
4.8/5
(35)
Taxedo, a finance firm, uses a private network to communicate with its employees. All of its official mails are sent through its private network, which is restricted for others. In this scenario, which of the following networks is used by Taxedo to communicate with its employees?
(Multiple Choice)
4.9/5
(29)
Websites that incorporate interactive and collaborative features to create a richer, more interesting, and more useful experience for their users are known as _____.
(Multiple Choice)
4.7/5
(25)
In the context of e-commerce, eBay and Craigslist are examples of business-to-government e-commerce.
(True/False)
4.8/5
(30)
In business-to-consumer e-commerce, purchases typically involve extensive negotiation.
(True/False)
4.8/5
(26)
_____ is similar to a virus, except that it is an independent program that can spread across computer networks without being attached to other files.
(Multiple Choice)
4.7/5
(33)
Sharon runs a boutique. She gets the raw materials from a cloth mill owner who provides her various fabrics at discounted rates. She installs a system that automatically analyzes her inventory and coordinates with the cloth mill owner whenever the inventory seems low. In this scenario, Sharon displays good business sense and has an efficient:
(Multiple Choice)
4.9/5
(31)
Everything.com, an online cosmetics portal, does not allow its customers to reach the final billing section unless they share its offer links with at least two friends. In this scenario, everything.com uses _____ to communicate its message.
(Multiple Choice)
4.7/5
(31)
Martha sued Joseph for plagiarizing her song "The Speaking Parrots," released as a single in her 2007 album called "Exhaustion." Martha alleged that Joseph's song, titled "As You Speak," was an unauthorized rip-off of her original hit and that Joseph infringed her copyrighted work. In this scenario, Joseph's actions can be referred to as _____.
(Multiple Choice)
4.8/5
(28)
Marco, a 20-year-old debutant, recently released his first novel called "The Whispering Duck." For protection purposes, Marco got his book copyrighted. In this scenario, The Whispering Duck is Marco's _____.
(Multiple Choice)
4.8/5
(38)
In the context of the most common approaches to implementing a business intelligence system, data mining is used to:
(Multiple Choice)
4.8/5
(31)
Which of the following refers to programs that install themselves on computers without the users' knowledge or permission and spread by attaching themselves to other files that are transferred from computer to computer?
(Multiple Choice)
4.9/5
(34)
Business intelligence systems are a new class of decision support systems developed over the past two decades to leverage data storage.
(True/False)
4.8/5
(41)
Which of the following cybermediaries operates Braintree, which is used to handle companies' web and mobile payments?
(Multiple Choice)
4.9/5
(26)
Dropbox is a consumer-focused cloud computing service that allows users to access and share documents and files.
(True/False)
4.8/5
(28)
Kiara, while trying to log in to her bank website, visited a scammer's fake, official-looking website and provided her personal and financial information. The next day, she found out that an amount that she did not transact was deducted from her account. She registered a complaint and found out that the website that she logged in was a fake website. In this scenario, Kiara is a victim of _____.
(Multiple Choice)
4.9/5
(38)
ZumbaUp, a leading jeans brand, realized that a user named PoisonX had breached its security codes and gained unwarranted access to the company's highly classified information. The company was shocked to see all of its business tactics and prospective deals put up online, exposed to everyone. In this scenario, ZumbaUp is a victim of _____.
(Multiple Choice)
4.8/5
(28)
Showing 41 - 60 of 150
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)