Exam 16: Managing Information Technology: Finding New Ways to Learn and Link

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The _____ prohibits the use of false or deceptive subject lines in email messages.

(Multiple Choice)
4.9/5
(32)

A _____ is a request for the database management software to search a database for data that match criteria specified by a user.

(Multiple Choice)
4.7/5
(36)

Osmectes Corp. has included a feature in its website that enables its employees to receive help from other employees. This support system allows employees to provide information and guidance to others. Employees can seek help regarding any work-related issue through this system. In this scenario, Osmectes Corp. is using _____.

(Multiple Choice)
4.9/5
(26)

Which of the following statements is true of business-to-consumer e-commerce?

(Multiple Choice)
4.7/5
(39)

Clomien Corp., a law firm, needs frequent interpretation of its stored data for cross-references and formulation of decisions. It uses a(n) _____ to help it discover subtle and complex relationships hidden in its data.

(Multiple Choice)
4.9/5
(29)

In business-to-business (B2B) e-commerce, _____.

(Multiple Choice)
4.8/5
(34)

Identify a true statement about an expert system.

(Multiple Choice)
4.7/5
(28)

BlueWink, a popular marketing firm, requires a mechanism to protect its confidential data and client details from hackers, cyber criminals, and other security threats. Which of the following should BlueWink use as a safeguard?

(Multiple Choice)
4.9/5
(36)

A business firm notifies all its employees about a general meeting that is to be held the next day and asks them to confirm their attendance at the meeting by clicking on the link provided within the same email message. The firm sends the email through its private network that is accessible only to the management and the employees of the firm. Which of the following information networks is used by the firm to notify its employees?

(Multiple Choice)
4.8/5
(34)

Unlike business-to-consumer (B2C) e-commerce, business-to-business (B2B) e-commerce involves:

(Multiple Choice)
4.7/5
(39)

A(n) _____ is a network of organizations and activities needed to obtain materials and other resources, produce final products, and get those products to their final users.

(Multiple Choice)
4.7/5
(29)

In the context of using information technology in the business-to-consumer market, identify a true statement about opt-in emails.

(Multiple Choice)
4.9/5
(36)

_____ refers to unsolicited commercial emails, usually sent to huge numbers of people with little regard for whether they are interested in the product or not.

(Multiple Choice)
4.8/5
(46)

Which of the following is a difference between phishing and pharming?

(Multiple Choice)
4.8/5
(30)

Augustus, a student undergoing his doctorate program, is working on a thesis that requires him to browse the Internet for information and visit various unverified websites. To protect his computer from the risk of attracting unwanted messages and other security threats, he uses a tool that uses both hardware and software to provide protection against hackers. In the given scenario, Augustus is most likely using _____.

(Multiple Choice)
4.9/5
(32)

Word processing, spreadsheet, and personal information management software are examples of vertical applications software.

(True/False)
4.8/5
(38)

When firms give key stakeholders limited access to certain areas of their intranet, such as allowing suppliers to check on the state of the firm's inventory to plan shipments of parts and materials, the firm is permitting the suppliers to do so through the use of _____.

(Multiple Choice)
5.0/5
(30)

_____ uses hardware or software to create a barrier that prevents unwanted messages or instructions from entering a computer system.

(Multiple Choice)
4.9/5
(26)

_____ is a network based on fiber-optic cable and uses high-speed connectivity to improve education, research, and collaboration.

(Multiple Choice)
4.7/5
(33)

When product designers use computer-aided design (CAD) software to produce technical drawings in three dimensions, they are using:

(Multiple Choice)
4.9/5
(40)
Showing 81 - 100 of 150
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)