Exam 16: Managing Information Technology: Finding New Ways to Learn and Link

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

When properly implemented, intranets enhance communication and collaboration among:

(Multiple Choice)
4.9/5
(40)

MergeFirms.com provides a platform for buyers and sellers to engage in business-to-business (B2B) e-commerce. Buyers and sellers get the opportunity to interact with each other and conduct their businesses through it. In this scenario, MergeFirms.com acts as a(n) _____.

(Multiple Choice)
4.7/5
(37)

Which of the following statements is true of ransomware?

(Multiple Choice)
4.9/5
(38)

People's Pal, a public sector bank, provides a feature on its website that allows its customers to disburse their due payments automatically on a monthly basis. This saves its customers from the hassle of forgetting to pay their dues and having to pay a fine. In this scenario, People's Pal uses:

(Multiple Choice)
4.7/5
(45)

Steven got arrested for stealing nearly two million dollars from a local bank. Using the Internet, he broke into the bank's computer and illegally accessed personal information and account details of the clients. In this scenario, Steven is a _____.

(Multiple Choice)
4.8/5
(41)

Cloud computing is most likely to:

(Multiple Choice)
4.8/5
(29)

Samaira downloads a lot of files from various websites that leads to the installment of a malicious program on her laptop without her knowledge. The malicious program gets attached to every file she uses and gets transferred to other systems and files. It erases many files from her computer as well. In this scenario, Samaira's laptop most likely has a _____.

(Multiple Choice)
4.8/5
(28)

In business-to-business (B2B) e-commerce, customers usually do little or no research before making a purchase.

(True/False)
4.8/5
(33)

In the context of the characteristics of good information, when information is relevant, it means that:

(Multiple Choice)
4.9/5
(34)

Ronald is an avid reader of detective novels. He visits a few websites to look for the latest novels of his favorite author. The next day he finds multiple ads in his inbox suggesting thriller novels from various authors. In this scenario, the malicious software used to track down Ronald's online behavior is _____.

(Multiple Choice)
4.9/5
(36)

In business-to-consumer (B2C) e-commerce, _____.

(Multiple Choice)
4.8/5
(36)

Demi loves playing online games. She surfs through many websites to find new, interesting games. One day she finds that her mailbox is filled with emails suggesting websites for online games and ads promoting a few online offers. In this scenario, a(n) _____ tracks Demi's computer behavior to send her targeted mails and ads.

(Multiple Choice)
4.8/5
(34)

Jamie visits an unverified website while surfing the Internet. This results in the download of a malicious software that is independent and starts spreading on its own without being attached to other files. Jamie's computer stops functioning properly. In this scenario, Jamie must have downloaded _____.

(Multiple Choice)
4.9/5
(40)

Cognizance, an online news portal, needs to update its website frequently. To achieve this, the IT department of Cognizance develops a system that gives its managers access to large amounts of data and the processing power to convert the data into high-quality information quickly and efficiently. In this scenario, Cognizance has developed _____ to assist its managers.

(Multiple Choice)
4.9/5
(33)

Which of the following statements is true of password management software, such as 1Password?

(Multiple Choice)
4.9/5
(34)

A disadvantage of an expert system is that it:

(Multiple Choice)
4.9/5
(32)

Cloud resources are not confined to a specific platform or operating system.

(True/False)
4.8/5
(31)

Discuss four advantages that businesses using e-marketplaces enjoy.

(Essay)
4.7/5
(37)

The presence of a small closed lock icon near the bottom of your web browser indicates that the site that you are using for your business uses _____.

(Multiple Choice)
4.9/5
(31)

The practice of using text messaging to entice cell phone users to visit a scammer's fake website asking them to provide personal or financial information is referred to as _____.

(Multiple Choice)
4.9/5
(32)
Showing 121 - 140 of 150
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)