Exam 16: Managing Information Technology: Finding New Ways to Learn and Link

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Jack, a sixty-year-old man, is an avid reader. He recently found out the online facility of downloading books. He is happy to have so many options to choose from and to have such easy access to e-books. He downloads books from many websites, and he does not mind using unverified websites for downloading them. In this scenario, Jack is most likely to be vulnerable to _____.

(Multiple Choice)
4.8/5
(30)

Radio frequency identification (RDIF) is used to increase the efficiency of supply chains.

(True/False)
4.8/5
(33)

Brianne's inbox is clogged up by unsolicited email advertisements and has more number of these mails than legitimate messages. This has made it difficult for her to manage her mails. In this scenario, the unwanted email advertisements that Brianne has received are _____.

(Multiple Choice)
4.9/5
(38)

Word processing, spreadsheet, and personal information management software used by different businesses and occupations are examples of:

(Multiple Choice)
4.8/5
(36)

In the context of cybermediaries, _____, operated by PayPal, enables U.S. residents to send money, reload phones, and pay bills in 56 different countries.

(Multiple Choice)
4.8/5
(40)

_____ refers to marketing, buying, selling, and servicing of products over a network, usually the Internet.

(Multiple Choice)
4.9/5
(39)

In the context of e-commerce, most websites transmit online payment information using _____ to ensure safe transactions.

(Multiple Choice)
4.8/5
(37)

Helpers, a nongovernmental organization, launches practbilling.com, a website where all sorts of bills can be paid. It uses a specially designed software to allow hassle-free transactions in the billing and charges a nominal fee from the users. In this scenario, Helpers uses a(n) _____.

(Multiple Choice)
4.8/5
(34)

Jeff, the CEO of Francostico Inc., decides to set up a system that would help its managers with decision making. To design this system, his programmers ask skilled and proficient managers to explain how they solve problems. Then, they devise a program to mimic the specialists' approach, incorporating various rules or guidelines that the specialists use. In this scenario, Jeff seeks to develop a(n) _____ for the managers.

(Multiple Choice)
4.8/5
(36)

Identify a difference between business-to-business (B2B) transactions and business-to-consumer (B2C) transactions.

(Multiple Choice)
4.7/5
(30)
Showing 141 - 150 of 150
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)