Exam 16: Managing Information Technology: Finding New Ways to Learn and Link

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Abel works for Greater Garrisonville Power Company. His job involves the creation of confidential reports and other documents that he posts on an internal server. While employees can view and even download these confidential materials using a web browser, people outside the company have no access to them. This suggests that Garrisonville Power is using an intranet.​

(True/False)
4.7/5
(34)

In the _____ form of e­commerce, firms want to develop customer loyalty and repeat business but seldom develop a close working relationship with individual customers.

(Multiple Choice)
4.8/5
(39)

What is the purpose of the copyright law in the United States?

(Multiple Choice)
4.7/5
(28)

Intellectual property refers to:

(Multiple Choice)
4.8/5
(46)

Viral marketing is the modern form of _____ marketing.

(Multiple Choice)
4.9/5
(39)

A(n) _____ is a request for the database management software to search the database for data that match criteria specified by a user.

(Multiple Choice)
4.9/5
(33)

The popularity of cloud computing is most likely to:

(Multiple Choice)
5.0/5
(38)

Red Eye Shipping Inc. has purchased a business intelligence system. The main advantage of such a system is that it eliminates the need for maintaining large data warehouses and the need for data mining.​​

(True/False)
4.8/5
(33)

A cybermediary is an Internet­based firm specializing in the secure electronic transfer of funds.

(True/False)
4.9/5
(37)

Viral marketing is not as effective as traditional buzz marketing because the latter allows for messages to reach a wider audience at a faster speed.

(True/False)
4.9/5
(37)

"Black hat hackers" are hackers who have no harmful intent. Instead, they hack into computers simply for the intellectual challenge it involves.

(True/False)
4.9/5
(26)

In an effort to make online payments risk free, business­to­consumer (B2C) e­commerce sites use _____.

(Multiple Choice)
4.9/5
(39)

Gus has just downloaded some interesting new free games from a website and installs them on his system. Along with the games, other software is being simultaneously installed on his computer without permission. This software is tracking his computer behavior. It's likely that a careful reading of the end user licensing agreement will reveal that when a user installs the games, he or she:

(Multiple Choice)
4.8/5
(30)

Due to intellectual property restrictions, unauthorized music sharing is considered _____.

(Multiple Choice)
4.8/5
(33)

Orf Technologies is advertising a new paperless statement program. With a few clicks of the mouse, you can now get your statement, pay it, and get a receipt. This is one example of retailers offering _____.

(Multiple Choice)
4.9/5
(34)

Many businesses have been reluctant to embrace cloud computing, citing _____ concerns.

(Multiple Choice)
4.8/5
(30)

The approach to make e­commerce sites more interactive and collaborative, with customers providing most of the content, as well as a richer, more interesting, and more useful experience is known as _____.

(Multiple Choice)
4.8/5
(28)

The two broad categories of software are:

(Multiple Choice)
4.8/5
(39)

Viral marketing is not as effective as traditional buzz marketing because the latter allows for messages to reach a wider audience at a faster speed.

(True/False)
4.9/5
(31)

Security experts suggest that organizations restrict access to computer resources by requiring users to have strong _____.

(Multiple Choice)
5.0/5
(43)
Showing 21 - 40 of 200
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)