Exam 16: Managing Information and Technology: Finding New Ways to Learn and Link

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following is true of expert systems?

(Multiple Choice)
4.8/5
(26)

Horizontal applications software consists of highly specialized applications used in a particular industry, such as brokerage firms.

(True/False)
5.0/5
(34)

Word processing, spreadsheet, and personal information management software used by different businesses and occupations are examples of:

(Multiple Choice)
4.9/5
(31)

Which of the following is an advantage of a broadband Internet connection?

(Multiple Choice)
4.8/5
(42)

Habib, a writer, uses Microsoft Word to write, edit, and prepare his manuscripts for publication. Microsoft Word helps Habib to complete his work with minimal effort. In this scenario, Habib is using _____.

(Multiple Choice)
4.9/5
(33)

A__________is a request for the database management software to search a database for data that match criteria specified by a user.

(Multiple Choice)
4.8/5
(39)

Which of the following statements is true of radio frequency identification?

(Multiple Choice)
4.9/5
(34)

Websites that incorporate interactive and collaborative features to create a richer, more interesting, and more useful experience for their users are known as _____.

(Multiple Choice)
4.9/5
(49)

Identify a true statement about radio frequency identification.

(Multiple Choice)
4.8/5
(30)

In the context of electronic bill presentment and payment, the method of biller-direct is one where consumers receive email reminders and then pay their bills at the company website.

(True/False)
4.9/5
(22)

A(n) _____ gives managers access to large amounts of data and the processing power to convert the data into high-quality information quickly and efficiently.

(Multiple Choice)
4.9/5
(37)

An advantage of an expert system is that it is capable of solving a wide variety of problems, including those that are quite different from the problems it was originally designed to solve.

(True/False)
4.8/5
(31)

Steven got arrested for stealing nearly two million dollars from a local bank. Using the Internet, he broke into the bank's computer and illegally accessed personal information and account details of the clients. In this scenario, Steven is a _____.

(Multiple Choice)
4.9/5
(30)

Augustus, a student undergoing his doctorate program, is working on a thesis that requires him to browse the Internet for information and visit various unverified websites. To protect his computer from the risk of attracting unwanted messages and other security threats, he uses a tool that uses both hardware and software to provide protection against hackers. In the given scenario, Augustus is most likely using _____.

(Multiple Choice)
4.8/5
(33)

ZumbaUp, a leading jeans brand, realized that a user named PoisonX had breached its security codes and gained unwarranted access to the company's highly classified information. The company was shocked to see all of its business tactics and prospective deals put up online, exposed to everyone. In this scenario, ZumbaUp is a victim of _____.

(Multiple Choice)
4.7/5
(32)

_____ refers to marketing, buying, selling, and servicing of products over a network, usually the Internet.

(Multiple Choice)
4.9/5
(42)

Brianne's inbox is clogged up by unsolicited email advertisements and has more number of these mails than legitimate messages. This has made it difficult for her to manage her mails. In this scenario, the unwanted email advertisements that Brianne has received are _____.

(Multiple Choice)
4.7/5
(32)

SafeTransact is an Internet-based company that specializes in the secure electronic transfer of funds between businesses and clients. It uses some Internet tools to ensure the security of the online transactions. In this scenario, SafeTransact is a(n) _____.

(Multiple Choice)
4.8/5
(39)

Businesses develop intranets so that valued customers have access to internal information that is not available to the general public.

(True/False)
4.8/5
(27)

BlueWink, a popular marketing firm, requires a mechanism to protect its confidential data and client details from hackers, cyber criminals, and other security threats. Which of the following should BlueWink use as a safeguard?

(Multiple Choice)
4.9/5
(33)
Showing 21 - 40 of 91
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)