Exam 16: Managing Information and Technology: Finding New Ways to Learn and Link
Exam 1: Business Now: Change Is the Only Constant97 Questions
Exam 2: Economics: the Framework for Business98 Questions
Exam 3: The World Marketplace: Business Without Borders100 Questions
Exam 4: Business Ethics and Social Responsibility: Doing Well by Doing Good92 Questions
Exam 5: Business Communication: Creating and Delivering Messages That Matter92 Questions
Exam 6: Business Formation: Choosing the Form That Fits89 Questions
Exam 7: Small Business and Entrepreneurship: Economic Rocket Fuel91 Questions
Exam 8: Accounting: Decision Making by the Numbers90 Questions
Exam 9: Finance: Acquiring and Using Funds to Maximize Value110 Questions
Exam 10: Financial Markets: Allocating Financial Resources92 Questions
Exam 11: Marketing: Building Profitable Customer Connections100 Questions
Exam 12: Product and Promotion: Creating and Communicating Value100 Questions
Exam 13: Distribution and Pricing: Right Product Right Person Right Place Right Price91 Questions
Exam 14: Management Motivation and Leadership: Bringing Business to Life95 Questions
Exam 15: Human Resource Management: Building a Top-Quality Workforce89 Questions
Exam 16: Managing Information and Technology: Finding New Ways to Learn and Link91 Questions
Exam 17: Operations Management: Putting It All Together92 Questions
Exam 18: Appendix: Personal Finance92 Questions
Select questions type
Kiara, while trying to login to her bank website, visits a scammer's fake, official-looking website and provides her personal and financial information. The next day, she finds out that an amount has been deducted from her account that she has not transacted. She registers a complaint and finds out that the website which she logged in was a fake website. In this scenario, Kiara is a victim of _____.
(Multiple Choice)
4.8/5
(39)
Zahra buys a product from a high-end store, and the sales representative asks her to fill out a customer registration form so that she can avail discount offers and receive notifications about new products in the future. Although providing one's mailing details is optional, Zahra provides her details as she wants to be updated about any new products that the store has to offer. In this context, which of the following statements is true?
(Multiple Choice)
4.8/5
(31)
_____ is a technology that stores information on a microchip and transmits it to a reader when it is within range.
(Multiple Choice)
4.9/5
(36)
Jack, a sixty-year-old man, is an avid reader. He recently found out the online facility of downloading books. He is happy to have so many options to choose from and to have such easy access to e-books. He downloads books from many websites, and he does not mind using unverified websites for downloading them. In this scenario, Jack is most likely to be vulnerable to _____.
(Multiple Choice)
4.8/5
(33)
__________is an Internet marketing strategy that tries to involve customers and others not employed by the seller in activities that help promote the product.
(Multiple Choice)
4.9/5
(27)
__________is a scam in which official-looking emails are sent to individuals in an attempt to get them to divulge private information such as passwords, usernames, and account numbers.
(Multiple Choice)
4.8/5
(34)
Firms create _____ by offering limited access to certain areas of their private network to a selected group of stakeholders.
(Multiple Choice)
4.9/5
(26)
Zestincorp.com, an online clothes store, asks customers if they wish to receive promotional messages from the website when they checkout their orders. Customers can avail discount offers and receive notifications about new products in the future when they agree to receive promotional messages. In this scenario, zestincorp.com uses _____ as its advertising medium.
(Multiple Choice)
4.8/5
(37)
Drexterios Inc. is a financial firm that deals with public grievances regarding bill payments. It uses a centralized location for storing data from its internal databases as well as external sources to make it easy for its employees and customers to access the information. In this scenario, Drexterios uses a(n) _____ to store the data.
(Multiple Choice)
4.9/5
(35)
Ronald is an avid reader of detective novels. He visits a few websites to look for the latest novels of his favorite author. The next day he finds multiple ads in his inbox suggesting thriller novels from various authors. In this scenario, the malicious software used to track down Ronald's online behavior is _____.
(Multiple Choice)
4.9/5
(48)
Legostine Corp. uses a new high-tech network based on fiber-optic cable. The network utilizes technologies that give it a speed and capacity far exceeding the current network and is available only to Legostine's employees. In this scenario, Legostine Corp. uses _____.
(Multiple Choice)
4.8/5
(31)
Cloud resources are not confined to a specific platform or operating system.
(True/False)
4.9/5
(43)
Word processing, spreadsheet, and personal information management software are examples of vertical applications software.
(True/False)
4.8/5
(31)
Osmectes Corp. has included a feature in its website that enables its employees to receive help from other employees. This support system allows employees to provide information and guidance to others. Employees can seek help regarding any work-related issue through this system. In this scenario, Osmectes Corp. is using _____.
(Multiple Choice)
4.9/5
(48)
A benefit that cloud computing provides to individual users is that:
(Multiple Choice)
4.9/5
(37)
People's Pal, a public sector bank, provides a feature on its website that allows its customers to disburse their bills automatically on a monthly basis. This saves its customers from the hassle of forgetting to pay their bills and paying a fine. In this scenario, People's Pal uses:
(Multiple Choice)
4.8/5
(39)
MergeFirms.com provides a platform for buyers and sellers to engage in business-to-business (B2B) e-commerce. Buyers and sellers get the opportunity to interact with each other and conduct their businesses through it. In this scenario, MergeFirms.com acts as a(n) _____.
(Multiple Choice)
4.9/5
(34)
Alacrity Couriers uses advanced information technology to run its business efficiently. It allows its customers to track their consignments on its website. In this scenario, the use of a(n) _____ enables the customers to check on the status of their consignments.
(Multiple Choice)
4.8/5
(39)
Samaira downloads a lot of files from various websites that leads to the installment of a malicious program on her laptop without her knowledge. The malicious program gets attached to every file she uses and gets transferred to other systems and files. It erases many files from her computer as well. In this scenario, Samaira's laptop most likely has a _____.
(Multiple Choice)
4.8/5
(36)
Sharon runs a boutique. She gets the raw material from a cloth mill owner who provides her various fabrics at discounted rates. She installs a system that automatically analyzes her inventory and coordinates with the cloth mill owner whenever the inventory seems low. In this scenario, Sharon displays good business sense and has an efficient:
(Multiple Choice)
4.8/5
(30)
Showing 41 - 60 of 91
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)