Exam 16: Managing Information and Technology: Finding New Ways to Learn and Link

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Martha sued Joseph for plagiarizing her song "The Speaking Parrots," released as a single in her 2007 album called "Exhaustion." Martha alleged that Joseph's song, titled "As You Speak," was an unauthorized rip-off of her original hit and that Joseph infringed her copyrighted work. In this scenario, Joseph's actions can be referred to as _____.

(Multiple Choice)
4.7/5
(34)

Keith, with his three other friends, sends email messages to people that appear to come from a legitimate business, such as a bank, credit card company, or retailer. With these official looking emails, they trick people to disclose their personal information such as passwords, usernames, and account numbers. In this scenario, Keith and his friends are involved in _____.

(Multiple Choice)
4.8/5
(32)

Melingo Furniture provides its customers with an option of buying, selling, and servicing of its products online. This helps Melingo Furniture create a customer base by providing convenience to them. In this scenario, Melingo Furniture is involved in _____.

(Multiple Choice)
4.8/5
(36)

_____ is similar to a virus, except that it is an independent program that can spread across computer networks without being attached to other files.

(Multiple Choice)
4.7/5
(34)

Radio frequency identification (RDIF) is used to increase the efficiency of supply chains.

(True/False)
4.9/5
(33)

Gregor loves playing video games on his mobile phone. He keeps checking for newly launched games and downloads them from various websites. In this scenario, Gregor is involved in:

(Multiple Choice)
4.8/5
(40)

Data become information when they are processed, organized, and presented in a way that makes them useful to a decision maker.

(True/False)
4.8/5
(30)

_____ uses hardware or software to create a barrier that prevents unwanted messages or instructions from entering a computer system.

(Multiple Choice)
4.7/5
(33)

With bank-aggregator billing, one uses the _____ service at one's bank to automatically disburse one's monthly charges.

(Multiple Choice)
4.8/5
(31)

A business firm notifies all its employees about a general meeting that is to be held the next day and asks them to confirm their attendance at the meeting by clicking on the link provided within the same email message. The firm sends the email through its private network that is accessible only to the management and the employees of the firm. Which of the following information networks is used by the firm to notify its employees?

(Multiple Choice)
4.8/5
(33)

Everything.com, an online cosmetics portal, does not allow its customers to reach the final billing section unless they share its offer links to at least two friends. In this scenario, everything.com uses _____ to communicate its message.

(Multiple Choice)
4.9/5
(36)

Brandon goes to watch a newly released movie with his friends. In the theater, he takes a video recording of the entire movie through his smartphone and later releases the clip on the Internet where others can watch it free of cost. Brandon is involved in the act of _____.

(Multiple Choice)
4.8/5
(36)

An effective supply chain requires close coordination between:

(Multiple Choice)
4.9/5
(38)

In business-to-business (B2B) e-commerce, _____.

(Multiple Choice)
4.8/5
(40)

Clomien Corp., a law firm, needs frequent interpretation of its stored data for cross-references and formulation of decisions. It uses a(n) _____ to help it discover subtle and complex relationships hidden in its data.

(Multiple Choice)
4.9/5
(27)

Black hat hackers are hackers who have no harmful intent.

(True/False)
4.8/5
(31)

When properly implemented, intranets enhance communication and collaboration among:

(Multiple Choice)
4.9/5
(31)

Which of the following refers to programs that install themselves on computers without the users' knowledge or permission and spread by attaching themselves to other files that are transferred from computer to computer?

(Multiple Choice)
4.8/5
(40)

The__________prohibits the use of false or deceptive subject lines in email messages.

(Multiple Choice)
4.8/5
(36)

In the _____ form of e-commerce, firms want to develop buyer loyalty and repeat business but seldom develop a close working relationship with individual buyers.

(Multiple Choice)
4.9/5
(41)
Showing 61 - 80 of 91
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)