Exam 15: Managing Information and Technology: Finding New Ways to Learn and Link
Exam 1: Business Now: Change Is the Only Constant152 Questions
Exam 2: Business Communication: Creating and Delivering Messages That Matter168 Questions
Exam 3: Business Ethics and Social Responsibility: Doing Well by Doing Good156 Questions
Exam 4: Economics: the Framework for Business161 Questions
Exam 5: Business Formation: Choosing the Form That Fits139 Questions
Exam 6: Small Business and Entrepreneurship: Economic Rocket Fuel158 Questions
Exam 7: Accounting: Decision Making by the Numbers172 Questions
Exam 8: Finance: Acquiring and Using Funds to Maximize Value181 Questions
Exam 9: Securities Markets : Trading Financial Resources167 Questions
Exam 10: Marketing: Building Profitable Customer Connections181 Questions
Exam 11: Part 1: Product and Promotion: Creating and Communicating Value187 Questions
Exam 11: Part 2: Product and Promotion: Creating and Communicating Value166 Questions
Exam 12: Distribution and Pricing: Right Product, right Person, right Place, right Price184 Questions
Exam 13: Management, motivation, and Leadership: Bringing Business to Life215 Questions
Exam 14: Human Resource Management: Building a Top-Quality Workforce138 Questions
Exam 15: Managing Information and Technology: Finding New Ways to Learn and Link170 Questions
Exam 16: Operations Management: Putting It All Together167 Questions
Exam 17: The World Marketplace: Business Without Borders156 Questions
Exam 18: Labour-Management Relations45 Questions
Exam 19: Business Law59 Questions
Exam 20: Personal Finance66 Questions
Select questions type
In its statement stuffers,Comcast is advertising a new paperless statement program.With a few clicks of the mouse,you can now get your bill,pay it,and get a receipt.What is this an example of?
(Multiple Choice)
4.7/5
(30)
Which of the following refer(s)to computer programs that provide instructions for a computer to execute a desired task?
(Multiple Choice)
4.8/5
(34)
The World Wide Web is the part of the Internet that consists of documents written in HTML.This is the part of the Internet that receives the most attention from the general public.
(True/False)
4.8/5
(38)
Some casinos use RFID technology to catch bettors who try using which of these types of counterfeit items?
(Multiple Choice)
4.8/5
(34)
B2B e-commerce consists of markets where businesses buy from and sell to other businesses.
(True/False)
4.8/5
(39)
Which of the following are hackers motivated by political or ideological beliefs with malicious intent to do harm,steal identities,or disrupt business?
(Multiple Choice)
4.7/5
(34)
Describe how customer relationship management impacts a business's bottom line.
(Essay)
4.9/5
(36)
Which of the following uses software and/or hardware to prevent unwanted access to a computer or computer system?
(Multiple Choice)
4.8/5
(33)
Which of the following installs itself on a computer without the user's knowledge or permission for the purpose of tracking the user's behaviour?
(Multiple Choice)
4.9/5
(35)
Travelocity,Expedia,and Amazon.com are all examples of what type of e-commerce?
(Multiple Choice)
4.8/5
(45)
Phishers send illegitimate e-mail messages to unsuspecting individuals in an attempt to get personal information from the recipient.Often using official-sounding language and official-looking graphics,such as corporate logos,the messages appear authentic.
(True/False)
4.8/5
(30)
What type of e-commerce involves businesses buying and selling supplies,components,machinery,equipment,or services from other businesses?
(Multiple Choice)
5.0/5
(37)
Hackers are skilled computer users who use their expertise to gain unauthorized access to other people's computers.
(True/False)
4.9/5
(37)
In 1996-97,Hotmail created the concept of a free Web-based e-mail.Because it was entirely new,many potential users were very skeptical.With each e-mail sent by a Hotmail user,the company placed the tag line,"Get your free e-mail at Hotmail." The tag at the bottom of each e-mail demonstrated the power of which of the following?
(Multiple Choice)
4.9/5
(42)
A secure socket layer (SSL)refers to a layer of hidden information in a data warehouse that can only be discovered by the use of data mining techniques.
(True/False)
4.9/5
(34)
The physical components used to collect,store,organize,and process data and to distribute information are referred to as software.
(True/False)
4.8/5
(33)
Spam is unsolicited e-mail usually sent to very large numbers of recipients,many of whom may not have interest in the message.
(True/False)
4.8/5
(32)
Hotmail,the free e-mail service,became a huge success due to viral marketing.Each time a Hotmail user sent an e-mail message,the recipient received a promotional message about "Hotmail" at the bottom of the page.This drew attention to the service and allowed for the rapid,impressive growth of its subscriber base.
(True/False)
4.8/5
(29)
Showing 21 - 40 of 170
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)