Exam 15: Managing Information and Technology: Finding New Ways to Learn and Link

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

In its statement stuffers,Comcast is advertising a new paperless statement program.With a few clicks of the mouse,you can now get your bill,pay it,and get a receipt.What is this an example of?

(Multiple Choice)
4.7/5
(30)

Which of the following refer(s)to computer programs that provide instructions for a computer to execute a desired task?

(Multiple Choice)
4.8/5
(34)

The World Wide Web is the part of the Internet that consists of documents written in HTML.This is the part of the Internet that receives the most attention from the general public.

(True/False)
4.8/5
(38)

Some casinos use RFID technology to catch bettors who try using which of these types of counterfeit items?

(Multiple Choice)
4.8/5
(34)

B2B e-commerce consists of markets where businesses buy from and sell to other businesses.

(True/False)
4.8/5
(39)

Which of the following are hackers motivated by political or ideological beliefs with malicious intent to do harm,steal identities,or disrupt business?

(Multiple Choice)
4.7/5
(34)

What are the two broad categories of software?

(Multiple Choice)
4.7/5
(40)

Which of the following best describes cloud computing?

(Multiple Choice)
4.7/5
(45)

Describe how customer relationship management impacts a business's bottom line.

(Essay)
4.9/5
(36)

Which of the following uses software and/or hardware to prevent unwanted access to a computer or computer system?

(Multiple Choice)
4.8/5
(33)

Which of the following installs itself on a computer without the user's knowledge or permission for the purpose of tracking the user's behaviour?

(Multiple Choice)
4.9/5
(35)

Travelocity,Expedia,and Amazon.com are all examples of what type of e-commerce?

(Multiple Choice)
4.8/5
(45)

Phishers send illegitimate e-mail messages to unsuspecting individuals in an attempt to get personal information from the recipient.Often using official-sounding language and official-looking graphics,such as corporate logos,the messages appear authentic.

(True/False)
4.8/5
(30)

What type of e-commerce involves businesses buying and selling supplies,components,machinery,equipment,or services from other businesses?

(Multiple Choice)
5.0/5
(37)

Hackers are skilled computer users who use their expertise to gain unauthorized access to other people's computers.

(True/False)
4.9/5
(37)

In 1996-97,Hotmail created the concept of a free Web-based e-mail.Because it was entirely new,many potential users were very skeptical.With each e-mail sent by a Hotmail user,the company placed the tag line,"Get your free e-mail at Hotmail." The tag at the bottom of each e-mail demonstrated the power of which of the following?

(Multiple Choice)
4.9/5
(42)

A secure socket layer (SSL)refers to a layer of hidden information in a data warehouse that can only be discovered by the use of data mining techniques.

(True/False)
4.9/5
(34)

The physical components used to collect,store,organize,and process data and to distribute information are referred to as software.

(True/False)
4.8/5
(33)

Spam is unsolicited e-mail usually sent to very large numbers of recipients,many of whom may not have interest in the message.

(True/False)
4.8/5
(32)

Hotmail,the free e-mail service,became a huge success due to viral marketing.Each time a Hotmail user sent an e-mail message,the recipient received a promotional message about "Hotmail" at the bottom of the page.This drew attention to the service and allowed for the rapid,impressive growth of its subscriber base.

(True/False)
4.8/5
(29)
Showing 21 - 40 of 170
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)