Exam 15: Managing Information and Technology: Finding New Ways to Learn and Link

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Unfortunately, there is almost nothing the typical computer user can do to significantly reduce the risks associated with computer viruses, hackers, and spyware.

(True/False)
5.0/5
(43)

Brady has just received an e-mail claiming that his bank's records show some possible errors in his account and requesting that he click on a link to a site where he can confirm his password, social insurance number, and account numbers. The e-mail looks official and contains his bank's logo. What should Brady do?

(Multiple Choice)
4.9/5
(37)

Kenneth just purchased a laptop. He wants to use it at school primarily to write papers, prepare presentations, and organize his contacts. What type of software packages should he choose to help him accomplish these specific tasks?

(Multiple Choice)
4.7/5
(36)

Radio frequency identification (RFID) is the use of microchips to transmit information about a device, product, or person to a RFID reader that is within range.

(True/False)
5.0/5
(44)

Intellectual property that is protected by copyright law includes corporate logos.

(True/False)
4.9/5
(33)

Which of the following are Internet-based companies specializing in securing the electronic transfer of funds?

(Multiple Choice)
4.9/5
(39)

Maisie O'Hara is a sales manager with Moonbux Coffee. Her sales department has a database indicating what each customer has purchased. The company is introducing a new line of gourmet coffees, and Maisie wants to contact customers who bought the Moonbux's older line of gourmet coffees to inform them of the new products. In order to obtain a list of customers, Maisie could enter a query into the database.

(True/False)
4.8/5
(32)

eMarketplaces provide a platform for businesses in specific B2B markets to interact.

(True/False)
4.7/5
(38)

Which of the following best describes cloud computing?

(Multiple Choice)
4.8/5
(36)

What do we call unsolicited commercial e-mails, usually sent to a large numbers of people with little regard to the user's interest in the product or its promotion?

(Multiple Choice)
4.8/5
(28)

Which of the following refers to the physical components used to collect, store, organize, and process data and to distribute information?

(Multiple Choice)
4.8/5
(36)

What are the two categories of system software?

(Multiple Choice)
4.8/5
(32)

Viral marketing is popular with businesses because it is a legitimate online word-of-mouth promotional campaign.

(True/False)
4.8/5
(30)

Microsoft Word 2016 is used to write memos, letters, and reports. What type of software is it?

(Multiple Choice)
4.7/5
(27)

B2C e-commerce refers to online business trades between companies.

(True/False)
4.8/5
(34)

What is the difference between data and information? What is the purpose of a business intelligence system, and how does it help convert data to information?

(Essay)
4.8/5
(31)

Which of the following is the result of creative efforts such as books, musical works, inventions, and computer software?

(Multiple Choice)
4.7/5
(33)

List five types of intellectual property. What is piracy of intellectual property and how does it negatively affect society?

(Essay)
5.0/5
(33)

The physical components used to collect, store, organize, and process data and to distribute information are referred to as software.

(True/False)
4.7/5
(30)

Microsoft Word, Quicken, and MS Publisher are used broadly across large and small businesses. What type of software are they?

(Multiple Choice)
4.8/5
(37)
Showing 21 - 40 of 163
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)