Exam 15: Managing Information and Technology: Finding New Ways to Learn and Link

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Cloud computing is another term used for surfing the Internet.

(True/False)
4.7/5
(36)

What type of e-commerce involves the purchase of consumer goods and services, including clothing, music, and even investments?

(Multiple Choice)
4.8/5
(42)

Describe business intelligence systems and its relationship to data.

(Essay)
4.8/5
(31)

Cloud computing means using Internet-based storage capacity, applications and processing power to supplement or replace internally owned computer resources.

(True/False)
4.7/5
(39)

B2B e-commerce consists of markets where businesses buy from and sell to other businesses.

(True/False)
4.8/5
(32)

The Cloud offers its users the ability to access a vast array of computing resources without the need to invest heavily in expensive new hardware, software, and IT personnel.

(True/False)
4.8/5
(41)

Which of the following is a technology that stores information, such as a unique serial number, on a microchip and transmits it to a reader that's within range?

(Multiple Choice)
4.8/5
(37)

Spyware installs itself on your computer without permission and then tracks your computer behaviour.

(True/False)
5.0/5
(36)

AM/PM Consulting is a leader in the creation of expert systems used in a variety of industries. During the process of developing such systems for an application, AM/PM's programmers are likely to spend a lot of time interviewing human experts in that field to gain insights into how they solve problems.

(True/False)
4.9/5
(32)

What do we call skilled computer users who try to gain unauthorized access to other people's computers?

(Multiple Choice)
4.9/5
(44)

What are hard drives, keyboards, monitors, and printers examples of?

(Multiple Choice)
4.8/5
(38)

Hackers are skilled computer users who use their expertise to gain unauthorized access to other people's computers.

(True/False)
4.9/5
(36)

Phishers send illegitimate e-mail messages to unsuspecting individuals in an attempt to get personal information from the recipient. Often using official-sounding language and official-looking graphics, such as corporate logos, the messages appear authentic.

(True/False)
4.9/5
(32)

List and describe three characteristics of high-quality information.

(Essay)
4.9/5
(35)

According to the Business Software Alliance, an organization dedicated to combating the piracy of software, approximately what percentage of all software installed on computers in 2013 was illegally obtained, resulting in the loss of over $62 billion in revenue to software companies?

(Multiple Choice)
4.9/5
(28)

A small firm that manufactures specialized automobile parts would be unable to participate in an e-marketplace since accessing such markets requires expensive specialized communications equipment that only larger firms can afford.

(True/False)
4.7/5
(36)

Which of the following is an Internet marketing strategy that attempts to involve customers and others not employed by the seller in activities that promote a product?

(Multiple Choice)
4.7/5
(35)

Copyright law gives the creators of their property exclusive rights to do what?

(Multiple Choice)
4.9/5
(31)

Viral marketing uses computer viruses to deliver unsolicited advertisements to a user's computer.

(True/False)
4.9/5
(33)

Operating systems perform tasks such as managing the computer's file system and allocating computer memory among various applications.

(True/False)
4.7/5
(36)
Showing 41 - 60 of 163
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)