Deck 16: Managing Information Technology: Finding New Ways to Learn and Link

Full screen (f)
exit full mode
Question
"Massively parallel computing" combines the processing power of thousands of computers to work on different elements of a problem at the same time.
Use Space or
up arrow
down arrow
to flip the card.
Question
Graphical user interface requires users to correctly type in commands to open, save, or delete files.
Question
Utility programs are supplemental operating system software programs, such as firewalls, antivirus software , and other security software.
Question
The Internet consists of hundreds of thousands of smaller networks operating under a common set of rules so that each can communicate with the others.
Question
Horizontal applications software consists of highly specialized applications used in a particular industry, such as medicine, law, or accounting.
Question
Abel works for Greater Garrisonville Power Company. His job involves the creation of confidential reports and other documents that he posts on an internal server. While employees can view and even download these confidential materials using a web browser, people outside the company have no access to them. This suggests that Garrisonville Power is using an intranet.​
Question
Online gaming and machine­to­machine communications form part of the traffic on the Internet.​
Question
Businesses develop intranets so that valued customers have access to internal information that is not available to the general public.
Question
Word processing, spreadsheet, and personal information management software are examples of vertical applications software.​
Question
Cloud computing allows users to access their documents, music, or photos from any computer even without an Internet connection.​
Question
Applications software is software that performs the critical functions necessary to operate a computer at the most basic level.
Question
Internet2 is a network that resulted from the coalition formed by several leading research universities, corporations, and other organizations to create a new generation of Internet technology in the United States based on fiber­optic cable.
Question
Internet2 was developed because broadband connections are not capable of handling the volume of information many businesses and scientific applications require.​
Question
The World Wide Web includes Internet chatting and online gaming.​
Question
A network links computer resources using either a wired or wireless connection.
Question
An initiative in 2001 allowed members of the Internet (I2) consortium to sponsor other research and educational organizations that did not originally qualify for membership, so they would have access to I2 resources.
Question
A smartphone is an example of hardware.
Question
The fundamental form of system software is the operating system, which controls the way a computer functions at its most basic level.
Question
Albert loves to download music and videos over the Internet. He observes that even with his high­speed connection, it sometimes takes a long time to download the files he wants. Internet2 is designed primarily to meet the needs of people like Albert.
Question
Hardware includes the various components of a computer system along with communications and network equipment.
Question
Data in their raw form are collectively called information.​
Question
AM/PM Consulting is a leader in the creation of expert systems that are used in a variety of industries. During the process of developing such systems for an application, the company's programmers are likely to spend much time interviewing human experts in a particular field to gain insights into how they solve problems.
Question
Business intelligence systems are a new class of decision support systems developed over the past two decades.
Question
According to the characteristics of good information, high­quality information should focus on issues that are important to decision makers.
Question
Cloud computing helps companies lower costs by paying only for the resources that are actually used and eliminates the problem of excess capacity.​
Question
A query is a request for database management software to search for data that matches specified criteria.
Question
One of the vital functions of information technology­at least in relationship to business­is to transform data into useful information for decision makers.
Question
Expert systems help their users solve a problem or accomplish a task by asking the user a series of questions, basing each new question on the response to previous questions. The program continues to ask questions until it has enough information to reach a decision and make a recommendation.​
Question
Data are facts and figures that have been organized in a way that makes them immediately useful to decision makers.​
Question
Data mining uses powerful statistical and mathematical techniques to analyze vast amounts of data in data warehouses in order to identify useful information that had been hidden.​
Question
Cloud resources are confined to specific operating systems, so people with computers having the same operating systems can form a group and easily share files and programs.
Question
In recent years, data mining has had considerable success in areas such as fraud and crime detection.​
Question
Mattie O'Hara is a sales manager with Moonbux Coffee. Her sales department has a database indicating what each customer has purchased. The company is introducing a new line of gourmet coffees, and Mattie wants to contact customers who bought the Moonbux's older line of gourmet coffees to inform them of the new products. In order to obtain a list of customers, Mattie could enter a query into the database.
Question
Red Eye Shipping Inc. has purchased a business intelligence system. The main advantage of such a system is that it eliminates the need for maintaining large data warehouses and the need for data mining.​​
Question
A data warehouse is a physical storage facility used by management to store and file all hard copies of important documents generated by a business.​
Question
An advantage of an expert system is that it is capable of solving a wide variety of problems, including those that are quite different from the problems it was originally designed to solve.​
Question
To access cloud computing services, information technology (IT) companies will have to invest heavily in expensive new hardware and software.
Question
One of the disadvantages of an expert system is that it has little flexibility and no common sense.​
Question
Cloud computing encourages collaboration among employees and business partners.
Question
E­commerce refers to using the Internet to facilitate the exchange of goods and services.
Question
Electronic bill presentment and payment is one of the ways of making electronic payments.
Question
Opt­in email is much less expensive than direct mail.
Question
Amanda has a pearl necklace that she would like to sell on eBay or Craigslist. By listing her necklace on one of these two platforms, Amanda would be using a form of e­commerce known as C2C.
Question
Viral marketing is when a firm uses computer viruses to deliver unsolicited advertisements to a user's computer.
Question
B2C e­commerce refers to online business trades between companies.​
Question
B2G e­commerce is when government agencies sell information, goods, and services to businesses.
Question
Many firms have used the Internet to implement very effective viral marketing campaigns that attempt to get customers to communicate a firm's message to friends, family, and colleagues.
Question
Viral marketing is not as effective as traditional buzz marketing because the latter allows for messages to reach a wider audience at a faster speed.
Question
Rudy just purchased a new pair of running shoes at a local sports shop. The owner of the shop requested Rudy to tweet about his experience in the store. The sports shop is trying to utilize a marketing campaign known as viral marketing.​
Question
The online encyclopedia Wikipedia that uses wiki software to allow users to comment on and contribute to its articles is a Web 2.0 site.
Question
Shutterfly and Facebook are both examples of cybermediaries.
Question
The size of a typical individual transaction in B2B e­commerce is relatively small, usually a few dollars to a few hundred dollars.
Question
Opt­in emails are the same as spam, because they are unwanted messages.
Question
The number of customers in the target market of B2B e­commerce is larger than that in B2C e­commerce.
Question
Viral marketing is not as effective as traditional buzz marketing because the latter allows for messages to reach a wider audience at a faster speed.
Question
One Key difference between the B2C and the B2B marketplaces is that an individual buyer tends to be more rational than a business buyer.
Question
Electronic bill presentment and payment is a method in which bills are sent to customers via email.
Question
Internet advertising had experienced a sharp decline in revenue during the twenty­first century.
Question
A cybermediary is an Internet­based firm specializing in the secure electronic transfer of funds.
Question
Companies use a secure socket layer (SSL) protocol to secure payment information transmitted over the Internet from a consumer to a business.
Question
A small firm that manufactures specialized automobile parts would be unable to participate in an e­marketplace because accessing such markets requires expensive dedicated connections between firms that only larger firms can afford.
Question
The CAN­SPAM Act of 2003 has proven to be extremely successful at shutting down businesses that rely heavily on spamming to generate sales.
Question
Spam is a type of malware.
Question
Radio frequency identification technology stores information on a microchip that can be read by the correct reading device if within a certain range of the chip.
Question
One advantage of the e­marketplace is that it enables sellers and buyers to contact and negotiate with a large number of market participants.
Question
Malware is a hardware developed or created with malicious intent.
Question
Spyware installs itself on a computer without permission and then tracks computer behavior.
Question
Computer viruses and worms must each be attached to other files in order to spread across computer networks.
Question
E­marketplaces often provide additional services­beyond simple trade­that allow firms to exchange information and collaborate, thus forging tighter supply chain relationships.
Question
Spam filters exist that help detect and eliminate spam.
Question
E­marketplaces are primarily used by participants in the B2C market.
Question
Worms are an example of malware that spread by attaching themselves to files that are then transferred from computer to computer.
Question
The main purpose of radio frequency identification chips is to transmit a serial number that uniquely identifies a product or device.
Question
The basic difference between computer viruses and spyware is that a virus has the ability to spread from one computer to another while transferring data.
Question
The key advantage of radio frequency identification technology is that it allows a seller of a product to track and monitor a buyer's use of that product.
Question
Spyware is often installed when users download and install freeware on their computers.
Question
Computer viruses can erase or modify data on a hard drive, prevent a computer from booting up, and find and send personal information stored on the hard drive to unauthorized people.
Question
Spam refers to unsolicited email advertisements usually sent to very large numbers of recipients, many of whom may not have interest in the message.
Question
Pathtiesmhipntg t ois g ae ts cthamem w thoe dreiv ouflfgiec iparli­vloaotek iinngfo ermmaaitliso na rseu scehn at st op ainsdswivoidrdusa,ls in an usernames, and account numbers.
Question
Margaret Reed works for a major manufacturer that is having trouble tracking components and materials as they move through a supply chain. Margaret wants to find a technology that will uniquely identify items to simplify the tracking process. Margaret should consider radio frequency identification chips to solve this problem.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/200
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 16: Managing Information Technology: Finding New Ways to Learn and Link
1
"Massively parallel computing" combines the processing power of thousands of computers to work on different elements of a problem at the same time.
True
2
Graphical user interface requires users to correctly type in commands to open, save, or delete files.
False
3
Utility programs are supplemental operating system software programs, such as firewalls, antivirus software , and other security software.
False
4
The Internet consists of hundreds of thousands of smaller networks operating under a common set of rules so that each can communicate with the others.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
5
Horizontal applications software consists of highly specialized applications used in a particular industry, such as medicine, law, or accounting.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
6
Abel works for Greater Garrisonville Power Company. His job involves the creation of confidential reports and other documents that he posts on an internal server. While employees can view and even download these confidential materials using a web browser, people outside the company have no access to them. This suggests that Garrisonville Power is using an intranet.​
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
7
Online gaming and machine­to­machine communications form part of the traffic on the Internet.​
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
8
Businesses develop intranets so that valued customers have access to internal information that is not available to the general public.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
9
Word processing, spreadsheet, and personal information management software are examples of vertical applications software.​
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
10
Cloud computing allows users to access their documents, music, or photos from any computer even without an Internet connection.​
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
11
Applications software is software that performs the critical functions necessary to operate a computer at the most basic level.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
12
Internet2 is a network that resulted from the coalition formed by several leading research universities, corporations, and other organizations to create a new generation of Internet technology in the United States based on fiber­optic cable.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
13
Internet2 was developed because broadband connections are not capable of handling the volume of information many businesses and scientific applications require.​
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
14
The World Wide Web includes Internet chatting and online gaming.​
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
15
A network links computer resources using either a wired or wireless connection.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
16
An initiative in 2001 allowed members of the Internet (I2) consortium to sponsor other research and educational organizations that did not originally qualify for membership, so they would have access to I2 resources.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
17
A smartphone is an example of hardware.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
18
The fundamental form of system software is the operating system, which controls the way a computer functions at its most basic level.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
19
Albert loves to download music and videos over the Internet. He observes that even with his high­speed connection, it sometimes takes a long time to download the files he wants. Internet2 is designed primarily to meet the needs of people like Albert.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
20
Hardware includes the various components of a computer system along with communications and network equipment.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
21
Data in their raw form are collectively called information.​
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
22
AM/PM Consulting is a leader in the creation of expert systems that are used in a variety of industries. During the process of developing such systems for an application, the company's programmers are likely to spend much time interviewing human experts in a particular field to gain insights into how they solve problems.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
23
Business intelligence systems are a new class of decision support systems developed over the past two decades.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
24
According to the characteristics of good information, high­quality information should focus on issues that are important to decision makers.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
25
Cloud computing helps companies lower costs by paying only for the resources that are actually used and eliminates the problem of excess capacity.​
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
26
A query is a request for database management software to search for data that matches specified criteria.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
27
One of the vital functions of information technology­at least in relationship to business­is to transform data into useful information for decision makers.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
28
Expert systems help their users solve a problem or accomplish a task by asking the user a series of questions, basing each new question on the response to previous questions. The program continues to ask questions until it has enough information to reach a decision and make a recommendation.​
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
29
Data are facts and figures that have been organized in a way that makes them immediately useful to decision makers.​
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
30
Data mining uses powerful statistical and mathematical techniques to analyze vast amounts of data in data warehouses in order to identify useful information that had been hidden.​
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
31
Cloud resources are confined to specific operating systems, so people with computers having the same operating systems can form a group and easily share files and programs.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
32
In recent years, data mining has had considerable success in areas such as fraud and crime detection.​
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
33
Mattie O'Hara is a sales manager with Moonbux Coffee. Her sales department has a database indicating what each customer has purchased. The company is introducing a new line of gourmet coffees, and Mattie wants to contact customers who bought the Moonbux's older line of gourmet coffees to inform them of the new products. In order to obtain a list of customers, Mattie could enter a query into the database.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
34
Red Eye Shipping Inc. has purchased a business intelligence system. The main advantage of such a system is that it eliminates the need for maintaining large data warehouses and the need for data mining.​​
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
35
A data warehouse is a physical storage facility used by management to store and file all hard copies of important documents generated by a business.​
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
36
An advantage of an expert system is that it is capable of solving a wide variety of problems, including those that are quite different from the problems it was originally designed to solve.​
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
37
To access cloud computing services, information technology (IT) companies will have to invest heavily in expensive new hardware and software.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
38
One of the disadvantages of an expert system is that it has little flexibility and no common sense.​
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
39
Cloud computing encourages collaboration among employees and business partners.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
40
E­commerce refers to using the Internet to facilitate the exchange of goods and services.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
41
Electronic bill presentment and payment is one of the ways of making electronic payments.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
42
Opt­in email is much less expensive than direct mail.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
43
Amanda has a pearl necklace that she would like to sell on eBay or Craigslist. By listing her necklace on one of these two platforms, Amanda would be using a form of e­commerce known as C2C.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
44
Viral marketing is when a firm uses computer viruses to deliver unsolicited advertisements to a user's computer.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
45
B2C e­commerce refers to online business trades between companies.​
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
46
B2G e­commerce is when government agencies sell information, goods, and services to businesses.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
47
Many firms have used the Internet to implement very effective viral marketing campaigns that attempt to get customers to communicate a firm's message to friends, family, and colleagues.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
48
Viral marketing is not as effective as traditional buzz marketing because the latter allows for messages to reach a wider audience at a faster speed.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
49
Rudy just purchased a new pair of running shoes at a local sports shop. The owner of the shop requested Rudy to tweet about his experience in the store. The sports shop is trying to utilize a marketing campaign known as viral marketing.​
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
50
The online encyclopedia Wikipedia that uses wiki software to allow users to comment on and contribute to its articles is a Web 2.0 site.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
51
Shutterfly and Facebook are both examples of cybermediaries.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
52
The size of a typical individual transaction in B2B e­commerce is relatively small, usually a few dollars to a few hundred dollars.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
53
Opt­in emails are the same as spam, because they are unwanted messages.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
54
The number of customers in the target market of B2B e­commerce is larger than that in B2C e­commerce.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
55
Viral marketing is not as effective as traditional buzz marketing because the latter allows for messages to reach a wider audience at a faster speed.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
56
One Key difference between the B2C and the B2B marketplaces is that an individual buyer tends to be more rational than a business buyer.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
57
Electronic bill presentment and payment is a method in which bills are sent to customers via email.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
58
Internet advertising had experienced a sharp decline in revenue during the twenty­first century.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
59
A cybermediary is an Internet­based firm specializing in the secure electronic transfer of funds.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
60
Companies use a secure socket layer (SSL) protocol to secure payment information transmitted over the Internet from a consumer to a business.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
61
A small firm that manufactures specialized automobile parts would be unable to participate in an e­marketplace because accessing such markets requires expensive dedicated connections between firms that only larger firms can afford.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
62
The CAN­SPAM Act of 2003 has proven to be extremely successful at shutting down businesses that rely heavily on spamming to generate sales.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
63
Spam is a type of malware.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
64
Radio frequency identification technology stores information on a microchip that can be read by the correct reading device if within a certain range of the chip.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
65
One advantage of the e­marketplace is that it enables sellers and buyers to contact and negotiate with a large number of market participants.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
66
Malware is a hardware developed or created with malicious intent.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
67
Spyware installs itself on a computer without permission and then tracks computer behavior.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
68
Computer viruses and worms must each be attached to other files in order to spread across computer networks.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
69
E­marketplaces often provide additional services­beyond simple trade­that allow firms to exchange information and collaborate, thus forging tighter supply chain relationships.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
70
Spam filters exist that help detect and eliminate spam.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
71
E­marketplaces are primarily used by participants in the B2C market.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
72
Worms are an example of malware that spread by attaching themselves to files that are then transferred from computer to computer.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
73
The main purpose of radio frequency identification chips is to transmit a serial number that uniquely identifies a product or device.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
74
The basic difference between computer viruses and spyware is that a virus has the ability to spread from one computer to another while transferring data.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
75
The key advantage of radio frequency identification technology is that it allows a seller of a product to track and monitor a buyer's use of that product.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
76
Spyware is often installed when users download and install freeware on their computers.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
77
Computer viruses can erase or modify data on a hard drive, prevent a computer from booting up, and find and send personal information stored on the hard drive to unauthorized people.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
78
Spam refers to unsolicited email advertisements usually sent to very large numbers of recipients, many of whom may not have interest in the message.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
79
Pathtiesmhipntg t ois g ae ts cthamem w thoe dreiv ouflfgiec iparli­vloaotek iinngfo ermmaaitliso na rseu scehn at st op ainsdswivoidrdusa,ls in an usernames, and account numbers.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
80
Margaret Reed works for a major manufacturer that is having trouble tracking components and materials as they move through a supply chain. Margaret wants to find a technology that will uniquely identify items to simplify the tracking process. Margaret should consider radio frequency identification chips to solve this problem.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 200 flashcards in this deck.