Deck 10: Online Business and Technology

Full screen (f)
exit full mode
Question
Molave Furniture Company plans to launch a new website.Lila,the company's CIO,thinks that the company can better reach its customers through an interactive site that allows customers to view pictures of all furniture items,schedule an appointment with a sales consultant,or order items online.Which of the following areas of responsibility is Lila most specifically addressing?

A) budget
B) currency of systems
C) e-commerce
D) systems design
E) data warehousing
Use Space or
up arrow
down arrow
to flip the card.
Question
Which of the following is NOT an advantage of online marketing over traditional marketing?

A) ability to reach households without high speed Internet access
B) ability to track how many eyes have viewed an ad
C) ability to tailor ads based on consumers' interests
D) ability to reach consumers using mobile technologies
E) ability to charge advertisers only for the number of times a Web surfer clicks their ad
Question
A business that offers potential buyers the opportunity to make purchases either online or in a physical location uses a ________ business model.

A) bricks-and-mortar
B) click and mortar
C) C2C
D) C2B
E) fee-based
Question
The person in charge of technology-enabled information processing in companies is most often called the ________.

A) chief communications officer
B) chief executive officer
C) chief information officer
D) chief computing officer
E) chief Internet technologist
Question
The following are all functions of a chief information officer (CIO)EXCEPT ________.

A) creating business opportunities
B) overseeing the accounting office
C) processing information
D) updating computer systems
E) balancing the benefits of technology against the costs
Question
What is the best definition for data?

A) information used to improve business practices
B) representation of a fact or idea
C) statement of fact or idea
D) opinions about the effectiveness of a business
E) numbers or facts organized to be useful
Question
Of the following,which is harmed MOST by current regulations governing the collection of sales taxes on Internet purchases?

A) online companies such as 1-800-FLOWERS
B) people who purchase items over the Internet
C) state governments that charge sales taxes
D) the federal government
E) the IRS
Question
The online advertising acronym PPC stands for ________.

A) push-pull-charging
B) pay-per-click
C) person-pays-cash
D) players-pay-cash
E) purchase-price-charge
Question
What does a management information system (MIS)do that an IT department would typically not do?

A) focus on pure technical knowledge
B) focus on applying IT to solve business problems
C) focus on reducing information flow among employees
D) focus on identifying management problems in IT departments
E) focus on creating custom software
Question
The World Intellectual Property Organization requires that e-businesses comply with the laws of ________.

A) the United Nations
B) the European Union and the United States
C) every country in which they do business
D) the country in which they are based
E) every country that is part of the WIPO Pact
Question
A B2B site that describes current standards and developments within an industry can best be classified as a(n)________.

A) procurement exchange site
B) brokering site
C) company website
D) information site
E) vertical portal
Question
An online dating service that charges members makes money primarily through using a(n)________.

A) fee-based model
B) intermediary model
C) community-based model
D) advertising-based model
E) niche model
Question
As a chief information officer,Bob looks for ways that his company's technological resources can generate bigger returns on its information technology investments.Which aspect of the CIO's role is he addressing?

A) currency of systems
B) e-commerce
C) system design
D) budget
E) privacy and security
Question
Which of the following is a function of a company's IT department?

A) managing the use of mobile computing
B) setting sales targets for technology products
C) marketing new technologies to consumers
D) identifying new locations for company offices
E) determining shipping and gift wrap options for items sold online
Question
The acronym ________ describes the situation in which a company sells something to an individual buyer for personal use.

A) B2B
B) B2C
C) C2C
D) C2B
E) 2C2
Question
eBay is an example of which type of e-commerce transaction?

A) B2B
B) B2C
C) C2C
D) C2B
E) 2C2
Question
The unit in a company that is most often responsible for the hardware components,software programs,and networking strategies of a business organization is ________.

A) information technology
B) operations
C) finance
D) marketing
E) accounting
Question
Viral marketing is least likely to occur via ________.

A) websites
B) television
C) social networks
D) e-mail
E) YouTube
Question
UPS has a(n)________ that allows businesses to examine UPS services and prices and track shipments.

A) company website
B) procurement exchange site
C) specialized industry portal site
D) information site
E) brokering site
Question
A group of companies that band together to purchase goods or services is called a(n)________.

A) infomediary
B) procurement exchange
C) supply chain
D) brokering site
E) vertical portal
Question
Marianne is the payroll manager at Johnson Manufacturing.She wants to upgrade the department's accounting systems.To whom should she send her request for an upgrade?

A) Director of Human Resources
B) Vice President of Operations
C) Director of Management Information Systems
D) Vice President of Marketing
E) The IT department's Help Desk
Question
Although electronic monitoring offers some advantages to a company,it may also result in disadvantages.Which of the following is the MOST significant disadvantage of electronic monitoring of employees?

A) Electronic monitoring may cause many employees to request decreased levels of supervision.
B) Electronic monitoring devices' electromagnetic fields can disrupt company telecommunications.
C) Electronic monitoring, even at its best, can crash computers.
D) Electronic monitoring can result in increased employee stress and anxiety.
E) Electronic monitoring can be conducted with recording devices so small that employees do not realize they are being recorded.
Question
Which of the following BEST describes how businesses convert raw data into information?

A) asking information technology experts to review data for accuracy
B) organizing the data in a way that helps make decisions
C) storing the data in a data warehouse
D) using the prevalent automatic process
E) maintaining the representations of facts or ideas in their original form
Question
________ refers to the application of products like Facebook in a corporate setting.

A) Cloud computing
B) Viral marketing
C) Crowdsourced funding
D) Executive information system
E) Enterprise social media
Question
What is MOST important for cloud computing?

A) Internet
B) smartphones
C) wireless connections
D) computer backup systems
E) laptops
Question
Employers use electronic monitoring to ________.

A) gather information about an employee's activities while on the job
B) gather information about customers' attitudes about the company
C) collect data on activities of competitors
D) collect information about employees' activities when away from the workplace
E) decrease employee stress levels
Question
Which of the following statements is TRUE about the impact of technology on employee privacy?

A) Technology makes it more difficult for companies to access private information about employees.
B) Technology ensures that individuals will have the same privacy protections at work as they do at home.
C) Technology ensures that employees can access more private information about their fellow employees.
D) Technology allows companies to access information about employees' behavior on the job.
E) Technology protects employees from being monitored in the workplace.
Question
________ involves tricking a person into entering sensitive personal or financial information into a form on a website or in an e-mail,typically by convincing the person that she is dealing with a site she normally interacts with,such as her bank.

A) Adware
B) Spyware
C) Phishing
D) Spam
E) Hacking
Question
Software that displays banner ads or pop-up ads on your computer is called ________.

A) adware
B) spyware
C) phishing
D) spam
E) PPC
Question
Technology BEST supports whistle-blowers by ________.

A) enabling distribution of business codes of conduct on the Internet
B) making it possible for people to report a business's ethical violations safely and easily
C) wiretapping phones of employees or executives who are suspected of being unethical
D) making it difficult to violate employee privacy through electronic monitoring
E) making public the "near misses" that occur in a business
Question
Which of the following is the BEST example of how technology supports ethical conduct in hospitals?

A) Technology ensures that the correct prescriptions are prescribed to patients.
B) Technology allows employees to report their mistakes without risking disciplinary action.
C) Technology quickly recognizes mistakes in data entry, preventing unfortunate errors.
D) Technology makes it easier to monitor the conversations of patients and visitors.
E) Technology eliminates the possibility of human error in most interactions between patients and staff.
Question
Terrell urgently needs to take care of some personal business using the Internet,but he is afraid that he might jeopardize his job if he is found using the company network for personal use.Which corporate practice is causing Terrell to most likely feel this concern?

A) intellectual property monitoring
B) technology auditing
C) electronic monitoring
D) job tracking
E) whistle-blowing
Question
Hilde's company wants to develop an understanding of the demographics of people purchasing its new product.The company wants to target its marketing at this demographic of people.The marketing department has used a database management system to identify the characteristics of buyers.Which of the following will be MOST useful for identifying the appropriate demographic group at which to target marketing?

A) data warehousing
B) data brainstorming
C) data consolidation
D) data mining
E) data marting
Question
Mason's business is making a profit,but he needs to increase his bottom line so that he can invest in his firm's growth.He decides to purchase a business intelligence software package to help him identify ways to grow his company.Which of the following questions could Mason's business intelligence software answer?

A) Which of my competitors has the least debt?
B) Which countries would provide the least expensive production facilities?
C) Who are my top 10 revenue generating customers?
D) What new technologies will be available to increase my firm's productivity?
E) Which new markets would be the best for my firm to enter?
Question
Which of the following statements BEST supports why hackers present risks to a company's security?

A) They distract employees from completing their assigned tasks.
B) They use encryption schemes to access corporate websites.
C) They gain unauthorized entry into a company's computer system.
D) They steal important papers from workers' desks and offices.
E) They overload a website with traffic to the point that it crashes.
Question
Software that tracks your personal information and sends it to a third party without your knowledge is called ________.

A) adware
B) spyware
C) phishing
D) spam
E) viral marketing
Question
Phishing is MOST OFTEN used to ________.

A) install adware
B) install spyware
C) steal credit card numbers
D) gather e-mail addresses for use by spammers
E) track the websites a user visits
Question
Business intelligence software can help managers ________.

A) report, plan, and forecast workforce performance
B) assess the level of expertise of each of a business's employees
C) forecast their business's stock performance during the next fiscal year
D) gain access to private information about a business's competitors
E) design innovative products for consumer use
Question
What best describes a data mart?

A) a store where companies can purchase data
B) a collection of network servers dedicated to hosting database management systems on the Internet
C) a collection of data about a single product or department that is part of a larger collection of data
D) a type of business intelligence software used for making purchasing decisions
E) a process that transforms data into useful business intelligence
Question
Database management systems are MOST useful because ________.

A) information technology managers prefer to use software systems rather than qualitative systems
B) they help businesses manage vast amounts of data collected in the process of doing business
C) customers prefer companies that rely on database management systems
D) the company can hire more people to collect and analyze the data
E) clients are impressed by firms with high technology budgets
Question
Phishing is commonly used to steal credit card numbers.
Question
E-procurement typically occurs between businesses only.
Question
Information technology has made it easier for whistle-blowers to file reports about unethical business practices.
Question
Chief information officers do not get involved in creating business opportunities for their companies.
Question
IT departments must ensure that companies use the newest technology that is available.
Question
Which of the following statements about social media's impact on business is NOT true?

A) Social media helps people start and fund new businesses.
B) It is critical for companies to keep watch on the messages and information being spread about their products in cyberspace.
C) Companies that are well situated with a strong social media presence can use that to head off potential technical problems that might turn into public disaster.
D) It is important to use social media for marketing, but it cannot be used as an avenue for more specific business decision making.
E) Many businesses have created a position identified as social media manager or social media marketing specialist.
Question
The chief information officer is responsible for the technology of a business,including the management and evaluation of the budget allotted for such technology.
Question
As a result of technology,it is easier to protect private information today than it was in the last century.
Question
Which of the following uses of social media would be most most likely to hurt rather than promote one's business?

A) Studying the users who visit one's Facebook page to detect patterns.
B) Using Twitter to announce special promotions that cater to one's customer base.
C) Offering people ways to use mobile apps to simplify and improve their customer experience.
D) Appealing to the preferences of one's customer base on social media outlets.
E) Making snide comments to undermine one's competition on social media sites.
Question
Google's AdSense advertising is a form of contextual advertising.
Question
Most states are pleased that their residents buy products online.
Question
Products like Brandwatch and UberView are used by companies to ________.

A) expand the possibilities of cloud computing
B) create apps for mobile devices
C) generate automatic Tweets
D) detect crowdsource opportunities
E) perform social media monitoring
Question
IT professionals sometimes create custom software to bridge the gaps between the software products available and the needs of the firm.
Question
Viral marketing is most effective when it targets people who spend little or no time on the Internet.
Question
A company's marketing department tends to be more successful if it minimizes its reliance on information technology.
Question
"Click and mortar" refers to businesses that sell products from both physical locations and online.
Question
Data mining has proven to be a poor technique for improving the effectiveness of a firm's marketing strategies.
Question
Online analysis packages (OLAPs)enable very quick analysis of multiple sources of business information in order to present a clearer picture of the state of the business.
Question
Technology's ability to process and document large amounts of data has better enabled people to understand interpersonal communication.
Question
Spyware displays banner ads or pop-up ads on your computer.
Question
Define and describe viral marketing.Use at least one example in your answer.
Question
What aspect of social media is Kickstarter an example of,and what does it do?
Question
What are the threats that challenge e-business?
Question
What new jobs have been created with the rise of social media?
Question
Give a brief,one-sentence description of each of the three main types of e-commerce transactions involving businesses and consumers.
Question
What is the main difference between an IT system and an MIS system? Provide an example of how an MIS professional could contribute to a technology-related business decision.
Question
Patrick is a quality control inspector at a pharmaceutical plant.He and his team are bound by strict quality standards to ensure that each unit is produced in a way that guarantees safety and effectiveness for the consumer.Recently,Patrick has been criticized for rejecting too many samples of the pharmaceuticals being produced.His manager has warned him that his inspection failure rate is negatively affecting the plant's productivity and that he should "reexamine" his inspection methods.Patrick does not want to be responsible for allowing an ineffective or dangerous medication to be sold to a patient,but he also does not want to lose his job.How can technology help Patrick ensure the quality of the products he is inspecting while at the same time protecting his job?
Question
What is pay-per-click advertising and why is it effective?
Question
Data and information are two terms that are often used interchangeably in business settings.Describe the differences between the two terms and provide an example to illustrate the business uses of data and information.
Question
Crowdsourced funding (crowd funding)allows a great number of people who believe in a company
or a product to contribute a small amount to help the company get started.
Question
What is the role of the information technology (IT)department?
Question
Cameron works as a sales agent for a beverage company.Because she was this year's top sales agent,she was awarded a smartphone.What would be a major advantage for Cameron of having a smartphone? What disadvantages of owning a smartphone might Cameron experience?
Question
Melinda has just graduated with a master's degree in information technology and has been having trouble finding a corporate job.None of the large companies she has contacted have job openings in her field.So Melinda decides to try marketing her services to some of her home town businesses.These businesses have been very slow to adopt new technology.For instance,the local hardware store runs just like it did thirty years ago,with an aging cash register and paper-based bookkeeping.She plans to talk with the store's owner about hiring her part time as its IT specialist to modernize the store's systems.What objections might the hardware store owner have to the idea of hiring an IT specialist,and what should Melinda say to convince the owner of the store that she can help increase the store's sales?
Question
David is a manager at an engineering firm.He recently sent an e-mail to Michelle,a member of his team,to provide feedback on problems with the work that she had contributed to the team.Michelle complained to the human resources department that David was harassing her.David was completely taken aback,because he viewed the e-mail as an objective summary of the work that Michelle had performed.What aspects of technology-enabled communication could explain the differences between David's and Michelle's perceptions about the e-mail David sent? What would you recommend David do to prevent such a situation in the future?
Question
What are the four main types of B2C models discussed in the textbook?
Question
What is the current situation regarding sales taxes on Internet commerce? Who benefits? Who loses? Is the situation fair? Why or why not?
Question
Clara is the human resources manager for her company,Global Distinctions,Inc.The president of the company has just told Clara that the company needs to hire a Chief Information Officer (CIO)for the company.Clara's first step will be to write a job description for the new role.What are the major responsibilities that Clara should include in the job description for the new CIO?
Question
What are the advantages to the owners and customers of a "click and mortar" business?
Question
Companies who wish to use apps on mobile devices must develop them on their own.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/79
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 10: Online Business and Technology
1
Molave Furniture Company plans to launch a new website.Lila,the company's CIO,thinks that the company can better reach its customers through an interactive site that allows customers to view pictures of all furniture items,schedule an appointment with a sales consultant,or order items online.Which of the following areas of responsibility is Lila most specifically addressing?

A) budget
B) currency of systems
C) e-commerce
D) systems design
E) data warehousing
C
2
Which of the following is NOT an advantage of online marketing over traditional marketing?

A) ability to reach households without high speed Internet access
B) ability to track how many eyes have viewed an ad
C) ability to tailor ads based on consumers' interests
D) ability to reach consumers using mobile technologies
E) ability to charge advertisers only for the number of times a Web surfer clicks their ad
A
3
A business that offers potential buyers the opportunity to make purchases either online or in a physical location uses a ________ business model.

A) bricks-and-mortar
B) click and mortar
C) C2C
D) C2B
E) fee-based
B
4
The person in charge of technology-enabled information processing in companies is most often called the ________.

A) chief communications officer
B) chief executive officer
C) chief information officer
D) chief computing officer
E) chief Internet technologist
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
5
The following are all functions of a chief information officer (CIO)EXCEPT ________.

A) creating business opportunities
B) overseeing the accounting office
C) processing information
D) updating computer systems
E) balancing the benefits of technology against the costs
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
6
What is the best definition for data?

A) information used to improve business practices
B) representation of a fact or idea
C) statement of fact or idea
D) opinions about the effectiveness of a business
E) numbers or facts organized to be useful
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
7
Of the following,which is harmed MOST by current regulations governing the collection of sales taxes on Internet purchases?

A) online companies such as 1-800-FLOWERS
B) people who purchase items over the Internet
C) state governments that charge sales taxes
D) the federal government
E) the IRS
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
8
The online advertising acronym PPC stands for ________.

A) push-pull-charging
B) pay-per-click
C) person-pays-cash
D) players-pay-cash
E) purchase-price-charge
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
9
What does a management information system (MIS)do that an IT department would typically not do?

A) focus on pure technical knowledge
B) focus on applying IT to solve business problems
C) focus on reducing information flow among employees
D) focus on identifying management problems in IT departments
E) focus on creating custom software
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
10
The World Intellectual Property Organization requires that e-businesses comply with the laws of ________.

A) the United Nations
B) the European Union and the United States
C) every country in which they do business
D) the country in which they are based
E) every country that is part of the WIPO Pact
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
11
A B2B site that describes current standards and developments within an industry can best be classified as a(n)________.

A) procurement exchange site
B) brokering site
C) company website
D) information site
E) vertical portal
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
12
An online dating service that charges members makes money primarily through using a(n)________.

A) fee-based model
B) intermediary model
C) community-based model
D) advertising-based model
E) niche model
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
13
As a chief information officer,Bob looks for ways that his company's technological resources can generate bigger returns on its information technology investments.Which aspect of the CIO's role is he addressing?

A) currency of systems
B) e-commerce
C) system design
D) budget
E) privacy and security
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
14
Which of the following is a function of a company's IT department?

A) managing the use of mobile computing
B) setting sales targets for technology products
C) marketing new technologies to consumers
D) identifying new locations for company offices
E) determining shipping and gift wrap options for items sold online
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
15
The acronym ________ describes the situation in which a company sells something to an individual buyer for personal use.

A) B2B
B) B2C
C) C2C
D) C2B
E) 2C2
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
16
eBay is an example of which type of e-commerce transaction?

A) B2B
B) B2C
C) C2C
D) C2B
E) 2C2
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
17
The unit in a company that is most often responsible for the hardware components,software programs,and networking strategies of a business organization is ________.

A) information technology
B) operations
C) finance
D) marketing
E) accounting
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
18
Viral marketing is least likely to occur via ________.

A) websites
B) television
C) social networks
D) e-mail
E) YouTube
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
19
UPS has a(n)________ that allows businesses to examine UPS services and prices and track shipments.

A) company website
B) procurement exchange site
C) specialized industry portal site
D) information site
E) brokering site
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
20
A group of companies that band together to purchase goods or services is called a(n)________.

A) infomediary
B) procurement exchange
C) supply chain
D) brokering site
E) vertical portal
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
21
Marianne is the payroll manager at Johnson Manufacturing.She wants to upgrade the department's accounting systems.To whom should she send her request for an upgrade?

A) Director of Human Resources
B) Vice President of Operations
C) Director of Management Information Systems
D) Vice President of Marketing
E) The IT department's Help Desk
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
22
Although electronic monitoring offers some advantages to a company,it may also result in disadvantages.Which of the following is the MOST significant disadvantage of electronic monitoring of employees?

A) Electronic monitoring may cause many employees to request decreased levels of supervision.
B) Electronic monitoring devices' electromagnetic fields can disrupt company telecommunications.
C) Electronic monitoring, even at its best, can crash computers.
D) Electronic monitoring can result in increased employee stress and anxiety.
E) Electronic monitoring can be conducted with recording devices so small that employees do not realize they are being recorded.
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
23
Which of the following BEST describes how businesses convert raw data into information?

A) asking information technology experts to review data for accuracy
B) organizing the data in a way that helps make decisions
C) storing the data in a data warehouse
D) using the prevalent automatic process
E) maintaining the representations of facts or ideas in their original form
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
24
________ refers to the application of products like Facebook in a corporate setting.

A) Cloud computing
B) Viral marketing
C) Crowdsourced funding
D) Executive information system
E) Enterprise social media
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
25
What is MOST important for cloud computing?

A) Internet
B) smartphones
C) wireless connections
D) computer backup systems
E) laptops
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
26
Employers use electronic monitoring to ________.

A) gather information about an employee's activities while on the job
B) gather information about customers' attitudes about the company
C) collect data on activities of competitors
D) collect information about employees' activities when away from the workplace
E) decrease employee stress levels
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
27
Which of the following statements is TRUE about the impact of technology on employee privacy?

A) Technology makes it more difficult for companies to access private information about employees.
B) Technology ensures that individuals will have the same privacy protections at work as they do at home.
C) Technology ensures that employees can access more private information about their fellow employees.
D) Technology allows companies to access information about employees' behavior on the job.
E) Technology protects employees from being monitored in the workplace.
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
28
________ involves tricking a person into entering sensitive personal or financial information into a form on a website or in an e-mail,typically by convincing the person that she is dealing with a site she normally interacts with,such as her bank.

A) Adware
B) Spyware
C) Phishing
D) Spam
E) Hacking
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
29
Software that displays banner ads or pop-up ads on your computer is called ________.

A) adware
B) spyware
C) phishing
D) spam
E) PPC
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
30
Technology BEST supports whistle-blowers by ________.

A) enabling distribution of business codes of conduct on the Internet
B) making it possible for people to report a business's ethical violations safely and easily
C) wiretapping phones of employees or executives who are suspected of being unethical
D) making it difficult to violate employee privacy through electronic monitoring
E) making public the "near misses" that occur in a business
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
31
Which of the following is the BEST example of how technology supports ethical conduct in hospitals?

A) Technology ensures that the correct prescriptions are prescribed to patients.
B) Technology allows employees to report their mistakes without risking disciplinary action.
C) Technology quickly recognizes mistakes in data entry, preventing unfortunate errors.
D) Technology makes it easier to monitor the conversations of patients and visitors.
E) Technology eliminates the possibility of human error in most interactions between patients and staff.
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
32
Terrell urgently needs to take care of some personal business using the Internet,but he is afraid that he might jeopardize his job if he is found using the company network for personal use.Which corporate practice is causing Terrell to most likely feel this concern?

A) intellectual property monitoring
B) technology auditing
C) electronic monitoring
D) job tracking
E) whistle-blowing
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
33
Hilde's company wants to develop an understanding of the demographics of people purchasing its new product.The company wants to target its marketing at this demographic of people.The marketing department has used a database management system to identify the characteristics of buyers.Which of the following will be MOST useful for identifying the appropriate demographic group at which to target marketing?

A) data warehousing
B) data brainstorming
C) data consolidation
D) data mining
E) data marting
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
34
Mason's business is making a profit,but he needs to increase his bottom line so that he can invest in his firm's growth.He decides to purchase a business intelligence software package to help him identify ways to grow his company.Which of the following questions could Mason's business intelligence software answer?

A) Which of my competitors has the least debt?
B) Which countries would provide the least expensive production facilities?
C) Who are my top 10 revenue generating customers?
D) What new technologies will be available to increase my firm's productivity?
E) Which new markets would be the best for my firm to enter?
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
35
Which of the following statements BEST supports why hackers present risks to a company's security?

A) They distract employees from completing their assigned tasks.
B) They use encryption schemes to access corporate websites.
C) They gain unauthorized entry into a company's computer system.
D) They steal important papers from workers' desks and offices.
E) They overload a website with traffic to the point that it crashes.
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
36
Software that tracks your personal information and sends it to a third party without your knowledge is called ________.

A) adware
B) spyware
C) phishing
D) spam
E) viral marketing
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
37
Phishing is MOST OFTEN used to ________.

A) install adware
B) install spyware
C) steal credit card numbers
D) gather e-mail addresses for use by spammers
E) track the websites a user visits
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
38
Business intelligence software can help managers ________.

A) report, plan, and forecast workforce performance
B) assess the level of expertise of each of a business's employees
C) forecast their business's stock performance during the next fiscal year
D) gain access to private information about a business's competitors
E) design innovative products for consumer use
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
39
What best describes a data mart?

A) a store where companies can purchase data
B) a collection of network servers dedicated to hosting database management systems on the Internet
C) a collection of data about a single product or department that is part of a larger collection of data
D) a type of business intelligence software used for making purchasing decisions
E) a process that transforms data into useful business intelligence
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
40
Database management systems are MOST useful because ________.

A) information technology managers prefer to use software systems rather than qualitative systems
B) they help businesses manage vast amounts of data collected in the process of doing business
C) customers prefer companies that rely on database management systems
D) the company can hire more people to collect and analyze the data
E) clients are impressed by firms with high technology budgets
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
41
Phishing is commonly used to steal credit card numbers.
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
42
E-procurement typically occurs between businesses only.
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
43
Information technology has made it easier for whistle-blowers to file reports about unethical business practices.
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
44
Chief information officers do not get involved in creating business opportunities for their companies.
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
45
IT departments must ensure that companies use the newest technology that is available.
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
46
Which of the following statements about social media's impact on business is NOT true?

A) Social media helps people start and fund new businesses.
B) It is critical for companies to keep watch on the messages and information being spread about their products in cyberspace.
C) Companies that are well situated with a strong social media presence can use that to head off potential technical problems that might turn into public disaster.
D) It is important to use social media for marketing, but it cannot be used as an avenue for more specific business decision making.
E) Many businesses have created a position identified as social media manager or social media marketing specialist.
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
47
The chief information officer is responsible for the technology of a business,including the management and evaluation of the budget allotted for such technology.
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
48
As a result of technology,it is easier to protect private information today than it was in the last century.
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
49
Which of the following uses of social media would be most most likely to hurt rather than promote one's business?

A) Studying the users who visit one's Facebook page to detect patterns.
B) Using Twitter to announce special promotions that cater to one's customer base.
C) Offering people ways to use mobile apps to simplify and improve their customer experience.
D) Appealing to the preferences of one's customer base on social media outlets.
E) Making snide comments to undermine one's competition on social media sites.
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
50
Google's AdSense advertising is a form of contextual advertising.
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
51
Most states are pleased that their residents buy products online.
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
52
Products like Brandwatch and UberView are used by companies to ________.

A) expand the possibilities of cloud computing
B) create apps for mobile devices
C) generate automatic Tweets
D) detect crowdsource opportunities
E) perform social media monitoring
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
53
IT professionals sometimes create custom software to bridge the gaps between the software products available and the needs of the firm.
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
54
Viral marketing is most effective when it targets people who spend little or no time on the Internet.
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
55
A company's marketing department tends to be more successful if it minimizes its reliance on information technology.
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
56
"Click and mortar" refers to businesses that sell products from both physical locations and online.
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
57
Data mining has proven to be a poor technique for improving the effectiveness of a firm's marketing strategies.
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
58
Online analysis packages (OLAPs)enable very quick analysis of multiple sources of business information in order to present a clearer picture of the state of the business.
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
59
Technology's ability to process and document large amounts of data has better enabled people to understand interpersonal communication.
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
60
Spyware displays banner ads or pop-up ads on your computer.
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
61
Define and describe viral marketing.Use at least one example in your answer.
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
62
What aspect of social media is Kickstarter an example of,and what does it do?
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
63
What are the threats that challenge e-business?
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
64
What new jobs have been created with the rise of social media?
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
65
Give a brief,one-sentence description of each of the three main types of e-commerce transactions involving businesses and consumers.
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
66
What is the main difference between an IT system and an MIS system? Provide an example of how an MIS professional could contribute to a technology-related business decision.
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
67
Patrick is a quality control inspector at a pharmaceutical plant.He and his team are bound by strict quality standards to ensure that each unit is produced in a way that guarantees safety and effectiveness for the consumer.Recently,Patrick has been criticized for rejecting too many samples of the pharmaceuticals being produced.His manager has warned him that his inspection failure rate is negatively affecting the plant's productivity and that he should "reexamine" his inspection methods.Patrick does not want to be responsible for allowing an ineffective or dangerous medication to be sold to a patient,but he also does not want to lose his job.How can technology help Patrick ensure the quality of the products he is inspecting while at the same time protecting his job?
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
68
What is pay-per-click advertising and why is it effective?
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
69
Data and information are two terms that are often used interchangeably in business settings.Describe the differences between the two terms and provide an example to illustrate the business uses of data and information.
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
70
Crowdsourced funding (crowd funding)allows a great number of people who believe in a company
or a product to contribute a small amount to help the company get started.
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
71
What is the role of the information technology (IT)department?
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
72
Cameron works as a sales agent for a beverage company.Because she was this year's top sales agent,she was awarded a smartphone.What would be a major advantage for Cameron of having a smartphone? What disadvantages of owning a smartphone might Cameron experience?
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
73
Melinda has just graduated with a master's degree in information technology and has been having trouble finding a corporate job.None of the large companies she has contacted have job openings in her field.So Melinda decides to try marketing her services to some of her home town businesses.These businesses have been very slow to adopt new technology.For instance,the local hardware store runs just like it did thirty years ago,with an aging cash register and paper-based bookkeeping.She plans to talk with the store's owner about hiring her part time as its IT specialist to modernize the store's systems.What objections might the hardware store owner have to the idea of hiring an IT specialist,and what should Melinda say to convince the owner of the store that she can help increase the store's sales?
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
74
David is a manager at an engineering firm.He recently sent an e-mail to Michelle,a member of his team,to provide feedback on problems with the work that she had contributed to the team.Michelle complained to the human resources department that David was harassing her.David was completely taken aback,because he viewed the e-mail as an objective summary of the work that Michelle had performed.What aspects of technology-enabled communication could explain the differences between David's and Michelle's perceptions about the e-mail David sent? What would you recommend David do to prevent such a situation in the future?
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
75
What are the four main types of B2C models discussed in the textbook?
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
76
What is the current situation regarding sales taxes on Internet commerce? Who benefits? Who loses? Is the situation fair? Why or why not?
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
77
Clara is the human resources manager for her company,Global Distinctions,Inc.The president of the company has just told Clara that the company needs to hire a Chief Information Officer (CIO)for the company.Clara's first step will be to write a job description for the new role.What are the major responsibilities that Clara should include in the job description for the new CIO?
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
78
What are the advantages to the owners and customers of a "click and mortar" business?
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
79
Companies who wish to use apps on mobile devices must develop them on their own.
Unlock Deck
Unlock for access to all 79 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 79 flashcards in this deck.