Deck 6: Business Intelligence Implementation: Integration and Emerging Trends

Full screen (f)
exit full mode
Question
By applying algorithms that reduce the volume of personally identifiable information, reality mining can characterize places according to the activity and movement between them.
Use Space or
up arrow
down arrow
to flip the card.
Question
RFID technology generates massive amounts of data that can be analyzed to achieve great insights into a company's environment, a major purpose for the very existence of BI and decision support.
Question
Concepts such as virtual currencies often allow participants to buy or sell virtual goods or services, such as clothes or training.
Question
Virtual worlds are well-developed, interesting tools for businesses and consumers and have gained widespread acceptance.
Question
One of the applications of the massive amounts of data that are generated by RFID is in supply-chain management.
Question
RFID technology allows Coca-Cola to test and track new drink flavors and local preferences.
Question
Active RFID tags have their own power source and can initiate the data transmission process on their own, but need a reader to energize them.
Question
A clear vision and planning are factors critical to the success of BI implementation.
Question
Virtual worlds are defined as artificial worlds created by computer systems in which the user has the impression of being immersed.
Question
Web 2.0 is not only changing what is on the Web, but also how it works.
Question
Mobile social networking refers to social networking where members converse and connect with one another using cell phones or other mobile devices. It is much more popular in Japan, South Korea, and China than it is in the West.
Question
Just as RFID generates major data streams for further analysis through BI technologies that can assist in decision making, another massive data source and technologies to make sense of the data are emerging. This type of data mining is called reality mining.
Question
Social network analysis (SNA) software is used to identify, represent, analyze, visualize, or simulate network nodes and edges from various types of input data.
Question
Advertising and sales are the major EC activities in public social networks.
Question
To access a data warehouse, users who need to conduct an analysis, find information, or perform data visualization use software known as virtual ware.
Question
Without committed management support and sponsorship a business implementation has a high risk of failure.
Question
Simulating the real world via the use of tribes makes it possible to provide personalized services to each user without collecting personally identifiable information.
Question
In general, enterprises have not gained more value from BI by extending information to many types of employees, maximizing the use of existing data assets.
Question
Fundamentally, RFID is one example of automatic identification technologies, unlike scanner-based barcodes and magnetic strips.
Question
Wikia is an example of a new business model that has emerged from Web 2.0. It s the accumulation of the "power of the crowd," but the potential of such a business model remains limited because of competition.
Question
The success of today's highly volatile perishables supply chains depends on:

A) the range of passive tags.
B) the level and timeliness of product visibility.
C) the network effect.
D) the shelf life of the products.
Question
Which of the following is a reason why BI projects fail?

A) Failure to recognize BI projects as enterprise-wide business initiatives and that they differ from typical stand-alone solutions.
B) Lack of business sponsors with the ability to insure funding.
C) Lack of qualified and available staff.
D) All of the above.
Question
Which is not a major advantage of using Second Life for decision support?

A) easy access and low cost
B) pranksters and spam are filtered out
C) experienced and dedicated designer/builders
D) encourages active participation and experiential learning
Question
By analyzing and learning from these large-scale patterns of movement, Sense Networks is now adapting this general technology to help consumers find people with similar interests. This application is called ________.

A) Citysense
B) Macrosense
C) AppleSense
D) Second Life
Question
Privacy has long been a(n) ________ issue.

A) legal
B) ethical
C) social
D) all of the above
Question
MySpace and Facebook, Wikipedia and YouTube are examples of ________.

A) Web logs
B) online social networks
C) social network analysis software
D) Live Spaces
Question
A multitiered application architecture consists of:

A) ERP, cpm, and SCM
B) Web browser, Web server, application server, and database server
C) enterprise applications
D) All of the above
Question
Major objectives for BI software integration include all of the following except:

A) improving dashboard design
B) increasing the capabilities of the BI applications
C) enabling real-time decision support
D) enabling more powerful applications
Question
Many devices in use by consumers and business people are constantly sending out their ________.

A) location information
B) product data
C) triangulation
D) RFID
Question
Which of the following issues related to BI implementation is false?

A) BI and predictive analytics can lead to serious ethical issues such as privacy and accountability.
B) Developing an effective BI application is no longer complex.
C) Smaller organizations can make the solutions cost effective if they leverage existing databases rather than create new ones.
D) The quality and timeliness of business information for an organization is not the choice between profit and loss--it may be a question of survival.
Question
Today, collaboration on decisions that are more strategic in nature than ever before--decisions that may transform the business--involves nonroutine activities such as ________ discovering, innovating, creating and leading teams, learning, and relating.

A) visualizing
B) mining
C) brainstorming
D) virtual
Question
A primary reason why Facebook has expanded so rapidly is the ________, which refers to the principle that more users means more value.

A) network effect
B) mobile effect
C) mobile media
D) connection effect
Question
The most commonly used data representation for RFID technology is the:

A) Common Product Code (CPC)
B) Universal Product Code (UPC)
C) Electronic Product Code (EPC)
D) Standard Product Code (SPC)
Question
Although virtual worlds are becoming interesting tools for businesses and consumers, several factors have kept them from gaining widespread acceptance. Which of the following is one of those factors?

A) Requires downloading of a plug-in
B) Users get addicted
C) Costs are too high
D) Lack of technical staff
Question
Gillette has used RFID to determine whether stores have stocked their shelves with particular items for a particular promotion. They found that in those stores that used RFID to move a product from the backroom to the shelf before a promotion started, sales were ________ than those that did not move the product in a timely manner.

A) 8 percent higher
B) 18 percent higher
C) 28 percent higher
D) 48 percent higher
Question
One of the significant differences between Web 2.0 and the traditional Web is the ________ of Web 2.0.

A) enhanced privacy and security protection
B) opportunity to offer decision support capabilities in a novel way
C) greater collaboration among Internet users and other users, content providers, and enterprises
D) All of the above.
Question
RFID generates major data streams ready for analysis through BI technologies. Another massive data source is emerging, along with the data mining technologies to make sense of the data, which is referred to as ________.

A) triangulation
B) location-enabled services
C) reality mining
D) sensor mining
Question
RFID tag data for products consist of the following information except:

A) manufacturer
B) carrier
C) product
D) serial number
Question
The intention of ________ is to achieve a feeling of telepresence and participation from a distance.

A) active environments
B) Wikia
C) social networks
D) virtual worlds
Question
What is the difference between active and passive RFID tags?

A) Active tags have a battery as their own power source and do not need a reader to energize them like passive tags do.
B) Active tags receive energy from the electromagnetic field created by the reader; and passive tags receive energy from a battery.
C) Active tags are faster and less expensive than passive tags.
D) Passive tags are most frequently found in defense or military systems, and active tags are used more frequently in retail.
Question
________ software is used to identify, represent, analyze, visualize, or simulate network nodes and edges from various types of input data, including mathematical models of social networks.
Question
________ content is a major characteristic of Web 2.0, as is the emergence of social networking.
Question
A major highlight of Orkut is the individual power afforded to those who create their own groups and forums, which are called ________.
Question
Serious ________ issues may develop with the introduction of intelligent systems; liability and privacy are the dominant problem areas.
Question
Placing ________ chips on each flavor cartridge and using readers allows Coca-Cola to test new drink flavors and concepts, observe what flavors and combinations customers are choosing, identify regional preferences, and keep track of the amounts they are drinking.
Question
Privacy is the right to be left alone and the right to be free from ________ personal intrusions.
Question
Mobile social networking is much ________ popular in Japan, South Korea, and China than it is in the West.
Question
________ provide new immersive experiences for decision support and replicate many of the features
of physical gatherings.
Question
On the positive side for RFID, ________ have a longer read range, better accuracy, more complex rewritable information storage, and richer processing capabilities.
Question
In addition, members of social networks can tag the content they create and post it with key words they choose themselves, which makes the content ________.
Question
________, which was launched in 2004 by former Harvard student Mark Zuckerberg, is the second-largest social network service in the world.
Question
At present, the retail supply chain has primarily been interested in using ________ RFID tags.
Question
Business-oriented ________, such as InFlow and Netminer, concentrate on business issues.
Question
________ is the popular term for describing advanced Web technologies and applications, including blogs, wikis, RSS, mashups, user-generated content, and social networks.
Question
RFID tag data, in its purest form, is a series of ________.
Question
By analyzing and learning from these large-scale patterns of movement, it is possible to identify distinct classes of behaviors in specific contexts, called ________.
Question
The virtual elimination of software-upgrade cycles makes everything a perpetual ________ , or work in progress, and allows rapid prototyping, using the Web as an application development platform.
Question
________ is an effective and efficient Web development technique for creating interactive Web applications.
Question
Wikia is working on community-developed Web searches. If they can create a successful one, ________ will have a challenger.
Question
A major objective of Web 2.0 is to enhance creativity, information sharing, and ________.
Question
Describe three representative characteristics of the Web 2.0 environment.
Question
What is the main function of middleware?
Question
What is privacy? Why is it difficult to enforce privacy regulations?
Question
List four major disadvantages of using Second Life for decision support.
Question
List three reasons for BI project failures.
Question
Describe social network analysis (SNA) software.
Question
What are four major advantages of using Second Life for decision support?
Question
List four characteristics and benefits of SaaS.
Question
How are real-world institutions, such as businesses and government agencies, incorporating virtual worlds into their strategic marketing initiatives?
Question
Define the components of RFID and how active and passive tags works.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/70
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 6: Business Intelligence Implementation: Integration and Emerging Trends
1
By applying algorithms that reduce the volume of personally identifiable information, reality mining can characterize places according to the activity and movement between them.
False
2
RFID technology generates massive amounts of data that can be analyzed to achieve great insights into a company's environment, a major purpose for the very existence of BI and decision support.
True
3
Concepts such as virtual currencies often allow participants to buy or sell virtual goods or services, such as clothes or training.
True
4
Virtual worlds are well-developed, interesting tools for businesses and consumers and have gained widespread acceptance.
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
5
One of the applications of the massive amounts of data that are generated by RFID is in supply-chain management.
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
6
RFID technology allows Coca-Cola to test and track new drink flavors and local preferences.
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
7
Active RFID tags have their own power source and can initiate the data transmission process on their own, but need a reader to energize them.
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
8
A clear vision and planning are factors critical to the success of BI implementation.
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
9
Virtual worlds are defined as artificial worlds created by computer systems in which the user has the impression of being immersed.
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
10
Web 2.0 is not only changing what is on the Web, but also how it works.
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
11
Mobile social networking refers to social networking where members converse and connect with one another using cell phones or other mobile devices. It is much more popular in Japan, South Korea, and China than it is in the West.
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
12
Just as RFID generates major data streams for further analysis through BI technologies that can assist in decision making, another massive data source and technologies to make sense of the data are emerging. This type of data mining is called reality mining.
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
13
Social network analysis (SNA) software is used to identify, represent, analyze, visualize, or simulate network nodes and edges from various types of input data.
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
14
Advertising and sales are the major EC activities in public social networks.
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
15
To access a data warehouse, users who need to conduct an analysis, find information, or perform data visualization use software known as virtual ware.
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
16
Without committed management support and sponsorship a business implementation has a high risk of failure.
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
17
Simulating the real world via the use of tribes makes it possible to provide personalized services to each user without collecting personally identifiable information.
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
18
In general, enterprises have not gained more value from BI by extending information to many types of employees, maximizing the use of existing data assets.
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
19
Fundamentally, RFID is one example of automatic identification technologies, unlike scanner-based barcodes and magnetic strips.
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
20
Wikia is an example of a new business model that has emerged from Web 2.0. It s the accumulation of the "power of the crowd," but the potential of such a business model remains limited because of competition.
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
21
The success of today's highly volatile perishables supply chains depends on:

A) the range of passive tags.
B) the level and timeliness of product visibility.
C) the network effect.
D) the shelf life of the products.
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
22
Which of the following is a reason why BI projects fail?

A) Failure to recognize BI projects as enterprise-wide business initiatives and that they differ from typical stand-alone solutions.
B) Lack of business sponsors with the ability to insure funding.
C) Lack of qualified and available staff.
D) All of the above.
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
23
Which is not a major advantage of using Second Life for decision support?

A) easy access and low cost
B) pranksters and spam are filtered out
C) experienced and dedicated designer/builders
D) encourages active participation and experiential learning
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
24
By analyzing and learning from these large-scale patterns of movement, Sense Networks is now adapting this general technology to help consumers find people with similar interests. This application is called ________.

A) Citysense
B) Macrosense
C) AppleSense
D) Second Life
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
25
Privacy has long been a(n) ________ issue.

A) legal
B) ethical
C) social
D) all of the above
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
26
MySpace and Facebook, Wikipedia and YouTube are examples of ________.

A) Web logs
B) online social networks
C) social network analysis software
D) Live Spaces
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
27
A multitiered application architecture consists of:

A) ERP, cpm, and SCM
B) Web browser, Web server, application server, and database server
C) enterprise applications
D) All of the above
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
28
Major objectives for BI software integration include all of the following except:

A) improving dashboard design
B) increasing the capabilities of the BI applications
C) enabling real-time decision support
D) enabling more powerful applications
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
29
Many devices in use by consumers and business people are constantly sending out their ________.

A) location information
B) product data
C) triangulation
D) RFID
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
30
Which of the following issues related to BI implementation is false?

A) BI and predictive analytics can lead to serious ethical issues such as privacy and accountability.
B) Developing an effective BI application is no longer complex.
C) Smaller organizations can make the solutions cost effective if they leverage existing databases rather than create new ones.
D) The quality and timeliness of business information for an organization is not the choice between profit and loss--it may be a question of survival.
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
31
Today, collaboration on decisions that are more strategic in nature than ever before--decisions that may transform the business--involves nonroutine activities such as ________ discovering, innovating, creating and leading teams, learning, and relating.

A) visualizing
B) mining
C) brainstorming
D) virtual
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
32
A primary reason why Facebook has expanded so rapidly is the ________, which refers to the principle that more users means more value.

A) network effect
B) mobile effect
C) mobile media
D) connection effect
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
33
The most commonly used data representation for RFID technology is the:

A) Common Product Code (CPC)
B) Universal Product Code (UPC)
C) Electronic Product Code (EPC)
D) Standard Product Code (SPC)
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
34
Although virtual worlds are becoming interesting tools for businesses and consumers, several factors have kept them from gaining widespread acceptance. Which of the following is one of those factors?

A) Requires downloading of a plug-in
B) Users get addicted
C) Costs are too high
D) Lack of technical staff
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
35
Gillette has used RFID to determine whether stores have stocked their shelves with particular items for a particular promotion. They found that in those stores that used RFID to move a product from the backroom to the shelf before a promotion started, sales were ________ than those that did not move the product in a timely manner.

A) 8 percent higher
B) 18 percent higher
C) 28 percent higher
D) 48 percent higher
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
36
One of the significant differences between Web 2.0 and the traditional Web is the ________ of Web 2.0.

A) enhanced privacy and security protection
B) opportunity to offer decision support capabilities in a novel way
C) greater collaboration among Internet users and other users, content providers, and enterprises
D) All of the above.
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
37
RFID generates major data streams ready for analysis through BI technologies. Another massive data source is emerging, along with the data mining technologies to make sense of the data, which is referred to as ________.

A) triangulation
B) location-enabled services
C) reality mining
D) sensor mining
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
38
RFID tag data for products consist of the following information except:

A) manufacturer
B) carrier
C) product
D) serial number
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
39
The intention of ________ is to achieve a feeling of telepresence and participation from a distance.

A) active environments
B) Wikia
C) social networks
D) virtual worlds
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
40
What is the difference between active and passive RFID tags?

A) Active tags have a battery as their own power source and do not need a reader to energize them like passive tags do.
B) Active tags receive energy from the electromagnetic field created by the reader; and passive tags receive energy from a battery.
C) Active tags are faster and less expensive than passive tags.
D) Passive tags are most frequently found in defense or military systems, and active tags are used more frequently in retail.
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
41
________ software is used to identify, represent, analyze, visualize, or simulate network nodes and edges from various types of input data, including mathematical models of social networks.
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
42
________ content is a major characteristic of Web 2.0, as is the emergence of social networking.
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
43
A major highlight of Orkut is the individual power afforded to those who create their own groups and forums, which are called ________.
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
44
Serious ________ issues may develop with the introduction of intelligent systems; liability and privacy are the dominant problem areas.
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
45
Placing ________ chips on each flavor cartridge and using readers allows Coca-Cola to test new drink flavors and concepts, observe what flavors and combinations customers are choosing, identify regional preferences, and keep track of the amounts they are drinking.
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
46
Privacy is the right to be left alone and the right to be free from ________ personal intrusions.
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
47
Mobile social networking is much ________ popular in Japan, South Korea, and China than it is in the West.
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
48
________ provide new immersive experiences for decision support and replicate many of the features
of physical gatherings.
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
49
On the positive side for RFID, ________ have a longer read range, better accuracy, more complex rewritable information storage, and richer processing capabilities.
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
50
In addition, members of social networks can tag the content they create and post it with key words they choose themselves, which makes the content ________.
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
51
________, which was launched in 2004 by former Harvard student Mark Zuckerberg, is the second-largest social network service in the world.
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
52
At present, the retail supply chain has primarily been interested in using ________ RFID tags.
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
53
Business-oriented ________, such as InFlow and Netminer, concentrate on business issues.
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
54
________ is the popular term for describing advanced Web technologies and applications, including blogs, wikis, RSS, mashups, user-generated content, and social networks.
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
55
RFID tag data, in its purest form, is a series of ________.
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
56
By analyzing and learning from these large-scale patterns of movement, it is possible to identify distinct classes of behaviors in specific contexts, called ________.
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
57
The virtual elimination of software-upgrade cycles makes everything a perpetual ________ , or work in progress, and allows rapid prototyping, using the Web as an application development platform.
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
58
________ is an effective and efficient Web development technique for creating interactive Web applications.
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
59
Wikia is working on community-developed Web searches. If they can create a successful one, ________ will have a challenger.
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
60
A major objective of Web 2.0 is to enhance creativity, information sharing, and ________.
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
61
Describe three representative characteristics of the Web 2.0 environment.
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
62
What is the main function of middleware?
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
63
What is privacy? Why is it difficult to enforce privacy regulations?
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
64
List four major disadvantages of using Second Life for decision support.
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
65
List three reasons for BI project failures.
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
66
Describe social network analysis (SNA) software.
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
67
What are four major advantages of using Second Life for decision support?
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
68
List four characteristics and benefits of SaaS.
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
69
How are real-world institutions, such as businesses and government agencies, incorporating virtual worlds into their strategic marketing initiatives?
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
70
Define the components of RFID and how active and passive tags works.
Unlock Deck
Unlock for access to all 70 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 70 flashcards in this deck.