問題一覧
1
In a business, which of the following area(s) does not use IT?
Manual processing
2
The social media platform that is the most suitable for ecommerce postings and advertisements would be (Facebook, Instagram, Snapchat, Pinterest).
3
According to Extract 2, besides AR, one other marketing strategy not used is _______
virtual try-ons
4
Mobile e-Commerce is a term that describes online commercial transactions that can take place anywhere and at any time.
True
5
One of the roles of an Information System is to support the operations of a business.
True
6
Verified information is reliable information.
True
7
Information depends on data and is organized or processed and presented in a meaning context
True
8
Information technology is confined to only the collection, processing and storage of information
False
9
The value of information is indirectly linked to how it helps decision makers achieve the organization's goals.
False
10
Information technology (IT) is the use of any computers, storage, networking and other physical devices, infrastructure, and processes to create, process, store, secure and exchange all forms of electronic data.
True
11
Data can be a random number, a word or even a string of alphanumerical phrase.
True
12
The terms "data" and "information" can be used interchangeably.
False
13
A challenge that some brick-and-mortar businesses are struggling to realise but is well executed by Kate Spade is their ability to _________.
bridge the gap between in-store and online experiences
14
Information depends on data and is organized or processed and presented in a meaning context.
True
15
One common aim of CONVERSE and Kate Spade in using an AR app is to _______.
engage customers
16
A challenge that some brick-and-mortar businesses are struggling to realise but is well executed by Kate Spade is their ability to _______.
bridge the gap between in-store and online experiences
17
Of the different social media platform users, the highest value for customer orders on average comes from (Twitter, Instagram, Facebook, Pinterest).
18
The social media platform through which most users make purchases from is (Instagram, Facebook, Twitter, Snapchat). Facebook is ranked as the most used social media platform. 85
19
Of the 1.45 billion daily active users on social media, the majority of them come from (European and Asian, Asian, US and Canadian, non-US nor Canadian) countries.
Non Us Nor Canadian
20
Businesses should make the mental health of their customers their top priority when offering products and services.
Understanding consumer behaviour trends would help companies make decisions on the design and development of the business website or app
21
Even if an ecommerce store can drive traffic to its website ________.
conversion of visits into purchases can be a challenge
22
Which of the following is not a form of online security threat?
Cookies
23
The internet offers all online retailers' equal opportunities, ________.
yet businesses have inherent strengths and weaknesses which affect their revenue
24
Personalization refers to ________
providing curated marketing to better serve customers' needs
25
Which of the following strategies can best help companies improve customer experience online?
Connect with customers to show that the company acknowledge and value them
26
One of the greatest concern of online businesses is in the capitalization of data. This means _______.
that there is a need to maximise the data collected to improve service and enhance marketing strategies to gain profits
27
Retailers who have moved their businesses online can ____.
increase customer base and revenue dramatically
28
Which of the following best explains the popularity of e- commerce to consumers?
24/7 accessibility anywhere in the world
29
Which of the following statements is true?
E-commerce describes commercial activities such as the buying and selling of products and services online, and the transfer of data and money to complete the transaction.
30
Non-compliance of data protection can potentially cause companies to lose money because _______.
data breaches may result in hefty fines
31
Data compliance is enforced by _____.
local governments and international governing bodies
32
How does encryption protect personal messages sent to a contact from unauthorised access?
Encryption alters the content based on an algorithm so that data is unreadable even if it's stolen.
33
Personal data collected by businesses could refer to the ______.
amount of time a user spent on apps on his or her mobile device
34
Which of the following is not true about data privacy?
Data privacy is not governed by the data protection regulations.
35
Organizations need to have a set of strategies and processes to secure the privacy, availability and integrity of the data they collect because _______.
the data can be stolen or lost
36
A system software that manages the computer hardware, software resources and provides common services for computer programs is the ______.
Operating System
37
Which of the following is true?
Software is the programs and routines written to make an electronic device run
38
An example of a microcomputer is a/an.______.
personal computer
39
Another name for external components connected to a computer in order to control either its inputs or outputs is known as the _______ components
peripheral
40
An information system (IS) generates information and integrates all the sub-systems to provide _______.
precise and quality information in accordance to what the management needs
41
Modern computers have evolved from _______.
calculators
42
The organization, distribution and manipulation of information is known as _______.
information processing
43
An input device used to produce high quality graphics in a variety of colours is the _______.
scanner
44
Computer hardware consists of _______.
all of the above
45
A device that allows user data to be converted into a form understandable by a computer is a/an ______
input device
46
In a business, which of the following area(s) does not use IT?
Manual processing
47
The assistance provided to computer users, as a result of needs or problems that arise from software and hardware of computers, networks, etc is known as ______.
technical support
48
Which areas are information security designed to protect?
Print, electronic, and other forms of confidential, private and sensitive information
49
Which of the following do information technology (IT) include?
Databases, networks, hardware, and software
50
Manual information systems do not only involve humans and do use electronic devices or software
False