問題一覧
1
How does encryption protect personal messages sent to a contact from unauthorised access?
Encryption alters the content based on an algorithm so that data is unreadable even if it's stolen.
2
Non-compliance of data protection can potentially cause companies to lose money because _______.
data breaches may result in hefty fines
3
The social media platform that is the most suitable for ecommerce postings and advertisements would be (Facebook, Instagram, Snapchat, Pinterest).
4
A device that allows user data to be converted into a form understandable by a computer is a/an ______
input device
5
An information system (IS) generates information and integrates all the sub-systems to provide _______.
precise and quality information in accordance to what the management needs
6
Which of the following best explains the popularity of e- commerce to consumers?
24/7 accessibility anywhere in the world
7
One of the roles of an Information System is to support the operations of a business.
True
8
According to Extract 2, besides AR, one other marketing strategy not used is _______
virtual try-ons
9
Which areas are information security designed to protect?
Print, electronic, and other forms of confidential, private and sensitive information
10
Of the 1.45 billion daily active users on social media, the majority of them come from (European and Asian, Asian, US and Canadian, non-US nor Canadian) countries.
Non Us Nor Canadian
11
The value of information is indirectly linked to how it helps decision makers achieve the organization's goals.
False
12
One common aim of CONVERSE and Kate Spade in using an AR app is to _______.
engage customers
13
Manual information systems do not only involve humans and do use electronic devices or software
False
14
Data can be a random number, a word or even a string of alphanumerical phrase.
True
15
Which of the following is true?
Software is the programs and routines written to make an electronic device run
16
Information technology (IT) is the use of any computers, storage, networking and other physical devices, infrastructure, and processes to create, process, store, secure and exchange all forms of electronic data.
True
17
Verified information is reliable information.
True
18
In a business, which of the following area(s) does not use IT?
Manual processing
19
Even if an ecommerce store can drive traffic to its website ________.
conversion of visits into purchases can be a challenge
20
A system software that manages the computer hardware, software resources and provides common services for computer programs is the ______.
Operating System
21
Businesses should make the mental health of their customers their top priority when offering products and services.
Understanding consumer behaviour trends would help companies make decisions on the design and development of the business website or app
22
Personalization refers to ________
providing curated marketing to better serve customers' needs
23
The organization, distribution and manipulation of information is known as _______.
information processing
24
Mobile e-Commerce is a term that describes online commercial transactions that can take place anywhere and at any time.
True
25
Organizations need to have a set of strategies and processes to secure the privacy, availability and integrity of the data they collect because _______.
the data can be stolen or lost
26
Which of the following statements is true?
E-commerce describes commercial activities such as the buying and selling of products and services online, and the transfer of data and money to complete the transaction.
27
Data compliance is enforced by _____.
local governments and international governing bodies
28
The terms "data" and "information" can be used interchangeably.
False
29
A challenge that some brick-and-mortar businesses are struggling to realise but is well executed by Kate Spade is their ability to _________.
bridge the gap between in-store and online experiences
30
Personal data collected by businesses could refer to the ______.
amount of time a user spent on apps on his or her mobile device
31
In a business, which of the following area(s) does not use IT?
Manual processing
32
The assistance provided to computer users, as a result of needs or problems that arise from software and hardware of computers, networks, etc is known as ______.
technical support
33
Retailers who have moved their businesses online can ____.
increase customer base and revenue dramatically
34
Information technology is confined to only the collection, processing and storage of information
False
35
The internet offers all online retailers' equal opportunities, ________.
yet businesses have inherent strengths and weaknesses which affect their revenue
36
Which of the following strategies can best help companies improve customer experience online?
Connect with customers to show that the company acknowledge and value them
37
Another name for external components connected to a computer in order to control either its inputs or outputs is known as the _______ components
peripheral
38
Information depends on data and is organized or processed and presented in a meaning context
True
39
Which of the following do information technology (IT) include?
Databases, networks, hardware, and software
40
Computer hardware consists of _______.
all of the above
41
Modern computers have evolved from _______.
calculators
42
Which of the following is not true about data privacy?
Data privacy is not governed by the data protection regulations.
43
An input device used to produce high quality graphics in a variety of colours is the _______.
scanner
44
One of the greatest concern of online businesses is in the capitalization of data. This means _______.
that there is a need to maximise the data collected to improve service and enhance marketing strategies to gain profits
45
A challenge that some brick-and-mortar businesses are struggling to realise but is well executed by Kate Spade is their ability to _______.
bridge the gap between in-store and online experiences
46
Of the different social media platform users, the highest value for customer orders on average comes from (Twitter, Instagram, Facebook, Pinterest).
47
Which of the following is not a form of online security threat?
Cookies
48
The social media platform through which most users make purchases from is (Instagram, Facebook, Twitter, Snapchat). Facebook is ranked as the most used social media platform. 85
49
Information depends on data and is organized or processed and presented in a meaning context.
True
50
An example of a microcomputer is a/an.______.
personal computer