問題一覧
1
Dropbox is a consumer-focused cloud computing service that allows users to access and share documents and files.
True
2
When using the cloud to store your documents, music, or photos, you only pay for the computer resources that you use.
True
3
Word processing, spreadsheet, and personal information management software are examples of vertical applications software.
False
4
Radio frequency identification (RFID) is used to increase the efficiency of supply chains.
True
5
A business intelligence system helps decision makers discover information that was previously hidden.
True
6
Data become information when they are processed, organized, and presented in a way that makes them useful to a decision maker.
True
7
Cloud resources are not confined to a specific platform or operating system.
True
8
Businesses develop intranets so that valued customers have access to internal information that is not available to the general public.
False
9
In the context of cybermediaries, Venmo, operated by PayPal, is used to make payments to friends.
True
10
An advantage of an expert system is that it is capable of solving a wide variety of problems, including those that are quite different from the problems it was originally designed to solve.
False
11
An intranet limits access to a single firm's employees.
True
12
In the context of electronic bill presentment and payment, the method of biller-direct is one where you use the "bill-pay" service at your bank to automatically pay your monthly bills.
False
13
In the context of security concerns arising from new technologies, malware is short for malignant hardware.
False
14
An e-marketplace is referred to as a specialized Internet site where buyers and sellers engaged in business-to-business (B2B) e-commerce can communicate and conduct business.
True
15
In the context of e-commerce, eBay and Craigslist are examples of business-to-government e-commerce.
False
16
Black hat hackers are hackers who have no harmful intent.
False
17
in business-to-business (B2B) e-commerce, customers usually do little or no research before making a purchase.
False
18
The Internet is a network of networks, consisting of hundreds of thousands of smaller networks operating under a common set of protocols so that they can communicate with each other.
True
19
The fundamental form of system software is the operating system.
True
20
Horizontal applications software consists of highly specialized applications used in a particular industry, such as brokerage firms.
False
21
In the context of e-commerce, you can tell that a site on which you are doing business is using a secure socket layer (SSL) if the URL of the site begins with httpw://.
True
22
Business intelligence systems are a new class of decision support systems developed over the past two decades to leverage data storage.
True
23
In the context of the business-to-consumer market, the use of Web 2.0 technologies within organizations is called Enterprise 2.0.
True
24
Cloud computing allows users to access documents from anywhere via any computer without an Internet connection.
False
25
In business-to-consumer e-commerce, purchases typically involve extensive negotiation.
False
26
Which of the following statements is true of ransomware?
It takes the data on a computer hostage by encrypting it.
27
_____ is similar to a virus, except that it is an independent program that can spread across computer networks without being attached to other files.
A worm
28
Which of the following statements is true of viral marketing?
It attempts to get customers to communicate a firm's message to friends, family, and colleagues.
29
_____ is a scam in which official-looking emails are sent to individuals in an attempt to get them to divulge private information such as passwords, usernames, and account numbers.
Phishing
30
Everything.com, an online cosmetics portal, does not allow its customers to reach the final billing section unless they share its offer links with at least two friends. In this scenario, everything.com uses _____ to communicate its message.
viralmarketing
31
Helpers, a nongovernmental organization, launches practbilling.com, a website where all sorts of bills can be paid. It uses a specially designed software to allow hassle-free transactions in the billing and charges a nominal fee from the users. In this scenario, Helpers uses a(n) _____.
vertical applications software
32
_____ refers to marketing, buying, selling, and servicing of products over a network, usually the Internet.
E-commerce
33
Scalesto Corp. is a law firm that also provides online support regarding lawsuits. To help its clients, it has a team dedicated to identify useful information from the company's database. In this scenario, Scalesto most likely uses _____ to analyze vast amounts of data.
data mining
34
Breto Lupix, a graphic design company, installed a new software in its computers that enabled them to design three-dimensional logos, brochures, and banners. In this scenario, Breto Lupix has installed _____ in its computers.
applications software
35
Which of the following statements is true of business-to-consumer e-commerce?
A customer usually buys a standard product and pays the listed price.
36
Jamie visits an unverified website while surfing the Internet. This results in the download of a malicious software that is independent and starts spreading on its own without being attached to other files. Jamie's computer stops functioning properly. In this scenario, Jamie must have downloaded _____.
worms
37
Credit card fraud in stores is known as _____ transactions.
card present
38
A business firm notifies all its employees about a general meeting that is to be held the next day and asks them to confirm their attendance at the meeting by clicking on the link provided within the same email message. The firm sends the email through its private network that is accessible only to the management and the employees of the firm. Which of the following information networks is used by the firm to notify its employees?
An intranet
39
When product designers use computer-aided design (CAD) software to produce technical drawings in three dimensions, they are using:
vertical applications software.
40
Radio frequency identification (RFID):
uses microchips that can be embedded in most types of tangible products.
41
Which of the following approaches can a company use to implement a business intelligence system to gain a competitive advantage?
The company can create a data warehouse and use data mining to discover unknown relationships.
42
Sharon runs a boutique. She gets the raw materials from a cloth mill owner who provides her various fabrics at discounted rates. She installs a system that automatically analyzes her inventory and coordinates with the cloth mill owner whenever the inventory seems low. In this scenario, Sharon displays good business sense and has an efficient:
supply chain.
43
In the context of the characteristics of good information, when information is relevant, it means that:
it focuses on issues that are important to decision makers.
44
Which of the following is a difference between phishing and pharming?
Unlike pharming, phishing uses techniques to redirect Internet traffic to fake sites.
45
Documents stored on the World Wide Web are written and linked together using _____.
Hypertext Markup Language (HTML)