問題一覧
1
When using the cloud to store your documents, music, or photos, you only pay for the computer resources that you use.
True
2
Business intelligence systems are a new class of decision support systems developed over the past two decades to leverage data storage.
True
3
In the context of e-commerce, eBay and Craigslist are examples of business-to-government e-commerce.
False
4
An intranet limits access to a single firm's employees.
True
5
In the context of the business-to-consumer market, the use of Web 2.0 technologies within organizations is called Enterprise 2.0.
True
6
Cloud resources are not confined to a specific platform or operating system.
True
7
Which of the following statements is true of ransomware?
It takes the data on a computer hostage by encrypting it.
8
Data become information when they are processed, organized, and presented in a way that makes them useful to a decision maker.
True
9
Cloud computing allows users to access documents from anywhere via any computer without an Internet connection.
False
10
In the context of e-commerce, you can tell that a site on which you are doing business is using a secure socket layer (SSL) if the URL of the site begins with httpw://.
True
11
The fundamental form of system software is the operating system.
True
12
Scalesto Corp. is a law firm that also provides online support regarding lawsuits. To help its clients, it has a team dedicated to identify useful information from the company's database. In this scenario, Scalesto most likely uses _____ to analyze vast amounts of data.
data mining
13
An e-marketplace is referred to as a specialized Internet site where buyers and sellers engaged in business-to-business (B2B) e-commerce can communicate and conduct business.
True
14
Which of the following statements is true of viral marketing?
It attempts to get customers to communicate a firm's message to friends, family, and colleagues.
15
Which of the following statements is true of business-to-consumer e-commerce?
A customer usually buys a standard product and pays the listed price.
16
Credit card fraud in stores is known as _____ transactions.
card present
17
Dropbox is a consumer-focused cloud computing service that allows users to access and share documents and files.
True
18
In the context of security concerns arising from new technologies, malware is short for malignant hardware.
False
19
Radio frequency identification (RFID) is used to increase the efficiency of supply chains.
True
20
The Internet is a network of networks, consisting of hundreds of thousands of smaller networks operating under a common set of protocols so that they can communicate with each other.
True
21
In business-to-consumer e-commerce, purchases typically involve extensive negotiation.
False
22
An advantage of an expert system is that it is capable of solving a wide variety of problems, including those that are quite different from the problems it was originally designed to solve.
False
23
Businesses develop intranets so that valued customers have access to internal information that is not available to the general public.
False
24
Documents stored on the World Wide Web are written and linked together using _____.
Hypertext Markup Language (HTML)
25
Black hat hackers are hackers who have no harmful intent.
False
26
in business-to-business (B2B) e-commerce, customers usually do little or no research before making a purchase.
False
27
Helpers, a nongovernmental organization, launches practbilling.com, a website where all sorts of bills can be paid. It uses a specially designed software to allow hassle-free transactions in the billing and charges a nominal fee from the users. In this scenario, Helpers uses a(n) _____.
vertical applications software
28
Which of the following is a difference between phishing and pharming?
Unlike pharming, phishing uses techniques to redirect Internet traffic to fake sites.
29
Word processing, spreadsheet, and personal information management software are examples of vertical applications software.
False
30
_____ is a scam in which official-looking emails are sent to individuals in an attempt to get them to divulge private information such as passwords, usernames, and account numbers.
Phishing
31
Breto Lupix, a graphic design company, installed a new software in its computers that enabled them to design three-dimensional logos, brochures, and banners. In this scenario, Breto Lupix has installed _____ in its computers.
applications software
32
In the context of cybermediaries, Venmo, operated by PayPal, is used to make payments to friends.
True
33
Sharon runs a boutique. She gets the raw materials from a cloth mill owner who provides her various fabrics at discounted rates. She installs a system that automatically analyzes her inventory and coordinates with the cloth mill owner whenever the inventory seems low. In this scenario, Sharon displays good business sense and has an efficient:
supply chain.
34
In the context of the characteristics of good information, when information is relevant, it means that:
it focuses on issues that are important to decision makers.
35
In the context of electronic bill presentment and payment, the method of biller-direct is one where you use the "bill-pay" service at your bank to automatically pay your monthly bills.
False
36
When product designers use computer-aided design (CAD) software to produce technical drawings in three dimensions, they are using:
vertical applications software.
37
Jamie visits an unverified website while surfing the Internet. This results in the download of a malicious software that is independent and starts spreading on its own without being attached to other files. Jamie's computer stops functioning properly. In this scenario, Jamie must have downloaded _____.
worms
38
A business intelligence system helps decision makers discover information that was previously hidden.
True
39
Everything.com, an online cosmetics portal, does not allow its customers to reach the final billing section unless they share its offer links with at least two friends. In this scenario, everything.com uses _____ to communicate its message.
viralmarketing
40
Radio frequency identification (RFID):
uses microchips that can be embedded in most types of tangible products.
41
_____ is similar to a virus, except that it is an independent program that can spread across computer networks without being attached to other files.
A worm
42
Which of the following approaches can a company use to implement a business intelligence system to gain a competitive advantage?
The company can create a data warehouse and use data mining to discover unknown relationships.
43
_____ refers to marketing, buying, selling, and servicing of products over a network, usually the Internet.
E-commerce
44
Horizontal applications software consists of highly specialized applications used in a particular industry, such as brokerage firms.
False
45
A business firm notifies all its employees about a general meeting that is to be held the next day and asks them to confirm their attendance at the meeting by clicking on the link provided within the same email message. The firm sends the email through its private network that is accessible only to the management and the employees of the firm. Which of the following information networks is used by the firm to notify its employees?
An intranet