BUS TEST #2 Chapter 17
問題一覧
1
True
2
True
3
False
4
True
5
True
6
True
7
True
8
False
9
True
10
False
11
True
12
False
13
False
14
True
15
False
16
False
17
False
18
True
19
True
20
False
21
True
22
True
23
True
24
False
25
False
26
It takes the data on a computer hostage by encrypting it.
27
A worm
28
It attempts to get customers to communicate a firm's message to friends, family, and colleagues.
29
Phishing
30
viralmarketing
31
vertical applications software
32
E-commerce
33
data mining
34
applications software
35
A customer usually buys a standard product and pays the listed price.
36
worms
37
card present
38
An intranet
39
vertical applications software.
40
uses microchips that can be embedded in most types of tangible products.
41
The company can create a data warehouse and use data mining to discover unknown relationships.
42
supply chain.
43
it focuses on issues that are important to decision makers.
44
Unlike pharming, phishing uses techniques to redirect Internet traffic to fake sites.
45
Hypertext Markup Language (HTML)
BUS 101
BUS 101
ユーザ名非公開 · 100問 · 1年前BUS 101
BUS 101
100問 • 1年前Part 2
Part 2
ユーザ名非公開 · 100問 · 1年前Part 2
Part 2
100問 • 1年前part 3
part 3
ユーザ名非公開 · 46問 · 1年前part 3
part 3
46問 • 1年前BUS #2 Chapter 13
BUS #2 Chapter 13
ユーザ名非公開 · 50問 · 1年前BUS #2 Chapter 13
BUS #2 Chapter 13
50問 • 1年前BUS #2 chapter 9
BUS #2 chapter 9
ユーザ名非公開 · 49問 · 1年前BUS #2 chapter 9
BUS #2 chapter 9
49問 • 1年前BUS #2 Chapter 8
BUS #2 Chapter 8
ユーザ名非公開 · 48問 · 1年前BUS #2 Chapter 8
BUS #2 Chapter 8
48問 • 1年前問題一覧
1
True
2
True
3
False
4
True
5
True
6
True
7
True
8
False
9
True
10
False
11
True
12
False
13
False
14
True
15
False
16
False
17
False
18
True
19
True
20
False
21
True
22
True
23
True
24
False
25
False
26
It takes the data on a computer hostage by encrypting it.
27
A worm
28
It attempts to get customers to communicate a firm's message to friends, family, and colleagues.
29
Phishing
30
viralmarketing
31
vertical applications software
32
E-commerce
33
data mining
34
applications software
35
A customer usually buys a standard product and pays the listed price.
36
worms
37
card present
38
An intranet
39
vertical applications software.
40
uses microchips that can be embedded in most types of tangible products.
41
The company can create a data warehouse and use data mining to discover unknown relationships.
42
supply chain.
43
it focuses on issues that are important to decision makers.
44
Unlike pharming, phishing uses techniques to redirect Internet traffic to fake sites.
45
Hypertext Markup Language (HTML)