Deck 16: Managing Information and Technology: Finding New Ways to Learn and Link

Full screen (f)
exit full mode
Question
Scalesto Corp. is a law firm that also provides online support regarding lawsuits. To help its clients, it has a team dedicated to identify useful information from the company's database. In this scenario, Scalesto most likely uses _____ to analyze vast amounts of data.

A)a cybermediary
B)data mining
C)an expert system
D)intranet
Use Space or
up arrow
down arrow
to flip the card.
Question
In the context of electronic bill presentment and payment, the method of biller-direct is one where consumers receive email reminders and then pay their bills at the company website.
Question
Radio frequency identification (RDIF) is used to increase the efficiency of supply chains.
Question
An advantage of an expert system is that it is capable of solving a wide variety of problems, including those that are quite different from the problems it was originally designed to solve.
Question
Cloud resources are not confined to a specific platform or operating system.
Question
Mervin, an employee of a non-governmental organization, conducts a survey among children about the awareness of traffic rules. The facts and figures collected by him are processed and organized by an analytic team to conclude whether the surveyed children are aware of traffic rules. In this scenario, the report that would be prepared by the analytic team can be referred to as _____.

A)statistics
B)data
C)information
D)cybermediary
Question
Businesses develop intranets so that valued customers have access to internal information that is not available to the general public.
Question
Word processing, spreadsheet, and personal information management software are examples of vertical applications software.
Question
Data become information when they are processed, organized, and presented in a way that makes them useful to a decision maker.
Question
Business intelligence systems are a new class of decision support systems developed over the past two decades to leverage data storage.
Question
Alacrity Couriers uses advanced information technology to run its business efficiently. It allows its customers to track their consignments on its website. In this scenario, the use of a(n) _____ enables the customers to check on the status of their consignments.

A)expert system
B)cybermediary
C)extranet
D)firewall
Question
Black hat hackers are hackers who have no harmful intent.
Question
Horizontal applications software consists of highly specialized applications used in a particular industry, such as brokerage firms.
Question
Augustus, a student undergoing his doctorate program, is working on a thesis that requires him to browse the Internet for information and visit various unverified websites. To protect his computer from the risk of attracting unwanted messages and other security threats, he uses a tool that uses both hardware and software to provide protection against hackers. In the given scenario, Augustus is most likely using _____.

A)a firewall
B)spyware
C)malware
D)a spam filter
Question
Helpers, a nongovernmental organization, launches practbilling.com, a website where all sorts of bills can be paid. It uses a specially designed software to allow hassle-free transactions in the billing and charges a nominal fee from the users. In this scenario, Helpers uses a(n) _____.

A)horizontal applications software
B)vertical applications software
C)open source software
D)copylefted software
Question
Word processing, spreadsheet, and personal information management software used by different businesses and occupations are examples of:

A)horizontal applications software.
B)vertical applications software.
C)open source software.
D)copylefted software.
Question
Cognizance, an online news portal, needs to update its website frequently. To achieve this, the IT department of Cognizance develops a system that gives its managers access to large amounts of data and the processing power to convert the data into high-quality information quickly and efficiently. In this scenario, Cognizance has developed _____ to assist its managers.

A)a decision support system
B)a computer-aided design
C)an expert system
D)Hypertext Markup Language
Question
People's Pal, a public sector bank, provides a feature on its website that allows its customers to disburse their bills automatically on a monthly basis. This saves its customers from the hassle of forgetting to pay their bills and paying a fine. In this scenario, People's Pal uses:

A)electronic bill presentment and payment.
B)a cybermediary.
C)intranet.
D)decision support systems.
Question
Kiara, while trying to login to her bank website, visits a scammer's fake, official-looking website and provides her personal and financial information. The next day, she finds out that an amount has been deducted from her account that she has not transacted. She registers a complaint and finds out that the website which she logged in was a fake website. In this scenario, Kiara is a victim of _____.

A)phishing
B)pharming
C)hacking
D)clickjacking
Question
SafeTransact is an Internet-based company that specializes in the secure electronic transfer of funds between businesses and clients. It uses some Internet tools to ensure the security of the online transactions. In this scenario, SafeTransact is a(n) _____.

A)expert system
B)cybermediary
C)intranet
D)data warehouse
Question
Websites that incorporate interactive and collaborative features to create a richer, more interesting, and more useful experience for their users are known as _____.

A)Web 2.0 sites
B)InterNIC sites
C)Internet2 sites
D)extranet sites
Question
Steven got arrested for stealing nearly two million dollars from a local bank. Using the Internet, he broke into the bank's computer and illegally accessed personal information and account details of the clients. In this scenario, Steven is a _____.

A)hacker
B)phisher
C)compiler
D)networker
Question
Martha sued Joseph for plagiarizing her song "The Speaking Parrots," released as a single in her 2007 album called "Exhaustion." Martha alleged that Joseph's song, titled "As You Speak," was an unauthorized rip-off of her original hit and that Joseph infringed her copyrighted work. In this scenario, Joseph's actions can be referred to as _____.

A)phishing
B)piracy
C)pharming
D)trademark
Question
_____ is often referred to as the world's largest computer network.

A)A cloud-based network
B)The Internet
C)An extranet
D)The kernel
Question
Brianne's inbox is clogged up by unsolicited email advertisements and has more number of these mails than legitimate messages. This has made it difficult for her to manage her mails. In this scenario, the unwanted email advertisements that Brianne has received are _____.

A)worms
B)firewalls
C)spam
D)spyware
Question
MergeFirms.com provides a platform for buyers and sellers to engage in business-to-business (B2B) e-commerce. Buyers and sellers get the opportunity to interact with each other and conduct their businesses through it. In this scenario, MergeFirms.com acts as a(n) _____.

A)expert system
B)e-marketplace
C)intranet
D)cybermediary
Question
Habib, a writer, uses Microsoft Word to write, edit, and prepare his manuscripts for publication. Microsoft Word helps Habib to complete his work with minimal effort. In this scenario, Habib is using _____.

A)system software
B)antivirus software
C)applications software
D)malicious software
Question
Fatima enjoys online shopping as it allows her to buy things from a wide range of options from the convenience of her home. She recently bought a food processor online. In this scenario, Fatima is involved in _____.

A)business-to-consumer e-commerce
B)business-to-business e-commerce
C)business-to-government e-commerce
D)consumer-to-consumer e-commerce
Question
Jeff, the CEO of Francostico Inc., decides to set up a system that would help its managers with decision making . To design this system, his programmers ask skilled and proficient managers to explain how they solve problems. Then, they devise a program to mimic the specialists' approach, incorporating various rules or guidelines that the specialists use. In this scenario, Jeff seeks to develop a(n) _____ for the managers.

A)business intelligence system
B)data warehouse
C)cybermediary
D)expert system
Question
When properly implemented, intranets enhance communication and collaboration among:

A)external stakeholders.
B)vendors.
C)buyers and sellers.
D)employees.
Question
__________is a scam in which official-looking emails are sent to individuals in an attempt to get them to divulge private information such as passwords, usernames, and account numbers.

A)Hacking
B)Clickjacking
C)Pharming
D)Phishing
Question
The _____ requires senders of unwanted commercial email to label their messages as ads and to tell the recipient how to decline further messages.

A)Combating Online Infringement and Counterfeits Act
B)Junk Fax Prevention Act
C)Anticybersquatting Consumer Protection Act
D)Controlling the Assault of Non-Solicited Pornography and Marketing Act
Question
_____ is similar to a virus, except that it is an independent program that can spread across computer networks without being attached to other files.

A)A worm
B)Email spam
C)Spyware
D)An adware program
Question
Which of the following is true of cloud computing?

A)It discourages collaboration among employees and business partners.
B)It leads to a low processing speed.
C)It allows lower costs and excess capacity to its users.
D)It decreases data security.
Question
Jack, a sixty-year-old man, is an avid reader. He recently found out the online facility of downloading books. He is happy to have so many options to choose from and to have such easy access to e-books. He downloads books from many websites, and he does not mind using unverified websites for downloading them. In this scenario, Jack is most likely to be vulnerable to _____.

A)firewalls
B)malware
C)cybermediaries
D)cloud computing
Question
Sharon runs a boutique. She gets the raw material from a cloth mill owner who provides her various fabrics at discounted rates. She installs a system that automatically analyzes her inventory and coordinates with the cloth mill owner whenever the inventory seems low. In this scenario, Sharon displays good business sense and has an efficient:

A)vendor-managed inventory.
B)supply chain.
C)line of command.
D)interest group.
Question
Melingo Furniture provides its customers with an option of buying, selling, and servicing of its products online. This helps Melingo Furniture create a customer base by providing convenience to them. In this scenario, Melingo Furniture is involved in _____.

A)e-commerce
B)cloud computing
C)data mining
D)object hyperlinking
Question
Brandon goes to watch a newly released movie with his friends. In the theater, he takes a video recording of the entire movie through his smartphone and later releases the clip on the Internet where others can watch it free of cost. Brandon is involved in the act of _____.

A)phishing
B)piracy
C)infoanarchism
D)hacktivism
Question
Which of the following is an advantage of a broadband Internet connection?

A)It allows access to only a limited number of websites to avoid security risks.
B)It allows users to quickly download large files such as music, games, and movies.
C)It is based on fiber-optic cable that enables it to efficiently handle many scientific applications.
D)It has less security risks compared with dial-up Internet.
Question
_____ is a technology that stores information on a microchip and transmits it to a reader when it is within range.

A)The global positioning system
B)Computer-aided design software
C)The graphical user interface
D)Radio frequency identification
Question
Keith, with his three other friends, sends email messages to people that appear to come from a legitimate business, such as a bank, credit card company, or retailer. With these official looking emails, they trick people to disclose their personal information such as passwords, usernames, and account numbers. In this scenario, Keith and his friends are involved in _____.

A)hacking
B)phishing
C)pharming
D)viral marketing
Question
An effective supply chain requires close coordination between:

A)a company and its consumer base.
B)customers and the market stock.
C)a company and its suppliers.
D)customers and the billing process.
Question
Ronald is an avid reader of detective novels. He visits a few websites to look for the latest novels of his favorite author. The next day he finds multiple ads in his inbox suggesting thriller novels from various authors. In this scenario, the malicious software used to track down Ronald's online behavior is _____.

A)a worm
B)spyware
C)a bastion host
D)attack tree software
Question
Prescostico Inc. uses a business intelligence system to gain competitive advantage over other companies. This system helps Prescostico:

A)provide Internet-based storage capacity.
B)interpret its data meaningfully.
C)encourage collaboration among employees and business partners.
D)access an array of computing resources without investing in expensive new hardware.
Question
Drexterios Inc. is a financial firm that deals with public grievances regarding bill payments. It uses a centralized location for storing data from its internal databases as well as external sources to make it easy for its employees and customers to access the information. In this scenario, Drexterios uses a(n) _____ to store the data.

A)cybermediary
B)data warehouse
C)decision support system
D)expert system
Question
A business firm notifies all its employees about a general meeting that is to be held the next day and asks them to confirm their attendance at the meeting by clicking on the link provided within the same email message. The firm sends the email through its private network that is accessible only to the management and the employees of the firm. Which of the following information networks is used by the firm to notify its employees?

A)A metropolitan area network
B)An extranet
C)An intranet
D)A peer-to-peer network
Question
Firms create _____ by offering limited access to certain areas of their private network to a selected group of stakeholders.

A)open systems
B)expert systems
C)firewalls
D)extranets
Question
A__________is a request for the database management software to search a database for data that match criteria specified by a user.

A)cybermediary
B)protocol
C)query
D)cache
Question
_____ refers to marketing, buying, selling, and servicing of products over a network, usually the Internet.

A)E-commerce
B)Media-based networking
C)Inventory management
D)Group buying
Question
_____ refers to the physical components used to collect, input, store, and process data, and to display and distribute information.

A)Hardware
B)Software
C)An operating system
D)An execution unit
Question
Data mining allows organizations to:

A)analyze vast amounts of data to identify useful information that had been hidden.
B)guide managers through the decision-making process.
C)encourage collaboration among employees and business partners.
D)access an array of computing resources without investing in expensive new hardware.
Question
In the context of e-commerce, most websites transmit online payment information using _____ to ensure safe transactions.

A)an intranet
B)a secure socket layer protocol
C)InterINC
D)Hypertext Markup Language
Question
Breto Lupix, a graphic design company, installed a new software in its computers that enabled them to design three-dimensional logos, brochures, and banners. In this scenario, Breto Lupix has installed _____ in its computers.

A)system software
B)antivirus software
C)applications software
D)copylefted software
Question
__________is an Internet marketing strategy that tries to involve customers and others not employed by the seller in activities that help promote the product.

A)Viral marketing
B)Call to action marketing
C)Close range marketing
D)Outbound marketing
Question
Demi loves playing online games. She surfs through many websites to find new, interesting games. One day she finds that her mailbox is filled with emails suggesting websites for online games and ads promoting a few online offers. In this scenario, a(n) _____ tracks Demi's computer behavior to send her targeted mails and ads.

A)firewall
B)spyware
C)bastion host
D)attack tree
Question
Clomien Corp., a law firm, needs frequent interpretation of its stored data for cross-references and formulation of decisions. It uses a(n) _____ to help it discover subtle and complex relationships hidden in its data.

A)expert system
B)data warehouse
C)cybermediary
D)business intelligence system
Question
Which of the following statements is true of radio frequency identification?

A)It improves the processing speed of a computer device.
B)It installs a device in production units that requires ample space for storage and maintenance.
C)It can help users transmit files across computers without an Internet connection.
D)It can be used to help track goods and other resources.
Question
A benefit that cloud computing provides to individual users is that:

A)it allows them to access their data from any computer without an Internet connection.
B)it eliminates the threat of unauthorized access.
C)it helps them analyze and process complex data without professional help.
D)it allows them to store large files without taking up valuable space on their computers' hard drive.
Question
Everything.com, an online cosmetics portal, does not allow its customers to reach the final billing section unless they share its offer links to at least two friends. In this scenario, everything.com uses _____ to communicate its message.

A)Web 2.0
B)cybermediary
C)viral marketing
D)InterINC
Question
Taxedo, a finance firm, uses a private network to communicate with its employees. All of its official mails are sent through its private network, which is restricted for others. In this scenario, which of the following networks is used by Taxedo to communicate with its employees?

A)A metropolitan area network
B)A nanonetwork
C)An intranet
D)A peer-to-peer network
Question
Identify a true statement about radio frequency identification.

A)It improves the processing speed of a computer device.
B)It stores information on a microchip and transmits it to a reader.
C)The frequency covers vast areas and can be propagated across long distances.
D)The chips are usually powered by batteries.
Question
With _____, consumers receive email reminders and then pay their bills at the company website.

A)Enterprise 2.0
B)bill-pay
C)biller-direct
D)viral marketing
Question
Zahra buys a product from a high-end store, and the sales representative asks her to fill out a customer registration form so that she can avail discount offers and receive notifications about new products in the future. Although providing one's mailing details is optional, Zahra provides her details as she wants to be updated about any new products that the store has to offer. In this context, which of the following statements is true?

A)Zahra is a victim of phishing.
B)Zahra has chosen to receive opt-in emails.
C)Zahra has chosen to receive push emails.
D)Zahra is exposed to viral marketing.
Question
Which of the following is true of expert systems?

A)They are unable to help in fraud detection.
B)They are time-consuming and expensive.
C)They use powerful statistical techniques to analyze data.
D)They are highly flexible in nature.
Question
With bank-aggregator billing, one uses the _____ service at one's bank to automatically disburse one's monthly charges.

A)enterprise 2.0
B)bill-pay
C)biller-direct
D)viral marketing
Question
The__________prohibits the use of false or deceptive subject lines in email messages.

A)Combating Online Infringement and Counterfeits Act
B)Junk Fax Prevention Act
C)Anticybersquatting Consumer Protection Act
D)Controlling the Assault of Non-Solicited Pornography and Marketing Act
Question
Documents stored on the World Wide Web are written and linked together using _____.

A)decision support systems (DSS)
B)computer-aided design (CAD)
C)Extensible Markup Language (XML)
D)Hypertext Markup Language (HTML)
Question
Which of the following statements is true of copyright law?

A)It gives the creators of intellectual property the exclusive right to produce, perform, and sell their work for a specified time period.
B)Once an intellectual property is copyrighted, its further use is restricted forever.
C)Copyrighting a product ensures that it is protected from piracy.
D)It gives individuals the right to reproduce the pirated version of an intellectual property after the death of its original creator.
Question
The two broad categories of software are:

A)open source software and data software.
B)embedded software and business software.
C)server software and proprietary software.
D)system software and application software.
Question
In business-to-business (B2B) e-commerce, _____.

A)most purchases are based on impulse
B)the negotiations include a large number of business customers
C)the size of a typical individual transaction is relatively small
D)buyers and sellers often develop close and long-lasting relationships
Question
Candice is an entrepreneur who mostly communicates with her clients over emails. Lately, however, she has found it difficult to locate legitimate email messages in her inbox. This is because of the numerous unsolicited commercial emails that clutter her inbox. To prevent this from occurring in the future, Candice should _____.

A)use a spam filter
B)use a content-control filter
C)use a business intelligence system
D)install a spyware program
Question
Which of the following refers to programs that install themselves on computers without the users' knowledge or permission and spread by attaching themselves to other files that are transferred from computer to computer?

A)Computer worms
B)Computer viruses
C)Freeware applications
D)Spyware applications
Question
In the _____ form of e-commerce, firms want to develop buyer loyalty and repeat business but seldom develop a close working relationship with individual buyers.

A)business-to-government (B2G)
B)business-to-consumer (B2C)
C)business-to-business (B2B)
D)consumer-to-consumer (C2C)
Question
Framex Inc. has separate computer-accessible storage media for all of its departments. These storage media store files of related data organized according to a logical system. In this scenario, Framex has many different _____ for its various departments.

A)decision support systems
B)databases
C)cybermediaries
D)business intelligence systems
Question
BlueWink, a popular marketing firm, requires a mechanism to protect its confidential data and client details from hackers, cyber criminals, and other security threats. Which of the following should BlueWink use as a safeguard?

A)Expert systems
B)Firewalls
C)Cybermediaries
D)Intranet
Question
Legostine Corp. uses a new high-tech network based on fiber-optic cable. The network utilizes technologies that give it a speed and capacity far exceeding the current network and is available only to Legostine's employees. In this scenario, Legostine Corp. uses _____.

A)Web 2.0
B)Internet2
C)broadband
D)extranet
Question
Cloud computing is most likely to:

A)eliminate the threat of computer viruses and unauthorized access.
B)create a need to invest heavily in expensive hardware.
C)let companies access large computing resources without the need to invest heavily in IT personnel.
D)decrease the processing speed of computers.
Question
Spedex, an on-rent cab provider company, launches a new feature on its website that can help its customers track their cabs online. The feature requires a sign-in process. Since the feature is new, many customers face problems in figuring out a way to access this feature. To solve this problem, Spedex creates a customer-support page on its website that will resolve the issues of its customers. In this scenario, the customer-support page on Spedex's website is an example of a(n) _____.

A)business intelligence system
B)expert system
C)cybermediary
D)data warehouse
Question
Nefchio.com is a popular website among online gamers. It uses interactive and collaborative features to create a richer, more interesting, and more useful experience for its users to beat the competition in the industry. In this scenario, Nefchio.com uses a new approach called _____.

A)Web 2.0
B)extranet
C)InterNIC
D)Internet2
Question
ZumbaUp, a leading jeans brand, realized that a user named PoisonX had breached its security codes and gained unwarranted access to the company's highly classified information. The company was shocked to see all of its business tactics and prospective deals put up online, exposed to everyone. In this scenario, ZumbaUp is a victim of _____.

A)spamming
B)hacking
C)phishing
D)pharming
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/91
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 16: Managing Information and Technology: Finding New Ways to Learn and Link
1
Scalesto Corp. is a law firm that also provides online support regarding lawsuits. To help its clients, it has a team dedicated to identify useful information from the company's database. In this scenario, Scalesto most likely uses _____ to analyze vast amounts of data.

A)a cybermediary
B)data mining
C)an expert system
D)intranet
B
2
In the context of electronic bill presentment and payment, the method of biller-direct is one where consumers receive email reminders and then pay their bills at the company website.
True
3
Radio frequency identification (RDIF) is used to increase the efficiency of supply chains.
True
4
An advantage of an expert system is that it is capable of solving a wide variety of problems, including those that are quite different from the problems it was originally designed to solve.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
5
Cloud resources are not confined to a specific platform or operating system.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
6
Mervin, an employee of a non-governmental organization, conducts a survey among children about the awareness of traffic rules. The facts and figures collected by him are processed and organized by an analytic team to conclude whether the surveyed children are aware of traffic rules. In this scenario, the report that would be prepared by the analytic team can be referred to as _____.

A)statistics
B)data
C)information
D)cybermediary
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
7
Businesses develop intranets so that valued customers have access to internal information that is not available to the general public.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
8
Word processing, spreadsheet, and personal information management software are examples of vertical applications software.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
9
Data become information when they are processed, organized, and presented in a way that makes them useful to a decision maker.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
10
Business intelligence systems are a new class of decision support systems developed over the past two decades to leverage data storage.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
11
Alacrity Couriers uses advanced information technology to run its business efficiently. It allows its customers to track their consignments on its website. In this scenario, the use of a(n) _____ enables the customers to check on the status of their consignments.

A)expert system
B)cybermediary
C)extranet
D)firewall
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
12
Black hat hackers are hackers who have no harmful intent.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
13
Horizontal applications software consists of highly specialized applications used in a particular industry, such as brokerage firms.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
14
Augustus, a student undergoing his doctorate program, is working on a thesis that requires him to browse the Internet for information and visit various unverified websites. To protect his computer from the risk of attracting unwanted messages and other security threats, he uses a tool that uses both hardware and software to provide protection against hackers. In the given scenario, Augustus is most likely using _____.

A)a firewall
B)spyware
C)malware
D)a spam filter
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
15
Helpers, a nongovernmental organization, launches practbilling.com, a website where all sorts of bills can be paid. It uses a specially designed software to allow hassle-free transactions in the billing and charges a nominal fee from the users. In this scenario, Helpers uses a(n) _____.

A)horizontal applications software
B)vertical applications software
C)open source software
D)copylefted software
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
16
Word processing, spreadsheet, and personal information management software used by different businesses and occupations are examples of:

A)horizontal applications software.
B)vertical applications software.
C)open source software.
D)copylefted software.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
17
Cognizance, an online news portal, needs to update its website frequently. To achieve this, the IT department of Cognizance develops a system that gives its managers access to large amounts of data and the processing power to convert the data into high-quality information quickly and efficiently. In this scenario, Cognizance has developed _____ to assist its managers.

A)a decision support system
B)a computer-aided design
C)an expert system
D)Hypertext Markup Language
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
18
People's Pal, a public sector bank, provides a feature on its website that allows its customers to disburse their bills automatically on a monthly basis. This saves its customers from the hassle of forgetting to pay their bills and paying a fine. In this scenario, People's Pal uses:

A)electronic bill presentment and payment.
B)a cybermediary.
C)intranet.
D)decision support systems.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
19
Kiara, while trying to login to her bank website, visits a scammer's fake, official-looking website and provides her personal and financial information. The next day, she finds out that an amount has been deducted from her account that she has not transacted. She registers a complaint and finds out that the website which she logged in was a fake website. In this scenario, Kiara is a victim of _____.

A)phishing
B)pharming
C)hacking
D)clickjacking
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
20
SafeTransact is an Internet-based company that specializes in the secure electronic transfer of funds between businesses and clients. It uses some Internet tools to ensure the security of the online transactions. In this scenario, SafeTransact is a(n) _____.

A)expert system
B)cybermediary
C)intranet
D)data warehouse
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
21
Websites that incorporate interactive and collaborative features to create a richer, more interesting, and more useful experience for their users are known as _____.

A)Web 2.0 sites
B)InterNIC sites
C)Internet2 sites
D)extranet sites
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
22
Steven got arrested for stealing nearly two million dollars from a local bank. Using the Internet, he broke into the bank's computer and illegally accessed personal information and account details of the clients. In this scenario, Steven is a _____.

A)hacker
B)phisher
C)compiler
D)networker
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
23
Martha sued Joseph for plagiarizing her song "The Speaking Parrots," released as a single in her 2007 album called "Exhaustion." Martha alleged that Joseph's song, titled "As You Speak," was an unauthorized rip-off of her original hit and that Joseph infringed her copyrighted work. In this scenario, Joseph's actions can be referred to as _____.

A)phishing
B)piracy
C)pharming
D)trademark
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
24
_____ is often referred to as the world's largest computer network.

A)A cloud-based network
B)The Internet
C)An extranet
D)The kernel
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
25
Brianne's inbox is clogged up by unsolicited email advertisements and has more number of these mails than legitimate messages. This has made it difficult for her to manage her mails. In this scenario, the unwanted email advertisements that Brianne has received are _____.

A)worms
B)firewalls
C)spam
D)spyware
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
26
MergeFirms.com provides a platform for buyers and sellers to engage in business-to-business (B2B) e-commerce. Buyers and sellers get the opportunity to interact with each other and conduct their businesses through it. In this scenario, MergeFirms.com acts as a(n) _____.

A)expert system
B)e-marketplace
C)intranet
D)cybermediary
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
27
Habib, a writer, uses Microsoft Word to write, edit, and prepare his manuscripts for publication. Microsoft Word helps Habib to complete his work with minimal effort. In this scenario, Habib is using _____.

A)system software
B)antivirus software
C)applications software
D)malicious software
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
28
Fatima enjoys online shopping as it allows her to buy things from a wide range of options from the convenience of her home. She recently bought a food processor online. In this scenario, Fatima is involved in _____.

A)business-to-consumer e-commerce
B)business-to-business e-commerce
C)business-to-government e-commerce
D)consumer-to-consumer e-commerce
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
29
Jeff, the CEO of Francostico Inc., decides to set up a system that would help its managers with decision making . To design this system, his programmers ask skilled and proficient managers to explain how they solve problems. Then, they devise a program to mimic the specialists' approach, incorporating various rules or guidelines that the specialists use. In this scenario, Jeff seeks to develop a(n) _____ for the managers.

A)business intelligence system
B)data warehouse
C)cybermediary
D)expert system
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
30
When properly implemented, intranets enhance communication and collaboration among:

A)external stakeholders.
B)vendors.
C)buyers and sellers.
D)employees.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
31
__________is a scam in which official-looking emails are sent to individuals in an attempt to get them to divulge private information such as passwords, usernames, and account numbers.

A)Hacking
B)Clickjacking
C)Pharming
D)Phishing
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
32
The _____ requires senders of unwanted commercial email to label their messages as ads and to tell the recipient how to decline further messages.

A)Combating Online Infringement and Counterfeits Act
B)Junk Fax Prevention Act
C)Anticybersquatting Consumer Protection Act
D)Controlling the Assault of Non-Solicited Pornography and Marketing Act
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
33
_____ is similar to a virus, except that it is an independent program that can spread across computer networks without being attached to other files.

A)A worm
B)Email spam
C)Spyware
D)An adware program
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
34
Which of the following is true of cloud computing?

A)It discourages collaboration among employees and business partners.
B)It leads to a low processing speed.
C)It allows lower costs and excess capacity to its users.
D)It decreases data security.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
35
Jack, a sixty-year-old man, is an avid reader. He recently found out the online facility of downloading books. He is happy to have so many options to choose from and to have such easy access to e-books. He downloads books from many websites, and he does not mind using unverified websites for downloading them. In this scenario, Jack is most likely to be vulnerable to _____.

A)firewalls
B)malware
C)cybermediaries
D)cloud computing
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
36
Sharon runs a boutique. She gets the raw material from a cloth mill owner who provides her various fabrics at discounted rates. She installs a system that automatically analyzes her inventory and coordinates with the cloth mill owner whenever the inventory seems low. In this scenario, Sharon displays good business sense and has an efficient:

A)vendor-managed inventory.
B)supply chain.
C)line of command.
D)interest group.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
37
Melingo Furniture provides its customers with an option of buying, selling, and servicing of its products online. This helps Melingo Furniture create a customer base by providing convenience to them. In this scenario, Melingo Furniture is involved in _____.

A)e-commerce
B)cloud computing
C)data mining
D)object hyperlinking
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
38
Brandon goes to watch a newly released movie with his friends. In the theater, he takes a video recording of the entire movie through his smartphone and later releases the clip on the Internet where others can watch it free of cost. Brandon is involved in the act of _____.

A)phishing
B)piracy
C)infoanarchism
D)hacktivism
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
39
Which of the following is an advantage of a broadband Internet connection?

A)It allows access to only a limited number of websites to avoid security risks.
B)It allows users to quickly download large files such as music, games, and movies.
C)It is based on fiber-optic cable that enables it to efficiently handle many scientific applications.
D)It has less security risks compared with dial-up Internet.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
40
_____ is a technology that stores information on a microchip and transmits it to a reader when it is within range.

A)The global positioning system
B)Computer-aided design software
C)The graphical user interface
D)Radio frequency identification
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
41
Keith, with his three other friends, sends email messages to people that appear to come from a legitimate business, such as a bank, credit card company, or retailer. With these official looking emails, they trick people to disclose their personal information such as passwords, usernames, and account numbers. In this scenario, Keith and his friends are involved in _____.

A)hacking
B)phishing
C)pharming
D)viral marketing
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
42
An effective supply chain requires close coordination between:

A)a company and its consumer base.
B)customers and the market stock.
C)a company and its suppliers.
D)customers and the billing process.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
43
Ronald is an avid reader of detective novels. He visits a few websites to look for the latest novels of his favorite author. The next day he finds multiple ads in his inbox suggesting thriller novels from various authors. In this scenario, the malicious software used to track down Ronald's online behavior is _____.

A)a worm
B)spyware
C)a bastion host
D)attack tree software
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
44
Prescostico Inc. uses a business intelligence system to gain competitive advantage over other companies. This system helps Prescostico:

A)provide Internet-based storage capacity.
B)interpret its data meaningfully.
C)encourage collaboration among employees and business partners.
D)access an array of computing resources without investing in expensive new hardware.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
45
Drexterios Inc. is a financial firm that deals with public grievances regarding bill payments. It uses a centralized location for storing data from its internal databases as well as external sources to make it easy for its employees and customers to access the information. In this scenario, Drexterios uses a(n) _____ to store the data.

A)cybermediary
B)data warehouse
C)decision support system
D)expert system
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
46
A business firm notifies all its employees about a general meeting that is to be held the next day and asks them to confirm their attendance at the meeting by clicking on the link provided within the same email message. The firm sends the email through its private network that is accessible only to the management and the employees of the firm. Which of the following information networks is used by the firm to notify its employees?

A)A metropolitan area network
B)An extranet
C)An intranet
D)A peer-to-peer network
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
47
Firms create _____ by offering limited access to certain areas of their private network to a selected group of stakeholders.

A)open systems
B)expert systems
C)firewalls
D)extranets
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
48
A__________is a request for the database management software to search a database for data that match criteria specified by a user.

A)cybermediary
B)protocol
C)query
D)cache
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
49
_____ refers to marketing, buying, selling, and servicing of products over a network, usually the Internet.

A)E-commerce
B)Media-based networking
C)Inventory management
D)Group buying
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
50
_____ refers to the physical components used to collect, input, store, and process data, and to display and distribute information.

A)Hardware
B)Software
C)An operating system
D)An execution unit
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
51
Data mining allows organizations to:

A)analyze vast amounts of data to identify useful information that had been hidden.
B)guide managers through the decision-making process.
C)encourage collaboration among employees and business partners.
D)access an array of computing resources without investing in expensive new hardware.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
52
In the context of e-commerce, most websites transmit online payment information using _____ to ensure safe transactions.

A)an intranet
B)a secure socket layer protocol
C)InterINC
D)Hypertext Markup Language
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
53
Breto Lupix, a graphic design company, installed a new software in its computers that enabled them to design three-dimensional logos, brochures, and banners. In this scenario, Breto Lupix has installed _____ in its computers.

A)system software
B)antivirus software
C)applications software
D)copylefted software
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
54
__________is an Internet marketing strategy that tries to involve customers and others not employed by the seller in activities that help promote the product.

A)Viral marketing
B)Call to action marketing
C)Close range marketing
D)Outbound marketing
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
55
Demi loves playing online games. She surfs through many websites to find new, interesting games. One day she finds that her mailbox is filled with emails suggesting websites for online games and ads promoting a few online offers. In this scenario, a(n) _____ tracks Demi's computer behavior to send her targeted mails and ads.

A)firewall
B)spyware
C)bastion host
D)attack tree
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
56
Clomien Corp., a law firm, needs frequent interpretation of its stored data for cross-references and formulation of decisions. It uses a(n) _____ to help it discover subtle and complex relationships hidden in its data.

A)expert system
B)data warehouse
C)cybermediary
D)business intelligence system
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
57
Which of the following statements is true of radio frequency identification?

A)It improves the processing speed of a computer device.
B)It installs a device in production units that requires ample space for storage and maintenance.
C)It can help users transmit files across computers without an Internet connection.
D)It can be used to help track goods and other resources.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
58
A benefit that cloud computing provides to individual users is that:

A)it allows them to access their data from any computer without an Internet connection.
B)it eliminates the threat of unauthorized access.
C)it helps them analyze and process complex data without professional help.
D)it allows them to store large files without taking up valuable space on their computers' hard drive.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
59
Everything.com, an online cosmetics portal, does not allow its customers to reach the final billing section unless they share its offer links to at least two friends. In this scenario, everything.com uses _____ to communicate its message.

A)Web 2.0
B)cybermediary
C)viral marketing
D)InterINC
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
60
Taxedo, a finance firm, uses a private network to communicate with its employees. All of its official mails are sent through its private network, which is restricted for others. In this scenario, which of the following networks is used by Taxedo to communicate with its employees?

A)A metropolitan area network
B)A nanonetwork
C)An intranet
D)A peer-to-peer network
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
61
Identify a true statement about radio frequency identification.

A)It improves the processing speed of a computer device.
B)It stores information on a microchip and transmits it to a reader.
C)The frequency covers vast areas and can be propagated across long distances.
D)The chips are usually powered by batteries.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
62
With _____, consumers receive email reminders and then pay their bills at the company website.

A)Enterprise 2.0
B)bill-pay
C)biller-direct
D)viral marketing
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
63
Zahra buys a product from a high-end store, and the sales representative asks her to fill out a customer registration form so that she can avail discount offers and receive notifications about new products in the future. Although providing one's mailing details is optional, Zahra provides her details as she wants to be updated about any new products that the store has to offer. In this context, which of the following statements is true?

A)Zahra is a victim of phishing.
B)Zahra has chosen to receive opt-in emails.
C)Zahra has chosen to receive push emails.
D)Zahra is exposed to viral marketing.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
64
Which of the following is true of expert systems?

A)They are unable to help in fraud detection.
B)They are time-consuming and expensive.
C)They use powerful statistical techniques to analyze data.
D)They are highly flexible in nature.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
65
With bank-aggregator billing, one uses the _____ service at one's bank to automatically disburse one's monthly charges.

A)enterprise 2.0
B)bill-pay
C)biller-direct
D)viral marketing
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
66
The__________prohibits the use of false or deceptive subject lines in email messages.

A)Combating Online Infringement and Counterfeits Act
B)Junk Fax Prevention Act
C)Anticybersquatting Consumer Protection Act
D)Controlling the Assault of Non-Solicited Pornography and Marketing Act
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
67
Documents stored on the World Wide Web are written and linked together using _____.

A)decision support systems (DSS)
B)computer-aided design (CAD)
C)Extensible Markup Language (XML)
D)Hypertext Markup Language (HTML)
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
68
Which of the following statements is true of copyright law?

A)It gives the creators of intellectual property the exclusive right to produce, perform, and sell their work for a specified time period.
B)Once an intellectual property is copyrighted, its further use is restricted forever.
C)Copyrighting a product ensures that it is protected from piracy.
D)It gives individuals the right to reproduce the pirated version of an intellectual property after the death of its original creator.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
69
The two broad categories of software are:

A)open source software and data software.
B)embedded software and business software.
C)server software and proprietary software.
D)system software and application software.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
70
In business-to-business (B2B) e-commerce, _____.

A)most purchases are based on impulse
B)the negotiations include a large number of business customers
C)the size of a typical individual transaction is relatively small
D)buyers and sellers often develop close and long-lasting relationships
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
71
Candice is an entrepreneur who mostly communicates with her clients over emails. Lately, however, she has found it difficult to locate legitimate email messages in her inbox. This is because of the numerous unsolicited commercial emails that clutter her inbox. To prevent this from occurring in the future, Candice should _____.

A)use a spam filter
B)use a content-control filter
C)use a business intelligence system
D)install a spyware program
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
72
Which of the following refers to programs that install themselves on computers without the users' knowledge or permission and spread by attaching themselves to other files that are transferred from computer to computer?

A)Computer worms
B)Computer viruses
C)Freeware applications
D)Spyware applications
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
73
In the _____ form of e-commerce, firms want to develop buyer loyalty and repeat business but seldom develop a close working relationship with individual buyers.

A)business-to-government (B2G)
B)business-to-consumer (B2C)
C)business-to-business (B2B)
D)consumer-to-consumer (C2C)
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
74
Framex Inc. has separate computer-accessible storage media for all of its departments. These storage media store files of related data organized according to a logical system. In this scenario, Framex has many different _____ for its various departments.

A)decision support systems
B)databases
C)cybermediaries
D)business intelligence systems
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
75
BlueWink, a popular marketing firm, requires a mechanism to protect its confidential data and client details from hackers, cyber criminals, and other security threats. Which of the following should BlueWink use as a safeguard?

A)Expert systems
B)Firewalls
C)Cybermediaries
D)Intranet
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
76
Legostine Corp. uses a new high-tech network based on fiber-optic cable. The network utilizes technologies that give it a speed and capacity far exceeding the current network and is available only to Legostine's employees. In this scenario, Legostine Corp. uses _____.

A)Web 2.0
B)Internet2
C)broadband
D)extranet
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
77
Cloud computing is most likely to:

A)eliminate the threat of computer viruses and unauthorized access.
B)create a need to invest heavily in expensive hardware.
C)let companies access large computing resources without the need to invest heavily in IT personnel.
D)decrease the processing speed of computers.
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
78
Spedex, an on-rent cab provider company, launches a new feature on its website that can help its customers track their cabs online. The feature requires a sign-in process. Since the feature is new, many customers face problems in figuring out a way to access this feature. To solve this problem, Spedex creates a customer-support page on its website that will resolve the issues of its customers. In this scenario, the customer-support page on Spedex's website is an example of a(n) _____.

A)business intelligence system
B)expert system
C)cybermediary
D)data warehouse
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
79
Nefchio.com is a popular website among online gamers. It uses interactive and collaborative features to create a richer, more interesting, and more useful experience for its users to beat the competition in the industry. In this scenario, Nefchio.com uses a new approach called _____.

A)Web 2.0
B)extranet
C)InterNIC
D)Internet2
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
80
ZumbaUp, a leading jeans brand, realized that a user named PoisonX had breached its security codes and gained unwarranted access to the company's highly classified information. The company was shocked to see all of its business tactics and prospective deals put up online, exposed to everyone. In this scenario, ZumbaUp is a victim of _____.

A)spamming
B)hacking
C)phishing
D)pharming
Unlock Deck
Unlock for access to all 91 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 91 flashcards in this deck.