Deck 16: Managing Information Technology: Finding New Ways to Learn and Link

ملء الشاشة (f)
exit full mode
سؤال
"Massively parallel computing" combines the processing power of thousands of computers to work on different elements of a problem at the same time.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Graphical user interface requires users to correctly type in commands to open, save, or delete files.
سؤال
Utility programs are supplemental operating system software programs, such as firewalls, antivirus software , and other security software.
سؤال
The Internet consists of hundreds of thousands of smaller networks operating under a common set of rules so that each can communicate with the others.
سؤال
Horizontal applications software consists of highly specialized applications used in a particular industry, such as medicine, law, or accounting.
سؤال
Abel works for Greater Garrisonville Power Company. His job involves the creation of confidential reports and other documents that he posts on an internal server. While employees can view and even download these confidential materials using a web browser, people outside the company have no access to them. This suggests that Garrisonville Power is using an intranet.​
سؤال
Online gaming and machine­to­machine communications form part of the traffic on the Internet.​
سؤال
Businesses develop intranets so that valued customers have access to internal information that is not available to the general public.
سؤال
Word processing, spreadsheet, and personal information management software are examples of vertical applications software.​
سؤال
Cloud computing allows users to access their documents, music, or photos from any computer even without an Internet connection.​
سؤال
Applications software is software that performs the critical functions necessary to operate a computer at the most basic level.
سؤال
Internet2 is a network that resulted from the coalition formed by several leading research universities, corporations, and other organizations to create a new generation of Internet technology in the United States based on fiber­optic cable.
سؤال
Internet2 was developed because broadband connections are not capable of handling the volume of information many businesses and scientific applications require.​
سؤال
The World Wide Web includes Internet chatting and online gaming.​
سؤال
A network links computer resources using either a wired or wireless connection.
سؤال
An initiative in 2001 allowed members of the Internet (I2) consortium to sponsor other research and educational organizations that did not originally qualify for membership, so they would have access to I2 resources.
سؤال
A smartphone is an example of hardware.
سؤال
The fundamental form of system software is the operating system, which controls the way a computer functions at its most basic level.
سؤال
Albert loves to download music and videos over the Internet. He observes that even with his high­speed connection, it sometimes takes a long time to download the files he wants. Internet2 is designed primarily to meet the needs of people like Albert.
سؤال
Hardware includes the various components of a computer system along with communications and network equipment.
سؤال
Data in their raw form are collectively called information.​
سؤال
AM/PM Consulting is a leader in the creation of expert systems that are used in a variety of industries. During the process of developing such systems for an application, the company's programmers are likely to spend much time interviewing human experts in a particular field to gain insights into how they solve problems.
سؤال
Business intelligence systems are a new class of decision support systems developed over the past two decades.
سؤال
According to the characteristics of good information, high­quality information should focus on issues that are important to decision makers.
سؤال
Cloud computing helps companies lower costs by paying only for the resources that are actually used and eliminates the problem of excess capacity.​
سؤال
A query is a request for database management software to search for data that matches specified criteria.
سؤال
One of the vital functions of information technology­at least in relationship to business­is to transform data into useful information for decision makers.
سؤال
Expert systems help their users solve a problem or accomplish a task by asking the user a series of questions, basing each new question on the response to previous questions. The program continues to ask questions until it has enough information to reach a decision and make a recommendation.​
سؤال
Data are facts and figures that have been organized in a way that makes them immediately useful to decision makers.​
سؤال
Data mining uses powerful statistical and mathematical techniques to analyze vast amounts of data in data warehouses in order to identify useful information that had been hidden.​
سؤال
Cloud resources are confined to specific operating systems, so people with computers having the same operating systems can form a group and easily share files and programs.
سؤال
In recent years, data mining has had considerable success in areas such as fraud and crime detection.​
سؤال
Mattie O'Hara is a sales manager with Moonbux Coffee. Her sales department has a database indicating what each customer has purchased. The company is introducing a new line of gourmet coffees, and Mattie wants to contact customers who bought the Moonbux's older line of gourmet coffees to inform them of the new products. In order to obtain a list of customers, Mattie could enter a query into the database.
سؤال
Red Eye Shipping Inc. has purchased a business intelligence system. The main advantage of such a system is that it eliminates the need for maintaining large data warehouses and the need for data mining.​​
سؤال
A data warehouse is a physical storage facility used by management to store and file all hard copies of important documents generated by a business.​
سؤال
An advantage of an expert system is that it is capable of solving a wide variety of problems, including those that are quite different from the problems it was originally designed to solve.​
سؤال
To access cloud computing services, information technology (IT) companies will have to invest heavily in expensive new hardware and software.
سؤال
One of the disadvantages of an expert system is that it has little flexibility and no common sense.​
سؤال
Cloud computing encourages collaboration among employees and business partners.
سؤال
E­commerce refers to using the Internet to facilitate the exchange of goods and services.
سؤال
Electronic bill presentment and payment is one of the ways of making electronic payments.
سؤال
Opt­in email is much less expensive than direct mail.
سؤال
Amanda has a pearl necklace that she would like to sell on eBay or Craigslist. By listing her necklace on one of these two platforms, Amanda would be using a form of e­commerce known as C2C.
سؤال
Viral marketing is when a firm uses computer viruses to deliver unsolicited advertisements to a user's computer.
سؤال
B2C e­commerce refers to online business trades between companies.​
سؤال
B2G e­commerce is when government agencies sell information, goods, and services to businesses.
سؤال
Many firms have used the Internet to implement very effective viral marketing campaigns that attempt to get customers to communicate a firm's message to friends, family, and colleagues.
سؤال
Viral marketing is not as effective as traditional buzz marketing because the latter allows for messages to reach a wider audience at a faster speed.
سؤال
Rudy just purchased a new pair of running shoes at a local sports shop. The owner of the shop requested Rudy to tweet about his experience in the store. The sports shop is trying to utilize a marketing campaign known as viral marketing.​
سؤال
The online encyclopedia Wikipedia that uses wiki software to allow users to comment on and contribute to its articles is a Web 2.0 site.
سؤال
Shutterfly and Facebook are both examples of cybermediaries.
سؤال
The size of a typical individual transaction in B2B e­commerce is relatively small, usually a few dollars to a few hundred dollars.
سؤال
Opt­in emails are the same as spam, because they are unwanted messages.
سؤال
The number of customers in the target market of B2B e­commerce is larger than that in B2C e­commerce.
سؤال
Viral marketing is not as effective as traditional buzz marketing because the latter allows for messages to reach a wider audience at a faster speed.
سؤال
One Key difference between the B2C and the B2B marketplaces is that an individual buyer tends to be more rational than a business buyer.
سؤال
Electronic bill presentment and payment is a method in which bills are sent to customers via email.
سؤال
Internet advertising had experienced a sharp decline in revenue during the twenty­first century.
سؤال
A cybermediary is an Internet­based firm specializing in the secure electronic transfer of funds.
سؤال
Companies use a secure socket layer (SSL) protocol to secure payment information transmitted over the Internet from a consumer to a business.
سؤال
A small firm that manufactures specialized automobile parts would be unable to participate in an e­marketplace because accessing such markets requires expensive dedicated connections between firms that only larger firms can afford.
سؤال
The CAN­SPAM Act of 2003 has proven to be extremely successful at shutting down businesses that rely heavily on spamming to generate sales.
سؤال
Spam is a type of malware.
سؤال
Radio frequency identification technology stores information on a microchip that can be read by the correct reading device if within a certain range of the chip.
سؤال
One advantage of the e­marketplace is that it enables sellers and buyers to contact and negotiate with a large number of market participants.
سؤال
Malware is a hardware developed or created with malicious intent.
سؤال
Spyware installs itself on a computer without permission and then tracks computer behavior.
سؤال
Computer viruses and worms must each be attached to other files in order to spread across computer networks.
سؤال
E­marketplaces often provide additional services­beyond simple trade­that allow firms to exchange information and collaborate, thus forging tighter supply chain relationships.
سؤال
Spam filters exist that help detect and eliminate spam.
سؤال
E­marketplaces are primarily used by participants in the B2C market.
سؤال
Worms are an example of malware that spread by attaching themselves to files that are then transferred from computer to computer.
سؤال
The main purpose of radio frequency identification chips is to transmit a serial number that uniquely identifies a product or device.
سؤال
The basic difference between computer viruses and spyware is that a virus has the ability to spread from one computer to another while transferring data.
سؤال
The key advantage of radio frequency identification technology is that it allows a seller of a product to track and monitor a buyer's use of that product.
سؤال
Spyware is often installed when users download and install freeware on their computers.
سؤال
Computer viruses can erase or modify data on a hard drive, prevent a computer from booting up, and find and send personal information stored on the hard drive to unauthorized people.
سؤال
Spam refers to unsolicited email advertisements usually sent to very large numbers of recipients, many of whom may not have interest in the message.
سؤال
Pathtiesmhipntg t ois g ae ts cthamem w thoe dreiv ouflfgiec iparli­vloaotek iinngfo ermmaaitliso na rseu scehn at st op ainsdswivoidrdusa,ls in an usernames, and account numbers.
سؤال
Margaret Reed works for a major manufacturer that is having trouble tracking components and materials as they move through a supply chain. Margaret wants to find a technology that will uniquely identify items to simplify the tracking process. Margaret should consider radio frequency identification chips to solve this problem.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/200
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 16: Managing Information Technology: Finding New Ways to Learn and Link
1
"Massively parallel computing" combines the processing power of thousands of computers to work on different elements of a problem at the same time.
True
2
Graphical user interface requires users to correctly type in commands to open, save, or delete files.
False
3
Utility programs are supplemental operating system software programs, such as firewalls, antivirus software , and other security software.
False
4
The Internet consists of hundreds of thousands of smaller networks operating under a common set of rules so that each can communicate with the others.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 200 في هذه المجموعة.
فتح الحزمة
k this deck
5
Horizontal applications software consists of highly specialized applications used in a particular industry, such as medicine, law, or accounting.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 200 في هذه المجموعة.
فتح الحزمة
k this deck
6
Abel works for Greater Garrisonville Power Company. His job involves the creation of confidential reports and other documents that he posts on an internal server. While employees can view and even download these confidential materials using a web browser, people outside the company have no access to them. This suggests that Garrisonville Power is using an intranet.​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 200 في هذه المجموعة.
فتح الحزمة
k this deck
7
Online gaming and machine­to­machine communications form part of the traffic on the Internet.​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 200 في هذه المجموعة.
فتح الحزمة
k this deck
8
Businesses develop intranets so that valued customers have access to internal information that is not available to the general public.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 200 في هذه المجموعة.
فتح الحزمة
k this deck
9
Word processing, spreadsheet, and personal information management software are examples of vertical applications software.​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 200 في هذه المجموعة.
فتح الحزمة
k this deck
10
Cloud computing allows users to access their documents, music, or photos from any computer even without an Internet connection.​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 200 في هذه المجموعة.
فتح الحزمة
k this deck
11
Applications software is software that performs the critical functions necessary to operate a computer at the most basic level.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 200 في هذه المجموعة.
فتح الحزمة
k this deck
12
Internet2 is a network that resulted from the coalition formed by several leading research universities, corporations, and other organizations to create a new generation of Internet technology in the United States based on fiber­optic cable.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 200 في هذه المجموعة.
فتح الحزمة
k this deck
13
Internet2 was developed because broadband connections are not capable of handling the volume of information many businesses and scientific applications require.​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 200 في هذه المجموعة.
فتح الحزمة
k this deck
14
The World Wide Web includes Internet chatting and online gaming.​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 200 في هذه المجموعة.
فتح الحزمة
k this deck
15
A network links computer resources using either a wired or wireless connection.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 200 في هذه المجموعة.
فتح الحزمة
k this deck
16
An initiative in 2001 allowed members of the Internet (I2) consortium to sponsor other research and educational organizations that did not originally qualify for membership, so they would have access to I2 resources.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 200 في هذه المجموعة.
فتح الحزمة
k this deck
17
A smartphone is an example of hardware.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 200 في هذه المجموعة.
فتح الحزمة
k this deck
18
The fundamental form of system software is the operating system, which controls the way a computer functions at its most basic level.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 200 في هذه المجموعة.
فتح الحزمة
k this deck
19
Albert loves to download music and videos over the Internet. He observes that even with his high­speed connection, it sometimes takes a long time to download the files he wants. Internet2 is designed primarily to meet the needs of people like Albert.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 200 في هذه المجموعة.
فتح الحزمة
k this deck
20
Hardware includes the various components of a computer system along with communications and network equipment.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 200 في هذه المجموعة.
فتح الحزمة
k this deck
21
Data in their raw form are collectively called information.​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 200 في هذه المجموعة.
فتح الحزمة
k this deck
22
AM/PM Consulting is a leader in the creation of expert systems that are used in a variety of industries. During the process of developing such systems for an application, the company's programmers are likely to spend much time interviewing human experts in a particular field to gain insights into how they solve problems.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 200 في هذه المجموعة.
فتح الحزمة
k this deck
23
Business intelligence systems are a new class of decision support systems developed over the past two decades.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 200 في هذه المجموعة.
فتح الحزمة
k this deck
24
According to the characteristics of good information, high­quality information should focus on issues that are important to decision makers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 200 في هذه المجموعة.
فتح الحزمة
k this deck
25
Cloud computing helps companies lower costs by paying only for the resources that are actually used and eliminates the problem of excess capacity.​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 200 في هذه المجموعة.
فتح الحزمة
k this deck
26
A query is a request for database management software to search for data that matches specified criteria.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 200 في هذه المجموعة.
فتح الحزمة
k this deck
27
One of the vital functions of information technology­at least in relationship to business­is to transform data into useful information for decision makers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 200 في هذه المجموعة.
فتح الحزمة
k this deck
28
Expert systems help their users solve a problem or accomplish a task by asking the user a series of questions, basing each new question on the response to previous questions. The program continues to ask questions until it has enough information to reach a decision and make a recommendation.​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 200 في هذه المجموعة.
فتح الحزمة
k this deck
29
Data are facts and figures that have been organized in a way that makes them immediately useful to decision makers.​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 200 في هذه المجموعة.
فتح الحزمة
k this deck
30
Data mining uses powerful statistical and mathematical techniques to analyze vast amounts of data in data warehouses in order to identify useful information that had been hidden.​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 200 في هذه المجموعة.
فتح الحزمة
k this deck
31
Cloud resources are confined to specific operating systems, so people with computers having the same operating systems can form a group and easily share files and programs.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 200 في هذه المجموعة.
فتح الحزمة
k this deck
32
In recent years, data mining has had considerable success in areas such as fraud and crime detection.​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 200 في هذه المجموعة.
فتح الحزمة
k this deck
33
Mattie O'Hara is a sales manager with Moonbux Coffee. Her sales department has a database indicating what each customer has purchased. The company is introducing a new line of gourmet coffees, and Mattie wants to contact customers who bought the Moonbux's older line of gourmet coffees to inform them of the new products. In order to obtain a list of customers, Mattie could enter a query into the database.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 200 في هذه المجموعة.
فتح الحزمة
k this deck
34
Red Eye Shipping Inc. has purchased a business intelligence system. The main advantage of such a system is that it eliminates the need for maintaining large data warehouses and the need for data mining.​​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 200 في هذه المجموعة.
فتح الحزمة
k this deck
35
A data warehouse is a physical storage facility used by management to store and file all hard copies of important documents generated by a business.​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 200 في هذه المجموعة.
فتح الحزمة
k this deck
36
An advantage of an expert system is that it is capable of solving a wide variety of problems, including those that are quite different from the problems it was originally designed to solve.​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 200 في هذه المجموعة.
فتح الحزمة
k this deck
37
To access cloud computing services, information technology (IT) companies will have to invest heavily in expensive new hardware and software.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 200 في هذه المجموعة.
فتح الحزمة
k this deck
38
One of the disadvantages of an expert system is that it has little flexibility and no common sense.​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 200 في هذه المجموعة.
فتح الحزمة
k this deck
39
Cloud computing encourages collaboration among employees and business partners.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 200 في هذه المجموعة.
فتح الحزمة
k this deck
40
E­commerce refers to using the Internet to facilitate the exchange of goods and services.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 200 في هذه المجموعة.
فتح الحزمة
k this deck
41
Electronic bill presentment and payment is one of the ways of making electronic payments.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 200 في هذه المجموعة.
فتح الحزمة
k this deck
42
Opt­in email is much less expensive than direct mail.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 200 في هذه المجموعة.
فتح الحزمة
k this deck
43
Amanda has a pearl necklace that she would like to sell on eBay or Craigslist. By listing her necklace on one of these two platforms, Amanda would be using a form of e­commerce known as C2C.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 200 في هذه المجموعة.
فتح الحزمة
k this deck
44
Viral marketing is when a firm uses computer viruses to deliver unsolicited advertisements to a user's computer.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 200 في هذه المجموعة.
فتح الحزمة
k this deck
45
B2C e­commerce refers to online business trades between companies.​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 200 في هذه المجموعة.
فتح الحزمة
k this deck
46
B2G e­commerce is when government agencies sell information, goods, and services to businesses.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 200 في هذه المجموعة.
فتح الحزمة
k this deck
47
Many firms have used the Internet to implement very effective viral marketing campaigns that attempt to get customers to communicate a firm's message to friends, family, and colleagues.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 200 في هذه المجموعة.
فتح الحزمة
k this deck
48
Viral marketing is not as effective as traditional buzz marketing because the latter allows for messages to reach a wider audience at a faster speed.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 200 في هذه المجموعة.
فتح الحزمة
k this deck
49
Rudy just purchased a new pair of running shoes at a local sports shop. The owner of the shop requested Rudy to tweet about his experience in the store. The sports shop is trying to utilize a marketing campaign known as viral marketing.​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 200 في هذه المجموعة.
فتح الحزمة
k this deck
50
The online encyclopedia Wikipedia that uses wiki software to allow users to comment on and contribute to its articles is a Web 2.0 site.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 200 في هذه المجموعة.
فتح الحزمة
k this deck
51
Shutterfly and Facebook are both examples of cybermediaries.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 200 في هذه المجموعة.
فتح الحزمة
k this deck
52
The size of a typical individual transaction in B2B e­commerce is relatively small, usually a few dollars to a few hundred dollars.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 200 في هذه المجموعة.
فتح الحزمة
k this deck
53
Opt­in emails are the same as spam, because they are unwanted messages.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 200 في هذه المجموعة.
فتح الحزمة
k this deck
54
The number of customers in the target market of B2B e­commerce is larger than that in B2C e­commerce.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 200 في هذه المجموعة.
فتح الحزمة
k this deck
55
Viral marketing is not as effective as traditional buzz marketing because the latter allows for messages to reach a wider audience at a faster speed.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 200 في هذه المجموعة.
فتح الحزمة
k this deck
56
One Key difference between the B2C and the B2B marketplaces is that an individual buyer tends to be more rational than a business buyer.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 200 في هذه المجموعة.
فتح الحزمة
k this deck
57
Electronic bill presentment and payment is a method in which bills are sent to customers via email.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 200 في هذه المجموعة.
فتح الحزمة
k this deck
58
Internet advertising had experienced a sharp decline in revenue during the twenty­first century.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 200 في هذه المجموعة.
فتح الحزمة
k this deck
59
A cybermediary is an Internet­based firm specializing in the secure electronic transfer of funds.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 200 في هذه المجموعة.
فتح الحزمة
k this deck
60
Companies use a secure socket layer (SSL) protocol to secure payment information transmitted over the Internet from a consumer to a business.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 200 في هذه المجموعة.
فتح الحزمة
k this deck
61
A small firm that manufactures specialized automobile parts would be unable to participate in an e­marketplace because accessing such markets requires expensive dedicated connections between firms that only larger firms can afford.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 200 في هذه المجموعة.
فتح الحزمة
k this deck
62
The CAN­SPAM Act of 2003 has proven to be extremely successful at shutting down businesses that rely heavily on spamming to generate sales.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 200 في هذه المجموعة.
فتح الحزمة
k this deck
63
Spam is a type of malware.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 200 في هذه المجموعة.
فتح الحزمة
k this deck
64
Radio frequency identification technology stores information on a microchip that can be read by the correct reading device if within a certain range of the chip.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 200 في هذه المجموعة.
فتح الحزمة
k this deck
65
One advantage of the e­marketplace is that it enables sellers and buyers to contact and negotiate with a large number of market participants.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 200 في هذه المجموعة.
فتح الحزمة
k this deck
66
Malware is a hardware developed or created with malicious intent.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 200 في هذه المجموعة.
فتح الحزمة
k this deck
67
Spyware installs itself on a computer without permission and then tracks computer behavior.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 200 في هذه المجموعة.
فتح الحزمة
k this deck
68
Computer viruses and worms must each be attached to other files in order to spread across computer networks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 200 في هذه المجموعة.
فتح الحزمة
k this deck
69
E­marketplaces often provide additional services­beyond simple trade­that allow firms to exchange information and collaborate, thus forging tighter supply chain relationships.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 200 في هذه المجموعة.
فتح الحزمة
k this deck
70
Spam filters exist that help detect and eliminate spam.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 200 في هذه المجموعة.
فتح الحزمة
k this deck
71
E­marketplaces are primarily used by participants in the B2C market.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 200 في هذه المجموعة.
فتح الحزمة
k this deck
72
Worms are an example of malware that spread by attaching themselves to files that are then transferred from computer to computer.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 200 في هذه المجموعة.
فتح الحزمة
k this deck
73
The main purpose of radio frequency identification chips is to transmit a serial number that uniquely identifies a product or device.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 200 في هذه المجموعة.
فتح الحزمة
k this deck
74
The basic difference between computer viruses and spyware is that a virus has the ability to spread from one computer to another while transferring data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 200 في هذه المجموعة.
فتح الحزمة
k this deck
75
The key advantage of radio frequency identification technology is that it allows a seller of a product to track and monitor a buyer's use of that product.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 200 في هذه المجموعة.
فتح الحزمة
k this deck
76
Spyware is often installed when users download and install freeware on their computers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 200 في هذه المجموعة.
فتح الحزمة
k this deck
77
Computer viruses can erase or modify data on a hard drive, prevent a computer from booting up, and find and send personal information stored on the hard drive to unauthorized people.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 200 في هذه المجموعة.
فتح الحزمة
k this deck
78
Spam refers to unsolicited email advertisements usually sent to very large numbers of recipients, many of whom may not have interest in the message.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 200 في هذه المجموعة.
فتح الحزمة
k this deck
79
Pathtiesmhipntg t ois g ae ts cthamem w thoe dreiv ouflfgiec iparli­vloaotek iinngfo ermmaaitliso na rseu scehn at st op ainsdswivoidrdusa,ls in an usernames, and account numbers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 200 في هذه المجموعة.
فتح الحزمة
k this deck
80
Margaret Reed works for a major manufacturer that is having trouble tracking components and materials as they move through a supply chain. Margaret wants to find a technology that will uniquely identify items to simplify the tracking process. Margaret should consider radio frequency identification chips to solve this problem.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 200 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 200 في هذه المجموعة.