Deck 16: Managing Information Technology: Finding New Ways to Learn and Link
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/150
Play
Full screen (f)
Deck 16: Managing Information Technology: Finding New Ways to Learn and Link
1
Horizontal applications software consists of highly specialized applications used in a particular industry, such as brokerage firms.
False
2
Businesses develop intranets so that valued customers have access to internal information that is not available to the general public.
False
3
In the context of e-commerce, you can tell that a site on which you are doing business is using a secure socket layer (SSL) if the URL of the site begins with httpw://.
False
4
The fundamental form of system software is the operating system.
Unlock Deck
Unlock for access to all 150 flashcards in this deck.
Unlock Deck
k this deck
5
An intranet limits access to a single firm's employees.
Unlock Deck
Unlock for access to all 150 flashcards in this deck.
Unlock Deck
k this deck
6
In business-to-consumer e-commerce, purchases typically involve extensive negotiation.
Unlock Deck
Unlock for access to all 150 flashcards in this deck.
Unlock Deck
k this deck
7
Cloud computing allows users to access documents from anywhere via any computer without an Internet connection.
Unlock Deck
Unlock for access to all 150 flashcards in this deck.
Unlock Deck
k this deck
8
The Internet is a network of networks, consisting of hundreds of thousands of smaller networks operating under a common set of protocols so that they can communicate with each other.
Unlock Deck
Unlock for access to all 150 flashcards in this deck.
Unlock Deck
k this deck
9
In business-to-business (B2B) e-commerce, customers usually do little or no research before making a purchase.
Unlock Deck
Unlock for access to all 150 flashcards in this deck.
Unlock Deck
k this deck
10
In the context of e-commerce, eBay and Craigslist are examples of business-to-government e-commerce.
Unlock Deck
Unlock for access to all 150 flashcards in this deck.
Unlock Deck
k this deck
11
Dropbox is a consumer-focused cloud computing service that allows users to access and share documents and files.
Unlock Deck
Unlock for access to all 150 flashcards in this deck.
Unlock Deck
k this deck
12
In the context of the business-to-consumer market, the use of Web 2.0 technologies within organizations is called Enterprise 2.0.
Unlock Deck
Unlock for access to all 150 flashcards in this deck.
Unlock Deck
k this deck
13
When using the cloud to store your documents, music, or photos, you only pay for the computer resources that you use.
Unlock Deck
Unlock for access to all 150 flashcards in this deck.
Unlock Deck
k this deck
14
Cloud resources are not confined to a specific platform or operating system.
Unlock Deck
Unlock for access to all 150 flashcards in this deck.
Unlock Deck
k this deck
15
An advantage of an expert system is that it is capable of solving a wide variety of problems, including those that are quite different from the problems it was originally designed to solve.
Unlock Deck
Unlock for access to all 150 flashcards in this deck.
Unlock Deck
k this deck
16
In the context of cybermediaries, Venmo, operated by PayPal, is used to make payments to friends.
Unlock Deck
Unlock for access to all 150 flashcards in this deck.
Unlock Deck
k this deck
17
Business intelligence systems are a new class of decision support systems developed over the past two decades to leverage data storage.
Unlock Deck
Unlock for access to all 150 flashcards in this deck.
Unlock Deck
k this deck
18
Word processing, spreadsheet, and personal information management software are examples of vertical applications software.
Unlock Deck
Unlock for access to all 150 flashcards in this deck.
Unlock Deck
k this deck
19
Data become information when they are processed, organized, and presented in a way that makes them useful to a decision maker.
Unlock Deck
Unlock for access to all 150 flashcards in this deck.
Unlock Deck
k this deck
20
A business intelligence system helps decision makers discover information that was previously hidden.
Unlock Deck
Unlock for access to all 150 flashcards in this deck.
Unlock Deck
k this deck
21
_____ is a network based on fiber-optic cable and uses high-speed connectivity to improve education, research, and collaboration.
A) Web 2.0
B) Internet2
C) Broadband
D) Cloud computing
A) Web 2.0
B) Internet2
C) Broadband
D) Cloud computing
Unlock Deck
Unlock for access to all 150 flashcards in this deck.
Unlock Deck
k this deck
22
Word processing, spreadsheet, and personal information management software used by different businesses and occupations are examples of:
A) horizontal applications software.
B) vertical applications software.
C) open source software.
D) copylefted software.
A) horizontal applications software.
B) vertical applications software.
C) open source software.
D) copylefted software.
Unlock Deck
Unlock for access to all 150 flashcards in this deck.
Unlock Deck
k this deck
23
The two broad categories of software are:
A) open source software and data software.
B) embedded software and business software.
C) server software and proprietary software.
D) system software and application software.
A) open source software and data software.
B) embedded software and business software.
C) server software and proprietary software.
D) system software and application software.
Unlock Deck
Unlock for access to all 150 flashcards in this deck.
Unlock Deck
k this deck
24
_____ refers to the physical components used to collect, input, store, and process data, and to display and distribute information.
A) Hardware
B) Software
C) An operating system
D) An execution unit
A) Hardware
B) Software
C) An operating system
D) An execution unit
Unlock Deck
Unlock for access to all 150 flashcards in this deck.
Unlock Deck
k this deck
25
_____ is often referred to as the world's largest computer network.
A) A cloud-based network
B) The Internet
C) An extranet
D) The kernel
A) A cloud-based network
B) The Internet
C) An extranet
D) The kernel
Unlock Deck
Unlock for access to all 150 flashcards in this deck.
Unlock Deck
k this deck
26
When product designers use computer-aided design (CAD) software to produce technical drawings in three dimensions, they are using:
A) lateral system software.
B) vertical applications software.
C) utility software.
D) office productivity software.
A) lateral system software.
B) vertical applications software.
C) utility software.
D) office productivity software.
Unlock Deck
Unlock for access to all 150 flashcards in this deck.
Unlock Deck
k this deck
27
An e-marketplace is referred to as a specialized Internet site where buyers and sellers engaged in business-to-business (B2B) e-commerce can communicate and conduct business.
Unlock Deck
Unlock for access to all 150 flashcards in this deck.
Unlock Deck
k this deck
28
Radio frequency identification (RDIF) is used to increase the efficiency of supply chains.
Unlock Deck
Unlock for access to all 150 flashcards in this deck.
Unlock Deck
k this deck
29
Helpers, a nongovernmental organization, launches practbilling.com, a website where all sorts of bills can be paid. It uses a specially designed software to allow hassle-free transactions in the billing and charges a nominal fee from the users. In this scenario, Helpers uses a(n) _____.
A) horizontal applications software
B) vertical applications software
C) open source software
D) copylefted software
A) horizontal applications software
B) vertical applications software
C) open source software
D) copylefted software
Unlock Deck
Unlock for access to all 150 flashcards in this deck.
Unlock Deck
k this deck
30
In the context of software, _____ is designed for a specific industry or profession.
A) lateral system software
B) vertical applications software
C) horizontal applications software
D) office productivity software
A) lateral system software
B) vertical applications software
C) horizontal applications software
D) office productivity software
Unlock Deck
Unlock for access to all 150 flashcards in this deck.
Unlock Deck
k this deck
31
Habib, a writer, uses Microsoft Word to write, edit, and prepare his manuscripts for publication. Microsoft Word helps Habib to complete his work with minimal effort. In this scenario, Habib is using _____.
A) system software
B) antivirus software
C) applications software
D) malicious software
A) system software
B) antivirus software
C) applications software
D) malicious software
Unlock Deck
Unlock for access to all 150 flashcards in this deck.
Unlock Deck
k this deck
32
In the context of electronic bill presentment and payment, the method of biller-direct is one where you use the "bill-pay" service at your bank to automatically pay your monthly bills.
Unlock Deck
Unlock for access to all 150 flashcards in this deck.
Unlock Deck
k this deck
33
Which of the following statements is true of Internet2?
A) It is a new generation of Internet technology that is not based on fiber-optic cable.
B) It utilizes technologies that give it a speed and capacity far exceeding the current Internet.
C) It has taken a backseat due to the discovery of broadband connections.
D) Access to Internet2 is granted to the general public for free.
A) It is a new generation of Internet technology that is not based on fiber-optic cable.
B) It utilizes technologies that give it a speed and capacity far exceeding the current Internet.
C) It has taken a backseat due to the discovery of broadband connections.
D) Access to Internet2 is granted to the general public for free.
Unlock Deck
Unlock for access to all 150 flashcards in this deck.
Unlock Deck
k this deck
34
The management of Vencura Inc. approves the purchase of a few computers for the sales team. The management wants only the most basic functions in the computers, such as managing the file system, reading programs and data into main memory, and allocating system memory among various tasks to avoid conflicts. In this scenario, which of the following categories of software does Vencura Inc. require?
A) System software
B) Antivirus software
C) Applications software
D) Copylefted software
A) System software
B) Antivirus software
C) Applications software
D) Copylefted software
Unlock Deck
Unlock for access to all 150 flashcards in this deck.
Unlock Deck
k this deck
35
Black hat hackers are hackers who have no harmful intent.
Unlock Deck
Unlock for access to all 150 flashcards in this deck.
Unlock Deck
k this deck
36
In the context of security concerns arising from new technologies, malware is short for malignant hardware.
Unlock Deck
Unlock for access to all 150 flashcards in this deck.
Unlock Deck
k this deck
37
Breto Lupix, a graphic design company, installed a new software in its computers that enabled them to design three-dimensional logos, brochures, and banners. In this scenario, Breto Lupix has installed _____ in its computers.
A) system software
B) antivirus software
C) applications software
D) copylefted software
A) system software
B) antivirus software
C) applications software
D) copylefted software
Unlock Deck
Unlock for access to all 150 flashcards in this deck.
Unlock Deck
k this deck
38
Which of the following is an advantage of a broadband Internet connection?
A) It allows access to only a limited number of websites to avoid security risks.
B) It allows users to quickly download large files such as music, games, and movies.
C) It is based on fiber-optic cable that enables it to efficiently handle many scientific applications.
D) It has less security risks compared to dial-up Internet.
A) It allows access to only a limited number of websites to avoid security risks.
B) It allows users to quickly download large files such as music, games, and movies.
C) It is based on fiber-optic cable that enables it to efficiently handle many scientific applications.
D) It has less security risks compared to dial-up Internet.
Unlock Deck
Unlock for access to all 150 flashcards in this deck.
Unlock Deck
k this deck
39
Documents stored on the World Wide Web are written and linked together using _____.
A) decision support systems (DSS)
B) computer-aided design (CAD)
C) Extensible Markup Language (XML)
D) Hypertext Markup Language (HTML)
A) decision support systems (DSS)
B) computer-aided design (CAD)
C) Extensible Markup Language (XML)
D) Hypertext Markup Language (HTML)
Unlock Deck
Unlock for access to all 150 flashcards in this deck.
Unlock Deck
k this deck
40
_____ refers to the programs that provide instructions to a computer so that it can perform a desired task.
A) Hardware
B) Software
C) Intranet
D) Extranet
A) Hardware
B) Software
C) Intranet
D) Extranet
Unlock Deck
Unlock for access to all 150 flashcards in this deck.
Unlock Deck
k this deck
41
A business firm notifies all its employees about a general meeting that is to be held the next day and asks them to confirm their attendance at the meeting by clicking on the link provided within the same email message. The firm sends the email through its private network that is accessible only to the management and the employees of the firm. Which of the following information networks is used by the firm to notify its employees?
A) A metropolitan area network
B) An extranet
C) An intranet
D) A peer-to-peer network
A) A metropolitan area network
B) An extranet
C) An intranet
D) A peer-to-peer network
Unlock Deck
Unlock for access to all 150 flashcards in this deck.
Unlock Deck
k this deck
42
Which of the following is true of cloud computing?
A) It discourages collaboration among employees and business partners.
B) It leads to a low processing speed.
C) It allows lower costs and excess capacity to its users.
D) It decreases data security.
A) It discourages collaboration among employees and business partners.
B) It leads to a low processing speed.
C) It allows lower costs and excess capacity to its users.
D) It decreases data security.
Unlock Deck
Unlock for access to all 150 flashcards in this deck.
Unlock Deck
k this deck
43
A(n) _____ gives managers access to large amounts of data and the processing power to convert the data into high-quality information quickly and efficiently.
A) decision support system
B) computer-aided design software
C) cybermediary
D) expert system
A) decision support system
B) computer-aided design software
C) cybermediary
D) expert system
Unlock Deck
Unlock for access to all 150 flashcards in this deck.
Unlock Deck
k this deck
44
Cloud computing is most likely to:
A) eliminate the threat of computer viruses and unauthorized access.
B) create a need to invest heavily in expensive hardware.
C) let companies access large computing resources without the need to invest heavily in IT personnel.
D) decrease the processing speed of computers.
A) eliminate the threat of computer viruses and unauthorized access.
B) create a need to invest heavily in expensive hardware.
C) let companies access large computing resources without the need to invest heavily in IT personnel.
D) decrease the processing speed of computers.
Unlock Deck
Unlock for access to all 150 flashcards in this deck.
Unlock Deck
k this deck
45
A benefit that cloud computing provides to individual users is that it:
A) allows them to access their data from any computer without an Internet connection.
B) eliminates the threat of unauthorized access.
C) helps them analyze and process complex data without professional help.
D) allows them to store large files without taking up valuable space on their computers' hard drive.
A) allows them to access their data from any computer without an Internet connection.
B) eliminates the threat of unauthorized access.
C) helps them analyze and process complex data without professional help.
D) allows them to store large files without taking up valuable space on their computers' hard drive.
Unlock Deck
Unlock for access to all 150 flashcards in this deck.
Unlock Deck
k this deck
46
Identify a true statement about cloud computing.
A) It encourages collaboration among employees and business partners.
B) It drastically reduces the processing speed of computers.
C) It subjects a user's computer to an intruder attack.
D) It allows users to access their data from any computer without an Internet connection.
A) It encourages collaboration among employees and business partners.
B) It drastically reduces the processing speed of computers.
C) It subjects a user's computer to an intruder attack.
D) It allows users to access their data from any computer without an Internet connection.
Unlock Deck
Unlock for access to all 150 flashcards in this deck.
Unlock Deck
k this deck
47
Legostine Corp. uses a new high-tech network based on fiber-optic cable. The network utilizes technologies that give it a speed and capacity far exceeding the current network and is available only to Legostine's employees. In this scenario, Legostine Corp. uses _____.
A) Web 2.0
B) Internet2
C) broadband
D) extranet
A) Web 2.0
B) Internet2
C) broadband
D) extranet
Unlock Deck
Unlock for access to all 150 flashcards in this deck.
Unlock Deck
k this deck
48
Which of the following statements is true of intranets?
A) Employees can log onto their company's intranet from remote locations.
B) It restricts communication and collaboration among employees.
C) It is a public network whose look and feel differs from the Internet.
D) It allows limited access to a selected group of stakeholders, such as suppliers or customers.
A) Employees can log onto their company's intranet from remote locations.
B) It restricts communication and collaboration among employees.
C) It is a public network whose look and feel differs from the Internet.
D) It allows limited access to a selected group of stakeholders, such as suppliers or customers.
Unlock Deck
Unlock for access to all 150 flashcards in this deck.
Unlock Deck
k this deck
49
Firms create _____ by offering limited access to certain areas of their private network to a selected group of stakeholders.
A) open systems
B) expert systems
C) firewalls
D) extranets
A) open systems
B) expert systems
C) firewalls
D) extranets
Unlock Deck
Unlock for access to all 150 flashcards in this deck.
Unlock Deck
k this deck
50
When firms give key stakeholders limited access to certain areas of their intranet, such as allowing suppliers to check on the state of the firm's inventory to plan shipments of parts and materials, the firm is permitting the suppliers to do so through the use of _____.
A) cybermediaries
B) expert systems
C) firewalls
D) extranets
A) cybermediaries
B) expert systems
C) firewalls
D) extranets
Unlock Deck
Unlock for access to all 150 flashcards in this deck.
Unlock Deck
k this deck
51
Framex Inc. has separate computer-accessible storage media for all of its departments. These storage media store files of related data organized according to a logical system. In this scenario, Framex has many different _____ for its various departments.
A) decision support systems
B) databases
C) cybermediaries
D) business intelligence systems
A) decision support systems
B) databases
C) cybermediaries
D) business intelligence systems
Unlock Deck
Unlock for access to all 150 flashcards in this deck.
Unlock Deck
k this deck
52
Taxedo, a finance firm, uses a private network to communicate with its employees. All of its official mails are sent through its private network, which is restricted for others. In this scenario, which of the following networks is used by Taxedo to communicate with its employees?
A) A metropolitan area network
B) A nanonetwork
C) An intranet
D) A peer-to-peer network
A) A metropolitan area network
B) A nanonetwork
C) An intranet
D) A peer-to-peer network
Unlock Deck
Unlock for access to all 150 flashcards in this deck.
Unlock Deck
k this deck
53
Mervin, an employee of a non-governmental organization, conducts a survey among children about the awareness of traffic rules. The facts and figures collected by him are processed and organized by an analytic team to conclude whether the surveyed children are aware of traffic rules. In this scenario, the report that would be prepared by the analytic team can be referred to as _____.
A) statistics
B) data
C) information
D) cybermediary
A) statistics
B) data
C) information
D) cybermediary
Unlock Deck
Unlock for access to all 150 flashcards in this deck.
Unlock Deck
k this deck
54
In the context of the characteristics of good information, when information is accurate, it means that it is:
A) available in time to make a difference.
B) able to help users grasp its meaning.
C) free of errors and biases.
D) secure from hackers.
A) available in time to make a difference.
B) able to help users grasp its meaning.
C) free of errors and biases.
D) secure from hackers.
Unlock Deck
Unlock for access to all 150 flashcards in this deck.
Unlock Deck
k this deck
55
In the context of the characteristics of good information, when information is relevant, it means that:
A) it can be analyzed independently.
B) it is secure from hackers and competitors.
C) it helps users grasp its meaning.
D) it focuses on issues that are important to decision makers.
A) it can be analyzed independently.
B) it is secure from hackers and competitors.
C) it helps users grasp its meaning.
D) it focuses on issues that are important to decision makers.
Unlock Deck
Unlock for access to all 150 flashcards in this deck.
Unlock Deck
k this deck
56
In the context of the characteristics of good information, when information is timely, it means that:
A) it is available at the right moment to make a difference.
B) it is secure from hackers and competitors.
C) it is free of errors and biases.
D) it focuses on issues that are important to decision makers.
A) it is available at the right moment to make a difference.
B) it is secure from hackers and competitors.
C) it is free of errors and biases.
D) it focuses on issues that are important to decision makers.
Unlock Deck
Unlock for access to all 150 flashcards in this deck.
Unlock Deck
k this deck
57
When properly implemented, intranets enhance communication and collaboration among:
A) external stakeholders.
B) vendors.
C) buyers and sellers.
D) employees.
A) external stakeholders.
B) vendors.
C) buyers and sellers.
D) employees.
Unlock Deck
Unlock for access to all 150 flashcards in this deck.
Unlock Deck
k this deck
58
Identify a true statement about intranets.
A) They allow employees to use company resources when working from home.
B) They are set up in offices that do not have an information technology department as they require minimal maintenance.
C) They solely allow access to a selected group of external stakeholders, such as clients or suppliers.
D) They are public networks whose look and feel differ from the Internet.
A) They allow employees to use company resources when working from home.
B) They are set up in offices that do not have an information technology department as they require minimal maintenance.
C) They solely allow access to a selected group of external stakeholders, such as clients or suppliers.
D) They are public networks whose look and feel differ from the Internet.
Unlock Deck
Unlock for access to all 150 flashcards in this deck.
Unlock Deck
k this deck
59
A _____ is a request for the database management software to search a database for data that match criteria specified by a user.
A) cybermediary
B) protocol
C) query
D) cache
A) cybermediary
B) protocol
C) query
D) cache
Unlock Deck
Unlock for access to all 150 flashcards in this deck.
Unlock Deck
k this deck
60
Alacrity Couriers uses advanced information technology to run its business efficiently. It allows its customers to track their consignments on its website. In this scenario, the use of a(n) _____ enables the customers to check on the status of their consignments.
A) expert system
B) cybermediary
C) extranet
D) firewall
A) expert system
B) cybermediary
C) extranet
D) firewall
Unlock Deck
Unlock for access to all 150 flashcards in this deck.
Unlock Deck
k this deck
61
Prescostico Inc. uses a business intelligence system to gain competitive advantage over other companies. This system helps Prescostico:
A) provide Internet-based storage capacity.
B) interpret its data meaningfully.
C) encourage collaboration among employees and business partners.
D) access an array of computing resources without investing in expensive new hardware.
A) provide Internet-based storage capacity.
B) interpret its data meaningfully.
C) encourage collaboration among employees and business partners.
D) access an array of computing resources without investing in expensive new hardware.
Unlock Deck
Unlock for access to all 150 flashcards in this deck.
Unlock Deck
k this deck
62
To develop expert systems, programmers need to:
A) create a single open-ended question for a user to answer to provide a solution to a problem.
B) devise a program to mimic an expert's approach to solve a particular problem.
C) incorporate rules that differ from what a human expert would suggest.
D) devise a system that reaches a decision and provides a recommendation by asking a user only one question.
A) create a single open-ended question for a user to answer to provide a solution to a problem.
B) devise a program to mimic an expert's approach to solve a particular problem.
C) incorporate rules that differ from what a human expert would suggest.
D) devise a system that reaches a decision and provides a recommendation by asking a user only one question.
Unlock Deck
Unlock for access to all 150 flashcards in this deck.
Unlock Deck
k this deck
63
In the context of the most common approaches to implementing a business intelligence system, data mining is used to:
A) discover unknown relationships hidden in data.
B) transform information into raw data.
C) store files on the cloud.
D) guard against hackers and other security threats.
A) discover unknown relationships hidden in data.
B) transform information into raw data.
C) store files on the cloud.
D) guard against hackers and other security threats.
Unlock Deck
Unlock for access to all 150 flashcards in this deck.
Unlock Deck
k this deck
64
A disadvantage of an expert system is that it:
A) invariably needs a human to fix the problem according to the solution the system offers.
B) provides no option for user feedback.
C) can be time-consuming and expensive.
D) can sometimes deviate from the decision rules originally programmed into the system.
A) invariably needs a human to fix the problem according to the solution the system offers.
B) provides no option for user feedback.
C) can be time-consuming and expensive.
D) can sometimes deviate from the decision rules originally programmed into the system.
Unlock Deck
Unlock for access to all 150 flashcards in this deck.
Unlock Deck
k this deck
65
Identify a true statement about an expert system.
A) It is flexible in its problem-solving abilities and can be easily programmed with few decision rules.
B) It will not be able to find a solution to a problem that deviates in any significant way from the specific type of problem it was programmed to solve.
C) It finds it difficult to mimic the rules and guidelines followed by a human expert to solve a particular problem.
D) It will not be able to solve problems in areas such as medical diagnoses, fraud detection, and consumer credit evaluation.
A) It is flexible in its problem-solving abilities and can be easily programmed with few decision rules.
B) It will not be able to find a solution to a problem that deviates in any significant way from the specific type of problem it was programmed to solve.
C) It finds it difficult to mimic the rules and guidelines followed by a human expert to solve a particular problem.
D) It will not be able to solve problems in areas such as medical diagnoses, fraud detection, and consumer credit evaluation.
Unlock Deck
Unlock for access to all 150 flashcards in this deck.
Unlock Deck
k this deck
66
In the _____ form of e-commerce, firms want to develop buyer loyalty and repeat business but seldom develop a close working relationship with individual buyers.
A) business-to-government (B2G)
B) business-to-consumer (B2C)
C) business-to-business (B2B)
D) consumer-to-consumer (C2C)
A) business-to-government (B2G)
B) business-to-consumer (B2C)
C) business-to-business (B2B)
D) consumer-to-consumer (C2C)
Unlock Deck
Unlock for access to all 150 flashcards in this deck.
Unlock Deck
k this deck
67
Data mining allows organizations to:
A) analyze vast amounts of data to identify useful information that had been hidden.
B) guide managers while using data accurately through the decision-making process.
C) encourage collaboration among employees and business partners through data transfer.
D) access an array of computing resources without investing in expensive new hardware.
A) analyze vast amounts of data to identify useful information that had been hidden.
B) guide managers while using data accurately through the decision-making process.
C) encourage collaboration among employees and business partners through data transfer.
D) access an array of computing resources without investing in expensive new hardware.
Unlock Deck
Unlock for access to all 150 flashcards in this deck.
Unlock Deck
k this deck
68
Spedex, an on-rent cab provider company, launches a new feature on its website that can help its customers track their cabs online. The feature requires a sign-in process. Since the feature is new, many customers face problems in figuring out a way to access this feature. To solve this problem, Spedex creates a customer-support page on its website that will resolve the issues of its customers. In this scenario, the customer-support page on Spedex's website is an example of a(n) _____.
A) business intelligence system
B) expert system
C) cybermediary
D) data warehouse
A) business intelligence system
B) expert system
C) cybermediary
D) data warehouse
Unlock Deck
Unlock for access to all 150 flashcards in this deck.
Unlock Deck
k this deck
69
In _____, many purchases may be based on impulse.
A) business-to-business e-commerce
B) business-to-consumer e-commerce
C) business-to-government e-commerce
D) consumer-to-business e-commerce
A) business-to-business e-commerce
B) business-to-consumer e-commerce
C) business-to-government e-commerce
D) consumer-to-business e-commerce
Unlock Deck
Unlock for access to all 150 flashcards in this deck.
Unlock Deck
k this deck
70
Clomien Corp., a law firm, needs frequent interpretation of its stored data for cross-references and formulation of decisions. It uses a(n) _____ to help it discover subtle and complex relationships hidden in its data.
A) expert system
B) data warehouse
C) cybermediary
D) business intelligence system
A) expert system
B) data warehouse
C) cybermediary
D) business intelligence system
Unlock Deck
Unlock for access to all 150 flashcards in this deck.
Unlock Deck
k this deck
71
Drexterios Inc. is a financial firm that deals with public grievances regarding bill payments. It uses a centralized location for storing data from its internal databases as well as external sources to make it easy for its employees and customers to access the information. In this scenario, Drexterios uses a(n) _____ to store the data.
A) cybermediary
B) data warehouse
C) decision support system
D) expert system
A) cybermediary
B) data warehouse
C) decision support system
D) expert system
Unlock Deck
Unlock for access to all 150 flashcards in this deck.
Unlock Deck
k this deck
72
Fatima enjoys online shopping as it allows her to buy things from a wide range of options from the convenience of her home. She recently bought a food processor online. In this scenario, Fatima is involved in _____.
A) business-to-consumer e-commerce
B) business-to-business e-commerce
C) business-to-government e-commerce
D) consumer-to-consumer e-commerce
A) business-to-consumer e-commerce
B) business-to-business e-commerce
C) business-to-government e-commerce
D) consumer-to-consumer e-commerce
Unlock Deck
Unlock for access to all 150 flashcards in this deck.
Unlock Deck
k this deck
73
Which of the following statements is true of business-to-consumer e-commerce?
A) A customer usually does careful multiple research and compares vendors before making a purchase.
B) A customer usually buys a standard product and pays the listed price.
C) Buyers and sellers often develop close and long-lasting relationships.
D) The size of a typical individual transaction is potentially very large.
A) A customer usually does careful multiple research and compares vendors before making a purchase.
B) A customer usually buys a standard product and pays the listed price.
C) Buyers and sellers often develop close and long-lasting relationships.
D) The size of a typical individual transaction is potentially very large.
Unlock Deck
Unlock for access to all 150 flashcards in this deck.
Unlock Deck
k this deck
74
Which of the following is true of expert systems?
A) They are unable to help in fraud detection.
B) They take a lot of time to be programmed and are complicated.
C) They use powerful statistical techniques to analyze data.
D) They are highly flexible in nature.
A) They are unable to help in fraud detection.
B) They take a lot of time to be programmed and are complicated.
C) They use powerful statistical techniques to analyze data.
D) They are highly flexible in nature.
Unlock Deck
Unlock for access to all 150 flashcards in this deck.
Unlock Deck
k this deck
75
_____ refers to marketing, buying, selling, and servicing of products over a network, usually the Internet.
A) E-commerce
B) Media-based networking
C) Inventory management
D) Group buying
A) E-commerce
B) Media-based networking
C) Inventory management
D) Group buying
Unlock Deck
Unlock for access to all 150 flashcards in this deck.
Unlock Deck
k this deck
76
Melingo Furniture provides its customers with an option of buying, selling, and servicing of its products online. This helps Melingo Furniture create a customer base by providing convenience to them. In this scenario, Melingo Furniture is involved in _____.
A) e-commerce
B) cloud computing
C) data mining
D) object hyperlinking
A) e-commerce
B) cloud computing
C) data mining
D) object hyperlinking
Unlock Deck
Unlock for access to all 150 flashcards in this deck.
Unlock Deck
k this deck
77
Scalesto Corp. is a law firm that also provides online support regarding lawsuits. To help its clients, it has a team dedicated to identify useful information from the company's database. In this scenario, Scalesto most likely uses _____ to analyze vast amounts of data.
A) a cybermediary
B) data mining
C) an expert system
D) intranet
A) a cybermediary
B) data mining
C) an expert system
D) intranet
Unlock Deck
Unlock for access to all 150 flashcards in this deck.
Unlock Deck
k this deck
78
Cognizance, an online news portal, needs to update its website frequently. To achieve this, the IT department of Cognizance develops a system that gives its managers access to large amounts of data and the processing power to convert the data into high-quality information quickly and efficiently. In this scenario, Cognizance has developed _____ to assist its managers.
A) a decision support system
B) a computer-aided design
C) an expert system
D) Hypertext Markup Language
A) a decision support system
B) a computer-aided design
C) an expert system
D) Hypertext Markup Language
Unlock Deck
Unlock for access to all 150 flashcards in this deck.
Unlock Deck
k this deck
79
Jeff, the CEO of Francostico Inc., decides to set up a system that would help its managers with decision making. To design this system, his programmers ask skilled and proficient managers to explain how they solve problems. Then, they devise a program to mimic the specialists' approach, incorporating various rules or guidelines that the specialists use. In this scenario, Jeff seeks to develop a(n) _____ for the managers.
A) business intelligence system
B) data warehouse
C) cybermediary
D) expert system
A) business intelligence system
B) data warehouse
C) cybermediary
D) expert system
Unlock Deck
Unlock for access to all 150 flashcards in this deck.
Unlock Deck
k this deck
80
In business-to-consumer (B2C) e-commerce, _____.
A) individual final consumers are the customers
B) the size of a typical individual transaction is very large
C) customers do careful multiple research and compare vendors before purchasing a product
D) buyers and sellers often develop a close working relationship
A) individual final consumers are the customers
B) the size of a typical individual transaction is very large
C) customers do careful multiple research and compare vendors before purchasing a product
D) buyers and sellers often develop a close working relationship
Unlock Deck
Unlock for access to all 150 flashcards in this deck.
Unlock Deck
k this deck