Filters
Question type

Study Flashcards

A _____ is a request for the database management software to search a database for data that match criteria specified by a user.


A) cybermediary
B) protocol
C) query
D) cache

E) None of the above
F) A) and C)

Correct Answer

verifed

verified

Which of the following is a difference between phishing and pharming?


A) Unlike phishing, pharming uses fake websites to trick people into divulging personal information.
B) Unlike pharming, phishing uses techniques to redirect Internet traffic to fake sites.
C) Unlike phishing, pharming does not require the intended victim to click on a bogus email link.
D) Unlike pharming, phishing is highly sophisticated and difficult to detect.

E) All of the above
F) A) and D)

Correct Answer

verifed

verified

When firms give key stakeholders limited access to certain areas of their intranet, such as allowing suppliers to check on the state of the firm's inventory to plan shipments of parts and materials, the firm is permitting the suppliers to do so through the use of _____.


A) cybermediaries
B) expert systems
C) firewalls
D) extranets

E) A) and B)
F) All of the above

Correct Answer

verifed

verified

_____ uses hardware or software to create a barrier that prevents unwanted messages or instructions from entering a computer system.


A) A firewall
B) Spyware
C) Adware
D) A rootkit

E) B) and C)
F) All of the above

Correct Answer

verifed

verified

Which of the following statements is true of business-to-consumer e-commerce?


A) A customer usually does careful multiple research and compares vendors before making a purchase.
B) A customer usually buys a standard product and pays the listed price.
C) Buyers and sellers often develop close and long-lasting relationships.
D) The size of a typical individual transaction is potentially very large.

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

BlueWink, a popular marketing firm, requires a mechanism to protect its confidential data and client details from hackers, cyber criminals, and other security threats. Which of the following should BlueWink use as a safeguard?


A) Expert systems
B) Firewalls
C) Cybermediaries
D) Intranet

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

A business firm notifies all its employees about a general meeting that is to be held the next day and asks them to confirm their attendance at the meeting by clicking on the link provided within the same email message. The firm sends the email through its private network that is accessible only to the management and the employees of the firm. Which of the following information networks is used by the firm to notify its employees?


A) A metropolitan area network
B) An extranet
C) An intranet
D) A peer-to-peer network

E) A) and D)
F) A) and B)

Correct Answer

verifed

verified

Word processing, spreadsheet, and personal information management software are examples of vertical applications software.

A) True
B) False

Correct Answer

verifed

verified

Identify a true statement about an expert system.


A) It is flexible in its problem-solving abilities and can be easily programmed with few decision rules.
B) It will not be able to find a solution to a problem that deviates in any significant way from the specific type of problem it was programmed to solve.
C) It finds it difficult to mimic the rules and guidelines followed by a human expert to solve a particular problem.
D) It will not be able to solve problems in areas such as medical diagnoses, fraud detection, and consumer credit evaluation.

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

The _____ prohibits the use of false or deceptive subject lines in email messages.


A) Combating Online Infringement and Counterfeits Act
B) Junk Fax Prevention Act
C) Anticybersquatting Consumer Protection Act
D) Controlling the Assault of Non-Solicited Pornography and Marketing Act

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

Clomien Corp., a law firm, needs frequent interpretation of its stored data for cross-references and formulation of decisions. It uses a(n) _____ to help it discover subtle and complex relationships hidden in its data.


A) expert system
B) data warehouse
C) cybermediary
D) business intelligence system

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

_____ is a network based on fiber-optic cable and uses high-speed connectivity to improve education, research, and collaboration.


A) Web 2.0
B) Internet2
C) Broadband
D) Cloud computing

E) B) and D)
F) None of the above

Correct Answer

verifed

verified

Augustus, a student undergoing his doctorate program, is working on a thesis that requires him to browse the Internet for information and visit various unverified websites. To protect his computer from the risk of attracting unwanted messages and other security threats, he uses a tool that uses both hardware and software to provide protection against hackers. In the given scenario, Augustus is most likely using _____.


A) a firewall
B) spyware
C) malware
D) a spam filter

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

_____ refers to unsolicited commercial emails, usually sent to huge numbers of people with little regard for whether they are interested in the product or not.


A) Spyware
B) A cookie
C) Spam
D) A spoof

E) C) and D)
F) B) and C)

Correct Answer

verifed

verified

A(n) _____ is a network of organizations and activities needed to obtain materials and other resources, produce final products, and get those products to their final users.


A) vendor-managed inventory
B) supply chain
C) organizational trail
D) business triage

E) B) and D)
F) All of the above

Correct Answer

verifed

verified

When product designers use computer-aided design (CAD) software to produce technical drawings in three dimensions, they are using:


A) lateral system software.
B) vertical applications software.
C) utility software.
D) office productivity software.

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

Unlike business-to-consumer (B2C) e-commerce, business-to-business (B2B) e-commerce involves:


A) extensive negotiation over specifications, delivery, installation, support, and other issues.
B) very large typical individual transactions.
C) customers who do little research and often base their purchases on impulse.
D) firms that seldom develop a close working relationship with individual customers.

E) A) and D)
F) B) and D)

Correct Answer

verifed

verified

In the context of using information technology in the business-to-consumer market, identify a true statement about opt-in emails.


A) They are unsolicited commercial emails.
B) They are messages that a receiver has explicitly chosen to receive.
C) They are spam that facilitate pharming.
D) They are used by hackers to break into a computer system.

E) A) and B)
F) All of the above

Correct Answer

verifed

verified

Osmectes Corp. has included a feature in its website that enables its employees to receive help from other employees. This support system allows employees to provide information and guidance to others. Employees can seek help regarding any work-related issue through this system. In this scenario, Osmectes Corp. is using _____.


A) Enterprise 2.0
B) a cybermediary
C) InterNIC
D) Internet2

E) All of the above
F) C) and D)

Correct Answer

verifed

verified

In business-to-business (B2B) e-commerce, _____.


A) most purchases are based on impulse
B) the negotiations include a large number of business customers
C) the size of a typical individual transaction is relatively small
D) buyers and sellers often develop close and long-lasting relationships

E) None of the above
F) A) and C)

Correct Answer

verifed

verified

Showing 81 - 100 of 150

Related Exams

Show Answer