CH 16: Managing Information and Technology BUS 101

question

The key advantage of RFID technology is that it allows the seller of a product to track and monitor the buyer’s use of the product.
answer

false
question

_____ is an Internet marketing strategy that attempts to involve customers and others not employed by the seller in activities that promote a product.
answer

Viral marketing
question

One advantage of the e-marketplace is that it allows sellers and buyers to contact and negotiate with a large number of market participants.
answer

true
question

A _____ uses software and/or hardware to prevent unwanted access to a computer or computer system.
answer

firewall
question

E-marketplaces are primarily used by participants in the B2C market.
answer

False
question

The main purpose of RFID chips is to transmit a serial number that uniquely identifies a person, product, or device.
answer

True
question

Abel Webb works for the Greater Garrisonville Power Company. His job involves creating confidential reports and other documents that he posts to an internal server. While employees can view and even download these confidential materials using a web browser, people outside the company have no access to them. This suggests that Garrisonville Power is using an intranet.
answer

True
question

A query automatically delivers information quickly and conveniently to an end user’s computer desktop.
answer

False
question

The physical components used to collect, store, organize, and process data and to distribute information is referred to as software.
answer

False
question

Due to intellectual property restrictions, unauthorized music sharing is considered
answer

Piracy
question

In an effort to secure online payments, B2C e-commerce IT managers use
answer

secure socket layers.
question

Many businesses have been reluctant to embrace cloud computing, citing _______ concerns.
answer

security and reliability
question

The Business Software Alliance estimated that the piracy rate in China was about
answer

80%
question

_____ are skilled computer users who try to gain unauthorized access to other people’s computers.
answer

Hackers
question

Hardware consists of computer programs that provide instructions to a computer, so that it can perform a desired task.
answer

False
question

Viral marketing uses computer viruses to deliver unsolicited advertisements to a user’s computer.
answer

False
question

The online version of TurboTax™ uses a(n) _____ to take a client through the process of filing his or her tax return. By asking a series of questions, the online site leads the client through tax preparation. A person who may not necessarily have the expertise to prepare his or her own taxes can rely on the firm’s software to complete the task.
answer

Expert system
question

Deleting email messages from your inbox on a regular basis is an effective way of eliminating the possibility that others will be able to read your messages.
answer

False
question

Once cloud computing overcomes customer concerns with security and reliability issues, it may change the way most firms acquire and use information resources.
answer

True
question

Viral marketing is not as effective as traditional buzz marketing, because the latter tactic allows for messages to reach a wider audience at a faster speed.
answer

False
question

Since Internet advertising experienced a slight decrease beginning in 2009 with the onset of the recession, B2C companies should consider other alternatives for advertising their products.
answer

False
question

Websites that incorporate interactive and collaborative features in order to create a more interesting and useful experience for their users is called
answer

Web 2.0
question

A small firm that manufactures specialized automobile parts would be unable to participate in an e-marketplace, since accessing such markets requires expensive specialized communications equipment that only larger firms can afford.
answer

False
question

Spyware installs itself on your computer without permission and then tracks your computer behavior.
answer

True
question

All of the following are forms of Internet traffic EXCEPT
answer

graphical-user interface

Get instant access to
all materials

Become a Member