CH 16: Managing Information and Technology BUS 101 – Flashcards

Unlock all answers in this set

Unlock answers
question
The key advantage of RFID technology is that it allows the seller of a product to track and monitor the buyer's use of the product.
answer
false
question
_____ is an Internet marketing strategy that attempts to involve customers and others not employed by the seller in activities that promote a product.
answer
Viral marketing
question
One advantage of the e-marketplace is that it allows sellers and buyers to contact and negotiate with a large number of market participants.
answer
true
question
A _____ uses software and/or hardware to prevent unwanted access to a computer or computer system.
answer
firewall
question
E-marketplaces are primarily used by participants in the B2C market.
answer
False
question
The main purpose of RFID chips is to transmit a serial number that uniquely identifies a person, product, or device.
answer
True
question
Abel Webb works for the Greater Garrisonville Power Company. His job involves creating confidential reports and other documents that he posts to an internal server. While employees can view and even download these confidential materials using a web browser, people outside the company have no access to them. This suggests that Garrisonville Power is using an intranet.
answer
True
question
A query automatically delivers information quickly and conveniently to an end user's computer desktop.
answer
False
question
The physical components used to collect, store, organize, and process data and to distribute information is referred to as software.
answer
False
question
Due to intellectual property restrictions, unauthorized music sharing is considered
answer
Piracy
question
In an effort to secure online payments, B2C e-commerce IT managers use
answer
secure socket layers.
question
Many businesses have been reluctant to embrace cloud computing, citing _______ concerns.
answer
security and reliability
question
The Business Software Alliance estimated that the piracy rate in China was about
answer
80%
question
_____ are skilled computer users who try to gain unauthorized access to other people's computers.
answer
Hackers
question
Hardware consists of computer programs that provide instructions to a computer, so that it can perform a desired task.
answer
False
question
Viral marketing uses computer viruses to deliver unsolicited advertisements to a user's computer.
answer
False
question
The online version of TurboTax™ uses a(n) _____ to take a client through the process of filing his or her tax return. By asking a series of questions, the online site leads the client through tax preparation. A person who may not necessarily have the expertise to prepare his or her own taxes can rely on the firm's software to complete the task.
answer
Expert system
question
Deleting email messages from your inbox on a regular basis is an effective way of eliminating the possibility that others will be able to read your messages.
answer
False
question
Once cloud computing overcomes customer concerns with security and reliability issues, it may change the way most firms acquire and use information resources.
answer
True
question
Viral marketing is not as effective as traditional buzz marketing, because the latter tactic allows for messages to reach a wider audience at a faster speed.
answer
False
question
Since Internet advertising experienced a slight decrease beginning in 2009 with the onset of the recession, B2C companies should consider other alternatives for advertising their products.
answer
False
question
Websites that incorporate interactive and collaborative features in order to create a more interesting and useful experience for their users is called
answer
Web 2.0
question
A small firm that manufactures specialized automobile parts would be unable to participate in an e-marketplace, since accessing such markets requires expensive specialized communications equipment that only larger firms can afford.
answer
False
question
Spyware installs itself on your computer without permission and then tracks your computer behavior.
answer
True
question
All of the following are forms of Internet traffic EXCEPT
answer
graphical-user interface
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New