logo image

CH 16: Managing Information and Technology BUS 101

The key advantage of RFID technology is that it allows the seller of a product to track and monitor the buyer’s use of the product.
false
_____ is an Internet marketing strategy that attempts to involve customers and others not employed by the seller in activities that promote a product.
Viral marketing
One advantage of the e-marketplace is that it allows sellers and buyers to contact and negotiate with a large number of market participants.
true
A _____ uses software and/or hardware to prevent unwanted access to a computer or computer system.
firewall
E-marketplaces are primarily used by participants in the B2C market.
False
The main purpose of RFID chips is to transmit a serial number that uniquely identifies a person, product, or device.
True
Abel Webb works for the Greater Garrisonville Power Company. His job involves creating confidential reports and other documents that he posts to an internal server. While employees can view and even download these confidential materials using a web browser, people outside the company have no access to them. This suggests that Garrisonville Power is using an intranet.
True
A query automatically delivers information quickly and conveniently to an end user’s computer desktop.
False
The physical components used to collect, store, organize, and process data and to distribute information is referred to as software.
False
Due to intellectual property restrictions, unauthorized music sharing is considered
Piracy
In an effort to secure online payments, B2C e-commerce IT managers use
secure socket layers.
Many businesses have been reluctant to embrace cloud computing, citing _______ concerns.
security and reliability
The Business Software Alliance estimated that the piracy rate in China was about
80%
_____ are skilled computer users who try to gain unauthorized access to other people’s computers.
Hackers
Hardware consists of computer programs that provide instructions to a computer, so that it can perform a desired task.
False
Viral marketing uses computer viruses to deliver unsolicited advertisements to a user’s computer.
False
The online version of TurboTax™ uses a(n) _____ to take a client through the process of filing his or her tax return. By asking a series of questions, the online site leads the client through tax preparation. A person who may not necessarily have the expertise to prepare his or her own taxes can rely on the firm’s software to complete the task.
Expert system
Deleting email messages from your inbox on a regular basis is an effective way of eliminating the possibility that others will be able to read your messages.
False
Once cloud computing overcomes customer concerns with security and reliability issues, it may change the way most firms acquire and use information resources.
True
Viral marketing is not as effective as traditional buzz marketing, because the latter tactic allows for messages to reach a wider audience at a faster speed.
False
Since Internet advertising experienced a slight decrease beginning in 2009 with the onset of the recession, B2C companies should consider other alternatives for advertising their products.
False
Websites that incorporate interactive and collaborative features in order to create a more interesting and useful experience for their users is called
Web 2.0
A small firm that manufactures specialized automobile parts would be unable to participate in an e-marketplace, since accessing such markets requires expensive specialized communications equipment that only larger firms can afford.
False
Spyware installs itself on your computer without permission and then tracks your computer behavior.
True
All of the following are forms of Internet traffic EXCEPT
graphical-user interface

Need essay sample on "CH 16: Managing Information and Technology BUS 101"? We will write a custom essay sample specifically for you for only $ 13.90/page

Can’t wait to take that assignment burden offyour shoulders?

Let us know what it is and we will show you how it can be done!
×
Sorry, but copying text is forbidden on this website. If you need this or any other sample, please register

Already on Businessays? Login here

No, thanks. I prefer suffering on my own
Sorry, but copying text is forbidden on this website. If you need this or any other sample register now and get a free access to all papers, carefully proofread and edited by our experts.
Sign in / Sign up
No, thanks. I prefer suffering on my own
Not quite the topic you need?
We would be happy to write it
Join and witness the magic
Service Open At All Times
|
Complete Buyer Protection
|
Plagiarism-Free Writing

Emily from Businessays

Hi there, would you like to get such a paper? How about receiving a customized one? Check it out https://goo.gl/chNgQy

We use cookies to give you the best experience possible. By continuing we’ll assume you’re on board with our cookie policy