Filters
Question type

Study Flashcards

Hardware includes the various components of a computer system along with communications and network equipment.

A) True
B) False

Correct Answer

verifed

verified

_____ is a technology that stores information on a microchip‐such as a unique serial number‐and transmits it to a reader when its within range.


A) Global positioning system (GPS)
B) Radio frequency identification (RFID)
C) Computer­aided design (CAD)
D) Graphical user interface (GUI)

E) B) and D)
F) C) and D)

Correct Answer

verifed

verified

According to the characteristics of good information, high­quality information should focus on issues that are important to decision makers.

A) True
B) False

Correct Answer

verifed

verified

Viral marketing is when a firm uses computer viruses to deliver unsolicited advertisements to a user's computer.

A) True
B) False

Correct Answer

verifed

verified

_____ refers to the physical components used to collect, input, store, process data, and to display and distribute information.


A) Hardware
B) Software
C) Intranet
D) Extranet

E) A) and D)
F) B) and D)

Correct Answer

verifed

verified

Businesses develop intranets so that valued customers have access to internal information that is not available to the general public.

A) True
B) False

Correct Answer

verifed

verified

The U.S. Congress enacted the Controlling the Assault of Non­Solicited Pornography and Marketing Act in 2003. This act:


A) limits advertisers from sending more than one ad per month per email address.
B) prohibits the use of false or misleading subject lines on emails used for advertising.
C) requires spammers to register with the Federal Trade Commission.
D) does not view sending multiple spam emails with the use of a hijacked computer as an offense.

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

What are the benefits and drawbacks of cloud computing?

Correct Answer

verifed

verified

The benefits of cloud computing are: Com...

View Answer

One of the disadvantages of an expert system is that it has little flexibility and no common sense.​

A) True
B) False

Correct Answer

verifed

verified

_____ are skilled computer users who try to gain unauthorized access to other people's computers.


A) Spammers
B) Compilers
C) Hackers
D) Networkers

E) B) and C)
F) None of the above

Correct Answer

verifed

verified

The _____, which allows people to enter commands by clicking on icons on a computer screen, has made today's operating systems much simpler and more intuitive.


A) intranet
B) applications software
C) graphical user interface
D) extranet

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

The online encyclopedia Wikipedia that uses wiki software to allow users to comment on and contribute to its articles is a Web 2.0 site.

A) True
B) False

Correct Answer

verifed

verified

An initiative in 2001 allowed members of the Internet (I2) consortium to sponsor other research and educational organizations that did not originally qualify for membership, so they would have access to I2 resources.

A) True
B) False

Correct Answer

verifed

verified

Many firms have used the Internet to implement very effective viral marketing campaigns that attempt to get customers to communicate a firm's message to friends, family, and colleagues.

A) True
B) False

Correct Answer

verifed

verified

Ted works for Soo Kin Technologies as a repair technician. He assists other repair persons directly serving end users. Many of the repair persons he assists work at remote locations, requiring Ted to travel long distances to train them. He has discovered that many repair problems are fairly simple and can be handled by the employees themselves if these problems are correctly diagnosed and the appropriate instructions and advice are provided. As a result, Ted is working with programmers to build an _____ that asks the employee or repair person a series of questions about his or her problem and then provides appropriate suggestions based on his or her responses.


A) intranet
B) extranet
C) expert system
D) operating system

E) C) and D)
F) A) and C)

Correct Answer

verifed

verified

Many Web 2.0 sites rely on _____ to provide most of their content.


A) advertisers
B) users
C) hackers
D) programmers

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

Spam is a type of malware.

A) True
B) False

Correct Answer

verifed

verified

Horizontal applications software consists of highly specialized applications used in a particular industry, such as medicine, law, or accounting.

A) True
B) False

Correct Answer

verifed

verified

Deleting email messages from an inbox on a regular basis is the most effective way of eliminating the possibility that others will be able to read the messages.

A) True
B) False

Correct Answer

verifed

verified

_____ is best described as an Internet marketing strategy that attempts to get customers to communicate a firm's message to friends, family, and colleagues.


A) Supply­chaining
B) E­tailing
C) Visual marketing
D) Viral marketing

E) All of the above
F) C) and D)

Correct Answer

verifed

verified

Showing 141 - 160 of 200

Related Exams

Show Answer