View the step-by-step solution to:

Chpt 14 1. Which of the following is the BEST definition of e-commerce?

Chpt 14

1.

Which of the following is the BEST definition of​ e-commerce?

A.

The use of the Internet and other electronic means for retailing and​ business-to-business transactions

B.

The application of statistics and electronic technologies for​ searching, sifting, and reorganizing pools of data to uncover useful information

C.

An information system for organizing and managing a​ firm's activities across product​ lines, departments, and geographic locations.

D.

​Internet-based wholesalers who collect information about​ sellers, present it to​ consumers, and help deliver online products to buyers

E.

Computers linked over a long distance through​ long-distance telephone​ wires, microwave​ signals, or satellite communications


2.

​_______ is used by a firm to organize and manage activities​ (such as​ manufacturing, purchasing,​ sales, and​ delivery) across all product lines and even geographic activities.

A.

Enterprise resource planning​ (ERP)

B.

​Computer-aided manufacturing

C.

Decision support system​ (DSS)

D.

Hypertext transfer protocol

E.

​Computer-aided design


3.

Jonah bought a new grill and had difficulty assembling it. He was able to download a more detailed user manual from the​ manufacturer's website through use of its​_______.

A.

local area network

B.

wireless wide area network

C.

super​ Wi-Fi network

D.

intranet

E.

extranet


4.

Hypertext transfer protocol is used to connect which of the​ following?

A.

Outsiders such as customers and suppliers to a​ firm's internal information network

B.

​Ground-station computers to satellites

C.

Shared network printers

D.

Documents or Web pages on the World Wide Web

E.

Client server networks


5.

A chain of grocery stores analyzes the buying patterns of its customers using data collected on​ customers' loyalty cards and uses this information to send​ e-coupons to customers that target the purchases they have made over the past 90 days. This is an example of​ _______.

A.

spyware

B.

an extranet

C.

data warehousing

D.

mass customization

E.

data mining


6.

Grant Industries has invested in a sophisticated system that uses computer software and machinery to automate its manufacturing​ processes, helping it to increase production​ speeds, consistency, and tooling accuracy. This is an example of​ _______.

A.

​computer-aided design​ (CAD)

B.

an encryption system

C.

​computer-aided manufacturing​ (CAM)

D.

a knowledge information system

E.

enterprise resource planning​ (ERP)


7.

Danielle receives an​ email, purportedly from the​ college, telling her that her email account has exceeded its mail quota on their server database and her account will become inactive in​ 24-48 hours unless she clicks on a link and verifies her account by providing her password and student ID number. This is likely an example of​_______.

A.

phishing

B.

spam

C.

a computer virus

D.

wireless mooching

E.

a denial of service attack


8.

The fraudulent acquisition and use of another​ person's private and personal​ information, usually for financial​ gain, is known as​ _______.

A.

phishing

B.

hacking

C.

spam

D.

identity theft

E.

encryption


9.

The process of changing text so that it is no longer easy to read to anyone without the translation key or code is known as​ _______.

A.

data warehousing

B.

phishing

C.

spam

D.

encryption

E.

spyware


10.

Part of a computer system or network that is designed to block unauthorized access while still permitting communication is known as​ a(n) _______.

A.

VSAT

B.

encryption system

C.

router

D.

intranet switch

E.

firewall



1.

Which of the following BEST describes the benefit of an enterprise resource planning​ (ERP) system for an​ organization?

A.

It creates virtual business models for managers and tests them with different data to see how they respond.

B.

It enables the organization to ship products from different vendors or suppliers as a single order to a customer.

C.

It coordinates internal operations across various departments with the activities of outside suppliers and notifies customers of upcoming deliveries and billings.

D.

It allows companies to manufacture products in large​ volumes, but each item features the unique customer options.

E.

It allows groups of people to communicate simultaneously from various locations via​ e-mail, phone, or​ video, thereby eliminating travel time and providing immediate contact.


2.

Zazzle is a​ high-volume online retailer that allows users to upload images and create their own personalized​ items, from greeting cards to clothing to iPhone cases. Users can choose premade designs or design products from​ scratch, as well as pick their favorite colors and styles. This is an example of​ _______.

A.

mass customization

B.

hypertext

C.

direct selling

D.

a direct channel

E.

enterprise resource planning​ (ERP)


3.

A​ company's _______ can be accessed only by employees or those with specific​ permission, whereas its​ _______ allows those outside the organization to access certain parts of its network.

A.

​intranet; Internet

B.

​extranet; Internet

C.

​intranet; extranet

D.

​Internet; intranet

E.

​extranet; intranet


4.

A company wants to allow its employees to have access to sensitive​ and/or confidential information on its computer network but it does not want​ customers, suppliers, or other outsiders to be able to view​ and/or download this information. One way to accomplish this is to​ ______.

A.

use hypertext transfer protocol​ (HTTP)

B.

add an externally located component to replace functions previously performed by application servers

C.

establish an intranet

D.

use an encryption system for all data on the network

E.

install​ anti-virus software on all​ employees' computers


5.

​A(n) _______ allows outside users to partially access a​ firm's internal​ network, enabling businesses to securely share part of their information or operations with​suppliers, vendors,​ partners, or customers.

A.

​client-server network

B.

intranet

C.

local area network

D.

extranet

E.

router


6.

Walnut County Community College has a private computer network that can be accessed only by employees. It contains the​ college's policies and​ procedures, the employee​ handbook, internal job​ postings, confidential information about employee​ benefits, and other restricted information. This is an example of​ _______.

A.

an intranet

B.

​Wi-Fi

C.

a decision support system

D.

a wide area network

E.

an extranet


7.

The global communication network that allows millions of computers worldwide to connect and exchange information is known as​ _______.

A.

the Internet

B.

information technology

C.

​e-commerce

D.

the​ "super Wi-Fi" network

E.

the World Wide Web


8.

In​ client-server networks,​ _______ are the computers that provide services shared by​ users, and​ _______ are the computers through which users request information or resources.

A.

​servers; clients

B.

​intranets; extranets

C.

​clients; servers

D.

wide area networks​ (WANs); local area networks​ (LANs)

E.

​extranets; intranets


9.

​_______ networks are used to link computers in a relatively small geographic​ area, such as a single building or a group of buildings.

A.

​Client-server

B.

Local area

C.

Wide area

D.

Personal area

E.

Enterprise private


10.

Data​ _______ refers to the​ collection, storage,​ retrieval, and management of data in an​ organization's electronic files.

A.

mining

B.

warehousing

C.

recovery

D.

assimilation

E.

assessment


11.

Which of the following is used to create precision​ drawings, technical​ illustrations, and​ two- or​ three-dimensional models of products in the design​ stage?

A.

Encryption system

B.

​Computer-aided manufacturing​ (CAM)

C.

​Computer-aided design​ (CAD)

D.

Material resource planning​ (MRP) system

E.

Computer assisted coding


12.

​Raw, unanalyzed facts and figures are known as​ _______.

A.

statistics

B.

information

C.

intelligence

D.

knowledge

E.

data


13.

​_______ enables managers to transform data into information and​ collect, process, and transmit that information for use in decision making.

A.

Data warehousing

B.

An encryption system

C.

An information system​ (IS)

D.

An extranet

E.

Hypertext transfer protocol​ (HTTP)


14.

Which of the following BEST describes the difference between data and​ information?

A.

Data consist solely of​ digits; information consists of words.

B.

Data is less reliable than information because it has not been verified.

C.

Data is intellectual​ property; information is tangible property.

D.

Information is raw facts and​ figures; data is the interpretation of that information.

E.

Data are raw facts or​ figures; information is the interpretation of that data.  


15.

Data​ _______ attempts to identify trends and patterns among the pools of data that have been collected by a company.

A.

customization

B.

assimilation

C.

manipulation

D.

mining

E.

warehousing


16.

For which of the following purposes would a company use data​ mining?

A.

To store data in a more secure location

B.

To allow those outside the company to have limited access to its internal information network

C.

To identify​ trends, patterns, and relationships among the data it has amassed

D.

To search incoming​ e-mail and data files for viruses and​ virus-like characteristics

E.

To create virtual business models that can be tested with different data to see how they respond


17.

Creations of the mind that have commercial​ value, such as​ ideas, literary​ works, names,​ symbols, or​ processes, are known as​ _______.

A.

information

B.

data

C.

information privileges

D.

intellectual property

E.

knowledge rights


18.

Using another​ person's private but unsecured wireless network without their permission or knowledge is known as​ _______.

A.

phishing

B.

a Trojan horse

C.

wireless mooching

D.

pharming

E.

identity theft


19.

A virus that replicates itself and spreads from computer to computer within a networked computer system without any action on the part of the computer​ user, such as opening a file or clicking on a​ link, is known as​ _______.

A.

a worm

B.

spyware

C.

a Trojan horse

D.

pharming

E.

spam


20.

Esther receives an email that appears to be from her​ bank, advising that it is conducting an account verification process. The email asks Esther to click on a link to update her account​ information, including her​ name, address, account​ number, and Social Security number. This is likely an example of​ _______.

A.

spam

B.

a computer virus

C.

phishing

D.

a denial of service attack

E.

wireless mooching


21.

Software that surreptitiously gathers information about an Internet​ user's browsing​ habits, intercepts the​ user's personal​ data, and relays that information to others is known as​ _______.

A.

spyware

B.

phishing

C.

spam

D.

wireless mooching

E.

a Trojan horse


22.

Kennita applies for a mortgage loan and is turned down. She obtains a copy of her credit report and learns that someone using her​ name, address, and Social Security number has opened numerous credit card accounts and obtained a car loan. Kennita has been the victim of​ _______.

A.

phishing

B.

a denial of service​ (DoS) attack

C.

spam

D.

a computer virus

E.

identity theft


23.

Electronic​ "junk mail," irrelevant or inappropriate messages sent indiscriminately to a large number of​ recipients, is known as​ ______.

A.

hacking

B.

pharming

C.

spyware

D.

phishing

E.

spam


24.


How does a firewall prevent unauthorized access to a computer​ system?

A.

By encoding all intellectual property owned by the organization

B.

By blocking users who send email messages that appear as if they came from a trusted source

C.

By filtering incoming data by applying a security policy and using a router to control where data goes

D.

By searching incoming email and data files for​ "signatures" of known viruses and​ virus-like characteristics, and discarding or quarantining them

E.

By scrambling email messages so that they look like garbled nonsense to anyone who does not possess the code or key


25.

Which of the following would a company use in order to prevent hackers or other unauthorized outsiders from accessing information on its computer​ network?

A.

Firewall

B.

Super​ Wi-Fi network

C.

Encryption system

D.

VSAT communications

E.

​Anti-virus software

Recently Asked Questions

Why Join Course Hero?

Course Hero has all the homework and study help you need to succeed! We’ve got course-specific notes, study guides, and practice tests along with expert tutors.

-

Educational Resources
  • -

    Study Documents

    Find the best study resources around, tagged to your specific courses. Share your own to gain free Course Hero access.

    Browse Documents
  • -

    Question & Answers

    Get one-on-one homework help from our expert tutors—available online 24/7. Ask your own questions or browse existing Q&A threads. Satisfaction guaranteed!

    Ask a Question