Quiz 4

25 terms by nasreen01 

Ready to study?
Start with Flashcards

Create a new folder

Advertisement Upgrade to remove ads

________ tools are used to analyze large unstructured data sets, such as e-mail, memos, survey responses, etc., to discover patterns and relationships.

Text mining

In general, for digital goods, the marginal cost of producing another unit is about zero

true

A DBMS reduces data redundancy and inconsistency by

minimizing isolated files with repeated data.

A DBMS separates the logical and physical views of data

true

A data warehouse may be updated by a legacy system.

true

Amazon.com uses Web personalization as a marketing tool.

true

Consumers selling goods and services electronically to other consumers best describes

C2C e-commerce

Customer relationship management systems typically provide software and online tools for sales, customer service, and

marketing

A network of organizations and business processes for procuring raw materials, transforming these materials into intermediate and finished products, and distributing the finished products to customers is called a

supply chain

CRM software can help organizations identify high-value customers for preferential treatments

true

Implementing an enterprise application typically requires organizational change as well as adjustments to existing business processes

true

In order to achieve maximum benefit from an enterprise software package, a business

changes the way it works to match the software's business processes.

The Internet shrinks information asymmetry.

true

Supply chain inefficiencies can waste as much as 25 percent of a company's operating costs.

true

Selling the same goods to different targeted groups at different prices is called

price discrimination.

Selling products and services directly to individual consumers via the Internet best describes

B2C e-commerce.

The measurement of the number of customers who stop using or purchasing products or services from a company is called

churn rate

The quality of ubiquity, as it relates to e-commerce, is illustrated by

the availability of the Internet everywhere and anytime

Computer worms spread much more rapidly than computer viruses.

true

_______ controls ensure that valuable business data files on either disk or tape are not subject to unauthorized access, change, or destruction while they are in use or in storage.

Data security

A firewall allows the organization to

prevent unauthorized communication both into and out of the network.

A keylogger is a type of

spyware

A(n) ________ system is used to identify and authorize different categories of system users and specify which portions of the organization's systems each user can access.

identity management

An example of phishing is

setting up a fake medical Web site that asks users for confidential information.

Biometric authentication is the use of physical characteristics such as retinal images to provide identification

true

Please allow access to your computer’s microphone to use Voice Recording.

Having trouble? Click here for help.

We can’t access your microphone!

Click the icon above to update your browser permissions above and try again

Example:

Reload the page to try again!

Reload

Press Cmd-0 to reset your zoom

Press Ctrl-0 to reset your zoom

It looks like your browser might be zoomed in or out. Your browser needs to be zoomed to a normal size to record audio.

Please upgrade Flash or install Chrome
to use Voice Recording.

For more help, see our troubleshooting page.

Your microphone is muted

For help fixing this issue, see this FAQ.

Star this term

You can study starred terms together

NEW! Voice Recording

Create Set