How can we help?

You can also find more resources in our Help Center.

25 terms

Quiz 4

STUDY
PLAY
________ tools are used to analyze large unstructured data sets, such as e-mail, memos, survey responses, etc., to discover patterns and relationships.
Text mining
In general, for digital goods, the marginal cost of producing another unit is about zero
true
A DBMS reduces data redundancy and inconsistency by
minimizing isolated files with repeated data.
A DBMS separates the logical and physical views of data
true
A data warehouse may be updated by a legacy system.
true
Amazon.com uses Web personalization as a marketing tool.
true
Consumers selling goods and services electronically to other consumers best describes
C2C e-commerce
Customer relationship management systems typically provide software and online tools for sales, customer service, and
marketing
A network of organizations and business processes for procuring raw materials, transforming these materials into intermediate and finished products, and distributing the finished products to customers is called a
supply chain
CRM software can help organizations identify high-value customers for preferential treatments
true
Implementing an enterprise application typically requires organizational change as well as adjustments to existing business processes
true
In order to achieve maximum benefit from an enterprise software package, a business
changes the way it works to match the software's business processes.
The Internet shrinks information asymmetry.
true
Supply chain inefficiencies can waste as much as 25 percent of a company's operating costs.
true
Selling the same goods to different targeted groups at different prices is called
price discrimination.
Selling products and services directly to individual consumers via the Internet best describes
B2C e-commerce.
The measurement of the number of customers who stop using or purchasing products or services from a company is called
churn rate
The quality of ubiquity, as it relates to e-commerce, is illustrated by
the availability of the Internet everywhere and anytime
Computer worms spread much more rapidly than computer viruses.
true
_______ controls ensure that valuable business data files on either disk or tape are not subject to unauthorized access, change, or destruction while they are in use or in storage.
Data security
A firewall allows the organization to
prevent unauthorized communication both into and out of the network.
A keylogger is a type of
spyware
A(n) ________ system is used to identify and authorize different categories of system users and specify which portions of the organization's systems each user can access.
identity management
An example of phishing is
setting up a fake medical Web site that asks users for confidential information.
Biometric authentication is the use of physical characteristics such as retinal images to provide identification
true