Advertisement Upgrade to remove ads

________ tools are used to analyze large unstructured data sets, such as e-mail, memos, survey responses, etc., to discover patterns and relationships.

Text mining

In general, for digital goods, the marginal cost of producing another unit is about zero


A DBMS reduces data redundancy and inconsistency by

minimizing isolated files with repeated data.

A DBMS separates the logical and physical views of data


A data warehouse may be updated by a legacy system.

true uses Web personalization as a marketing tool.


Consumers selling goods and services electronically to other consumers best describes

C2C e-commerce

Customer relationship management systems typically provide software and online tools for sales, customer service, and


A network of organizations and business processes for procuring raw materials, transforming these materials into intermediate and finished products, and distributing the finished products to customers is called a

supply chain

CRM software can help organizations identify high-value customers for preferential treatments


Implementing an enterprise application typically requires organizational change as well as adjustments to existing business processes


In order to achieve maximum benefit from an enterprise software package, a business

changes the way it works to match the software's business processes.

The Internet shrinks information asymmetry.


Supply chain inefficiencies can waste as much as 25 percent of a company's operating costs.


Selling the same goods to different targeted groups at different prices is called

price discrimination.

Selling products and services directly to individual consumers via the Internet best describes

B2C e-commerce.

The measurement of the number of customers who stop using or purchasing products or services from a company is called

churn rate

The quality of ubiquity, as it relates to e-commerce, is illustrated by

the availability of the Internet everywhere and anytime

Computer worms spread much more rapidly than computer viruses.


_______ controls ensure that valuable business data files on either disk or tape are not subject to unauthorized access, change, or destruction while they are in use or in storage.

Data security

A firewall allows the organization to

prevent unauthorized communication both into and out of the network.

A keylogger is a type of


A(n) ________ system is used to identify and authorize different categories of system users and specify which portions of the organization's systems each user can access.

identity management

An example of phishing is

setting up a fake medical Web site that asks users for confidential information.

Biometric authentication is the use of physical characteristics such as retinal images to provide identification


Please allow access to your computer’s microphone to use Voice Recording.

Having trouble? Click here for help.

We can’t access your microphone!

Click the icon above to update your browser permissions above and try again


Reload the page to try again!


Press Cmd-0 to reset your zoom

Press Ctrl-0 to reset your zoom

It looks like your browser might be zoomed in or out. Your browser needs to be zoomed to a normal size to record audio.

Please upgrade Flash or install Chrome
to use Voice Recording.

For more help, see our troubleshooting page.

Your microphone is muted

For help fixing this issue, see this FAQ.

Star this term

You can study starred terms together

NEW! Voice Recording