________ tools are used to analyze large unstructured data sets, such as e-mail, memos, survey responses, etc., to discover patterns and relationships.
In general, for digital goods, the marginal cost of producing another unit is about zero
A DBMS reduces data redundancy and inconsistency by
minimizing isolated files with repeated data.
A DBMS separates the logical and physical views of data
A data warehouse may be updated by a legacy system.
Amazon.com uses Web personalization as a marketing tool.
Consumers selling goods and services electronically to other consumers best describes
Customer relationship management systems typically provide software and online tools for sales, customer service, and
A network of organizations and business processes for procuring raw materials, transforming these materials into intermediate and finished products, and distributing the finished products to customers is called a
CRM software can help organizations identify high-value customers for preferential treatments
Implementing an enterprise application typically requires organizational change as well as adjustments to existing business processes
In order to achieve maximum benefit from an enterprise software package, a business
changes the way it works to match the software's business processes.
The Internet shrinks information asymmetry.
Supply chain inefficiencies can waste as much as 25 percent of a company's operating costs.
Selling the same goods to different targeted groups at different prices is called
Selling products and services directly to individual consumers via the Internet best describes
The measurement of the number of customers who stop using or purchasing products or services from a company is called
The quality of ubiquity, as it relates to e-commerce, is illustrated by
the availability of the Internet everywhere and anytime
Computer worms spread much more rapidly than computer viruses.
_______ controls ensure that valuable business data files on either disk or tape are not subject to unauthorized access, change, or destruction while they are in use or in storage.
A firewall allows the organization to
prevent unauthorized communication both into and out of the network.
A keylogger is a type of
A(n) ________ system is used to identify and authorize different categories of system users and specify which portions of the organization's systems each user can access.
An example of phishing is
setting up a fake medical Web site that asks users for confidential information.
Biometric authentication is the use of physical characteristics such as retinal images to provide identification