Business Information Test 3
Web-enabled business is often classified by the parties involved in the interaction: business-to-business (B2B), business-to-consumer (B2C), and _____.
B2G
Every time you download a file from a Web site or attach files to e-mail, you are using a(n) _____ application.
FTP
_____ means data about data.
Metadata
_____ is the term for any unsolicited commercial email.
Spam
_____ includes cookies and other, more sophisticated applications that are installed on your computer unbeknownst to you and transmit information about you while you are online.
Spyware
A data warehouse is a large, typically relational, database that supports management decision making.
True
A join table combines data from two or more tables.
True
A schema describes the structure of the database being designed: the names and types of fields in each record type and the general relationships among different sets of records or files.
True
_____ are images placed on a Web site that link to the site of the company selling the product or service.
banners
A(n) _____ is a Web page that invites surfers to post opinions and artistic work, as well as links to sites of interest.
blog
A technological challenge to information systems is the way characters are usually represented by _____ in computers.
bytes
A(n) _____ limits site access to the employees of particular organizations, usually business partners.
extranet
A majority of web users prefer to access the web in English rather than using any other language.
false
The ability in object-oriented structures to create a new object automatically by replicating all or some of the characteristics of a previously developed object is called _____.
inheritance
Acting locally means being sensitive to regional customs and language nuances.
true
Affiliates are compensated in many ways such as pay per sale, pay per click, and pay per lead.
true
An exchange is an extranet for organizations that offer for sale and bid on products and services of a particular type.
true
Database management systems structure files, store data, and link records.
true
_____ is a magnification or expansion of the amount, types, and level of detail of data that is collected and stored.
Big Data
By using cookies and recording shoppers' movements, _____ software can create electronic consumer profiles for each shopper and buyer.
CRM
_____ often help ensure that a user does not receive the same unsolicited information multiple times.
Cookies
_____ is a process for outsourcing a variety of tasks to a distributed group of people, both online or offline.
Crowdsourcing
_____ should first be done to decide which data should be collected and how it should be organized.
Data modeling
_____ webpages can be built with several programming tools: CGI, Java servlets, PHP, and ASP (Active Server Pages).
Dynamic
Multiple characters make up a record.
False
One of the most useful manipulations of object-oriented databases (ODBs) is the creation of a new table from two or more other tables.
False
The messages sent to access data in a database are called protocols.
False
_____ is the most common programming language for creating Web pages and other information viewable in a Web browser.
HTML
The protocol used to transfer and download Web information is _____.
HTTP
_____ is a secured protocol used for confidential transactions.
HTTPS
_____ determines the look and location of text, pictures, animations, and other elements on a Web page.
Hypertext Markup Language (HTML)
_____ transfers visitor inquiries from a busy server to a less busy server for identical information and services.
Load balancing
_____ helps the users know what they can find and analyze in the data warehouse.
Metadata
_____ is a cyberattack tactic used to trick Internet users into giving up personal information such as PINs and account numbers.
Phishing
_____ are entered to manipulate data, including adding, deleting, and updating data.
Queries
_____ has become the query language of choice for many developers of relational DBMSs.
SQL
Much of the extraction, transforming, and loading (ETL) activity involved in data transfer can be automated.
True
Object-oriented databases (ODBs) do not store records, but data objects, which is an advantage for quick updates of data sets and the relationships among them.
True
Technical support involves the quality of the equipment that the hosting company provides, security measures it maintains, the sophistication of server and load management, and the technical skills of its personnel.
True
The larger the data warehouse, the larger the storage capacity, the greater the memory, and the greater the processing power of the computers that are needed.
True
Third-party cookies can collect users' browsing and shopping habits across many websites.
True
As computers convert to operating systems that support _____, displaying different character sets should be less of a problem.
Unicode
_____ enables one server to be virtually split into many addressable servers, each for a different client and with its own domain name.
Virtual private server
Online databases that are used with web browsers _____.
are no different from other databases
The smallest piece of data is called a _____.
character
The purpose of _____ is to know the consumers better so the business can serve them better, while streamlining its marketing and sales operations
consumer profiling
A(n) _____ is a small file that a Web site places on a visitor's hard disk so that the Web site can remember something about the surfer later.
cookie
According to the _____ , all legal matters are confined to the country from which a site operates.
country-of-origin principle
Analyzing an organization's data and identifying the relationships among the data is called _____.
data modeling
Transactional data is copied into a_____, which is a separate data repository.
data warehouse
A ____ is the general logical structure in which records are stored within a database and the method used to establish relationships among the records
database model
Some companies might want to use entire physical servers all for themselves and therefore can opt for _____.
dedicated hosting
In the context of data management, _____ refers to all the occurrences sharing the same types of data.
entity
The conceptual blueprint of a database is called a(n) _____.
entity relationship diagram (ERD)
All countries welcome a policy of free access to information as a means to reaffirm their sovereignty.
false
An important element of online retailing is the absence of a selection facility similar to a brick-and-mortar store.
false
Consumers of the final goods and services are involved in B2B trading.
false
Cookies are always temporary; they are installed only for one session, and are removed when the user leaves the site.
false
Database fields are limited to holding text and numbers.
false
Domain names always start with www.
false
Few hosting firms provide subscribers with e-mail addresses.
false
From a technical point of view, online databases that are used with Web browsers are different from other databases.
false
Mirror servers run unique applications that are unavailable on any other server.
false
A(n) _____ is one piece of information about an entity, such as the last name or first name of a student, or the student's street address.
field
A collection of related records, such as all the records of a college's students, is called a(n) _____.
file
A repeated field that links records between two tables, is a primary key in one table, and a(n) _____ in the other field.
foreign key
Companies that sell online maintain large warehouses and pay for picking, packing, and shipping, three activities known as _____.
fulfillment
According to the European Union, people _____.
have the right to object to the processing of personal data
A challenge with traditional file storage is _____.
high data integrity
The most basic metric that can be measured at a site is the number of _____.
impressions
A(n) _____ is a network used only by the employees of an organization.
intranet
A(n) _____ is unique if the value (content) in that field appears only in one record.
key
In the _____ phase of transferring data from a transactional database to a data warehouse, the specialists transfer transformed files to the data warehouse.
loading
The _____ model uses the object-oriented approach to maintaining records.
object-oriented database
To _____ is to make a digital audio recording, usually of voice, and post the file on the Web so that people can download it and listen to it.
podcast
While blogging is publishing text and other visual material, _____ is publishing sound and video.
podcasting
A unique key can serve as a(n) ______.
primary key
A(n) _____ is the field by which records in a table are uniquely identified.
primary key
To link records from one table with records of another table, the tables must have at least one field in common, and that field must be a _____ field for one of the tables.
primary key
A(n) _____ creates a temporary table that is a subset of the original table or tables.
relational operation
The ability of websites to serve as prompt exchanges of information has supported another popular business model, the _____ or name-your-own-price auction.
reverse auction
When building a new database, users must first build a _____.
schema
The customer's ability to determine the timing and services of their needs from a business organization through a website is referred to as _____.
self-service
Software designed to trace and report your online behavior without your knowledge is called ______.
spyware
The relational database model consists of _____ which are used to contain records.
tables
On the Web, _____ includes identifying the sites your audience frequently visits.
targeting
Because of _____, a company's nationality is not always obvious.
their dispersed operations
The lack of a _____ in Big Data can make data collected from nontraditional sources a challenge to analyze.
traditional data structure
In the _____ phase of transferring data from a transactional database to a data warehouse, specialists "cleanse" the data and modify it into a form that allows insertion into the data warehouse.
transformation
In the _____ phase, specialists ensure that all data is consistent.
transformation
A challenge in integrating information systems is that the United States uses a 12-hour time notation with the addition of a.m. or p.m., while other parts of the world use a 24-hour notation.
true
A problem that arises with international information interchange is that countries treat trade secrets, patents, and copyrights differently.
true
File Transfer Protocol (FTP) is a common way of transmitting files from one computer to another.
true
In dedicated hosting the host dedicates a server to the client, and the client can fully control the content on the server's disks.
true
Inaccuracies affect data integrity.
true
Instant messaging (IM) offers users real-time online interactivity.
true
Similar to auctions among companies, some Web sites serve as auction hubs for individuals.
true
To retrieve records from a relational database, or to sort them, you must use a key.
true
Traditional retailers, often called brick-and-mortar businesses, have extended their "storefront" by launching an e-tailing arm.
true
In relational database, a record or row is called a _____.
tuple