Unit 2 exam

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

According to the textbook, _________ percent of Internet users in 2016 employed ad-blocking tools.

26%

LTE is ________ cellular technology.

4G

In a relational database, the customer record contains information regarding the customer's last name. The last name is a(n):

Attribute

_________ accounts for the majority of e-commerce transactions.

B2B

Alibaba started as a(n) _________ company.

Chinese

Organizations typically face issues related to e-tailing including:

Companies face issues in both of these areas.

In this type of e-commerce, buyers and sellers are individuals.

Consumer-to-consumer

eBay is an example of which type of e-commerce?

Consumer-to-consumer

In order to get feedback from customers, some companies make use of social computing tools providing feedback via blogs, wikis, online forums and social network sites. This is known as:

Conversational marketing

It is very difficult to manage data for which of the following reasons?

Data are scattered throughout organizations.

________ is an approach to managing information across an entire organization.

Data governance

Teespring primarily relies on ________ for advertising.

Facebook

The only risk companies face when using social commerce is that customers may post negative feedback. T/F?

False

Data redundancy refers to:

Having copies of the same data in multiple locations

The adoption of ________ has been an important factor in the development of the Internet of Things.

IPv6

Organizations are using social computing in which of the following functions?

Marketing Customer relationship management Human resource management All of these****

Using your cell phone to purchase a Coke from a vending machine is an example of:

Micropayment

_________is a method for analyzing and reducing a relational database to its most streamlined form.

Normalization

_________ allows manufacturers to attach tags with antennas and computer chips on goods and then track their movement through radio signals.

RFID

________ transmission systems have signals that pass through walls but they are susceptible to snooping unless encrypted.

Radio

The technology that uses radio waves to identify individual items is:

Radio-frequency identification

Electronic business includes which of the following?

Servicing customers Collaborating with business partners Buying and selling Conducting electronic transactions within an organization All of these*********

Web 2.0 sites include:

Social interaction All of these***** User participation Collaboration

_________ is a system in which any object, natural or manmade, has a unique identity and is able to send and receive information over a network without human interaction.

The IoT

A filter bubble is a result of a search in which a website algorithm guesses what a user would like to see based on information about the user. T/F?

True

Social marketplaces act as online intermediaries that harness the power of social networks for introducing, buying, and selling products and services. T/F?

True

A wiki is _________.

a Web site on which anyone can post material and make changes to already posted material

In the ________ marketplace model, the reverse auction is typically used.

buy-side

When customers access a Web site and make purchases, they generate _________.

clickstream data

Ghostery is an ad blocker that ________.

collects data

The management of data across the entire organization is most accurately defined as:

data governance

The terms wireless and mobile are synonymous. T/F?

false

Customers using social commerce benefit from _____________.

faster responses from vendors

PrivacyBadger is an ad blocker that ________.

stops almost every ad and tracker

A standardized language used to manipulate data is _________.

structured query language

Google Project Fi customers can set up their phones as a mobile Wi-Fi router and allow their laptops or tablets to surf the Internet on their phone's data connection at no extra charge. This process is called wireless ________.

tethering

In a database, the primary key field is used to _________.

uniquely identify a record

Suppose you go through your neighborhood to figure out how many wireless networks are unsecure. This is __________.

war driving

Social ________ is the monitoring, collection, and analysis of socially generated data to make strategic decisions.

intelligence

A(n) _____ is a logical grouping of related fields.

record


Ensembles d'études connexes

1 Chemistry Chapter 13 Test Review

View Set

06 - الخزينة العمومية

View Set