ITE 120
A key Web site performance measure is _____.
all of the above
Data is stored inside of the computer in the form of 0's and 1's. This is referred to as:
Digital Form (or binary)
A popular documentation style for research papers, usually in the liberal arts. This style provides writers with a system for referencing their sources through parenthetical citation in their essays and Works Cited pages. This style is called:
MLA format
The URL is:
The address of a Web site
One of the functional units likely to benefit from use of a customer relationship management system is _____.
all of the aboe
A major challenge in the successful implementation of an ERP system is _____.
all of the above
Computers are considered to be powerful tools for information processing because of:
all of the above
Mobile coupons _____.
all of the above
When leaving a computer classroom or lab, you should:
all of the above
U.S. m-commerce sales for 2016 are expected to be in the neighborhood of _____.
$31 billion
One kilobyte (K or KB) equals approximately ____ memory locations
1,000
This sub category of malicious logic program pretends to be legitimate software or data. After you allow it to be installed on your computer, it does what it was really designed to do, such as destroy all your data.
trojan horse
When someone uses a computer and/or network without permission or for a purpose that is prohibited, this is referred to as:
unauthorized access and use
optical storage
A CD or DVD is an example of:
Programs such as Microsoft Word are classified as this category of software:
Application
The component inside of the computer that executes program instructions and performs calculations is the:
CPU (Central processing unit)
_____ is the direct sale of products or services by businesses to consumers through electronic storefronts.
E-tailing
______ were the first to take on the challenge of implementing ERP systems.
Large organizations
_____of Web site visitors leave a shopping site without making a purchase.
Over 95%
_____ software provides a means for managing all of the data associated with the product development, engineering design, production, support, and disposal of manufactured products.
Product lifecycle management
Programs and data are held in this hardware component when the machine is turned on. The CPU directly accesses programs and data that reside here. If the power is turned off, all contents are erased. This component is:
Random Access Memory
All of the following are advantages of networks except:
no static cling
A good practice is to ________________ data and information on a regular basis to guard against system failure or security breaches.
back up
With _____, business transactions are accumulated over a period of time for processing in a single unit.
batch processing
The process used by leading companies to complete a business process in the most efficient and effective manner are called _____.
best practices
_____ is a subset of e-commerce that involves electronic transactions between consumers and a third party to facilitate the process.
c2c
Authentication technologies are used by many organizations to _____.
confirm the identity of the user requesting access to information or assets
A(n) _____ is a single Web site that offers many products and services at one Internet location.
cybermall
_____ involves reentering data that was not typed or scanned correctly.
data manipulation
_____ involves updating one or more databases with new transactions.
data storage
The elimination of intermediate organizations between the producer and the consumer is called _____
disintermediation
The process of encoding information that is passed over the Internet to prevent others from seeing it is called:
encryption
This USB thumb drive, which has no moving parts, is an example of which kind of memory storage:
flash memory storage
Unlike standard hard drives that store information magnetically, ________ is the latest form of memory storage and contains no moving parts. Examples are solid state devices, memory cards, and USB thumb drives.
flash memory storage
Software that is copyrighted and is allowed to be used free of charge is called:
freeware
If a media work such as a photograph is not copyrighted due to the copyright expiring, the copyright holder giving up rights to it, or it was created by most agencies of the federal government, it is said to be:
in the public domain
A key feature on an enterprise resource planning system is that _____.
it employs a database of key operational and planning information that can be shared by all
It is estimated that the revenue generated by U.S. B2B e-commerce is _____ compared to B2C revenue.
nearly thirteen times larger
A collection of two or more computers or devices that are connected in some fashion and can communicate with one another is called a:
network
A(n) ____ is system software.
operating system
A(n) _____ card is issued to select employees to help streamline the traditional purchase order and invoice payment process.
p
An example of an output device would be a:
printer
Software that is not copyrighted and is available for anyone to use is termed:
public domain
A copyright holder has all of the following rights except:
right to fair use
The ultimate goal of an ERP system is to _____ .
satisfy customers
An example of an input device would be:
scanner
Software that may be used for a trial period and then paid for is termed:
shareware
The ______ is a credit card-sized device with an embedded microchip to provide memory and processing capability.
smart card
A media work such as a song that has been created since 1978 is copyrighted for how long?
the life of the songwriter/copyrightholder plus 70 years
The Internet can be generally characterized as:
the world's largest network