Unit 2 exam
According to the textbook, _________ percent of Internet users in 2016 employed ad-blocking tools.
26%
LTE is ________ cellular technology.
4G
In a relational database, the customer record contains information regarding the customer's last name. The last name is a(n):
Attribute
_________ accounts for the majority of e-commerce transactions.
B2B
Alibaba started as a(n) _________ company.
Chinese
Organizations typically face issues related to e-tailing including:
Companies face issues in both of these areas.
In this type of e-commerce, buyers and sellers are individuals.
Consumer-to-consumer
eBay is an example of which type of e-commerce?
Consumer-to-consumer
In order to get feedback from customers, some companies make use of social computing tools providing feedback via blogs, wikis, online forums and social network sites. This is known as:
Conversational marketing
It is very difficult to manage data for which of the following reasons?
Data are scattered throughout organizations.
________ is an approach to managing information across an entire organization.
Data governance
Teespring primarily relies on ________ for advertising.
The only risk companies face when using social commerce is that customers may post negative feedback. T/F?
False
Data redundancy refers to:
Having copies of the same data in multiple locations
The adoption of ________ has been an important factor in the development of the Internet of Things.
IPv6
Organizations are using social computing in which of the following functions?
Marketing Customer relationship management Human resource management All of these****
Using your cell phone to purchase a Coke from a vending machine is an example of:
Micropayment
_________is a method for analyzing and reducing a relational database to its most streamlined form.
Normalization
_________ allows manufacturers to attach tags with antennas and computer chips on goods and then track their movement through radio signals.
RFID
________ transmission systems have signals that pass through walls but they are susceptible to snooping unless encrypted.
Radio
The technology that uses radio waves to identify individual items is:
Radio-frequency identification
Electronic business includes which of the following?
Servicing customers Collaborating with business partners Buying and selling Conducting electronic transactions within an organization All of these*********
Web 2.0 sites include:
Social interaction All of these***** User participation Collaboration
_________ is a system in which any object, natural or manmade, has a unique identity and is able to send and receive information over a network without human interaction.
The IoT
A filter bubble is a result of a search in which a website algorithm guesses what a user would like to see based on information about the user. T/F?
True
Social marketplaces act as online intermediaries that harness the power of social networks for introducing, buying, and selling products and services. T/F?
True
A wiki is _________.
a Web site on which anyone can post material and make changes to already posted material
In the ________ marketplace model, the reverse auction is typically used.
buy-side
When customers access a Web site and make purchases, they generate _________.
clickstream data
Ghostery is an ad blocker that ________.
collects data
The management of data across the entire organization is most accurately defined as:
data governance
The terms wireless and mobile are synonymous. T/F?
false
Customers using social commerce benefit from _____________.
faster responses from vendors
PrivacyBadger is an ad blocker that ________.
stops almost every ad and tracker
A standardized language used to manipulate data is _________.
structured query language
Google Project Fi customers can set up their phones as a mobile Wi-Fi router and allow their laptops or tablets to surf the Internet on their phone's data connection at no extra charge. This process is called wireless ________.
tethering
In a database, the primary key field is used to _________.
uniquely identify a record
Suppose you go through your neighborhood to figure out how many wireless networks are unsecure. This is __________.
war driving
Social ________ is the monitoring, collection, and analysis of socially generated data to make strategic decisions.
intelligence
A(n) _____ is a logical grouping of related fields.
record