1/32
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
All of the following are leading social e-commerce platforms except:
Uber
TikTok
Uber
Which of the following is a milestone for the Phase 1: Planning phase of developing an e-commerce presence?
Website plan
Mobile media plan
Functional website
Web mission statement
Social media plan
Web mission statement
Amazon.com is known primarily for its use of which of the following business models?
Portal
Content provider
Transaction broker
Market creator
E-tailer
E-tailer
Removing the business process layers in a distribution channel is called:
market segmentation
BPR
disintermediation
network effects
market transparency
disintermediation
Geoadvertising sends ads to users based on their:
website behaviors
home addresses
Google Maps settings
GPS locations
shopping preferences
GPS locations
An ________ decision is one in which there is no well-understood or agreed-on procedure for making the decision.
semistructured
low-level
unstructured
undocumented
documented
unstructured
A(n) ________ table is a spreadsheet feature that displays two or more dimensions of data in a convenient format.
pivot
multitier
ad hoc
drill-down
sensitivity
pivot
Which of the following is not a major force driving the rapid evolution of AI?
The drastic increase in the cost of computer processing
E-commerce
The Internet of Things
Social media
The development of Big Data databases
The drastic increase in the cost of computer processing
Expert systems:
share characteristics with mainframe computing.
are a type of neural network.
use real-time data to guide their decisions.
are most useful for dealing with unstructured problems.
model knowledge based on a set of rules.
model knowledge based on a set of rules.
Which of the following statements about robotics is false?
Amazon's Robotic Fulfillment centers are operated entirely by robots.
Robots are programmed to perform a series of actions automatically.
The most widespread use of robotic technology has been in manufacturing and logistics.
Robotics are often used in dangerous environments.
Some people are concerned that robots will eliminate their job.
Amazon's Robotic Fulfillment centers are operated entirely by robots.
In a relational database, a table contains all of the following except:
entities.
records.
three-dimensional relations.
columns.
attributes.
three-dimensional relations.
The smallest unit of data a computer can handle is called a:
byte.
bit.
record.
field.
file.
bit
What is the purpose of referential integrity rules in a relational database?
They organize the data in a database in a hierarchy.
They ensure that the attributes for a particular entity apply only to that entity.
They minimize redundant data elements.
They ensure that relationships between coupled tables remain consistent.
They detect and correct data in the database that are incorrect.
They ensure that relationships between coupled tables remain consistent.
The physical view of a database:
shows the relationships between entities and attributes.
presents data as they would be perceived by end users.
presents an entry screen to the user.
allows the creation of supplementary reports.
shows how data are organized and structured on the storage media.
shows how data are organized and structured on the storage media.
The process of streamlining data to minimize redundancy and awkward many-to-many relationships is called:
data administration.
data scrubbing.
normalization.
data cleansing.
data management.
normalization
Which of the following is not a method for ensuring data quality?
Data governance
Data quality audit
Data optimization
Data cleansing
Data optimization
Which of the following business intelligence tools is most appropriate for casual users?
Data mart
Data lake
Analytic platform
Hadoop Distributed File System (HDFS)
Data mart
Which of the following is a DBMS tool to access and modify data in a relational database?
Data mining
Data definition language
Data dictionary
Data manipulation language
Data manipulation language
Which of the following is not true about a relational database?
Each table in a relational database must have a primary key
Having two entities with a many-to-many relationship is desirable.
A foreign key is a look-up field to find data about a specific entity.
Normalization streamlines groupings of data to eliminate many-to-many relationships.
Having two entities with a many-to-many relationship is desirable.
Which of the following statements about the types of decisions in an organization is true?
Unstructured decisions are those in which the decision maker must provide judgment, evaluation, and insight to solve the problem.
The decision to extend credit to a customer is an example of an unstructured decision.
Structured decisions are most common at the higher levels of management.
A semistructured decision has a clear-cut answer.
Unstructured decisions are those in which the decision maker must provide judgment, evaluation, and insight to solve the problem.
Which of the following statements about executive support systems (ESS) is not true?
ESS have significant drill-down capabilities.
Only executives use ESS.
Corporate data for contemporary ESS are supplied by a firm's existing enterprise applications.
ESS provide access to external data.
Only executives use ESS.
All of the following are forces driving the rapid evolution of AI during the last decade except:
fundamental conceptual breakthroughs in understanding how humans think.
the development of Big Data databases.
the drastic reduction in the cost of computer processing and the growth in the power of processors.
significant investment from businesses and governments.
That's incorrect. Try again.
Significant investment from businesses and governments has been a force driving the rapid evolution of AI.
fundamental conceptual breakthroughs in understanding how humans think.
Machine learning is a component of all of the following types of AI except:
natural language processing.
neural networks.
expert systems.
genetic algorithms.
expert systems.
The ability to integrate video, audio, and text messages into a single marketing message and consumer experience is an example of which unique feature of e-commerce technology?
Interactivity
Ubiquity
Richness
Information density
Richness
In addition to being viewed as an example of the service provider business model, on-demand services can also be viewed as being based on which of the following business models?
Portal
Transaction broker
Community provider
Market creator
Market creator
Which of the following social network features provides a stream of notifications from friends and advertisers that social users can find on their home pages?
Timeline
Newsfeed
Network notification
Social search
Newsfeed
Exchanges are:
independently owned third-party B2B e-commerce marketplaces that connect thousands of suppliers and buyers for spot purchasing.
industry-owned B2B e-commerce marketplaces that focus on long-term contract purchasing relationships.
private B2B networks that consist of a large firm using a secure website to link to its suppliers and other key business partners.
a proprietary system that enables the computer-to-computer exchange of standard transactions such as invoices, bills of lading, shipment schedules, or purchase orders between two organizations.
independently owned third-party B2B e-commerce marketplaces that connect thousands of suppliers and buyers for spot purchasing.
Which of the following is a not an example of a mobile payment app?
Zelle
Venmo
Waze
Apple Pay
Waze
Education, exposure, and branding are the primary activities of which type of e-commerce presence?
Offline media
Social media
Websites/apps
Offline media
Which of the following statements about why systems are vulnerable is true?
Wi-Fi networks are not susceptible to hacking.
Large public networks such as the Internet are less vulnerable than internal networks.
The potential for unauthorized access or damage to an information system can occur at many access points in a network.
Smartphones are not vulnerable to malicious software.
The potential for unauthorized access or damage to an information system can occur at many access points in a network.
All of the following are components of an effective electronically stored information (ESI) retention policy except:
ensuring that ESI is well-organized.
ensuring that ESI does not violate the information rights of users.
ensuring that ESI is accessible.
ensuring that ESI is neither retained too long nor discarded too soon.
ensuring that ESI does not violate the information rights of users.
An information systems audit examines all of the following except:
data quality.
the firm's overall security environment.
the controls governing individual information systems.
the firm's financial status.
the firm's financial status.
Which of the following is an example of two-factor authentication?
Bank card
Firewall
Network address translation
Password
Bank card