Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

26) The measurement of the number of customers who stop using or purchasing products or services from a company is called: A) switch rate. B)

26) The measurement of the number of customers who stop using or purchasing products or

services from a company is called:

A) switch rate.

B) turnover percentage.

C) churn rate.

D) switching costs.

E) CLTV.

27) Rich media advertisements are used to sell products and services online.

A) True

B) False

28) Disintermediation does not benefit the consumer.

A) True

B) False

29) All of the following are examples of "on demand" companies except:

A) Airbnb.

B) Instagram.

C) Lyft.

D) Uber.

E) Sidecar.

30) Which of the following is not an IT infrastructure service component?

A) operating system software

B) computing platforms to provide a coherent digital environment

C) physical facilities management to manage the facilities housing physical componentsD) IT management services to plan and develop the infrastructure and provide project management

E) IT education services that provide training to employees

31) The multitasking, multi-user, operating system developed by Bell Laboratories that

operates on a wide variety of computing platforms is

A) Unix.

B) Linux.

C) OS X.

D) COBOL.

E) DOS.

32) The development of TCP/IP occurred during the ________ era.

A) cloud and mobile computing

B) general-purpose mainframe and minicomputer

C) client/server era

D) personal computer

E) enterprise computing

33) A(n) ________ organizes data in two-dimensional tables.

A) non-relational DBMS

B) mobile DBMS

C) relational DBMS

D) hierarchical DBMS

E) object-oriented DBMS

34) Microsoft SQL Server is a(n)

A) DBMS for both desktops and mobile devices.

B) Internet DBMS.

C) desktop relational DBMS.

D) DBMS for midrange computers.

E) DBMS for mobile devices.

35) Which of the following statements about the Internet security is not true?

A) The use of P2P networks can expose a corporate computer to outsiders.

B) A corporate network without access to the Internet is more secure than one that provides

access.

C) VoIP is more secure than the switched voice network.

D) Instant messaging can provide hackers access to an otherwise secure network.

E) Smartphones have the same security weaknesses as other Internet devices.

36) ________ is malware that logs and transmits everything a user types.

A) Spyware

B) A Trojan horseC) A keylogger

D) A worm

E) A sniffer

37) Hackers create a botnet by

A) infecting Web search bots with malware.

B) using Web search bots to infect other computers.

C) causing other people's computers to become "zombie" PCs following a master computer.

D) infecting corporate servers with "zombie" Trojan horses that allow undetected access through

a back door.

E) pharming multiple computers.

38) A network of organizations and business processes for procuring raw materials,

transforming these materials into intermediate and finished products, and distributing the

finished products to customers is called a

A) distribution channel.

B) supply chain.

C) value chain.

D) marketing channel.

E) information system.

39) Components or parts of finished products are referred to as

A) upstream materials.

B) raw materials.

C) secondary products.

D) intermediate products.

E) mid-chain products.

40) A company's suppliers, supplier's suppliers, and the processes for managing

relationships with them is the

A) supplier's internal supply chain.

B) external supply chain.

C) upstream portion of the supply chain.

D) downstream portion of the supply chain.

E) on stream portion of the supply chain.

41) The fundamental set of assumptions, values, and ways of doing things that has been

accepted by most of a company's members is called its:

A) mission.

B) atmosphere.

C) environment.

D) business process.

E) culture.

42) Data collected at checkout counters in a grocery store is an example of:

A) feedback.B) input.

C) information systems.

D) processing.

E) output.

43) Which of the following would be used as an input for an information system?

A) Product ID, and price

B) Sales by region report

C) Sales for stores in a region

D) Marketing costs report for each product

E) Year to date sales of products

44) Non-typical business problems with causes and effects that are rapidly changing are

typically handled by which of the following types of information system?

A) DSS

B) TPS

C) MIS

D) KMS

E) ESS

45) If sales of your products declined in a specific region of the country, which of the

following types of system would best help you understand why?

A) DSS

B) TPS

C) CRM

D) MIS

E) ESS

46) Which type of system integrates supplier, manufacturer, distributor, and customer

logistics processes?

A) Enterprise planning system

B) Reverse logistics system

C) Collaborative distribution system

D) Transaction processing system

E) Supply chain management system

47) Which of the following statements about business processes is not true?

A) Business processes are a collection of standard operating procedures.

B) Business processes influence the relationship between an organization and information

technology.

C) A business firm is a collection of business processes.

D) Business processes are typically unaffected by changes in information systems.

E) Business processes are usually ensconced in an organization's culture.

48) Which of the following is a competitive force challenging the publishing industry?

A) Customers' bargaining powerB) Positioning and rivalry among competitors

C) Substitute products or services

D) Suppliers' bargaining power

E) Low cost of entry

49) The divergent viewpoints about how resources, rewards, and punishments should be

distributed, and the struggles resulting from these differences are known as organizational:

A) structure.

B) culture.

C) environments.

D) business processes.

E) politics.

50) Every record in a file should contain at least one key field.

A) True

B) False

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

MFDBS 89 2nd Symposium On Mathematical Fundamentals Of Database Systems Visegrad Hungary June 26 30 1989 Proceedings

Authors: Janos Demetrovics ,Bernhard Thalheim

1989th Edition

3540512519, 978-3540512516

Students also viewed these Databases questions