________ is a simulation model, often constructed using Excel, which calculates the relationships between many variables; users can change some variables to see how others are affected.
A) Goal-seeking analysis
B) What-if analysis
C) Market basket analysis
D) Data aggregation
Q. 2A substitute poses a greater threat when it ________.
A) operates in a different market in comparison with the focal product
B) has a similar nature to the focal product but operates in a different target market
C) provides the same focal product or service through different means
D) does not directly impact the profitability of another product or service
Q. 3A disadvantage of custom system development is that it involves high overall cost and requires more time before going live.
Indicate whether the statement is true or false
Q. 4________ occurs when a person breaks into computers, servers, or networks to steal data.
A) Phishing
B) Pretexting
C) Digital footprinting
D) Hacking
Q. 5Knowledge that is elusive in nature and encompasses insights, judgment, creative processes, and wisdom that come with long experience in a field, as well as many trials and errors is known as ________.
A) inert knowledge
B) tacit knowledge
C) explicit knowledge
D) metaknowledge
Q. 6During mergers, integration of multiple databases becomes a major challenge.
Indicate whether the statement is true or false
Q. 7What is location-based marketing?
What will be an ideal response?