A(n) ________ system collects data from various key business processes and stores the data in a single, comprehensive data repository, usable by other parts of the business.
A) transaction
B) enterprise
C) automatic reporting
D) management information
E) knowledge management
Q. 2Which of the following is not an example of a computer used as a target of crime?
A) knowingly accessing a protected computer to commit fraud
B) sccessing a computer system without authority
C) illegally accessing stored electronic communication
D) threatening to cause damage to a protected computer
E) breaching the confidentiality of protected computerized data
Q. 3In 2010, the FTC added all of the following recommendations to its privacy guidelines except
A) firms should build products and services that protect privacy.
B) firms should increase the transparency of their data collection.
C) firms should require consumer consent and provide clear options to opt out of data collection.
D) firms should limit the length of time that any personal data is stored to six months or less.
E) consumers should be able to review and contest the accuracy and completeness of data.
Q. 4The vCard is a file format which is used to exchange business card information electronically.
Indicate whether the statement is true or false
Q. 5An agile method that focuses on frequent releases of workable software and short time boxes for development is known as ________.
A) Scrum programming
B) extreme programming
C) prototype modeling
D) incremental modeling
Q. 6Which of the following instructional technologies can be used only when the students and the instructor are in the same location at the same time?
A) computer labs
B) smartboards
C) whiteboards
D) webcasting