IT 51-100 Word Scramble
|
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.
Normal Size Small Size show me how
Normal Size Small Size show me how
| Question | Answer |
| Executive information systems are starting to take advantage of ______________ intelligence to support strategic decision making, by stimulating human thinking and behavior | Artificial |
| Business process modeling or ____________ is the activity of creating a detailed flowchart or process of a work process that shows inputs, tasks, and activities in a structures sequence. | mapping |
| Which of the following terms could you use synonymously when referring to he Web? | HTML, Internet |
| What is the Internet protocol Web browsers use to request and display Web pages using universal resource locators? | Hypertext transport protocol (HTTp) |
| What allows user to access the WWW | web browser |
| Which of the following is a type of web browser | internet explorer and mozilla firefox |
| What is the depth and breadth of details contained in a piece of textual, graphic, audio, or video? | information richness |
| What is the difference between a business model and an ebusiness model? | A business model details how a company creates, delivers and generates revenue; an ebusiness model does all of the same except on the Internet |
| What are the four main types of ebusiness models? | business to business, business to consumer, consumer to business, and consumer to consumer |
| What is pure-play business? | A business that operates only on the internet without a physical store |
| All of the following are forms of ebusiness except | subscription fee |
| Which of the following represents the connecting and communicating tools supporting and driving ebusiness | email, instant messaging, podcasting, content management systems, and video and web conferencing |
| Which of the following represents the primary ebusiness revenue models | advertising fees, license fees, subscription fees, transacting fees, value added services fees. |
| What are the four challenges facing ebusiness outlined in the text | identifying limited market segments, managing consumer trust, ensuring consumer protection, and adhering to taxation rules. |
| What is the software whose source code is available free for any third party to review and modify? | Open source |
| What is the difference between asynchronous and synchronous communication | asynchronous is communication that does not occur at the same time; synchronous communication occurs at the same time. |
| What maps group contacts identifying who knows each other and who works together | social networking analysis |
| many social media websites use ______________ or specific keywords or phrases incorporated into website content for means of classification or taxonomy. | tags |
| Unlike traditional HTML, which of the following lets writers communicate and readers respond on a regular basis through a simple online journal | blog |
| What is the difference between a wiki and a blog | a wiki user can alter the original content of an article, where a blog user can only add information as a comment. |
| What is a website or web application that uses content from more than one source to create a completely new product or service? | mashup |
| An API is a set of routines, protocols, and tools for | building software applications |
| What does digital darwinism imply? | organization that cannot adapt to the new demands placed on them from surviving in the information age are doomed to extinction. |
| Through _________________ data companies can observe the exact pattern of a consumers navigation through a site | infrastructure |
| A ___________________ is an online marketing technique where a small file deposited on a hard drive by a website containing information about customers and their browsing activities | cookie |
| What is the difference between pirated and counterfeit software? | pirated is the unauthorized use, duplication, distribution, or sale of copyrighted software, where counterfeit is software that is manufactured to look like the real thing and sold as such |
| What is intangible creative work that is embodied in physicial form and includes copyrights, trademarks, and patents? | intellectual property |
| Which act protects investors by improving the accuracy and reliability of corporate disclosures? | Sarbanes-Oxley Act |
| What is unsolicited email that plaques employees at all levels and clogs email systems | spam |
| What type of internet monitoring technique records information about a customer during a web surfing session such as what websites were visited how long the visit was, what ads were viewed and what was purchased? | clickstream |
Created by:
btrflysue33