well answered
Which part of a URL identifies the protocol? - correct answer ✔✔https
A service company that uses an enterprise information system will likely us a(n) ______. -
correct answer ✔✔CRM
A manufacturing company that uses an enterprise system will likely use a(n) _____. - correct
answer ✔✔ERP
T/F: The DBMS is used to create application business rules. - correct answer ✔✔False
Click-based advertising is one method that online businesses use to make money - correct
answer ✔✔true
T/F: A relational database can have a many-to-many relationship between entities - correct
answer ✔✔False
You are working on an excel spreadsheet and have discovered that your method of solving a
problem has created a circular reference. Excel has a solution to this problem. You need to use
_________. - correct answer ✔✔Goal Seek
When working on WiFi, what does the router or access point use to identify you? - correct
answer ✔✔Dynamic IP Address
, One method of keeping information secure when sent over the Internet or stored on a
computer is ________. - correct answer ✔✔Encryption
When you use the internet you run the risk of ______. - correct answer ✔✔Identity theft,
financial theft, extortion, and blackmail.
You are being asked to join an organization. You are told that the members are very friendly and
everyone has a great time at events the organization holds. You conclude that joining this
organization will help you raise your GPA. Of what bias are you possibly guilty? - correct answer
✔✔Insensitive to predictability
T/F: an ERP can have a CRM module - correct answer ✔✔true
T/F: the representative heuristic is one of the reasons that first impressions on meeting
someone are so important - correct answer ✔✔True
In excel to select several cells or ranges that are not touching each other you would ________
while selecting. - correct answer ✔✔Hold down the CTRL key
Every table has a primary key. When the primary key of one table is in another table it is called
an _______ key. - correct answer ✔✔Foreign
T/F: If a formula contains several nested functions, excel starts with the innermost function and
then moves outward - correct answer ✔✔False
T/F: People are the greatest threat to the security of a business's information - correct answer
✔✔True
How can you recognize a phishing email? - correct answer ✔✔It may have a link for you to click
to access a message.