COMPLETE QUESTIONS AND CORRECT DETAILED
ANSWERS (VERIFIED ANSWERS) |ALREADY GRADED
A+||BRAND NEW VERSION!!
A manufacturing company that uses an enterprise system will likely use a(n)
_____. - CORRECT ANSWER- ERP
T/F: The DBMS is used to create application business rules. - CORRECT ANSWER- False
Click-based advertising is one method that online businesses use to make money -
CORRECT ANSWER- true
T/F: A relational database can have a many-to-many relationship between entities
- CORRECT ANSWER- False
Which part of a URL identifies the protocol? - CORRECT ANSWER- https
A service company that uses an enterprise information system will likely us a(n)
______. - CORRECT ANSWER- CRM
,You are working on an excel spreadsheet and have discovered that your method
of solving a problem has created a circular reference. Excel has a solution to this
problem. You need to use _________. - CORRECT ANSWER- Goal Seek
When working on WiFi, what does the router or access point use to identify you? -
CORRECT ANSWER- Dynamic IP Address
One method of keeping information secure when sent over the Internet or stored
on a computer is ________. - CORRECT ANSWER- Encryption
When you use the internet you run the risk of ______. - CORRECT ANSWER- Identity
theft, financial theft, extortion, and blackmail.
You are being asked to join an organization. You are told that the members are
very friendly and everyone has a great time at events the organization holds. You
conclude that joining this organization will help you raise your GPA. Of what bias
are you possibly guilty? - CORRECT ANSWER- Insensitive to predictability
T/F: an ERP can have a CRM module - CORRECT ANSWER- true
T/F: the representative heuristic is one of the reasons that first impressions on
meeting someone are so important - CORRECT ANSWER- True
In excel to select several cells or ranges that are not touching each other you
would ________ while selecting. - CORRECT ANSWER- Hold down the CTRL key
, Every table has a primary key. When the primary key of one table is in another
table it is called an _______ key. - CORRECT ANSWER- Foreign
T/F: If a formula contains several nested functions, excel starts with the innermost
function and then moves outward - CORRECT ANSWER- False
T/F: People are the greatest threat to the security of a business's information -
CORRECT ANSWER- True
How can you recognize a phishing email? - CORRECT ANSWER- It may have a link for you
to click to access a message.
A service company that uses an enterprise information system will likely use
a(n)________. - CORRECT ANSWER- CRM
T/F: Google and Facebook store a very large amount of information. They use a
relational database to store and manage this information. - CORRECT ANSWER- False
A retailer such as Walmart that uses an enterprise information system will likely
us a(n)______. - CORRECT ANSWER- SCM
Someone is quiet and appears aloof. You predict that they would not have a
successful career as a comedian. What bias would potentially invalidate your
prediction? - CORRECT ANSWER- Illusion of Validity