Which type of software would a company use to view the physical world with computer-generated layers of information added to it?
A hospital has implemented several new software systems and has chosen to implement ITIL to maintain and continually improve services. Which need influenced the hospital's decision to implement ITIL?
An attacker uses a guest account to exploit a weakness that enables the attacker to change access rights and alter user account information. Which type of attack is described?
A company no longer wants to sell one product to as many customers as possible. Now they want to sell one customer as many products as possible. Which type of software gathers and analyzes customer information to tailor this marketing campaign?
Which term describes an iterative design approach that builds a model of a system to ensure it meets user and business requirements?
A team tests a prototype prior to meeting with a company's client and discovers the "My Account" menu is not working. The team revises the code and presents a functioning prototype to the client.
Which advantage of prototyping does this describe?
An inventory manager is using a company's customer relationship management (CRM) system to determine how much inventory to pre-order for an upcoming sales promotion.
Which phase of CRM does this describe?
Which protocol provides for the collection, organization, and modification of information about managed devices on IP networks?
Which two benefits does RFID tagging offer for supply chain management? Choose 2 answers.
Which system serves as an organization's backbone in providing fundamental decision-making support?
Which basic business system serves operational level analysts in an organization?
Which IT ethics policy discloses some or all of the ways an organization gathers, uses, discloses, and manages customer or client data?