Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

QUESTION 38 The marketing mix refers to which of the following? The variety of p

ID: 3841599 • Letter: Q

Question

QUESTION 38

The marketing mix refers to which of the following?

The variety of products you offer your customers

The types of customers that buy your products

The set of tools used to attract potential customers

The results from search engines about a product

QUESTION 39

Phishing is often used to steal identities online.

True

False

QUESTION 40

Benchmarking is used to improve an IT system performance.

True

False

QUESTION 41

What is an electronic representation of cash?

Digital cash

Electronic cash

E-cash

All of the above

QUESTION 42

What is an obstacle to IT integration?

People

Process

Technology

All the above

QUESTION 43

What is the collection, authentication, preservation, and examination of electronic information for presentation in court?

Slack space

Forensic image copy

MD5 hash value

Computer forensics

The variety of products you offer your customers

The types of customers that buy your products

The set of tools used to attract potential customers

The results from search engines about a product

Explanation / Answer

38.) The answer to this question is the third part i.eThe set of tools used to attract potential customers

because the marketing mix is the concept which refers to the combination of multiple factors which are oftenly controlled by a company for influencing the consumer to by it products or services.

39.) True.

It is because phishing is the social engineering practice which is used to steal the sensitive information required for the existence of the person in the virtual world.

For eg:- Take an example like I have an facebook account which I have been using to communicate with my long-distance friends or anyone I care about. Now, one day a phishing attack is done which makes me the victim of it and I mistakenly enter my login Id and Password of the Facebook account. The attacker now has my credentials and he signs in as me. So this is how phishing works and it's main reason is to steal the identity.

40.) True.

This is because benchmarking is the process of comparing one's business with the processes and performance metrics to the industry bests and practices from other companies.If the companies are the rivals of each other they need to have a benchmarking because it will help the organizations to improve the services provided by them to the customer and can compare the services with their rival companies.

41.)All Of The Above

Digital Cash also called as E-cash and Electronic Cash refers to a system in which a person or group of people feel secure to pay for goods or services electronically without any requirement of hard cash or paper money but it includes a major role of bank and it is necessary to involve a bank to follow on with the transaction.

42.)People

People are responsible for the IT Integration because most of the people recommend using the services of a particular company which leads to NO-INTEGRATION mode in the company.

43.)Forensic Image Copy

It is an exact copy or the snapshot of all stored information and it is the only information which can be presented in the court.

Hope it helps...