Filters
Question type

One advantage of networked computers is that they offer much greater computer security than the older mainframe systems.

A) True
B) False

Correct Answer

verifed

verified

____________ are raw, unanalyzed, and unorganized facts and figures.


A) Statistics
B) Ratios
C) Data
D) Criteria

E) A) and C)
F) A) and D)

Correct Answer

verifed

verified

A virtual private network allows information managers to simulate a real intranet in order to identify possible security problems and technical glitches before the company sets up the actual private network.

A) True
B) False

Correct Answer

verifed

verified

___________ technology uses cable modems, digital subscriber lines, fixed wireless, and satellites to provide users with significantly faster Internet connections than are provided by traditional 56k modems.


A) Widebeam
B) Least resistance
C) Analog
D) Broadband

E) None of the above
F) A) and D)

Correct Answer

verifed

verified

A major impact of information technology has been to:


A) encourage the growth of giant corporations.
B) create organizations that are independent of location.
C) reduce the demand for skilled labor.
D) increase overall costs of production.

E) A) and C)
F) A) and B)

Correct Answer

verifed

verified

________ is a form of virtualization in which a company's data and applications are stored offsite.


A) Data warehousing
B) Data mining
C) Cloud computing
D) Mobile softwaring

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

High-quality information is:


A) accurate and reliable.
B) normative and open ended.
C) simple and easy to use.
D) subjective and unique.

E) None of the above
F) B) and C)

Correct Answer

verifed

verified

Enterprise portals have the ability to identify users and give them access to specific areas of an organization's intranet depending on their relationship to the organization.

A) True
B) False

Correct Answer

verifed

verified

Information technology has changed the staffing and customer relations of businesses.

A) True
B) False

Correct Answer

verifed

verified

During the 1970s business technology employees often dealt directly with customers.

A) True
B) False

Correct Answer

verifed

verified

Major retail firms such as Walmart have used data mining to customize the product offerings for each store.

A) True
B) False

Correct Answer

verifed

verified

The advantages of cloud computing are security, possible instability, and data control.

A) True
B) False

Correct Answer

verifed

verified

Interactive intranet applications can save money and increase revenue by reducing paper handling and enabling faster decision making.

A) True
B) False

Correct Answer

verifed

verified

Katie Prescott's assistant just handed her a report that summarizes and organizes many raw facts and figures into a few key measures that will help her judge whether her department is meeting its key objectives. The summary measures included in the report are information, while the raw facts and figures used to compute these measures are data.

A) True
B) False

Correct Answer

verifed

verified

An important advantage knowledge technology has over older versions of business technology is that it:


A) delivers timely information directly to the people who need it.
B) is much cheaper to incorporate into most business operations.
C) allows businesses to locate anywhere and still reach their customers.
D) eliminates the need for businesses to store information electronically.

E) All of the above
F) A) and D)

Correct Answer

verifed

verified

The On-The-Green Golf Company currently has an intranet, and is considering making use of an extranet. One of the main reasons On-The-Green may want an extranet is to allow a select group of outside customers to have access to information on its intranet.

A) True
B) False

Correct Answer

verifed

verified

A key element of Internet2 is:


A) the requirement that all users log on to each site with a unique password.
B) the very-high-speed Backbone Network Service (vBNS) .
C) a new security system that eliminates the risk that unauthorized users will be able to access private information.
D) the high-speed Resource Allocation Prioritizer (hsRAP) .

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

The Internet has greatly slowed the spread of computer viruses by making it possible to share programs and files by downloading them from online sources rather than sharing diskettes.

A) True
B) False

Correct Answer

verifed

verified

Mick Connors works for the Critical Infrastructure Protection Board. One of the major challenges Mick is likely to face is to get CIOs at major corporations to provide the type of information he needs to help his board achieve its mission.

A) True
B) False

Correct Answer

verifed

verified

Subjectivity is one of the four characteristics of useful information.

A) True
B) False

Correct Answer

verifed

verified

Showing 161 - 180 of 189

Related Exams

Show Answer