Filters
Question type

Study Flashcards

Instability in technology


A) used to be a major problem, but such problems now are largely a thing of the past.
B) still exists, but could be easily eliminated if firms would upgrade to newer equipment and software.
C) remains a serious problem that is caused by a variety of factors.
D) still exists, but its impact on business is greatly exaggerated by the media.

E) All of the above
F) C) and D)

Correct Answer

verifed

verified

The main reason a firm would establish a firewall for its intranet is that it wants to


A) prevent outsiders from being able to access information on its network.
B) protect itself against loss of data in the event of a fire, flood, or other catastrophe.
C) create an interface to hook into Internet2 using firewire connections.
D) prevent employees from gaining access to the Internet for personal use.

E) A) and B)
F) All of the above

Correct Answer

verifed

verified

A

The experiences of the past several decades show that, while improvements in technology frequently enhance the efficiency of basic business operations, such improvements never actually change the fundamental way that businesses operate.

A) True
B) False

Correct Answer

verifed

verified

A basic truth in management is that you can never have too much information.

A) True
B) False

Correct Answer

verifed

verified

Enterprise portals are simply web pages with links to company-specific products and services.

A) True
B) False

Correct Answer

verifed

verified

There are sites online that provide users with easy access to personal information about other people.

A) True
B) False

Correct Answer

verifed

verified

A company that wanted to provide a single, unified entry point to its network that would allow different types of users access to different types of resources could do so by establishing a(n)


A) enterprise portal.
B) broadband interface.
C) intranet.
D) mainframe network.

E) All of the above
F) B) and D)

Correct Answer

verifed

verified

A computer virus is a piece of programming code that is inserted into other programming code with the intention of causing some unexpected, and usually undesirable, event for the user of the software.

A) True
B) False

Correct Answer

verifed

verified

Gretchen works for Securitas Financial Group, but she seldom sees the inside of the offices. Instead, she does most of her work in a home office she put together in a spare bedroom. Her computer is linked to Securitas's office, so her work is distributed as quickly and efficiently as if she were at the office. Gretchen is one of the increasing number of workers who


A) have become independent contractors.
B) telecommute.
C) compucommute.
D) use linked-access shareware.

E) C) and D)
F) A) and B)

Correct Answer

verifed

verified

The first step in avoiding information overload is to identify four or five key goals and focus only on information that is related to those goals.

A) True
B) False

Correct Answer

verifed

verified

Your online shopping trail provides information that indicates your personal preferences.

A) True
B) False

Correct Answer

verifed

verified

As businesses began using business intelligence, managers spent less time finding information and more time using it to make decisions.

A) True
B) False

Correct Answer

verifed

verified

When it comes to computers and information technology, government and corporate security officials are now most worried about


A) credit card fraud.
B) online theft.
C) cyberterrorism.
D) counterfeiting.

E) A) and D)
F) C) and D)

Correct Answer

verifed

verified

Business intelligence (BI) changes the traditional flow of information so that the database goes to the individual rather than the individual going to the database.

A) True
B) False

Correct Answer

verifed

verified

True

A key element of Internet2 is


A) the requirement that all users log on to each site with a unique password.
B) the very-high-speed backbone network service (vBNS) .
C) a new security system that eliminates the risk that unauthorized users will be able to access private information.
D) the high-speed resource allocation prioritizer (hsRAP) .

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

Internal networking shares the resources of all computers with each networked computer.

A) True
B) False

Correct Answer

verifed

verified

Jeff's bank recently contacted him to tell him someone illegally accessed the bank's computer system and gained access to information about customer account numbers and PIN numbers. The bank is recommending Jeff and other customers change their account numbers and access numbers for security reasons. The bank and Jeff are victims of a


A) net crasher.
B) software pirate.
C) slammer.
D) hacker.

E) None of the above
F) B) and C)

Correct Answer

verifed

verified

D

Information managers at Epic Electronics want to provide a single, seamless interface that will make it easier for customers, suppliers, and employees to gain access to the parts of its intranet that they need. Epic could achieve this result by setting up an enterprise portal.

A) True
B) False

Correct Answer

verifed

verified

Major retail firms such as Walmart have used data mining to customize the product offerings for each store.

A) True
B) False

Correct Answer

verifed

verified

The fact that electronic data interchange technology is so expensive that only large firms can afford to use it puts small firms at a severe disadvantage when it comes to sharing information.

A) True
B) False

Correct Answer

verifed

verified

Showing 1 - 20 of 192

Related Exams

Show Answer