Filters
Question type

Study Flashcards

A company that wanted to provide a single, unified entry point to its network that would allow different types of users access to different types of resources could do so by establishing a(n)


A) enterprise portal.
B) broadband interface.
C) intranet.
D) mainframe network.

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

The amount of information managers receive each day


A) is never enough; when it comes to managerial decision making, there is no such thing as too much information.
B) has been managed much more efficiently in recent years, largely due to the development of spreadsheets.
C) has remained remarkably stable over the years.
D) has become so great that it now threatens to bury many decision makers in infoglut.

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

Many businesses choose to open their intranets to other selected organizations through the use of


A) crossnets.
B) alternets.
C) outernets.
D) extranets.

E) All of the above
F) A) and C)

Correct Answer

verifed

verified

Computer technology has become so stable and mature in recent years that, except for problems caused by viruses and hackers, major glitches are essentially a thing of the past.

A) True
B) False

Correct Answer

verifed

verified

A computer virus is a piece of programming code that is inserted into other programming code with the intention of causing some unexpected, and usually undesirable, event for the user of the software.

A) True
B) False

Correct Answer

verifed

verified

An intranet is a companywide network that is based on Internet-type technology, but closed to public access.

A) True
B) False

Correct Answer

verifed

verified

Homegrown Design, a company that publishes home design software, wants to set up a temporary link with another firm to collaborate and share data on a short-term basis. Homegrown wants to keep the cost of setting up this connection reasonable, but is concerned about hackers and wants to make sure its link is secure. The best way for Homegrown to achieve its goal is to set up an extranet with dedicated lines.

A) True
B) False

Correct Answer

verifed

verified

A(n) ________ is someone who breaks into a computer system for illegal purposes.


A) network crasher
B) drive jockey
C) arbitrageur
D) hacker

E) None of the above
F) B) and C)

Correct Answer

verifed

verified

A(n) ________ serves as an entry point to a variety of resources on an organization's information network.


A) personal information manager
B) e-transfer page
C) enterprise portal
D) subscription web page

E) B) and C)
F) None of the above

Correct Answer

verifed

verified

One problem with most extranets is that they use public lines, which makes it possible for hackers to get into the network.

A) True
B) False

Correct Answer

verifed

verified

Beginning with the late 1980s the goal of information technology was to


A) improve the flow of financial information throughout business organizations.
B) use new technologies to offer new methods of conducting business.
C) prevent proprietary information from falling into the hands of competitors.
D) use new technologies to improve old methods.

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Because cloud computing is often too expensive for small businesses, it is rarely used.

A) True
B) False

Correct Answer

verifed

verified

Which of the following observations would be the strongest evidence that Marshall Manufacturing has adopted knowledge technology?


A) Marshall's customers can place orders for its products directly from the company's Internet website.
B) Marshall has installed software that searches a variety of databases online for information relevant to each employee's current assignment, and sends the information to the appropriate employee's e-mail address.
C) Marshall has provided all of its employees with a personal computer.
D) Marshall has initiated a program that allows each employee to sign up for advanced training in the use of spreadsheets, word processors, graphics programs, and other types of software.

E) C) and D)
F) A) and D)

Correct Answer

verifed

verified

A major impact of information technology has been to


A) encourage the growth of giant corporations.
B) create organizations that are independent of location.
C) reduce the demand for skilled labor.
D) increase overall costs of production.

E) A) and B)
F) C) and D)

Correct Answer

verifed

verified

Today the primary concern of corporate and government security officials concerning electronic communication is in the area of cyberterrorism.

A) True
B) False

Correct Answer

verifed

verified

Websites often send cookies to a user's computer that are saved on the computer's hard drive.

A) True
B) False

Correct Answer

verifed

verified

When Cy first came to work for Epic Electronics, the application of business technology was called


A) data processing.
B) knowledge technology.
C) information systems.
D) backroom computing.

E) A) and B)
F) C) and D)

Correct Answer

verifed

verified

A virtual private network allows information managers to simulate a real intranet in order to identify possible security problems and technical glitches before the company sets up the actual private network.

A) True
B) False

Correct Answer

verifed

verified

Internal networking shares the resources of all computers with each networked computer.

A) True
B) False

Correct Answer

verifed

verified

The first step a manager should take to cope with information overload is to


A) obtain a good database management system and use it to organize information more efficiently.
B) hire a qualified information systems analyst.
C) identify four or five key goals, and eliminate information that is not related to those goals.
D) purchase more sophisticated hardware that can process and store information more efficiently.

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

Showing 61 - 80 of 192

Related Exams

Show Answer