Filters
Question type

Study Flashcards

The cause of almost all instability in computer systems can be traced to poorly designed hardware.

A) True
B) False

Correct Answer

verifed

verified

Virtual private networks create secure connections over regular Internet lines.

A) True
B) False

Correct Answer

verifed

verified

Western University just obtained a link to Internet2. Researchers at Western intend to make very heavy use of their new link for various forms of collaboration, for videoconferencing and for running complex simulations. Unlike the regular Internet, the more bandwidth Western's researchers use on Internet2, the more the university will have to pay.

A) True
B) False

Correct Answer

verifed

verified

The advantages of cloud computing are security, possible instability, and data control.

A) True
B) False

Correct Answer

verifed

verified

Major retail firms such as Walmart have used data mining to customize the product offerings for each store.

A) True
B) False

Correct Answer

verifed

verified

When spyware is inadvertently downloaded to a user's computer the software tracks the user's online behavior. Spyware is installed without the user's knowledge and can infect the computer with a virus.

A) True
B) False

Correct Answer

verifed

verified

The main reason a firm would establish a firewall for its intranet is that it wants to


A) prevent outsiders from being able to access information on its network.
B) protect itself against loss of data in the event of a fire, flood, or other catastrophe.
C) create an interface to hook into Internet2 using firewire connections.
D) prevent employees from gaining access to the Internet for personal use.

E) All of the above
F) None of the above

Correct Answer

verifed

verified

During the 1970s, the purpose of data processing was to support the existing business by improving the flow of financial information.

A) True
B) False

Correct Answer

verifed

verified

A(n) ________ is a private data network that creates secure connections over regular Internet lines.


A) extranet
B) secured common linkage network
C) virtual private network
D) monitored network system

E) All of the above
F) B) and D)

Correct Answer

verifed

verified

A firm would use data mining if it wanted to


A) store copies of crucial data in several different locations to protect against its loss during disasters such as earthquakes, floods, or terrorist attacks.
B) protect its data from unauthorized outsiders.
C) increase the rate at which information flows through a firm's intranet.
D) discover hidden relationships among the data it accumulates.

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

The primary role of business technology during the 1970s was to


A) empower workers by giving them access to ever-greater amounts of information.
B) implement new production methods that relied on automated equipment.
C) protect proprietary company information from outsiders.
D) support existing business by improving the flow of financial information.

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

________ is raw, unanalyzed, and unorganized facts and figures.


A) Statistics
B) Ratios
C) Data
D) Criteria

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

The most productive way for firms to use intranets is to publish information that can be accessed by all employees within an organization.

A) True
B) False

Correct Answer

verifed

verified

Gary has been using Dropbox. The cloud he is storing his information to is called a


A) private cloud.
B) public cloud.
C) hybrid cloud.
D) analytical cloud.

E) A) and C)
F) A) and B)

Correct Answer

verifed

verified

________ looks for hidden patterns and unknown relationships among the data a firm has accumulated.


A) Tracking software
B) Econometric analysis
C) Data mining
D) Data parsing

E) B) and D)
F) A) and D)

Correct Answer

verifed

verified

A firm would consider establishing a virtual private network if it wanted to


A) prevent people who are not employees from being able to access its network.
B) set up a secure network connection with another firm for a short period of time.
C) obtain a broadband connection to the Internet.
D) simulate a network before it became operational in order to identify any security leaks.

E) B) and C)
F) All of the above

Correct Answer

verifed

verified

In the coming years, successful information management will be more concerned with achieving and maintaining stability and predictability, and less concerned with adapting to change.

A) True
B) False

Correct Answer

verifed

verified

The ________ was created as a part of the Office of Homeland Security and given the responsibility to devise a plan for improving the security of America's critical infrastructure.


A) Homeland Security Board
B) Critical Infrastructure Protection Board
C) Electronic Communications Security Commission
D) Committee on Infrastructure Security Procedures

E) A) and D)
F) B) and C)

Correct Answer

verifed

verified

________ technology uses a continuous Internet connection that allows users to send and receive mammoth files that include voice, video, and data much faster than ever before.


A) Widebeam
B) Least resistance
C) Analog
D) Broadband

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

The Critical Infrastructure Protection Board was established after the terrorist attacks of September 11, 2001, as part of the Office of Homeland Security.

A) True
B) False

Correct Answer

verifed

verified

Showing 21 - 40 of 192

Related Exams

Show Answer