Filters
Question type

Study Flashcards

An) _______ is someone who breaks into a computer system for illegal purposes.


A) network crasher
B) drive jockey
C) arbitrageur
D) hacker

E) None of the above
F) All of the above

Correct Answer

verifed

verified

Jason Hart was recently informed by his bank that someone illegally broke into the bank's computer system and gained access to information about customer account numbers and ATM access codes.The bank is recommending that Jason and other customers change their account numbers and access numbers for security reasons.The bank and Jason are victims of a:


A) net crasher.
B) software pirate.
C) slammer.
D) hacker.

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

One advantage of networked computers is that they offer much greater computer security than the older mainframe systems.

A) True
B) False

Correct Answer

verifed

verified

Application service providers have met with a great deal of success in recent years as more and more firms have decided to rent software rather than buy it.

A) True
B) False

Correct Answer

verifed

verified

Perry Black has convinced top management at his company that they can use data mining techniques to develop new marketing strategies.One of the keys to the success of Perry's suggestion is:


A) obtaining a powerful mainframe computer that can perform sophisticated statistical analysis on huge amounts of data.
B) converting all data into a quantitative format so that it can be easily manipulated.
C) outsourcing all IT functions to an outside expert that can look at the data with "fresh eyes."
D) finding a way to access and integrate information from all of the different departments and divisions within the organization.

E) A) and B)
F) All of the above

Correct Answer

verifed

verified

Regina Williams works for Findabuck Finance Company,but she seldom sees the inside of Findabuck's offices.Instead,she does most of her work on a computer located in the spare bedroom of her home.The computer is linked to Findabuck's office,so her work is distributed as quickly and efficiently as if she were at the office.Regina is one of the increasing number of workers who:


A) has become an independent contractor.
B) telecommutes.
C) compu-commutes.
D) uses linked-access shareware.

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

__________ is copyrighted software that is distributed to potential customers free of charge.However,customers are expected to pay the developer a fee if they decide to use it.


A) Public domain software
B) Groupware
C) Shareware
D) A software suite

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

Data mining would be most helpful to a manager that wants to:


A) find the most efficient way to reduce the amount of data collected.
B) restrict access to the company's data to a few key analysts.
C) store data in a more secure location.
D) discover unexpected relationships among the data stored by his or her organization.

E) A) and C)
F) B) and C)

Correct Answer

verifed

verified

________ is another name for freeware software.


A) Groupware
B) Shareware
C) Public domain software
D) Generic software

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

In the coming years,successful information management will be more concerned with achieving and maintaining stability and predictability,and less concerned with adapting to change.

A) True
B) False

Correct Answer

verifed

verified

For the past several years,scientists and engineers at Equatech,Inc.have relied on the Internet to keep in touch with their peers at various universities and research organizations.In recent years these researchers have become frustrated because the increasing congestion on the Internet has disrupted their attempts to communicate and collaborate with colleagues at other institutions.Which of the following developments would be most likely to help Equatech's researchers overcome this problem? Equatech should:


A) set up an intranet.
B) allow its scientists and engineers to telecommute.
C) assign each employee a second e-mail address.
D) gain access to Internet2.

E) C) and D)
F) A) and D)

Correct Answer

verifed

verified

The reluctance of CIOs to trust their organization's critical data to a firm that does not have a track record helps explain why:


A) many managers suffer from infoglut.
B) they prefer extranets rather than intranets.
C) Internet2 is unlikely to meet with widespread acceptance.
D) many ASPs failed after the Web boom cooled off.

E) B) and C)
F) C) and D)

Correct Answer

verifed

verified

Lee Ann Beane works in the finance department of a major corporation.When Lee Ann wants to do some complex financial computations,she can use the personal computer that sits on her desk.However,the actual data she needs is stored on a server.This suggests that Lee Ann's company uses an) :


A) innernet system.
B) mainframe computer system.
C) thin-client network.
D) network computing system.

E) B) and C)
F) C) and D)

Correct Answer

verifed

verified

When purchasing a computer system,the best approach is to select the hardware first,then purchase software that will function effectively on that type of hardware.

A) True
B) False

Correct Answer

verifed

verified

Lernital University is connected to Internet2,and several professors in its school of engineering are engaged in a research project that makes extremely heavy use of the bandwidth this connection provides.In fact,the engineering professors would like to get even more bandwidth.Given the way its designers set up Internet2,the researchers at Lernital:


A) are out of luck.One drawback of Internet2 is that,unlike the regular Internet,the technology of Internet2 can allocate only a fixed amount of bandwidth to each user.
B) may be able to obtain more bandwidth,but only if the university is willing to pay for it.
C) must petition the Internet2 Usage Committee and obtain approval.
D) can install a simple bandwidth amplification card in each computer that compresses data,thus allowing it to flow more rapidly.

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Jamie Mueller has just begun working for Quotech,Inc.Her job requires her to perform a variety of bookkeeping and clerical tasks at a workstation.Quotech has training software on its workstations that can answer many of the questions Jamie has about what to do on her new job,and how to do it.The software is so good that she seldom has to ask her supervisor for help.It even tracks the way Jamie performs certain tasks,and offers suggestions to improve her productivity.This software is an example of:


A) the use of a technique called computer aided production CAP) that is becoming increasingly important in high tech industries.
B) the trend toward telecommuting.
C) the way businesses are using knowledge technology to move relevant information to the people who need it.
D) why mainframe computer systems are more efficient than network computer systems.

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

In older computer network systems,a central computer performed all of the computational tasks and sent the results to dumb terminals that could not perform the tasks themselves.

A) True
B) False

Correct Answer

verifed

verified

The On-The-Green Golf Company currently has an intranet,and is considering making use of an extranet.One of the main reasons On-The-Green may want an extranet is to allow a select group of outside customers to have access to information on its intranet.

A) True
B) False

Correct Answer

verifed

verified

Your Internet shopping trail provides information that indicates your personal preferences.

A) True
B) False

Correct Answer

verifed

verified

Enterprise portals are simply web pages with links to company-specific products and services.

A) True
B) False

Correct Answer

verifed

verified

Showing 41 - 60 of 224

Related Exams

Show Answer