Filters
Question type

Study Flashcards

Information mainly used for security purposes such as fingerprinting and retinal scans is known as


A) physical-world observations.
B) biological data.
C) private data.
D) public data.

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

One of the most common reasons firms make use of an extranet is to


A) prevent employees from using the Internet for private purposes on company time.
B) post information that can be accessed only by employees of the organization.
C) extend an organization's intranet to outside customers.
D) increase the speed at which employees can access information on the Internet.

E) C) and D)
F) None of the above

Correct Answer

verifed

verified

Redundancy is one of the four characteristics of useful information.

A) True
B) False

Correct Answer

verifed

verified

The use of antivirus software completely eliminates the risk of downloading infected files.

A) True
B) False

Correct Answer

verifed

verified

Most e-mail messages are automatically encrypted to protect them from being intercepted and read by hackers.

A) True
B) False

Correct Answer

verifed

verified

Scientists and engineers at Epic Electronics rely on the Internet to keep in touch with their peers at various universities and research organizations. In recent years these researchers have become frustrated because the increasing congestion on the Internet has disrupted their attempts to communicate and collaborate with colleagues at other institutions. Which of the following developments would be most likely to help Epic Electronics researchers overcome this problem?


A) set up an intranet
B) allow its scientists and engineers to telecommute
C) assign each employee a second e-mail address
D) gain access to Internet2

E) A) and D)
F) None of the above

Correct Answer

verifed

verified

An important advantage knowledge technology has over older versions of business technology is that it


A) delivers timely information directly to the people who need it.
B) is much cheaper to incorporate into most business operations.
C) allows businesses to locate anywhere and still reach their customers.
D) eliminates the need for businesses to store information electronically.

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

One of the problems with extranets is that they


A) are semiprivate, so it is possible for hackers to gain access to information on the system.
B) use an old technology that is not as fast at transferring data as the Internet.
C) cannot be accessed by people unless they are employees of the company.
D) have no ability to handle common e-mail protocols.

E) B) and C)
F) B) and D)

Correct Answer

verifed

verified

The software or hardware barrier that a business uses to prevent unauthorized users from gaining access to their intranet is known as a tripware.

A) True
B) False

Correct Answer

verifed

verified

________ looks for hidden patterns and unknown relationships among the data a firm has accumulated.


A) Tracking software
B) Econometric analysis
C) Data mining
D) Data parsing

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Enterprise portals have the ability to identify users and give them access to specific areas of an organization's intranet depending on their relationship to the organization.

A) True
B) False

Correct Answer

verifed

verified

A ________ is a small piece of software code a website downloads onto the hard drives of people who visit the site.


A) cookie
B) brownie
C) data marker
D) file portal

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

Over time, business technology has become much more sophisticated, but its basic application has remained to support the existing operations of businesses by providing key financial information.

A) True
B) False

Correct Answer

verifed

verified

Cloud computing is a form of virtualization in which a company's data and applications are stored onsite and accessed via an external hard drive.

A) True
B) False

Correct Answer

verifed

verified

One advantage of networked computers is that they offer much greater computer security than the older mainframe systems.

A) True
B) False

Correct Answer

verifed

verified

What are the four characteristics of useful information?

Correct Answer

verifed

verified

Useful information has the following cha...

View Answer

Information technology brings work to people instead of requiring people to go to work.

A) True
B) False

Correct Answer

verifed

verified

Doreen is overwhelmed by information overload. Unfortunately, in this day of technology, there is little she can do to control this problem.

A) True
B) False

Correct Answer

verifed

verified

In this age of technology, managers can easily become buried in information infoglut.

A) True
B) False

Correct Answer

verifed

verified

Bandwidth is the term used to describe the rate at which data flows through the Internet.

A) True
B) False

Correct Answer

verifed

verified

Showing 41 - 60 of 192

Related Exams

Show Answer