Filters
Question type

Study Flashcards

A company can use a(n) ________ to prevent unauthorized outsiders from accessing information on its intranet.


A) firewall
B) disconnector
C) entry sentry
D) tripwire

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

The increasing use of computer networks has made computer security more complicated.

A) True
B) False

Correct Answer

verifed

verified

Scientists and engineers at Epic Electronics rely on the Internet to keep in touch with their peers at various universities and research organizations. In recent years these researchers have become frustrated because the increasing congestion on the Internet has disrupted their attempts to communicate and collaborate with colleagues at other institutions. Which of the following developments would be most likely to help Epic Electronics researchers overcome this problem?


A) set up an intranet
B) allow its scientists and engineers to telecommute
C) assign each employee a second e-mail address
D) gain access to Internet2

E) B) and C)
F) C) and D)

Correct Answer

verifed

verified

________ is a form of virtualization in which a company's data and applications are stored offsite.


A) Data warehousing
B) Data mining
C) Cloud computing
D) Mobile softwaring

E) C) and D)
F) B) and D)

Correct Answer

verifed

verified

Cy is excited about the ability of customers to obtain access to information on Epic's network so that the company can provide them with better service. This suggests that Epic's is making use of a(n)


A) shareware arrangement.
B) integrated network.
C) mainframe system.
D) extranet.

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Fran is shopping online for jeans and she clicks on a style she likes. The site quickly presents her with a close-up view and additional information that will help her make a decision. When she adds the jeans to her shopping bag, the website quickly shows her that other customers that purchased the same pair of jeans also purchased a particular shirt and boots. As the retailer's website learns more about Fran and her purchase preferences, it is able to push other ideas toward her, and potentially increase the online retailer's units per transaction. The technology that generates this type of intelligence and personalization is called


A) social media.
B) cookie mining.
C) Web 2.0.
D) Web 3.0.

E) None of the above
F) B) and D)

Correct Answer

verifed

verified

Virtual networking is a process that allows software-based networked computers to run multiple operating systems and programs.

A) True
B) False

Correct Answer

verifed

verified

The ability of the Critical Infrastructure Protection Board to achieve its mission depends crucially on


A) convincing corporations to adopt the more secure Internet2 technology.
B) finding ways to create artificially intelligent monitors of electronic communications.
C) convincing information managers in the private sector to report problems such as hacker attacks and viruses to the government.
D) developing a new wireless technology that provides better data encryption.

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

Most successful businesses utilize social media to communicate with customers. An important strategy for consideration is: Successfully implementing social media will


A) provide a well-defined purpose for the customer.
B) mostly serve as an outlet for sales promotion, for example, the distribution of coupons and deals.
C) provide one-way communication: from the business to the customer.
D) be socially conscious; it will inform customers of the social changes that surround them.

E) C) and D)
F) A) and B)

Correct Answer

verifed

verified

A local university, connected to Internet2, employs several professors in its school of engineering that are part of a research project that makes extremely heavy use of the bandwidth this connection provides. In fact, the engineering professors would like to get even more bandwidth. Given the way its designers set up Internet2, the researchers at the university


A) are out of luck. One drawback of Internet2 is that, unlike the regular Internet, the technology of Internet2 can allocate only a fixed amount of bandwidth to each user.
B) may be able to obtain more bandwidth, but only if the university is willing to pay for it.
C) must petition the Internet2 Usage Committee and obtain approval.
D) can install a simple bandwidth amplification card in each computer that compresses data, thus allowing it to flow more rapidly.

E) C) and D)
F) B) and C)

Correct Answer

verifed

verified

If a business wanted to gather up-to-the-minute data on its customers, one way to do that would be


A) database management.
B) data mining.
C) social media.
D) physical-world observations.

E) A) and C)
F) All of the above

Correct Answer

verifed

verified

Gretchen works for Securitas Financial Group, but she seldom sees the inside of the offices. Instead, she does most of her work in a home office she put together in a spare bedroom. Her computer is linked to Securitas's office, so her work is distributed as quickly and efficiently as if she were at the office. Gretchen is one of the increasing number of workers who


A) have become independent contractors.
B) telecommute.
C) compucommute.
D) use linked-access shareware.

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

________ is information charged with enough intelligence to make it relevant and useful.


A) Knowledge
B) Data
C) An hypothesis
D) A theory

E) None of the above
F) A) and D)

Correct Answer

verifed

verified

When it comes to computers and information technology, government and corporate security officials are now most worried about


A) credit card fraud.
B) online theft.
C) cyberterrorism.
D) counterfeiting.

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

During the 1980s business technology became known as


A) data processing.
B) knowledge management.
C) information systems.
D) personal computing.

E) None of the above
F) B) and D)

Correct Answer

verifed

verified

Two of the characteristics of useful information are


A) relevance and timeliness.
B) redundancy and simplicity.
C) clarity and confidentiality.
D) flexibility and durability.

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Some advantages of cloud computing include flexible capacity and easier access.

A) True
B) False

Correct Answer

verifed

verified

What is the key difference between an intranet and an extranet? Why might a firm use a virtual private network instead of an extranet?

Correct Answer

verifed

verified

An intranet is a companywide network, cl...

View Answer

The Internet has greatly slowed the spread of computer viruses by making it possible to share programs and files by downloading them from online sources rather than sharing diskettes.

A) True
B) False

Correct Answer

verifed

verified

The extranet is the next stage in the evolution of the Internet, consisting of a revolutionary new fiber optic technology that will enable computer users throughout the world to send and receive data up to 256 times faster than they can using the technology of the early 2010s.

A) True
B) False

Correct Answer

verifed

verified

Showing 141 - 160 of 192

Related Exams

Show Answer