A) firewall
B) disconnector
C) entry sentry
D) tripwire
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) set up an intranet
B) allow its scientists and engineers to telecommute
C) assign each employee a second e-mail address
D) gain access to Internet2
Correct Answer
verified
Multiple Choice
A) Data warehousing
B) Data mining
C) Cloud computing
D) Mobile softwaring
Correct Answer
verified
Multiple Choice
A) shareware arrangement.
B) integrated network.
C) mainframe system.
D) extranet.
Correct Answer
verified
Multiple Choice
A) social media.
B) cookie mining.
C) Web 2.0.
D) Web 3.0.
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) convincing corporations to adopt the more secure Internet2 technology.
B) finding ways to create artificially intelligent monitors of electronic communications.
C) convincing information managers in the private sector to report problems such as hacker attacks and viruses to the government.
D) developing a new wireless technology that provides better data encryption.
Correct Answer
verified
Multiple Choice
A) provide a well-defined purpose for the customer.
B) mostly serve as an outlet for sales promotion, for example, the distribution of coupons and deals.
C) provide one-way communication: from the business to the customer.
D) be socially conscious; it will inform customers of the social changes that surround them.
Correct Answer
verified
Multiple Choice
A) are out of luck. One drawback of Internet2 is that, unlike the regular Internet, the technology of Internet2 can allocate only a fixed amount of bandwidth to each user.
B) may be able to obtain more bandwidth, but only if the university is willing to pay for it.
C) must petition the Internet2 Usage Committee and obtain approval.
D) can install a simple bandwidth amplification card in each computer that compresses data, thus allowing it to flow more rapidly.
Correct Answer
verified
Multiple Choice
A) database management.
B) data mining.
C) social media.
D) physical-world observations.
Correct Answer
verified
Multiple Choice
A) have become independent contractors.
B) telecommute.
C) compucommute.
D) use linked-access shareware.
Correct Answer
verified
Multiple Choice
A) Knowledge
B) Data
C) An hypothesis
D) A theory
Correct Answer
verified
Multiple Choice
A) credit card fraud.
B) online theft.
C) cyberterrorism.
D) counterfeiting.
Correct Answer
verified
Multiple Choice
A) data processing.
B) knowledge management.
C) information systems.
D) personal computing.
Correct Answer
verified
Multiple Choice
A) relevance and timeliness.
B) redundancy and simplicity.
C) clarity and confidentiality.
D) flexibility and durability.
Correct Answer
verified
True/False
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Showing 141 - 160 of 192
Related Exams