Filters
Question type

Study Flashcards

An) ___________ serves as an entry point to a variety of resources on an organization's information network.


A) personal information manager
B) e-transfer page
C) enterprise portal
D) subscription web page

E) B) and D)
F) None of the above

Correct Answer

verifed

verified

In older computer systems,a central computer,known as an) _________ performed all of the tasks and sent the results to terminals that could not perform the tasks themselves.


A) mainframe
B) prime node
C) application service provider
D) network controller

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

The most productive way for firms to use intranets is to publish information that can be accessed by all employees within an organization.

A) True
B) False

Correct Answer

verifed

verified

The main reason a firm would establish a firewall for its intranet is that it wants to:


A) prevent outsiders from being able to access information on its network.
B) protect itself against loss of data in the event of a fire,flood,or other catastrophe.
C) create an interface to hook into Internet2 using firewire connections.
D) prevent employees from gaining access to the Internet for personal use.

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Doris Cargile has been given the responsibility to find ways to store and organize the huge amount of data her firm has collected and continues to collect) over the years.Which of the following would Doris be most likely to set up to handle this responsibility?


A) Push technology
B) Wide-area information storage technology WAIST)
C) Data warehouses
D) Random access memory capsules

E) A) and B)
F) A) and D)

Correct Answer

verifed

verified

During the 1980s,the role of business technology changed from supporting business to doing business.

A) True
B) False

Correct Answer

verifed

verified

___________ looks for hidden patterns and unknown relationships among the data a firm has accumulated.


A) Tracking software
B) Econometric analysis
C) Data mining
D) Data parsing

E) B) and C)
F) A) and C)

Correct Answer

verifed

verified

During the 1980s business technology began to emphasize the use of technology to change how business was conducted by introducing new methods.

A) True
B) False

Correct Answer

verifed

verified

Cy's new project to provide a single entry point to his company's network that identifies users and allows them access to the areas of the network they need indicates that he is working on an) :


A) virtual network.
B) web router.
C) enterprise portal.
D) node-to-node network system.

E) None of the above
F) B) and D)

Correct Answer

verifed

verified

Major retail firms such as Wal-Mart have used data mining to customize the product offerings for each store.

A) True
B) False

Correct Answer

verifed

verified

Today the primary concern of corporate and government security officials concerning electronic communication is in the area of cyberterrorism.

A) True
B) False

Correct Answer

verifed

verified

As the result of the terrorist attacks on September 11,2001,managers of most major corporations have become much more willing to give the government extensive access to information about problems with electronic communication such as viruses and attacks by hackers.

A) True
B) False

Correct Answer

verifed

verified

The ability of the Critical Infrastructure Protection Board to achieve its mission depends crucially on:


A) convincing corporations to adopt the more secure Internet2 technology.
B) finding ways to create artificially intelligent monitors of electronic communications.
C) convincing information managers in the private sector to report problems such as hacker attacks and viruses to the government.
D) developing a new wireless technology that provides better data encryption.

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Studies have shown that all types of workers are likely to become more productive when they are allowed to telecommute.

A) True
B) False

Correct Answer

verifed

verified

Websites often send "cookies" to a user's computer that are saved on the computer's hard drive.

A) True
B) False

Correct Answer

verifed

verified

Many __________,which ran software at data centers and rented software services to customers,went out of business after the Web boom cooled off.


A) enterprise portals
B) virtual office networks
C) application service providers
D) ISPs

E) B) and C)
F) All of the above

Correct Answer

verifed

verified

Beginning with the late 1980s the goal of information technology was to:


A) improve the flow of financial information throughout business organizations.
B) use new technologies to offer new methods of conducting business.
C) prevent proprietary information from falling into the hands of competitors.
D) use new technologies to improve old methods.

E) B) and C)
F) B) and D)

Correct Answer

verifed

verified

The first step in avoiding information overload is to identify four or five key goals and focus only on information that is related to those goals.

A) True
B) False

Correct Answer

verifed

verified

What are the four characteristics of useful information?

Correct Answer

verifed

verified

Useful information has the following cha...

View Answer

Business Intelligence BI)changes the traditional flow of information so that the database goes to the individual rather than the individual going to the database.

A) True
B) False

Correct Answer

verifed

verified

Showing 181 - 200 of 224

Related Exams

Show Answer