Filters
Question type

Study Flashcards

Data mining is included in business intelligence.

A) True
B) False

Correct Answer

verifed

verified

The use of computers increases the number of layers of management,resulting in taller organizations.

A) True
B) False

Correct Answer

verifed

verified

The most likely reason a firm would decide to establish an extranet would be the desire to:


A) speed the flow of information on its private network by increasing the bandwidth.
B) make the information on its network widely available to the general public.
C) share information and collaborate with a select group of outside organizations or individuals.
D) overcome the speed and capacity limitations of its external connection to the Internet by gaining access to the very-high-speed Backbone Network Service.

E) C) and D)
F) None of the above

Correct Answer

verifed

verified

Data from RFID devices,miniature cameras,and wireless access used to understand where people or items are located is called:


A) physical-world observations.
B) biological data.
C) public data.
D) business process information.

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

In recent years,a major trend has been a movement from:


A) network systems to mainframe systems.
B) extranets to infonets.
C) desktop PCs to portable wireless technologies.
D) digital technology to analog technology.

E) A) and C)
F) A) and B)

Correct Answer

verifed

verified

An intranet is a company-wide network that is based on Internet technology,but closed to public access.

A) True
B) False

Correct Answer

verifed

verified

Rob Jared has been using a shareware program for several days.He really likes the program,and wants to keep using it.Rob should:


A) go to a local retail software dealer and purchase the complete version of the demo he is using.
B) send the software developer the specified fee.
C) write to the developer and ask to be sent the finished version once it is ready for publication.
D) simply continue using the software for as long as he wants.Since shareware is not copyrighted,he can legally use the software as long as he wants without making any payment.

E) A) and C)
F) C) and D)

Correct Answer

verifed

verified

Over time,business technology has become much more sophisticated,but its basic application has remained to support the existing operations of businesses by providing key financial information.

A) True
B) False

Correct Answer

verifed

verified

Instability in technology:


A) used to be a major problem,but such problems now are largely a thing of the past.
B) still exists,but could be easily eliminated if firms would upgrade to newer equipment and software.
C) remains a serious problem that is caused by a variety of factors.
D) still exists,but its impact on business is greatly exaggerated by the media.

E) A) and B)
F) All of the above

Correct Answer

verifed

verified

A major trend today is a move away from desktop PCs to increasing reliance on laptop computers and wireless handheld devices.

A) True
B) False

Correct Answer

verifed

verified

RFID devices collect biological dat A.

A) True
B) False

Correct Answer

verifed

verified

A company that wanted to provide a single,unified entry point to its network that would allow different types of users access to different types of resources could do so by establishing an) :


A) enterprise portal.
B) broadband interface.
C) intranet.
D) mainframe network.

E) A) and D)
F) None of the above

Correct Answer

verifed

verified

Jonathon is a sales rep with a large technology company.He is celebrating today because he just closed a large deal,which means a very large commission.Even the finance department is thrilled because Jonathon used __________ to review the credit history of this customer to be sure the deal would be a profitable one for the company.


A) knowledge transfer
B) business intelligence
C) data processing
D) business process information

E) C) and D)
F) B) and D)

Correct Answer

verifed

verified

The main reason for setting up an enterprise portal is to ensure that only employees of an organization have access to the information on its intranet.

A) True
B) False

Correct Answer

verifed

verified

Highbrow University just obtained a link to Internet2.Researchers at Highbrow intend to make very heavy use of their new link for various forms of collaboration,for videoconferencing and for running complex simulations.Unlike the regular Internet,the more bandwidth Highbrow's researchers use on Internet2,the more the University will have to pay.

A) True
B) False

Correct Answer

verifed

verified

Bandwidth is the term used to describe the rate at which data flows through the Internet.

A) True
B) False

Correct Answer

verifed

verified

A firm would use data mining if it wanted to:


A) store copies of crucial data in several different locations to protect against its loss during disasters such as earthquakes,floods,or terrorist attacks.
B) protect its data from unauthorized outsiders.
C) increase the rate at which information flows through a firm's intranet.
D) discover hidden relationships among the data it accumulates.

E) None of the above
F) B) and D)

Correct Answer

verifed

verified

Transaction data gathered at the point of sale is known as:


A) physical-world observations.
B) business process information.
C) public data.
D) personal preference data.

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

The key distinction between data and information is that data:


A) are facts and figures that have been stored in databases so that they can be accessed and manipulated by a computer.
B) is less reliable than information because its accuracy has not been verified.
C) is mathematical in nature while information is verbal in nature.
D) are raw,unanalyzed facts and figures while information is data that has been processed and summarized so that is can be used by decision-makers.

E) B) and D)
F) C) and D)

Correct Answer

verifed

verified

A key element of Internet2 is:


A) the requirement that all users log on to each site with a unique password.
B) the very-high-speed Backbone Network Service vBNS) .
C) a new security system that eliminates the risk that unauthorized users will be able to access private information.
D) the high speed Resource Allocation Prioritizer hsRAP) .

E) B) and D)
F) C) and D)

Correct Answer

verifed

verified

Showing 61 - 80 of 224

Related Exams

Show Answer