A) designed to help people in different organizations share ideas and collaborate on projects.
B) not protected by copyrights and is distributed free for the taking.
C) an older,less powerful version of a well-known software package that the developer is distributing at reduced cost.
D) protected by a copyright,but users are allowed to try it for free and are asked to send a specified fee to the developer if it meets their needs.
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) firewall
B) disconnector
C) entry sentry
D) tripwire
Correct Answer
verified
Multiple Choice
A) physical-world observations.
B) business process information.
C) public data.
D) personal preference data.
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) cookie
B) brownie
C) data marker
D) file portal
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) convincing corporations to adopt the more secure Internet2 technology.
B) finding ways to create artificially intelligent monitors of electronic communications.
C) convincing information managers in the private sector to report problems such as hacker attacks and viruses to the government.
D) developing a new wireless technology that provides better data encryption.
Correct Answer
verified
Multiple Choice
A) delivers timely information directly to the people who need it.
B) is much cheaper to incorporate into most business operations.
C) allows businesses to locate anywhere and still reach their customers.
D) eliminates the need for businesses to store information electronically.
Correct Answer
verified
Multiple Choice
A) virus
B) factoid
C) wasp
D) firecracker
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Groupware
B) Shareware
C) Public domain software
D) Generic software
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) prevent outsiders from using its information network.
B) allow users to access different areas of its network depending on their relationship to the firm.
C) prevent viruses from being downloaded from the company's website.
D) search for hidden patterns and unknown relationships among data stored in different information systems.
Correct Answer
verified
True/False
Correct Answer
verified
Showing 101 - 120 of 237
Related Exams