Filters
Question type

Study Flashcards

A defining characteristic of shareware is that it is:


A) designed to help people in different organizations share ideas and collaborate on projects.
B) not protected by copyrights and is distributed free for the taking.
C) an older,less powerful version of a well-known software package that the developer is distributing at reduced cost.
D) protected by a copyright,but users are allowed to try it for free and are asked to send a specified fee to the developer if it meets their needs.

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

Internet2 runs more than 22,000 times faster than a 56Kbs modem.

A) True
B) False

Correct Answer

verifed

verified

A company can use a(n) __________ to prevent unauthorized outsiders from accessing information on its intranet.


A) firewall
B) disconnector
C) entry sentry
D) tripwire

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Transaction data gathered at the point of sale is known as:


A) physical-world observations.
B) business process information.
C) public data.
D) personal preference data.

E) All of the above
F) C) and D)

Correct Answer

verifed

verified

Data mining looks for previously unknown relationships among vast amounts of data.

A) True
B) False

Correct Answer

verifed

verified

In the area of electronic communications,the main focus of corporate and government security officials today is the prevention of credit card fraud.

A) True
B) False

Correct Answer

verifed

verified

A _________ is a small piece of software code a website downloads onto the hard drives of people who visit the site.


A) cookie
B) brownie
C) data marker
D) file portal

E) B) and D)
F) A) and B)

Correct Answer

verifed

verified

Computers are rapidly replacing workers as the main source of most creative ideas used by businesses.

A) True
B) False

Correct Answer

verifed

verified

The ability of the Critical Infrastructure Protection Board to achieve its mission depends crucially on:


A) convincing corporations to adopt the more secure Internet2 technology.
B) finding ways to create artificially intelligent monitors of electronic communications.
C) convincing information managers in the private sector to report problems such as hacker attacks and viruses to the government.
D) developing a new wireless technology that provides better data encryption.

E) B) and D)
F) A) and B)

Correct Answer

verifed

verified

An important advantage knowledge technology has over older versions of business technology is that it:


A) delivers timely information directly to the people who need it.
B) is much cheaper to incorporate into most business operations.
C) allows businesses to locate anywhere and still reach their customers.
D) eliminates the need for businesses to store information electronically.

E) B) and C)
F) All of the above

Correct Answer

verifed

verified

A computer ________ is a piece of programming code that is inserted into other programming to cause an unexpected and often-undesirable event for the victim.


A) virus
B) factoid
C) wasp
D) firecracker

E) None of the above
F) C) and D)

Correct Answer

verifed

verified

A thin-client network is a hybrid between the mainframe system and network computing.

A) True
B) False

Correct Answer

verifed

verified

________ is another name for freeware software.


A) Groupware
B) Shareware
C) Public domain software
D) Generic software

E) A) and C)
F) B) and C)

Correct Answer

verifed

verified

Bandwidth is the term used to describe the rate at which data flows through the Internet.

A) True
B) False

Correct Answer

verifed

verified

One reason many firms rely on a network computing system is the low cost of maintaining the system once it is up and running.

A) True
B) False

Correct Answer

verifed

verified

The extranet is the next stage in the evolution of the Internet,consisting of a revolutionary new fiber optic technology that will enable computer users throughout the world to send and receive data up to 256 times faster than they can using the Internet technology of the early 2000s.

A) True
B) False

Correct Answer

verifed

verified

The purpose of a data warehouse is to store old information that is no longer needed on a regular basis,but that might be needed for legal or historical reasons.

A) True
B) False

Correct Answer

verifed

verified

An intranet is a company-wide network that is based on Internet technology,but closed to public access.

A) True
B) False

Correct Answer

verifed

verified

A firm would be most likely to establish an enterprise portal if it wanted to:


A) prevent outsiders from using its information network.
B) allow users to access different areas of its network depending on their relationship to the firm.
C) prevent viruses from being downloaded from the company's website.
D) search for hidden patterns and unknown relationships among data stored in different information systems.

E) None of the above
F) B) and D)

Correct Answer

verifed

verified

Users of Internet2 each pay the same fee for their connection and share bandwidth equally.

A) True
B) False

Correct Answer

verifed

verified

Showing 101 - 120 of 237

Related Exams

Show Answer