Exam 14: Using Technology to Manage Information

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

An example of data are sales figures.

(True/False)
4.9/5
(44)

Gavin downloaded some company information into a spreadsheet so that he could work on it at home.When he returned to work,he inserted his memory card into his company computer.Within minutes,all of his hard drive files were corrupted.The most likely cause of this was a(n)

(Multiple Choice)
4.9/5
(36)

Kandyse belongs to several online card clubs.When she downloaded a recommended bridge game,she unknowingly received a ________,which ultimately damaged the hard drive on her computer.

(Multiple Choice)
4.9/5
(24)

A virus can remain dormant for a period of time on a computer.

(True/False)
4.8/5
(30)

An intranet blocks outsiders without valid passwords from entering its network by incorporating both software and hardware.

(True/False)
4.9/5
(30)

Which of the following involves the process of identifying,capturing,evaluating,retrieving,and sharing all of a company's databases,documents,policies,procedures,and previously un-captured expertise and experience of individual workers?

(Multiple Choice)
4.8/5
(33)

Which of the following devices is NOT a computer hardware?

(Multiple Choice)
4.8/5
(41)

Javier is sitting at his computer preparing a new sales brochure.The brochure combines high-quality type,graphics,and photographs.What type of software is Javier likely using to create the brochure?

(Multiple Choice)
4.7/5
(35)

Data mining is the process of

(Multiple Choice)
4.9/5
(28)

The term _____ refers to start-up companies worth $1 billion or more.

(Multiple Choice)
4.8/5
(29)

A virtual private network provides secure communication connections between two points on the Internet.

(True/False)
4.8/5
(25)

The largest type of computer system with the most extensive storage capacity and the fastest processing speeds is a

(Multiple Choice)
4.8/5
(37)

Salma would like her company to fund a worthwhile project and has accumulated valuable charts and graphs on market shares,territories,and projected sales.In order to achieve maximum impact,Salma should communicate her information to the company's senior executives using a

(Multiple Choice)
4.8/5
(32)

A(n)_____ is an organized method for collecting,storing,and communicating past,present,and projected information on internal operations and external intelligence.

(Multiple Choice)
4.8/5
(44)

_____ is knowledge gained from processing the facts and figures.

(Multiple Choice)
4.8/5
(25)

Which of the following is an example of disruptive innovation?

(Multiple Choice)
4.7/5
(34)

Deciding how to prevent system failures along with the ability to continue operations if computer systems fail is called

(Multiple Choice)
4.9/5
(37)

In the context of security and ethical issues affecting information system,theft of equipment is a type of malware.

(True/False)
4.8/5
(41)

A database can best be described as

(Multiple Choice)
4.8/5
(37)

Operational support systems are different from transaction processing systems.

(True/False)
4.8/5
(30)
Showing 41 - 60 of 104
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)