Exam 11: Information Systems Technology

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Explain the difference between intranet and extranet.

(Essay)
4.7/5
(49)

Health care information systems cover a broad range of applications, serving both clinical and administrative functions.

(True/False)
5.0/5
(41)

.com, .edu, and .gov are example of ____________________ types.

(Short Answer)
4.9/5
(35)

A firewall allows the end user to access the Internet, but prevents unauthorized users from obtaining access to the end user's computer.

(True/False)
4.9/5
(38)

DSL also transmits all data as digital signals and does require access to television connections.

(True/False)
4.8/5
(32)

The speed of the CPU is measured in a unit of frequency called megahertz.

(True/False)
4.7/5
(27)

Match the term with its definition. -refers to the act of ensuring the entry in the record for both accuracy and authorship

(Multiple Choice)
4.7/5
(35)

Device that depends on reading and writing data from a rotating disk for its operation is called what?

(Multiple Choice)
4.8/5
(27)

The speed of the CPU is measured in a unit of frequency called ____________________.

(Short Answer)
4.9/5
(37)

The Internet is a worldwide network of smaller networks.

(True/False)
4.7/5
(49)

What is the function of HTML?

(Multiple Choice)
4.9/5
(36)

Match the computer term with the best descriptor. -a programming language

(Multiple Choice)
4.9/5
(44)

What three software components must be used in order for the Web to operate?

(Essay)
4.9/5
(39)

Match the computer term with the best descriptor. -hardware that is added to a host computer to expand its capabilities

(Multiple Choice)
4.8/5
(48)

Which of these policies answers the who, what, where, when, why, and how questions of information security?

(Multiple Choice)
5.0/5
(33)

What are the physical electronic components of a computer system called?

(Multiple Choice)
4.9/5
(32)

Who is responsible for maintaining the Internet?

(Multiple Choice)
4.9/5
(36)

The level of access to an operating system or application given to a person or group of persons is the security measure called what?

(Multiple Choice)
4.9/5
(33)
Showing 61 - 78 of 78
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)