Exam 4: Hardware and Software
Exam 1: Is in the Life of Business Professionals113 Questions
Exam 2: Business Processes, Information, and Information Systems119 Questions
Exam 2: Extensions S: Using Collaboration Information Systems49 Questions
Exam 3: Organizational Strategy, Information Systems, and Competitive Advantage116 Questions
Exam 4: Hardware and Software143 Questions
Exam 5: Database Processing115 Questions
Exam 5: Extensions A: Introduction to Microsoft Excel87 Questions
Exam 5: Extensions B: Introduction to Microsoft Excel49 Questions
Exam 6: Data Communications123 Questions
Exam 7: Business Process Management124 Questions
Exam 8: E-Commerce and Web 2.0143 Questions
Exam 9: Business Intelligence and Information Systems for Decision Making104 Questions
Exam 10: Information Systems Development121 Questions
Exam 10: Extensions A: How the Internet Works42 Questions
Exam 11: Information Systems Management113 Questions
Exam 12: Information Security Management115 Questions
Select questions type
According to most software license agreements,vendors are not__________ for any security holes in the software that might leave their customers vulnerable to attack.
(Short Answer)
4.8/5
(39)
Sometimes virus attacks are brought on by the negligence and ignorance of the user.
(True/False)
4.9/5
(29)
Some people say that technology changes too quickly and that they don't want any more features on the hardware and software that they use.Discuss the downside and the upside of this argument.
(Essay)
4.8/5
(34)
Users employ__________ computers for work processing, spreadsheets, and database access.
(Multiple Choice)
4.9/5
(39)
When you work on a spreadsheet program like Excel,the program is loaded into main memory for processing.
(True/False)
4.8/5
(42)
When multiple programs are running,main memory helps through the use of memory swapping.
(True/False)
4.8/5
(31)
What are the differences between volatile and nonvolatile memory? Give an example of each.Why is this important to know in business?
(Essay)
5.0/5
(39)
As software vendors discover security holes in their products they continually issue modifications called "hole repairs."
(True/False)
4.8/5
(38)
One way to stay informed about technology changes in your area of business is to get involved as a user representative on technology committees in your organization.
(True/False)
4.8/5
(40)
__________computers have been used primarily by graphic artists and workers in the arts community.
(Short Answer)
4.8/5
(41)
When the computer is turned on,a portion of the operating system is loaded into main memory.
(True/False)
4.7/5
(32)
Showing 81 - 100 of 143
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)