Exam 23: Extension: Using Technology to Manage Information

arrow
  • Select Tags
search iconSearch Question
  • Select Tags

Information is data that has been processed and organized so that it can be used for managerial decision making.

(True/False)
4.8/5
(41)

What is the key difference between an intranet and an extranet? Why might a firm use a virtual private network instead of an extranet?

(Essay)
4.8/5
(35)

Kent Uchi is the CIO for a major corporation. Kent's job will require him to have an extensive knowledge of the hardware and software his company uses, but he will seldom be concerned about the methods and procedures used by specific departments.

(True/False)
4.9/5
(40)

It is illegal for companies to scan e-mails written by their employees at work unless the employees have given permission in advance or the firm has received approval from a federal judge.

(True/False)
4.8/5
(38)

From the 1970s to the present time, the primary role of business technology has:

(Multiple Choice)
5.0/5
(29)

A major reason for the creation of Internet2 was that private businesses wanted to establish a network that was free from government regulation.

(True/False)
4.9/5
(31)

The ability of the Critical Infrastructure Protection Board to achieve its mission depends crucially on:

(Multiple Choice)
4.8/5
(36)

Initially, the very-high-speed Internet2 network service was set up to connect government supercomputer centers with a select group of universities.

(True/False)
4.9/5
(28)

Lernital University is connected to Internet2, and several professors in its school of engineering are engaged in a research project that makes extremely heavy use of the bandwidth this connection provides. In fact, the engineering professors would like to get even more bandwidth. Given the way its designers set up Internet2, the researchers at Lernital:

(Multiple Choice)
4.8/5
(39)

A firm would be most likely to establish an enterprise portal if it wanted to:

(Multiple Choice)
4.9/5
(37)

A(n) ____________ is a private data network that creates secure connections over regular Internet lines.

(Multiple Choice)
4.9/5
(37)

A firm would consider establishing a virtual private network if it wanted to:

(Multiple Choice)
4.8/5
(21)

___________ looks for hidden patterns and unknown relationships among the data a firm has accumulated.

(Multiple Choice)
4.9/5
(38)

The first step a manager should take to cope with information overload is to:

(Multiple Choice)
4.8/5
(34)

One of the most revolutionary impacts computer technology has had on business has been to:

(Multiple Choice)
4.8/5
(32)

The main purpose of an intranet is to allow a company to keep in close contact with its customers.

(True/False)
4.8/5
(35)

Websites often send cookies to a user's computer that are saved on the computer's hard drive.

(True/False)
4.7/5
(37)

Bandwidth is the term used to describe the rate at which data flows through the Internet.

(True/False)
4.8/5
(37)

Transaction data gathered at the point of sale is known as:

(Multiple Choice)
4.8/5
(33)

Internet2 runs more than 22,000 times faster than today's public infrastructure.

(True/False)
4.7/5
(34)
Showing 121 - 140 of 189
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)