Exam 22: Using Technology to Manage Information

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The reluctance of CIOs to trust their organization's critical data to a firm that does not have a track record helps explain why:

(Multiple Choice)
4.9/5
(39)

For the past several years,scientists and engineers at Equatech,Inc.have relied on the Internet to keep in touch with their peers at various universities and research organizations.In recent years these researchers have become frustrated because the increasing congestion on the Internet has disrupted their attempts to communicate and collaborate with colleagues at other institutions.Which of the following developments would be most likely to help Equatech's researchers overcome this problem? Equatech should:

(Multiple Choice)
5.0/5
(38)

One advantage of networked computers is that they offer much greater computer security than the older mainframe systems.

(True/False)
4.8/5
(31)

Regina Williams works for Findabuck Finance Company,but she seldom sees the inside of Findabuck's offices.Instead,she does most of her work on a computer located in the spare bedroom of her home.The computer is linked to Findabuck's office,so her work is distributed as quickly and efficiently as if she were at the office.Regina is one of the increasing number of workers who:

(Multiple Choice)
4.8/5
(25)

An)_______ is someone who breaks into a computer system for illegal purposes.

(Multiple Choice)
4.8/5
(21)

Lernital University is connected to Internet2,and several professors in its school of engineering are engaged in a research project that makes extremely heavy use of the bandwidth this connection provides.In fact,the engineering professors would like to get even more bandwidth.Given the way its designers set up Internet2,the researchers at Lernital:

(Multiple Choice)
4.9/5
(31)

Your Internet shopping trail provides information that indicates your personal preferences.

(True/False)
4.8/5
(40)

When purchasing a computer system,the best approach is to select the hardware first,then purchase software that will function effectively on that type of hardware.

(True/False)
4.9/5
(31)

Data mining would be most helpful to a manager that wants to:

(Multiple Choice)
4.9/5
(34)

Perry Black has convinced top management at his company that they can use data mining techniques to develop new marketing strategies.One of the keys to the success of Perry's suggestion is:

(Multiple Choice)
4.8/5
(38)

In older computer network systems,a central computer performed all of the computational tasks and sent the results to dumb terminals that could not perform the tasks themselves.

(True/False)
4.8/5
(47)

Application service providers have met with a great deal of success in recent years as more and more firms have decided to rent software rather than buy it.

(True/False)
4.8/5
(40)

In the coming years,successful information management will be more concerned with achieving and maintaining stability and predictability,and less concerned with adapting to change.

(True/False)
4.8/5
(28)

Enterprise portals are simply web pages with links to company-specific products and services.

(True/False)
4.7/5
(38)

Jamie Mueller has just begun working for Quotech,Inc.Her job requires her to perform a variety of bookkeeping and clerical tasks at a workstation.Quotech has training software on its workstations that can answer many of the questions Jamie has about what to do on her new job,and how to do it.The software is so good that she seldom has to ask her supervisor for help.It even tracks the way Jamie performs certain tasks,and offers suggestions to improve her productivity.This software is an example of:

(Multiple Choice)
4.8/5
(31)

Jason Hart was recently informed by his bank that someone illegally broke into the bank's computer system and gained access to information about customer account numbers and ATM access codes.The bank is recommending that Jason and other customers change their account numbers and access numbers for security reasons.The bank and Jason are victims of a:

(Multiple Choice)
4.8/5
(39)

The On-The-Green Golf Company currently has an intranet,and is considering making use of an extranet.One of the main reasons On-The-Green may want an extranet is to allow a select group of outside customers to have access to information on its intranet.

(True/False)
4.9/5
(34)

________ is another name for freeware software.

(Multiple Choice)
4.9/5
(25)

__________ is copyrighted software that is distributed to potential customers free of charge.However,customers are expected to pay the developer a fee if they decide to use it.

(Multiple Choice)
4.8/5
(34)

Lee Ann Beane works in the finance department of a major corporation.When Lee Ann wants to do some complex financial computations,she can use the personal computer that sits on her desk.However,the actual data she needs is stored on a server.This suggests that Lee Ann's company uses an):

(Multiple Choice)
4.9/5
(43)
Showing 41 - 60 of 224
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)