Exam 21: Bonus A: Using Technology to Manage Information

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Compared to the Internet,a major advantage of Internet2 is that it:

(Multiple Choice)
4.9/5
(37)

Business process information includes all transaction data gathered at the point of sale.

(True/False)
4.9/5
(33)

________ is the term used to refer to the wireless network technology that is becoming increasingly available.

(Multiple Choice)
4.8/5
(36)

In a(n)___________ computing system,the tasks are performed by personal computers using information stored in databases controlled by a server.

(Multiple Choice)
4.9/5
(34)

One of the most revolutionary impacts computer technology has had on business has been to:

(Multiple Choice)
4.8/5
(36)

Larry Kotter has just learned that his company has been reading the e-mail messages he has sent while at work without getting his permission.Harry can sue the company for invasion of privacy under the Electronic Communications Privacy Act of 1997.

(True/False)
4.8/5
(35)

Computer software provides the instructions that enable users to tell the computer what to do.

(True/False)
4.8/5
(27)

The reluctance of CIOs to trust their organization's critical data to a firm that does not have a track record helps explain why:

(Multiple Choice)
4.9/5
(46)

High quality information is:

(Multiple Choice)
4.8/5
(33)

The increasing use of computer networks has made computer security more complicated.

(True/False)
4.9/5
(29)

Widebeam is the term used to refer to technologies that give users continuous access to the Internet and greatly increase the speed at which data flows to and from their Internet connection.

(True/False)
4.7/5
(32)

A(n)___________ serves as an entry point to a variety of resources on an organization's information network.

(Multiple Choice)
4.8/5
(33)

Knowledge technology is a more sophisticated version of business intelligence.

(True/False)
4.7/5
(30)

A firm that wanted to enable its employees to use and share data without allowing outsiders to gain access could do so by establishing a(n):

(Multiple Choice)
4.9/5
(37)

The use of knowledge technology should result in a(n):

(Multiple Choice)
4.9/5
(36)

Doris Cargile has been given the responsibility to find ways to store and organize the huge amount of data her firm has collected (and continues to collect)over the years.Which of the following would Doris be most likely to set up to handle this responsibility?

(Multiple Choice)
4.9/5
(35)

Wi-Fi refers to a new type of computer processor technology that enables more than one instruction to be processed at the same time.

(True/False)
4.8/5
(32)

As Wi-Fi technology becomes more widespread:

(Multiple Choice)
4.8/5
(33)

A virtual private network allows information managers to simulate a real intranet in order to identify possible security problems and technical glitches before the company sets up the actual private network.

(True/False)
4.7/5
(34)

___________ looks for hidden patterns and unknown relationships among the data a firm has accumulated.

(Multiple Choice)
4.9/5
(38)
Showing 41 - 60 of 237
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)