Exam 16: Managing Information Technology: Finding New Ways to Learn and Link

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

_____ involves sending official­looking but fake email messages designed to get users to disclose personal information in an attempt to steal identities.

(Multiple Choice)
4.8/5
(33)

Describe three ways that companies and individuals can use to protect themselves from spyware and viruses.

(Essay)
4.7/5
(43)

Hisson Inc. has been a proponent of radio frequency identification (RFID) technology for some years and encourages all of its suppliers to make use of this technology. The most likely reason that Hisson Inc. is promoting this technology is to help them:

(Multiple Choice)
4.7/5
(32)

Electronic bill presentment and payment is one of the ways of making electronic payments.

(True/False)
4.9/5
(38)

Which of the following links hundreds of thousands of smaller networks and operates under a common set of rules for communication?

(Multiple Choice)
4.9/5
(43)

Brady received an email claiming that his bank's records show some possible errors in his account and requesting that he click on a link to a site where he can confirm his password, social security number, and account numbers. The email looks official and contains his bank's logo. Brady should:

(Multiple Choice)
4.7/5
(37)

Louis works for the Oakland County Police Department. He is assigned with the task of sorting through massive amounts of data with statistical and mathematical programs in an effort to detect fraud and crime. Louis should use _____ to complete his task most efficiently.

(Multiple Choice)
4.8/5
(39)

Data are facts and figures that have been organized in a way that makes them immediately useful to decision makers.​

(True/False)
4.9/5
(44)

Which of the following refers to the raw facts and figures that businesses collect?

(Multiple Choice)
4.9/5
(28)

The main purpose of radio frequency identification chips is to transmit a serial number that uniquely identifies a product or device.

(True/False)
4.7/5
(39)

Applications software is software that performs the critical functions necessary to operate a computer at the most basic level.

(True/False)
4.9/5
(25)

Spam refers to unsolicited email advertisements usually sent to very large numbers of recipients, many of whom may not have interest in the message.

(True/False)
4.9/5
(40)

An example of an intellectual property violation would be:

(Multiple Choice)
4.8/5
(31)

_____ computing means using Internet­based storage capacity, applications, and processing power to supplement or replace internally­owned computer resources.

(Multiple Choice)
4.9/5
(30)

E­commerce refers to using the Internet to facilitate the exchange of goods and services.

(True/False)
4.8/5
(32)

_____ is a network based on fiber­optic cable, which uses high­speed connectivity to improve education, research, and collaboration.

(Multiple Choice)
4.9/5
(29)

When comparing seat belt prices for his firm's auto assembly plant, purchasing manager Ernie Wong finds it most convenient to access the _____ for auto manufacturers.

(Multiple Choice)
4.8/5
(35)

Computer viruses can erase or modify data on a hard drive, prevent a computer from booting up, and find and send personal information stored on the hard drive to unauthorized people.

(True/False)
4.9/5
(39)

Explain how companies use expert systems to solve problems.

(Essay)
4.9/5
(28)

When you send an email, and then erase it, it is most likely that the email is:

(Multiple Choice)
5.0/5
(34)
Showing 181 - 200 of 200
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)