Exam 16: Managing Information Technology: Finding New Ways to Learn and Link

arrow

8,749 students have unlocked this exam

  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Worms are an example of malware that spread by attaching themselves to files that are then transferred from computer to computer.

(True/False)
4.7/5
(43)

The Internet consists of hundreds of thousands of smaller networks operating under a common set of rules so that each can communicate with the others.

(True/False)
4.9/5
(46)

142 Rfoicrmarsd oo fw ea­ ncotsm tom seerclle h iiss Rraiccainr gdo b uiksein ogn? Craigslist. Which of the following forms of e­commerce is Ricardousing?

(Multiple Choice)
4.8/5
(49)

_____ refers to the programs that provide instructions to a computer so that it can perform a desired task

(Multiple Choice)
4.9/5
(38)

Compare and contrast intranets and extranets.

(Essay)
4.9/5
(38)

A firewall is special software that hackers place on a computer to prevent accessing data.

(True/False)
4.8/5
(31)

Computer­aided design (CAD) software that enables product designers to produce technical drawings in three dimensions is an example of a(n) _____.

(Multiple Choice)
4.9/5
(23)

_____ are files of related data organized according to a logical system and stored on hard drives or some other computer­accessible storage media.

(Multiple Choice)
4.8/5
(39)

Cloud computing allows users to take advantage of a technique called _____ that speeds up the data processing rates.

(Multiple Choice)
5.0/5
(32)

A smartphone is an example of hardware.

(True/False)
4.9/5
(34)

Performing timely backups, updating operating systems regularly, and not opening emails or attachments from people you do not know are just a few suggestions to:

(Multiple Choice)
4.9/5
(33)

Margaret Reed works for a major manufacturer that is having trouble tracking components and materials as they move through a supply chain. Margaret wants to find a technology that will uniquely identify items to simplify the tracking process. Margaret should consider radio frequency identification chips to solve this problem.

(True/False)
4.9/5
(40)

What is the purpose of system software? Describe operating systems and utility programs.

(Essay)
5.0/5
(33)

According to Microsoft's criteria, 4&nrU3rrnr%qr# is a good example of a(n) _____.

(Multiple Choice)
5.0/5
(35)

The number of customers in the target market of B2B e­commerce is larger than that in B2C e­commerce.

(True/False)
4.9/5
(35)

As compared to business­to­business (B2B) markets, business­to­consumer (B2C) markets:

(Multiple Choice)
4.7/5
(28)

A _____ is a very large, organization­wide database that provides a centralized location for storing data from both the organization's own databases and external sources.

(Multiple Choice)
4.7/5
(36)

One of the vital functions of information technology­at least in relationship to business­is to transform data into useful information for decision makers.

(True/False)
4.9/5
(30)

Malware is a hardware developed or created with malicious intent.

(True/False)
4.9/5
(42)

PayPal is a global e­commerce business allowing payments and money transfers to be made through the Internet. It is an example of a(n) _____.

(Multiple Choice)
4.8/5
(33)
Showing 61 - 80 of 200
close modal

Filters

  • Essay(15)
  • Multiple Choice(93)
  • Short Answer(0)
  • True False(92)
  • Matching(0)