Exam 14: Using Technology to Manage Information

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

All of the following are examples of e-crimes except:

Free
(Multiple Choice)
4.8/5
(31)
Correct Answer:
Verified

C

Traditionally, users have purchased software licenses and installed the programs directly on hardware and systems. A new trend, championed by Google, among others, uses powerful servers to store applications outside the individual company but accessible from anywhere via the Web. This new approach is called __________________________________.

Free
(Multiple Choice)
4.8/5
(32)
Correct Answer:
Verified

B

Natural disasters and power failures affect businesses and cost billions of dollars. To minimize the damage that these events cause, companies should perform

Free
(Multiple Choice)
4.8/5
(30)
Correct Answer:
Verified

A

How is data different from information?

(Multiple Choice)
4.8/5
(41)

The application software that would be best suited for creating a sales presentation is

(Multiple Choice)
4.8/5
(32)

A Trojan horse ______________________________________________.

(Multiple Choice)
4.7/5
(34)

A small piece of software that uses a security hole in a network to replicate itself is referred to as a ______________________________________.

(Multiple Choice)
4.7/5
(35)

_________ can be an outcome of poorly protecting employee or customer data.

(Multiple Choice)
4.9/5
(34)

One of the primary considerations in deciding what data to protectively store is the severe legal consequences if lost.

(True/False)
4.8/5
(35)

Which of the following is not one of the components of a computer-based information system?

(Multiple Choice)
4.7/5
(31)

A network of smaller computers that run special software is referred to as ???_____________.

(Multiple Choice)
4.8/5
(30)

An outside supplier that provides both the computers and the application support for managing an information system is referred to as (an) ____________________________.

(Multiple Choice)
4.9/5
(35)

The heart of any information system is its ______________________________.

(Multiple Choice)
4.9/5
(34)

The fourth industrial revolution has been powered by _____________________________.

(Multiple Choice)
4.9/5
(32)

The first step in off-site data storage is ________________________________.

(Multiple Choice)
4.7/5
(36)

A firm that has operations in many regions wants to link its computer systems for increased productivity. It should consider a

(Multiple Choice)
4.8/5
(26)

Alec's company experiences fairly steady computing demand except for the weekend after Thanksgiving when traffic spikes. Since his company is relatively small, he doesn't want to invest in resources that will be used fairly seldom. Alec is considering

(Multiple Choice)
4.7/5
(42)

_______________________are less-expensive and simpler versions of existing products and services that target entirely new customers, many times replacing industry leaders.

(Multiple Choice)
5.0/5
(36)

A(n) __________ can be tailored to assist many business functions and departments-from marketing and manufacturing to finance and accounting.

(Multiple Choice)
4.9/5
(29)

__________ limit data transfers to certain locations and log system use so that managers can identify threats to a system's security.

(Multiple Choice)
4.9/5
(39)
Showing 1 - 20 of 44
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)