Exam 14: Using Technology to Manage Information

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Jennifer belongs to several online card clubs.When she downloaded a recommended bridge game,she unknowingly received a ________,which ultimately damaged the hard drive on her computer.

Free
(Multiple Choice)
4.8/5
(25)
Correct Answer:
Verified

C

A virtual private network provides secure communication connections between two points on the Internet.

Free
(True/False)
4.8/5
(32)
Correct Answer:
Verified

True

Disaster recovery planning involves deciding how to prevent system failures and continue operations if computer systems fail.

Free
(True/False)
4.8/5
(44)
Correct Answer:
Verified

True

Which of the following statements is true about intranets?

(Multiple Choice)
4.9/5
(31)

A secure connection between two points on the Internet is known as a(n)_____.

(Multiple Choice)
4.7/5
(33)

An especially powerful midrange computer is called a supercomputer.

(True/False)
4.8/5
(37)

Chloe would like her company to fund a worthwhile project and has accumulated valuable charts and graphs regarding market shares,territories,and projected sales.In order to achieve maximum impact,Chloe should communicate her information via ________.

(Multiple Choice)
4.9/5
(32)

A(n)_____ is an outside company that specializes in providing both computers and the application support for managing information systems of business clients.

(Multiple Choice)
4.9/5
(28)

The person who directs a firm's management information systems and related computer operations is often called the ________.

(Multiple Choice)
4.9/5
(32)

Which of the following is considered information rather than data?

(Multiple Choice)
4.8/5
(35)

Which of the following reasons is not a reason for the increasing popularity of notebook computers?

(Multiple Choice)
4.8/5
(31)

An information system that provides relevant data to help businesspeople choose the appropriate course of action is called a(n)________.

(Multiple Choice)
4.8/5
(38)

A computer network that connects machines within a limited area is called a(n)_____.

(Multiple Choice)
4.8/5
(32)

What is a decision support system? How does a decision support system differ from an expert system?

(Essay)
4.9/5
(29)

Theft of equipment is a type of computer crime.

(True/False)
4.7/5
(35)

A(n)________ is a network of PCs that have been infected with one or more data-stealing viruses.

(Multiple Choice)
4.9/5
(33)

Sales figures are an example of information.

(True/False)
4.7/5
(32)

Caleb's company has installed a system to make data transmission secure.Therefore,he can use the Internet to send and receive sensitive data.Caleb's company has installed a(n)________.

(Multiple Choice)
4.8/5
(44)

Mari is on a business trip.From her hotel,she uses her computer to access her company's network,checking her e-mail and calendar.Mari's company has a(n)________.

(Multiple Choice)
4.8/5
(26)

Courtney's office in Manitoba was destroyed by a flood last year,and she lost numerous company documents.After relocating,Courtney took no chances and implemented ________,in which she backed up her data in a secure online storage service.

(Multiple Choice)
4.8/5
(27)
Showing 1 - 20 of 113
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)