Exam 22: Appendix: Using Technology to Manage Information

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

In the coming years, successful information management will be more concerned with achieving and maintaining stability and predictability, and less concerned with adapting to change.

(True/False)
4.8/5
(35)

The main reason a firm would establish a firewall for its intranet is that it wants to

(Multiple Choice)
4.8/5
(38)

The most productive way for firms to use intranets is to publish information that can be accessed by all employees within an organization.

(True/False)
4.8/5
(30)

The primary role of business technology during the 1970s was to

(Multiple Choice)
4.8/5
(38)

________ technology uses a continuous Internet connection that allows users to send and receive mammoth files that include voice, video, and data much faster than ever before.

(Multiple Choice)
4.8/5
(31)

The Critical Infrastructure Protection Board was established after the terrorist attacks of September 11, 2001, as part of the Office of Homeland Security.

(True/False)
4.9/5
(42)

Western University just obtained a link to Internet2. Researchers at Western intend to make very heavy use of their new link for various forms of collaboration, for videoconferencing and for running complex simulations. Unlike the regular Internet, the more bandwidth Western's researchers use on Internet2, the more the university will have to pay.

(True/False)
4.9/5
(35)

The cause of almost all instability in computer systems can be traced to poorly designed hardware.

(True/False)
4.9/5
(35)

When spyware is inadvertently downloaded to a user's computer the software tracks the user's online behavior. Spyware is installed without the user's knowledge and can infect the computer with a virus.

(True/False)
4.9/5
(36)

The ________ was created as a part of the Office of Homeland Security and given the responsibility to devise a plan for improving the security of America's critical infrastructure.

(Multiple Choice)
4.9/5
(41)

A(n) ________ is a private data network that creates secure connections over regular Internet lines.

(Multiple Choice)
4.8/5
(35)

Virtual private networks create secure connections over regular Internet lines.

(True/False)
4.8/5
(32)

A firm would use data mining if it wanted to

(Multiple Choice)
4.8/5
(34)

________ is raw, unanalyzed, and unorganized facts and figures.

(Multiple Choice)
5.0/5
(30)

Gary has been using Dropbox. The cloud he is storing his information to is called a

(Multiple Choice)
4.8/5
(28)

Major retail firms such as Walmart have used data mining to customize the product offerings for each store.

(True/False)
4.9/5
(40)

________ looks for hidden patterns and unknown relationships among the data a firm has accumulated.

(Multiple Choice)
4.9/5
(35)

A firm would consider establishing a virtual private network if it wanted to

(Multiple Choice)
4.8/5
(29)

During the 1970s, the purpose of data processing was to support the existing business by improving the flow of financial information.

(True/False)
4.8/5
(42)

The advantages of cloud computing are security, possible instability, and data control.

(True/False)
4.9/5
(33)
Showing 21 - 40 of 192
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)