Exam 22: Appendix: Using Technology to Manage Information

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A(n) ________ serves as an entry point to a variety of resources on an organization's information network.

(Multiple Choice)
4.9/5
(37)

A computer virus is a piece of programming code that is inserted into other programming code with the intention of causing some unexpected, and usually undesirable, event for the user of the software.

(True/False)
4.8/5
(33)

The amount of information managers receive each day

(Multiple Choice)
4.8/5
(36)

One problem with most extranets is that they use public lines, which makes it possible for hackers to get into the network.

(True/False)
5.0/5
(37)

A company that wanted to provide a single, unified entry point to its network that would allow different types of users access to different types of resources could do so by establishing a(n)

(Multiple Choice)
4.8/5
(29)

Many businesses choose to open their intranets to other selected organizations through the use of

(Multiple Choice)
4.8/5
(34)

Computer technology has become so stable and mature in recent years that, except for problems caused by viruses and hackers, major glitches are essentially a thing of the past.

(True/False)
5.0/5
(37)

The first step a manager should take to cope with information overload is to

(Multiple Choice)
4.8/5
(40)

Internal networking shares the resources of all computers with each networked computer.

(True/False)
4.9/5
(44)

An intranet is a companywide network that is based on Internet-type technology, but closed to public access.

(True/False)
4.9/5
(25)

Homegrown Design, a company that publishes home design software, wants to set up a temporary link with another firm to collaborate and share data on a short-term basis. Homegrown wants to keep the cost of setting up this connection reasonable, but is concerned about hackers and wants to make sure its link is secure. The best way for Homegrown to achieve its goal is to set up an extranet with dedicated lines.

(True/False)
4.8/5
(36)

A virtual private network allows information managers to simulate a real intranet in order to identify possible security problems and technical glitches before the company sets up the actual private network.

(True/False)
4.8/5
(29)

When Cy first came to work for Epic Electronics, the application of business technology was called

(Multiple Choice)
4.8/5
(23)

Which of the following observations would be the strongest evidence that Marshall Manufacturing has adopted knowledge technology?

(Multiple Choice)
4.7/5
(31)

Beginning with the late 1980s the goal of information technology was to

(Multiple Choice)
4.9/5
(41)

Because cloud computing is often too expensive for small businesses, it is rarely used.

(True/False)
4.8/5
(37)

A(n) ________ is someone who breaks into a computer system for illegal purposes.

(Multiple Choice)
4.9/5
(36)

A major impact of information technology has been to

(Multiple Choice)
4.8/5
(41)

Today the primary concern of corporate and government security officials concerning electronic communication is in the area of cyberterrorism.

(True/False)
4.9/5
(39)

Websites often send cookies to a user's computer that are saved on the computer's hard drive.

(True/False)
4.8/5
(43)
Showing 61 - 80 of 192
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)