Exam 15: Managing Information and Technology: Finding New Ways to Learn and Link

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A network links computer resources using either a wired or wireless connection.

(True/False)
4.8/5
(35)

Performing timely backups,updating operating systems regularly,and not opening e-mails or attachments from people you do not know are just a few suggestions to accomplish which of the following?

(Multiple Choice)
4.9/5
(31)

A small firm that manufactures specialized automobile parts would be unable to participate in an e-marketplace since accessing such markets requires expensive specialized communications equipment that only larger firms can afford.

(True/False)
4.9/5
(29)

According to Microsoft's criteria,4&nrU3r# is a good example of which of the following?

(Multiple Choice)
4.8/5
(30)

Explain each of the basic elements of computer technology:hardware,software,and networks.Describe one key trend in each area.

(Essay)
4.9/5
(44)

A strong password is any combination of at least five characters consisting of both letters and numbers and isn't a common word or name.

(True/False)
4.9/5
(28)

Compare and contrast intranets and extranets.

(Essay)
4.8/5
(43)

What is intellectual property? What are some of the intellectual property issues that have impacted high school and college students?

(Essay)
4.8/5
(30)

B2C e-commerce refers to online business trades between companies.

(True/False)
4.8/5
(36)

Data mining is most effective at locating relationships among data stored on small,highly specialized databases,such as the database for a single department or division within a company.

(True/False)
4.9/5
(33)

What is viral marketing? Briefly describe how Hotmail successfully used viral marketing to create consumer awareness of a new concept:free Web-based e-mail.

(Essay)
4.8/5
(32)

Adware is software that is installed on a computer to show advertisements.

(True/False)
4.7/5
(34)

In B2C commerce transactions most sites have a SSL protocol,which stands for Selective Server Line.

(True/False)
4.8/5
(30)

Which two companies are at the forefront of cloud computing?

(Multiple Choice)
4.8/5
(43)

Application software is the software that helps users perform desired tasks.

(True/False)
4.8/5
(25)

Viruses can erase or modify data on your hard drive,prevent computer start-up,or find and send personal information stored on your hard drive to unauthorized people.Viruses are often hidden in e-mails,instant messages,or files downloaded from the Internet.

(True/False)
4.7/5
(42)

Describe information overload and its impact on businesses.List two ways managers and employees can avoid information overload.

(Essay)
4.7/5
(37)

A QR code is the black and white box of lines and dots found on printed advertising and other marketing information material.

(True/False)
4.9/5
(36)

AM/PM Consulting is a leader in the creation of expert systems used in a variety of industries.During the process of developing such systems for an application,AM/PM's programmers are likely to spend a lot of time interviewing human experts in that field to gain insights into how they solve problems.

(True/False)
4.8/5
(29)

Alonzo has just downloaded some interesting new free games from a Website.It's likely that a careful reading of the end user licensing agreement will reveal that when he installs these games,which of the following is most accurate?

(Multiple Choice)
4.9/5
(35)
Showing 121 - 140 of 170
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)