Exam 17: Managing Information

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

TolTel Inc., an information technology firm, has created a network that allows its employees to easily access, share, and publish information using Internet software. The website has a firewall that separates the internal company network from the Internet, permitting authorized access only within the organization. It is evident that the network created by TolTel Inc. is a(n) _____.

(Multiple Choice)
4.8/5
(32)

A group of investigators are investigating a recent airplane crash in Lucitona. The investigators discovered debris of the aircraft, which provided them the information regarding the nature of the plane crash. But because the flight data recorder (a device that preserves the recent history of the flight) of the airplane was completely destroyed in the crash, the investigators were unable to determine what exactly went wrong. The absence of the flight data recorder led the investigators to call off the investigation. It can be concluded that the investigation was called off because:

(Multiple Choice)
4.9/5
(37)

Unlike spamming, email snooping involves:

(Multiple Choice)
4.9/5
(28)

ABD Tech has invested $20 million to install business intelligence software (BIS) at all of its branches across the globe so that it can access stored information in its servers for business analysis and decision-making purposes. In this scenario, the cost incurred by ABD Tech is an example of _____.

(Multiple Choice)
4.8/5
(39)

_____ transforms data into complex, scrambled digital codes that can be deciphered only by authorized users who possess unique keys to the data.

(Multiple Choice)
4.8/5
(30)

Unlike spam, ransomware:

(Multiple Choice)
4.8/5
(37)

_____ usually begins with the user telling the data mining software to look and test for specific patterns and relationships in a data set.

(Multiple Choice)
4.8/5
(30)

Oreva, a multinational corporation, pays $100,000 per year to an information technology firm to archive and secure all of its data into the information technology firm's cloud platform. In this scenario, the cost incurred by Oreva is an example of _____.

(Multiple Choice)
4.9/5
(39)

Which of the following is a characteristic of information?

(Multiple Choice)
4.8/5
(34)

In the context of protecting information, _____ is defined as the process of making sure users are who they claim to be.

(Multiple Choice)
5.0/5
(40)

One of the most common misunderstandings about information is that it is easy and cheap to retrieve after a company has it.

(True/False)
4.9/5
(41)

Which of the following statements is true of corporate portals?

(Multiple Choice)
4.8/5
(30)

Omaco, a technological firm, recently invested $20 million to design a data system that can access the already-stored information in the company servers at a higher speed than previous data systems. In this scenario, the money invested in the data system can be considered to be_____.

(Multiple Choice)
4.8/5
(31)

TEFCO, a computer processor manufacturing company, recently adopted a new fabrication process to manufacture microprocessors. The microprocessors made using this new process have higher computing power and clock speed than other processors available in the market. Although the new process has made TEFCO the industry leader, there is a threat that competitors will be able to match this feat in the near future. It is evident that TEFCO has achieved _____.

(Multiple Choice)
4.8/5
(40)

In the context of accessing and sharing information, _____ are private company networks that allow employees to easily access, share, and publish information using Internet software.

(Multiple Choice)
4.8/5
(36)

Unlike authorization, authentication is:

(Multiple Choice)
4.8/5
(31)

Which of the following is software that encrypts Internet data at both ends of the data transmission process?

(Multiple Choice)
4.9/5
(31)

In the context of accessing and sharing information, _____ allow company managers and employees to use a web browser to gain access to customized company information and to complete specialized transactions.

(Multiple Choice)
4.8/5
(33)

Identify a true statement about manual capture of information.

(Multiple Choice)
4.8/5
(31)

KST Mart retains large amounts of customer data. To understand customer purchase behavior, the company uses a process that automatically discovers correlations in the collected data. Through this process, the company learns that people who buy bread, typically also buy a packet of butter. As a result, the manager of the supermarket places butter near the shelf that stocks bread. In this scenario, KST Mart has most likely used _____ to process information.

(Multiple Choice)
4.9/5
(35)
Showing 41 - 60 of 115
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)