Exam 14: Information Technology Itfor Business

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

How is a Trojan horse different from a worm?

Free
(Essay)
4.8/5
(36)
Correct Answer:
Verified

A worm travels from computer to computer; a Trojan horse does not replicate itself.Once installed,a Trojan horse may cause damage-from the redesign of desktop icons to the deletion and destruction of files.

What feature does a firewall provide?

Free
(Multiple Choice)
4.9/5
(40)
Correct Answer:
Verified

D

What is the purpose of a knowledge information system?

Free
(Essay)
4.9/5
(23)
Correct Answer:
Verified

A knowledge information system supports knowledge workers by providing resources to create,store,use,and transmit new knowledge for useful applications.An example of a knowledge information system is a database to organize and retrieve information for data analysis.

The SPAM Act of 2003 is designed to strengthen identity-theft protection.

(True/False)
4.8/5
(31)

Which of the following allows for instantaneous information designed to improve the management process?

(Multiple Choice)
4.9/5
(37)

What advantage does a communication system using VSAT satellite have?

(Multiple Choice)
4.7/5
(36)

Which of the following BEST describes a firewall?

(Multiple Choice)
4.8/5
(31)

How do companies use intranets to improve productivity and performance?

(Essay)
4.9/5
(38)

Which type of communication technology is attractive to businesses because it eliminates travel expenses by allowing simultaneous communication globally?

(Multiple Choice)
4.9/5
(34)

What can be used to link all computers in an organization over long distances?

(Multiple Choice)
4.9/5
(40)

What is the electronic collection,storage,and retrieval of data referred to as?

(Multiple Choice)
4.8/5
(37)

What is the name of software and hardware that prevent hackers from accessing a company's internal network?

(Multiple Choice)
4.8/5
(47)

A company's security policy can prevent certain data from passing through its firewall.

(True/False)
4.8/5
(30)

Information networks are leading to leaner companies with fewer employees and simpler organizational structures.

(True/False)
4.8/5
(37)

Which of the following strengthens identity-theft protection by specifying how documents with personal information must be disposed of?

(Multiple Choice)
4.9/5
(42)

What is the term used for searching,sifting,and reorganizing pools of data to uncover useful information?

(Multiple Choice)
4.7/5
(39)

A computer-aided design (CAD)system could help a sales manager learn what sales levels will likely result from various levels of advertising expenditures.

(True/False)
4.8/5
(38)

Which software can help to design products ranging from cell phones to auto parts at lower costs compared to manual modeling methods?

(Multiple Choice)
5.0/5
(30)

What type of system aids in the decision-making process by creating virtual business models and then test them with data?

(Multiple Choice)
4.9/5
(34)

Which of the following BEST describes a decision support system?

(Multiple Choice)
4.8/5
(42)
Showing 1 - 20 of 108
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)