Exam 14: Information Technology Itfor Business

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

"Hotspots" in places such as coffee shops and airports access wireless Internet connections using

(Multiple Choice)
4.9/5
(24)

Which cybercriminal activity refers to the act of luring Internet users to bogus Web sites?

(Multiple Choice)
4.7/5
(40)

Why do firms want to prevent hackers from stealing intellectual property?

(Multiple Choice)
4.9/5
(36)

What is the difference between data and information?

(Essay)
4.9/5
(36)

What advantage does a super Wi-Fi network offer over other wireless technologies?

(Multiple Choice)
4.7/5
(46)

Why is electronic conferencing a desirable alternative for business?

(Essay)
4.7/5
(33)

What is the process of sending an e-mail that appears to have come from a trusted source,but is really spam?

(Multiple Choice)
4.7/5
(40)

The application of electronic technologies for searching,sifting,and reorganizing pools of data to uncover useful information is called data warehousing.

(True/False)
4.9/5
(45)

How has information technology affected organizational structure in terms of the number of employees and the organizational structure?

(Essay)
4.9/5
(34)

What do manufacturers use to design and control equipment used in the creation of products?

(Multiple Choice)
4.9/5
(33)

What is used to provide privacy protection on a wireless wide area network?

(Multiple Choice)
4.8/5
(29)

What is a computer-based system that allows people to communicate simultaneously from different locations via telephone,e-mail,or video?

(Multiple Choice)
4.8/5
(38)

What is another name for a falsified Web page?

(Multiple Choice)
4.7/5
(40)

Which of the following is a cybercriminal who gains unauthorized access to a computer or network?

(Multiple Choice)
4.7/5
(34)

In addition to wasting users' time,spam consumes a network's bandwidth,thereby reducing the amount of data that can be transmitted in a fixed amount of time for useful purposes.

(True/False)
4.8/5
(35)

An information system may be a set of several information systems that share information.

(True/False)
4.8/5
(31)

Trojan horses are malicious programs that replicate themselves like viruses.

(True/False)
4.8/5
(31)

Which of the following is an ethical issue when it comes to Internet privacy?

(Multiple Choice)
4.7/5
(35)

What type of users would download spyware?

(Multiple Choice)
4.8/5
(43)

Differentiate between data conferencing and videoconferencing.

(Essay)
4.9/5
(45)
Showing 21 - 40 of 108
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)