Exam 15: Managing Information and Technology: Finding New Ways to Learn and Link

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Hardware consists of computer programs that provide instructions to a computer so that it can perform a desired task.

(True/False)
4.8/5
(39)

The GUI allows users to enter commands by clicking on icons on the computer screen or by tapping or swiping them on devices with a touch screen.

(True/False)
4.8/5
(39)

Compare and contrast intranets and extranets.

(Essay)
4.8/5
(42)

What is the advantage of using cloud computing?

(Multiple Choice)
4.9/5
(34)

Piracy of intellectual property occurs when someone reproduces and distributes copyrighted work without obtaining permission from-or providing compensation to-the owner of the copyrighted material.

(True/False)
4.8/5
(23)

According to Microsoft, which of the following is an example of a "strong password"?

(Multiple Choice)
4.8/5
(35)

Electronic bill presentment and payment is a method in which bills are sent to customers via e-mail. Many banks offer this service.

(True/False)
4.9/5
(34)

What do we call computer programs that provide instructions for a computer to execute a desired task?

(Multiple Choice)
4.9/5
(37)

Which of the following installs itself on a computer without the user's knowledge or permission for the purpose of tracking the user's behaviour?

(Multiple Choice)
4.8/5
(34)

What is viral marketing? Provide an example.

(Essay)
4.9/5
(47)

Which of the following does an operating system provide?

(Multiple Choice)
4.8/5
(43)

The main purpose of RFID chips is to transmit a serial number that uniquely identifies a person, product, or device.

(True/False)
4.7/5
(37)

According to Microsoft's criteria, 4&nrU3r#999888 is a good example of which of the following?

(Multiple Choice)
4.9/5
(37)

To protect your computer from spyware and viruses remove the hard drive before accessing the Internet.

(True/False)
4.8/5
(37)

Margot Reed works for a major manufacturer that is having trouble tracking components and materials as they move through its supply chain. Margot wants to find a technology that will uniquely identify items to simplify the tracking process. She is likely to be interested in considering RFID chips to solve this problem.

(True/False)
4.9/5
(32)

The basic difference between computer viruses on the one hand and spyware on the other is that a virus has the ability to spread automatically to other computers.

(True/False)
4.9/5
(29)

Which of the following is a network confined to sites on internal Web servers and only available to individuals within an organization?

(Multiple Choice)
4.8/5
(38)

How can you protect yourself from spyware and viruses?

(Multiple Choice)
4.7/5
(37)

A network links computer resources using either a wired or wireless connection.

(True/False)
4.8/5
(35)

Performing timely backups, updating operating systems regularly, and not opening e-mails or attachments from people you do not know are just a few suggestions to accomplish which of the following?

(Multiple Choice)
4.8/5
(34)
Showing 61 - 80 of 163
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)