Exam 15: Managing Information and Technology: Finding New Ways to Learn and Link

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Linux is software that comes installed on many computers to perform all of the fundamental tasks needed to operate the computer at its most basic level and to provide an interface that allows the user to interact with the computer. Because it performs these functions, what is Linux?

(Multiple Choice)
4.9/5
(33)

Which of the following are specialized Internet sites where B2B buyers and sellers exchange products and services?

(Multiple Choice)
4.9/5
(30)

Intellectual property is the result of creative or intellectual effort, such as books, musical works, inventions, and computer software.

(True/False)
4.9/5
(41)

In which of the following markets do firms use information technology to attract new customers, manage customer relationships, and handle customer payments online?

(Multiple Choice)
4.9/5
(34)

Igor loves to download music and video over the Internet. But he is finding that even with his high-speed connection, it sometimes takes a long time to download the files he wants. Internet2 is designed primarily to meet the needs of people like Igor.

(True/False)
4.7/5
(40)

Discuss the role of information technology in e-commerce.

(Essay)
4.9/5
(29)

Define what is meant by cloud computing. Discuss why until recently some companies were reluctant to use it.

(Essay)
4.8/5
(41)

The World Wide Web is the part of the Internet that consists of documents written in HTML. This is the part of the Internet that receives the most attention from the general public.

(True/False)
4.9/5
(38)

Red Eye Shipping Inc. has purchased a business intelligence system. The main advantage of such a system is that it eliminates the need for maintaining large data warehouses and using complex techniques such as data mining.

(True/False)
4.9/5
(34)

Which of the following can protect your computer from data corruption, pop-up ads, hackers, identity theft, and other online-related threats?

(Multiple Choice)
4.7/5
(34)

Data mining uses powerful statistical and mathematical techniques to analyze the vast amounts of data in data warehouses in order to identify information that was previously hidden.

(True/False)
4.7/5
(31)

Spam filters are guaranteed to stop spammers from forcing people to give private information on the Internet.

(True/False)
4.9/5
(38)

What is purpose of system software? Describe the two basic types of system software.

(Essay)
4.9/5
(41)

By offering limited access of their intranets to select groups of outside people, what do firms create?

(Multiple Choice)
4.8/5
(32)

GUI stands for Graphical Unit Interchange.

(True/False)
4.9/5
(32)

Spam is unsolicited e-mail usually sent to very large numbers of recipients, many of whom may not have interest in the message.

(True/False)
4.7/5
(27)

The World Wide Web is simply another name for the Internet.

(True/False)
4.9/5
(36)

Which of the following links computer resources using either a wired or wireless connection?

(Multiple Choice)
4.8/5
(42)

Describe the two broad types of application software.

(Essay)
4.9/5
(33)

So far the music industry is the only industry that has experienced significant losses in revenue as the result of piracy.

(True/False)
4.8/5
(35)
Showing 81 - 100 of 163
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)