Exam 15: Managing Information and Technology: Finding New Ways to Learn and Link

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Once you install antivirus software on your computer, you are secured against viruses for life.

(True/False)
4.8/5
(40)

What type of e-commerce involves businesses buying and selling supplies, components, machinery, equipment, or services from other businesses?

(Multiple Choice)
4.8/5
(32)

A strong password is any combination of at least five characters consisting of both letters and numbers and isn't a common word or name.

(True/False)
4.8/5
(31)

E-commerce refers to using the Internet to facilitate the exchange of goods and services.

(True/False)
5.0/5
(43)

Spyware, spam, and viruses contain no programming codes and are simple text files that can be overwritten by specialized software.

(True/False)
4.8/5
(38)

Explain each of the basic elements of computer technology: hardware, software, and networks. Describe one key trend in each area.

(Essay)
4.8/5
(44)

Travelocity, Expedia, and Amazon.com are all examples of what type of e-commerce?

(Multiple Choice)
4.8/5
(33)

Comcast is advertising a new paperless statement program. With a few clicks of the mouse, you can now get your bill, pay it, and get a receipt. What is this an example of?

(Multiple Choice)
4.9/5
(32)

Most business were reluctant to embrace Cloud computing, citing concerns about broadband and costs.

(True/False)
4.7/5
(38)

What do we call the technique of combining the processing power of hundreds or thousands of computers to work on different elements of a problem simultaneously?

(Multiple Choice)
4.8/5
(36)

Which of the following are hackers with malicious intent to do harm, steal identities, or disrupt business?

(Multiple Choice)
4.9/5
(33)

A database is a type of software that is primarily used to perform computations based on complex formulas, such as those used by accountants or engineers.

(True/False)
4.9/5
(37)

Information technology raises a number of legal and ethical challenges. Which of the following is one of these challenges?

(Multiple Choice)
4.9/5
(34)

A query is a request for the database management software to search for data that matches specific criteria.

(True/False)
4.9/5
(43)

How does piracy hurt people as it becomes more widespread?

(Multiple Choice)
4.8/5
(35)

Viral marketing is not as effective as traditional buzz marketing because the latter tactic allows for messages to reach a wider audience at a faster speed.

(True/False)
5.0/5
(29)

A firewall is special material software that hackers place on your computer to prevent you from accessing your data.

(True/False)
4.8/5
(36)

Data are facts and figures that do not become information until they are organized and presented in a way that makes them useful to the end user.

(True/False)
4.8/5
(25)

Black-hat hackers are hackers who have no harmful intent. Instead they hack into computers simply for the intellectual challenge it involves.

(True/False)
4.8/5
(37)

Deleting e-mail messages from your inbox on a regular basis is an effective way of eliminating the possibility that others will be able to read your messages.

(True/False)
4.9/5
(44)
Showing 141 - 160 of 163
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)