Exam 14: Using Technology to Manage Information

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

MATCHING Complete the following using the terms listed. -A centralized integrated collection of data resources is known as a(n) _____.

(Multiple Choice)
4.9/5
(31)

Grid computing combines multiple small computers to create a virtual mainframe.

(True/False)
4.8/5
(35)

In addition to making and receiving calls and text messages, smart phones allow users to surf the Internet, receive and send e-mail, check their schedules, and open and edit documents.

(True/False)
4.8/5
(24)

Rebecca is on a business trip. From her hotel, she uses her computer to access her company's network, checking her e-mail and calendar. Rebecca's company has a(n) ________.

(Multiple Choice)
4.8/5
(41)

A computer program that imitates human thinking is a(n) ________.

(Multiple Choice)
4.8/5
(38)

Which of the following is the most recent development in laptop computers?

(Multiple Choice)
4.8/5
(37)

Bridgette, a chief executive officer, reviews the internal performance of her company's stock, as well as market trends for the industry. To access this information, Bridgette uses a(n) ________.

(Multiple Choice)
4.9/5
(36)

DVD drives and monitors are examples of computer input devices.

(True/False)
4.8/5
(34)

An advantage of using VoIPs is that if your broadband connection goes out your phone service will not necessarily go out too.

(True/False)
4.9/5
(29)

Amelia is sitting at her computer, analyzing the financial impact of an increase in her company's sales growth rate. Amelia is probably using a ________ program.

(Multiple Choice)
4.8/5
(37)

Sylvia belongs to several online card clubs. When she downloaded a recommended bridge game, she unknowingly received a ________, which ultimately damaged the hard drive on her computer.

(Multiple Choice)
4.8/5
(31)

Which of the following is an unreasonable response to potential computer problems?

(Multiple Choice)
5.0/5
(42)

MATCHING Complete the following using the terms listed. -The purpose of a(n) _____ is to limit data transfers to certain locations and log system use so that managers can identify threats to a system's security.

(Multiple Choice)
4.9/5
(40)

MATCHING Complete the following using the terms listed. -A(n) _____ is a network of PCs that have been infected with one or more data-stealing viruses.

(Multiple Choice)
4.7/5
(29)

A program that performs specific tasks that the user wants to carry out is called ________.

(Multiple Choice)
4.7/5
(34)

Executive support systems are computer programs that imitate human thinking through complicated sets of "if-then" rules.

(True/False)
4.8/5
(38)

An outside supplier used for providing computer and program support for managing an information system is known as ________.

(Multiple Choice)
4.8/5
(33)

Explain the differences between a virus, a worm, and a Trojan horse.

(Essay)
4.8/5
(36)

The software which controls the basic workings of the computer system is called a(n) _____.

(Multiple Choice)
4.8/5
(36)

All of the following are advantages of VoIP, EXCEPT ________.

(Multiple Choice)
4.8/5
(43)
Showing 61 - 80 of 117
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)