Exam 14: Using Technology to Manage Information

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

For companies to gain increased security for Internet communications, which of the following networks are recommended?

(Multiple Choice)
4.8/5
(34)

Which of the following is a computer program that imitates human thinking by applying human knowledge in a specific subject area to solve a problem?

(Multiple Choice)
4.8/5
(36)

A firewall is a computer network that is similar to the Internet but limits access to authorized users.

(True/False)
4.8/5
(39)

Cloud computing allows users to access software and databases via an intranet.

(True/False)
4.9/5
(44)

What are the five important tasks that need to be considered by an organization regarding offsite data storage?

(Essay)
4.7/5
(36)

All of the following are reasonable responses to potential computer problems EXCEPT ______.

(Multiple Choice)
4.7/5
(30)

Briefly describe some of the ethical issues regarding information systems within an organization.

(Essay)
4.9/5
(38)

Most wide area networks are clusters of local area networks.

(True/False)
4.7/5
(27)

______ is a network of PCs that have been infected with one or more data-stealing viruses.

(Multiple Choice)
4.8/5
(42)

On-demand computing is particularly useful for companies that experience seasonal spikes in customer usage of their applications.

(True/False)
4.7/5
(36)

Describe an application service provider.

(Essay)
4.7/5
(41)

On-site data backup involves storing software and data in a separate physical location or online on the Internet.

(True/False)
4.7/5
(42)

Sales of notebook computers are now exceeding sales of desktop computers.

(True/False)
4.7/5
(36)

Which of the following factors are NOT part of the most significant trends in information systems?

(Multiple Choice)
4.8/5
(37)

Mario downloaded some company information into a spreadsheet so that he could work on it at home. When he returned to work, he inserted his memory card into his company computer. Within minutes, all of his hard drive files were corrupted. The most likely cause was a(n) ______.

(Multiple Choice)
4.7/5
(33)

Which of the following statements is true about intranets?

(Multiple Choice)
4.8/5
(38)

A familiar example of wide area networks is long-distance telephone service.

(True/False)
4.9/5
(36)

Today, ______ make information access and information transmission work very smoothly.

(Multiple Choice)
4.7/5
(41)

Which of the following is an application program?

(Multiple Choice)
4.9/5
(37)

What are some ways that businesses can protect themselves from computer crimes?

(Essay)
4.8/5
(41)
Showing 21 - 40 of 155
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)