Exam 14: Using Technology to Manage Information

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Complete the following using the terms listed. -A secure connection between two points on the Internet is known as a(n)_____.

(Multiple Choice)
4.8/5
(34)

Complete the following using the terms listed. -Uber and Airbnb are examples of companies referred to as _____,which use innovative business models to bring about disruption in a particular industry.

(Multiple Choice)
4.7/5
(44)

Complete the following using the terms listed. -The term _____ refers to startup companies worth $1 billion or more.

(Multiple Choice)
4.7/5
(33)

A database can best be described as ________.

(Multiple Choice)
4.9/5
(33)

Bill is sitting at his computer preparing a new sales brochure.The brochure combines high-quality type,graphics,and photographs.What type of software is Bill likely using to create the brochure?

(Multiple Choice)
4.8/5
(36)

Which of the following is an application program?

(Multiple Choice)
4.8/5
(32)

A handful of users click on a link that reads "free unlimited Tetris game" to reveal a blank screen.They later find that information on their hard drive was also erased.The page that falsely advertised a free game is an example of a Trojan horse.

(True/False)
4.9/5
(31)

Hannah is a television executive whose team conducted demographic research for new programs.Hannah will be expected to write a detailed ________ report about the impact of this study and the effect of the network's marketing strategy.

(Multiple Choice)
4.7/5
(39)

The software which controls the basic workings of the computer system is called a(n)_____.

(Multiple Choice)
4.8/5
(24)

James is putting together a presentation for senior management analyzing a potential new market.He is using his computer to create charts and graphs that he will then show as slides.Which of the following software programs is James most likely using?

(Multiple Choice)
4.7/5
(38)

Application software controls the basic workings of a computer system.

(True/False)
4.8/5
(32)

On Zaxen.com,homebuyers enter information about their preferred home location,price,and features.Using an ________,the website automatically displays real estate properties that match the homebuyer's criteria.

(Multiple Choice)
4.9/5
(40)

Jenny,a computer science student at Canyon University,purchases a new computer for her software programming needs.She must install _____ on her computer to make it work.

(Multiple Choice)
4.9/5
(39)

A virus can remain dormant for a period of time on a computer.

(True/False)
4.7/5
(30)

Explain the difference between data and information.

(Essay)
4.8/5
(39)

Complete the following using the terms listed. -A(n)_____ is a network of PCs that have been infected with one or more data-stealing viruses.

(Multiple Choice)
4.9/5
(28)

Data alone are of limited value to a company.

(True/False)
4.9/5
(39)

Describe at least two ways in which common cybercrimes occur.

(Essay)
4.7/5
(35)

Complete the following using the terms listed. -A(n)_____ is a computer program that imitates human thinking through complicated sets of if-then rules.

(Multiple Choice)
4.8/5
(41)

Virtual private networks are more expensive to install than wide area networks.

(True/False)
4.8/5
(32)
Showing 41 - 60 of 135
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)