Deck 16: Managing Information Technology: Finding New Ways to Learn and Link
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/200
Play
Full screen (f)
Deck 16: Managing Information Technology: Finding New Ways to Learn and Link
1
"Massively parallel computing" combines the processing power of thousands of computers to work on different elements of a problem at the same time.
True
2
Graphical user interface requires users to correctly type in commands to open, save, or delete files.
False
3
Utility programs are supplemental operating system software programs, such as firewalls, antivirus software , and other security software.
False
4
The Internet consists of hundreds of thousands of smaller networks operating under a common set of rules so that each can communicate with the others.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
5
Horizontal applications software consists of highly specialized applications used in a particular industry, such as medicine, law, or accounting.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
6
Abel works for Greater Garrisonville Power Company. His job involves the creation of confidential reports and other documents that he posts on an internal server. While employees can view and even download these confidential materials using a web browser, people outside the company have no access to them. This suggests that Garrisonville Power is using an intranet.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
7
Online gaming and machinetomachine communications form part of the traffic on the Internet.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
8
Businesses develop intranets so that valued customers have access to internal information that is not available to the general public.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
9
Word processing, spreadsheet, and personal information management software are examples of vertical applications software.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
10
Cloud computing allows users to access their documents, music, or photos from any computer even without an Internet connection.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
11
Applications software is software that performs the critical functions necessary to operate a computer at the most basic level.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
12
Internet2 is a network that resulted from the coalition formed by several leading research universities, corporations, and other organizations to create a new generation of Internet technology in the United States based on fiberoptic cable.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
13
Internet2 was developed because broadband connections are not capable of handling the volume of information many businesses and scientific applications require.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
14
The World Wide Web includes Internet chatting and online gaming.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
15
A network links computer resources using either a wired or wireless connection.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
16
An initiative in 2001 allowed members of the Internet (I2) consortium to sponsor other research and educational organizations that did not originally qualify for membership, so they would have access to I2 resources.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
17
A smartphone is an example of hardware.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
18
The fundamental form of system software is the operating system, which controls the way a computer functions at its most basic level.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
19
Albert loves to download music and videos over the Internet. He observes that even with his highspeed connection, it sometimes takes a long time to download the files he wants. Internet2 is designed primarily to meet the needs of people like Albert.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
20
Hardware includes the various components of a computer system along with communications and network equipment.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
21
Data in their raw form are collectively called information.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
22
AM/PM Consulting is a leader in the creation of expert systems that are used in a variety of industries. During the process of developing such systems for an application, the company's programmers are likely to spend much time interviewing human experts in a particular field to gain insights into how they solve problems.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
23
Business intelligence systems are a new class of decision support systems developed over the past two decades.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
24
According to the characteristics of good information, highquality information should focus on issues that are important to decision makers.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
25
Cloud computing helps companies lower costs by paying only for the resources that are actually used and eliminates the problem of excess capacity.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
26
A query is a request for database management software to search for data that matches specified criteria.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
27
One of the vital functions of information technologyat least in relationship to businessis to transform data into useful information for decision makers.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
28
Expert systems help their users solve a problem or accomplish a task by asking the user a series of questions, basing each new question on the response to previous questions. The program continues to ask questions until it has enough information to reach a decision and make a recommendation.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
29
Data are facts and figures that have been organized in a way that makes them immediately useful to decision makers.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
30
Data mining uses powerful statistical and mathematical techniques to analyze vast amounts of data in data warehouses in order to identify useful information that had been hidden.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
31
Cloud resources are confined to specific operating systems, so people with computers having the same operating systems can form a group and easily share files and programs.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
32
In recent years, data mining has had considerable success in areas such as fraud and crime detection.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
33
Mattie O'Hara is a sales manager with Moonbux Coffee. Her sales department has a database indicating what each customer has purchased. The company is introducing a new line of gourmet coffees, and Mattie wants to contact customers who bought the Moonbux's older line of gourmet coffees to inform them of the new products. In order to obtain a list of customers, Mattie could enter a query into the database.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
34
Red Eye Shipping Inc. has purchased a business intelligence system. The main advantage of such a system is that it eliminates the need for maintaining large data warehouses and the need for data mining.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
35
A data warehouse is a physical storage facility used by management to store and file all hard copies of important documents generated by a business.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
36
An advantage of an expert system is that it is capable of solving a wide variety of problems, including those that are quite different from the problems it was originally designed to solve.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
37
To access cloud computing services, information technology (IT) companies will have to invest heavily in expensive new hardware and software.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
38
One of the disadvantages of an expert system is that it has little flexibility and no common sense.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
39
Cloud computing encourages collaboration among employees and business partners.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
40
Ecommerce refers to using the Internet to facilitate the exchange of goods and services.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
41
Electronic bill presentment and payment is one of the ways of making electronic payments.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
42
Optin email is much less expensive than direct mail.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
43
Amanda has a pearl necklace that she would like to sell on eBay or Craigslist. By listing her necklace on one of these two platforms, Amanda would be using a form of ecommerce known as C2C.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
44
Viral marketing is when a firm uses computer viruses to deliver unsolicited advertisements to a user's computer.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
45
B2C ecommerce refers to online business trades between companies.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
46
B2G ecommerce is when government agencies sell information, goods, and services to businesses.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
47
Many firms have used the Internet to implement very effective viral marketing campaigns that attempt to get customers to communicate a firm's message to friends, family, and colleagues.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
48
Viral marketing is not as effective as traditional buzz marketing because the latter allows for messages to reach a wider audience at a faster speed.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
49
Rudy just purchased a new pair of running shoes at a local sports shop. The owner of the shop requested Rudy to tweet about his experience in the store. The sports shop is trying to utilize a marketing campaign known as viral marketing.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
50
The online encyclopedia Wikipedia that uses wiki software to allow users to comment on and contribute to its articles is a Web 2.0 site.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
51
Shutterfly and Facebook are both examples of cybermediaries.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
52
The size of a typical individual transaction in B2B ecommerce is relatively small, usually a few dollars to a few hundred dollars.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
53
Optin emails are the same as spam, because they are unwanted messages.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
54
The number of customers in the target market of B2B ecommerce is larger than that in B2C ecommerce.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
55
Viral marketing is not as effective as traditional buzz marketing because the latter allows for messages to reach a wider audience at a faster speed.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
56
One Key difference between the B2C and the B2B marketplaces is that an individual buyer tends to be more rational than a business buyer.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
57
Electronic bill presentment and payment is a method in which bills are sent to customers via email.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
58
Internet advertising had experienced a sharp decline in revenue during the twentyfirst century.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
59
A cybermediary is an Internetbased firm specializing in the secure electronic transfer of funds.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
60
Companies use a secure socket layer (SSL) protocol to secure payment information transmitted over the Internet from a consumer to a business.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
61
A small firm that manufactures specialized automobile parts would be unable to participate in an emarketplace because accessing such markets requires expensive dedicated connections between firms that only larger firms can afford.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
62
The CANSPAM Act of 2003 has proven to be extremely successful at shutting down businesses that rely heavily on spamming to generate sales.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
63
Spam is a type of malware.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
64
Radio frequency identification technology stores information on a microchip that can be read by the correct reading device if within a certain range of the chip.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
65
One advantage of the emarketplace is that it enables sellers and buyers to contact and negotiate with a large number of market participants.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
66
Malware is a hardware developed or created with malicious intent.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
67
Spyware installs itself on a computer without permission and then tracks computer behavior.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
68
Computer viruses and worms must each be attached to other files in order to spread across computer networks.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
69
Emarketplaces often provide additional servicesbeyond simple tradethat allow firms to exchange information and collaborate, thus forging tighter supply chain relationships.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
70
Spam filters exist that help detect and eliminate spam.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
71
Emarketplaces are primarily used by participants in the B2C market.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
72
Worms are an example of malware that spread by attaching themselves to files that are then transferred from computer to computer.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
73
The main purpose of radio frequency identification chips is to transmit a serial number that uniquely identifies a product or device.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
74
The basic difference between computer viruses and spyware is that a virus has the ability to spread from one computer to another while transferring data.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
75
The key advantage of radio frequency identification technology is that it allows a seller of a product to track and monitor a buyer's use of that product.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
76
Spyware is often installed when users download and install freeware on their computers.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
77
Computer viruses can erase or modify data on a hard drive, prevent a computer from booting up, and find and send personal information stored on the hard drive to unauthorized people.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
78
Spam refers to unsolicited email advertisements usually sent to very large numbers of recipients, many of whom may not have interest in the message.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
79
Pathtiesmhipntg t ois g ae ts cthamem w thoe dreiv ouflfgiec iparlivloaotek iinngfo ermmaaitliso na rseu scehn at st op ainsdswivoidrdusa,ls in an usernames, and account numbers.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck
80
Margaret Reed works for a major manufacturer that is having trouble tracking components and materials as they move through a supply chain. Margaret wants to find a technology that will uniquely identify items to simplify the tracking process. Margaret should consider radio frequency identification chips to solve this problem.
Unlock Deck
Unlock for access to all 200 flashcards in this deck.
Unlock Deck
k this deck