Deck 15: Managing Information and Technology: Finding New Ways to Learn and Link
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/170
Play
Full screen (f)
Deck 15: Managing Information and Technology: Finding New Ways to Learn and Link
1
A database is a type of software that is primarily used to perform computations based on complex formulas,such as those used by accountants or engineers.
False
2
Expert systems help their users solve a problem or accomplish a task by asking the user a series of questions,basing each new question on the response to previous questions.The program continues to ask questions until it has enough information to reach a decision and make a recommendation.
True
3
The Internet is a network of networks,consisting of hundreds of thousands of smaller networks,operating under a common set of rules so each can communicate with the others.
True
4
The World Wide Web is the part of the Internet that consists of documents written in HTML.This is the part of the Internet that receives the most attention from the general public.
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
5
Utility programs are supplemental operating system software,such as firewalls,spam blockers,and other security software.
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
6
Businesses use pull technology to automatically deliver information quickly and conveniently to an end user's computer desktop.
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
7
A data warehouse is a large,organization-wide database providing a centralized location for storing data from both the organization's own databases and external sources.
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
8
Hardware consists of computer programs that provide instructions to a computer so that it can perform a desired task.
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
9
Utility programs are applications software packages,such as word processor and spreadsheet programs,that help users perform a desired task.
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
10
The fundamental form of system software is the operating system,which controls the way the computer functions at its most basic level.
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
11
The World Wide Web is simply another name for the Internet.
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
12
Application software is the software that helps users perform desired tasks.
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
13
Operating systems perform tasks such as managing the computer's file system and allocating computer memory among various applications.
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
14
Horizontal market software consists of highly specialized applications used in a particular industry such as medicine,law,or accounting.
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
15
Abel Webb works for the Greater Garrisonville Power Company.His job involves creating confidential reports and other documents that he posts to an internal server.While employees can view and even download these confidential materials using a Web browser,people outside the company have no access to them.This suggests that Garrisonville Power is using an intranet.
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
16
The physical components used to collect,store,organize,and process data and to distribute information are referred to as software.
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
17
A network links computer resources using either a wired or wireless connection.
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
18
Data mining uses powerful statistical and mathematical techniques to analyze the vast amounts of data in data warehouses in order to identify information that was previously hidden.
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
19
Data are facts and figures.vThese data do not become information until they are organized and presented in a way that makes them useful to the end user.
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
20
Businesses develop intranets so valued customers have access to internal information that is not available to the general public.
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
21
AM/PM Consulting is a leader in the creation of expert systems used in a variety of industries.During the process of developing such systems for an application,AM/PM's programmers are likely to spend a lot of time interviewing human experts in that field to gain insights into how they solve problems.
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
22
Mattie O'Hara is a sales manager with Moonbux Coffee.Her sales department has a database indicating what each customer has purchased.The company is introducing a new line of gourmet coffees,and Mattie wants to contact customers who bought the Moonbux's older line of gourmet coffees to inform them of the new products.In order to obtain a list of customers,Mattie could enter a query into the database.
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
23
Viral marketing is popular with businesses because it is a legitimate online word-of-mouth promotional campaign.
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
24
B2B e-commerce consists of markets where businesses buy from and sell to other businesses.
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
25
Data are facts and figures that have been organized in a way that makes them immediately useful to decision makers.
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
26
Red Eye Shipping Inc.has purchased a business intelligence system.The main advantage of such a system is that it eliminates the need for maintaining large data warehouses and using complex techniques such as data mining.
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
27
A data warehouse is a physical storage facility used by management to store and file all hard copies of important documents generated by the business.
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
28
B2C e-commerce refers to online business trades between companies.
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
29
A query is a request for the database management software to search for data that matches specific criteria.
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
30
An advantage of an expert system is that it is capable of solving a wide variety of problems,including those that are quite different from the problems it was originally designed to solve.
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
31
A cybermediary is an Internet-based firm specializing in the secure electronic transfer of funds.
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
32
Data mining is most effective at locating relationships among data stored on small,highly specialized databases,such as the database for a single department or division within a company.
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
33
TurboTax™ is a software program that takes the customer through a series of tax-related questions.Based on the customer's responses,the system will select the next question.In the end,it provides all the information the customer needs to file a return to Canada Revenue Agency,including the amount of taxes owed or the amount of a refund to expect.TurboTaxᵀᴹ is an example of an expert system.
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
34
Businesses develop decision support systems (DSS)to give managers access to large quantities of data and the processing power to convert the data into high-quality information.
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
35
Push technologies can give managers a crucial competitive edge by providing them with good quality information quickly and conveniently.
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
36
One of the main advantages of expert systems is that they are easy and inexpensive to develop.
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
37
E-commerce refers to using the Internet to facilitate the exchange of goods and services.
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
38
Many firms have used the Internet to implement very effective viral marketing campaigns that encourage customers and others not employed by the seller to help promote the seller's products.
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
39
Viral marketing uses computer viruses to deliver unsolicited advertisements to a user's computer.
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
40
Companies use a secure socket layer (SSL)protocol to secure payment information transmitted over the Internet from a consumer to a business.
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
41
Hotmail,the free e-mail service,became a huge success due to viral marketing.Each time a Hotmail user sent an e-mail message,the recipient received a promotional message about "Hotmail" at the bottom of the page.This drew attention to the service and allowed for the rapid,impressive growth of its subscriber base.
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
42
Adware is often installed when users download and install freeware on their computers.
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
43
Electronic bill presentment and payment is a method in which bills are sent to customers via e-mail.Many banks offer this service.
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
44
A cookie is a small text file containing no programming code that is placed on your computer when you visit certain Websites.
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
45
Opt-in e-mails are the same as spam because they are unwanted messages.
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
46
Viral marketing is not as effective as traditional buzz marketing because the latter tactic allows for messages to reach a wider audience at a faster speed.
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
47
Adware is software that is installed on a computer to show advertisements.
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
48
Adware,spyware,and viruses contain no programming codes and are simple text files that can be overwritten by specialized software.
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
49
Intellectual property refers to products that result from creative and intellectual effort,such as books,musical works,inventions,and computer software.
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
50
A firewall is special material software that hackers place on your computer to prevent you from accessing your data.
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
51
Phishing is a scam where official-looking e-mails are sent to individuals in an attempt to get them to divulge private information such as passwords,usernames,and account numbers.
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
52
Hackers are skilled computer users who use their expertise to gain unauthorized access to other people's computers.
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
53
Spam is unsolicited e-mail usually sent to very large numbers of recipients,many of whom may not have interest in the message.
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
54
A secure socket layer (SSL)refers to a layer of hidden information in a data warehouse that can only be discovered by the use of data mining techniques.
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
55
A small firm that manufactures specialized automobile parts would be unable to participate in an e-marketplace since accessing such markets requires expensive specialized communications equipment that only larger firms can afford.
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
56
Unfortunately,there is almost nothing the typical computer user can do to significantly reduce the risks associated with computer viruses,hackers,and spyware.
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
57
Cookies are small strings of programming code that are installed on a computer without the user's permission in order to secretly monitor the user's Web browsing behaviour.
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
58
Cookies are text files installed on computers that enable companies to identify users who visit their Websites.
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
59
Spyware installs itself on your computer without permission and then tracks your computer behaviour.
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
60
E-marketplaces are primarily used by participants in the B2C market.
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
61
Phishers send illegitimate e-mail messages to unsuspecting individuals in an attempt to get personal information from the recipient.Often using official-sounding language and official-looking graphics,such as corporate logos,the messages appear authentic.
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
62
Black-hat hackers are hackers who have no harmful intent.Instead they hack into computers simply for the intellectual challenge it involves.
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
63
Eggbert loves to download music and video over the Internet.But he is finding that even with his high-speed connection,it sometimes takes a long time to download the files he wants.Internet2 is designed primarily to meet the needs of people like Eggbert.
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
64
Radio frequency identification (RFID)is the use of microchips to transmit information about a device,product,or person to a RFID reader that is within range.
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
65
Viruses can erase or modify data on your hard drive,prevent computer start-up,or find and send personal information stored on your hard drive to unauthorized people.Viruses are often hidden in e-mails,instant messages,or files downloaded from the Internet.
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
66
Data becomes information only when it is used for a real-life application.
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
67
Spam filters are guaranteed to stop spammers from forcing people to give private information on the Internet.
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
68
In B2C commerce transactions most sites have a SSL protocol,which stands for Selective Server Line.
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
69
The main purpose of RFID chips is to transmit a serial number that uniquely identifies a person,product,or device.
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
70
According to Facebook's policies,the company that produces a product has the right to its own page on Facebook even if someone has established a page first.
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
71
A QR code is the black and white box of lines and dots found on printed advertising and other marketing information material.
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
72
The basic difference between computer viruses on the one hand and adware and spyware on the other is that a virus has the ability to spread automatically to other computers.
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
73
Internet2 is a new Internet that utilizes technologies that give it a speed and capacity that far exceed those of the current Internet.Only institutions participating in a consortium of dues-paying members have access to Internet2.
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
74
Intellectual property that is protected by copyright law includes corporate logos.
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
75
So far the music industry is the only industry that has experienced significant losses in revenue as the result of piracy.
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
76
E-marketplaces are a great new way for companies to make quick payments with little effort but they require expensive dedicated connections between firms.
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
77
Cyberterrorists are hackers motivated by political or ideological beliefs who try to cause harm to those who do not share their beliefs.
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
78
Margaret Reed works for a major manufacturer that is having trouble tracking components and materials as they move through its supply chain.Margaret wants to find a technology that will uniquely identify items to simplify the tracking process.She is likely to be interested in considering RFID chips to solve this problem.
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
79
Deleting e-mail messages from your inbox on a regular basis is an effective way of eliminating the possibility that others will be able to read your messages.
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck
80
A strong password is any combination of at least five characters consisting of both letters and numbers and isn't a common word or name.
Unlock Deck
Unlock for access to all 170 flashcards in this deck.
Unlock Deck
k this deck