Deck 14: Using Technology to Manage Information

Full screen (f)
exit full mode
Question
MATCHING
Complete the following using the terms listed.
a.CIO
b.VoIP
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.WiFi
h.intranet
i.malware
j.local area network
k.data
l.grid computing
m.expert system
n.executive support system
o.spyware
p.database
q.cloud computing
r.botnet
A system that allows top managers to access a firm's primary databases is called a(n)_____.
Use Space or
up arrow
down arrow
to flip the card.
Question
MATCHING
Complete the following using the terms listed.
a.CIO
b.VoIP
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.WiFi
h.intranet
i.malware
j.local area network
k.data
l.grid computing
m.expert system
n.executive support system
o.spyware
p.database
q.cloud computing
r.botnet
_____ uses powerful servers to store applications software and databases for users to access via the Web.
Question
MATCHING
Complete the following using the terms listed.
a.CIO
b.VoIP
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.WiFi
h.intranet
i.malware
j.local area network
k.data
l.grid computing
m.expert system
n.executive support system
o.spyware
p.database
q.cloud computing
r.botnet
The purpose of a(n)_____ is to limit data transfers to certain locations and log system use so that managers can identify threats to a system's security.
Question
MATCHING
Complete the following using the terms listed.
a.CIO
b.VoIP
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.WiFi
h.intranet
i.malware
j.local area network
k.data
l.grid computing
m.expert system
n.executive support system
o.spyware
p.database
q.cloud computing
r.botnet
_____ consists of a network of smaller computers running special software.
Question
Explain the difference between data and information.
Question
MATCHING
Complete the following using the terms listed.
a.CIO
b.VoIP
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.WiFi
h.intranet
i.malware
j.local area network
k.data
l.grid computing
m.expert system
n.executive support system
o.spyware
p.database
q.cloud computing
r.botnet
A(n)_____ is an outside company that specializes in providing both computers and the application support for managing information systems of business clients.
Question
MATCHING
Complete the following using the terms listed.
a.CIO
b.VoIP
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.WiFi
h.intranet
i.malware
j.local area network
k.data
l.grid computing
m.expert system
n.executive support system
o.spyware
p.database
q.cloud computing
r.botnet
A(n)_____ is a network of PCs that have been infected with one or more data-stealing viruses.
Question
MATCHING
Complete the following using the terms listed.
a.CIO
b.VoIP
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.WiFi
h.intranet
i.malware
j.local area network
k.data
l.grid computing
m.expert system
n.executive support system
o.spyware
p.database
q.cloud computing
r.botnet
A(n)_____ is a computer program that imitates human thinking through complicated sets of "if-then" rules.
Question
Describe the average company's balance between high tech and low tech.
Question
MATCHING
Complete the following using the terms listed.
a.CIO
b.VoIP
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.WiFi
h.intranet
i.malware
j.local area network
k.data
l.grid computing
m.expert system
n.executive support system
o.spyware
p.database
q.cloud computing
r.botnet
A company network that links employees via Internet tools is called a(n)_____.
Question
MATCHING
Complete the following using the terms listed.
a.CIO
b.VoIP
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.WiFi
h.intranet
i.malware
j.local area network
k.data
l.grid computing
m.expert system
n.executive support system
o.spyware
p.database
q.cloud computing
r.botnet
A secure connection between two points on the Internet is known as a(n)_____.
Question
MATCHING
Complete the following using the terms listed.
a.CIO
b.VoIP
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.WiFi
h.intranet
i.malware
j.local area network
k.data
l.grid computing
m.expert system
n.executive support system
o.spyware
p.database
q.cloud computing
r.botnet
A(n)_____ is an executive responsible for managing a firm's information system and related computer technologies.
Question
MATCHING
Complete the following using the terms listed.
a.CIO
b.VoIP
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.WiFi
h.intranet
i.malware
j.local area network
k.data
l.grid computing
m.expert system
n.executive support system
o.spyware
p.database
q.cloud computing
r.botnet
_____ software secretly gathers user information through the user's Internet connection without the user's knowledge.
Question
MATCHING
Complete the following using the terms listed.
a.CIO
b.VoIP
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.WiFi
h.intranet
i.malware
j.local area network
k.data
l.grid computing
m.expert system
n.executive support system
o.spyware
p.database
q.cloud computing
r.botnet
A computer network that connects machines within a limited area is called a(n)_____.
Question
MATCHING
Complete the following using the terms listed.
a.CIO
b.VoIP
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.WiFi
h.intranet
i.malware
j.local area network
k.data
l.grid computing
m.expert system
n.executive support system
o.spyware
p.database
q.cloud computing
r.botnet
Malicious software programs such as worms,viruses,and Trojan horses designed to infect computer systems are known as _____.
Question
MATCHING
Complete the following using the terms listed.
a.CIO
b.VoIP
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.WiFi
h.intranet
i.malware
j.local area network
k.data
l.grid computing
m.expert system
n.executive support system
o.spyware
p.database
q.cloud computing
r.botnet
_____ is a wireless network that connects various devices and allows them to communicate with one another through radio waves.
Question
MATCHING
Complete the following using the terms listed.
a.CIO
b.VoIP
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.WiFi
h.intranet
i.malware
j.local area network
k.data
l.grid computing
m.expert system
n.executive support system
o.spyware
p.database
q.cloud computing
r.botnet
_______ consist(s)of raw facts and figures that may or may not be relevant to business decisions.
Question
MATCHING
Complete the following using the terms listed.
a.CIO
b.VoIP
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.WiFi
h.intranet
i.malware
j.local area network
k.data
l.grid computing
m.expert system
n.executive support system
o.spyware
p.database
q.cloud computing
r.botnet
Telephones connected via _____ use personal computers with broadband connections in place of a traditional phone jack.
Question
MATCHING
Complete the following using the terms listed.
a.CIO
b.VoIP
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.WiFi
h.intranet
i.malware
j.local area network
k.data
l.grid computing
m.expert system
n.executive support system
o.spyware
p.database
q.cloud computing
r.botnet
A(n)_____ is an information system that quickly provides relevant data to help people make decisions and choose courses of action.
Question
MATCHING
Complete the following using the terms listed.
a.CIO
b.VoIP
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.WiFi
h.intranet
i.malware
j.local area network
k.data
l.grid computing
m.expert system
n.executive support system
o.spyware
p.database
q.cloud computing
r.botnet
A centralized integrated collection of data resources is known as a(n)_____.
Question
Explain the differences among a virus,a worm,and a Trojan horse.
Question
Marsha is a television executive whose team recently conducted demographic research for new programs.Marsha will be expected to write a detailed ________ report about the impact of this study and the effect of the network's marketing strategy.

A)data
B)groupware
C)database
D)information
Question
Define databases and describe how they are obtained and their uses.
Question
Which of the following statements best describes the purpose of a management information system?

A)assist the human resources department with research on employee benefit costs
B)provide management with feedback from sales meetings
C)provide information on internal operations and external intelligence for use in decision making
D)provide the accounting department with budget information
Question
Job is a salesperson and is visiting one of his largest clients.Before the visit,he reviewed the client's past purchases.Job used the firm's ________ system.

A)executive information
B)decision support
C)expert
D)enterprise resource planning
Question
The person who directs a firm's management information systems and related computer operations is often called the ________.

A)financial advisor
B)chief information officer
C)executive information manager
D)chief executive officer
Question
Describe a wide area network and explain how companies use it.
Question
Ashley,a chief executive officer,reviews the internal performance of her company's stock,as well as market trends for the industry.To access this information,Ashley uses a(n)________.

A)enterprise planning resource
B)executive support system
C)expert system
D)decision support system
Question
Describe at least two ways that common e-crimes occur:
Question
Raw facts and figures are ________.

A)data
B)information
C)a management information system
D)the basis for business decision making
Question
Provide the five important tasks for off-site data storage.
Question
List and briefly explain the most widely used business applications of computers.
Question
Explain the difference between hardware and software.Give examples of both.
Question
An information system that provides relevant data to help businesspeople choose the appropriate course of action is called a(n)________.

A)decision support system
B)expert system
C)executive information system
D)database
Question
Which of the following is considered information rather than data?

A)projected population growth in a target market
B)a measure of the effectiveness of a promotional strategy
C)income distribution in a target market
D)product sales in various categories
Question
Identify four significant trends regarding information systems.
Question
A computer program that imitates human thinking is a(n)________.

A)information interface
B)decision support system
C)enterprise resource planning system
D)expert system
Question
Provide examples of ethical concerns regarding technology and information systems.
Question
One of the largest online databases is owned by ________.

A)IBM
B)the U.S.Census Bureau
C)the Federal Trade Commission (FTC)
D)Microsoft
Question
A database can best be described as ________.

A)data that has been converted into information
B)data gathered at random from a variety of sources
C)a centralized integrated collection of the organization's data resources
D)a loose collection of ideas
Question
Cassie would like her company to fund a worthwhile project and has accumulated valuable charts and graphs regarding market shares,territories,and projected sales.In order to achieve maximum impact,Cassie should communicate her information via ________.

A)staging software
B)desktop publishing
C)presentation software
D)production software
Question
Drew purchases a new game for his computer.He will load the program onto the computer's hard drive.Drew is buying ________.

A)an output device
B)a warranty
C)application software
D)an operating system
Question
The largest type of computer system with the most extensive storage capacity and the fastest processing speeds is a ________.

A)hand held device
B)personal computer
C)mainframe computer
D)midrange system
Question
Raul works in the mortgage loan department of a bank.He enters information on credit applications into the bank's computer system.The system has a program that evaluates the loan application and gives it a score.Raul is using a(n)________.

A)expert system
B)enterprise resource planning system
C)decision support system
D)information interface
Question
________ software controls the basic workings of the computer system.

A)Expert
B)Executive information system
C)Database
D)Operating
Question
All Wal-Mart stores have satellite dishes that link stores together with the company's headquarters.Wal-Mart is using a(n)________.

A)wide area network
B)enterprise resource system
C)expert system
D)local area network
Question
A program that performs specific tasks that the user wants to carry out is called ________.

A)software
B)the operating system
C)a management information system
D)application software
Question
Which of the following is an application program?

A)UNIX
B)Java
C)Microsoft Windows
D)Microsoft Excel
Question
Eliot is trying to close a particularly difficult sale.He uses his PDA (personal digital assistant)and a special program to access information within his company's database on pricing.Eliot is using an ________.

A)expert system
B)enterprise resource planning system
C)executive support system
D)application service provider
Question
All of the following devices are computer hardware EXCEPT a ________.

A)monitor
B)printer driver
C)fax machine
D)mouse
Question
Electronic spreadsheets ________.

A)are a special software used to create graphics
B)can replace managerial judgment in decision making
C)are used for numeric and statistical data
D)are very difficult to use
Question
An expert system would most likely be used to ________.

A)retrieve sales data
B)determine the status of a customer's order
C)determine the optimal layout of a plant
D)access relevant data from the company's database
Question
Which of the following reasons is a reason for the increasing popularity of notebook computers?

A)more computing capacity than midrange systems
B)limited displays
C)faster processing speeds
D)higher prices
Question
Aaron is sitting at his computer preparing a new sales brochure.The brochure combines high-quality type,graphics,and photographs.What type of software is Aaron likely using to create the brochure?

A)word processing program
B)desktop publishing program
C)presentation graphics program
D)spreadsheet program
Question
Kat is sitting at her computer analyzing the financial impact of an increase in her company's sales growth rate.Kat is probably using a ________ program.

A)spreadsheet
B)presentation
C)word processor
D)desktop publishing
Question
On Realtor.com,homebuyers enter information regarding their preferred home location,price,and features.Using an ________,the Web site will automatically display real estate properties that match the homebuyer's criteria.

A)executive information system
B)encryption
C)application service provider
D)expert system
Question
Mike is putting together a presentation for senior management analyzing a potential new market.He is using his computer to create charts or graphs that he will then show as slides.Which of the following software programs is Mike most likely using to create his presentation?

A)Microsoft Word
B)Microsoft Excel
C)Microsoft Windows
D)Microsoft PowerPoint
Question
Which of the following is the most recent development in notebook computers?

A)PDA
B)tablet PC
C)minicomputer
D)netbook
Question
Which of the following is a storage device?

A)flash memory card
B)modem
C)monitor
D)scanner
Question
Maria is on a business trip.From her hotel,she uses her computer to access her company's network,checking her e-mail and calendar.Maria's company has a(n)________.

A)Internet
B)virtual private network
C)intranet
D)extranet
Question
Information is the result of processed data.
Question
A program that attaches itself to other programs and changes programs or destroys data is a(n)________.

A)computer virus
B)purge program
C)inoculation program
D)immunity deficiency program
Question
Sales figures are an example of data.
Question
The heart of a management information system is the software.
Question
Deciding how to prevent system failures along with the ability to continue operating if computer systems fail is called ________.

A)disaster recovery planning
B)information systems management
C)advanced computer security
D)virus protection
Question
Data alone are of limited value to a company.
Question
Information overload is more of a problem today because of improved technology.
Question
An outside supplier used to provide computer and application support for managing an information system is known as ________.

A)an application service provider
B)an application maintenance provider
C)utility computing
D)on-demand computing
Question
Which of the following is an unreasonable response to potential computer problems? ________.

A)using online storage services
B)limiting computer access to only a handful of senior managers
C)installing extra hardware in a secure location
D)routinely backing up software and data
Question
Jose purchased a company and discovered that his employees were using different operating systems.Instead of spending considerable time and expense getting everyone on the same system,Jose established a(n)________ to create company bulletin boards,share documents,and conduct online conferencing.

A)extranet
B)intranet
C)virtual private network
D)Internet
Question
All of the following are advantages of VoIP EXCEPT ________.

A)increased flexibility
B)increased security
C)lower cost
D)additional features
Question
Dana's office in south Florida was destroyed by a hurricane last year,and she lost numerous company documents.After relocating,Dana took no chances and implemented ________,in which she backed up her data in a secure online storage service.

A)enterprise resource planning
B)a firewall
C)encryption
D)a disaster recovery plan
Question
Mac downloaded some company information into a spreadsheet so that he could work on it at home.When he returned to work,he inserted his memory card into his company computer.Within minutes,all of his hard drive files were corrupted.The most likely cause was a(n)________.

A)malfunctioning computer
B)intranet failure
C)computer virus
D)bad operating system
Question
A new wireless standard called ________ has the potential to bring high-speed Internet access to rural areas where traditional forms of broadband access are too expensive or impractical.

A)intranet
B)VPN
C)Wi-Max
D)VoIP
Question
Credit card applications are often evaluated using executive systems.
Question
Joan belongs to several online card clubs.When she downloaded a recommended bridge game,she unknowingly received a ________,which ultimately damaged the hard drive on her computer.

A)worm
B)software application
C)Trojan horse
D)firewall
Question
________ tie geographic regions together using long-distance telephone lines or satellite transmissions.

A)Local area networks
B)Executive information systems
C)Databases
D)Wide area networks
Question
Decision support systems provide support to people making business decisions.
Question
Gavin's company has installed a system to make data transmission secure.Therefore,he can use the Internet to send and receive sensitive data.Gavin's company has installed a(n)________.

A)virtual private network
B)wide area network
C)Intranet
D)extranet
Question
The main purpose of management information systems is to help managers make better decisions.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/112
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 14: Using Technology to Manage Information
1
MATCHING
Complete the following using the terms listed.
a.CIO
b.VoIP
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.WiFi
h.intranet
i.malware
j.local area network
k.data
l.grid computing
m.expert system
n.executive support system
o.spyware
p.database
q.cloud computing
r.botnet
A system that allows top managers to access a firm's primary databases is called a(n)_____.
N
2
MATCHING
Complete the following using the terms listed.
a.CIO
b.VoIP
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.WiFi
h.intranet
i.malware
j.local area network
k.data
l.grid computing
m.expert system
n.executive support system
o.spyware
p.database
q.cloud computing
r.botnet
_____ uses powerful servers to store applications software and databases for users to access via the Web.
Q
3
MATCHING
Complete the following using the terms listed.
a.CIO
b.VoIP
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.WiFi
h.intranet
i.malware
j.local area network
k.data
l.grid computing
m.expert system
n.executive support system
o.spyware
p.database
q.cloud computing
r.botnet
The purpose of a(n)_____ is to limit data transfers to certain locations and log system use so that managers can identify threats to a system's security.
D
4
MATCHING
Complete the following using the terms listed.
a.CIO
b.VoIP
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.WiFi
h.intranet
i.malware
j.local area network
k.data
l.grid computing
m.expert system
n.executive support system
o.spyware
p.database
q.cloud computing
r.botnet
_____ consists of a network of smaller computers running special software.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
5
Explain the difference between data and information.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
6
MATCHING
Complete the following using the terms listed.
a.CIO
b.VoIP
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.WiFi
h.intranet
i.malware
j.local area network
k.data
l.grid computing
m.expert system
n.executive support system
o.spyware
p.database
q.cloud computing
r.botnet
A(n)_____ is an outside company that specializes in providing both computers and the application support for managing information systems of business clients.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
7
MATCHING
Complete the following using the terms listed.
a.CIO
b.VoIP
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.WiFi
h.intranet
i.malware
j.local area network
k.data
l.grid computing
m.expert system
n.executive support system
o.spyware
p.database
q.cloud computing
r.botnet
A(n)_____ is a network of PCs that have been infected with one or more data-stealing viruses.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
8
MATCHING
Complete the following using the terms listed.
a.CIO
b.VoIP
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.WiFi
h.intranet
i.malware
j.local area network
k.data
l.grid computing
m.expert system
n.executive support system
o.spyware
p.database
q.cloud computing
r.botnet
A(n)_____ is a computer program that imitates human thinking through complicated sets of "if-then" rules.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
9
Describe the average company's balance between high tech and low tech.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
10
MATCHING
Complete the following using the terms listed.
a.CIO
b.VoIP
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.WiFi
h.intranet
i.malware
j.local area network
k.data
l.grid computing
m.expert system
n.executive support system
o.spyware
p.database
q.cloud computing
r.botnet
A company network that links employees via Internet tools is called a(n)_____.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
11
MATCHING
Complete the following using the terms listed.
a.CIO
b.VoIP
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.WiFi
h.intranet
i.malware
j.local area network
k.data
l.grid computing
m.expert system
n.executive support system
o.spyware
p.database
q.cloud computing
r.botnet
A secure connection between two points on the Internet is known as a(n)_____.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
12
MATCHING
Complete the following using the terms listed.
a.CIO
b.VoIP
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.WiFi
h.intranet
i.malware
j.local area network
k.data
l.grid computing
m.expert system
n.executive support system
o.spyware
p.database
q.cloud computing
r.botnet
A(n)_____ is an executive responsible for managing a firm's information system and related computer technologies.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
13
MATCHING
Complete the following using the terms listed.
a.CIO
b.VoIP
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.WiFi
h.intranet
i.malware
j.local area network
k.data
l.grid computing
m.expert system
n.executive support system
o.spyware
p.database
q.cloud computing
r.botnet
_____ software secretly gathers user information through the user's Internet connection without the user's knowledge.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
14
MATCHING
Complete the following using the terms listed.
a.CIO
b.VoIP
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.WiFi
h.intranet
i.malware
j.local area network
k.data
l.grid computing
m.expert system
n.executive support system
o.spyware
p.database
q.cloud computing
r.botnet
A computer network that connects machines within a limited area is called a(n)_____.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
15
MATCHING
Complete the following using the terms listed.
a.CIO
b.VoIP
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.WiFi
h.intranet
i.malware
j.local area network
k.data
l.grid computing
m.expert system
n.executive support system
o.spyware
p.database
q.cloud computing
r.botnet
Malicious software programs such as worms,viruses,and Trojan horses designed to infect computer systems are known as _____.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
16
MATCHING
Complete the following using the terms listed.
a.CIO
b.VoIP
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.WiFi
h.intranet
i.malware
j.local area network
k.data
l.grid computing
m.expert system
n.executive support system
o.spyware
p.database
q.cloud computing
r.botnet
_____ is a wireless network that connects various devices and allows them to communicate with one another through radio waves.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
17
MATCHING
Complete the following using the terms listed.
a.CIO
b.VoIP
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.WiFi
h.intranet
i.malware
j.local area network
k.data
l.grid computing
m.expert system
n.executive support system
o.spyware
p.database
q.cloud computing
r.botnet
_______ consist(s)of raw facts and figures that may or may not be relevant to business decisions.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
18
MATCHING
Complete the following using the terms listed.
a.CIO
b.VoIP
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.WiFi
h.intranet
i.malware
j.local area network
k.data
l.grid computing
m.expert system
n.executive support system
o.spyware
p.database
q.cloud computing
r.botnet
Telephones connected via _____ use personal computers with broadband connections in place of a traditional phone jack.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
19
MATCHING
Complete the following using the terms listed.
a.CIO
b.VoIP
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.WiFi
h.intranet
i.malware
j.local area network
k.data
l.grid computing
m.expert system
n.executive support system
o.spyware
p.database
q.cloud computing
r.botnet
A(n)_____ is an information system that quickly provides relevant data to help people make decisions and choose courses of action.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
20
MATCHING
Complete the following using the terms listed.
a.CIO
b.VoIP
c.decision support system
d.firewall
e.application service provider
f.virtual private network
g.WiFi
h.intranet
i.malware
j.local area network
k.data
l.grid computing
m.expert system
n.executive support system
o.spyware
p.database
q.cloud computing
r.botnet
A centralized integrated collection of data resources is known as a(n)_____.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
21
Explain the differences among a virus,a worm,and a Trojan horse.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
22
Marsha is a television executive whose team recently conducted demographic research for new programs.Marsha will be expected to write a detailed ________ report about the impact of this study and the effect of the network's marketing strategy.

A)data
B)groupware
C)database
D)information
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
23
Define databases and describe how they are obtained and their uses.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
24
Which of the following statements best describes the purpose of a management information system?

A)assist the human resources department with research on employee benefit costs
B)provide management with feedback from sales meetings
C)provide information on internal operations and external intelligence for use in decision making
D)provide the accounting department with budget information
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
25
Job is a salesperson and is visiting one of his largest clients.Before the visit,he reviewed the client's past purchases.Job used the firm's ________ system.

A)executive information
B)decision support
C)expert
D)enterprise resource planning
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
26
The person who directs a firm's management information systems and related computer operations is often called the ________.

A)financial advisor
B)chief information officer
C)executive information manager
D)chief executive officer
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
27
Describe a wide area network and explain how companies use it.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
28
Ashley,a chief executive officer,reviews the internal performance of her company's stock,as well as market trends for the industry.To access this information,Ashley uses a(n)________.

A)enterprise planning resource
B)executive support system
C)expert system
D)decision support system
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
29
Describe at least two ways that common e-crimes occur:
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
30
Raw facts and figures are ________.

A)data
B)information
C)a management information system
D)the basis for business decision making
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
31
Provide the five important tasks for off-site data storage.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
32
List and briefly explain the most widely used business applications of computers.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
33
Explain the difference between hardware and software.Give examples of both.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
34
An information system that provides relevant data to help businesspeople choose the appropriate course of action is called a(n)________.

A)decision support system
B)expert system
C)executive information system
D)database
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
35
Which of the following is considered information rather than data?

A)projected population growth in a target market
B)a measure of the effectiveness of a promotional strategy
C)income distribution in a target market
D)product sales in various categories
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
36
Identify four significant trends regarding information systems.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
37
A computer program that imitates human thinking is a(n)________.

A)information interface
B)decision support system
C)enterprise resource planning system
D)expert system
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
38
Provide examples of ethical concerns regarding technology and information systems.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
39
One of the largest online databases is owned by ________.

A)IBM
B)the U.S.Census Bureau
C)the Federal Trade Commission (FTC)
D)Microsoft
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
40
A database can best be described as ________.

A)data that has been converted into information
B)data gathered at random from a variety of sources
C)a centralized integrated collection of the organization's data resources
D)a loose collection of ideas
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
41
Cassie would like her company to fund a worthwhile project and has accumulated valuable charts and graphs regarding market shares,territories,and projected sales.In order to achieve maximum impact,Cassie should communicate her information via ________.

A)staging software
B)desktop publishing
C)presentation software
D)production software
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
42
Drew purchases a new game for his computer.He will load the program onto the computer's hard drive.Drew is buying ________.

A)an output device
B)a warranty
C)application software
D)an operating system
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
43
The largest type of computer system with the most extensive storage capacity and the fastest processing speeds is a ________.

A)hand held device
B)personal computer
C)mainframe computer
D)midrange system
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
44
Raul works in the mortgage loan department of a bank.He enters information on credit applications into the bank's computer system.The system has a program that evaluates the loan application and gives it a score.Raul is using a(n)________.

A)expert system
B)enterprise resource planning system
C)decision support system
D)information interface
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
45
________ software controls the basic workings of the computer system.

A)Expert
B)Executive information system
C)Database
D)Operating
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
46
All Wal-Mart stores have satellite dishes that link stores together with the company's headquarters.Wal-Mart is using a(n)________.

A)wide area network
B)enterprise resource system
C)expert system
D)local area network
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
47
A program that performs specific tasks that the user wants to carry out is called ________.

A)software
B)the operating system
C)a management information system
D)application software
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
48
Which of the following is an application program?

A)UNIX
B)Java
C)Microsoft Windows
D)Microsoft Excel
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
49
Eliot is trying to close a particularly difficult sale.He uses his PDA (personal digital assistant)and a special program to access information within his company's database on pricing.Eliot is using an ________.

A)expert system
B)enterprise resource planning system
C)executive support system
D)application service provider
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
50
All of the following devices are computer hardware EXCEPT a ________.

A)monitor
B)printer driver
C)fax machine
D)mouse
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
51
Electronic spreadsheets ________.

A)are a special software used to create graphics
B)can replace managerial judgment in decision making
C)are used for numeric and statistical data
D)are very difficult to use
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
52
An expert system would most likely be used to ________.

A)retrieve sales data
B)determine the status of a customer's order
C)determine the optimal layout of a plant
D)access relevant data from the company's database
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
53
Which of the following reasons is a reason for the increasing popularity of notebook computers?

A)more computing capacity than midrange systems
B)limited displays
C)faster processing speeds
D)higher prices
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
54
Aaron is sitting at his computer preparing a new sales brochure.The brochure combines high-quality type,graphics,and photographs.What type of software is Aaron likely using to create the brochure?

A)word processing program
B)desktop publishing program
C)presentation graphics program
D)spreadsheet program
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
55
Kat is sitting at her computer analyzing the financial impact of an increase in her company's sales growth rate.Kat is probably using a ________ program.

A)spreadsheet
B)presentation
C)word processor
D)desktop publishing
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
56
On Realtor.com,homebuyers enter information regarding their preferred home location,price,and features.Using an ________,the Web site will automatically display real estate properties that match the homebuyer's criteria.

A)executive information system
B)encryption
C)application service provider
D)expert system
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
57
Mike is putting together a presentation for senior management analyzing a potential new market.He is using his computer to create charts or graphs that he will then show as slides.Which of the following software programs is Mike most likely using to create his presentation?

A)Microsoft Word
B)Microsoft Excel
C)Microsoft Windows
D)Microsoft PowerPoint
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
58
Which of the following is the most recent development in notebook computers?

A)PDA
B)tablet PC
C)minicomputer
D)netbook
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
59
Which of the following is a storage device?

A)flash memory card
B)modem
C)monitor
D)scanner
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
60
Maria is on a business trip.From her hotel,she uses her computer to access her company's network,checking her e-mail and calendar.Maria's company has a(n)________.

A)Internet
B)virtual private network
C)intranet
D)extranet
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
61
Information is the result of processed data.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
62
A program that attaches itself to other programs and changes programs or destroys data is a(n)________.

A)computer virus
B)purge program
C)inoculation program
D)immunity deficiency program
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
63
Sales figures are an example of data.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
64
The heart of a management information system is the software.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
65
Deciding how to prevent system failures along with the ability to continue operating if computer systems fail is called ________.

A)disaster recovery planning
B)information systems management
C)advanced computer security
D)virus protection
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
66
Data alone are of limited value to a company.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
67
Information overload is more of a problem today because of improved technology.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
68
An outside supplier used to provide computer and application support for managing an information system is known as ________.

A)an application service provider
B)an application maintenance provider
C)utility computing
D)on-demand computing
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
69
Which of the following is an unreasonable response to potential computer problems? ________.

A)using online storage services
B)limiting computer access to only a handful of senior managers
C)installing extra hardware in a secure location
D)routinely backing up software and data
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
70
Jose purchased a company and discovered that his employees were using different operating systems.Instead of spending considerable time and expense getting everyone on the same system,Jose established a(n)________ to create company bulletin boards,share documents,and conduct online conferencing.

A)extranet
B)intranet
C)virtual private network
D)Internet
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
71
All of the following are advantages of VoIP EXCEPT ________.

A)increased flexibility
B)increased security
C)lower cost
D)additional features
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
72
Dana's office in south Florida was destroyed by a hurricane last year,and she lost numerous company documents.After relocating,Dana took no chances and implemented ________,in which she backed up her data in a secure online storage service.

A)enterprise resource planning
B)a firewall
C)encryption
D)a disaster recovery plan
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
73
Mac downloaded some company information into a spreadsheet so that he could work on it at home.When he returned to work,he inserted his memory card into his company computer.Within minutes,all of his hard drive files were corrupted.The most likely cause was a(n)________.

A)malfunctioning computer
B)intranet failure
C)computer virus
D)bad operating system
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
74
A new wireless standard called ________ has the potential to bring high-speed Internet access to rural areas where traditional forms of broadband access are too expensive or impractical.

A)intranet
B)VPN
C)Wi-Max
D)VoIP
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
75
Credit card applications are often evaluated using executive systems.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
76
Joan belongs to several online card clubs.When she downloaded a recommended bridge game,she unknowingly received a ________,which ultimately damaged the hard drive on her computer.

A)worm
B)software application
C)Trojan horse
D)firewall
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
77
________ tie geographic regions together using long-distance telephone lines or satellite transmissions.

A)Local area networks
B)Executive information systems
C)Databases
D)Wide area networks
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
78
Decision support systems provide support to people making business decisions.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
79
Gavin's company has installed a system to make data transmission secure.Therefore,he can use the Internet to send and receive sensitive data.Gavin's company has installed a(n)________.

A)virtual private network
B)wide area network
C)Intranet
D)extranet
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
80
The main purpose of management information systems is to help managers make better decisions.
Unlock Deck
Unlock for access to all 112 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 112 flashcards in this deck.