Filters
Question type

Study Flashcards

A computer virus is a piece of programming code that is inserted into other programming code with the intention of causing some unexpected,and usually undesirable,event for the user of the software.

A) True
B) False

Correct Answer

verifed

verified

Which of the following is the best assessment of the impact extranets have had on the way small businesses operate?


A) As yet,extranet technology has had little impact on small businesses,because the technology is too new and expensive.
B) The development of extranets has put small firms at a serious competitive disadvantage,because suppliers and customers are more willing to participate in extranets set up by larger organizations.
C) The use of extranets enables small firms to share and process data in ways that had been available in the past only to large firms that could afford electronic data interchange technology.
D) The extranet has made it easier for small firms to offer their goods and services to the general public because of the increased bandwidth this technology provides.

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

A disadvantage of network systems is that they create barriers that limit communication across functional boundaries.

A) True
B) False

Correct Answer

verifed

verified

Moore's Law says that the capacity of computer chips _________ every year or so.


A) increases by 20 percent
B) increases by 50 percent
C) doubles
D) triples

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Larry Kotter has just learned that his company has been reading the e-mail messages he has sent while at work without getting his permission.Harry can sue the company for invasion of privacy under the Electronic Communications Privacy Act of 1997.

A) True
B) False

Correct Answer

verifed

verified

Computing costs go up with productivity losses as a company upgrades and troubleshoots equipment as well as trains employees to use the system.

A) True
B) False

Correct Answer

verifed

verified

Widebeam is the term used to refer to technologies that give users continuous access to the Internet and greatly increase the speed at which data flows to and from their Internet connection.

A) True
B) False

Correct Answer

verifed

verified

The quality of management information depends on its accuracy and reliability.

A) True
B) False

Correct Answer

verifed

verified

High quality information is:


A) accurate and reliable.
B) normative and open ended.
C) simple and easy to use.
D) subjective and unique.

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Computer technology has become so stable and mature in recent years that,except for problems caused by viruses and hackers,major glitches are essentially a thing of the past.

A) True
B) False

Correct Answer

verifed

verified

A common use of an extranet is to extend an intranet to outside customers.

A) True
B) False

Correct Answer

verifed

verified

Janelle is shopping for jeans from one of her favorite online retailers.She clicks on a style that interests her.The website quickly presents her with a close-up view of her selection and additional information that will help her make a decision.When she adds the jeans to her "cart," the website quickly shows her that other customers that purchased the same pair of jeans also purchased a particular shirt and boots.As the retailer's website learns more about Janelle and her purchase preferences,it is able to push other ideas toward her,and potentially increase the online retailer's units per transaction.The technology that generates this type of intelligence and personalization is called _________.


A) social media.
B) cookie mining.
C) Web 2.0.
D) Web 3.0.

E) None of the above
F) C) and D)

Correct Answer

verifed

verified

One advantage of a network computing system is that it gives employees access to detailed information.

A) True
B) False

Correct Answer

verifed

verified

People in marketing want Cy's help because they are convinced that many hidden patterns and unexpected relationships could be found in the mountains of data the company accumulates.They think that discovering these relationships might help them develop new marketing strategies.This suggests that Cy's next project will be concerned with:


A) datametric analysis.
B) data mining.
C) data refining.
D) data orienteering.

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

Y-5 Connections manufactures wireless equipment for laptop computers and PDAs.Current trends suggest that Y-5 should find the market for its products has strong growth potential.

A) True
B) False

Correct Answer

verifed

verified

Employees of a business ____________ when they work at home,using computers linked to their organization's office.


A) mainstream
B) teleproduce
C) telecommute
D) compucommute

E) C) and D)
F) A) and B)

Correct Answer

verifed

verified

One problem with most extranets is that they use public lines,which makes it possible for hackers to get into the network.

A) True
B) False

Correct Answer

verifed

verified

Business process information includes all transaction data gathered at the point of sale.

A) True
B) False

Correct Answer

verifed

verified

According to the late Steve Jobs Apple) and Bill Gates Microsoft) ,in the very near future,everything that you have saved on your computer will be available to you through your smart phone,your electronic tablet,or other such device as long as you have Internet service.The technical name for the ability to store an unlimited amount of data,accessible in real-time is _________.


A) virtuality reality.
B) data processing.
C) data mining.
D) cloud computing.

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

One of the problems with extranets is that they:


A) are semiprivate,so it is possible for hackers to gain access to information on the system.
B) use an old technology that is not as fast at transferring data as the Internet.
C) cannot be accessed by people unless they are employees of the company.
D) have no ability to handle common e-mail protocols.

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

Showing 161 - 180 of 224

Related Exams

Show Answer