Filters
Question type

Study Flashcards

___________ looks for hidden patterns and unknown relationships among the data a firm has accumulated.


A) Tracking software
B) Econometric analysis
C) Data mining
D) Data parsing

Correct Answer

verifed

verified

________ is the term used to refer to the wireless network technology that is becoming increasingly available.


A) Airtech
B) Wi-Not
C) MPEG
D) Wi-Fi

Correct Answer

verifed

verified

Doris Cargile has been given the responsibility to find ways to store and organize the huge amount of data her firm has collected (and continues to collect) over the years.Which of the following would Doris be most likely to set up to handle this responsibility?


A) Push technology
B) Wide-area information storage technology (WAIST)
C) Data warehouses
D) Random access memory capsules

Correct Answer

verifed

verified

The use of knowledge technology should result in a(n) :


A) greater reliance on mainframe computers.
B) increase in the number of firms using spreadsheet software.
C) reduction in the amount of time managers spend searching for relevant information.
D) taller organization as firms hire more information specialists to handle the increased flow of information.

Correct Answer

verifed

verified

One of the most revolutionary impacts computer technology has had on business has been to:


A) allow employees of organizations to do much of their work at home and on the road.
B) increase the number of layers of management.
C) replace human creativity with artificial creativity.
D) make it easier for businesses to keep proprietary information safe and secure.

Correct Answer

verifed

verified

A(n) ___________ serves as an entry point to a variety of resources on an organization's information network.


A) personal information manager
B) e-transfer page
C) enterprise portal
D) subscription web page

Correct Answer

verifed

verified

The increasing use of computer networks has made computer security more complicated.

Correct Answer

verifed

verified

Compared to the Internet,a major advantage of Internet2 is that it:


A) can be accessed even by people without computers;all that is needed is a simple,inexpensive receiver,a television set,and a standard telephone line.
B) is owned and operated by the United Nations,and is accessible to people in every nation.
C) can move information much faster than the Internet and has the capacity to handle heavy-duty applications.
D) allows firms to set up their own protocols for transferring and processing information.

Correct Answer

verifed

verified

In a(n) ___________ computing system,the tasks are performed by personal computers using information stored in databases controlled by a server.


A) mainframe
B) data exchange
C) network
D) application

Correct Answer

verifed

verified

Business process information includes all transaction data gathered at the point of sale.

Correct Answer

verifed

verified

Widebeam is the term used to refer to technologies that give users continuous access to the Internet and greatly increase the speed at which data flows to and from their Internet connection.

Correct Answer

verifed

verified

Knowledge technology is a more sophisticated version of business intelligence.

Correct Answer

verifed

verified

Computer software provides the instructions that enable users to tell the computer what to do.

Correct Answer

verifed

verified

A virtual private network allows information managers to simulate a real intranet in order to identify possible security problems and technical glitches before the company sets up the actual private network.

Correct Answer

verifed

verified

High quality information is:


A) accurate and reliable.
B) normative and open ended.
C) simple and easy to use.
D) subjective and unique.

Correct Answer

verifed

verified

A firm that wanted to enable its employees to use and share data without allowing outsiders to gain access could do so by establishing a(n) :


A) extranet.
B) innernet.
C) enternet.
D) intranet.

Correct Answer

verifed

verified

Larry Kotter has just learned that his company has been reading the e-mail messages he has sent while at work without getting his permission.Harry can sue the company for invasion of privacy under the Electronic Communications Privacy Act of 1997.

Correct Answer

verifed

verified

Wi-Fi refers to a new type of computer processor technology that enables more than one instruction to be processed at the same time.

Correct Answer

verifed

verified

The reluctance of CIOs to trust their organization's critical data to a firm that does not have a track record helps explain why:


A) many managers suffer from infoglut.
B) they prefer extranets rather than intranets.
C) Internet2 is unlikely to meet with widespread acceptance.
D) many ASPs failed after the Web boom cooled off.

Correct Answer

verifed

verified

As Wi-Fi technology becomes more widespread:


A) thin-client networks will become a thing of the past.
B) mobile workers will have greater access to the Internet and their e-mail.
C) computers will become more reliable as they become more self-aware.
D) computer viruses will be less likely to infect computers.

Correct Answer

verifed

verified

Showing 41 - 60 of 237

Related Exams

Show Answer