Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) the use of a technique called computer aided production (CAP) that is becoming increasingly important in high-tech industries.
B) the trend toward telecommuting.
C) the way businesses are using knowledge technology to move relevant information to the people who need it.
D) why mainframe computer systems are more efficient than network computer systems.
Correct Answer
verified
Multiple Choice
A) prevent employees from using the Internet for private purposes on company time.
B) post information that can be accessed only by employees of the organization.
C) extend an organization's intranet to outside customers.
D) increase the speed at which employees can access information on the Internet.
Correct Answer
verified
Multiple Choice
A) publish information on the intranet that all employees can access.
B) operate the intranet over a mainframe system.
C) base the intranet interface on one of the popular web browsers.
D) develop interactive intranet applications.
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) are semiprivate, so it is possible for hackers to gain access to information on the system.
B) use an old technology that is not as fast at transferring data as the Internet.
C) cannot be accessed by people unless they are employees of the company.
D) have no ability to handle common e-mail protocols.
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) data processing.
B) information processing.
C) information technology.
D) systems analysis.
Correct Answer
verified
Multiple Choice
A) used to be a major problem, but such problems now are largely a thing of the past.
B) still exists, but could be easily eliminated if firms would upgrade to newer equipment and software.
C) remains a serious problem that is caused by a variety of factors.
D) still exists, but its impact on business is greatly exaggerated by the media.
Correct Answer
verified
Multiple Choice
A) store copies of crucial data in several different locations to protect against its loss during disasters such as earthquakes, floods, or terrorist attacks.
B) protect its data from unauthorized outsiders.
C) increase the rate at which information flows through a firm's intranet.
D) discover hidden relationships among the data it accumulates.
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) knowledge transfer
B) business intelligence
C) data processing
D) business process information
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) virus
B) factoid
C) wasp
D) firecracker
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) can be accessed even by people without computers; all that is needed is a simple, inexpensive receiver, a television set, and a standard telephone line.
B) is owned and operated by the United Nations, and is accessible to people in every nation.
C) can move information much faster than the Internet and has the capacity to handle heavy-duty applications.
D) allows firms to set up their own protocols for transferring and processing information.
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) cookie
B) brownie
C) data marker
D) file portal
Correct Answer
verified
True/False
Correct Answer
verified
Showing 141 - 160 of 189
Related Exams