Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) virus
B) cold
C) wasp
D) firecracker
Correct Answer
verified
Multiple Choice
A) crossnets.
B) alternets.
C) outernets.
D) extranets.
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) database management.
B) data mining.
C) social media.
D) physical-world observations.
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Viruses could be completely eliminated if people would quit sharing infected files.
B) Wild rumors and sloppy reporting have exaggerated the threat computer viruses pose to typical computer users. Almost all real-world computer viruses turn out to be harmless practical jokes.
C) The Internet contains built-in safeguards that prevent programs with viruses from being downloaded.
D) Although antivirus software can help identify and eliminate known viruses, the software must be updated frequently to remain effective.
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) data processing.
B) information processing.
C) information technology.
D) systems analysis.
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Data warehousing
B) Data mining
C) Cloud computing
D) Mobile softwaring
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) accurate and reliable.
B) normative and open ended.
C) simple and easy to use.
D) subjective and unique.
Correct Answer
verified
Multiple Choice
A) find the most efficient way to reduce the amount of data collected.
B) restrict access to the company's data to a few key analysts.
C) store data in a more secure location.
D) discover unexpected relationships among the data stored by his or her organization.
Correct Answer
verified
Showing 21 - 40 of 192
Related Exams