Filters
Question type

Study Flashcards

Bigbux Bank has always tried to make use of the newest technologies to expand the services it offers to its customers. For example, depositors can obtain updated financial information about their accounts and handle certain types of transactions whenever they wish simply by using the bank's mobile app with fingerprint login. The type of technology Bigbux Bank uses to provide these services is known as


A) data processing.
B) systems processing.
C) information technology.
D) knowledge processing.

E) A) and C)
F) C) and D)

Correct Answer

verifed

verified

Compared to intranets, one advantage of an extranet is that it protects a company's information from hackers.

A) True
B) False

Correct Answer

verifed

verified

The success of data mining depends on access to data.

A) True
B) False

Correct Answer

verifed

verified

In this age of technology, managers can easily become buried in information infoglut.

A) True
B) False

Correct Answer

verifed

verified

Melissa, a new employee at Epic Electronics, is required to perform a variety of bookkeeping and clerical tasks at a workstation. Epic has training software on its workstations that can answer many of the questions she has about what to do on her new job, and how to do it. The software is so good that she rarely asks her supervisor for help. It even tracks the way Melissa performs certain tasks, and offers suggestions to improve her productivity. This software is an example of


A) the use of a technique called computer aided production (CAP) that is becoming increasingly important in high-tech industries.
B) the trend toward telecommuting.
C) the way businesses are using knowledge technology to move relevant information to the people who need it.
D) why mainframe computer systems are more efficient than network computer systems.

E) All of the above
F) B) and C)

Correct Answer

verifed

verified

Data and information are two different names for essentially the same thing.

A) True
B) False

Correct Answer

verifed

verified

Data from RFID devices, miniature cameras, and wireless access used to understand where people or items are located is called


A) physical-world observations.
B) biological data.
C) public data.
D) business process information.

E) All of the above
F) B) and C)

Correct Answer

verifed

verified

Users of Internet2 each pay the same fee for their connection and share bandwidth equally.

A) True
B) False

Correct Answer

verifed

verified

Ronald is the CIO for a major corporation. His job requires him to have an extensive knowledge of the hardware and software his company uses, but he will seldom be concerned about the methods and procedures used by specific departments.

A) True
B) False

Correct Answer

verifed

verified

Dennis just learned that his company has been reading the e-mails he has sent while at work without getting his permission. Dennis can sue the company for invasion of privacy under the Electronic Communications Privacy Act of 1997.

A) True
B) False

Correct Answer

verifed

verified

The first step in avoiding information overload is to identify four or five key goals and focus only on information that is related to those goals.

A) True
B) False

Correct Answer

verifed

verified

Marcus works for the Critical Infrastructure Protection Board. One of the major challenges he is likely to face is to get CIOs at major corporations to provide the type of information he needs to help his board achieve its mission.

A) True
B) False

Correct Answer

verifed

verified

Doreen is overwhelmed by information overload. Unfortunately, in this day of technology, there is little she can do to control this problem.

A) True
B) False

Correct Answer

verifed

verified

Business intelligence is any variety of software applications that analyze an organization's raw data and take useful insights from it.

A) True
B) False

Correct Answer

verifed

verified

As the result of the terrorist attacks on September 11, 2001, managers of most major corporations have become much more willing to give the government extensive access to information about problems with electronic communication such as viruses and attacks by hackers.

A) True
B) False

Correct Answer

verifed

verified

Which of the following statements about computer viruses is most accurate?


A) Viruses could be completely eliminated if people would quit sharing infected files.
B) Wild rumors and sloppy reporting have exaggerated the threat computer viruses pose to typical computer users. Almost all real-world computer viruses turn out to be harmless practical jokes.
C) The Internet contains built-in safeguards that prevent programs with viruses from being downloaded.
D) Although antivirus software can help identify and eliminate known viruses, the software must be updated frequently to remain effective.

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

A computer ________ is a piece of programming code that is inserted into other programming to cause an unexpected and often-undesirable event for the victim.


A) virus
B) cold
C) wasp
D) firecracker

E) None of the above
F) B) and C)

Correct Answer

verifed

verified

Information mainly used for security purposes such as fingerprinting and retinal scans is known as


A) physical-world observations.
B) biological data.
C) private data.
D) public data.

E) None of the above
F) C) and D)

Correct Answer

verifed

verified

Initially, the very-high-speed Internet2 network service was set up to connect government supercomputer centers with a select group of universities.

A) True
B) False

Correct Answer

verifed

verified

People in marketing want Cy's help because they are convinced that many hidden patterns and unexpected relationships could be found in the mountains of data the company accumulates. They think that discovering these relationships might help them develop new marketing strategies. This suggests that Cy's next project will be concerned with


A) datametric analysis.
B) data mining.
C) data refining.
D) data orienteering.

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

Showing 121 - 140 of 192

Related Exams

Show Answer