Filters
Question type

Study Flashcards

The cause of almost all instability in computer systems can be traced to poorly designed hardware.

A) True
B) False

Correct Answer

verifed

verified

Public data includes electronic traces that people leave when posting to the Internet and sending e-mail.

A) True
B) False

Correct Answer

verifed

verified

Data from RFID devices, miniature cameras, and wireless access used to understand where people or items are located is called


A) physical-world observations.
B) biological data.
C) public data.
D) business process information.

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

The first step a manager should take to cope with information overload is to


A) obtain a good database management system and use it to organize information more efficiently.
B) hire a qualified information systems analyst.
C) identify four or five key goals, and eliminate information that is not related to those goals.
D) purchase more sophisticated hardware that can process and store information more efficiently.

E) All of the above
F) A) and C)

Correct Answer

verifed

verified

Timeliness is one of the characteristics of useful management information.

A) True
B) False

Correct Answer

verifed

verified

The use of computers increases the number of layers of management, resulting in taller organizations.

A) True
B) False

Correct Answer

verifed

verified

Transaction data gathered at the point of sale is known as


A) physical-world observations.
B) business process information.
C) public data.
D) personal preference data.

E) C) and D)
F) A) and C)

Correct Answer

verifed

verified

Dennis just learned that his company has been reading the e-mails he has sent while at work without getting his permission. Dennis can sue the company for invasion of privacy under the Electronic Communications Privacy Act of 1997.

A) True
B) False

Correct Answer

verifed

verified

Extranets now allow small firms to share and process data much as large firms have been able to do using electronic data interchange.

A) True
B) False

Correct Answer

verifed

verified

In the coming years, successful information management will be more concerned with achieving and maintaining stability and predictability, and less concerned with adapting to change.

A) True
B) False

Correct Answer

verifed

verified

Today the primary concern of corporate and government security officials concerning electronic communication is in the area of cyberterrorism.

A) True
B) False

Correct Answer

verifed

verified

The three types of cloud computing are


A) public, private, and personal clouds.
B) application, analytic, and informative clouds.
C) power, private, and virtual clouds.
D) public, private, and hybrid clouds.

E) B) and C)
F) None of the above

Correct Answer

verifed

verified

A(n) ________ is someone who breaks into a computer system for illegal purposes.


A) network crasher
B) drive jockey
C) arbitrageur
D) hacker

E) A) and D)
F) B) and C)

Correct Answer

verifed

verified

As the result of the terrorist attacks on September 11, 2001, managers of most major corporations have become much more willing to give the government extensive access to information about problems with electronic communication such as viruses and attacks by hackers.

A) True
B) False

Correct Answer

verifed

verified

Virtual private networks are quick and easy to set up, but they are less secure than extranets.

A) True
B) False

Correct Answer

verifed

verified

One problem with telecommuting is that it can cause workers to feel like they are isolated and left out of the office loop.

A) True
B) False

Correct Answer

verifed

verified

The organizations that benefit the most from an intranet are the ones that


A) publish information on the intranet that all employees can access.
B) operate the intranet over a mainframe system.
C) base the intranet interface on one of the popular web browsers.
D) develop interactive intranet applications.

E) C) and D)
F) None of the above

Correct Answer

verifed

verified

The key difference between an intranet and an extranet is that an intranet


A) uses technology based on current Internet standards, while an extranet uses technology based on Internet2.
B) uses public lines to transmit information, but an extranet uses private lines.
C) is closed to public access, while an extranet allows selected outsiders access to the network.
D) allows many different organizations to share data and resources, while an extranet is limited to only two organizations.

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Websites often send cookies to a user's computer that are saved on the computer's hard drive.

A) True
B) False

Correct Answer

verifed

verified

The ability of the Critical Infrastructure Protection Board to achieve its mission depends crucially on


A) convincing corporations to adopt the more secure Internet2 technology.
B) finding ways to create artificially intelligent monitors of electronic communications.
C) convincing information managers in the private sector to report problems such as hacker attacks and viruses to the government.
D) developing a new wireless technology that provides better data encryption.

E) A) and C)
F) C) and D)

Correct Answer

verifed

verified

Showing 81 - 100 of 192

Related Exams

Show Answer