Filters
Question type

Study Flashcards

Which term refers to the unauthorized stealing of personal information from a computer system?


A) Espionage
B) Leverage
C) Denial of service
D) Identity theft
E) Network flooding

F) A) and C)
G) B) and D)

Correct Answer

verifed

verified

What do firms use to avoid privacy invasion and improve productivity?


A) Spyware
B) Routers
C) Encryption software
D) Spam-filtering software
E) File swapping software

F) A) and B)
G) D) and E)

Correct Answer

verifed

verified

What is the major limitation of Wi-Fi?


A) High cost
B) Availability
C) Productivity
D) Limited distance
E) Installation challenges

F) B) and D)
G) A) and E)

Correct Answer

verifed

verified

What is the term for a file that attaches itself to a program,then moves from computer to computer within a networked system,with the intention of contaminating files?


A) Spam
B) Trojan horse
C) Hack
D) Worm
E) Spyware

F) All of the above
G) A) and B)

Correct Answer

verifed

verified

How do IT communications support leaner,more efficient organizations?


A) By increasing collaborative efforts among all employees
B) By supporting shared activities between buyers and sellers
C) By providing better use of employee skills and greater efficiencies instead of resources
D) By allowing for more rapid exchange of information in the global market
E) By improving the management process

F) All of the above
G) A) and E)

Correct Answer

verifed

verified

Which of the following BEST describes an extranet?


A) A software and hardware system that prevents outsiders from accessing a company's network
B) A tool that searches Web pages containing the user's search terms and then displays pages that match
C) A private network of internal Web sites and other sources of information available to a company's employees
D) An Internet connection allowing outsiders limited access to a firm's internal information system
E) A delivery system linked to production schedules

F) A) and D)
G) A) and E)

Correct Answer

verifed

verified

Mass-customization tends to reduce the volume in which companies produce.

A) True
B) False

Correct Answer

verifed

verified

Hypertext transfer protocol (HTTP)is a basic communications protocol used to receive e-mail.

A) True
B) False

Correct Answer

verifed

verified

In order for a virus to spread from computer to computer,what must it always attach itself to first?


A) All available computer memory
B) A worm
C) A router
D) A piece of hardware
E) A program

F) None of the above
G) C) and D)

Correct Answer

verifed

verified

Worms,Trojan horses,and other infection software are collectively known as malware.

A) True
B) False

Correct Answer

verifed

verified

Electronic commerce (e-commerce)is popular with consumers,but has hurt productivity.

A) True
B) False

Correct Answer

verifed

verified

An application server,an e-mail server,and a print server are all computers that provide services that may be shared by users.

A) True
B) False

Correct Answer

verifed

verified

Which of the following is an essential element in coordinating design and testing while minimizing costs?


A) Streamlined management processes
B) Improved global communications
C) Digital collaboration on a massive scale
D) Global technical collaboration
E) Fewer employees with a wider range of skills

F) B) and C)
G) A) and E)

Correct Answer

verifed

verified

Which of the following determines how data that has previously been tested for security will travel to its destination?


A) Firewall
B) Router
C) Access tests
D) Encryption system
E) Spy sweeper

F) A) and D)
G) A) and C)

Correct Answer

verifed

verified

How does encryption software work?


A) By intercepting and reviewing e-mail before delivering it to the proper address
B) By looking for signatures of known viruses and virus-like characters
C) By acting as a traffic switch and determining which route the message should take
D) By scrambling messages for anyone who does not have the key to decoding
E) By blocking suspicious messages where the internal network and the Internet meet

F) A) and D)
G) A) and E)

Correct Answer

verifed

verified

Hardware consists of programs that tell a computer how to function.

A) True
B) False

Correct Answer

verifed

verified

What is a decision support system?

Correct Answer

verifed

verified

A decision support system (DSS)is an int...

View Answer

Who generally has access to intranets?


A) Employees
B) Suppliers
C) Customers
D) Shareholders
E) Dealers

F) A) and B)
G) A) and C)

Correct Answer

verifed

verified

Electronic conferencing is popular because it reduces travel expenses and saves money.

A) True
B) False

Correct Answer

verifed

verified

Why might businesses want to use a decision support system to analyze data that reveal what consumers do in the marketplace?


A) To be able to send them tailor-made advertisements
B) To be able to close the customer service department
C) To be able to reduce production costs
D) To be able to stabilize employee turnover
E) To be able to manage long-term costs

F) A) and B)
G) A) and C)

Correct Answer

verifed

verified

Showing 81 - 100 of 108

Related Exams

Show Answer