Deck 4: IT and Computer Systems

ملء الشاشة (f)
exit full mode
سؤال
Which will not harm computer resources

A)firewall
B)virus
C)trojan horse
D)none of the above
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Which is not a function of ERP?

A)warehousing
B)sales
C)scheduling
D)none of the above
سؤال
Which is a function of ERP?

A)warehousing
B)sales
C)scheduling
D)all of the above
سؤال
Which of the following is the primary characteristic of an intranet?

A)people outside the organization can access it
B)people inside the organization can\t access it
C)people outside the organization can\t access it
D)none of the above
سؤال
Which concept suggests that different applications and computer systems should be able to communicate with one another?

A)integration
B)web services
C)scalability
D)interoperability
سؤال
Which service encompasses all technologies used to transmit and process information on an across a network?

A)interoperability
B)scalability
C)benchmarking
D)web services
سؤال
Which process can prevent data from lose due to computer problems or human errors?

A)backup
B)recovery
C)benchmarking
D)data cleansing
سؤال
Which process is used to reinstall data from a copy when the original data has been lost?

A)backup
B)recovery
C)benchmarking
D)data cleansing
سؤال
What describes a process of continuously measuring results and comparing those results to optimal performance so that actual performance may be improved?

A)performance
B)capacity planning
C)benchmarking
D)data cleansing
سؤال
Who protects system from external threats?

A)firewall
B)edi
C)erp
D)script kiddies
سؤال
What is software that comes hidden in free downloadable software and tracks your onlinemovements, mines the information stored on your computer, or uses your computer's CPU andstorage for some task you know nothing about?

A)web log
B)clickstream
C)anonymous web browsing service
D)none of the above
سؤال
Which is not a component of ERP?

A)legacy systems
B)bolt on applications
C)operational database
D)cybersoft
سؤال
Which is not a function of ERP?

A)human resource management
B)financial
C)warehousing
D)none of the above
سؤال
What harnesses far-flung computers together by way of the Internet or a virtual private network to share CPU power, databases, and database storage?

A)computer virus
B)worm
C)denial-of-service attack
D)none of the above
سؤال
What consists of the identification of risks or threats, the implementation of security measures, and the monitoring of those measures for effectiveness?

A)risk management
B)risk assessment
C)security
D)none of the above
سؤال
What is the process of evaluating IT assets, their importance to the organization, and their susceptibility to threats, to measure the risk exposure of these assets?

A)risk management
B)risk assessment
C)security
D)none of the above
سؤال
What is the process of making a copy of the information stored on a computer?

A)backup
B)anti-virus
C)firewall
D)biometrics
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/17
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 4: IT and Computer Systems
1
Which will not harm computer resources

A)firewall
B)virus
C)trojan horse
D)none of the above
firewall
2
Which is not a function of ERP?

A)warehousing
B)sales
C)scheduling
D)none of the above
none of the above
3
Which is a function of ERP?

A)warehousing
B)sales
C)scheduling
D)all of the above
all of the above
4
Which of the following is the primary characteristic of an intranet?

A)people outside the organization can access it
B)people inside the organization can\t access it
C)people outside the organization can\t access it
D)none of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 17 في هذه المجموعة.
فتح الحزمة
k this deck
5
Which concept suggests that different applications and computer systems should be able to communicate with one another?

A)integration
B)web services
C)scalability
D)interoperability
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 17 في هذه المجموعة.
فتح الحزمة
k this deck
6
Which service encompasses all technologies used to transmit and process information on an across a network?

A)interoperability
B)scalability
C)benchmarking
D)web services
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 17 في هذه المجموعة.
فتح الحزمة
k this deck
7
Which process can prevent data from lose due to computer problems or human errors?

A)backup
B)recovery
C)benchmarking
D)data cleansing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 17 في هذه المجموعة.
فتح الحزمة
k this deck
8
Which process is used to reinstall data from a copy when the original data has been lost?

A)backup
B)recovery
C)benchmarking
D)data cleansing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 17 في هذه المجموعة.
فتح الحزمة
k this deck
9
What describes a process of continuously measuring results and comparing those results to optimal performance so that actual performance may be improved?

A)performance
B)capacity planning
C)benchmarking
D)data cleansing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 17 في هذه المجموعة.
فتح الحزمة
k this deck
10
Who protects system from external threats?

A)firewall
B)edi
C)erp
D)script kiddies
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 17 في هذه المجموعة.
فتح الحزمة
k this deck
11
What is software that comes hidden in free downloadable software and tracks your onlinemovements, mines the information stored on your computer, or uses your computer's CPU andstorage for some task you know nothing about?

A)web log
B)clickstream
C)anonymous web browsing service
D)none of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 17 في هذه المجموعة.
فتح الحزمة
k this deck
12
Which is not a component of ERP?

A)legacy systems
B)bolt on applications
C)operational database
D)cybersoft
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 17 في هذه المجموعة.
فتح الحزمة
k this deck
13
Which is not a function of ERP?

A)human resource management
B)financial
C)warehousing
D)none of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 17 في هذه المجموعة.
فتح الحزمة
k this deck
14
What harnesses far-flung computers together by way of the Internet or a virtual private network to share CPU power, databases, and database storage?

A)computer virus
B)worm
C)denial-of-service attack
D)none of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 17 في هذه المجموعة.
فتح الحزمة
k this deck
15
What consists of the identification of risks or threats, the implementation of security measures, and the monitoring of those measures for effectiveness?

A)risk management
B)risk assessment
C)security
D)none of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 17 في هذه المجموعة.
فتح الحزمة
k this deck
16
What is the process of evaluating IT assets, their importance to the organization, and their susceptibility to threats, to measure the risk exposure of these assets?

A)risk management
B)risk assessment
C)security
D)none of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 17 في هذه المجموعة.
فتح الحزمة
k this deck
17
What is the process of making a copy of the information stored on a computer?

A)backup
B)anti-virus
C)firewall
D)biometrics
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 17 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 17 في هذه المجموعة.