Deck 22: Appendix: Using Technology to Manage Information

ملء الشاشة (f)
exit full mode
سؤال
Information technology brings work to people instead of requiring people to go to work.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
During the 1970s business technology employees often dealt directly with customers.
سؤال
Data and information are two different names for essentially the same thing.
سؤال
The experiences of the past several decades show that, while improvements in technology frequently enhance the efficiency of basic business operations, such improvements never actually change the fundamental way that businesses operate.
سؤال
Information is data that has been processed and organized so that it can be used for managerial decision making.
سؤال
In the coming years, successful information management will be more concerned with achieving and maintaining stability and predictability, and less concerned with adapting to change.
سؤال
In the 1970s business technology was known as data processing.
سؤال
Information technology has changed the staffing and customer relations of businesses.
سؤال
Today the role of the chief information officer is to help the business use technology to communicate better with others while offering better service and lower costs.
سؤال
Over time, business technology has become much more sophisticated, but its basic application has remained to support the existing operations of businesses by providing key financial information.
سؤال
During the 1980s, the role of business technology changed from supporting business to doing business.
سؤال
During the 1980s business technology began to emphasize the use of technology to change how business was conducted by introducing new methods.
سؤال
As businesses began using business intelligence, managers spent less time finding information and more time using it to make decisions.
سؤال
In today's technological environment, the typical chief information officer (CIO) spends the majority of his or her time overcoming glitches and making sure the organization's information system is up and running.
سؤال
Business intelligence (BI) changes the traditional flow of information so that the database goes to the individual rather than the individual going to the database.
سؤال
Samantha's assistant just handed her a report that summarizes and organizes many raw facts and figures into a few key measures that will help her judge whether her department is meeting its key objectives. The summary measures included in the report are information, while the raw facts and figures used to compute these measures are data.
سؤال
Though the types of technology used by businesses have changed over the last several decades, the role of business technology has remained remarkably constant.
سؤال
In the late 1980s and early 1990s, businesses began to emphasize finding ways to employ new technologies to improve existing methods of doing business.
سؤال
During the 1970s, the purpose of data processing was to support the existing business by improving the flow of financial information.
سؤال
Business intelligence is any variety of software applications that analyze an organization's raw data and take useful insights from it.
سؤال
Redundancy is one of the four characteristics of useful information.
سؤال
Subjectivity is one of the four characteristics of useful information.
سؤال
A basic truth in management is that you can never have too much information.
سؤال
The success of data mining depends on access to data.
سؤال
Perfect Price Warehouse is a major discount store chain on the east coast. The company wants to do a better job of finding sales patterns and trends that will help it customize the product offerings for different stores. Data mining is one technique that would help Perfect Price Warehouse achieve this goal.
سؤال
Timeliness is one of the characteristics of useful management information.
سؤال
Data mining looks for previously unknown relationships among vast amounts of data.
سؤال
In this age of technology, managers can easily become buried in information infoglut.
سؤال
Ronald is the CIO for a major corporation. His job requires him to have an extensive knowledge of the hardware and software his company uses, but he will seldom be concerned about the methods and procedures used by specific departments.
سؤال
RFID devices collect biological data.
سؤال
Public data includes electronic traces that people leave when posting to the Internet and sending e-mail.
سؤال
Major retail firms such as Walmart have used data mining to customize the product offerings for each store.
سؤال
Useful information has three defining characteristics: (1) it is easily accessible, (2) it is efficiently organized, and (3) it is simple to manipulate.
سؤال
In order for information to be useful to managers, it must satisfy only two criteria: it must be timely, and it must be easy to manipulate.
سؤال
Your online shopping trail provides information that indicates your personal preferences.
سؤال
The quality of management information depends on its accuracy and reliability.
سؤال
The first step in avoiding information overload is to identify four or five key goals and focus only on information that is related to those goals.
سؤال
Relevance is one of the key characteristics of useful information.
سؤال
The key to improving management decision making is to provide the manager with as much information as possible.
سؤال
Doreen is overwhelmed by information overload. Unfortunately, in this day of technology, there is little she can do to control this problem.
سؤال
Widebeam is the term used to refer to technologies that give users continuous access to the Internet and greatly increase the speed at which data flows to and from their Internet connection.
سؤال
Intranets use a different, less sophisticated, type of technology than the Internet.
سؤال
Internet2 runs more than 22,000 times faster than today's public infrastructure.
سؤال
A virtual private network allows information managers to simulate a real intranet in order to identify possible security problems and technical glitches before the company sets up the actual private network.
سؤال
Firewalls can be constructed using software, hardware, or a combination of both.
سؤال
The extranet is the next stage in the evolution of the Internet, consisting of a revolutionary new fiber optic technology that will enable computer users throughout the world to send and receive data up to 256 times faster than they can using the technology of the early 2010s.
سؤال
The most productive way for firms to use intranets is to publish information that can be accessed by all employees within an organization.
سؤال
Initially, the very-high-speed Internet2 network service was set up to connect government supercomputer centers with a select group of universities.
سؤال
Compared to intranets, one advantage of an extranet is that it protects a company's information from hackers.
سؤال
Interactive intranet applications can save money and increase revenue by reducing paper handling and enabling faster decision making.
سؤال
Virtual private networks create secure connections over regular Internet lines.
سؤال
A common use of an extranet is to extend an intranet to outside customers.
سؤال
Extranets now allow small firms to share and process data much as large firms have been able to do using electronic data interchange.
سؤال
Enterprise portals have the ability to identify users and give them access to specific areas of an organization's intranet depending on their relationship to the organization.
سؤال
One problem with most extranets is that they use public lines, which makes it possible for hackers to get into the network.
سؤال
The software or hardware barrier that a business uses to prevent unauthorized users from gaining access to their intranet is known as a tripware.
سؤال
An intranet is a companywide network that is based on Internet-type technology, but closed to public access.
سؤال
Enterprise portals are simply web pages with links to company-specific products and services.
سؤال
Virtual private networks are quick and easy to set up, but they are less secure than extranets.
سؤال
Bandwidth is the term used to describe the rate at which data flows through the Internet.
سؤال
The advantages of cloud computing are security, possible instability, and data control.
سؤال
Homegrown Design, a company that publishes home design software, wants to set up a temporary link with another firm to collaborate and share data on a short-term basis. Homegrown wants to keep the cost of setting up this connection reasonable, but is concerned about hackers and wants to make sure its link is secure. The best way for Homegrown to achieve its goal is to set up an extranet with dedicated lines.
سؤال
Bennett just got started using a storage method called Dropbox. He stores most of his information with this service. Bennett is using cloud computing.
سؤال
Tee Time Golf Resorts currently has an intranet, and is considering making use of an extranet. One of the main reasons Tee Time may want an extranet is to allow a select group of outside customers to have access to information on its intranet.
سؤال
The main reason for setting up an enterprise portal is to ensure that only employees of an organization have access to the information on its intranet.
سؤال
There are three types of cloud computing: private clouds, public clouds, and hybrid clouds.
سؤال
Some advantages of cloud computing include flexible capacity and easier access.
سؤال
The fact that electronic data interchange technology is so expensive that only large firms can afford to use it puts small firms at a severe disadvantage when it comes to sharing information.
سؤال
Users of Internet2 each pay the same fee for their connection and share bandwidth equally.
سؤال
Information managers at Epic Electronics want to provide a single, seamless interface that will make it easier for customers, suppliers, and employees to gain access to the parts of its intranet that they need. Epic could achieve this result by setting up an enterprise portal.
سؤال
Western University just obtained a link to Internet2. Researchers at Western intend to make very heavy use of their new link for various forms of collaboration, for videoconferencing and for running complex simulations. Unlike the regular Internet, the more bandwidth Western's researchers use on Internet2, the more the university will have to pay.
سؤال
Internal networking shares the resources of all computers with each networked computer.
سؤال
Because cloud computing is often too expensive for small businesses, it is rarely used.
سؤال
A major reason for the creation of Internet2 was that private businesses wanted to establish a network that was free from government regulation.
سؤال
One of the most revolutionary effects of computer networks is that they give employees the ability to do much of their work at home.
سؤال
Telecommuting is popular with workers, but it is costly for businesses.
سؤال
Cloud computing is a form of virtualization in which a company's data and applications are stored onsite and accessed via an external hard drive.
سؤال
Virtual networking is a process that allows software-based networked computers to run multiple operating systems and programs.
سؤال
The use of computers increases the number of layers of management, resulting in taller organizations.
سؤال
The main purpose of an intranet is to allow a company to keep in close contact with its customers.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/192
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 22: Appendix: Using Technology to Manage Information
1
Information technology brings work to people instead of requiring people to go to work.
True
2
During the 1970s business technology employees often dealt directly with customers.
False
3
Data and information are two different names for essentially the same thing.
False
4
The experiences of the past several decades show that, while improvements in technology frequently enhance the efficiency of basic business operations, such improvements never actually change the fundamental way that businesses operate.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 192 في هذه المجموعة.
فتح الحزمة
k this deck
5
Information is data that has been processed and organized so that it can be used for managerial decision making.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 192 في هذه المجموعة.
فتح الحزمة
k this deck
6
In the coming years, successful information management will be more concerned with achieving and maintaining stability and predictability, and less concerned with adapting to change.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 192 في هذه المجموعة.
فتح الحزمة
k this deck
7
In the 1970s business technology was known as data processing.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 192 في هذه المجموعة.
فتح الحزمة
k this deck
8
Information technology has changed the staffing and customer relations of businesses.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 192 في هذه المجموعة.
فتح الحزمة
k this deck
9
Today the role of the chief information officer is to help the business use technology to communicate better with others while offering better service and lower costs.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 192 في هذه المجموعة.
فتح الحزمة
k this deck
10
Over time, business technology has become much more sophisticated, but its basic application has remained to support the existing operations of businesses by providing key financial information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 192 في هذه المجموعة.
فتح الحزمة
k this deck
11
During the 1980s, the role of business technology changed from supporting business to doing business.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 192 في هذه المجموعة.
فتح الحزمة
k this deck
12
During the 1980s business technology began to emphasize the use of technology to change how business was conducted by introducing new methods.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 192 في هذه المجموعة.
فتح الحزمة
k this deck
13
As businesses began using business intelligence, managers spent less time finding information and more time using it to make decisions.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 192 في هذه المجموعة.
فتح الحزمة
k this deck
14
In today's technological environment, the typical chief information officer (CIO) spends the majority of his or her time overcoming glitches and making sure the organization's information system is up and running.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 192 في هذه المجموعة.
فتح الحزمة
k this deck
15
Business intelligence (BI) changes the traditional flow of information so that the database goes to the individual rather than the individual going to the database.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 192 في هذه المجموعة.
فتح الحزمة
k this deck
16
Samantha's assistant just handed her a report that summarizes and organizes many raw facts and figures into a few key measures that will help her judge whether her department is meeting its key objectives. The summary measures included in the report are information, while the raw facts and figures used to compute these measures are data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 192 في هذه المجموعة.
فتح الحزمة
k this deck
17
Though the types of technology used by businesses have changed over the last several decades, the role of business technology has remained remarkably constant.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 192 في هذه المجموعة.
فتح الحزمة
k this deck
18
In the late 1980s and early 1990s, businesses began to emphasize finding ways to employ new technologies to improve existing methods of doing business.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 192 في هذه المجموعة.
فتح الحزمة
k this deck
19
During the 1970s, the purpose of data processing was to support the existing business by improving the flow of financial information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 192 في هذه المجموعة.
فتح الحزمة
k this deck
20
Business intelligence is any variety of software applications that analyze an organization's raw data and take useful insights from it.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 192 في هذه المجموعة.
فتح الحزمة
k this deck
21
Redundancy is one of the four characteristics of useful information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 192 في هذه المجموعة.
فتح الحزمة
k this deck
22
Subjectivity is one of the four characteristics of useful information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 192 في هذه المجموعة.
فتح الحزمة
k this deck
23
A basic truth in management is that you can never have too much information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 192 في هذه المجموعة.
فتح الحزمة
k this deck
24
The success of data mining depends on access to data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 192 في هذه المجموعة.
فتح الحزمة
k this deck
25
Perfect Price Warehouse is a major discount store chain on the east coast. The company wants to do a better job of finding sales patterns and trends that will help it customize the product offerings for different stores. Data mining is one technique that would help Perfect Price Warehouse achieve this goal.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 192 في هذه المجموعة.
فتح الحزمة
k this deck
26
Timeliness is one of the characteristics of useful management information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 192 في هذه المجموعة.
فتح الحزمة
k this deck
27
Data mining looks for previously unknown relationships among vast amounts of data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 192 في هذه المجموعة.
فتح الحزمة
k this deck
28
In this age of technology, managers can easily become buried in information infoglut.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 192 في هذه المجموعة.
فتح الحزمة
k this deck
29
Ronald is the CIO for a major corporation. His job requires him to have an extensive knowledge of the hardware and software his company uses, but he will seldom be concerned about the methods and procedures used by specific departments.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 192 في هذه المجموعة.
فتح الحزمة
k this deck
30
RFID devices collect biological data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 192 في هذه المجموعة.
فتح الحزمة
k this deck
31
Public data includes electronic traces that people leave when posting to the Internet and sending e-mail.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 192 في هذه المجموعة.
فتح الحزمة
k this deck
32
Major retail firms such as Walmart have used data mining to customize the product offerings for each store.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 192 في هذه المجموعة.
فتح الحزمة
k this deck
33
Useful information has three defining characteristics: (1) it is easily accessible, (2) it is efficiently organized, and (3) it is simple to manipulate.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 192 في هذه المجموعة.
فتح الحزمة
k this deck
34
In order for information to be useful to managers, it must satisfy only two criteria: it must be timely, and it must be easy to manipulate.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 192 في هذه المجموعة.
فتح الحزمة
k this deck
35
Your online shopping trail provides information that indicates your personal preferences.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 192 في هذه المجموعة.
فتح الحزمة
k this deck
36
The quality of management information depends on its accuracy and reliability.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 192 في هذه المجموعة.
فتح الحزمة
k this deck
37
The first step in avoiding information overload is to identify four or five key goals and focus only on information that is related to those goals.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 192 في هذه المجموعة.
فتح الحزمة
k this deck
38
Relevance is one of the key characteristics of useful information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 192 في هذه المجموعة.
فتح الحزمة
k this deck
39
The key to improving management decision making is to provide the manager with as much information as possible.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 192 في هذه المجموعة.
فتح الحزمة
k this deck
40
Doreen is overwhelmed by information overload. Unfortunately, in this day of technology, there is little she can do to control this problem.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 192 في هذه المجموعة.
فتح الحزمة
k this deck
41
Widebeam is the term used to refer to technologies that give users continuous access to the Internet and greatly increase the speed at which data flows to and from their Internet connection.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 192 في هذه المجموعة.
فتح الحزمة
k this deck
42
Intranets use a different, less sophisticated, type of technology than the Internet.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 192 في هذه المجموعة.
فتح الحزمة
k this deck
43
Internet2 runs more than 22,000 times faster than today's public infrastructure.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 192 في هذه المجموعة.
فتح الحزمة
k this deck
44
A virtual private network allows information managers to simulate a real intranet in order to identify possible security problems and technical glitches before the company sets up the actual private network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 192 في هذه المجموعة.
فتح الحزمة
k this deck
45
Firewalls can be constructed using software, hardware, or a combination of both.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 192 في هذه المجموعة.
فتح الحزمة
k this deck
46
The extranet is the next stage in the evolution of the Internet, consisting of a revolutionary new fiber optic technology that will enable computer users throughout the world to send and receive data up to 256 times faster than they can using the technology of the early 2010s.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 192 في هذه المجموعة.
فتح الحزمة
k this deck
47
The most productive way for firms to use intranets is to publish information that can be accessed by all employees within an organization.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 192 في هذه المجموعة.
فتح الحزمة
k this deck
48
Initially, the very-high-speed Internet2 network service was set up to connect government supercomputer centers with a select group of universities.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 192 في هذه المجموعة.
فتح الحزمة
k this deck
49
Compared to intranets, one advantage of an extranet is that it protects a company's information from hackers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 192 في هذه المجموعة.
فتح الحزمة
k this deck
50
Interactive intranet applications can save money and increase revenue by reducing paper handling and enabling faster decision making.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 192 في هذه المجموعة.
فتح الحزمة
k this deck
51
Virtual private networks create secure connections over regular Internet lines.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 192 في هذه المجموعة.
فتح الحزمة
k this deck
52
A common use of an extranet is to extend an intranet to outside customers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 192 في هذه المجموعة.
فتح الحزمة
k this deck
53
Extranets now allow small firms to share and process data much as large firms have been able to do using electronic data interchange.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 192 في هذه المجموعة.
فتح الحزمة
k this deck
54
Enterprise portals have the ability to identify users and give them access to specific areas of an organization's intranet depending on their relationship to the organization.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 192 في هذه المجموعة.
فتح الحزمة
k this deck
55
One problem with most extranets is that they use public lines, which makes it possible for hackers to get into the network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 192 في هذه المجموعة.
فتح الحزمة
k this deck
56
The software or hardware barrier that a business uses to prevent unauthorized users from gaining access to their intranet is known as a tripware.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 192 في هذه المجموعة.
فتح الحزمة
k this deck
57
An intranet is a companywide network that is based on Internet-type technology, but closed to public access.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 192 في هذه المجموعة.
فتح الحزمة
k this deck
58
Enterprise portals are simply web pages with links to company-specific products and services.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 192 في هذه المجموعة.
فتح الحزمة
k this deck
59
Virtual private networks are quick and easy to set up, but they are less secure than extranets.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 192 في هذه المجموعة.
فتح الحزمة
k this deck
60
Bandwidth is the term used to describe the rate at which data flows through the Internet.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 192 في هذه المجموعة.
فتح الحزمة
k this deck
61
The advantages of cloud computing are security, possible instability, and data control.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 192 في هذه المجموعة.
فتح الحزمة
k this deck
62
Homegrown Design, a company that publishes home design software, wants to set up a temporary link with another firm to collaborate and share data on a short-term basis. Homegrown wants to keep the cost of setting up this connection reasonable, but is concerned about hackers and wants to make sure its link is secure. The best way for Homegrown to achieve its goal is to set up an extranet with dedicated lines.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 192 في هذه المجموعة.
فتح الحزمة
k this deck
63
Bennett just got started using a storage method called Dropbox. He stores most of his information with this service. Bennett is using cloud computing.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 192 في هذه المجموعة.
فتح الحزمة
k this deck
64
Tee Time Golf Resorts currently has an intranet, and is considering making use of an extranet. One of the main reasons Tee Time may want an extranet is to allow a select group of outside customers to have access to information on its intranet.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 192 في هذه المجموعة.
فتح الحزمة
k this deck
65
The main reason for setting up an enterprise portal is to ensure that only employees of an organization have access to the information on its intranet.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 192 في هذه المجموعة.
فتح الحزمة
k this deck
66
There are three types of cloud computing: private clouds, public clouds, and hybrid clouds.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 192 في هذه المجموعة.
فتح الحزمة
k this deck
67
Some advantages of cloud computing include flexible capacity and easier access.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 192 في هذه المجموعة.
فتح الحزمة
k this deck
68
The fact that electronic data interchange technology is so expensive that only large firms can afford to use it puts small firms at a severe disadvantage when it comes to sharing information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 192 في هذه المجموعة.
فتح الحزمة
k this deck
69
Users of Internet2 each pay the same fee for their connection and share bandwidth equally.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 192 في هذه المجموعة.
فتح الحزمة
k this deck
70
Information managers at Epic Electronics want to provide a single, seamless interface that will make it easier for customers, suppliers, and employees to gain access to the parts of its intranet that they need. Epic could achieve this result by setting up an enterprise portal.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 192 في هذه المجموعة.
فتح الحزمة
k this deck
71
Western University just obtained a link to Internet2. Researchers at Western intend to make very heavy use of their new link for various forms of collaboration, for videoconferencing and for running complex simulations. Unlike the regular Internet, the more bandwidth Western's researchers use on Internet2, the more the university will have to pay.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 192 في هذه المجموعة.
فتح الحزمة
k this deck
72
Internal networking shares the resources of all computers with each networked computer.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 192 في هذه المجموعة.
فتح الحزمة
k this deck
73
Because cloud computing is often too expensive for small businesses, it is rarely used.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 192 في هذه المجموعة.
فتح الحزمة
k this deck
74
A major reason for the creation of Internet2 was that private businesses wanted to establish a network that was free from government regulation.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 192 في هذه المجموعة.
فتح الحزمة
k this deck
75
One of the most revolutionary effects of computer networks is that they give employees the ability to do much of their work at home.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 192 في هذه المجموعة.
فتح الحزمة
k this deck
76
Telecommuting is popular with workers, but it is costly for businesses.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 192 في هذه المجموعة.
فتح الحزمة
k this deck
77
Cloud computing is a form of virtualization in which a company's data and applications are stored onsite and accessed via an external hard drive.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 192 في هذه المجموعة.
فتح الحزمة
k this deck
78
Virtual networking is a process that allows software-based networked computers to run multiple operating systems and programs.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 192 في هذه المجموعة.
فتح الحزمة
k this deck
79
The use of computers increases the number of layers of management, resulting in taller organizations.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 192 في هذه المجموعة.
فتح الحزمة
k this deck
80
The main purpose of an intranet is to allow a company to keep in close contact with its customers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 192 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 192 في هذه المجموعة.