Deck 14: Using Technology to Manage Information

Full screen (f)
exit full mode
Question
All of the following are examples of cybercrimes except:

A) Employees or outsiders may change or invent data to produce inaccurate or misleading information.
B) Employees or outsiders modify computer programs to create false information or illegal transactions or to insert viruses.
C) When A calls, a new window automatically pops up on a computer screen with the customer's information and account history.
D) Unauthorized people access computer systems for their own benefit or knowledge or just to see if they can get in.
Use Space or
up arrow
down arrow
to flip the card.
Question
___________ are designed to produce a variety of information on an organization's activities for both internal and external users.

A) Transaction processing systems
B) Operational support systems
C) Process control systems
D) Management support systems
Question
The current standard for wireless networks is called a:

A) Hot spot.
B) Local area network (LAN).
C) Wide area network (WAN).
D) Wireless fidelity (WiFi).
Question
Microsoft Outlook is an example of which one of the following types of applications software?

A) Personal information managers
B) Database programs
C) Spreadsheets
D) Word processing
Question
An organized method for collecting, storing, and communicating past, present, and projected information on internal operations and external intelligence is called _______.

A) Database
B) Information system
C) Management information system
D) Data system
Question
Which one of the following statements concerning a database is incorrect?

A) Databases can be built internally.
B) Databases are centralized integrated collection of data resources.
C) Databases always provide relevant data.
D) Databases act as electronic filing cabinets.
Question
A disruptive innovation is called an/a _________________________________________.

A) innovation that entirely changes the present market
B) innovation that sets the entire industry back a few years
C) annoyance that confuses manufacturing
D) service that cannot be replicated and is short-lived
Question
Computer-based information systems consist of the following component(s).

A) Computer hardware
B) Computer software
C) Data resource management
D) All of the above
Question
Telephone service that is transmitted over the Internet instead of through traditional phone lines is called

A) VPN.
B) VPV.
C) IvP.
D) VoIP.
Question
An operational support system that records and processes business transaction data is referred to as a:

A) Management information system
B) Decision support system
C) Process control system
D) Transaction processing system
Question
Systems that imitate human thinking through complicated sets of "if-then" rules are referred to as:

A) Process control systems
B) Decision support systems
C) Expert systems
D) Executive Support Systems
Question
A centralized integrated collection of data resources is called:

A) Data mining
B) A database
C) An online system
D) Transaction processing system
Question
A significant trend in information systems includes:

A) The growing demands of the so-called distributed workforce.
B) The increased use of Internet service providers.
C) On-demand group computing.
D) Cloud and grip computing.
Question
Which of the following represents inputs for computer hardware?

A) Allow users to enter data and commands
B) Keyboard
C) Mouse
D) All of the above
Question
A computer network that is similar to the Internet, but limits access to authorized users is called _________________.

A) Internal internet
B) Network
C) Intranet
D) Extranet
Question
Using computer-based technology to retrieve and evaluate data in a database for the purpose of identifying trends is called

A) Business intelligence.
B) Data stockpiling.
C) Information mining.
D) Data servicing.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/16
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 14: Using Technology to Manage Information
1
All of the following are examples of cybercrimes except:

A) Employees or outsiders may change or invent data to produce inaccurate or misleading information.
B) Employees or outsiders modify computer programs to create false information or illegal transactions or to insert viruses.
C) When A calls, a new window automatically pops up on a computer screen with the customer's information and account history.
D) Unauthorized people access computer systems for their own benefit or knowledge or just to see if they can get in.
C
2
___________ are designed to produce a variety of information on an organization's activities for both internal and external users.

A) Transaction processing systems
B) Operational support systems
C) Process control systems
D) Management support systems
B
3
The current standard for wireless networks is called a:

A) Hot spot.
B) Local area network (LAN).
C) Wide area network (WAN).
D) Wireless fidelity (WiFi).
D
4
Microsoft Outlook is an example of which one of the following types of applications software?

A) Personal information managers
B) Database programs
C) Spreadsheets
D) Word processing
Unlock Deck
Unlock for access to all 16 flashcards in this deck.
Unlock Deck
k this deck
5
An organized method for collecting, storing, and communicating past, present, and projected information on internal operations and external intelligence is called _______.

A) Database
B) Information system
C) Management information system
D) Data system
Unlock Deck
Unlock for access to all 16 flashcards in this deck.
Unlock Deck
k this deck
6
Which one of the following statements concerning a database is incorrect?

A) Databases can be built internally.
B) Databases are centralized integrated collection of data resources.
C) Databases always provide relevant data.
D) Databases act as electronic filing cabinets.
Unlock Deck
Unlock for access to all 16 flashcards in this deck.
Unlock Deck
k this deck
7
A disruptive innovation is called an/a _________________________________________.

A) innovation that entirely changes the present market
B) innovation that sets the entire industry back a few years
C) annoyance that confuses manufacturing
D) service that cannot be replicated and is short-lived
Unlock Deck
Unlock for access to all 16 flashcards in this deck.
Unlock Deck
k this deck
8
Computer-based information systems consist of the following component(s).

A) Computer hardware
B) Computer software
C) Data resource management
D) All of the above
Unlock Deck
Unlock for access to all 16 flashcards in this deck.
Unlock Deck
k this deck
9
Telephone service that is transmitted over the Internet instead of through traditional phone lines is called

A) VPN.
B) VPV.
C) IvP.
D) VoIP.
Unlock Deck
Unlock for access to all 16 flashcards in this deck.
Unlock Deck
k this deck
10
An operational support system that records and processes business transaction data is referred to as a:

A) Management information system
B) Decision support system
C) Process control system
D) Transaction processing system
Unlock Deck
Unlock for access to all 16 flashcards in this deck.
Unlock Deck
k this deck
11
Systems that imitate human thinking through complicated sets of "if-then" rules are referred to as:

A) Process control systems
B) Decision support systems
C) Expert systems
D) Executive Support Systems
Unlock Deck
Unlock for access to all 16 flashcards in this deck.
Unlock Deck
k this deck
12
A centralized integrated collection of data resources is called:

A) Data mining
B) A database
C) An online system
D) Transaction processing system
Unlock Deck
Unlock for access to all 16 flashcards in this deck.
Unlock Deck
k this deck
13
A significant trend in information systems includes:

A) The growing demands of the so-called distributed workforce.
B) The increased use of Internet service providers.
C) On-demand group computing.
D) Cloud and grip computing.
Unlock Deck
Unlock for access to all 16 flashcards in this deck.
Unlock Deck
k this deck
14
Which of the following represents inputs for computer hardware?

A) Allow users to enter data and commands
B) Keyboard
C) Mouse
D) All of the above
Unlock Deck
Unlock for access to all 16 flashcards in this deck.
Unlock Deck
k this deck
15
A computer network that is similar to the Internet, but limits access to authorized users is called _________________.

A) Internal internet
B) Network
C) Intranet
D) Extranet
Unlock Deck
Unlock for access to all 16 flashcards in this deck.
Unlock Deck
k this deck
16
Using computer-based technology to retrieve and evaluate data in a database for the purpose of identifying trends is called

A) Business intelligence.
B) Data stockpiling.
C) Information mining.
D) Data servicing.
Unlock Deck
Unlock for access to all 16 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 16 flashcards in this deck.