Deck 16: Managing Information and Technology: Finding New Ways to Learn and Link

Full screen (f)
exit full mode
Question
Cloud resources are not confined to a specific platform or operating system.
Use Space or
up arrow
down arrow
to flip the card.
Question
"Black hat hackers" are hackers who have no harmful intent. Instead, they hack into computers simply for the intellectual challenge it involves.
Question
Hardware includes the various components of a computer system along with communications and network equipment.
Question
_____ refers to the physical components used to collect, input, store, and process data, and to display and distribute information.

A)Hardware
B)Software
C)Intranet
D)Extranet
Question
When music is shared on the Internet, it is not considered piracy, since music is no longer considered intellectual property.
Question
The benefit that cloud computing provides to individual users is that:

A)it allows them to access their data from any computer without an Internet connection.
B)it requires only one major investment for the security of their data.
C)it allows them to communicate with their friends and relatives in any part of the world without being connected to the Internet.
D)it allows them to store large files without taking up valuable space on their computers' hard drives.
Question
Data become _____ when they are processed, organized, and presented in a way that makes them useful to a decision maker in a company.

A)knowledge
B)values
C)information
D)metadata
Question
Habib is a writer. He regularly uses Microsoft Word for his work so he can write, edit, and prepare his manuscripts for publication. In this scenario, which of the following computer products is Habib using?

A)A firewall
B)Antivirus software
C)Applications software
D)Operating system software
Question
The two broad categories of software are:​

A) text software and data software.
B)entertainment software and business software.
C)resident software and extrinsic software.
D)system software and application software.
Question
Horizontal applications software consists of highly specialized applications used in a particular industry, such as medicine, law, or accounting.
Question
Word processing, spreadsheet, and personal information management software are examples of vertical applications software.
Question
An advantage of an expert system is that it is capable of solving a wide variety of problems, including those that are quite different from the problems it was originally designed to solve.
Question
_____ is a network based on fiber-optic cable, which uses high-speed connectivity to improve education, research, and collaboration.

A)Intranet
B)Internet2
C)Broadband
D)Extranet
Question
Firms create _____ by offering limited access to certain areas of their intranets to select groups of people.

A)open systems
B)expert systems
C)horizontally integrated networks
D)extranets
Question
Business intelligence systems are a new class of decision support systems developed over the past two decades.
Question
Cloud computing is most likely to:

A)eliminate the threat of computer viruses.
B)create a need for greater purchases of hardware by the IT department of companies.
C)allow companies access to a vast array of computing resources without the need to invest heavily in IT personnel.
D)increase costs since employees will be required to use similar computer systems.
Question
_____ is often referred to as the world's largest computer network.

A)A cloud-based network
B)The Internet
C)An extranet
D)The kernel
Question
Intellectual property refers to products that result from creative effort, such as books, musical works, inventions, and computer software.
Question
Documents stored on the World Wide Web are written and linked together using _____.

A)decision support systems (DSS)
B)computer-aided design (Cad.
C)expert systems (ES)
D)Hypertext Markup Language (HTML)
Question
Businesses develop intranets so that valued customers have access to internal information that is not available to the general public.
Question
_____ is a scam in which official-looking emails are sent to individuals in an attempt to get them to divulge private information such as passwords, usernames, and account numbers.

A)Spamming
B)Booting
C)Phishing
D)Coding
Question
Security experts suggest that organizations restrict access to computer resources by requiring users to have strong _____.

A)passwords
B)software
C)usernames
D)keywords
Question
_____ occurs when someone reproduces and distributes copyright protected work without obtaining permission from-or providing compensation to-the owner of the material.

A)Hacking
B)Contract cheating
C)Identity theft
D)Piracy
Question
Recently, Candice found it difficult to find legitimate email messages due to the hundreds of unsolicited commercial emails in her inbox. To prevent this from occurring in the future, Candice should install a _____.

A)spam filter
B)cyber net filter
C)pharming filter
D)spyware program
Question
_____ are best described as specialized Internet sites, which provide a platform to interact for businesses, specifically those involved in business-to-business (B2B)transactions.

A)Social networking sites
B)E-marketplaces
C)Blogs
D)I-commerce sites
Question
In the _____ form of e-commerce, firms want to develop customer loyalty and repeat business but seldom develop a close working relationship with individual customers.

A)business-to-government
B)business-to-consumer
C)business-to-business
D)consumer-to-consumer
Question
_____ refers to unsolicited commercial emails, usually sent to a large number of people with little regard for the users' interest in the product or its promotion.

A)Cyberware
B)Spam
C)Opt-in email
D)Malware
Question
_____ is software that installs itself on a computer without permission and then tracks its behavior in some way.

A)Adware
B)Screenware
C)Freeware
D)Spyware
Question
Which of the following refers to programs that install themselves on computers without the users' knowledge or permission and spread by attaching themselves to other files that are transferred from computer to computer?​

A)Computer worms
B) Computer viruses​
C)Freewares
D)Spywares
Question
_____ refers to marketing, buying, selling, and servicing of products over a network, usually the Internet.

A)E-commerce
B)Media-based networking
C)Enterprise content management
D)Social commerce
Question
_____ is a technology that stores information on a microchip-such as a unique serial number-and transmits it to a reader when it is within range.

A)Global positioning system
B)Computer-aided design
C)Graphical user interface
D)Radio frequency identification
Question
A(n)_____ is similar to a virus, except that it is an independent program that can be spread across computer networks without being attached to other files.

A)worm
B)spam program
C)spyware
D)adware
Question
Which of the following statements is true of business-to-business (B2B)e-commerce?

A)It involves much less negotiation than business-to-consumer (B2C) e-commerce.
B)It involves businesses selling supplies, components, machinery, equipment, or services to individual final consumers.
C)It involves much less investment than business-to-consumer (B2C) e-commerce.
D)It involves businesses selling supplies, components, machinery, equipment, or services to other businesses.
Question
_____ is best described as an Internet advertising strategy that attempts to get customers to communicate a firm's message to friends, family, and colleagues.

A)Phishing
B)Supply-chaining
C)E-tailing
D)Viral marketing
Question
The approach to make e-commerce sites more interactive and collaborative, with customers providing most of the content, as well as a richer, more interesting, and more useful experience is known as _____.

A)Web 2.0
B)Internet5
C)Internet2
D)Web 2.2
Question
When a person buys stocks through an online broker such as Charles Schwab, he or she participates in _____ e-commerce.

A)business-to-business
B)business-to-government
C)business-to-consumer
D)consumer-to-consumer
Question
A(n)_____ is a decision support system that helps managers make better decisions in an area where they lack sufficient knowledge.

A)expert system
B)data mine
C)graphical user interface
D)utility system
Question
A(n)_____ gives managers access to large amounts of data and the processing power to convert the data into high-quality information quickly and efficiently.

A)decision support system
B)intranet
C)cybermediary
D)expert system
Question
_____ are files of related facts and figures organized according to a logical system and stored on hard drives or some other computer-accessible storage media.

A) Extranets
B) Databases
C)Intranets
D)Data mines
Question
In _____ e-commerce, many purchases may be based on impulse.

A)business-to-business
B)business-to-consumer
C)business-to-government
D)consumer-to-business
Question
What is the purpose of system software? Describe operating systems and utility programs.
Question
_________ refers to the programs that provide instructions to a computer so that it can perform a desired task.

A)Hardware
B)Software
C)Intranet
D)Extranet
Question
What are the benefits of cloud computing?
Question
_________ give managers access to large amounts of data and the processing power to convert the data into high-quality information quickly and efficiently.

A)Decision support systems
B)Extranets
C)Intranets
D)System software
Question
List and describe the ethical and legal challenges that information technology raises.
Question
_________ are skilled computer users who have the expertise to gain unauthorized access to other people's computers.

A)Phishers
B)Spammers
C)Pirates
D)Hackers
Question
Discuss four advantages that businesses using e-marketplaces enjoy.
Question
A _________ is a request for the database management software to search a database for data that match criteria specified by a user.

A)cybermediary
B)spyware
C)query
D)worm
Question
Compare and contrast intranets and extranets.
Question
A(n)_________ is an Internet-based firm that specializes in the secure electronic transfer of funds.

A)firewall
B)data warehouse
C)cybermediary
D)extranet
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 16: Managing Information and Technology: Finding New Ways to Learn and Link
1
Cloud resources are not confined to a specific platform or operating system.
True
2
"Black hat hackers" are hackers who have no harmful intent. Instead, they hack into computers simply for the intellectual challenge it involves.
False
3
Hardware includes the various components of a computer system along with communications and network equipment.
True
4
_____ refers to the physical components used to collect, input, store, and process data, and to display and distribute information.

A)Hardware
B)Software
C)Intranet
D)Extranet
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
5
When music is shared on the Internet, it is not considered piracy, since music is no longer considered intellectual property.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
6
The benefit that cloud computing provides to individual users is that:

A)it allows them to access their data from any computer without an Internet connection.
B)it requires only one major investment for the security of their data.
C)it allows them to communicate with their friends and relatives in any part of the world without being connected to the Internet.
D)it allows them to store large files without taking up valuable space on their computers' hard drives.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
7
Data become _____ when they are processed, organized, and presented in a way that makes them useful to a decision maker in a company.

A)knowledge
B)values
C)information
D)metadata
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
8
Habib is a writer. He regularly uses Microsoft Word for his work so he can write, edit, and prepare his manuscripts for publication. In this scenario, which of the following computer products is Habib using?

A)A firewall
B)Antivirus software
C)Applications software
D)Operating system software
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
9
The two broad categories of software are:​

A) text software and data software.
B)entertainment software and business software.
C)resident software and extrinsic software.
D)system software and application software.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
10
Horizontal applications software consists of highly specialized applications used in a particular industry, such as medicine, law, or accounting.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
11
Word processing, spreadsheet, and personal information management software are examples of vertical applications software.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
12
An advantage of an expert system is that it is capable of solving a wide variety of problems, including those that are quite different from the problems it was originally designed to solve.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
13
_____ is a network based on fiber-optic cable, which uses high-speed connectivity to improve education, research, and collaboration.

A)Intranet
B)Internet2
C)Broadband
D)Extranet
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
14
Firms create _____ by offering limited access to certain areas of their intranets to select groups of people.

A)open systems
B)expert systems
C)horizontally integrated networks
D)extranets
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
15
Business intelligence systems are a new class of decision support systems developed over the past two decades.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
16
Cloud computing is most likely to:

A)eliminate the threat of computer viruses.
B)create a need for greater purchases of hardware by the IT department of companies.
C)allow companies access to a vast array of computing resources without the need to invest heavily in IT personnel.
D)increase costs since employees will be required to use similar computer systems.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
17
_____ is often referred to as the world's largest computer network.

A)A cloud-based network
B)The Internet
C)An extranet
D)The kernel
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
18
Intellectual property refers to products that result from creative effort, such as books, musical works, inventions, and computer software.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
19
Documents stored on the World Wide Web are written and linked together using _____.

A)decision support systems (DSS)
B)computer-aided design (Cad.
C)expert systems (ES)
D)Hypertext Markup Language (HTML)
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
20
Businesses develop intranets so that valued customers have access to internal information that is not available to the general public.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
21
_____ is a scam in which official-looking emails are sent to individuals in an attempt to get them to divulge private information such as passwords, usernames, and account numbers.

A)Spamming
B)Booting
C)Phishing
D)Coding
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
22
Security experts suggest that organizations restrict access to computer resources by requiring users to have strong _____.

A)passwords
B)software
C)usernames
D)keywords
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
23
_____ occurs when someone reproduces and distributes copyright protected work without obtaining permission from-or providing compensation to-the owner of the material.

A)Hacking
B)Contract cheating
C)Identity theft
D)Piracy
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
24
Recently, Candice found it difficult to find legitimate email messages due to the hundreds of unsolicited commercial emails in her inbox. To prevent this from occurring in the future, Candice should install a _____.

A)spam filter
B)cyber net filter
C)pharming filter
D)spyware program
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
25
_____ are best described as specialized Internet sites, which provide a platform to interact for businesses, specifically those involved in business-to-business (B2B)transactions.

A)Social networking sites
B)E-marketplaces
C)Blogs
D)I-commerce sites
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
26
In the _____ form of e-commerce, firms want to develop customer loyalty and repeat business but seldom develop a close working relationship with individual customers.

A)business-to-government
B)business-to-consumer
C)business-to-business
D)consumer-to-consumer
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
27
_____ refers to unsolicited commercial emails, usually sent to a large number of people with little regard for the users' interest in the product or its promotion.

A)Cyberware
B)Spam
C)Opt-in email
D)Malware
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
28
_____ is software that installs itself on a computer without permission and then tracks its behavior in some way.

A)Adware
B)Screenware
C)Freeware
D)Spyware
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
29
Which of the following refers to programs that install themselves on computers without the users' knowledge or permission and spread by attaching themselves to other files that are transferred from computer to computer?​

A)Computer worms
B) Computer viruses​
C)Freewares
D)Spywares
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
30
_____ refers to marketing, buying, selling, and servicing of products over a network, usually the Internet.

A)E-commerce
B)Media-based networking
C)Enterprise content management
D)Social commerce
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
31
_____ is a technology that stores information on a microchip-such as a unique serial number-and transmits it to a reader when it is within range.

A)Global positioning system
B)Computer-aided design
C)Graphical user interface
D)Radio frequency identification
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
32
A(n)_____ is similar to a virus, except that it is an independent program that can be spread across computer networks without being attached to other files.

A)worm
B)spam program
C)spyware
D)adware
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
33
Which of the following statements is true of business-to-business (B2B)e-commerce?

A)It involves much less negotiation than business-to-consumer (B2C) e-commerce.
B)It involves businesses selling supplies, components, machinery, equipment, or services to individual final consumers.
C)It involves much less investment than business-to-consumer (B2C) e-commerce.
D)It involves businesses selling supplies, components, machinery, equipment, or services to other businesses.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
34
_____ is best described as an Internet advertising strategy that attempts to get customers to communicate a firm's message to friends, family, and colleagues.

A)Phishing
B)Supply-chaining
C)E-tailing
D)Viral marketing
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
35
The approach to make e-commerce sites more interactive and collaborative, with customers providing most of the content, as well as a richer, more interesting, and more useful experience is known as _____.

A)Web 2.0
B)Internet5
C)Internet2
D)Web 2.2
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
36
When a person buys stocks through an online broker such as Charles Schwab, he or she participates in _____ e-commerce.

A)business-to-business
B)business-to-government
C)business-to-consumer
D)consumer-to-consumer
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
37
A(n)_____ is a decision support system that helps managers make better decisions in an area where they lack sufficient knowledge.

A)expert system
B)data mine
C)graphical user interface
D)utility system
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
38
A(n)_____ gives managers access to large amounts of data and the processing power to convert the data into high-quality information quickly and efficiently.

A)decision support system
B)intranet
C)cybermediary
D)expert system
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
39
_____ are files of related facts and figures organized according to a logical system and stored on hard drives or some other computer-accessible storage media.

A) Extranets
B) Databases
C)Intranets
D)Data mines
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
40
In _____ e-commerce, many purchases may be based on impulse.

A)business-to-business
B)business-to-consumer
C)business-to-government
D)consumer-to-business
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
41
What is the purpose of system software? Describe operating systems and utility programs.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
42
_________ refers to the programs that provide instructions to a computer so that it can perform a desired task.

A)Hardware
B)Software
C)Intranet
D)Extranet
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
43
What are the benefits of cloud computing?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
44
_________ give managers access to large amounts of data and the processing power to convert the data into high-quality information quickly and efficiently.

A)Decision support systems
B)Extranets
C)Intranets
D)System software
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
45
List and describe the ethical and legal challenges that information technology raises.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
46
_________ are skilled computer users who have the expertise to gain unauthorized access to other people's computers.

A)Phishers
B)Spammers
C)Pirates
D)Hackers
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
47
Discuss four advantages that businesses using e-marketplaces enjoy.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
48
A _________ is a request for the database management software to search a database for data that match criteria specified by a user.

A)cybermediary
B)spyware
C)query
D)worm
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
49
Compare and contrast intranets and extranets.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
50
A(n)_________ is an Internet-based firm that specializes in the secure electronic transfer of funds.

A)firewall
B)data warehouse
C)cybermediary
D)extranet
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 50 flashcards in this deck.