Deck 4: IT and Computer Systems
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/17
Play
Full screen (f)
Deck 4: IT and Computer Systems
1
Which will not harm computer resources
A)firewall
B)virus
C)trojan horse
D)none of the above
A)firewall
B)virus
C)trojan horse
D)none of the above
firewall
2
Which is not a function of ERP?
A)warehousing
B)sales
C)scheduling
D)none of the above
A)warehousing
B)sales
C)scheduling
D)none of the above
none of the above
3
Which is a function of ERP?
A)warehousing
B)sales
C)scheduling
D)all of the above
A)warehousing
B)sales
C)scheduling
D)all of the above
all of the above
4
Which of the following is the primary characteristic of an intranet?
A)people outside the organization can access it
B)people inside the organization can\t access it
C)people outside the organization can\t access it
D)none of the above
A)people outside the organization can access it
B)people inside the organization can\t access it
C)people outside the organization can\t access it
D)none of the above
Unlock Deck
Unlock for access to all 17 flashcards in this deck.
Unlock Deck
k this deck
5
Which concept suggests that different applications and computer systems should be able to communicate with one another?
A)integration
B)web services
C)scalability
D)interoperability
A)integration
B)web services
C)scalability
D)interoperability
Unlock Deck
Unlock for access to all 17 flashcards in this deck.
Unlock Deck
k this deck
6
Which service encompasses all technologies used to transmit and process information on an across a network?
A)interoperability
B)scalability
C)benchmarking
D)web services
A)interoperability
B)scalability
C)benchmarking
D)web services
Unlock Deck
Unlock for access to all 17 flashcards in this deck.
Unlock Deck
k this deck
7
Which process can prevent data from lose due to computer problems or human errors?
A)backup
B)recovery
C)benchmarking
D)data cleansing
A)backup
B)recovery
C)benchmarking
D)data cleansing
Unlock Deck
Unlock for access to all 17 flashcards in this deck.
Unlock Deck
k this deck
8
Which process is used to reinstall data from a copy when the original data has been lost?
A)backup
B)recovery
C)benchmarking
D)data cleansing
A)backup
B)recovery
C)benchmarking
D)data cleansing
Unlock Deck
Unlock for access to all 17 flashcards in this deck.
Unlock Deck
k this deck
9
What describes a process of continuously measuring results and comparing those results to optimal performance so that actual performance may be improved?
A)performance
B)capacity planning
C)benchmarking
D)data cleansing
A)performance
B)capacity planning
C)benchmarking
D)data cleansing
Unlock Deck
Unlock for access to all 17 flashcards in this deck.
Unlock Deck
k this deck
10
Who protects system from external threats?
A)firewall
B)edi
C)erp
D)script kiddies
A)firewall
B)edi
C)erp
D)script kiddies
Unlock Deck
Unlock for access to all 17 flashcards in this deck.
Unlock Deck
k this deck
11
What is software that comes hidden in free downloadable software and tracks your onlinemovements, mines the information stored on your computer, or uses your computer's CPU andstorage for some task you know nothing about?
A)web log
B)clickstream
C)anonymous web browsing service
D)none of the above
A)web log
B)clickstream
C)anonymous web browsing service
D)none of the above
Unlock Deck
Unlock for access to all 17 flashcards in this deck.
Unlock Deck
k this deck
12
Which is not a component of ERP?
A)legacy systems
B)bolt on applications
C)operational database
D)cybersoft
A)legacy systems
B)bolt on applications
C)operational database
D)cybersoft
Unlock Deck
Unlock for access to all 17 flashcards in this deck.
Unlock Deck
k this deck
13
Which is not a function of ERP?
A)human resource management
B)financial
C)warehousing
D)none of the above
A)human resource management
B)financial
C)warehousing
D)none of the above
Unlock Deck
Unlock for access to all 17 flashcards in this deck.
Unlock Deck
k this deck
14
What harnesses far-flung computers together by way of the Internet or a virtual private network to share CPU power, databases, and database storage?
A)computer virus
B)worm
C)denial-of-service attack
D)none of the above
A)computer virus
B)worm
C)denial-of-service attack
D)none of the above
Unlock Deck
Unlock for access to all 17 flashcards in this deck.
Unlock Deck
k this deck
15
What consists of the identification of risks or threats, the implementation of security measures, and the monitoring of those measures for effectiveness?
A)risk management
B)risk assessment
C)security
D)none of the above
A)risk management
B)risk assessment
C)security
D)none of the above
Unlock Deck
Unlock for access to all 17 flashcards in this deck.
Unlock Deck
k this deck
16
What is the process of evaluating IT assets, their importance to the organization, and their susceptibility to threats, to measure the risk exposure of these assets?
A)risk management
B)risk assessment
C)security
D)none of the above
A)risk management
B)risk assessment
C)security
D)none of the above
Unlock Deck
Unlock for access to all 17 flashcards in this deck.
Unlock Deck
k this deck
17
What is the process of making a copy of the information stored on a computer?
A)backup
B)anti-virus
C)firewall
D)biometrics
A)backup
B)anti-virus
C)firewall
D)biometrics
Unlock Deck
Unlock for access to all 17 flashcards in this deck.
Unlock Deck
k this deck